Print edition: ISSN 0913-5685 Online edition: ISSN 2432-6380
[TOP] | [2008] | [2009] | [2010] | [2011] | [2012] | [2013] | [2014] | [Japanese] / [English]
ISEC2011-34
Evaluation and Improvement against a Lattice Trapdoor Function in the Alwen-Peikert Construction
Yosuke Todo, Masakatu Morii (Kobe Univ.)
pp. 1 - 6
ISEC2011-35
A Lattice Attack against (u|u+v)ΣPKC
Atsushi Nagao, Yosuke Todo, Masakatu Morii (Kobe Univ.)
pp. 7 - 12
ISEC2011-36
On the attack against Gentry's somewhat homomorphic encryption using LLL algorithm (II)
Jun Yajima, Masaya Yasuda, Takeshi Shimoyama, Jun Kogure (FUJITSU LAB.)
pp. 13 - 17
ISEC2011-37
An element-selective knapsack cryptosystem with encryption multipliers
Yuki Okada, Akira Hayashi (KIT)
pp. 19 - 23
ISEC2011-38
A study on necessary location information accuracy in lifelog
Hiromitsu Ueda, Yukio Rikiso (Univ. of Hyogo)
pp. 25 - 32
ISEC2011-39
Evaluation method for telephone conversations retrieval using precision and recall
Hiroyuki Nishi, Yuuki Yokobayashi, Haiyen, Yoshimasa Kimura, Toshio Kakinoki (Sojo Univ)
pp. 33 - 38
ISEC2011-40
Proposal of “Knowledge Recommender” the Business-knowledge Sharing System and Rating Evaluation
-- Application for Building Energy Management Service --
Minako Toba (Hitachi, Ltd.)
pp. 39 - 46
ISEC2011-41
Three dimensional Dyck Path Cipher
Jun Hashimoto, Akira Hayashi (KIT)
pp. 47 - 54
ISEC2011-42
Hidden Pair of Bijection Signature system (2)
-- Discussion of the Security --
Masahito Gotaishi, Shigeo Tsujii (Chuo Univ.)
pp. 55 - 60
ISEC2011-43
Ramp secret sharing scheme based on MBR codes
Masazumi Kurihara (UEC), Hidenori Kuwakado (Kobe University)
pp. 61 - 68
ISEC2011-44
Formalization and Verification of Arithmetic Algorithms by Mizar
Yoshiki Aoki, Hiroyuki Okazaki, Yasunari Shidama (Shinshu Univ.)
pp. 69 - 74
ISEC2011-45
Designing a Filter for Internet Flow Control under Macro Dynamics
-- Towards Innovating Autonomous Network Architecture for Future Dynamics-aware Internet --
Jian-Qin Liu (NICT), Wuyi Yue (Konan Univ.), Hiroaki Umehara (NICT)
pp. 75 - 78
ISEC2011-46
Efficient Decoding of QR Code using Error Correcting Capability
-- Decoding Method using Erasure Error Correction and the Ability --
Keisuke Saito, Masakatu Morii (Kobe Univ.)
pp. 79 - 84
ISEC2011-47
A suudy of machine learning corresponding to the change of a turn and the of the recognition object
Tatsumo Hoji, Yuta Yamada, Akihiro Shimizu (Kochi Univ. of Tech.)
pp. 85 - 92
ISEC2011-48
Proposal and Evaluation of a Secure WEP Operation against Existing Key Recovery Attacks
Tsubasa Tsukaune, Yosuke Todo, Masakatu Morii (Kobe Univ.)
pp. 93 - 100
ISEC2011-49
Fault Sensitivity Analysis Against Elliptic Curve Cryptosystems Using Clockwise Collisions
Hikaru Sakamoto, Yang Li, Kazuo Ohta, Kazuo Sakiyama (Univ. of Electro-Comm.)
pp. 101 - 108
ISEC2011-50
Optimized Right-to-Left Scalar Multiplication RIP Algorithms
Atsuko Miyaji, Yiren Mo (JAIST)
pp. 109 - 114
ISEC2011-51
Efficient Privacy Preserving Set Operations
Atsuko Miyaji, Mohammad Rahman (JAIST)
pp. 115 - 122
ISEC2011-52
A Method to Find Vulnerable Cryptographic Algorithms in SSH Protocol
Satoshi Hara (UEC), Kenichiro Muto, Sakae Chikara, Yoshiaki Seki (NTT)
pp. 123 - 128
ISEC2011-53
Secure and Effective Password Management System
Ryo Hirano, Masakatu Morii (Kobe Univ.)
pp. 129 - 134
ISEC2011-54
Secure VoIP system for mobile devices
Takeaki Kouchi, Tomoki Nakano, Yutaka Ono, Akihiro Shimizu (Kochi Univ. of Tech.)
pp. 135 - 140
ISEC2011-55
SLP separates the strong RSA assumption from the DDH assumption
Masayuki Fukumitsu, Shingo Hasegawa, Shuji Isobe, Eisuke Koizumi, Hiroki Shizuya (Tohoku Univ.)
pp. 141 - 148
ISEC2011-56
On the Little Knowledge Interactive Proof
Jun-ya Iwazaki, Shingo Hasegawa, Shuji Isobe, Eisuke Koizumi, Hiroki Shizuya (Tohoku Univ.)
pp. 149 - 154
ISEC2011-57
Symbolic Criterion of EUC Secure Message Authentication for Multi-Message Protocols
Itsuki Suzuki, Maki Yoshida, Toru Fujiwara (Osaka Univ.)
pp. 155 - 162
ISEC2011-58
On Definition Fields of Pairing Friendly Curves With Embedding Degree 4, 6, 8
Masaaki Shirase (FUN)
pp. 163 - 170
ISEC2011-59
A proposal of Privacy Impact Assessment framework in Japan
Shigeru Ishida, Sadamu Takasaka, Mamoru Yokoyama, Yoichi Seto (AIIT)
pp. 171 - 176
ISEC2011-60
Content Authentication for Range Queries in Peer-to-Peer Networks
Shoichi Hirose (Univ. of Fukui)
pp. 177 - 180
ISEC2011-61
On the Insecurity of Randomized Arithmetic Codes Based on Markov Model
Liang Zhao, Takashi Nishide (Kyushu Univ.), Avishek Adhikari (Univ. of Calcutta), Kyung-Hyune Rhee (Pukyong National Univ.), Kouichi Sakurai (Kyushu Univ.)
pp. 181 - 188
Note: Each article is a technical report without peer review, and its polished version will be published elsewhere.