Print edition: ISSN 0913-5685 Online edition: ISSN 2432-6380
[TOP] | [2008] | [2009] | [2010] | [2011] | [2012] | [2013] | [2014] | [Japanese] / [English]
LOIS2011-28
Evaluation and Improvement against a Lattice Trapdoor Function in the Alwen-Peikert Construction
Yosuke Todo, Masakatu Morii (Kobe Univ.)
pp. 1 - 6
LOIS2011-29
A Lattice Attack against (u|u+v)ΣPKC
Atsushi Nagao, Yosuke Todo, Masakatu Morii (Kobe Univ.)
pp. 7 - 12
LOIS2011-30
On the attack against Gentry's somewhat homomorphic encryption using LLL algorithm (II)
Jun Yajima, Masaya Yasuda, Takeshi Shimoyama, Jun Kogure (FUJITSU LAB.)
pp. 13 - 17
LOIS2011-31
An element-selective knapsack cryptosystem with encryption multipliers
Yuki Okada, Akira Hayashi (KIT)
pp. 19 - 23
LOIS2011-32
A study on necessary location information accuracy in lifelog
Hiromitsu Ueda, Yukio Rikiso (Univ. of Hyogo)
pp. 25 - 32
LOIS2011-33
Evaluation method for telephone conversations retrieval using precision and recall
Hiroyuki Nishi, Yuuki Yokobayashi, Haiyen, Yoshimasa Kimura, Toshio Kakinoki (Sojo Univ)
pp. 33 - 38
LOIS2011-34
Proposal of “Knowledge Recommender” the Business-knowledge Sharing System and Rating Evaluation
-- Application for Building Energy Management Service --
Minako Toba (Hitachi, Ltd.)
pp. 39 - 46
LOIS2011-35
Three dimensional Dyck Path Cipher
Jun Hashimoto, Akira Hayashi (KIT)
pp. 47 - 54
LOIS2011-36
Hidden Pair of Bijection Signature system (2)
-- Discussion of the Security --
Masahito Gotaishi, Shigeo Tsujii (Chuo Univ.)
pp. 55 - 60
LOIS2011-37
Ramp secret sharing scheme based on MBR codes
Masazumi Kurihara (UEC), Hidenori Kuwakado (Kobe University)
pp. 61 - 68
LOIS2011-38
Formalization and Verification of Arithmetic Algorithms by Mizar
Yoshiki Aoki, Hiroyuki Okazaki, Yasunari Shidama (Shinshu Univ.)
pp. 69 - 74
LOIS2011-39
Designing a Filter for Internet Flow Control under Macro Dynamics
-- Towards Innovating Autonomous Network Architecture for Future Dynamics-aware Internet --
Jian-Qin Liu (NICT), Wuyi Yue (Konan Univ.), Hiroaki Umehara (NICT)
pp. 75 - 78
LOIS2011-40
Efficient Decoding of QR Code using Error Correcting Capability
-- Decoding Method using Erasure Error Correction and the Ability --
Keisuke Saito, Masakatu Morii (Kobe Univ.)
pp. 79 - 84
LOIS2011-41
A suudy of machine learning corresponding to the change of a turn and the of the recognition object
Tatsumo Hoji, Yuta Yamada, Akihiro Shimizu (Kochi Univ. of Tech.)
pp. 85 - 92
LOIS2011-42
Proposal and Evaluation of a Secure WEP Operation against Existing Key Recovery Attacks
Tsubasa Tsukaune, Yosuke Todo, Masakatu Morii (Kobe Univ.)
pp. 93 - 100
LOIS2011-43
Fault Sensitivity Analysis Against Elliptic Curve Cryptosystems Using Clockwise Collisions
Hikaru Sakamoto, Yang Li, Kazuo Ohta, Kazuo Sakiyama (Univ. of Electro-Comm.)
pp. 101 - 108
LOIS2011-44
Optimized Right-to-Left Scalar Multiplication RIP Algorithms
Atsuko Miyaji, Yiren Mo (JAIST)
pp. 109 - 114
LOIS2011-45
Efficient Privacy Preserving Set Operations
Atsuko Miyaji, Mohammad Rahman (JAIST)
pp. 115 - 122
LOIS2011-46
A Method to Find Vulnerable Cryptographic Algorithms in SSH Protocol
Satoshi Hara (UEC), Kenichiro Muto, Sakae Chikara, Yoshiaki Seki (NTT)
pp. 123 - 128
LOIS2011-47
Secure and Effective Password Management System
Ryo Hirano, Masakatu Morii (Kobe Univ.)
pp. 129 - 134
LOIS2011-48
Secure VoIP system for mobile devices
Takeaki Kouchi, Tomoki Nakano, Yutaka Ono, Akihiro Shimizu (Kochi Univ. of Tech.)
pp. 135 - 140
LOIS2011-49
SLP separates the strong RSA assumption from the DDH assumption
Masayuki Fukumitsu, Shingo Hasegawa, Shuji Isobe, Eisuke Koizumi, Hiroki Shizuya (Tohoku Univ.)
pp. 141 - 148
LOIS2011-50
On the Little Knowledge Interactive Proof
Jun-ya Iwazaki, Shingo Hasegawa, Shuji Isobe, Eisuke Koizumi, Hiroki Shizuya (Tohoku Univ.)
pp. 149 - 154
LOIS2011-51
Symbolic Criterion of EUC Secure Message Authentication for Multi-Message Protocols
Itsuki Suzuki, Maki Yoshida, Toru Fujiwara (Osaka Univ.)
pp. 155 - 162
LOIS2011-52
On Definition Fields of Pairing Friendly Curves With Embedding Degree 4, 6, 8
Masaaki Shirase (FUN)
pp. 163 - 170
LOIS2011-53
A proposal of Privacy Impact Assessment framework in Japan
Shigeru Ishida, Sadamu Takasaka, Mamoru Yokoyama, Yoichi Seto (AIIT)
pp. 171 - 176
LOIS2011-54
Content Authentication for Range Queries in Peer-to-Peer Networks
Shoichi Hirose (Univ. of Fukui)
pp. 177 - 180
LOIS2011-55
On the Insecurity of Randomized Arithmetic Codes Based on Markov Model
Liang Zhao, Takashi Nishide (Kyushu Univ.), Avishek Adhikari (Univ. of Calcutta), Kyung-Hyune Rhee (Pukyong National Univ.), Kouichi Sakurai (Kyushu Univ.)
pp. 181 - 188
Note: Each article is a technical report without peer review, and its polished version will be published elsewhere.