Wed, Dec 17 AM 10:20 - 12:00 |
(1) |
10:20-10:45 |
Measure of failure for the company infrastructure |
Koichiro Ozasa, Satoshi Ono (Kogakuin Univ.) |
(2) |
10:45-11:10 |
Web Server Software Struture for Scalability |
Haruki Mori, Satoshi Ono (Kogakuin Univ.) |
(3) |
11:10-11:35 |
Access management method for Least Privilege implementation By the identity federation cross-organizations |
Takahito Motojima, Satoshi Ono (kogakuin univ) |
(4) |
11:35-12:00 |
Negotiate the Trust built in The Internet |
Takashi Hosokawa, Satoshi Ono (Kogakuin Univ.) |
Wed, Dec 17 PM 13:00 - 16:35 |
(5) |
13:00-13:25 |
Self-construction of Home Domain by Using Entry Device List |
Sho Ikeyama, Yoshihiro Hori, Yoshiaki Shiraishi, Akira Iwata (NIT) |
(6) |
13:25-13:50 |
A Masquerade Detecting Method Based On the TF-IDF Model |
Geng Dai, Zhou Jian, Haruhiko Shirai, Jousuke Kuroiwa, Tomohiro Odaka, Hisakazu Ogura (Fukui Univ) |
(7) |
13:50-14:15 |
On Security and Constructibility of Linear Quotient Codes for Quantum Cryptography |
Mitsuru Hamada (Tamagawa Univ.) |
(8) |
14:15-14:40 |
A Knapsack Cryptosystem Resisting Wellknown Attacks |
Kunikatsu Kobayashi (Yamagata Univ,) |
|
14:40-14:55 |
Break ( 15 min. ) |
(9) |
14:55-15:20 |
Cryptosystems on Algebraic Tori
-- Some Efficient Algorithms for Squaring -- |
Tomoko Yonemura, Kenichiro Furuta, Yoshikazu Hanatani, Taichi Isogai, Yuichi Komano, Hirofumi Muratani, Hanae Nozaki, Kenji Ohkuma, Atsushi Shimbo (Toshiba Corp.) |
(10) |
15:20-15:45 |
Fast Exponentiation Methods for Cryptosystems on Algebraic Tori |
Taichi Isogai, Kenji Ohkuma, Yuichi Komano, Atsushi Shimbo, Hanae Nozaki, Yoshikazu Hanatani, Kenichiro Furuta, Hirofumi Muratani, Tomoko Yonemura (Toshiba) |
(11) |
15:45-16:10 |
Construction of the experiment environment for the CPA attack |
Daisaku Minamizaki, Keisuke Iwai, Takakazu Kurokawa (NDA) |
(12) |
16:10-16:35 |
Power Analysis against a FPGA Implementation of the AES with SubBytes in a memory table |
Hiroyuki Kawakita, Yusei Nishimoto, Kiyohiko Ishikawa, Hiroyuki Imaizumi (NHK) |