Home | Background | Call for Papers |
Committee | Important Dates |
Invited Speakers |
Registration Fee | Online Registration | Submission | Programs | Conference Venue |
The Climb |
Contact Us |
Cryptology2016 - Programs | |
30th May 2016 | |
1500 - 1800 | Registration |
31st May 2016 | |
0800 - 0830 | Opening Remarks & Briefing by Conference Chair |
0830 - 0850 | Paper 1 - HXDTRU Cryptosystem Based On Hexadecnion Algebra |
0850 - 0910 | Paper 2 - A Review on Four-Dimensional GLV method and ISD method for Scalar Multiplication on Elliptic Curves |
0910 - 0930 | Paper 3 - A Comparative S-Index in Factoring RSA Modulus via Lucas Sequences |
0930 - 1000 | Tea Break |
1000 - 1100 | Keynote 1 - Prof. Amr M. Youssef |
1100 - 1120 | Paper 4 - Families of Cyclotomic Cosets with Application to Secret Sharing Scheme |
1120 - 1140 | Paper 5 - Analysis on the AA_{\beta} Cryptosystem |
1140 - 1200 | Paper 6 - A New Efficient Rabin-like Signature Scheme |
1200 - 1230 | CSM Slot |
1230 - 1400 | Lunch Break |
1400 - 1630 | Cryptology 2016 Opening Ceremony Keynote 2 - Dr. Amirudin Abdul Wahab |
1630 - 1700 | Tea break |
1700 - 1720 | Paper 7 - Fingerprint Minutiae Template Protection for Privacy Preserving |
1720 - 1740 | Paper 8 - Generating Non-Invertible Iris Template For Privacy Preserving |
1st June 2016 | |
0700 - 1800 | Conference Tour - Kinabalu Park |
1800 - 2100 | Conference Dinner - Kampung Nelayan |
2nd June 2016 | |
0800 - 0820 | Paper 9 - New Attack on k RSA Moduli N_{i}=p_{i}^{2}q_{i} |
0820 - 0840 | Paper 10 - Cryptanalysis of RSA Prime Power Modulo p^{r}q |
0840 - 0900 | Paper 11 - A New Improved Attack on RSA |
0900 - 0930 | Tea Break |
0930 - 1030 | Keynote 3 - Prof. Abderrahmane Nitaj |
1030 - 1050 | Paper 12 - Securing Data on Outsourced Multistorage Repository |
1050 - 1110 | Paper 13 - Leakage Power Analysis Attacks: An Approach Based on Wavelet Preprocessing and Machine Learning |
1110 - 1130 | Paper 14 - S-box Optimisation using Heuristic Methods |
1130 - 1150 | Paper 15 - CSM S-Box Evaluation Tool (CSET); Tool to Evaluate the Strength of an S-Box |
1150 - 1210 | Paper 16 - High Capacity Data Embedding Method with LSB and PVD Shift |
1210 - 1230 | Paper 17 - Critical Analysis on Steganography Techniques in Text Domain |
1230 - 1250 | Paper 18 - Oblivious Memory Trace in Graphics Hardware with Constant Blowup |
1250 - 1430 | Lunch Break |
1430 - 1450 | Paper 19 - Implementation of a Pairing-Based Identity-Based Signature on iPhones |
1450 - 1510 | Paper 20 - mPBC: An Efficient Pairing-Based Cryptography Library for Android |
1510 - 1530 | Paper 21 - P2P Botnets Detection Module through Hybrid Approach |
1530 - 1550 | Paper 22 - Enhancement Taxonomy and Analysis on Android Malware Detection |
1550 - 1610 | Paper 23 - An Analysis Technique for Cost Estimation in Information Security |
1610 - 1630 | Paper 24 - Determinants of Information Privacy Concern and Privacy Protection Behaviour Strategies in Social Networking Sites among Undergraduates in Malaysia |
1630 - 1640 | Closing |
1640 - 1700 | Tea break |