IEICE Technical Report

Print edition: ISSN 0913-5685      Online edition: ISSN 2432-6380

Volume 116, Number 380

Information Security

Workshop Date : 2016-12-21 - 2016-12-22 / Issue Date : 2016-12-14

[PREV] [NEXT]

[TOP] | [2013] | [2014] | [2015] | [2016] | [2017] | [2018] | [2019] | [Japanese] / [English]

[PROGRAM] [BULK PDF DOWNLOAD]


Table of contents

ISEC2016-70
Improvements of Blacklistable Anonymous Credential System Using Accumulator
Yuu Aikou, Toru Nakanishi (Hiroshima Univ)
pp. 1 - 7

ISEC2016-71
A note on security notions of anonymity in Identity-based encryption
Honomu Ootomo, Taroh Sasaki, Atsushi Fujioka (Kanagawa Univ.)
pp. 9 - 13

ISEC2016-72
[Invited Talk] New frontier of machine learning and computation initiated by quantum annealing
Masayuki Ohzeki (Tohoku Univ.)
pp. 15 - 22

ISEC2016-73
[Invited Talk] Fast and Scalable Bilinear-Type Conversion Using Integer Programming
Fumitaka Hoshino, Masayuki Abe (NTT), Miyako Ohkubo (NICT)
p. 23

ISEC2016-74
[Invited Talk] Cryptanalysis of GGH15 Multilinear Maps (from CRYPTO 2016)
Mehdi Tibouchi (NTT)
p. 25

ISEC2016-75
[Invited Talk] Backdoors in Pseudorandom Number Generators: Possibility and Impossibility Results
Jean Paul Degabriele, Kenneth Paterson (RHUL), Jacob Schuldt (AIST), Joanne Woodage (RHUL)
p. 27

ISEC2016-76

Miki Miyauchi (NTT)
pp. 29 - 35

ISEC2016-77
(See Japanese page.)
pp. 37 - 42

ISEC2016-78
A Loosely-Stabilizing Population Protocol for Maximal Independent Set
Seiken Kiyosu, Yuichi Sudo, Hirotsugu Kakugawa, Toshimitsu Masuzawa (Osaka Univ.)
pp. 43 - 49

ISEC2016-79
Theoretical Model of Interconnection Networks Consisting of Hosts and Switches
Ryota Yasudo (Keio Univ.), Michihiro Koibuchi (NII), Hideharu Amano (Keio Univ.), Koji Nakano (Hiroshima Univ.)
pp. 51 - 58

ISEC2016-80
Effect on Mix Columns to the Security of Minalpher
Yuki Kishi, Taroh Sasaki, Atsushi Fujioka (Kanagawa Univ)
pp. 59 - 62

ISEC2016-81
Reconsideration on Re-keying scheme from CARDIS 2015 (part 2)
Yuichi Komano (Toshiba)
pp. 63 - 69

ISEC2016-82
[Invited Talk] Theory and Practice of Succinct Data Structures
Kunihiko Sadakane (Univ. of Tokyo)
p. 71

ISEC2016-83
[Invited Talk] Adversary-dependent Lossy Trapdoor Function from Hardness of Factoring Semi-smooth RSA Subgroup
Takashi Yamakawa (UT), Shota Yamada, Goichiro Hanaoka (AIST), Noboru Kunihiro (UT)
p. 73

ISEC2016-84
[Invited Talk] Extended Tower Number Field Sieve: A New Complexity for the Medium Prime Case (from CRYPTO 2015)
Taechan Kim (NTT)
p. 75

ISEC2016-85
[Invited Talk] The SKINNY Family of Block Ciphers and its Low-Latency Variant MANTIS
Yu Sasaki (NTT)
p. 77

ISEC2016-86
[Invited Talk] How small can the diameter of an undirected graph be? -- Toward low-latency large-scale interconnection networks --
Ikki Fujiwara (NICT)
p. 79

ISEC2016-87
Reduction of Search Number for Equivalence Structure Extraction Under Equivalence Structure Conservation Assumption
Seiya Satoh (AIST), Yoshinobu Takahashi (University of Electro-Communications), Hiroshi Yamakawa (Dwango AI Lab)
pp. 81 - 86

ISEC2016-88
Improvement of Finger Outlines Extraction in Hand Images Including Unusual Patterns with a Color Glove
Kotaro Moriuchi, Noriaki Fujishima (NIT, Matsue College)
pp. 87 - 91

Note: Each article is a technical report without peer review, and its polished version will be published elsewhere.


The Institute of Electronics, Information and Communication Engineers (IEICE), Japan