Fri, Sep 7 AM 09:00 - 12:05 |
(1) |
09:00-09:25 |
An Extension of Fast Threshold Schemes Using XOR Operations (1) |
Jun Kurihara, Shinsaku Kiyomoto, Kazuhide Fukushima, Toshiaki Tanaka (KDDI R&D Labs.) |
(2) |
09:25-09:50 |
An Extension of Fast Threshold Schemes Using XOR Operations (2) |
Jun Kurihara, Shinsaku Kiyomoto, Kazuhide Fukushima, Toshiaki Tanaka (KDDI R&D Labs.) |
(3) |
09:50-10:15 |
A Study on Hierarchical Secret Sharing Schemes Using Product and Concatenated Codes |
Chigusa Kawashima (Polytechnic Univ.), Takahiro Yoshida (Waseda Univ.), Tomoko K. Matsushima (Polytechnic Univ.) |
(4) |
10:15-10:40 |
visual cryptography schemes with tree access structure for many images |
Miyuki Uno, Mikio Kano (Ibaraki Univ.) |
|
10:40-10:50 |
Break ( 10 min. ) |
(5) |
10:50-11:15 |
A construction of light weight Panama-like keystream generator |
Dai Watanabe (Hitachi), Toshinobu Kaneko (TUS) |
(6) |
11:15-11:40 |
How To Find Many Collisions of 3-Pass HAVAL |
Kazuhiro Suzuki, Kaoru Kurosawa (Ibaraki Univ.) |
(7) |
11:40-12:05 |
Sender Authenticated Key Agreements Without Random Oracles |
Chifumi Sato (C4 Technology), Takeshi Okamoto, Eiji Okamoto (Univ. of Tsukuba) |
Fri, Sep 7 PM 13:05 - 15:10 |
(8) |
13:05-13:30 |
A New Class of Public Key Cryptosystem Constructed on the Basis of Multivariate Polynomials Rndomly Gererated |
Masao Kasahara (Osaka Gakuin Univ.) |
(9) |
13:30-13:55 |
A Consideration on 3-SAT Problem |
Kunikatsu Kobayashi (Yamagata Univ.) |
(10) |
13:55-14:20 |
An Implementation of a Pairing-Based Group Signature Scheme with Verifier-Local Revocation |
Yuta Hira, Hidehiro Kato, Toru Nakanishi, Yasuyuki Nogami, Nobuo Funabiki, Yoshitaka Morikawa (Okayama Univ.) |
(11) |
14:20-14:45 |
CAIRN3: An FPGA Implementation of the Sieving Step with the Lattice Sieving |
Takeshi Shimoyama, Tetsuya Izu, Jun Kogure (FUJITSU) |
(12) |
14:45-15:10 |
Tardos's Fingerprinting Codes Shortened by Optimizing Code Generation Probabilities and Improving Tracing Algorithm |
Taichi Isogai, Hirofumi Muratani (Toshiba) |
Fri, Sep 7 PM 15:20 - 16:35 |
(13) |
15:20-15:45 |
On the Implementation of Asymmetric Fingerprinting Protocol |
Shinya Yamane, Minoru Kuribayashi, Masakatu Morii (Kobe Univ.) |
(14) |
15:45-16:10 |
An Approach to Duality in Public Key Cryptosystems |
Kazuo Ohta (UEC), Yuichi Komano (Toshiba), Yutaka Kawai (UEC), Shinichi Kawamura (Toshiba) |
(15) |
16:10-16:35 |
A Study on Extended Multi-Recipient Encryption
-- Security Notion and Constructions -- |
Yasuo Hatano (Hitachi/Tokyo Univ. of Science), Kunihiko Miyazaki (Hitachi), Toshinobu Kaneko (TUS) |