Program     Session Table     Invited Talks/Tutorials    

 

We have 2 Invited Talks and 3 Tutorials in SCIS2012.

 

1st Invited Talk

Date and Time

 January 30, 2012, 16:30-17:30

 

Venue

 The Kanazawa Theatre

 

Presenter

Akinori Yonezawa
(RIKEN Advanced Institute of Computational Science)

 

Present Post

Co-Director, RIKEN Advanced Institute of Computational Science

 

Career Summary

1978 Ph.D. in Computer Science, MIT
1989 Professor in Computer Science, University o Tokyo
1999 ACM Fellow
2006 Director, Information Technology Center, University of Tokyo
2011.4 present position

 

Title

Secure Societies and Supercomputing

 

Abstract

An overview of the current high performance computing project centering the K supercomputer made in Japan is summarized. Also, I will touch upon how supercomputing is involved in facilitating security of societies. My talk will include software security, cryptosystem, disaster mitigation, etc.

 

 

2nd Invited Talk

Date and Time

 January 31, 2012, 17:40-18:40

 

Venue

 The Kanazawa Theatre

 

Presenter

Professor Heung Youl YOUM,
Soonchunhyang University

 

Present Post

Professor, Department of Information Security Engineering, Soonchunhyang University
Honorary President, KIISC (Korea Institute of Information Security and Cryptography)

 

Career Summary

1990 Professor, Department of Information Security Engineering, Soonchunhyang University
2011 President, KIISC

 

Title

Information security&cryptography today and tomorrow in Korea

 

Abstract

The Korea suffered massive DDoS attacks and large-scale personal information leakage incidents happed for the financial and political purposes in 2011. This presentation will introduce recent trends of cyber-attacks happened in Korea in 2011, how they were launched, what countermeasures were put in place to protect against those cyber-attacks, including Korea’s legal and regulation systems. In addition, it will present some practical countermeasures which are being put in place in Korea, such as a monitoring system for malicious web sites, cybersecurity master plan which was declared by Korean government in August, 2011, and an organizational structure for cyber security in Korea, cryptographic algorithm policies in Korea, and academic activities by KIISC.

 

 

Tutorials:Ligitweight Cryptography
 - From specification and current security to research and development toward lightweight cryptography-

Date and Time

 February 1, 2012, 16:30-18:00

 

Venue

 The Kanazawa Theatre

 

 

In this tutorials, we invite specialists with keyword "Lightweight Cryptography" to facilitate knowledge for lightweight cryptography.

 

1st Tutorial : Cryptography Specification of Embedded Micro-controller

Presenter

Takashi Tsukamoto (Renesas Electronics Corporation)

 

Abstract

The amount of electronic equipment with secure micro-controller is increasing. The purpose is to remove imitation by certification, and to prevent manipulation by cryptography. The requirement specification and function vary depending on the equipment. The development secure IP such as cryptographic coprocessor and tamper resistant function are required.

 

2nd Tutorial : Efficient Implementation of Pairing-Based Cryptosystems on Sensor Node MICAz

Presenter

Tsuyoshi Takagi (Kyushu University)

 

Abstract

Pairing-based cryptography provides us many novel cryptographic applications such as ID-based encryption, efficient broadcast encryption, keyword searchable encryption, and so on. The security problems in ubiquitous sensor networks have been discussed in many papers, and pairing-based cryptography is a crucial technique to solve them. Due to the limited resources in current sensor nodes, it is challenged to optimize the implementation of pairings on sensor nodes. In this talk we present some efficient implementation of pairing over MICAz, which is widely used as a sensor node for ubiquitous sensor networks.

 

3rd Tutorial: On a Lightweight Symmetric Key Encryption

Presenter

Dai Watanabe (Hitachi, Ltd.)

 

Abstract

Sensor and controller start to interconnect via wireless network and their network security becomes an important item. The components are necessary to be cheap in terms of initial and running cost, so that the CPU has relatively low computational power, the circuit area is limited, and the power consumption for processing encryption is also to be considered. This tutorial talk try to give a brief introduction to the current status of lightweight symmetric key encryption that may be useful to implement the security for above networks.

 

Copyright (C) 2011-2012 SCIS2012, All Rights Reserved.