| Home | Background | Call for Papers |
Committee | Important Dates |
Invited Speakers |
Registration Fee | Online Registration | Submission | Programs | Conference Venue |
The Climb |
Contact Us |
| Cryptology2016 - Programs | |
| 30th May 2016 | |
| 1500 - 1800 | Registration |
| 31st May 2016 | |
| 0800 - 0830 | Opening Remarks & Briefing by Conference Chair |
| 0830 - 0850 | Paper 1 - HXDTRU Cryptosystem Based On Hexadecnion Algebra |
| 0850 - 0910 | Paper 2 - A Review on Four-Dimensional GLV method and ISD method for Scalar Multiplication on Elliptic Curves |
| 0910 - 0930 | Paper 3 - A Comparative S-Index in Factoring RSA Modulus via Lucas Sequences |
| 0930 - 1000 | Tea Break |
| 1000 - 1100 | Keynote 1 - Prof. Amr M. Youssef |
| 1100 - 1120 | Paper 4 - Families of Cyclotomic Cosets with Application to Secret Sharing Scheme |
| 1120 - 1140 | Paper 5 - Analysis on the AA_{\beta} Cryptosystem |
| 1140 - 1200 | Paper 6 - A New Efficient Rabin-like Signature Scheme |
| 1200 - 1230 | CSM Slot |
| 1230 - 1400 | Lunch Break |
| 1400 - 1630 | Cryptology 2016 Opening Ceremony Keynote 2 - Dr. Amirudin Abdul Wahab |
| 1630 - 1700 | Tea break |
| 1700 - 1720 | Paper 7 - Fingerprint Minutiae Template Protection for Privacy Preserving |
| 1720 - 1740 | Paper 8 - Generating Non-Invertible Iris Template For Privacy Preserving |
| 1st June 2016 | |
| 0700 - 1800 | Conference Tour - Kinabalu Park |
| 1800 - 2100 | Conference Dinner - Kampung Nelayan |
| 2nd June 2016 | |
| 0800 - 0820 | Paper 9 - New Attack on k RSA Moduli N_{i}=p_{i}^{2}q_{i} |
| 0820 - 0840 | Paper 10 - Cryptanalysis of RSA Prime Power Modulo p^{r}q |
| 0840 - 0900 | Paper 11 - A New Improved Attack on RSA |
| 0900 - 0930 | Tea Break |
| 0930 - 1030 | Keynote 3 - Prof. Abderrahmane Nitaj |
| 1030 - 1050 | Paper 12 - Securing Data on Outsourced Multistorage Repository |
| 1050 - 1110 | Paper 13 - Leakage Power Analysis Attacks: An Approach Based on Wavelet Preprocessing and Machine Learning |
| 1110 - 1130 | Paper 14 - S-box Optimisation using Heuristic Methods |
| 1130 - 1150 | Paper 15 - CSM S-Box Evaluation Tool (CSET); Tool to Evaluate the Strength of an S-Box |
| 1150 - 1210 | Paper 16 - High Capacity Data Embedding Method with LSB and PVD Shift |
| 1210 - 1230 | Paper 17 - Critical Analysis on Steganography Techniques in Text Domain |
| 1230 - 1250 | Paper 18 - Oblivious Memory Trace in Graphics Hardware with Constant Blowup |
| 1250 - 1430 | Lunch Break |
| 1430 - 1450 | Paper 19 - Implementation of a Pairing-Based Identity-Based Signature on iPhones |
| 1450 - 1510 | Paper 20 - mPBC: An Efficient Pairing-Based Cryptography Library for Android |
| 1510 - 1530 | Paper 21 - P2P Botnets Detection Module through Hybrid Approach |
| 1530 - 1550 | Paper 22 - Enhancement Taxonomy and Analysis on Android Malware Detection |
| 1550 - 1610 | Paper 23 - An Analysis Technique for Cost Estimation in Information Security |
| 1610 - 1630 | Paper 24 - Determinants of Information Privacy Concern and Privacy Protection Behaviour Strategies in Social Networking Sites among Undergraduates in Malaysia |
| 1630 - 1640 | Closing |
| 1640 - 1700 | Tea break |