IEICE Technical Report

Print edition: ISSN 0913-5685      Online edition: ISSN 2432-6380

Volume 112, Number 211

Information Security

Workshop Date : 2012-09-21 / Issue Date : 2012-09-14

[PREV] [NEXT]

[TOP] | [2009] | [2010] | [2011] | [2012] | [2013] | [2014] | [2015] | [Japanese] / [English]

[PROGRAM] [BULK PDF DOWNLOAD]


Table of contents

ISEC2012-43
Security Evaluation of Pairing-Based Cryptosystems using eta-T Pairing over GF(3^n)
Takuya Hayashi (Kyushu Univ.), Takeshi Shimoyama (Fujitsu Labs.), Naoyuki Shinohara (NICT), Tsuyoshi Takagi (Kyushu Univ.)
pp. 1 - 5

ISEC2012-44
Computation of pairings and scalar multiplication by using elliptic nets over small characteristic finite fields
Naoki Kanayama, Yang Liu, Eiji Okamoto, Kazutaka Saito, Tadanori Teruya (Univ. of Tsukuba), Shigenori Uchiyama (Tokyo Metro Univ.)
pp. 7 - 13

ISEC2012-45
Heuristic improvements of BKZ 2.0
Yoshinori Aono (NICT), Ken Naganuma (Hitachi)
pp. 15 - 22

ISEC2012-46
Differential cryptanalysis of CIPHERUNICORN-A
Tomoyasu Suzaki (NEC), Takeshi Kawabata, Hiroyasu Kubo, Teruo Saito, Maki Shigeri (NEC Software Hokuriku), Yukiyasu Tsunoo (NEC)
pp. 23 - 27

ISEC2012-47
A Report on EUROCRYPT2012
Mitsugu Iwamoto (UEC)
pp. 29 - 31

ISEC2012-48
[Invited Talk] Cryptanalyses on a Merkle-Damgard Based MAC -- Almost Universal Forgery and Distinguishing-H Attacks --
Yu Sasaki (NTT)
p. 33

ISEC2012-49
[Invited Talk] Group to Group Commitments Do Not Shrink
Miyako Ohkubo (NICT)
p. 35

ISEC2012-50
[Invited Talk] Public Key Compression and Modulus Switching for Fully Homomorphic Encryption over the Integers
Jean-Sebastien Coron (Univ. of Luxembourg), David Naccache (ENS), Mehdi Tibouchi (NTT)
p. 37

ISEC2012-51
[Invited Talk] Tightly-Secure Signatures From Lossy Identification Schemes
Michel Abdalla, Pierre-Alain Fouque, Vadim Lyubashevsky (ENS), Mehdi Tibouchi (NTT)
p. 39

ISEC2012-52
[Invited Talk] Adaptively Attribute-Hiding (Hierarchical) Inner Product Encryption
Tatsuaki Okamoto (NTT), Katsuyuki Takashima (Mitsubishi Electric)
p. 41

ISEC2012-53
New Classes of Public Key Cryptosystems with Concealed Equations of Very High Degree Constructed Based on Cyclic Codes, K(X)SE(1)PKC, K(XVI)SE(2)PKC, Realizing Coding Rate of Exactly 1.0, along with K(III)ΣΠPKC
Masao Kasahara (21st ICRC)
pp. 43 - 50

ISEC2012-54
Pilot Lamps can Serve as Side Channels
Shohei Saito, Tsutomu Matsumoto (Yokohama Nat'l Univ.)
pp. 51 - 58

ISEC2012-55
Fault Analysis Based on Key Presumption for Multiple Errors
Midori Ono (Meijo Univ.), Masaya Yoshikawa (Meijo Univ)
pp. 59 - 65

ISEC2012-56
An Efficient Method of Strictly Evaluating Side-Channel Security
Takeshi Kishikawa, Shohei Saito, Yuu Tsuchiya, Tsuyoshi Toyama, Tsutomu Matsumoto (Yokohama Nat'l Univ.)
pp. 67 - 74

Note: Each article is a technical report without peer review, and its polished version will be published elsewhere.


The Institute of Electronics, Information and Communication Engineers (IEICE), Japan