Home | Call for Papers | Committee | Important Dates | Invited Speakers | Registration | Submission | Programs | Conference Venue | Contact Us |
Cryptology2014 - Programs | |
24th June 2014 | |
0900 - 1230 | Registration |
1400 - 1430 | Officiation of Cryptology2014 |
1430 - 1440 | Photograph Session |
1440 - 1525 | Keynote 1 - Prof Abderrahmane Nitaj |
1525 - 1530 | Break |
1530 - 1600 | Special Session by Digicert |
1600 - 1615 | Tea break |
1615 - 1625 | Paper 1: Certificateless Public Key Encryption (CL-PKE) Scheme Using Extended Chebyshev Polynomial Over the Finite Field ℤp |
1625 - 1655 | Paper 2: On the Security of a Strongly Secure Efficient Certificateless Signature Scheme |
1655 - 1615 | Paper 3: Group Ring Codes Over a Dihedral Group |
1715 - 1735 | Paper 4: Harmonic Analysis and a Bentness-like Notion in Certain Finite Abelian Groups Over Some Finite Fields |
25th June 2014 | |
0830 - 0850 | Paper 5: Survey and New Idea for Attribute-Based Identification Scheme Secure against Reset Attacks |
0850 - 0910 | Paper 6: An Identification Scheme Based On Bivariate Function Hard Problem |
0910 - 0930 | Paper 7: Implementation of Identity-Based and Certificateless Identification on Android Platform |
0930 - 0950 | Paper 8: Cryptanalysis of an ID-based Blind Signature Scheme |
0950 - 1010 | Tea Break |
1010 - 1055 | Keynote 2 - Prof Kouichi Sakurai |
1055 - 1115 | Paper 9: Combined Encryption, Signature and Multisignature Schemes |
1115 - 1135 | Paper 10: A New Arbitrated Signing Scheme Based on BFHP |
1135 - 1155 | Paper 11: Comparative Analysis of Three Asymmetric Encryption Schemes Based Upon the Intractability of Square Roots Modulo N=p2q |
1155 - 1215 | Paper 12: Rabin-RZ: A New Efficient Method to Overcome Rabin Cryptosystem Decryption Failure Problem |
1215 - 1430 | Lunch Break |
1430 - 1515 | Keynote 3 - Prof Andreas Enge |
1515 - 1535 | Paper 13: Fast Computation in wNAF Expansion Method for Integer Sub-Decomposition Elliptic Scalar Multiplication |
1535 - 1555 | Paper 14: Pseudo t-AdicNon Adjacent Formfor Scalar Multiplication on Koblitz Curves |
1555 - 1615 | Paper 15: Improved S-Box Construction from Binomial Power Functions |
1615 - 1635 | Paper 16: Analysis on Lightweight Block Cipher, SIMON |
1635 - 1655 | Paper 17: Linear Extension Cube Attack on Stream Ciphers |
1655 - 1715 | Paper 18: Randomness Analysis on Speck Family of Lightweight Block Cipher |
2000 - 2200 | Gala Dinner |
26th June 2014 | |
0850 - 0910 | Paper 19: Compression-Crypto Technique: Smaller Size of the Compressed Plaintext |
0910 - 0930 | Paper 20: A Construction of Secret Sharing Scheme |
0930 - 0950 | Paper 21: The Development of Deniable Authentication Protocol Based on The Bivariate Function Hard Problem |
0950 - 1010 | Tea Break |
1010 - 1055 | Keynote 4 - Asst. Prof. Sherman S. M. Chow |
1055 - 1115 | Paper 22: Digital watermarking using a fusion of Digital Holographic interferometry and Singular Value Decomposition |
1115 - 1135 | Paper 23: Analysis of Steganography Substitution System Methods Using New Testing Techniques Proposed for Strict Avalanche Criterion |
1135 - 1155 | Paper 24: A Balanced Secure Cryptographic Algorithm against Timing and Side Channel Attacks |
1155 - 1215 | Paper 25: Investigation Of Medical Identity Theft In Healthcare Sector: Its Statistics, Effects And Way Out |
1215 - 1430 | Lunch Break |
1430 - 1515 | Keynote 5 - Mr. Mahmud Ab Rahman |
1515 - 1535 | Paper 26: A Survey of Network Protocol based Steganographic Techniques |
1535 - 1555 | Paper 27: Digital Forensics: An Overview of the Current Trends |
1555 - 1630 | Closing Remarks |
1730 - 2130 | Kuala Lumpur Night Tour |