IEICE Technical Report

Print edition: ISSN 0913-5685      Online edition: ISSN 2432-6380

Volume 109, Number 445

Information Security

Workshop Date : 2010-03-04 - 2010-03-05 / Issue Date : 2010-02-25

[PREV] [NEXT]

[TOP] | [2006] | [2007] | [2008] | [2009] | [2010] | [2011] | [2012] | [Japanese] / [English]

[PROGRAM] [BULK PDF DOWNLOAD]


Table of contents

ISEC2009-80
Formal verification method for Access control model which can describe Dynamic Segregation of Duties
Michinobu Ochi, Satoshi Ono (Kogakuin Univ.)
pp. 1 - 5

ISEC2009-81
Considerations on Web System Development Process against XSS worms.
Koji Hiyoshi, Kazuko Oyanagi (Inst. of Information Security)
pp. 7 - 14

ISEC2009-82
Evaluation of Mutual Anonymity in P2P Networks
Chigusa Kawashima (Univ. of Electro-Comm.), Todorka Alexandrova (Tokyo Metro Univ.), I Gusti Bagus Baskara Nugraha, Hiroyoshi Morita (Univ. of Electro-Comm.)
pp. 15 - 22

ISEC2009-83
About Security of Threshold Anonymous Password-Authenticated Key Exchange
SeongHan Shin, Kazukuni Kobara (AIST), Hideki Imai (Chuo Univ.)
pp. 23 - 30

ISEC2009-84
A 2-round Identification Scheme Secure against Concurrent Man-in-the-Middle Attacks
Hiroaki Anada, Seiko Arita (IISEC)
pp. 31 - 38

ISEC2009-85
Construction of secure Group Identification based on Digital Signature
Keisuke Saito, Taiichi Saito (Tokyo Denki Univ.)
pp. 39 - 43

ISEC2009-86
Improved Method for Constructing Pairing-friendly Elliptic Curves with Fixed Coefficients
Masaaki Shirase (Future Univ-Hakodate)
pp. 45 - 52

ISEC2009-87
An Experiment of Number Field Sieve over GF(p) of Low Hamming Weight Characteristic
Kenichiro Hayasaka, Tsuyoshi Takagi (Future Univ. Hakodate)
pp. 53 - 60

ISEC2009-88
An RSA Encryption Hardware Algorithm that uses a DSP block on the FPGA
Kensuke Kawakami, Koji Nakano (Hiroshima Univ.)
pp. 61 - 68

ISEC2009-89
Performance Evaluation of A Multipath Routing Method for Highly Reliable Wireless Communications
Kento Terai, Shinsuke Hara (Osaka City Univ.)
pp. 69 - 74

ISEC2009-90
Experimental Validation of an Ultra Wideband Spatio-Temporal Channel Sounder Employing an OFDM signal in a Narrowband Interference Environment
Hiroto Iiduka, Daisuke Sugizaki, Naohiko Iwakiri, Takehiko Kobayashi (Tokyo Denki Univ.)
pp. 75 - 80

ISEC2009-91
Feasibility Study on Cognitive Radio based TV Spectrum Reuse using Leaky Coaxial Cable
Melvin Cabatuan, Masato Saito, Minoru Okada (NAIST)
pp. 81 - 86

ISEC2009-92
An Area Layout-based MAP Estimation for Indoor Localization
Daisuke Anzai, Shinsuke Hara (Osaka City Univ.)
pp. 87 - 92

ISEC2009-93
Direction Finding Performances in UWB Short-Range Phase-Comparison Monopulse Radars
Hironori Enkouji, Takehiko Nishide, Natsuki Hashimoto, Naohiko Iwakiri, Takehiko Kobayashi (Tokyo Denki Univ.)
pp. 93 - 98

ISEC2009-94
Applicability of MB-OFDM UWB System to In-car Wireless Communication
Fumiaki Maehara, Ryouhei Kaneko, Akihiro Yamakita (Waseda Univ.)
pp. 99 - 104

ISEC2009-95
Analysis of optical wireless multi-level PPM using IM/DD
Yusuke Kozawa, Hiromasa Habuchi (Ibaraki Univ.)
pp. 105 - 109

ISEC2009-96
A Study on LDPC coded Time Domain Block Equalizer under MIMO Frequency Selective Channels
Wang Junpeng, Yasunori Iwanami, Eiji Okamoto (Nagoya Inst. of Tech.)
pp. 111 - 116

