IEICE Technical Report

Print edition: ISSN 0913-5685      Online edition: ISSN 2432-6380

Volume 109, Number 42

Information Security

Workshop Date : 2009-05-22 / Issue Date : 2009-05-15

[PREV] [NEXT]

[TOP] | [2006] | [2007] | [2008] | [2009] | [2010] | [2011] | [2012] | [Japanese] / [English]

[PROGRAM] [BULK PDF DOWNLOAD]


Table of contents

ISEC2009-1
A random number generation by Logistic Map -- To generate and manage the identification number --
Jiguo Dong (Univ. of Electro-Comm.)
pp. 1 - 7

ISEC2009-2
Corrected Non-overlapping Template Matching Test
Yuichi Takeda (Kanagawa Inst. of Tech.), Mituaki Huzii, Toshinari Kamakura, Norio Watanabe, Takakazu Sugiyama (Chuo Univ.)
pp. 9 - 12

ISEC2009-3
Estimation of CPA attack for AES using Simulation method
Kimihiro Yamakoshi, Akihiro Yamagishi (NTT)
pp. 13 - 20

ISEC2009-4
Generalized Zero-offset Power Analyses for Restricted Masking Scheme
Yuichi Komano, Hideo Shimizu, Hanae Nozaki, Atsushi Shimbo (Toshiba Corp.)
pp. 21 - 28

ISEC2009-5
A Novel Construction Method for Visual Secret Sharing Schemes Allowing Rotation of Shares
Yang Li, Mitsugu Iwamoto, Kazuo Ohta, Kazuo Sakiyama (Univ. of Electro-Comm.)
pp. 29 - 36

ISEC2009-6
An Implementation of a Group Signature Scheme with Efficient Verifier-Local Revocation Check
Amang Sudarsono, Toru Nakanishi, Yumi Sakemi, Yasuyuki Nogami, Nobuo Funabiki (Okayama Univ.)
pp. 37 - 42

ISEC2009-7
Joint Sparse Forms with Twelve Precomputed Points
Katsuyuki Okeya (Hitachi)
pp. 43 - 50

ISEC2009-8
A Consideration on Generating Ordinary Pairing Friendly Curve of Composite Order That Has Two Large Prime Factors
Kazushi Nishii, Yumi Sakemi, Yasuyuki Nogami, Yoshitaka Morikawa (Okayama Univ.)
pp. 51 - 54

ISEC2009-9
An Improvement of Cyclic Vector Multiplication Algorithm based on Gauss period Normal Basis
Erika Yanagi, Kenta Nekado, Yasuyuki Nogami, Yoshitaka Morikawa (Okayama Univ.)
pp. 55 - 60

ISEC2009-10
Another Experimental Security Analysis of OTU2000 through Attacks Based on Lattice Theory
Daewoo Kim, Masahiro Mambo, Eiji Okamoto (Univ. of Tsukuba.)
pp. 61 - 68

ISEC2009-11
A Pairing-based Group Key Exchange with an Edge-based Tree
Atsuko Miyaji (JAIST), Yvo Desmedt (Univ. College London)
pp. 69 - 76

ISEC2009-12
Digital Signature Using Knapsack Problem
Kunikatsu Kobayashi (Yamagata Univ.), Kotaro Honda (α systems)
pp. 77 - 80

ISEC2009-13
New Classes of Product-Sum Type Public Key Cryptosystems and Fuzzy Vault Scheme Constructed Based on Error-Correcting Codes
Masao Kasahara (Osaka Gakuin Univ.)
pp. 81 - 87

ISEC2009-14
Cryptanalysis on 2 Dimensional Subset-sum Public Key Cryptosystem
Ryuichi Sakai (Osaka Electro-Comm Univ.)
pp. 89 - 92

Note: Each article is a technical report without peer review, and its polished version will be published elsewhere.


The Institute of Electronics, Information and Communication Engineers (IEICE), Japan