Conference Schedule
Conference Date : 16 – 18 December 2020 (dates may differ in your timezone)
If the times seem inconvenient, keep in mind that this is an international conference with a Bali, INDONESIA-centric schedule.
Summary of Program
Wed. 16 Dec 2020 (Day 1) |
|||
Time (UTC+8, Bali) |
Detail |
Time (Your Timezone ) |
|
09:00 - 09:15 |
Opening |
|
|
09:15 - 10:15 |
Keynote Speech I: Prof Reihaneh Safavi-Naini |
|
|
10:15 - 10:30 |
Coffee break |
|
|
10:30 - 11:20 |
Public-key Cryptography I |
|
|
11:20 - 12:10 |
Blockchain I |
|
|
12:10 - 12:50 |
Best paper award, |
|
|
12:50 - 14:00 |
Lunch |
|
|
14:00 - 15:15 |
Public-key Cryptography II |
|
|
15:15 - 15:30 |
Coffee break |
|
|
15:30 - 16:30 |
Keynote Speech II: Prof. Dr.-Ing. Tibor Jager |
|
|
16:30 - 17:40 |
Network & System Security |
|
|
Thu. 17 Dec 2020 (Day 2) |
|||
9:00 - 10:00 |
Keynote Speech III: Dr Melissa Chase |
|
|
10:00 - 11:00 |
Keynote Speech IV: Prof Yingjiu Li |
|
|
11:00 - 11:15 |
Coffee break |
|
|
11:15 - 12:05 |
Blockchain II |
|
|
12:05 - 14:00 |
Lunch |
|
|
14:00 - 14:25 |
Symmetric-key Crypto |
|
|
14:25 - 14:50 |
Attacks & Cryptanalysis I |
|
|
15:15 - 15:30 |
Coffee break |
|
|
15:30 - 16:20 |
Security Applications |
|
|
16:20 - 16:45 |
Malware Analysis I |
|
|
Fri. 18 Dec 2020 (Day 3) |
|||
09:00 - 10:00 |
Keynote Speech V: Dr Tieyan Li |
|
|
10:00 - 10:25 |
Malware Analysis II |
|
|
10:25 - 10:50 |
Lattice |
|
|
10:50 - 11:05 |
Coffee break |
|
|
11:05 - 11:55 |
Attacks & Cryptanalysis II |
|
|
11:55 - 12:00 |
Closing Ceremony and Remarks |
|
Detailed Program
Wed. 16 Dec 2020 (Day 1) |
|||
Time (UTC+7) |
Detail |
Time (Your Timezone ) |
|
09:00 - 09:15 |
Opening |
|
|
09:15 - 10:15 |
Keynote Speech I: Prof Reihaneh Safavi-Naini |
|
|
10:15 - 10:30 |
Coffee break |
|
|
|
Public-key Cryptography I |
|
|
10:30 - 10:55 |
Compatible Certificateless and Identity-Based Cryptosystems for Heterogeneous IoT |
Rouzbeh Behnia, Attila A Yavuz, Muslum Ozgur Ozmen, Tsz Hon Yuen |
|
10:55 - 11:20 |
Time-Specific Signatures |
Masahito Ishizaka, Shinsaku Kiyomoto |
|
|
Blockchain I |
|
|
11:20 - 11:45 |
BlockVoke - Fast, Blockchain-Based Certificate Revocation for PKIs and the Web of Trust |
Abba Garba, Arne Bochem, Benjamin Leiding |
|
11:45 - 12:10 |
Formalizing Bitcoin Crashes with Universally Composable Security |
Junming Ke, Pawel Szalachowski, Jianying Zhou, Qiuliang Xu |
|
12:10 - 12:50 |
Best paper award, |
|
|
12:50 - 14:00 |
Lunch |
|
|
|
Public-key Cryptography II |
|
|
14:00 - 14:25 |
Public-PEZ Cryptography |
Soma Murata, Daiki Miyahara, Takaaki Mizuki, Hideaki Sone |
|
14:25 - 14:50 |
Anonymous IBE From Quadratic Residuosity With Fast Encryption |
Xiaopeng Zhao, Zhenfu Cao, Xiaolei Dong, Jinwen Zheng |
|
14:50 - 15:15 |
Two-Server Verifiable Homomorphic Secret Sharing for High-Degree Polynomials |
Xin Chen, Liang Feng Zhang |
|
15:15 - 15:30 |
Coffee break |
|
|
15:30 - 16:30 |
