Fri, May 16 AM 09:30 - 12:00 |
(1) |
09:30-09:55 |
Verification of a side-channel attack to an AES circuit on SASEBO |
Daisaku Minamizaki, Keisuke Iwai, Takakazu Kurokawa (NDA) |
(2) |
09:55-10:20 |
An implementation of an automatic analyzer for side channel attacks |
Keisuke Iwai, Daisaku Minamizaki, Takakazu Kurokawa (NDA) |
(3) |
10:20-10:45 |
New Impossible Differentials of CLEFIA |
Etsuko Tsujihara (YDK), Maki Shigeri (NEC Software Hokuriku), Tomoyasu Suzaki (NEC), Takeshi Kawabata (NEC Software Hokuriku), Yukiyasu Tsunoo (NEC) |
(4) |
10:45-11:10 |
A New Randomness Test Based on All the Autocorrelation Values |
Kenji Hamano, Hirosuke Yamamoto (Tokyo Univ.) |
(5) |
11:10-11:35 |
Coalition Resistant Ternary Subset Difference Method |
Kazuhide Fukushima, Shinsaku Kiyomoto, Toshiaki Tanaka (KDDI Labs.), Kouichi Sakurai (Kyushu Univ.) |
(6) |
11:35-12:00 |
A Consideration on k-Clique Problem and Graph k-Colorability |
Kunikatsu Kobayashi (Yamagata Univ.) |
Fri, May 16 PM 13:00 - 17:00 |
(7) |
13:00-13:25 |
Reconsideration of Algorithmic Tamper Proof Devices using PIN (part 2) |
Yuichi Komano (Toshiba), Kazuo Ohta (UEC), Hideyuki Miyake, Atsushi Shimbo (Toshiba) |
(8) |
13:25-13:50 |
A method to reduce false positive of Anomaly Detection System |
Yuka Ikebe, Takehiro Nakayama, Masaji Katagiri (NTT DoCoMo), Satoshi Kawasaki (Univ. of Tsukuba), Hirotake Abe (Toyohashi Univ. of Technology), Takahiro Shinagawa, Kazuhiko Kato (Univ. of Tsukuba) |
(9) |
13:50-14:15 |
On the Construction of the Set-Intersection Protocols from Blind Signatures |
Ryo Nojima (NICT), Youki Kadobayashi (NAIST) |
(10) |
14:15-14:40 |
A Fully Secure Attribute-Based Group Signature Scheme and its Application in an Anonymous Survey for Collection of Attribute Statistics |
Keita Emura, Atsuko Miyaji (JAIST) |
(11) |
14:40-15:05 |
A Study on Higher Order Differnce Operation for Elliptic Curve Scalar Multiplication Using Path Table |
Tomoko K. Matsushima, Yoshitaka Sagara, Osamu Ashihara (Polytechnic Univ.) |
|
15:05-15:20 |
Break ( 15 min. ) |
(12) |
15:20-15:45 |
Integrating Fingerprint and Cryptosystem for Internet-Based Live Pay-TV System |
Shuhui Hou, Tetsutaro Uehara (Kyoto Univ.), Takashi Satoh (Univ. of Kitakyushu), Yoshitaka Morimura, Michihiko Minoh (Kyoto Univ.) |
(13) |
15:45-16:10 |
New Classes of Public Key Cryptosystem Constructed on the Basis of Multivariate Polynomials and Error Control Coding |
Masao Kasahara (OGU) |
(14) |
16:10-16:35 |
Hybrid Encryption Scheme in IBE with Applications to Data Storage |
Hirokazu Ougi (free) |
(15) |
16:35-17:00 |
Strongly Unforgeable ID-based Signatures Without Random Oracles |
Chifumi Sato (C4 Technology), Takeshi Okamoto, Eiji Okamoto (Univ. of Tsukuba) |