| Home | Call for Papers | Committee | Important Dates | Invited Speakers | Registration | Submission | Programs | Conference Venue | Contact Us |
| Cryptology2014 - Programs | |
| 24th June 2014 | |
| 0900 - 1230 | Registration |
| 1400 - 1430 | Officiation of Cryptology2014 |
| 1430 - 1440 | Photograph Session |
| 1440 - 1525 | Keynote 1 - Prof Abderrahmane Nitaj |
| 1525 - 1530 | Break |
| 1530 - 1600 | Special Session by Digicert |
| 1600 - 1615 | Tea break |
| 1615 - 1625 | Paper 1: Certificateless Public Key Encryption (CL-PKE) Scheme Using Extended Chebyshev Polynomial Over the Finite Field ℤp |
| 1625 - 1655 | Paper 2: On the Security of a Strongly Secure Efficient Certificateless Signature Scheme |
| 1655 - 1615 | Paper 3: Group Ring Codes Over a Dihedral Group |
| 1715 - 1735 | Paper 4: Harmonic Analysis and a Bentness-like Notion in Certain Finite Abelian Groups Over Some Finite Fields |
| 25th June 2014 | |
| 0830 - 0850 | Paper 5: Survey and New Idea for Attribute-Based Identification Scheme Secure against Reset Attacks |
| 0850 - 0910 | Paper 6: An Identification Scheme Based On Bivariate Function Hard Problem |
| 0910 - 0930 | Paper 7: Implementation of Identity-Based and Certificateless Identification on Android Platform |
| 0930 - 0950 | Paper 8: Cryptanalysis of an ID-based Blind Signature Scheme |
| 0950 - 1010 | Tea Break |
| 1010 - 1055 | Keynote 2 - Prof Kouichi Sakurai |
| 1055 - 1115 | Paper 9: Combined Encryption, Signature and Multisignature Schemes |
| 1115 - 1135 | Paper 10: A New Arbitrated Signing Scheme Based on BFHP |
| 1135 - 1155 | Paper 11: Comparative Analysis of Three Asymmetric Encryption Schemes Based Upon the Intractability of Square Roots Modulo N=p2q |
| 1155 - 1215 | Paper 12: Rabin-RZ: A New Efficient Method to Overcome Rabin Cryptosystem Decryption Failure Problem |
| 1215 - 1430 | Lunch Break |
| 1430 - 1515 | Keynote 3 - Prof Andreas Enge |
| 1515 - 1535 | Paper 13: Fast Computation in wNAF Expansion Method for Integer Sub-Decomposition Elliptic Scalar Multiplication |
| 1535 - 1555 | Paper 14: Pseudo t-AdicNon Adjacent Formfor Scalar Multiplication on Koblitz Curves |
| 1555 - 1615 | Paper 15: Improved S-Box Construction from Binomial Power Functions |
| 1615 - 1635 | Paper 16: Analysis on Lightweight Block Cipher, SIMON |
| 1635 - 1655 | Paper 17: Linear Extension Cube Attack on Stream Ciphers |
| 1655 - 1715 | Paper 18: Randomness Analysis on Speck Family of Lightweight Block Cipher |
| 2000 - 2200 | Gala Dinner |
| 26th June 2014 | |
| 0850 - 0910 | Paper 19: Compression-Crypto Technique: Smaller Size of the Compressed Plaintext |
| 0910 - 0930 | Paper 20: A Construction of Secret Sharing Scheme |
| 0930 - 0950 | Paper 21: The Development of Deniable Authentication Protocol Based on The Bivariate Function Hard Problem |
| 0950 - 1010 | Tea Break |
| 1010 - 1055 | Keynote 4 - Asst. Prof. Sherman S. M. Chow |
| 1055 - 1115 | Paper 22: Digital watermarking using a fusion of Digital Holographic interferometry and Singular Value Decomposition |
| 1115 - 1135 | Paper 23: Analysis of Steganography Substitution System Methods Using New Testing Techniques Proposed for Strict Avalanche Criterion |
| 1135 - 1155 | Paper 24: A Balanced Secure Cryptographic Algorithm against Timing and Side Channel Attacks |
| 1155 - 1215 | Paper 25: Investigation Of Medical Identity Theft In Healthcare Sector: Its Statistics, Effects And Way Out |
| 1215 - 1430 | Lunch Break |
| 1430 - 1515 | Keynote 5 - Mr. Mahmud Ab Rahman |
| 1515 - 1535 | Paper 26: A Survey of Network Protocol based Steganographic Techniques |
| 1535 - 1555 | Paper 27: Digital Forensics: An Overview of the Current Trends |
| 1555 - 1630 | Closing Remarks |
| 1730 - 2130 | Kuala Lumpur Night Tour |