Print edition: ISSN 0913-5685 Online edition: ISSN 2432-6380
[TOP] | [2009] | [2010] | [2011] | [2012] | [2013] | [2014] | [2015] | [Japanese] / [English]
ISEC2012-72
Notes on Secure and Smooth Typing Password Generation Method using Markov Process
Takuto Tamai, Hiroyuki Inaba (Kyoto Inst. of Technology)
pp. 1 - 6
ISEC2012-73
An Extention of Reputation System with Secrecy for Negative Feedbacks
Tomoya Nomura, Toru Nakanishi, Kan Watanabe, Nobuo Funabiki (Okayama Univ.)
pp. 7 - 13
ISEC2012-74
Implementation and Evaluation of a Method for Preventing Unauthorized Data Transmission
Masato Hata, Masato Tanabe, Katsunari Yoshioka, Tsutomu Matsumoto (Yokohama National Univ.)
pp. 15 - 22
ISEC2012-75
Generating elliptic curves having efficient endomorphisms suitable for pairing computation and scalar multiplication
Naoki Kanayama, Eiji Okamoto, Kazutaka Saito (Univ. of Tsukuba)
pp. 23 - 28
ISEC2012-76
The YNU's Method for Acquiring Power-Consumption Traces Developed for DPA Contest v3
Tsutomu Matsumoto, Takeshi Kishikawa, Hitoshi Ono, Shohei Saito, Yuu Tsuchiya (Yokohama Nat'l Univ.), Akihiko Sasaki (MORITA TECH), Tsuyoshi Toyama (Yokohama Nat'l Univ.)
pp. 29 - 36
ISEC2012-77
A Report on CRYPTO 2012
Shiho Moriai (NICT)
pp. 37 - 39
ISEC2012-78
[Invited Talk]
Breaking and Repairing GCM Security Proofs (from CRYPTO 2012)
Tetsu Iwata, Keisuke Ohashi (Nagoya Univ.), Kazuhiko Minematsu (NEC)
p. 41
ISEC2012-79
[Invited Talk]
On the Impossibility of Constructing Efficient Key Encapsulation and Programmable Hash Functions in Prime Order Groups
Goichiro Hanaoka, Takahiro Matsuda (AIST), Jacob Schuldt (RHUL)
p. 43
Note: Each article is a technical report without peer review, and its polished version will be published elsewhere.