IEICE Technical Report

Print edition: ISSN 0913-5685

Volume 106, Number 175

Information Security

Workshop Date : 2006-07-20 / Issue Date : 2006-07-13

[PREV] [NEXT]

[TOP] | [2006] | [2007] | [2008] | [2009] | [2010] | [2011] | [2012] | [Japanese] / [English]

[PROGRAM] [BULK PDF DOWNLOAD]


Table of contents

ISEC2006-9
A Translation Matrix between Two Isomorphic Extension Fields via Optimal Normal Basis Representation
Ryo Nanba, Yasuyuki Nogami, Yoshitaka Morikawa (Okayama Univ.)
pp. 1 - 6

ISEC2006-10
Square Root Calculation Algorithm over Type-II All One Polynomial Field
Hidehiro Kato (Okayama Univ.), Wang Feng, Yasuyuki Nogami, Yoshitaka Morikawa (Okayama Univ.)
pp. 7 - 12

ISEC2006-11
Pairing Computation with MNT Curve over All One Polynomial Field
Masataka Akane, Takumi Okimoto, Yasuyuki Nogami, Yoshitaka Morikawa (Okayama Univ.)
pp. 13 - 18

ISEC2006-12
Efficient Calculation for Tate Pairing
Masaaki Shirase, Tsuyoshi Takagi (FUN), Eiji Okamoto (Univ of Tsukuba)
pp. 19 - 26

ISEC2006-13
A Survey on Dedicated Factoring Hardware (Relation Finding Step)
Tetsuya Izu (FUJITSU), Noboru Kunihiro (UEC), Takeshi Shimoyama (FUJITSU)
pp. 27 - 34

ISEC2006-14
A Proposal to Hi-Tech Pollution Based on the Criterion of "Relationism-First" -- A Principle Experiment of EM Environment around VDT and Its Basics Theory --
Yoshifumi Fujita (Onomichi Univ.), Mitsuo Ohta (Emeritus Prof. of Hiroshima Univ.)
pp. 35 - 41

ISEC2006-15
A copyright and proprietary rights protection system with an Information Filter and an Information Capsule
Kota Yamada, Hirotsugu Kinoshita (KU), Tetsuya Morizumi (TNSi)
pp. 43 - 50

ISEC2006-16
Balance between Security and Privacy
Yasutoshi Ishizaki (Chuo Univ.)
pp. 51 - 58

ISEC2006-17
A Study on Dynamic Risk Analysis Corresponding to Environmental Changes
Hideaki Kawanishi, Koichi Kato, Tatsuaki Takahashi, Ramirez Caceres Guillermo Horacio, Yoshimi Teshigawara (Soka Univ.)
pp. 59 - 66

ISEC2006-18
Survey and Analysis on Data Delete in PC for Internet Auction
Satsuki Sato, Yuki Ashino (TDU), Tetsutaro Uehara (KU), Ryoichi Sasaki (TDU)
pp. 67 - 73

ISEC2006-19
Development of Internet Watchdog Systems for Children Protection
Tatsumi Ueda, Yoshiaki Takai (Hokkaido Univ.)
pp. 75 - 80

ISEC2006-20
Secure Exponentiation with High Flexibility
Camille Vuillaume, Katsuyuki Okeya (Hitachi)
pp. 81 - 86

ISEC2006-21
Double-Size Montgomery Multiplication of a Crypto-Coprocessor
Masayuki Yoshino, Katsuyuki Okeya, Camille Vuillaume (Hitachi)
pp. 87 - 94

ISEC2006-22
An Improved Mehtod for the Table Lookup Multiplication Algorithm over GF(2^m)
Yoichi Hadama, Daisuke Nakamura (Kobe Univ.), Masanori Hirotomo (Hyogo Inst. of Info. Education Foundation), Masakatu Morii (Kobe Univ.)
pp. 95 - 102

