SECITC 2022: 15TH INTERNATIONAL CONFERENCE ON SECURITY FOR INFORMATION TECHNOLOGY AND COMMUNICATIONS
PROGRAM

Days: Thursday, December 8th Friday, December 9th

Thursday, December 8th

View this program: with abstractssession overviewtalk overview

08:30-08:45 Session 1: SECITC 2022: Opening (CET Time)

Welcome Speeches

Giampaolo BELLA, Mihai DOINEA and Helge JANICKE, Conference Chairs

Chair:
Mihai Doinea (Bucharest University of Economic Studies, Romania)
08:45-09:00 Session 2: SECITC 2022: Welcome Speeches (CET Time)

Representatives from:

Military Technical Academy, Department of Computer Science and Military Information Systems - Ion BICA

Bucharest University of Economic Studies, Department of Economic Informatics and Cybernetics - Catalin BOJA

Advanced Technologies Institute (ITA) - Diana MAIMUT

Chair:
Mihai Doinea (Bucharest University of Economic Studies, Romania)
09:00-10:00 Session 3: SECITC 2022: Invited Talk (CET Time)
Chair:
Mihai Doinea (Bucharest University of Economic Studies, Romania)
09:00
Luca Vigano (King’s College London, UK)
Formal Methods for Socio-Technical Security (Formal and Automated Analysis of Security Ceremonies) (abstract)
10:00-12:00 Session 4: Presentations, Chair: Helge JANICKE (CET Time)
Chair:
Helge Janicke (Edith Cowan University, Australia)
10:00
Yuichi Komano (Toshiba Corporation, Japan)
Mitsugu Iwamoto (University of Electro-Comminications, Japan)
Kazuo Ohta (The University of Electro-Communications, Japan)
Kazuo Sakiyama (The University of Electro-Communications, Japan)
Lightweight Authentication Using Noisy Key Derived from Physically Unclonable Function (abstract)
PRESENTER: Yuichi Komano
10:20
Debasmita Chakraborty (Indian Statistical Institute, Kolkata, India)
Santu Pal (Indian Statistical Institute, Kolkata, India)
Superpoly Recovery of Grain-128AEAD Using Division Property (abstract)
10:40
Ahmad Khoureich Ka (Université Alioune Diop de Bambey, Senegal)
Easy-ABE: an Easy Ciphertext-Policy Attribute-Based Encryption (abstract)
11:00
Amirreza Hamidi (James Cook University Australia, Australia)
Hossein Ghodosi (James Cook University Australia, Australia)
Efficient Distributed Keys Generation of Threshold Paillier Cryptosystem (abstract)
PRESENTER: Amirreza Hamidi
11:20
Masahisa Shimano (The University of Electro-Communications, Japan)
Kazuo Sakiyama (The University of Electro-Communications, Japan)
Daiki Miyahara (The University of Electro-Communications, Japan)
Towards Verifying Physical Assumption in Card-Based Cryptography (abstract)
PRESENTER: Masahisa Shimano
11:40
Giampaolo Bella (Università di Catania, Italy)
The Right Level of Human Interaction to Establish Cybersecurity - invited paper (abstract)
12:00-13:00Lunch Break (CET Time)
13:00-15:20 Session 5: Presentations, Chair: Mihai DOINEA (CET Time)
Chair:
Mihai Doinea (Bucharest University of Economic Studies, Romania)
13:00
Lukasz Lapczyk (Queen's University, Canada)
David Skillicorn (Queen's University, Canada)
Activity Detection from Encrypted Remote Desktop Protocol Traffic (abstract)
PRESENTER: Lukasz Lapczyk
13:20
Jana Medková (University of Hradec Králové, Czechia)
Josef Hynek (University of Hradec Králové, Czechia)
Application-Oriented Anonymization Framework for Social Network Datasets and IoT Environments (abstract)
PRESENTER: Jana Medková
13:40
Mugurel Barcau (certSIGN R&I and Institute of Mathematics ``Simion Stoilow" of the Romanian Academy, Romania)
Cristian Lupascu (certSIGN R&I and Ferdinand I Military Technical Academy, Romania)
Vicentiu Pasol (certSIGN R&I and Institute of Mathematics ``Simion Stoilow" of the Romanian Academy, Romania)
George Catalin Turcas (certSIGN R&I and Babes-Bolyai University, Romania)
Bridges Connecting Encryption Schemes (abstract)
14:00
Giovanni Di Crescenzo (Peraton Labs, United States)
Matluba Khodjaeva (CUNY John Jay College of Criminal Justice, United States)
Ta Chen (Peraton Labs, United States)
Rajesh Krishnan (Peraton Labs, United States)
David Shur (Peraton Labs, United States)
Delaram Kahrobaei (CUNY Graduate Center, United States)
Vladimir Shpilrain (City University of New York, United States)
On Single-Server Delegation of RSA (abstract)
14:20
Johann Groszschaedl (University of Luxembourg, Luxembourg)
Christian Franck (University of Luxembourg, Luxembourg)
Lightweight Permutation-Based Cryptography for the Ultra Low Power Internet of Things (abstract)
14:40
Sampath Rajapaksha (Robert Gordon University, UK)
Janaka Senanayake (Robert Gordon University, UK)
Harsha Kumara Kalutarage (Robert Gordon University, UK)
Mhd Omar Al Kadri (Birmingham City University, UK)
AI-Powered Vulnerability Detection for Secure Source Code Development (abstract)
15:00
George Teseleanu (IMAR, Romania)
The Security of Quasigroups Based Substitution Permutation Networks (abstract)
Friday, December 9th

