IEICE Technical Report

Print edition: ISSN 0913-5685      Online edition: ISSN 2432-6380

Volume 107, Number 209

Information Security

Workshop Date : 2007-09-07 / Issue Date : 2007-08-31

[PREV] [NEXT]

[TOP] | [2006] | [2007] | [2008] | [2009] | [2010] | [2011] | [2012] | [Japanese] / [English]

[PROGRAM] [BULK PDF DOWNLOAD]


Table of contents

ISEC2007-74
An Extension of Fast Threshold Schemes Using XOR Operations (1)
Jun Kurihara, Shinsaku Kiyomoto, Kazuhide Fukushima, Toshiaki Tanaka (KDDI R&D Labs.)
pp. 1 - 8

ISEC2007-75
An Extension of Fast Threshold Schemes Using XOR Operations (2)
Jun Kurihara, Shinsaku Kiyomoto, Kazuhide Fukushima, Toshiaki Tanaka (KDDI R&D Labs.)
pp. 9 - 15

ISEC2007-76
A Study on Hierarchical Secret Sharing Schemes Using Product and Concatenated Codes
Chigusa Kawashima (Polytechnic Univ.), Takahiro Yoshida (Waseda Univ.), Tomoko K. Matsushima (Polytechnic Univ.)
pp. 17 - 23

ISEC2007-77
visual cryptography schemes with tree access structure for many images
Miyuki Uno, Mikio Kano (Ibaraki Univ.)
pp. 25 - 31

ISEC2007-78
A construction of light weight Panama-like keystream generator
Dai Watanabe (Hitachi), Toshinobu Kaneko (TUS)
pp. 33 - 40

ISEC2007-79
How To Find Many Collisions of 3-Pass HAVAL
Kazuhiro Suzuki, Kaoru Kurosawa (Ibaraki Univ.)
pp. 41 - 48

ISEC2007-80
Sender Authenticated Key Agreements Without Random Oracles
Chifumi Sato (C4 Technology), Takeshi Okamoto, Eiji Okamoto (Univ. of Tsukuba)
pp. 49 - 55

ISEC2007-81
A New Class of Public Key Cryptosystem Constructed on the Basis of Multivariate Polynomials Rndomly Gererated
Masao Kasahara (Osaka Gakuin Univ.)
pp. 57 - 63

ISEC2007-82
A Consideration on 3-SAT Problem
Kunikatsu Kobayashi (Yamagata Univ.)
pp. 65 - 67

ISEC2007-83
An Implementation of a Pairing-Based Group Signature Scheme with Verifier-Local Revocation
Yuta Hira, Hidehiro Kato, Toru Nakanishi, Yasuyuki Nogami, Nobuo Funabiki, Yoshitaka Morikawa (Okayama Univ.)
pp. 69 - 76

ISEC2007-84
CAIRN3: An FPGA Implementation of the Sieving Step with the Lattice Sieving
Takeshi Shimoyama, Tetsuya Izu, Jun Kogure (FUJITSU)
pp. 77 - 83

ISEC2007-85
Tardos's Fingerprinting Codes Shortened by Optimizing Code Generation Probabilities and Improving Tracing Algorithm
Taichi Isogai, Hirofumi Muratani (Toshiba)
pp. 85 - 90

ISEC2007-86
On the Implementation of Asymmetric Fingerprinting Protocol
Shinya Yamane, Minoru Kuribayashi, Masakatu Morii (Kobe Univ.)
pp. 91 - 98

ISEC2007-87
An Approach to Duality in Public Key Cryptosystems
Kazuo Ohta (UEC), Yuichi Komano (Toshiba), Yutaka Kawai (UEC), Shinichi Kawamura (Toshiba)
pp. 99 - 106

ISEC2007-88
A Study on Extended Multi-Recipient Encryption -- Security Notion and Constructions --
Yasuo Hatano (Hitachi/Tokyo Univ. of Science), Kunihiko Miyazaki (Hitachi), Toshinobu Kaneko (TUS)
pp. 107 - 114

Note: Each article is a technical report without peer review, and its polished version will be published elsewhere.


The Institute of Electronics, Information and Communication Engineers (IEICE), Japan