Print edition: ISSN 0913-5685 Online edition: ISSN 2432-6380
[TOP] | [2013] | [2014] | [2015] | [2016] | [2017] | [2018] | [2019] | [Japanese] / [English]
ISEC2016-38
A Note on Secure Execution of Random Bisection Cut
Itaru Ueda, Akihiro Nishimura (Tohoku Univ.), Yu-ichi Hayashi (Tohoku Gakuin Univ.), Takaaki Mizuki, Hideaki Sone (Tohoku Univ.)
pp. 1 - 7
ISEC2016-39
Bundling Proofs of Knowledge and its Application to Signatures
Hiroaki Anada (Univ. Nagasaki), Seiko Arita (IISEC)
pp. 9 - 14
ISEC2016-40
[Invited Talk]
Constant-round Leakage-resilient Zero-knowledge from Collision Resistance (from EUROCRYPT 2016)
Susumu Kiyoshima (NTT)
p. 15
ISEC2016-41
[Invited Talk]
Anonymous Traitor Tracing: How to Embed Arbitrary Information in a Key (from Eurocrypt 2016)
Ryo Nishimaki (NTT), Daniel Wichs (NEU), Mark Zhandry (Princeton)
p. 17
ISEC2016-42
A New Class of Public Key Cryptosystems Constructed Based on Cyclic Codes, K(XVII)SE(1)PKC, along with Revisit to K(AII)Scheme and Proposals of K(AII・V)?ΠPKC
Masao Kasahara (21CICRC)
pp. 19 - 26
ISEC2016-43
An Homomorphic Encryption based on some kind of Indeterminate Equations
Koichiro Akiyama (Toshiba), Yasuhiro Goto (HUE), Shinya Okumura (ISIT), Tsuyoshi Takagi (Kyushu Univ.), Koji Nuida, Goichiro Hanaoka (AIST)
pp. 27 - 34
ISEC2016-44
(See Japanese page.)
pp. 35 - 42
ISEC2016-45
Tamper Resistant Software utilizing Data Memory
Kazuomi Oishi (SIST)
pp. 43 - 48
ISEC2016-46
Implementation of security evaluation function on a Development Environment of Cryptography using GUI
Toshihiro Nakamura, Keisuke Iwai, Takashi Matsubara, Takakazu Kurokawa (NDA)
pp. 49 - 56
ISEC2016-47
[Invited Talk]
Security estimation for lattice based cryptosystems by progressive BKZ algorithm (From Eurocrypt 2016)
Yoshinori Aono (NICT), Yuntao Wang (Kyushu Univ.), Takuya Hayashi (NICT), Tsuyoshi Takagi (Kyushu Univ.)
p. 57
ISEC2016-48
[Invited Talk]
Adaptively Secure Identity-Based Encryption Scheme from Lattices with Asymptotically Shorter Public Parameters
Shota Yamada (AIST)
p. 59
ISEC2016-49
[Invited Talk]
On the Influence of Message Length in PMAC's Security Bounds (from Eurocrypt 2016)
Kan Yasuda (NTT)
p. 61
Note: Each article is a technical report without peer review, and its polished version will be published elsewhere.