IEICE Technical Report

Print edition: ISSN 0913-5685

Volume 106, Number 235

Information Security

Workshop Date : 2006-09-13 / Issue Date : 2006-09-06

[PREV] [NEXT]

[TOP] | [2006] | [2007] | [2008] | [2009] | [2010] | [2011] | [2012] | [Japanese] / [English]

[PROGRAM] [BULK PDF DOWNLOAD]


Table of contents

ISEC2006-72
Watermarking method with strong robustness considering error correcting code length
cong li, Kazuo Ohzeki (S I T)
pp. 1 - 7

ISEC2006-73
A Method of Shortening Tardos's Fingerprinting Code Length by Optimizing Parameters
Taichi Isogai, Hirofumi Muratani, Kenichiro Furuta (Toshiba)
pp. 9 - 14

ISEC2006-74
The Real-Time Steganography Based on Audio-to-Audio Data Bit Steam
Xuping Huang, Ryota Kawashima, Norihisa Segawa, Yoshihiko Abe (Iwate Pref Univ.)
pp. 15 - 22

ISEC2006-75
Analysis of initial data in a pseudorandom number generator utilizing a one dimensional mapping
Makoto Homma, Chigak Itoi, Fumiko Okiharu, Ryusuke Watase, Yoshinori Sakamoto (Nihon Univ.)
pp. 23 - 27

ISEC2006-76
Symmetric 128bit Block Cipher(HyRAL) Beased on AES Request
Kouzou Hirata (LIS Inc.)
pp. 29 - 36

ISEC2006-77
Verification of MRSL based S-BOX in AES as a countermeasure against DPA.
Minoru Sasaki, Keisuke Iwai, Takakazu Kurokawa (NDA.)
pp. 37 - 44

ISEC2006-78
Collision Resistance of Double-Block-Length Hash Function against Free-Start Attack
Shoichi Hirose (Fukui Univ.)
pp. 45 - 52

ISEC2006-79
Side Channel Attacks against HMACs with Design for Hash Functions
Katsuyuki Okeya (Hitachi)
pp. 53 - 60

ISEC2006-80
Black-Box Traitor Revocable Broadcast Encryption with Short Private Keys
Jun Furukawa (NEC), Nuttapong Attrapadung (Tokyo Univ.), Satoshi Obana (NEC)
pp. 61 - 68

ISEC2006-81
Re-Encryption Schemes with Applications to Data Storage -- Investigation of achieving preventative from collusion operating over the torsion subgroup in an elliptic curve --
Hirokazu Ougi (Mebius)
pp. 69 - 76

ISEC2006-82
A Method of Software Dynamic Birthmarks using History of API Function Calls
Osamu Moriyama, Takahiro Furue, Tsuyoshi Toyama, Tsutomu Matsumoto (Yokohama National University)
pp. 77 - 84

ISEC2006-83
Constructions of K_{HLN}・SE(g)PKC on the basis of K-Construction with hidden location noise(HLN)
Masao Kasahara (Osaka Gakuin Univ.)
pp. 85 - 90

ISEC2006-84
A Conditional Knapsack Cryptosystem Using High Density Sequences
Kunikatsu Kobayashi (Yamagata Univ.)
pp. 91 - 95

ISEC2006-85
Key Predistribution Schemes for Sensor Networks Using Lines and Points over a Finite Geometry
Ritsuko Matsumoto, Hisashi Mouri, Yuichi Kaji (NAIST)
pp. 97 - 104

ISEC2006-86
A study on error correction in secret key agreement scheme using ESPAR antenna
Kenya Horai, Hisato Iwai, Hideichi Sasaoka (Doshisha Univ.), Takashi Ohira (ATR)
pp. 105 - 110

ISEC2006-87
Unconditional Security of Key Establishment System Using a Variable Directional Antenna
Kirill Morozov, Kazukuni Kobara (AIST), Hideki Imai (Chuo Univ.)
pp. 111 - 118

Note: Each article is a technical report without peer review, and its polished version will be published elsewhere.


The Institute of Electronics, Information and Communication Engineers (IEICE), Japan