IEICE Technical Report

Print edition: ISSN 0913-5685      Online edition: ISSN 2432-6380

Volume 107, Number 44

Information Security

Workshop Date : 2007-05-18 / Issue Date : 2007-05-11

[PREV] [NEXT]

[TOP] | [2006] | [2007] | [2008] | [2009] | [2010] | [2011] | [2012] | [Japanese] / [English]

[PROGRAM] [BULK PDF DOWNLOAD]


Table of contents

ISEC2007-1
The 128-bit Blockcipher CLEFIA
Taizo Shirai, Kyoji Shibutani, Toru Akishita, Shiho Moriai (Sony), Tetsu Iwata (Nagoya Univ.)
pp. 1 - 9

ISEC2007-2
Some experiments on the mini-model of the pseudorandom number generator MUGI
Dai Watanabe (Hitachi), Toshinobu Kaneko (Tokyo University of Science)
pp. 11 - 16

ISEC2007-3
Correction of "Test for the Longest Run of Ones in a Block" Included in NIST Randomness Test Suite
Kenji Hamano (The Univ. of Tokyo)
pp. 17 - 21

ISEC2007-4
A Fast (4,n)-Threshold Secret Sharing Scheme Using Exclusive-OR Operations, and Its Extension to (k,n)-Threshold Schemes
Jun Kurihara, Shinsaku Kiyomoto, Kazuhide Fukushima, Toshiaki Tanaka (KDDI R&D Labs.)
pp. 23 - 30

ISEC2007-5
(k,n) Threshold Secret Sharing Schemes Using XOR Operations
Yoshihiro Fujii (TOSHIBA SOLUTIONS), Kouya Tochikubo (Nihon Univ.), Norikazu Hosaka, Minako Tada, Takehisa Kato (TOSHIBA SOLUTIONS)
pp. 31 - 38

ISEC2007-6
Birthday Paradox for Multi-Collisions
Kazuhiro Suzuki (Ibaraki Univ.), Dongvu Tonien (Uni.y of Wollongong), Kaoru Kurosawa, Koji Toyota (Ibaraki Univ.)
pp. 39 - 44

ISEC2007-7
Security of delegating decryption key in ID-based Encryption Scheme
Hirokazu Ougi
pp. 45 - 52

ISEC2007-8
Efficient ID-Based Signature without Random Oracle
Jiageng Chen, Atsuko Miyaji (JAIST)
pp. 53 - 56

ISEC2007-9
Consideration on security of digital signatures from the view of Paillier's framework
Yutaka Kawai, Kazuo Ohta, Noboru Kunihiro (UEC)
pp. 57 - 64

ISEC2007-10
consideration of quantum Oblivious Transfer
Atsushi Waseda (NICT), Takayuki Takagi, Masakazu Soshi, Atsuko Miyaji (JAIST)
pp. 65 - 68

ISEC2007-11
A multiplication formula on degenerate divisors of genus 4 hyperelliptic curves
Naoki Kanayama, Takehiro Yamaguchi, Takeshi Okamoto, Eiji Okamoto (Tsukuba Univ.)
pp. 69 - 76

ISEC2007-12
Visual Cryptography Schemes with Cyclic Structure for Many Images
Miyuki Uno, Mikio Kano (Ibaraki Univ.)
pp. 77 - 84

ISEC2007-13
A Study on Spam-mail Filtering Based on Cooperation of Users and Providers
Takashi Koike (Yahoo), Naoshi Sato (IISEC)
pp. 85 - 92

ISEC2007-14
On Onewayness of Key-Scheduling Algorithms for eSTREAM's Ciphers
Yoshiaki Fujikawa, Toshihiro Ohigashi, Hidenori Kuwakado, Masakatu Morii (Kobe Univ.)
pp. 93 - 99

ISEC2007-15
On Equivalent Keys of Stream Ciphers
Ryoichi Teramura, Takanori Isobe, Toshihiro Ohigashi, Hidenori Kuwakado, Masakatu Morii (Kobe Univ.)
pp. 101 - 108

Note: Each article is a technical report without peer review, and its polished version will be published elsewhere.


The Institute of Electronics, Information and Communication Engineers (IEICE), Japan