ISEC2009-97
New Implementation and Evaluation of Knuth-Yao Algorithm and Interval Algorithm
Shogo Takahashi, Hirosuke Yamamoto (Univ. of Tokyo)
pp. 117 - 122

ISEC2009-98
Error exponent for the additive white gaussian noise channel with noisy feedback
Akari Sato, Hirosuke Yamamoto (Univ. of Tokyo)
pp. 123 - 128

ISEC2009-99
A Channel Coding Theorem based on the Number of Guesses
Keishi Okudera, Hirosuke Yamamoto (Univ. of Tokyo)
pp. 129 - 133

ISEC2009-100
Joint channel estimation and LDPC decoding over MIMO channels by nonlinear optimization
Takefumi Kobayashi, Ryutaroh Matsumoto, Tomohiko Uyematsu (Tokyo Inst. of Tech.)
pp. 135 - 140

ISEC2009-101
An analysis of bit error probability of recursive systematic convolutional codes with Max-log-MAP decoding
Yoshitake Kawadai, Hideki Yoshikawa (Tohoku Gakuin Univ)
pp. 141 - 145

ISEC2009-102
On the Size of Circulant Matrices for which Reversible Codes Exist
Tomoharu Shibuya, Keita Nakade (Sophia Univ.)
pp. 147 - 151

ISEC2009-103
1-State Error-Trellis Decoding of LDPC Convolutional Codes Based on Circulant Matrices
Masato Tajima, Koji Okino, Takashi Miyagoshi (Univ. of Toyama)
pp. 153 - 158

ISEC2009-104
[Invited Talk] Indifferentiability Theory and SHA-3 Project -- Recent Status of Theoretical and Practical Researches on Hash Functions --
Kazuo Ohta, Lei Wang, Kazuo Sakiyama (Univ. of Electro-Comm.)
pp. 159 - 166

ISEC2009-105
[Invited Talk] On the Spread-Spectrum Techniques for Inter-Vechile Communications
Hiromasa Habuchi (Ibaraki Univ.)
pp. 167 - 174

ISEC2009-106
[Invited Talk] Codes with unique correlation property and their application
Tomoko K. Matsushima, Yasuaki Teramachi (Polytechnic Univ.)
pp. 175 - 180

ISEC2009-107
Universal Slepian-Wolf Source Codes Using Low-Density Parity-Check Matrices
Tetsunao Matsuta, Tomohiko Uyematsu, Ryutaroh Matsumoto (Tokyo Inst. of Tech.)
pp. 181 - 186

ISEC2009-108
Universal Slepian-Wolf Coding for General Sources
Shigeaki Kuzuoka (Wakayama Univ.)
pp. 187 - 191

ISEC2009-109
Smooth Renyi Entropy and Resolvability
Tomohiko Uyematsu (Tokyo Inst. of Tech.)
pp. 193 - 198

ISEC2009-110
A Comparative Study of CPA and MIA on Side-channel Attack Standard Evaluation Boards
Asuka Taguchi, Yohei Hori, Hideki Imai (Chuo Univ.)
pp. 199 - 204

ISEC2009-111
Countermeasures against Power Analysis Attacks in Assembly code
Kazunori Kawamura, Keisuke Iwai, Takakazu Kurokawa (NDA)
pp. 205 - 210

ISEC2009-112
Electromagnetic Analysis from power line on SASEBO-R
Tetsutaro Kanno, Keisuke Iwai, Takakazu Kurokawa (NDA)
pp. 211 - 216

ISEC2009-113
Obtaining Local Information from FPGA Using Electromagnetic Analysis
Takao Ochiai, Dai Yamamoto, Kouichi Itoh, Masahiko Takenaka, Naoya Torii, Daisuke Uchida, Toshiaki Nagai, Shinichi Wakana (Fujitsu Labs.)
pp. 217 - 223

ISEC2009-114
A Forgery Attack for WPA-TKIP by Modifying Any Packet to the QoS Packet -- Almost All Implementations of WPA-TKIP Can Be Attacked --
Yosuke Todo, Yuki Ozawa (Kobe Univ.), Toshihiro Ohigashi (Hiroshima Univ.), Masakatu Morii (Kobe Univ.)
pp. 225 - 232

ISEC2009-115
A Note on Realistic Damages Caused by a Message Falsification Attack on WPA-TKIP
Yuki Ozawa, Yosuke Todo (Kobe Univ), Toshihiro Ohigashi (Hiroshima Univ), Masakatu Morii (Kobe Univ)
pp. 233 - 240

