IEICE Technical Report

Print edition: ISSN 0913-5685      Online edition: ISSN 2432-6380

Volume 108, Number 38

Information Security

Workshop Date : 2008-05-16 / Issue Date : 2008-05-09

[PREV] [NEXT]

[TOP] | [2006] | [2007] | [2008] | [2009] | [2010] | [2011] | [2012] | [Japanese] / [English]

[PROGRAM] [BULK PDF DOWNLOAD]


Table of contents

ISEC2008-1
Verification of a side-channel attack to an AES circuit on SASEBO
Daisaku Minamizaki, Keisuke Iwai, Takakazu Kurokawa (NDA)
pp. 1 - 8

ISEC2008-2
An implementation of an automatic analyzer for side channel attacks
Keisuke Iwai, Daisaku Minamizaki, Takakazu Kurokawa (NDA)
pp. 9 - 14

ISEC2008-3
New Impossible Differentials of CLEFIA
Etsuko Tsujihara (YDK), Maki Shigeri (NEC Software Hokuriku), Tomoyasu Suzaki (NEC), Takeshi Kawabata (NEC Software Hokuriku), Yukiyasu Tsunoo (NEC)
pp. 15 - 22

ISEC2008-4
A New Randomness Test Based on All the Autocorrelation Values
Kenji Hamano, Hirosuke Yamamoto (Tokyo Univ.)
pp. 23 - 30

ISEC2008-5
Coalition Resistant Ternary Subset Difference Method
Kazuhide Fukushima, Shinsaku Kiyomoto, Toshiaki Tanaka (KDDI Labs.), Kouichi Sakurai (Kyushu Univ.)
pp. 31 - 38

ISEC2008-6
A Consideration on k-Clique Problem and Graph k-Colorability
Kunikatsu Kobayashi (Yamagata Univ.)
pp. 39 - 42

ISEC2008-7
Reconsideration of Algorithmic Tamper Proof Devices using PIN (part 2)
Yuichi Komano (Toshiba), Kazuo Ohta (UEC), Hideyuki Miyake, Atsushi Shimbo (Toshiba)
pp. 43 - 48

ISEC2008-8
A method to reduce false positive of Anomaly Detection System
Yuka Ikebe, Takehiro Nakayama, Masaji Katagiri (NTT DoCoMo), Satoshi Kawasaki (Univ. of Tsukuba), Hirotake Abe (Toyohashi Univ. of Technology), Takahiro Shinagawa, Kazuhiko Kato (Univ. of Tsukuba)
pp. 49 - 56

ISEC2008-9
On the Construction of the Set-Intersection Protocols from Blind Signatures
Ryo Nojima (NICT), Youki Kadobayashi (NAIST)
pp. 57 - 60

ISEC2008-10
A Fully Secure Attribute-Based Group Signature Scheme and its Application in an Anonymous Survey for Collection of Attribute Statistics
Keita Emura, Atsuko Miyaji (JAIST)
pp. 61 - 68

ISEC2008-11
A Study on Higher Order Differnce Operation for Elliptic Curve Scalar Multiplication Using Path Table
Tomoko K. Matsushima, Yoshitaka Sagara, Osamu Ashihara (Polytechnic Univ.)
pp. 69 - 76

ISEC2008-12
Integrating Fingerprint and Cryptosystem for Internet-Based Live Pay-TV System
Shuhui Hou, Tetsutaro Uehara (Kyoto Univ.), Takashi Satoh (Univ. of Kitakyushu), Yoshitaka Morimura, Michihiko Minoh (Kyoto Univ.)
pp. 77 - 84

ISEC2008-13
New Classes of Public Key Cryptosystem Constructed on the Basis of Multivariate Polynomials and Error Control Coding
Masao Kasahara (OGU)
pp. 85 - 90

ISEC2008-14
Hybrid Encryption Scheme in IBE with Applications to Data Storage
Hirokazu Ougi (free)
pp. 91 - 98

ISEC2008-15
Strongly Unforgeable ID-based Signatures Without Random Oracles
Chifumi Sato (C4 Technology), Takeshi Okamoto, Eiji Okamoto (Univ. of Tsukuba)
pp. 99 - 106

Note: Each article is a technical report without peer review, and its polished version will be published elsewhere.


The Institute of Electronics, Information and Communication Engineers (IEICE), Japan