IEICE Technical Report

Print edition: ISSN 0913-5685      Online edition: ISSN 2432-6380

Volume 116, Number 207

Information Security

Workshop Date : 2016-09-02 / Issue Date : 2016-08-26

[PREV] [NEXT]

[TOP] | [2013] | [2014] | [2015] | [2016] | [2017] | [2018] | [2019] | [Japanese] / [English]

[PROGRAM] [BULK PDF DOWNLOAD]


Table of contents

ISEC2016-38
A Note on Secure Execution of Random Bisection Cut
Itaru Ueda, Akihiro Nishimura (Tohoku Univ.), Yu-ichi Hayashi (Tohoku Gakuin Univ.), Takaaki Mizuki, Hideaki Sone (Tohoku Univ.)
pp. 1 - 7

ISEC2016-39
Bundling Proofs of Knowledge and its Application to Signatures
Hiroaki Anada (Univ. Nagasaki), Seiko Arita (IISEC)
pp. 9 - 14

ISEC2016-40
[Invited Talk] Constant-round Leakage-resilient Zero-knowledge from Collision Resistance (from EUROCRYPT 2016)
Susumu Kiyoshima (NTT)
p. 15

ISEC2016-41
[Invited Talk] Anonymous Traitor Tracing: How to Embed Arbitrary Information in a Key (from Eurocrypt 2016)
Ryo Nishimaki (NTT), Daniel Wichs (NEU), Mark Zhandry (Princeton)
p. 17

ISEC2016-42
A New Class of Public Key Cryptosystems Constructed Based on Cyclic Codes, K(XVII)SE(1)PKC, along with Revisit to K(AII)Scheme and Proposals of K(AII・V)?ΠPKC
Masao Kasahara (21CICRC)
pp. 19 - 26

ISEC2016-43
An Homomorphic Encryption based on some kind of Indeterminate Equations
Koichiro Akiyama (Toshiba), Yasuhiro Goto (HUE), Shinya Okumura (ISIT), Tsuyoshi Takagi (Kyushu Univ.), Koji Nuida, Goichiro Hanaoka (AIST)
pp. 27 - 34

ISEC2016-44
(See Japanese page.)
pp. 35 - 42

ISEC2016-45
Tamper Resistant Software utilizing Data Memory
Kazuomi Oishi (SIST)
pp. 43 - 48

ISEC2016-46
Implementation of security evaluation function on a Development Environment of Cryptography using GUI
Toshihiro Nakamura, Keisuke Iwai, Takashi Matsubara, Takakazu Kurokawa (NDA)
pp. 49 - 56

ISEC2016-47
[Invited Talk] Security estimation for lattice based cryptosystems by progressive BKZ algorithm (From Eurocrypt 2016)
Yoshinori Aono (NICT), Yuntao Wang (Kyushu Univ.), Takuya Hayashi (NICT), Tsuyoshi Takagi (Kyushu Univ.)
p. 57

ISEC2016-48
[Invited Talk] Adaptively Secure Identity-Based Encryption Scheme from Lattices with Asymptotically Shorter Public Parameters
Shota Yamada (AIST)
p. 59

ISEC2016-49
[Invited Talk] On the Influence of Message Length in PMAC's Security Bounds (from Eurocrypt 2016)
Kan Yasuda (NTT)
p. 61

Note: Each article is a technical report without peer review, and its polished version will be published elsewhere.


The Institute of Electronics, Information and Communication Engineers (IEICE), Japan