Print edition: ISSN 0913-5685
[TOP] | [2006] | [2007] | [2008] | [2009] | [2010] | [2011] | [2012] | [Japanese] / [English]
ISEC2006-72
Watermarking method with strong robustness considering error correcting code length
cong li, Kazuo Ohzeki (S I T)
pp. 1 - 7
ISEC2006-73
A Method of Shortening Tardos's Fingerprinting Code Length by Optimizing Parameters
Taichi Isogai, Hirofumi Muratani, Kenichiro Furuta (Toshiba)
pp. 9 - 14
ISEC2006-74
The Real-Time Steganography Based on Audio-to-Audio Data Bit Steam
Xuping Huang, Ryota Kawashima, Norihisa Segawa, Yoshihiko Abe (Iwate Pref Univ.)
pp. 15 - 22
ISEC2006-75
Analysis of initial data in a pseudorandom number generator utilizing a one dimensional mapping
Makoto Homma, Chigak Itoi, Fumiko Okiharu, Ryusuke Watase, Yoshinori Sakamoto (Nihon Univ.)
pp. 23 - 27
ISEC2006-76
Symmetric 128bit Block Cipher(HyRAL) Beased on AES Request
Kouzou Hirata (LIS Inc.)
pp. 29 - 36
ISEC2006-77
Verification of MRSL based S-BOX in AES as a countermeasure against DPA.
Minoru Sasaki, Keisuke Iwai, Takakazu Kurokawa (NDA.)
pp. 37 - 44
ISEC2006-78
Collision Resistance of Double-Block-Length Hash Function against Free-Start Attack
Shoichi Hirose (Fukui Univ.)
pp. 45 - 52
ISEC2006-79
Side Channel Attacks against HMACs with Design for Hash Functions
Katsuyuki Okeya (Hitachi)
pp. 53 - 60
ISEC2006-80
Black-Box Traitor Revocable Broadcast Encryption with Short Private Keys
Jun Furukawa (NEC), Nuttapong Attrapadung (Tokyo Univ.), Satoshi Obana (NEC)
pp. 61 - 68
ISEC2006-81
Re-Encryption Schemes with Applications to Data Storage
-- Investigation of achieving preventative from collusion operating over the torsion subgroup in an elliptic curve --
Hirokazu Ougi (Mebius)
pp. 69 - 76
ISEC2006-82
A Method of Software Dynamic Birthmarks using History of API Function Calls
Osamu Moriyama, Takahiro Furue, Tsuyoshi Toyama, Tsutomu Matsumoto (Yokohama National University)
pp. 77 - 84
ISEC2006-83
Constructions of K_{HLN}・SE(g)PKC on the basis of K-Construction with hidden location noise(HLN)
Masao Kasahara (Osaka Gakuin Univ.)
pp. 85 - 90
ISEC2006-84
A Conditional Knapsack Cryptosystem Using High Density Sequences
Kunikatsu Kobayashi (Yamagata Univ.)
pp. 91 - 95
ISEC2006-85
Key Predistribution Schemes for Sensor Networks Using Lines and Points over a Finite Geometry
Ritsuko Matsumoto, Hisashi Mouri, Yuichi Kaji (NAIST)
pp. 97 - 104
ISEC2006-86
A study on error correction in secret key agreement scheme using ESPAR antenna
Kenya Horai, Hisato Iwai, Hideichi Sasaoka (Doshisha Univ.), Takashi Ohira (ATR)
pp. 105 - 110
ISEC2006-87
Unconditional Security of Key Establishment System Using a Variable Directional Antenna
Kirill Morozov, Kazukuni Kobara (AIST), Hideki Imai (Chuo Univ.)
pp. 111 - 118
Note: Each article is a technical report without peer review, and its polished version will be published elsewhere.