ISEC2006-23
Fast Generation of Safe Primes using Deterministic Primality Tests based on Maurer Method
Hidehiro Kumakyu, Akito Niwa (Toshiba Solusions Corp.)
pp. 103 - 110

ISEC2006-24
A method for generating elliptic curves suitable for implementing an efficient group signature scheme
Norikazu Kubotera, Jun Furukawa, Kazue Sako (NEC)
pp. 111 - 117

ISEC2006-25
Batch Processing of Interactive Proofs
Tsuyoshi Yamamoto, Koji Chida (NTT)
pp. 119 - 124

ISEC2006-26
Efficient Implementation of Secure Circuit Evaluation Using Batch Processing
Koji Chida, Tsuyoshi Yamamoto (NTT)
pp. 125 - 132

ISEC2006-27
Inspection of sufficient conditions of MD5
Yuto Nakano, Hidenori Kuwakado, Masakatu Morii (Kobe Univ.)
pp. 133 - 139

ISEC2006-28
Possibility of the Key Recovery Attack against Py
Takanori Isobe, Toshihiro Ohigashi, Hidenori Kuwakado, Masakatu Morii (Kobe Univ.)
pp. 141 - 148

ISEC2006-29
Tight theoretical estimation of the security of RC6 against chi-square attack
Takatomi Wada, Atsuko Miyaji (JAIST), Tomohiko Hinoue (OMRON)
pp. 149 - 154

ISEC2006-30
On the security of Piece In Hand Concept based on Sequential Solution Method
Daisuke Ito, Yoshitomo Fukushima, Toshinobu Kaneko (TUS)
pp. 155 - 159

ISEC2006-31
A Secure Packet Digesting Algorithm in the Interconnected IP Traceback Systems
Seiji Nakano, Hidenori Kuwakado, Masakatu Morii (Kobe Univ.)
pp. 161 - 165

ISEC2006-32
IDS for SSL Enncrypted Web Traffic
Akira Yamada, Yutaka Miyake, Keisuke Takemori (KDDI Labs.)
pp. 167 - 173

ISEC2006-33
DHT-based Dynamic VPN Instantiation Mechanism for Secure Home Network Access
Ayumu Kubota, Akira Yamada, Yutaka Miyake (KDDI R&D Labs.)
pp. 175 - 182

ISEC2006-34
Performance Improvement of Anomaly Detection System by Simplifying Call Stack Inspection
Katsuhiro Suzuki (Univ. of Tsukuba), Hirotake Abe (JST), Kazuhiko Kato (Univ. of Tsukuba), Akira Kinno, Yuka Ikebe, Takehiro Nakayama, Atsushi Takeshita (NTT DoCoMo)
pp. 183 - 190

ISEC2006-35
A Proposal of Response Delay Method for Spam Mail from BOTNET
Tomonari Sekiyama, Yoshinori Kobayashi (TDU), Masakazu Takahashi (ISS), Ryoichi Sasaki (TDU)
pp. 191 - 197

ISEC2006-36
A Configuration Parameter Correction for Security Configuration Analyzing System
Sumitaka Okajo, Katsushi Matsuda (NEC)
pp. 199 - 206

ISEC2006-37
On Enforcement of Noninterference
Naoyuki Nagatou, Takuo Watanabe (Tokyo Tech)
pp. 207 - 214

ISEC2006-38
Preventing Buffer Overflow Attacks bypassing NXbit Protection
Takahiro Shinagawa (TUAT)
pp. 215 - 222

ISEC2006-39
Security Enhancement of HTTP-FUSE Knoppix Client by Trusted Computing
Megumi Nakamura, Seiji Munetoh (IBM Japan), Kuniyasu Suzaki, Kengo Iijima, Toshiki Yagi, Ichiro Osawa (AIST)
pp. 223 - 230

Note: Each article is a technical report without peer review, and its polished version will be published elsewhere.


The Institute of Electronics, Information and Communication Engineers (IEICE), Japan