IEICE Technical Report

Print edition: ISSN 0913-5685      Online edition: ISSN 2432-6380

Volume 113, Number 53

Information Security

Workshop Date : 2013-05-23 / Issue Date : 2013-05-16

[PREV] [NEXT]

[TOP] | [2010] | [2011] | [2012] | [2013] | [2014] | [2015] | [2016] | [Japanese] / [English]

[PROGRAM] [BULK PDF DOWNLOAD]


Table of contents

ISEC2013-1
Using KCV with CTR Mode and CENC
Kazuma Iki, Tetsu Iwata (Nagoya Univ.)
pp. 1 - 8

ISEC2013-2
Timed-Release Identity-Based Encryption
Toru Oshikiri, Taiichi Saito (Tokyo Denki Univ.)
pp. 9 - 13

ISEC2013-3
Information theoretical analysis of side-channel attack (2)
Hiroaki Mizuno, Keisuke Iwai, Hidema Tanaka, Takakazu Kurokawa (National Defense Academy)
pp. 15 - 22

ISEC2013-4
Car2Cloud Communication Enhanced by In-Vehicle Implicit Asking
Tsutomu Matsumoto, Hikotaro Suzuki, Katsunari Yoshioka (Yokohama National Univ.), Yosuke Maekawa, Hisashi Oguma (TOYOTA InfoTechnology Center)
pp. 23 - 28

ISEC2013-5
A New Class of Public Key Cryptosystems Constructed Based on Reed-Solomon Codes K(XII)SE(1)PKC
Masao Kasahara (Waseda Univ.)
pp. 29 - 34

ISEC2013-6
A Consideration on Pairing Inversion Problem of Pairing Based Cryptography with BN Curve
Yasuyuki Nogami, Yuki Kono, Shoichi Akagi (Okayama Univ.)
pp. 35 - 37

ISEC2013-7
Improvement in Addition formula on Elliptic Curves
Yoshitaka Nagai (Future Univ. Hakodate), Tetsuya Izu (Fujitsu Lab), Masaaki Shirase (Future Univ. Hakodate)
pp. 39 - 46

ISEC2013-8
A Report on ASIACRYPT 2012
Takahiro Matsuda (AIST)
pp. 47 - 50

ISEC2013-9
[Invited Talk] The Five-Card Trick Can Be Done with Four Cards (from ASIACRYPT 2012)
Takaaki Mizuki (Tohoku Univ.)
p. 51

ISEC2013-10
[Invited Talk] Investigating Fundamental Security Requirements on Whirlpool: Improved Preimage and Collision Attacks
Yu Sasaki (NTT)
p. 53

Note: Each article is a technical report without peer review, and its polished version will be published elsewhere.


The Institute of Electronics, Information and Communication Engineers (IEICE), Japan