Cryptology2016 | International Cryptology and Information Security Conference 2016
 
Home Background Call for
Papers
Committee Important
Dates
Invited
Speakers
Registration Fee Online Registration Submission Programs Conference
Venue
The
Climb
Contact Us

Cryptology2016 - Programs
 
30th May 2016
1500 - 1800 Registration
 
31st May 2016
0800 - 0830 Opening Remarks & Briefing by Conference Chair
0830 - 0850 Paper 1 - HXDTRU Cryptosystem Based On Hexadecnion Algebra
0850 - 0910 Paper 2 - A Review on Four-Dimensional GLV method and ISD method for Scalar Multiplication on Elliptic Curves
0910 - 0930 Paper 3 - A Comparative S-Index in Factoring RSA Modulus via Lucas Sequences
0930 - 1000 Tea Break
1000 - 1100 Keynote 1 - Prof. Amr M. Youssef
1100 - 1120 Paper 4 - Families of Cyclotomic Cosets with Application to Secret Sharing Scheme
1120 - 1140 Paper 5 - Analysis on the AA_{\beta} Cryptosystem
1140 - 1200 Paper 6 - A New Efficient Rabin-like Signature Scheme
1200 - 1230 CSM Slot
1230 - 1400 Lunch Break
1400 - 1630 Cryptology 2016 Opening Ceremony
Keynote 2 - Dr. Amirudin Abdul Wahab
1630 - 1700 Tea break
1700 - 1720 Paper 7 - Fingerprint Minutiae Template Protection for Privacy Preserving
1720 - 1740 Paper 8 - Generating Non-Invertible Iris Template For Privacy Preserving
 
1st June 2016
0700 - 1800 Conference Tour - Kinabalu Park
1800 - 2100 Conference Dinner - Kampung Nelayan
 
2nd June 2016
0800 - 0820 Paper 9 - New Attack on k RSA Moduli N_{i}=p_{i}^{2}q_{i}
0820 - 0840 Paper 10 - Cryptanalysis of RSA Prime Power Modulo p^{r}q
0840 - 0900 Paper 11 - A New Improved Attack on RSA
0900 - 0930 Tea Break
0930 - 1030 Keynote 3 - Prof. Abderrahmane Nitaj
1030 - 1050 Paper 12 - Securing Data on Outsourced Multistorage Repository
1050 - 1110 Paper 13 - Leakage Power Analysis Attacks: An Approach Based on Wavelet Preprocessing and Machine Learning
1110 - 1130 Paper 14 - S-box Optimisation using Heuristic Methods
1130 - 1150 Paper 15 - CSM S-Box Evaluation Tool (CSET); Tool to Evaluate the Strength of an S-Box
1150 - 1210 Paper 16 - High Capacity Data Embedding Method with LSB and PVD Shift
1210 - 1230 Paper 17 - Critical Analysis on Steganography Techniques in Text Domain
1230 - 1250 Paper 18 - Oblivious Memory Trace in Graphics Hardware with Constant Blowup
1250 - 1430 Lunch Break
1430 - 1450 Paper 19 - Implementation of a Pairing-Based Identity-Based Signature on iPhones
1450 - 1510 Paper 20 - mPBC: An Efficient Pairing-Based Cryptography Library for Android
1510 - 1530 Paper 21 - P2P Botnets Detection Module through Hybrid Approach
1530 - 1550 Paper 22 - Enhancement Taxonomy and Analysis on Android Malware Detection
1550 - 1610 Paper 23 - An Analysis Technique for Cost Estimation in Information Security
1610 - 1630 Paper 24 - Determinants of Information Privacy Concern and Privacy Protection Behaviour Strategies in Social Networking Sites among Undergraduates in Malaysia
1630 - 1640 Closing
1640 - 1700 Tea break
 


Cryptology2014 | International Cryptology and Information Security 2014