IEICE Technical Report

Print edition: ISSN 0913-5685      Online edition: ISSN 2432-6380

Volume 108, Number 355

Information Security

Workshop Date : 2008-12-17 / Issue Date : 2008-12-10

[PREV] [NEXT]

[TOP] | [2006] | [2007] | [2008] | [2009] | [2010] | [2011] | [2012] | [Japanese] / [English]

[PROGRAM] [BULK PDF DOWNLOAD]


Table of contents

ISEC2008-89
Measure of failure for the company infrastructure
Koichiro Ozasa, Satoshi Ono (Kogakuin Univ.)
pp. 1 - 5

ISEC2008-90
Web Server Software Struture for Scalability
Haruki Mori, Satoshi Ono (Kogakuin Univ.)
pp. 7 - 9

ISEC2008-91
Access management method for Least Privilege implementation By the identity federation cross-organizations
Takahito Motojima, Satoshi Ono (kogakuin univ)
pp. 11 - 14

ISEC2008-92
Negotiate the Trust built in The Internet
Takashi Hosokawa, Satoshi Ono (Kogakuin Univ.)
pp. 15 - 18

ISEC2008-93
Self-construction of Home Domain by Using Entry Device List
Sho Ikeyama, Yoshihiro Hori, Yoshiaki Shiraishi, Akira Iwata (NIT)
pp. 19 - 26

ISEC2008-94
A Masquerade Detecting Method Based On the TF-IDF Model
Geng Dai, Zhou Jian, Haruhiko Shirai, Jousuke Kuroiwa, Tomohiro Odaka, Hisakazu Ogura (Fukui Univ)
pp. 27 - 32

ISEC2008-95
On Security and Constructibility of Linear Quotient Codes for Quantum Cryptography
Mitsuru Hamada (Tamagawa Univ.)
pp. 33 - 40

ISEC2008-96
A Knapsack Cryptosystem Resisting Wellknown Attacks
Kunikatsu Kobayashi (Yamagata Univ,)
pp. 41 - 44

ISEC2008-97
Cryptosystems on Algebraic Tori -- Some Efficient Algorithms for Squaring --
Tomoko Yonemura, Kenichiro Furuta, Yoshikazu Hanatani, Taichi Isogai, Yuichi Komano, Hirofumi Muratani, Hanae Nozaki, Kenji Ohkuma, Atsushi Shimbo (Toshiba Corp.)
pp. 45 - 52

ISEC2008-98
Fast Exponentiation Methods for Cryptosystems on Algebraic Tori
Taichi Isogai, Kenji Ohkuma, Yuichi Komano, Atsushi Shimbo, Hanae Nozaki, Yoshikazu Hanatani, Kenichiro Furuta, Hirofumi Muratani, Tomoko Yonemura (Toshiba)
pp. 53 - 60

ISEC2008-99
Construction of the experiment environment for the CPA attack
Daisaku Minamizaki, Keisuke Iwai, Takakazu Kurokawa (NDA)
pp. 61 - 66

ISEC2008-100
Power Analysis against a FPGA Implementation of the AES with SubBytes in a memory table
Hiroyuki Kawakita, Yusei Nishimoto, Kiyohiko Ishikawa, Hiroyuki Imaizumi (NHK)
pp. 67 - 72

Note: Each article is a technical report without peer review, and its polished version will be published elsewhere.


The Institute of Electronics, Information and Communication Engineers (IEICE), Japan