Keynote Speech II: Prof. Dr.-Ing. Tibor Jager |
|
|
|
Network & System Security |
|
|
16:30 - 16:55 |
Towards Transparent Control-Flow Integrity in Safety-Critical System |
Don Kuzhiyelil, Philipp Zieris, Marine Kadar, Sergey Tverdyshev, Gerhard Fohler |
|
16:55 - 17:15 |
ELD: Adaptive Detection of Malicious Nodes under Mix-Energy-Depleting-Attacks Using Edge Learning in IoT Networks |
Zuchao Ma, Liang Liu, Weizhi Meng |
|
17:15 - 17:40 |
Minimal rare-pattern-based outlier detection method for data streams by considering anti-monotonic constraints |
Saihua Cai, Jinfu Chen, Xinru Li, Bo Liu |
|
Thu. 17 Dec 2020 (Day 2) |
|||
9:00 - 10:00 |
Keynote Speech III: Dr Melissa Chase |
|
|
10:00 - 11:00 |
Keynote Speech IV: Prof Yingjiu Li |
|
|
11:00 - 11:15 |
Coffee break |
|
|
|
Blockchain II |
|
|
11:15 - 11:40 |
Characterizing Erasable Accounts in Ethereum |
Xiaoqi Li, Ting Chen, Xiapu Luo, Jiangshan Yu |
|
11:40 - 12:05 |
An Accountable Decryption System Based on Privacy-Preserving Smart Contracts |
Rujia Li, Qin Wang, Feng Liu, Qi Wang, David Galindo |
|
12:05 - 14:00 |
Lunch |
|
|
|
Symmetric-key Crypto |
|
|
14:00 - 14:25 |
Searching for Balanced S-Boxes with High Nonlinearity, Low Differential Uniformity, and Improved DPA-Resistance |
Youle Xu, Qichun Wang |
|
|
Attacks & Cryptanalysis I |
|
|
14:25 - 14:50 |
Rotational Cryptanalysis of Salsa Core Function |
Ryoma Ito |
|
14:50 - 15:15 |
Analyzing the Chain of Trust Model Based on Entity Dependence |
Ge Cheng, Hui Xie, Dongliang Zhang |
|
15:15 - 15:30 |
Coffee break |
|
|
|
Security Applications |
|
|
15:30 - 15:55 |
PvP: Profiling versus Player! Exploiting Gaming Data for Player Recognition |
Pier Paolo Tricomi, Mauro Conti |
|
15:55 - 16:20 |
Privacy-Preserving Computation of the Earth Mover’s Distance |
Alberto Blanco-Justicia, Josep Domingo-Ferrer |
|
|
Malware Analysis I |
|
|
16:20 - 16:45 |
Why Current Statistical Approaches to Ransomware Detection Fail |
Jamie Pont, Budi Arief, Julio Hernandez-Castro |
|
16:45 - 17:10 |
On the Struggle Bus: A Detailed Security Analysis of the m-tickets App |
Jorge Sanz Maroto, Haoyu Liu, Paul Patras |
|
Fri. 18 Dec 2020 (Day 3) |
|||
09:00 - 10:00 |
Keynote Speech V: Dr Tieyan Li |
|
|
|
Malware Analysis II |
|
|
10:00 - 10:25 |
A Framework for Estimating Privacy Risk Scores of Mobile Apps |
Kai Chih Chang, Razieh Nokhbeh Zaeem, K. Suzanne Barber |
|
|
Lattice |
|
|
10:25 - 10:50 |
Integerwise Functional Bootstrapping on TFHE |
Hiroki Okada, Shinsaku Kiyomoto, Carlos Cid |
|
10:50 - 11:05 |
Coffee break |
|
|
|
Attacks & Cryptanalysis II |
|
|
11:05 - 11:30 |
Evaluation on the Security of Commercial Cloud Container Services |
Yifei Wu, Lingguang Lei, Yuewu Wang, Kun Sun, Jingzi Meng |
|
11:30 - 11:55 |
Walls Have Ears: Eavesdropping User Behaviors via Graphics-Interrupt-Based Side Channel |
Haoyu Ma, Tian Jianwen, Debin Gao, Chunfu Jia |
|
11:55 - 12:00 |
Closing Ceremony and Remarks |
|