Thu, Mar 9 ISEC (1) Chair: Atsushi Fujioka (Kanagawa Univ.) 10:25 - 11:15 |
(1) |
10:25-10:50 |
A Note on Key Dependency of Stream Cipher Grain v1 |
Satoshi Kidokoro (Tokai Univ.), Takanori Isobe (Kobe Univ.), Toshihiro Ohigashi (Tokai Univ.) |
(2) |
10:50-11:15 |
The Security of 3-Round RSA-OAEP against Related-Key Attacks |
Gembu Ito, Hiraku Morita, Tetsu Iwata (Nagoya Univ.) |
|
11:15-11:25 |
Break ( 10 min. ) |
Thu, Mar 9 Invited Talk (1) Chair: Masahiro Mambo (Kanazawa Univ.) 11:25 - 12:15 |
(3) |
11:25-12:15 |
[Invited Talk]
Recent Advances in Whitebox Cryptgraphy
-- Efficient and Robust Constructions and New Attacks -- |
Takanori Isobe (Sony Global M&O Corp.) |
|
12:15-13:35 |
Lunch Break ( 80 min. ) |
Thu, Mar 9 ISEC (2) Chair: Eiichiro Fujisaki (NTT) 13:35 - 14:50 |
(4) |
13:35-14:00 |
A consideration of Meet-in-the-middle Attack for Multiple Encryption Algorithm |
Yohei Maezawa, Munetoshi Iwakiri (NDA) |
(5) |
14:00-14:25 |
Security Analysis of Ordinary Isogeny Diffie--Hellman |
Satoshi Furukawa, Atsushi Takayasu, Noboru Kunihiro (The Univ. of Tokyo) |
(6) |
14:25-14:50 |
Elliptic Curves Subjected to the GHS Attack on Composite Degree Extension Fields of Odd Characteristic Part II |
Tappei Kobayashi (Chuo Univ.), Tsutomu Iijima (Koden Electronics), Jinhui Chao (Chuo Univ.) |
Thu, Mar 9 IT (1) 13:35 - 14:50 |
(7) |
13:35-14:00 |
On the Design of Locally Repairable Codes Based on Code Modification |
Hiroto Tamiya (Kobe Univ.), Masanori Hirotomo (Saga Univ.), Masakatu Morii (Kobe Univ.) |
(8) |
14:00-14:25 |
Sphere packing bound and Gilbert-Varshamov bound for b-symbol read channels |
Seunghoan Song, Toru Fujiwara (Osaka Univ.) |
(9) |
14:25-14:50 |
Trellis Reduction for Tail-Biting Convolutional Codes Using Characteristic Matrices and Cyclically Shifted Code-Subsequences |
Masato Tajima |
|
14:50-15:00 |
Break ( 10 min. ) |
Thu, Mar 9 ISEC (3) Chair: Masaaki Shirase (FUN) 15:00 - 16:40 |
(10) |
15:00-15:25 |
Security evaluation of elliptic curve cryptosystems with special addition formula(2) |
Ryohei Morishima (Osaka Univ.), Atsuko Miyaji (Osaka Univ./JAIST) |
(11) |
15:25-15:50 |
Security evaluation of elliptic curve cryptosystems with special addition formula |
Kodera Kenta (Osaka Univ.), Miyaji Atsuko (Osaka Univ./JAIST), Cheng Chen-Mou (Osaka Univ.) |
(12) |
15:50-16:15 |
Construction of covering curves of elliptic curves over finite fields of even characteristic using simple extension |
Seiya Kukisaki (Chuo Univ.), Mahoro Simura (Tokai Univ.), Jinhui Chao (Chuo Univ.) |
(13) |
16:15-16:40 |
Construction of (2,...,2) coverings over projective line from elliptic curves over prime degree extension fields of even characteristic. |
Takuya Morishita (Chuo Univ.), Mahoro Shimura (Tokai Univ.), Jinhui Chao (Chuo Univ.) |
Thu, Mar 9 WBS (1) 15:00 - 16:40 |
(14) |
15:00-15:25 |
A study on delay profile measurements using MB-OFDM-UWB signal and cross-correlation |
Takuya Okamoto, Tetsushi Ikegami (Meiji Univ.) |
(15) |
15:25-15:50 |
Multiuser Performance Evaluation on Square-law Detection DS-UWB-IR using Modified Pseudo-orthogonal M-sequence |
Takuma Matsumura, Hiromasa Habuchi (Ibaraki Univ.) |
(16) |
15:50-16:15 |
PAPR Reduction Scheme for OFCDM Using Code Shift Keying |
Yuki Hosokawa, Hiromasa Habuchi (Ibaraki Univ.) |
(17) |
16:15-16:40 |
Different Orthogonal Code DS/CDMA with High Spectral Efficiency and Evaluations by Interference Cancellation Using Indoor Radio Wave Intensity Distriburtion |
Hirofumi Nakajo, Shin'ichi Tachikawa (NIT, Nagaoka) |
|
16:40-16:50 |
Break ( 10 min. ) |
Thu, Mar 9 Invited Talk (2) 16:50 - 17:40 |
(18) |
16:50-17:40 |
[Invited Talk]
On the Wyner-Ziv Coding Problem with Delayed Side Information |
Tetsunao Matsuta, Tomohiko Uyematsu (Tokyo Tech) |
Fri, Mar 10 ISEC (4) Chair: Kazuto Ogawa (NHK) 09:35 - 12:35 |
(19) |
09:35-10:00 |
Anonymous Oblivious RAM for Multi-user Environment |
