Print edition: ISSN 0913-5685 Online edition: ISSN 2432-6380
[TOP] | [2007] | [2008] | [2009] | [2010] | [2011] | [2012] | [2013] | [Japanese] / [English]
ISEC2010-1
The Suggestion of Corrected Non-overlapping Template Matching Test
Yuichi Takeda (KAIT), Mituaki Huzii, Toshinari Kamakura, Norio Watanabe, Takakazu Sugiyama (Chuo Univ.)
pp. 1 - 4
ISEC2010-2
Side-Channel Analysis and Countermeasures of Stream Cipher K2
Matt Henricksen, Wun-she Yap, Chee-hoo Yian (I2R), Yuto Nakano, Kazuhide Fukushima, Shinsaku Kiyomoto, Toshiaki Tanaka (KDDI Labs.)
pp. 5 - 10
ISEC2010-3
A Study on Non Linear Function and cryptanalysis of K2
Takashi Ohshima, Munetoshi Iwakiri (NDA)
pp. 11 - 15
ISEC2010-4
Comparing with feature of quantum stream cipher Y-00 and CPPM
-- Cipher with randomization of chiphertext --
Masaki Sohma, Osamu Hirota (Tamagawa Univ.)
pp. 17 - 24
ISEC2010-5
Formal verification method for Dynamic Segregation of Duties which is based Functional Role
Michinobu Ochi, Satoshi Ono (Kogakuin Univ.)
pp. 25 - 32
ISEC2010-6
An Improvement of Attribute-based Encryption
Hiroki Kunitake, Masahiro Mambo, Eiji Okamoto (Tsukuba Univ.)
pp. 33 - 39
ISEC2010-7
New Class of Public Key Cryptosystems Constructed Based on Error-Correcting Codes, Using K(III) Scheme
-- Appendix: Proposal of K(IX)SE(g)PKC --
Masao Kasahara (Osaka Gakuin Univ.)
pp. 41 - 48
ISEC2010-8
Consideration of Surface in Algebraic Surface Cryptosystems
Yuichi Komano, Koichiro Akiyama, Yoshikazu Hanatani, Hideyuki Miyake (Toshiba), Yasuhiro Goto (Hokkaido Univ. of Edu.)
pp. 49 - 56
ISEC2010-9
Applying Numerical Analysis Technique To Prime Factorization
Masaaki Shirase (FUN)
pp. 57 - 62
Note: Each article is a technical report without peer review, and its polished version will be published elsewhere.