Fri, May 13 PM 13:30 - 17:05 |
(1) |
13:30-13:55 |
Revisited: Security of multivariate polynomial signatures over non-commutative rings |
Takanori Yasuda (ISIT), Kouichi Sakurai (Kyushu Univ.) |
(2) |
13:55-14:20 |
A note on the reduction of the size of keys of Rainbow |
Takanori Yasuda (ISIT), Kouichi Sakurai, Tsuyoshi Takagi (Kyushu Univ.) |
(3) |
14:20-14:45 |
Fast Implementation and Experimentation of Multivariate Polynomial Cryptosystems on GPU |
Satoshi Tanaka, Kouichi Sakurai (Kyushu Univ.) |
(4) |
14:45-15:10 |
What is the Information ?
-- A Case of Disaster Information to be Processed in Logical Network Layer to Generate Direct Actions -- |
Kimiaki Tokumaru (System Engineer) |
|
15:10-15:25 |
Break ( 15 min. ) |
(5) |
15:25-15:50 |
On the Impossibility of $d$-Multiplicative Non-perfect Secret Sharing |
Maki Yoshida, Toru Fujiwara (Osaka Univ.) |
(6) |
15:50-16:15 |
Order of Elliptic Curve $y^2=x^3+2^i3^j$ Over Barreto-Naehrig Field |
Masaaki Shirase (FUN) |
(7) |
16:15-16:40 |
S-box Design with Variable Operation Parameters |
Eiji Fukutomi, Masahiro Fukumoto (KUT) |
(8) |
16:40-17:05 |
A Study on Side Channel Cryptanalysis of RSA Hardware Focused on Operands for Multiple-precision Multiplication |
Takeshi Kishikawa, Tsutomu Matsumoto (YNU) |