IEICE Technical Report

Print edition: ISSN 0913-5685      Online edition: ISSN 2432-6380

Volume 107, Number 397

Information Security

Workshop Date : 2007-12-19 / Issue Date : 2007-12-12

[PREV] [NEXT]

[TOP] | [2006] | [2007] | [2008] | [2009] | [2010] | [2011] | [2012] | [Japanese] / [English]

[PROGRAM] [BULK PDF DOWNLOAD]


Table of contents

ISEC2007-112
Tests of Random Number and Autocorrelation Test for Cryptographic Applications
Yuichi Takeda (KAIT), Mituaki Huzii, Toshinari Kamakura, Norio Watanabe, Takakazu Sugiyama (Chuo Univ.)
pp. 1 - 3

ISEC2007-113
Verification of DPA against XOR in hardware implementation of AES
Yohei Tsuji, Keisuke Iwai, Takakazu Kurokawa (NDA)
pp. 5 - 10

ISEC2007-114
How to design tables for power-analyses resistance of Table-network-based FPGA implementations of AES
Makoto Torikoshi, Yoshio Takahashi, Tsutomu Matsumoto (Yokohama National Univ.)
pp. 11 - 18

ISEC2007-115
An Integration Method of Incomplete Cryptographic System and Spread Spectrum Encoder
Ta Minh Thanh, Munetoshi Iwakiri (NDA)
pp. 19 - 24

ISEC2007-116
An Applied Method of AES algorithm to Incomplete Cryptographic System.
Ta Minh Thanh, Munetoshi Iwakiri (NDA)
pp. 25 - 31

ISEC2007-117
A Study on Quantitative Evaluation Method of System Security
Daisakuk Horie (Konica Minolta TC)
pp. 33 - 40

ISEC2007-118
New Classes of Public Key Cryptosystem Constructed on the Basis of Multivariate Polynomials and Random Coding
Masao Kasahara (Osaka Gakuin Univ.)
pp. 41 - 48

ISEC2007-119
A Knapsack Cryptosystem Using Two Operations
Atsushi Igarashi, Kunikatsu Kobayashi (Yamagata Univ.)
pp. 49 - 53

ISEC2007-120
A Consideration on Hitting Set Problem and Incidence Matrix
Kunikatsu Kobayashi (Yamagata Univ.)
pp. 55 - 58

ISEC2007-121
Efficiency Analysis of Multi-Scalar Multiplications using Direct Computation Methods
Hisashi Yamada, Tsuyoshi Takagi (FUN), Kouichi Sakurai (Kyushu Univ.)
pp. 59 - 66

ISEC2007-122
Generalized EBRIP
Atsuko Miyaji (JAIST)
pp. 67 - 78

ISEC2007-123
An Implementation of a Privacy Enhancing SSL/TLS Protocol Based on Group Signatures
Hiroki Obayashi, Toru Nakanishi, Jun Kawashima, Nobuo Funabiki (Okayama Univ.)
pp. 79 - 84

ISEC2007-124
A Study of IBE to PKE Proxy Re-Encryption
Takeo Mizuno, Hiroshi Doi (IISEC)
pp. 85 - 92

ISEC2007-125
Attribute-Based Encryption with Partially Hidden Ciphertext Policies
Takashi Nishide (Univ. of Electro-Comm./Hitachi Software), Kazuki Yoneyama, Kazuo Ohta (Univ. of Electro-Comm.)
pp. 93 - 100

ISEC2007-126
A Lossless Image Authentication Scheme for Tamper-Proofing
Tomoya Tanaka, Koki Abe (UEC)
pp. 101 - 106

ISEC2007-127
Classification and feature extraction by using computer virus static analysis
Kazuki Iwamoto (JCSR), Katsumi Wasaki (Shinshu Univ.)
pp. 107 - 113

ISEC2007-128
Evaluation of a Detection System against Fuzzing Attacks on the SIP Protocol
Masaya Ozawa (Chuo Univ.), Eric Y. Chen, Mitsutaka Itoh (NTT PF Lab.), Mitsutoshi Hatori (Chuo Univ.)
pp. 115 - 121

Note: Each article is a technical report without peer review, and its polished version will be published elsewhere.


The Institute of Electronics, Information and Communication Engineers (IEICE), Japan