IEICE Technical Report

Print edition: ISSN 0913-5685      Online edition: ISSN 2432-6380

Volume 112, Number 305

Information Security

Workshop Date : 2012-11-21 - 2012-11-22 / Issue Date : 2012-11-14

[PREV] [NEXT]

[TOP] | [2009] | [2010] | [2011] | [2012] | [2013] | [2014] | [2015] | [Japanese] / [English]

[PROGRAM] [BULK PDF DOWNLOAD]


Table of contents

ISEC2012-57
How to Extract AES Key from Smart Card by Fault Injection Attack Using Electromaginetic Irradiataion
Yuu Tsuchiya, Takeshi Kishikawa, Shohei Saito, Tsuyoshi Toyama (YNU), Akihiko Sasaki (MORITA TECH), Akashi Satoh (VDEC, Univ. Tokyo), Tsutomu Matsumoto (YNU)
pp. 1 - 8

ISEC2012-58
Lightweight Hashing Mode Using Lesamnta-LW Compression Function and MDP Domain Extension
Asraf Akhimullah, Shoichi Hirose (Fukui Univ.), Emi Matsuyama (SAKAI ELCOM)
pp. 9 - 14

ISEC2012-59
Secure multiplication algorithm based on secret sharing
Ryota Nakada, Takayuki Nakachi (NTT)
pp. 15 - 20

ISEC2012-60
Implementation and Evaluation of MashMap Framework for Visualizing Location-based Lifelog
Kohei Takahashi, Shinsuke Matsumoto, Masahide Nakamura (Kobe Univ.)
pp. 21 - 26

ISEC2012-61
Implementing API of Large-scale House Log Data Platform in Smart City
Shintaro Yamamoto, Kohei Takahashi, Shinsuke Matsumoto, Masahide Nakamura (Kobe Univ.)
pp. 27 - 32

ISEC2012-62
A study of the human resource allocation on the cooperation system of life support services
Mizue Hayashi (NTT), Yoshiyuki Mihara (NTT WEST), Atsushi Nakadaira, Manabu Okamoto, Takefumi Yamazaki, Atsushi Sato (NTT)
pp. 33 - 40

ISEC2012-63
A Web Service Implementation of Anonymous Attributes Authentication System for CNF Formulas
Yuji Hamada, Toru Nakanishi, Kan Watanabe, Nobuo Funabiki (Okayama Univ.)
pp. 41 - 46

ISEC2012-64
A classification method of application traffic in encrypted tunnel using SVM
Nguyen Thanh Tuan, Yasuhiro Nakamura (NDA)
pp. 47 - 51

ISEC2012-65
Proposal on Concept of Encrypted State Processing at Semantic Layerbased on Logic -- Toward Realization of Confidentiality Preserving Retrieval and Creation of Answer by Natural Language --
Shigeo Tsujii, Hiroshi Yamaguchi (Chuo- U), Tetsuya Morizumi (Nettsu)
pp. 53 - 60

ISEC2012-66
Secret sharing using the Chinese remainder theorem and its application
Toshio Tsuji, Masao Kasahara (Osaka Gakuin Univ.)
pp. 61 - 68

ISEC2012-67
A Study on Visualization of Business Process Flow of Information Transfer Network System (My Number System) Using BPMN
Chikahiro Miyokawa, Takashi Obi, Kazushige Fujita, Masuyoshi Yachida, Joong Sun Lee, Tetsuya Natsume, Naoko Taira, Eikazu Niwano, Makoto Kumakura, Yoshiaki Iwamaru, Nagaaki Ohyama (Tokyo Tech)
pp. 69 - 74

ISEC2012-68
Efficient elliptic curve exponentiation using DBNS with improved the Greedy algorithm for DBNS
Yoshio Kawamo, Atsuko Miyaji (JAIST)
pp. 75 - 81

ISEC2012-69
A New Explicit Relation between Trace, Definition Field, and Embedding Degree
Atsuko Miyaji, Xiaonan Shi (JAIST)
pp. 83 - 88

ISEC2012-70
A note on subgroup decision problem and pairing inversion problem
Naoki Kanayama (Univ. of Tsukuba), Shigenori Uchiyama (Tokyo Metro. Univ.), Eiji Okamoto (Univ. of Tsukuba)
pp. 89 - 92

ISEC2012-71
Parallelized Gauss sieve algorithm for solving the shortest vector problem in lattices
Tsukasa Ishiguro, Shinsaku Kiyomoto, Yutaka Miyake (KDDI R&D Labs), Tsuyoshi Takagi (Kyushu Univ)
pp. 93 - 99

Note: Each article is a technical report without peer review, and its polished version will be published elsewhere.


The Institute of Electronics, Information and Communication Engineers (IEICE), Japan