IEICE Technical Report

Print edition: ISSN 0913-5685      Online edition: ISSN 2432-6380

Volume 115, Number 28

Information Security

Workshop Date : 2015-05-15 / Issue Date : 2015-05-08

[PREV] [NEXT]

[TOP] | [2012] | [2013] | [2014] | [2015] | [2016] | [2017] | [2018] | [Japanese] / [English]

[PROGRAM] [BULK PDF DOWNLOAD]


Table of contents

ISEC2015-1
Proposal for Multivariate Public Key Cryptosystem Based on the Difficulty of 3 Prime Numbers Factorization Problem
Shigeo Tsujii, Kohtaro Tadaki, Ryo Fujita, Masahito Gotaishi (Chuo-U)
pp. 1 - 7

ISEC2015-2
Truncated Differential Attack on Block Cipher PRINCE
Satoshi Setoguchi (Kagoshima Univ), Yasutaka Igarashi, Toshinobu Kaneko (Tokyo Univ of Science), Seiji Fukushima, Tomohiro Hachino (Kagoshima Univ)
pp. 9 - 14

ISEC2015-3
Path analysis method of anonymous communication system Tor
Yukihiro Shibahara, Naoshi Sato (IISEC)
pp. 15 - 22

ISEC2015-4
Cheating detectable multi-use password protected secret sharing secure against active adversary
Atsunori Ichikawa, Wakaha Ogata (TIT)
pp. 23 - 30

ISEC2015-5
On the Security of QUIC
Masaya Iseki (titech), Eiichiro Fujisaki (NTT)
pp. 31 - 38

ISEC2015-6
[Invited Talk] All-But-Many Encryption -- A New Framework for Fully-Equipped UC Commitments --
Eiichiro Fujisaki (NTT)
p. 39

ISEC2015-7
[Invited Talk] Black-Box Separations for One-More (Static) Problems and Its Generalization
Jiang Zhang, Zhenfeng Zhang, Yu Chen, Yanfei Guo (CAS), Zongyang Zhang (AIST)
p. 41

ISEC2015-8
[Invited Talk] Order-Preserving Encryption Secure Beyond One-Wayness
Isamu Teranishi (NEC), Moti Yung, Tal Malkin (Columbia Univ.)
p. 43

Note: Each article is a technical report without peer review, and its polished version will be published elsewhere.


The Institute of Electronics, Information and Communication Engineers (IEICE), Japan