IEICE Technical Report

Print edition: ISSN 0913-5685      Online edition: ISSN 2432-6380

Volume 111, Number 123

Information Security

Workshop Date : 2011-07-12 - 2011-07-13 / Issue Date : 2011-07-05

[PREV] [NEXT]

[TOP] | [2008] | [2009] | [2010] | [2011] | [2012] | [2013] | [2014] | [Japanese] / [English]

[PROGRAM] [BULK PDF DOWNLOAD]


Table of contents

ISEC2011-9
Carrier Screen Images Decoding with an Ordinary Digital Camera
Rui Shogenji, Junji Ohtsubo (Shizuoka Univ.)
pp. 1 - 6

ISEC2011-10
Recovery of Tampered Pixels for Statistical Fragile Watermarking
Maki Yoshida, Kazuya Ohkita, Toru Fujiwara (Osaka Univ.)
pp. 7 - 12

ISEC2011-11
Bias Equalizer for Tracing Algorithm of Binary Fingerprinting Codes
Minoru Kuribayashi (Kobe Univ.)
pp. 13 - 18

ISEC2011-12
Proposal of 3D Visualization Method for IDS Considering Order Relation of IP addresses
Shunichi Mizoguchi, Hiroyuki Inaba (KIT)
pp. 19 - 24

ISEC2011-13
Study on person profile about coping behavior under virus infected situation
Hiroaki Kanda, Noriaki Yoshikai, Shun-ichi Kurino (Nihon University)
pp. 25 - 30

ISEC2011-14
Cloud Computing Market Expansion and Risk management in U.S. and an analysis of the consensus building factors -- from the perspective of networking incentive of actors --
Ema Tanaka (FMMC)
pp. 31 - 38

ISEC2011-15
Matsumoto-Imai Signature by Dual Perturbation -- Two new Modifiers --
Masahito Gotaishi, Shigeo Tsujii (Chuo Univ.)
pp. 79 - 83

ISEC2011-16
A Note on Security of (u|u+v) Σ PKC against Low-Density Attack
Yasuyuki Murakami (Osaka Electro-Comm. Univ.), Masao Kasahara (Osaka Gakuin Univ.)
pp. 85 - 90

ISEC2011-17
A Low Density Multiple Choice Knapsack Cryptosystem
Akira Hayashi, Toshihiro Koike (KIT)
pp. 91 - 96

ISEC2011-18
The proposal of the evaluation for decryption failure about GGH series
Yosuke Todo, Masakatu Morii (Kobe Univ.)
pp. 97 - 102

ISEC2011-19
Security Evaluation of HyRAL against Saturation Cryptanalysis(II)
Naoki Shibayama, Yasutaka Igarashi, Toshinobu Kaneko, Seiichiro Hangai (Tokyo Univ. of Science)
pp. 103 - 109

ISEC2011-20
Strongly Asymmetric Public Key Agreement Algorithms
Luigi Accardi (Roma II Univ.), Satoshi Iriyama (Tokyo Univ. of Science), Massimo Regoli (Roma II Univ.), Masanori Ohya (Tokyo Univ. of Science)
pp. 111 - 114

ISEC2011-21
Strongly Asymmetric PKD Cryptographic Algorithms -- an implementation using the matrix model --
Luigi Accardi (Roma II Univ.), Satoshi Iriyama (Tokyo Univ. of Science), Massimo Regoli (Roma II Univ.), Masanori Ohya (Tokyo Univ. of Science)
pp. 115 - 121

ISEC2011-22
On Usage of Practical Web Application Source Code for Learning Support on Secure Coding
Ryosuke Miyaji, Seikoh Nishita (Takushoku Univ)
pp. 123 - 129

ISEC2011-23
Public Key Cryptosystems Constructed Based on Cyclic Codes, Realizing Coding Rate of Exactly 1.0, K(XI)SE(g)PKC and K(XII)SE(g)PKC
Masao Kasahara (Osaka Gakuin Univ.)
pp. 131 - 136

ISEC2011-24
Construction of New Classes of Product-Sum Type Public Key Cryptosystem, K(IV)ΣPKC and K(I)ΣΠPKC
Masao Kasahara (Osaka Gakuin Univ)
pp. 137 - 144

ISEC2011-25
Memory saving implementation of Cyclic Vector Multiplication Algorithm
Ryosuke Takahashi, Kenta Nekado, Yusuke Takai, Yasuyuki Nogami, Hiroto Kagotani (Okayama Univ.), Takashi Narita (TEL)
pp. 145 - 150

ISEC2011-26
Solving DLP with Auxiliary Input over an Elliptic Curve Used in TinyTate Library (Part II)
Yumi Sakemi, Tetsuya Izu, Masahiko Takenaka, Masaya Yasuda (Fujitsu Labs)
pp. 151 - 158

Note: Each article is a technical report without peer review, and its polished version will be published elsewhere.


The Institute of Electronics, Information and Communication Engineers (IEICE), Japan