Important Dates

Extended Paper Submission Deadline (Final)

May 15,2011 May 31, 2011

Author Notification

July 15, 2011

Final Manuscript Due

August 01, 2011

Author Registration Due

August 05, 2011

Conference Events

October 19-22, 2011

Technical Program

October 19, 2011

9:00-10:00 REGISTRATION
10:00-11:00 Invited Talk:To Infinity and Beyond: Combined Attack on ECC Using Points of Low Order Speaker name: Benedikt Gierlichs, K.U.Leuven, Belgium
11:00-11:30 TEA/COFFEE BREAK
11:30-13:00
(Digital Rights Management)
Technical Session I Title Authors
44 “Rank Correction”: A New Side-Channel Approach For Secret Key Recovery Maxime Nassar,
Youssef Souissi,
Jean-Luc Danger and
Sylvain Guilley
114 A Cache Trace Attack on CAMELLIA Rishabh Poddar,
Amit Datta and
Chester Rebeiro
116 An Improvement of Linearization-based Algebraic Attacks Satrajit Ghosh and
Abhijit Das
13:00-14:00 LUNCH BREAK
14:00-15:30 Tutorial-I:
Title: Pairing in Cryptography
Speaker name: Abhijit Das, IIT Kharagpur, India
15:30-16:00 TEA/COFFEE BREAK
16:00-17:30 Tutorial-I(Continued)
See top

October 20, 2011

8:30-9:30 REGISTRATION
9:30-10:00 INAUGURATION
10:00-11:00 Invited Talk:The communication-computation cost of cryptographic algorithms and protocols Speaker name: Ingrid Verbauwhede, Katholieke Universiteit Leuven, Belgium
11:00-11:15 TEA/COFFEE BREAK
11:15-12:45
(Embedded Security)
Technical Session I Title Authors
51 Model Based Hybrid Approach To Prevent SQL injection Attacks in PHP Kunal Sadalkar and
Radhesh Mohandas
92 Security of Prime Field Pairing Cryptoprocessor Against Differential Power Attack Santosh Ghosh and
Dipanwita Roy Chowdhury
112 Embedded Software Security through Key-based Control Flow Obfuscation Rajat Subhra Chakraborty,
Seetharam Narasimhan and
Swarup Bhunia
12:45-14:00 LUNCH BREAK
14:00-15:30 Tutorial II:A tutorial introduction to provable security of crypto systems Speaker name: C.Pandurangan, IIT Madras, India
15:30-16:00 TEA/COFFEE BREAK
16:00-17:30 Tutorial II: continued Speaker name: C.Pandurangan, IIT Madras, India
16:45-19:00 Sight-seeing to Haldia Port, Sunset view point and Vidyasagar Park
See top

October 21, 2011

9:30-10:00 REGISTRATION
10:00-11:00 Invited Talk:Secure Implementations for the Internet of Things Speaker name: Jörn-Marc Schmidt, IAIK, TUGraz, Austria
11:00-11:15 TEA/COFFEE BREAK
11:15-12:45
(Cryptographic Protocols)
Technical Session II Title Authors
17 An ID-based proxy multi signature scheme Namita Tiwari and
Sahadeo Padhye
31 Distributed Signcryption Schemes with Formal Proof of Security Indivar Gupta and
P K Saxena
72 Identity Based Online/Offline Encryption and Signcryption Schemes Revisited Sharmila Deva Selvi S,
Sree Vivek S and
Chandrasekaran Pandurangan
12:45-14:00 LUNCH BREAK
14:00-15:00 Invited Talk:Recent Trends in Steganography and Steganalysis Speaker name: Saibal Pal, SAG, India
15:00-16:30
Cryptanlysis/Side Channel Attacks
Technical Session III Title Authors
30 Reversible Watermarking Using Priority Embedding through Repeated Application of Integer Wavelet Transform Sambaran Bandyopadhyay,
Ruchira Naskar and
Rajat Subhra Chakraborty
79 Access Policy Based Key Management in Multi-Level Multi-Distributor DRM Architecture Ratna Dutta,
Sourav Mukhopadhyay and
Dheerendra Mishra
98 Access Polynomial Based Self-Healing Key Distribution with Improved Security and Performance Ratna Dutta
16:30-17:00 TEA/COFFEE BREAK
17:00-20:00 CULTURAL PROGRAM
20:00-22:00 BANQUET DINNER
See top

October 22, 2011

9:30-10:30 Invited Talk:Cryptography: What to use? Speaker name: Palash Sarkar, ISI Kolkata,India
10:30-11:30 Invited Talk:Engineering Trustworthy Systems Speaker name: Sanjay Burman, CAIR, India
11:30-11:45 TEA/COFFEE BREAK
11:45-12:45
Cipher Primitives
Technical Session IV Title Authors
91 Generalized Avalanche Test for Stream Cipher Analysis P R Mishra,
Indivar Gupta and
N R Pillai
102 On Applications of Singular Matrices over Finite Fields in Cryptography Dhirendra Yadav,
Rajendra Sharma and
Wagish Shukla
12:45-14:00 LUNCH BREAK
14:00-15:30 Tutorial III: Power and Fault Analysis of Microprocessors Speaker name: Michael Tunstall, University of Bristol,UK
15:30-15:45 TEA/COFFEE BREAK
15:45-17:15 Tutorial III: Continued Speaker name: Michael Tunstall, University of Bristol,UK
17:15-18:15 CLOSING SESSION
See top