Debito's Latest Book
5 stars based on
66 reviews
At a later date we may have user subscriptions for our collaborators from MIMOS, UM, UPM and Cybersecurity as well as other organizations, and be able to do discussions on our active research topics in the private area of this site.
That being said, welcome once again! We were glad to be able to host Raymond Choo for a couple of days for collaborative discussions.
Workshop organised by Institute of Math for Industry http: I respect the discipline of Japanese in working, they are serious and details even in cleaning up the venue after workshop. Tidying the wires, and due to the passion of research, we were still our cyber security research inspired from bitcoin prof dr kouichi sakurai kyushu university ideas from previous talks. Later, some participants tried to form a Hamiltonian map in a Japanese restaurant nearby, to experiment the application of Multilinear Pairings.
If it is optimised with Efficient Pairing Instantiations using Fixed Coefficients, maybe the performance is comparable to that without Pairing. Since Identity-Based Identification is closely related to Attribute-Based Singature, the technique should work on the former also. The discussion was lengthy but fruitful.
It was continued the next day before returning to Malaysia. Went to the ISIT office in the afternoon and started to familiarise themselves with the temporary office. First day ended with a serious crypto discussion with Anada at Izakaya. Third day, Chin and Tan gave talks in Kyushu University.
For days not mentioned here, they are busy dealing with marker pens, white board, duster, symbols and so on in the temporary office. Our cyber security research inspired from bitcoin prof dr kouichi sakurai kyushu university it was just outside the seminar room. The random oracle RO being formally analyzed by Tan. This was subsequently shown to be provably edible in the standard consumption model.
The proof sketch goes as follows: Given an adversary denoted by Y against the random oracle consumption game, we can then instruct an adversary C to solve the underlying digestion problem with overwhelming probability.
Sjouke is known for his contributions to formalizing the notion of attack subsequently also attack-defense trees, a concept popularized by security guru Bruce Schneier. And as per crypto tradition, serious proofing discussions over lunch…. The venue was just opposite the Fukuoka Tower. Dinner at night was prepared by the organisers at the Hilton Hotel Fukuoka. Tan chaired the morning sessions. Rearrange tables and chairs. Met a Malaysian postgraduate, Vinesha in the Sakurai Lab http: Research has no meaning without coffee.
By implication, a coffee machine is vital. And the discussion carries on all through lunch. Cryptographic research, where food is central. After the Keynote by Kouichi.
Tan and Rouzbeh in action. CryptoSec members in the photos: