Committee |
Date Time |
Place |
Paper Title / Authors |
Abstract |
Paper # |
ISEC |
2013-05-23 12:55 |
Tokyo |
Kikai-Shinko-Kaikan Bldg. |
Using KCV with CTR Mode and CENC Kazuma Iki, Tetsu Iwata (Nagoya Univ.) ISEC2013-1 |
[more] |
ISEC2013-1 pp.1-8 |
ISEC |
2013-05-23 13:20 |
Tokyo |
Kikai-Shinko-Kaikan Bldg. |
Timed-Release Identity-Based Encryption Toru Oshikiri, Taiichi Saito (Tokyo Denki Univ.) ISEC2013-2 |
Timed-Release Encrtption(TRE) is an encryption mechanism that allows a reciever to decrypt a ciphertext only after the t... [more] |
ISEC2013-2 pp.9-13 |
ISEC |
2013-05-23 13:45 |
Tokyo |
Kikai-Shinko-Kaikan Bldg. |
Information theoretical analysis of side-channel attack (2) Hiroaki Mizuno, Keisuke Iwai, Hidema Tanaka, Takakazu Kurokawa (National Defense Academy) ISEC2013-3 |
In the evaluation of side-channel resistance, it is argued how many observation of physical phenomena which is caused by... [more] |
ISEC2013-3 pp.15-22 |
ISEC |
2013-05-23 14:10 |
Tokyo |
Kikai-Shinko-Kaikan Bldg. |
Car2Cloud Communication Enhanced by In-Vehicle Implicit Asking Tsutomu Matsumoto, Hikotaro Suzuki, Katsunari Yoshioka (Yokohama National Univ.), Yosuke Maekawa, Hisashi Oguma (TOYOTA InfoTechnology Center) ISEC2013-4 |
When implementing advanced automotive services in cooperation with external data centers, it is very important to ensure... [more] |
ISEC2013-4 pp.23-28 |
ISEC |
2013-05-23 14:45 |
Tokyo |
Kikai-Shinko-Kaikan Bldg. |
A New Class of Public Key Cryptosystems Constructed Based on Reed-Solomon Codes K(XII)SE(1)PKC Masao Kasahara (Waseda Univ.) ISEC2013-5 |
[more] |
ISEC2013-5 pp.29-34 |
ISEC |
2013-05-23 15:10 |
Tokyo |
Kikai-Shinko-Kaikan Bldg. |
A Consideration on Pairing Inversion Problem of Pairing Based Cryptography with BN Curve Yasuyuki Nogami, Yuki Kono, Shoichi Akagi (Okayama Univ.) ISEC2013-6 |
[more] |
ISEC2013-6 pp.35-37 |
ISEC |
2013-05-23 15:35 |
Tokyo |
Kikai-Shinko-Kaikan Bldg. |
Improvement in Addition formula on Elliptic Curves Yoshitaka Nagai (Future Univ. Hakodate), Tetsuya Izu (Fujitsu Lab), Masaaki Shirase (Future Univ. Hakodate) ISEC2013-7 |
It is important to speed up scalar multiplication in elliptic curve cryptosystem and then various speeding-up techniques... [more] |
ISEC2013-7 pp.39-46 |
ISEC |
2013-05-23 16:10 |
Tokyo |
Kikai-Shinko-Kaikan Bldg. |
A Report on ASIACRYPT 2012 Takahiro Matsuda (AIST) ISEC2013-8 |
ASIACRYPT 2012 (The 18th International Conference on Theory and Application of Cryptology and Information Security) was ... [more] |
ISEC2013-8 pp.47-50 |
ISEC |
2013-05-23 16:35 |
Tokyo |
Kikai-Shinko-Kaikan Bldg. |
[Invited Talk]
The Five-Card Trick Can Be Done with Four Cards (from ASIACRYPT 2012) Takaaki Mizuki (Tohoku Univ.) ISEC2013-9 |
In this invited talk, we introduce the paper, ``The Five-Card Trick Can Be Done with Four Cards,'' by T. Mizuki, M. Kuma... [more] |
ISEC2013-9 p.51 |
ISEC |
2013-05-23 17:05 |
Tokyo |
Kikai-Shinko-Kaikan Bldg. |
[Invited Talk]
Investigating Fundamental Security Requirements on Whirlpool: Improved Preimage and Collision Attacks Yu Sasaki (NTT) ISEC2013-10 |
[more] |
ISEC2013-10 p.53 |