ISEC2009-116
A Reader Only Attack on a MIFARE Classic
Satoru Imamura (Chuo Univ.), Takashi Kitagawa (Univ. of Tokyo.), Hideki Imai (Chuo Univ.)
pp. 241 - 246

ISEC2009-117
An Efficient Random Key Pre-distribution Protocol for Multi-Phase Wireless Sensor Networks (2)
Hisashige Ito, Atsuko Miyaji, Kazumasa Omote (JAIST)
pp. 247 - 254

ISEC2009-118
Traitor Tracing system with Constant-size Public-key and Ciphertext using q-ary fingerprinting codes
Ying Zhang (Chuo Univ.), Takashi Kitagawa (Univ. of Tokyo.), Nuttapong Attrapadung (AIST), Hideki Imai (Chuo Univ/AIST)
pp. 255 - 260

ISEC2009-119
Experimental and Theoretical Evaluation of Wolf Fingerprint Using Statistical Information
Takuya Nakagawa, Hyunho Kang (Chuo Univ.), Shoko Yonezawa, Manabu Inuma, Akira Otsuka (AIST), Hideki Imai (Chuo Univ/AIST)
pp. 261 - 268

ISEC2009-120
An effective attack against a chaos-based image scrambling encryption
Liang Zhao, Kouichi Sakurai (Kyushu Univ.)
pp. 269 - 274

ISEC2009-121
On key recovery for Enocoro with weak key in related-key attack scenario
Yasutaka Igarashi, Kazuto Okamoto, Toshinobu Kaneko (Tokyo Univ. of Science)
pp. 275 - 280

ISEC2009-122
A Study on Key Estimation Attacks to Stream Cipher based on Statistical Decision Theory
Ety Yudiasticha (Waseda Univ.), Kazuhiko Minematsu (NEC), Toshiyasu Matsushima (Waseda Univ.)
pp. 281 - 287

ISEC2009-123
Preimage Resistance of Hash Functions on the Dedicated Block Cipher
Hidenori Kuwakado (Kobe Univ.), Shoichi Hirose (Univ. of Fukui)
pp. 289 - 293

ISEC2009-124
Bit Error of Hierarchical Transmission in Optical Wireless Channel
Yusuke Oka, Hiromasa Habuchi (Ibaraki Univ.), Kouji Ohuchi (Shizuoka Univ.)
pp. 295 - 300

ISEC2009-125
Theoretical BER Performance of Continuous OFDM Signals with Nonlinear Amplification
Yuichiro Goto, Akihiro Yamakita, Fumiaki Maehara (Waseda Univ.)
pp. 301 - 305

ISEC2009-126
On a Blind Time-Domain Equalization Technique in Single-Carrier Block Transmisson
Ryo Kuwana, Teruyuki Miyajima (Ibaraki Univ.)
pp. 307 - 312

ISEC2009-127
Discussion on a self-calibrated pipeline A/D converter.
Tohru Kohda, Masatora Ogata (Kyushu Univ.)
pp. 313 - 318

ISEC2009-128
The quantized error of AD/DA conversion using beta-expansion
Tohru Kohda, Yuuki Fukae (Kyushu Univ.)
pp. 319 - 324

ISEC2009-129
Frequency estimator using Newton method
Tohru Kohda, Kohnosuke Ogiwara (Kyushu Univ.)
pp. 325 - 329

ISEC2009-130
Behavior Level Design of Turbo TCM Decoder -- Automatic Synthesis of Pipeline Processing Circuit and Comparison of RTL Design --
Hayato Taira, Haruo Ogiwara (Nagaoka Univ. of Tech.)
pp. 331 - 335

ISEC2009-131
Feasibility study of the pre-processing for enhancing text data compression efficiency
Hirofumi Nakamura (Miyakonojo Natl. Coll. of Tech), Kiyomitsu Kajisa (Kagoshima Natl. Coll. of Tech), Takayasu Fuchida (Kagoshima Univ.)
pp. 337 - 342

ISEC2009-132
Antidictionary Coding Scheme Based on Array Structures
Keita Suzuki, Hirotada Fukae (Univ. of Electro-Comm.), Takahiro Ota (Nagano Prefectural Inst. of Tech.), Hiroyoshi Morita (Univ. of Electro-Comm.)
pp. 343 - 348

ISEC2009-133
Redundancy analysis of the universal source code with a singular prior
Tatsuya Hashimoto, Tsutomu Kawabata (Univ. of Electro-Comm.)
pp. 349 - 352