View this program: with abstractssession overviewtalk overview

08:00-08:30 Session 6: SECITC2022: Invited Talk (CET Time)
Chair:
Mihai Doinea (Bucharest University of Economic Studies, Romania)
08:00
Erik Poll (Radboud University, Netherlands)
Secure input handling - insights from the past decade (abstract)
08:30-10:50 Session 7: Presentations, Chair: Marius POPA (CET Time)
Chair:
Marius Popa (Bucharest University of Economic Studies, Romania)
08:30
Yun Ju Huang (Technologie Innovation Institue, UAE)
Mohamed Rachidi (Technologie Innovation Institue, UAE)
Emanuele Bellini (Technologie Innovation Institue, UAE)
Statistical Tests for Symmetric Primitives an Application to NIST Lightweight Finalists (abstract)
PRESENTER: Yun Ju Huang
08:50
Murat Burhan Ilter (Middle East Technical University, Turkey)
Ali Aydın Selçuk (TOBB University of Economics and Technology, Turkey)
MILP-Aided Cryptanalysis of the FUTURE Block Cipher (abstract)
09:10
Yuichi Komano (Toshiba Corporation, Japan)
Takaaki Mizuki (Tohoku University, Japan)
Card-Based Zero-Knowledge Proof Protocol for Pancake Sorting (abstract)
PRESENTER: Yuichi Komano
09:30
Takuya Ishibashi (Tokai University, Japan)
Toshihiro Ohigashi (Tokai University, Japan)
Hikaru Tsuchida (NEC Corporation, Japan)
Unbounded Revocable Decentralized Multi-Authority Attribute-Based Encryption Supporting Non-Monotone Access Structures (abstract)
PRESENTER: Hikaru Tsuchida
09:50
Wei Xu (University of Science and Technology of China, China)
Yan Gao (Chinese Institute of Electronics, China)
Chunfang Yang (Zhengzhou Science and Technology Institute, China)
An Improved Purdue Enterprise Reference Architecture to Enhance Cybersecurity (abstract)
10:10
Subhranil Dutta (Indian Institute of Technology Kharagpur, India)
Ratna Dutta (Indian Institute of Technology Kharagpur, India)
Sourav Mukhopadhyay (Indian Institute of Technology Kharagpur, India)
Constructing Pairing Free Unbounded Inner Product Functional Encryption Schemes with Unbounded Inner Product Policy (abstract)
PRESENTER: Subhranil Dutta
10:30
Hiromasa Kitai (Osaka University, Japan)
Naoto Yanai (Osaka University, Japan)
Kazuki Iwahana (Osaka University, Japan)
Masataka Tatsumi (Osaka University, Japan)
Jason Paul Cruz (Osaka University, Japan)
MOTUS: How Quantized Parameters Improve Protection of Models and Their Inference Inputs (abstract)
PRESENTER: Masataka Tatsumi