IEICE Technical Report

Print edition: ISSN 0913-5685      Online edition: ISSN 2432-6380

Volume 107, Number 141

Information Security

Workshop Date : 2007-07-20 / Issue Date : 2007-07-13

[PREV] [NEXT]

[TOP] | [2006] | [2007] | [2008] | [2009] | [2010] | [2011] | [2012] | [Japanese] / [English]

[PROGRAM] [BULK PDF DOWNLOAD]


Table of contents

ISEC2007-45
A Simple Countermeasure to DPA aginst FPGA Implementation of Cryptographic Device
Janghoon Song, Koki Abe (UEC)
pp. 1 - 8

ISEC2007-46
Analysis on the Key-Scheduling Algorithm of MICKEY
Yoshiaki Fujikawa, Toshihiro Ohigashi, Hidenori Kuwakado, Masakatu Morii (Kobe Univ.)
pp. 9 - 16

ISEC2007-47
A Study on the Tews-Weinmann-Pyshkin Attack against WEP
Yuko Ozasa, Yoshiaki Fujikawa, Toshihiro Ohigashi, Hidenori Kuwakado, Masakatu Morii (Kobe Univ.)
pp. 17 - 21

ISEC2007-48
On Construction of Block Cipher with Variable Security Parameter
Yasumasa Hirai, Shin'ichiro Matsuo (NTT DATA), Wakaha Ogata (Tokyo Inst. of Tech.)
pp. 23 - 28

ISEC2007-49
Hardware Implementations of the 128-bit Blockcipher CLEFIA
Taizo Shirai, Kyoji Shibutani, Toru Akishita, Shiho Moriai (Sony), Tetsu Iwata (Nagoya Univ.)
pp. 29 - 36

ISEC2007-50
Proposal for the quantitative method of searching characteristics of node
Hirofumi Nakakoji, Masato Terada, Seiichi Susaki (Hitachi)
pp. 37 - 42

ISEC2007-51
Orthogonal expansion of port-scan packets
Tomohiro Kobori, Hiroaki Kikuchi (Tokai Univ.), Masato Terada (Hitachi)
pp. 43 - 49

ISEC2007-52
Consideration from the viewpoint of social layer about the distribution of malicious hosts on the internet
Tetsuro Kito, Hirofumi Nakakoji, Masato Terada (Hitachi, Ltd.), Hiroaki Kikuchi (Univ. of Tokai)
pp. 51 - 56

ISEC2007-53
Exploring the required condtions for malware to run for behavior analysis
Yuji Hoshizawa, Kouichirou Okada, Motoaki Yamamura (SecureBrain Corp.), Takayoshi Shiigi (JPCERT)
pp. 57 - 61

ISEC2007-54
Automatic malware classification
Yuji Hoshizawa, Tsuyoshi Tachikawa, Motoaki Yamamura (SecureBrain Corp.)
pp. 63 - 70

ISEC2007-55
A Factoring Algorithm Searching Squares
Kunikatsu Kobayashi (Yamagata Univ.)
pp. 71 - 73

ISEC2007-56
A Construction Method of Nonlinear Piece In Hand Matrix for Universally Enhancing the Security of Various Multivariate Public Key Cryptosystems
Shigeo Tsujii (iisec), Kohtaro Tadaki (Chuo Univ.), Ryou Fujita (iisec)
pp. 75 - 80

ISEC2007-57
Affine Precomputation with Sole Inversion in Elliptic Curve Cryptography
Erik Dahmen (TUDarmstadt), Katsuyuki Okeya (Hitachi), Daniel Schepers (TUDarmstadt)
pp. 81 - 88

ISEC2007-58
A Generalized Merkle Signature Scheme
Erik Dahmen (TU Darmstadt), Camille Vuillaume, Katsuyuki Okeya (Hitachi), Elena Klintsevich, Johannes Buchmann (TU Darmstadt)
pp. 89 - 96

ISEC2007-59
*
Kunio Miyamoto, Hidehiko Tanaka (IISEC)
pp. 97 - 102

ISEC2007-60
A Design and Evaluation of Filtering Method of Image Spam in Bayesian Filter
Masahiro Uemura, Toshihiro Tabata (Okayama Univ.)
pp. 103 - 110

ISEC2007-61
A Study for Characteristics Transition of SPAM
Yosuke Aragane, Kazutoshi Sano, Osamu Shionoiri, Atsushi Kanai (NTT)
pp. 111 - 116

ISEC2007-62
A Study of Spam Mail Combined with Social Engineering
Kensuke Shibata, Itaru Kamiya, Kazutoshi Sano, Yosuke Aragane, Osamu Shionoiri, Atsushi Kanai (NTT)
pp. 117 - 122

ISEC2007-63
A study of outward features of Spam mails
Itaru Kamiya, Kensuke Shibata, Kazutoshi Sano, Yosuke Aragane, Osamu Shionoiri, Atsushi Kanai (NTT)
pp. 123 - 127

ISEC2007-64
Partial Integrity Assurance Technology PIAT: An Application to Sender Domain Authentication
Yoshiki Higashikado, Tetsuya Izu, Masahiko Takenaka, Takashi Yoshioka (FUJITSU Lab.)
pp. 129 - 132

ISEC2007-65
Efficient Strong Key-Insulated Signature Scheme for Bidirectional Broadcasting Service
Go Ohtake (NHK), Goichiro Hanaoka (AIST), Kazuto Ogawa (NHK)
pp. 133 - 139

ISEC2007-66
Efficient Group Signature Scheme based on the DDH Problem
Takuya Yoshida, Koji Okada (Toshiba Solutions)
pp. 141 - 146

ISEC2007-67
An Extension of Sanitizable and Deletable Signature
Masami Izumi (UEC), Tetsuya Izu (FUJITSU Lab.), Noboru Kunihiro, Kazuo Ohta (UEC)
pp. 147 - 154

ISEC2007-68
(TBA)
Masahiko Takenaka, Takeshi Shimoyama, Tetsuya Izu (Fujitsu Labs.)
pp. 155 - 160

ISEC2007-69
A Consideration for Detecting Virus Email by Using Mail Form Information
Daisuke Miyamoto, Takuji Iimura, Youki Kadobayashi (NAIST)
pp. 161 - 168

ISEC2007-70
An extension of secure OS on virtual machine monitor using split device driver
Ruo Ando, Youki Kadobayashi (NICT)
pp. 169 - 172

ISEC2007-71
Preliminary studies of secure OS as application platform
Hidenori Tsuji (IISEC/Institute of Information Tech.), Masaki Hashimoto, Mira Kim, Hidehiko Tanaka (IISEC)
pp. 173 - 178

ISEC2007-72
Phishing detection based on features of mimic content.
Shinta Nakayama, Hiroshi Yoshiura (UEC)
pp. 179 - 184

ISEC2007-73
Capability-Based System for Distributed Environment
Masaki Hashimoto, Kazuki Fujisawa, Kunio Miyamoto, Mira Kim, Hidenori Tsuji, Hidehiko Tanaka (IISEC)
pp. 185 - 192

Note: Each article is a technical report without peer review, and its polished version will be published elsewhere.


The Institute of Electronics, Information and Communication Engineers (IEICE), Japan