Thu, May 23 PM 12:55 - 17:35 |
(1) |
12:55-13:20 |
Using KCV with CTR Mode and CENC |
Kazuma Iki, Tetsu Iwata (Nagoya Univ.) |
(2) |
13:20-13:45 |
Timed-Release Identity-Based Encryption |
Toru Oshikiri, Taiichi Saito (Tokyo Denki Univ.) |
(3) |
13:45-14:10 |
Information theoretical analysis of side-channel attack (2) |
Hiroaki Mizuno, Keisuke Iwai, Hidema Tanaka, Takakazu Kurokawa (National Defense Academy) |
(4) |
14:10-14:35 |
Car2Cloud Communication Enhanced by In-Vehicle Implicit Asking |
Tsutomu Matsumoto, Hikotaro Suzuki, Katsunari Yoshioka (Yokohama National Univ.), Yosuke Maekawa, Hisashi Oguma (TOYOTA InfoTechnology Center) |
|
14:35-14:45 |
Break ( 10 min. ) |
(5) |
14:45-15:10 |
A New Class of Public Key Cryptosystems Constructed Based on Reed-Solomon Codes K(XII)SE(1)PKC |
Masao Kasahara (Waseda Univ.) |
(6) |
15:10-15:35 |
A Consideration on Pairing Inversion Problem of Pairing Based Cryptography with BN Curve |
Yasuyuki Nogami, Yuki Kono, Shoichi Akagi (Okayama Univ.) |
(7) |
15:35-16:00 |
Improvement in Addition formula on Elliptic Curves |
Yoshitaka Nagai (Future Univ. Hakodate), Tetsuya Izu (Fujitsu Lab), Masaaki Shirase (Future Univ. Hakodate) |
|
16:00-16:10 |
Break ( 10 min. ) |
(8) |
16:10-16:35 |
A Report on ASIACRYPT 2012 |
Takahiro Matsuda (AIST) |
(9) |
16:35-17:05 |
[Invited Talk]
The Five-Card Trick Can Be Done with Four Cards (from ASIACRYPT 2012) |
Takaaki Mizuki (Tohoku Univ.) |
(10) |
17:05-17:35 |
[Invited Talk]
Investigating Fundamental Security Requirements on Whirlpool: Improved Preimage and Collision Attacks |
Yu Sasaki (NTT) |