Satoru Takano, Su Chunhua, Atuko Miyaji (Osaka Univ.) |
(20) |
10:00-10:25 |
A study of secure multi-party set union protocol |
Katsunari Shishido, Atsuko Miyaji (OU) |
(21) |
10:25-10:50 |
Obfuscation of Symmetric Key Cryptography using Linear Obfuscation |
Gavin Lynn Stewart (JAIST), Yuichi Futa (TUT), Atsuko Miyaji (JAIST/Osaka Univ.) |
|
10:50-11:20 |
Break ( 30 min. ) |
(22) |
11:20-11:45 |
Software Protection by Hash-Table-Based Interlocking of Self Integrity Verification |
Naoki Watanabe, Naoki Yoshida, Tsutomu Matsumoto (YNU) |
(23) |
11:45-12:10 |
Diagonally Witness-Indistinguishable Proof Systems |
Hiroaki Anada (Univ. Nagasaki), Seiko Arita (IISEC) |
(24) |
12:10-12:35 |
Provable Secure Signature Scheme against Quantum Adversaries based on Decisional Isomorphism of Polynomials with Two Secrets |
Bagus Santoso (UEC) |
Fri, Mar 10 IT (2) 10:55 - 12:35 |
(25) |
10:55-11:20 |
Studies on evaluationg system for q-ary linear block codes based on q-input r-output symmetric channels(2) |
Kyoshiro Furuya, Kazuhiko Yamaguchi (UEC) |
(26) |
11:20-11:45 |
MRI Acceleration by Super Resolution |
Ayaka Nakashima, Masanori Kawakita, Yutaka Jitsumatsu (Kyushu Univ.), Shigehide Kuhara (Kyorin Univ.), Jun'ichi Takeuchi (Kyushu Univ.) |
(27) |
11:45-12:10 |
BER Prediction of Convolutional Coded OFDM Transmission with Application to IEEE 802.11 Wireless LAN |
Norisato Suga, Naoto Egashira, Kazuto Yano, Tomoaki Kumagai (ATR) |
(28) |
12:10-12:35 |
Overflow Probability of Variable-Length Codes Allowing Non-Vanishing Error Probability |
Ryo Nomura (Senshu Univ.), Hideki Yagi (Univ. of Electro-Comm.) |
|
12:35-13:45 |
Lunch Break ( 70 min. ) |
Fri, Mar 10 ISEC (5) Chair: Ryuichi Sakai (OECU) 13:45 - 15:00 |
(29) |
13:45-14:10 |
Notes on a new fundamental scheme K(V)Scheme for constructing secure product-sum PKC, K(V) ΣΠPKC and multivariate PKC, K(V)MVPKC |
Masao Kasahara (Waseda Univ.) |
(30) |
14:10-14:35 |
A Note on Acceptable Information Leakage of Searchable Symmetric Encryption |
Takeshi Nakai, Takuya Nojima, Mitsugu Iwamoto, Kazuo Ohta (UEC) |
(31) |
14:35-15:00 |
Efficient Verifiable Attribute-Based Keyword Search |
Go Ohtake (NHK), Reihaneh Safavi-Naini (Univ. of Calgary), Liang Feng Zhang (ShanghaiTech Univ.) |
Fri, Mar 10 IT (3) 13:45 - 15:00 |
(32) |
13:45-14:10 |
Index Coding with Information-Theoretic Secrecy for Unintended Message |
Mami Takei, Hiroki Koga (Univ. Tsukuba) |
(33) |
14:10-14:35 |
Spectrum Sensing in Cooperative with Some Secondary Users |
Yuki Muranaka, Ryutaroh Matsumoto, Tetsunao Matsuta, Tomohiko Uyematsu (Tokyo Tech) |
(34) |
14:35-15:00 |
Quantum Stabilizer Codes Can Realize Access Structures Impossible by Classical Secret Sharing |
Ryutaroh Matsumoto (Tokyo Tech.) |
|
15:00-15:10 |
Break ( 10 min. ) |
Fri, Mar 10 ISEC (6) Chair: Yuuji Suga (IIJ) 15:10 - 16:25 |
|
- |
|
(35) |
15:35-16:00 |
Secret Sharing Schemes using Modulo-2^m Operations |
Hidenori Kuwakado (Kansai Univ.) |
(36) |
16:00-16:25 |
Development of Security Incident Symptomatic Analysis function in SIAS |
Mitsumu Katsuno, Hiroki Sakamoto, Hiroyuki Ookawa, Takashi Yamaguchi, Eiji Nunohiro (TUIS), Akira Orita, Tatsuya Sekiguchi (HISYS.ISR) |
Fri, Mar 10 WBS (2) 15:10 - 16:25 |
(37) |
15:10-15:35 |
Performance of Error Correcting Codes for RGB-LED Parallel Transmission |
Ran Sun, Hiromasa Habuchi, Yusuke Kozawa (Ibaraki Univ.) |
(38) |
15:35-16:00 |
Impact of Multi-Path Reflection on the Visible-Light Variable N-parallel Code-Shift Keying utilizing Modified Prime Sequence Code |
Keisuke Osawa, Hiromasa Habuchi, Yusuke Kozawa (Ibaraki Univ.) |
(39) |
16:00-16:25 |
A Study on Relay Communication using UAV with Buffer |
Higashi Takahiro, Ochiai Hideki (Yokohama National Univ.) |
|
16:25-16:35 |
Break ( 10 min. ) |
Fri, Mar 10 Invited Talk (3) 16:35 - 17:25 |
(40) |
16:35-17:25 |
[Invited Talk]
A Survey on Space-, Time-, and Frequency-Domain Index Modulation |
Shinya Sugiura (TUAT) |