Print edition: ISSN 0913-5685 Online edition: ISSN 2432-6380
[TOP] | [2010] | [2011] | [2012] | [2013] | [2014] | [2015] | [2016] | [Japanese] / [English]
ISEC2013-1
Using KCV with CTR Mode and CENC
Kazuma Iki, Tetsu Iwata (Nagoya Univ.)
pp. 1 - 8
ISEC2013-2
Timed-Release Identity-Based Encryption
Toru Oshikiri, Taiichi Saito (Tokyo Denki Univ.)
pp. 9 - 13
ISEC2013-3
Information theoretical analysis of side-channel attack (2)
Hiroaki Mizuno, Keisuke Iwai, Hidema Tanaka, Takakazu Kurokawa (National Defense Academy)
pp. 15 - 22
ISEC2013-4
Car2Cloud Communication Enhanced by In-Vehicle Implicit Asking
Tsutomu Matsumoto, Hikotaro Suzuki, Katsunari Yoshioka (Yokohama National Univ.), Yosuke Maekawa, Hisashi Oguma (TOYOTA InfoTechnology Center)
pp. 23 - 28
ISEC2013-5
A New Class of Public Key Cryptosystems Constructed Based on Reed-Solomon Codes K(XII)SE(1)PKC
Masao Kasahara (Waseda Univ.)
pp. 29 - 34
ISEC2013-6
A Consideration on Pairing Inversion Problem of Pairing Based Cryptography with BN Curve
Yasuyuki Nogami, Yuki Kono, Shoichi Akagi (Okayama Univ.)
pp. 35 - 37
ISEC2013-7
Improvement in Addition formula on Elliptic Curves
Yoshitaka Nagai (Future Univ. Hakodate), Tetsuya Izu (Fujitsu Lab), Masaaki Shirase (Future Univ. Hakodate)
pp. 39 - 46
ISEC2013-8
A Report on ASIACRYPT 2012
Takahiro Matsuda (AIST)
pp. 47 - 50
ISEC2013-9
[Invited Talk]
The Five-Card Trick Can Be Done with Four Cards (from ASIACRYPT 2012)
Takaaki Mizuki (Tohoku Univ.)
p. 51
ISEC2013-10
[Invited Talk]
Investigating Fundamental Security Requirements on Whirlpool: Improved Preimage and Collision Attacks
Yu Sasaki (NTT)
p. 53
Note: Each article is a technical report without peer review, and its polished version will be published elsewhere.