Mon, Nov 14 AM ISEC 10:00 - 11:40 |
(1) |
10:00-10:25 |
Evaluation and Improvement against a Lattice Trapdoor Function in the Alwen-Peikert Construction |
Yosuke Todo, Masakatu Morii (Kobe Univ.) |
(2) |
10:25-10:50 |
A Lattice Attack against (u|u+v)ΣPKC |
Atsushi Nagao, Yosuke Todo, Masakatu Morii (Kobe Univ.) |
(3) |
10:50-11:15 |
On the attack against Gentry's somewhat homomorphic encryption using LLL algorithm (II) |
Jun Yajima, Masaya Yasuda, Takeshi Shimoyama, Jun Kogure (FUJITSU LAB.) |
(4) |
11:15-11:40 |
An element-selective knapsack cryptosystem with encryption multipliers |
Yuki Okada, Akira Hayashi (KIT) |
|
11:40-12:40 |
Lunch ( 60 min. ) |
Mon, Nov 14 PM LOIS -Life Log- 12:40 - 14:10 |
(5) |
12:40-13:10 |
A study on necessary location information accuracy in lifelog |
Hiromitsu Ueda, Yukio Rikiso (Univ. of Hyogo) |
(6) |
13:10-13:40 |
Evaluation method for telephone conversations retrieval using precision and recall |
Hiroyuki Nishi, Yuuki Yokobayashi, Haiyen, Yoshimasa Kimura, Toshio Kakinoki (Sojo Univ) |
(7) |
13:40-14:10 |
Proposal of “Knowledge Recommender” the Business-knowledge Sharing System and Rating Evaluation
-- Application for Building Energy Management Service -- |
Minako Toba (Hitachi, Ltd.) |
|
14:10-14:20 |
Break ( 10 min. ) |
Mon, Nov 14 PM ISEC 14:20 - 16:00 |
(8) |
14:20-14:45 |
Three dimensional Dyck Path Cipher |
Jun Hashimoto, Akira Hayashi (KIT) |
(9) |
14:45-15:10 |
Hidden Pair of Bijection Signature system (2)
-- Discussion of the Security -- |
Masahito Gotaishi, Shigeo Tsujii (Chuo Univ.) |
(10) |
15:10-15:35 |
Ramp secret sharing scheme based on MBR codes |
Masazumi Kurihara (UEC), Hidenori Kuwakado (Kobe University) |
(11) |
15:35-16:00 |
Formalization and Verification of Arithmetic Algorithms by Mizar |
Yoshiki Aoki, Hiroyuki Okazaki, Yasunari Shidama (Shinshu Univ.) |
|
16:00-16:10 |
Break ( 10 min. ) |
Mon, Nov 14 PM LOIS -Office System- 16:10 - 17:40 |
(12) |
16:10-16:40 |
Designing a Filter for Internet Flow Control under Macro Dynamics
-- Towards Innovating Autonomous Network Architecture for Future Dynamics-aware Internet -- |
Jian-Qin Liu (NICT), Wuyi Yue (Konan Univ.), Hiroaki Umehara (NICT) |
(13) |
16:40-17:10 |
Efficient Decoding of QR Code using Error Correcting Capability
-- Decoding Method using Erasure Error Correction and the Ability -- |
Keisuke Saito, Masakatu Morii (Kobe Univ.) |
(14) |
17:10-17:40 |
A suudy of machine learning corresponding to the change of a turn and the of the recognition object |
Tatsumo Hoji, Yuta Yamada, Akihiro Shimizu (Kochi Univ. of Tech.) |
Tue, Nov 15 AM ISEC 09:00 - 10:40 |
(15) |
09:00-09:25 |
Proposal and Evaluation of a Secure WEP Operation against Existing Key Recovery Attacks |
Tsubasa Tsukaune, Yosuke Todo, Masakatu Morii (Kobe Univ.) |
(16) |
09:25-09:50 |
Fault Sensitivity Analysis Against Elliptic Curve Cryptosystems Using Clockwise Collisions |
Hikaru Sakamoto, Yang Li, Kazuo Ohta, Kazuo Sakiyama (Univ. of Electro-Comm.) |
(17) |
09:50-10:15 |
Optimized Right-to-Left Scalar Multiplication RIP Algorithms |
Atsuko Miyaji, Yiren Mo (JAIST) |
(18) |
10:15-10:40 |
Efficient Privacy Preserving Set Operations |
Atsuko Miyaji, Mohammad Rahman (JAIST) |
|
10:40-10:55 |
Break ( 15 min. ) |
Tue, Nov 15 AM LOIS -System Security- 10:55 - 12:25 |
(19) |
10:55-11:25 |
A Method to Find Vulnerable Cryptographic Algorithms in SSH Protocol |
Satoshi Hara (UEC), Kenichiro Muto, Sakae Chikara, Yoshiaki Seki (NTT) |
(20) |
11:25-11:55 |
Secure and Effective Password Management System |
Ryo Hirano, Masakatu Morii (Kobe Univ.) |
(21) |
11:55-12:25 |
Secure VoIP system for mobile devices |
Takeaki Kouchi, Tomoki Nakano, Yutaka Ono, Akihiro Shimizu (Kochi Univ. of Tech.) |
|
12:25-13:25 |
Lunch ( 60 min. ) |
Tue, Nov 15 PM ISEC 13:25 - 14:40 |
(22) |
13:25-13:50 |
SLP separates the strong RSA assumption from the DDH assumption |
Masayuki Fukumitsu, Shingo Hasegawa, Shuji Isobe, Eisuke Koizumi, Hiroki Shizuya (Tohoku Univ.) |
(23) |
13:50-14:15 |
On the Little Knowledge Interactive Proof |
Jun-ya Iwazaki, Shingo Hasegawa, Shuji Isobe, Eisuke Koizumi, Hiroki Shizuya (Tohoku Univ.) |
(24) |
14:15-14:40 |
Symbolic Criterion of EUC Secure Message Authentication for Multi-Message Protocols |
Itsuki Suzuki, Maki Yoshida, Toru Fujiwara (Osaka Univ.) |
|
14:40-14:50 |
Break ( 10 min. ) |
Tue, Nov 15 PM ISEC 14:50 - 16:30 |
(25) |
14:50-15:15 |
On Definition Fields of Pairing Friendly Curves With Embedding Degree 4, 6, 8 |
Masaaki Shirase (FUN) |
(26) |
15:15-15:40 |
A proposal of Privacy Impact Assessment framework in Japan |
Shigeru Ishida, Sadamu Takasaka, Mamoru Yokoyama, Yoichi Seto (AIIT) |
(27) |
15:40-16:05 |
Content Authentication for Range Queries in Peer-to-Peer Networks |
Shoichi Hirose (Univ. of Fukui) |
(28) |
16:05-16:30 |
On the Insecurity of Randomized Arithmetic Codes Based on Markov Model |
Liang Zhao, Takashi Nishide (Kyushu Univ.), Avishek Adhikari (Univ. of Calcutta), Kyung-Hyune Rhee (Pukyong National Univ.), Kouichi Sakurai (Kyushu Univ.) |