ISEC2009-134
New Classes of Public Key Cryptosystems Constructed Based on Error-Correcting Codes and Probabilistic Structure
Masao Kasahara (Osaka Gakuin Univ.)
pp. 353 - 360

ISEC2009-135
A Construction of New Class of Linear Multivariate Public Key Cryptosystem Constructed Based on Error Correcting Codes
Masao Kasahara (Osaka Gakuin Univ.)
pp. 361 - 366

ISEC2009-136
A Low Density Knapsack Cryptosystem
Akira Hayashi (Kanazawa Inst. of Tech.)
pp. 367 - 372

ISEC2009-137
A study on the probabilistic algorithm to solve the elliptic curve discrete logarithm problem
Osamu Ashihara, Yoshitaka Sagara, Nobuhide Sakuragi, Tomoko K. Matsushima (Polytechnic Univ.)
pp. 373 - 380

ISEC2009-138
A Note on Practical Key Derivation Functions
Shoichi Hirose (Univ. of Fukui.)
pp. 381 - 384

ISEC2009-139
Collision Attack on DM Compression Function Using Reduced AES-256
Tetsuya Kobayashi, Shoichi Hirose (Univ. Fukui)
pp. 385 - 390

ISEC2009-140
Reducing Disclosed Credentials in Automated Trust Negotiation Using Preference
Taichi Hanaoka, Yoshimichi Ito, Noboru Babaguchi (Osaka Univ.)
pp. 391 - 398

ISEC2009-141
Bio-metric Authentication using Motion Image of Speakers Face
Mari Ozaki, Ryuichi Sakai (Osaka Electro-Comm Univ.)
pp. 399 - 401

ISEC2009-142
Existing Probability of Gauss Period Normal Basis
Kenta Nekado, Yasuyuki Nogami, Yoshitaka Morikawa (Okayama Univ.)
pp. 403 - 407

ISEC2009-143
On Constant Weight Codes with Large Linear Complexity from Cyclic Difference Set
Takayasu Kaida (Kinki Univ.)
pp. 409 - 412

ISEC2009-144
On the Redundancy Rate of FF and VF Source Codes for General Sources
Mitsuharu Arimura (Shonan Inst. of Tech.), Ken-ichi Iwata (Univ. of Fukui)
pp. 413 - 418

ISEC2009-145
Constructions of A Large Class of Optimum Linear Codes for Small Number of Information Symbols
Masao Kasahara (Osaka Gakuin Univ.), Shigeichi Hirasawa (Waseda Univ.)
pp. 419 - 426

ISEC2009-146
Secure Key Rate of the BB84 Protocol using Finite Sample Bits
Yousuke Sano, Ryutaroh Matsumoto, Tomohiko Uyematsu (Tokyo Inst. of Tech.)
pp. 427 - 432

ISEC2009-147
Bit Transmission Probability Maximizing the Key Rate of the BB84 Protocol
Sonny Lumbantoruan, Ryutaroh Matsumoto, Tomohiko Uyematsu (Tokyo Inst. of Tech.)
pp. 433 - 438

ISEC2009-148
On the Capacity of the AND Anti-Collusion Fingerprinting Codes
Hiroki Koga (Univ. of Tsukuba.)
pp. 439 - 444

ISEC2009-149
On Access Structures of Secret Sharing Scheme based on Bivariate Polynomial Interpolation Scheme
Hideaki Kashiwagura, Mikihiko Nishiara (Shinshu Univ)
pp. 445 - 448

ISEC2009-150
Secure Linear Network Coding using Surplus Resources
Tomoki Kubo, Kunihiko Harada, Hirosuke Yamamoto (Univ. of Tokyo)
pp. 449 - 454

ISEC2009-151
Vulnerability of MRD-Code-based Universal Secure Network Coding against Stronger Eavesdroppers
Eitaro Shioji, Ryutaroh Matsumoto, Tomohiko Uyematsu (Tokyo Inst. of Tech.)
pp. 455 - 460

ISEC2009-152
Construction of wiretap codes from ordinary channel codes
Masahito Hayashi (Tohoku Univ./National Univ. of Singapore), Ryutaroh Matsumoto (Tokyo Inst. of Tech.)
pp. 461 - 465

ISEC2009-153
Basics of Design and Analysis of Codes for Wiretap Channels
Mitsuru Hamada (Tamagawa Univ.)
pp. 467 - 474

Note: Each article is a technical report without peer review, and its polished version will be published elsewhere.


The Institute of Electronics, Information and Communication Engineers (IEICE), Japan