PROGRAM
Days: Thursday, December 8th Friday, December 9th
Thursday, December 8th
View this program: with abstractssession overviewtalk overview
08:30-08:45 Session 1: SECITC 2022: Opening (CET Time)
Welcome Speeches
Giampaolo BELLA, Mihai DOINEA and Helge JANICKE, Conference Chairs
Chair:
Mihai Doinea (Bucharest University of Economic Studies, Romania)
Location: Conference Zoom Presentation Access Link
08:45-09:00 Session 2: SECITC 2022: Welcome Speeches (CET Time)
Representatives from:
Military Technical Academy, Department of Computer Science and Military Information Systems - Ion BICA
Bucharest University of Economic Studies, Department of Economic Informatics and Cybernetics - Catalin BOJA
Advanced Technologies Institute (ITA) - Diana MAIMUT
Chair:
Mihai Doinea (Bucharest University of Economic Studies, Romania)
Location: Conference Zoom Presentation Access Link
09:00-10:00 Session 3: SECITC 2022: Invited Talk (CET Time)
Chair:
Mihai Doinea (Bucharest University of Economic Studies, Romania)
Location: Conference Zoom Presentation Access Link
09:00 | Formal Methods for Socio-Technical Security (Formal and Automated Analysis of Security Ceremonies) (abstract) |
10:00-12:00 Session 4: Presentations, Chair: Helge JANICKE (CET Time)
Chair:
Helge Janicke (Edith Cowan University, Australia)
Location: Conference Zoom Presentation Access Link
10:00 | Lightweight Authentication Using Noisy Key Derived from Physically Unclonable Function (abstract) PRESENTER: Yuichi Komano |
10:20 | Superpoly Recovery of Grain-128AEAD Using Division Property (abstract) PRESENTER: Debasmita Chakraborty |
10:40 | Easy-ABE: an Easy Ciphertext-Policy Attribute-Based Encryption (abstract) |
11:00 | Efficient Distributed Keys Generation of Threshold Paillier Cryptosystem (abstract) PRESENTER: Amirreza Hamidi |
11:20 | Towards Verifying Physical Assumption in Card-Based Cryptography (abstract) PRESENTER: Masahisa Shimano |
11:40 | The Right Level of Human Interaction to Establish Cybersecurity - invited paper (abstract) |
12:00-13:00Lunch Break (CET Time)
13:00-15:20 Session 5: Presentations, Chair: Mihai DOINEA (CET Time)
Chair:
Mihai Doinea (Bucharest University of Economic Studies, Romania)
Location: Conference Zoom Presentation Access Link
13:00 | Activity Detection from Encrypted Remote Desktop Protocol Traffic (abstract) ![]() PRESENTER: Lukasz Lapczyk |
13:20 | Application-Oriented Anonymization Framework for Social Network Datasets and IoT Environments (abstract) ![]() PRESENTER: Jana Medková |
13:40 | Bridges Connecting Encryption Schemes (abstract) ![]() PRESENTER: George Catalin Turcas |
14:00 | On Single-Server Delegation of RSA (abstract) PRESENTER: Matluba Khodjaeva |
14:20 | Lightweight Permutation-Based Cryptography for the Ultra Low Power Internet of Things (abstract) PRESENTER: Johann Groszschaedl |
14:40 | AI-Powered Vulnerability Detection for Secure Source Code Development (abstract) PRESENTER: Sampath Rajapaksha |
15:00 | The Security of Quasigroups Based Substitution Permutation Networks (abstract) |
Friday, December 9th
View this program: with abstractssession overviewtalk overview
08:00-08:30 Session 6: SECITC2022: Invited Talk (CET Time)
Chair:
Mihai Doinea (Bucharest University of Economic Studies, Romania)
Location: Conference Zoom Presentation Access Link
08:00 | Secure input handling - insights from the past decade (abstract) |
08:30-10:50 Session 7: Presentations, Chair: Marius POPA (CET Time)
Chair:
Marius Popa (Bucharest University of Economic Studies, Romania)
Location: Conference Zoom Presentation Access Link
08:30 | Statistical Tests for Symmetric Primitives an Application to NIST Lightweight Finalists (abstract) PRESENTER: Yun Ju Huang |
08:50 | MILP-Aided Cryptanalysis of the FUTURE Block Cipher (abstract) PRESENTER: Murat Burhan Ilter |
09:10 | Card-Based Zero-Knowledge Proof Protocol for Pancake Sorting (abstract) PRESENTER: Yuichi Komano |
09:30 | Unbounded Revocable Decentralized Multi-Authority Attribute-Based Encryption Supporting Non-Monotone Access Structures (abstract) PRESENTER: Hikaru Tsuchida |
09:50 | An Improved Purdue Enterprise Reference Architecture to Enhance Cybersecurity (abstract) |
10:10 | Constructing Pairing Free Unbounded Inner Product Functional Encryption Schemes with Unbounded Inner Product Policy (abstract) PRESENTER: Subhranil Dutta |
10:30 | MOTUS: How Quantized Parameters Improve Protection of Models and Their Inference Inputs (abstract) PRESENTER: Masataka Tatsumi |