Print edition: ISSN 0913-5685 Online edition: ISSN 2432-6380
[TOP] | [2008] | [2009] | [2010] | [2011] | [2012] | [2013] | [2014] | [Japanese] / [English]
SITE2011-6
Carrier Screen Images Decoding with an Ordinary Digital Camera
Rui Shogenji, Junji Ohtsubo (Shizuoka Univ.)
pp. 1 - 6
SITE2011-7
Recovery of Tampered Pixels for Statistical Fragile Watermarking
Maki Yoshida, Kazuya Ohkita, Toru Fujiwara (Osaka Univ.)
pp. 7 - 12
SITE2011-8
Bias Equalizer for Tracing Algorithm of Binary Fingerprinting Codes
Minoru Kuribayashi (Kobe Univ.)
pp. 13 - 18
SITE2011-9
Proposal of 3D Visualization Method for IDS Considering Order Relation of IP addresses
Shunichi Mizoguchi, Hiroyuki Inaba (KIT)
pp. 19 - 24
SITE2011-10
Study on person profile about coping behavior under virus infected situation
Hiroaki Kanda, Noriaki Yoshikai, Shun-ichi Kurino (Nihon University)
pp. 25 - 30
SITE2011-11
Cloud Computing Market Expansion and Risk management in U.S. and an analysis of the consensus building factors
-- from the perspective of networking incentive of actors --
Ema Tanaka (FMMC)
pp. 31 - 38
SITE2011-12
Matsumoto-Imai Signature by Dual Perturbation
-- Two new Modifiers --
Masahito Gotaishi, Shigeo Tsujii (Chuo Univ.)
pp. 79 - 83
SITE2011-13
A Note on Security of (u|u+v) Σ PKC against Low-Density Attack
Yasuyuki Murakami (Osaka Electro-Comm. Univ.), Masao Kasahara (Osaka Gakuin Univ.)
pp. 85 - 90
SITE2011-14
A Low Density Multiple Choice Knapsack Cryptosystem
Akira Hayashi, Toshihiro Koike (KIT)
pp. 91 - 96
SITE2011-15
The proposal of the evaluation for decryption failure about GGH series
Yosuke Todo, Masakatu Morii (Kobe Univ.)
pp. 97 - 102
SITE2011-16
Security Evaluation of HyRAL against Saturation Cryptanalysis(II)
Naoki Shibayama, Yasutaka Igarashi, Toshinobu Kaneko, Seiichiro Hangai (Tokyo Univ. of Science)
pp. 103 - 109
SITE2011-17
Strongly Asymmetric Public Key Agreement Algorithms
Luigi Accardi (Roma II Univ.), Satoshi Iriyama (Tokyo Univ. of Science), Massimo Regoli (Roma II Univ.), Masanori Ohya (Tokyo Univ. of Science)
pp. 111 - 114
SITE2011-18
Strongly Asymmetric PKD Cryptographic Algorithms
-- an implementation using the matrix model --
Luigi Accardi (Roma II Univ.), Satoshi Iriyama (Tokyo Univ. of Science), Massimo Regoli (Roma II Univ.), Masanori Ohya (Tokyo Univ. of Science)
pp. 115 - 121
SITE2011-19
On Usage of Practical Web Application Source Code for Learning Support on Secure Coding
Ryosuke Miyaji, Seikoh Nishita (Takushoku Univ)
pp. 123 - 129
SITE2011-20
Public Key Cryptosystems Constructed Based on Cyclic Codes, Realizing Coding Rate of Exactly 1.0, K(XI)SE(g)PKC and K(XII)SE(g)PKC
Masao Kasahara (Osaka Gakuin Univ.)
pp. 131 - 136
SITE2011-21
Construction of New Classes of Product-Sum Type Public Key Cryptosystem, K(IV)ΣPKC and K(I)ΣΠPKC
Masao Kasahara (Osaka Gakuin Univ)
pp. 137 - 144
SITE2011-22
Memory saving implementation of Cyclic Vector Multiplication Algorithm
Ryosuke Takahashi, Kenta Nekado, Yusuke Takai, Yasuyuki Nogami, Hiroto Kagotani (Okayama Univ.), Takashi Narita (TEL)
pp. 145 - 150
SITE2011-23
Solving DLP with Auxiliary Input over an Elliptic Curve Used in TinyTate Library (Part II)
Yumi Sakemi, Tetsuya Izu, Masahiko Takenaka, Masaya Yasuda (Fujitsu Labs)
pp. 151 - 158
Note: Each article is a technical report without peer review, and its polished version will be published elsewhere.