|
Chair |
|
Tsutomu Matsumoto (Yokohama National Univ.) |
Vice Chair |
|
Toshiaki Tanaka (KDDI Labs.), Koichi Sakurai (Kyushu Univ.) |
Secretary |
|
Junji Shikata (Yokohama National Univ.), Tetsuya Izu (Fujitsu Labs.) |
Assistant |
|
Tetsu Iwata (Nagoya Univ.) |
|
Conference Date |
Wed, Dec 12, 2012 13:00 - 17:00 |
Topics |
|
Conference Place |
Kikai-Shinko-Kaikan Bldg. |
Address |
3-5-8, Shiba-kouen, Minato-ku, Tokyo, 105-0011 Japan |
Transportation Guide |
8 min. walk from Kamiya-cho Sta. on Subway Hibiya Line or 10 min. walk from Daimon Sta. both on Subway Asakusa Line and on Oedo Line http://www.jspmi.or.jp/kaigishitsu/access.html |
Wed, Dec 12 PM ISEC 13:00 - 17:00 |
(1) |
13:00-13:25 |
Notes on Secure and Smooth Typing Password Generation Method using Markov Process |
Takuto Tamai, Hiroyuki Inaba (Kyoto Inst. of Technology) |
(2) |
13:25-13:50 |
An Extention of Reputation System with Secrecy for Negative Feedbacks |
Tomoya Nomura, Toru Nakanishi, Kan Watanabe, Nobuo Funabiki (Okayama Univ.) |
(3) |
13:50-14:15 |
Implementation and Evaluation of a Method for Preventing Unauthorized Data Transmission |
Masato Hata, Masato Tanabe, Katsunari Yoshioka, Tsutomu Matsumoto (Yokohama National Univ.) |
|
14:15-14:30 |
Break ( 15 min. ) |
(4) |
14:30-14:55 |
Generating elliptic curves having efficient endomorphisms suitable for pairing computation and scalar multiplication |
Naoki Kanayama, Eiji Okamoto, Kazutaka Saito (Univ. of Tsukuba) |
(5) |
14:55-15:20 |
The YNU's Method for Acquiring Power-Consumption Traces Developed for DPA Contest v3 |
Tsutomu Matsumoto, Takeshi Kishikawa, Hitoshi Ono, Shohei Saito, Yuu Tsuchiya (Yokohama Nat'l Univ.), Akihiko Sasaki (MORITA TECH), Tsuyoshi Toyama (Yokohama Nat'l Univ.) |
(6) |
15:20-15:45 |
A Report on CRYPTO 2012 |
Shiho Moriai (NICT) |
|
15:45-16:00 |
Break ( 15 min. ) |
(7) |
16:00-16:30 |
[Invited Talk]
Breaking and Repairing GCM Security Proofs (from CRYPTO 2012) |
Tetsu Iwata, Keisuke Ohashi (Nagoya Univ.), Kazuhiko Minematsu (NEC) |
(8) |
16:30-17:00 |
[Invited Talk]
On the Impossibility of Constructing Efficient Key Encapsulation and Programmable Hash Functions in Prime Order Groups |
Goichiro Hanaoka, Takahiro Matsuda (AIST), Jacob Schuldt (RHUL) |
Announcement for Speakers |
General Talk | Each speech will have 20 minutes for presentation and 5 minutes for discussion. |
Invited Talk | Each speech will have 25 minutes for presentation and 5 minutes for discussion. |
Contact Address and Latest Schedule Information |
ISEC |
Technical Committee on Information Security (ISEC) [Latest Schedule]
|
Contact Address |
Tetsu Iwata (Nagoya University)
TEL +81-52-789-5722, FAX +81-52-789-5723
E-: ic-c (to ISEC secretaries) |
Last modified: 2012-10-19 23:12:50
|