Committee |
Date Time |
Place |
Paper Title / Authors |
Abstract |
Paper # |
ISEC |
2009-12-16 13:00 |
Tokyo |
Kikai-Shinko-Kaikan Bldg. |
The feedback period length of Bijective function Toru Ito (NETCOMSEC) ISEC2009-71 |
Using the pseudo-random series for the period length of the series if they have not been well studied. The bijective fun... [more] |
ISEC2009-71 pp.1-6 |
ISEC |
2009-12-16 13:25 |
Tokyo |
Kikai-Shinko-Kaikan Bldg. |
Beyond the Shannon limit by quantum stream cipher Y-00 and Holevo-Sohma-Hirota theorem
-- General proof -- Osamu Hirota (Tamagawa Univ.) ISEC2009-72 |
One of important problems in cryptography is to prove the existence of a cipher which can break the Shannon limit.
Yue... [more] |
ISEC2009-72 pp.7-14 |
ISEC |
2009-12-16 13:50 |
Tokyo |
Kikai-Shinko-Kaikan Bldg. |
Constructive Codes Achieving the Secrecy Capacity of Wiretap Channels Mitsuru Hamada (Tamagawa Univ.) ISEC2009-73 |
[more] |
ISEC2009-73 pp.15-22 |
ISEC |
2009-12-16 14:15 |
Tokyo |
Kikai-Shinko-Kaikan Bldg. |
On Viterbi search for the maximum differential characteristic probability of a cipher with certain Feistel structure Yasutaka Igarashi, Toshinobu Kaneko (Tokyo Univ. of Science) ISEC2009-74 |
We study a Viterbi search for the maximum differential characteristic probability ($DCP_{max}$) of a symmetric-key ciphe... [more] |
ISEC2009-74 pp.23-27 |
ISEC |
2009-12-16 14:55 |
Tokyo |
Kikai-Shinko-Kaikan Bldg. |
Electro Magnetic Analysis and Local Information of Cryptographic Hardware Hidekazu Morita, Yoshio Takahashi, Tsutomu Matsumoto, Junji Shikata (Yokohama National Univ.)) ISEC2009-75 |
We have analyzed local information obtained by measuring electromagnetic waves radiated from multiple places on a FPGA i... [more] |
ISEC2009-75 pp.29-35 |
ISEC |
2009-12-16 15:20 |
Tokyo |
Kikai-Shinko-Kaikan Bldg. |
GLV Method for Non-Supersingular Paring-Friendly Curves of Embedding Degree 1 Shoichi Takeuchi, Tetsuya Izuta, Yumi Sakemi, Kazushi Nishii, Yasuyuki Nogami, Yoshitaka Morikawa (Okayama Univ.) ISEC2009-76 |
Recently, some pairing-based cryptographies that uses a non-supersingular pairing-friendly curve whose order has large p... [more] |
ISEC2009-76 pp.37-41 |
ISEC |
2009-12-16 15:45 |
Tokyo |
Kikai-Shinko-Kaikan Bldg. |
A Construction Method of Basis Conversion Matrix by Using Small Multiplicative Group for Cryptographic Applications Hidehiro Kato, Yasuyuki Nogami (Okayama Univ.), Satoshi Uehara (The Univ. of Kitakyushu), Yoshitaka Morikawa (Okayama Univ.) ISEC2009-77 |
Several methods for finding a basis conversion matrix between two different bases in extension field F_{p^m}... [more] |
ISEC2009-77 pp.43-50 |
ISEC |
2009-12-16 16:10 |
Tokyo |
Kikai-Shinko-Kaikan Bldg. |
Improvement of the Internal Perturbation Modifier
-- An example of Perturbed Matsumoto-Imai -- Masahito Gotaishi, Shigeo Tsujii (Chuo Univ.) ISEC2009-78 |
Internal Perturbation is among the modifiers of Multivariate Public Key Cryptosystems designed to reinforce the existing... [more] |
ISEC2009-78 pp.51-55 |
ISEC |
2009-12-16 16:35 |
Tokyo |
Kikai-Shinko-Kaikan Bldg. |
Redesigning of a role hierarchy for role-based access control Yoshiharu Asakura (NEC/Univ. of Hyogo), Yukikazu Nakamoto (Univ. of Hyogo) ISEC2009-79 |
Role-based access control (RBAC) is widely used as an access control mechanism in various computer systems. A role graph... [more] |
ISEC2009-79 pp.57-63 |