Wed, Nov 21 PM 13:30 - 16:00 |
(1) |
13:30-13:55 |
A New Construction of Knapsack Cryptosystem |
Masao Kasahara (Osaka Gakuin Univ.), Yasuyuki Murakami, Takeshi Nasako (Osaka Electro-Comm. Univ.) |
(2) |
13:55-14:20 |
Small Secret Key Attack on Takagi's Variant of RSA (Part1) |
Noboru Kunihiro (Univ. of Electro-Comm.), Kouichi Itoh (Fujitsu Labs), Kaoru Kurosawa (Ibaraki Univ.) |
(3) |
14:20-14:45 |
Clone resistance in artifact-metric systems |
Yuko Tamura, Masashi Une (BOJ) |
(4) |
14:45-15:10 |
Anonymous Fingerprinting for Predelivery of Contents |
Kazuhiro Haramura, Maki Yoshida, Toru Fujiwara (Osaka Univ.) |
(5) |
15:10-15:35 |
Function Estimation of Malware Code by Measuring Similarity |
Kouki Yasumoto, Masakatu Morii (Kobe Univ.), Koji Nakao (NICT) |
(6) |
15:35-16:00 |
Extract Network Access Information from BOT Code Using Static Analysis |
Hayato Okada, Masakatu Morii (Kobe Univ.), Koji Nakao (NICT) |
Wed, Nov 21 PM 16:15 - 17:30 |
(7) |
16:15-16:40 |
Business Process based Access Control Method for Java EE Environment |
Tomoya Okaue, Satoshi Ono (Kogakuin Univ.) |
(8) |
16:40-17:05 |
A study on implementation of mobile-phone with speaker verification function |
Yutaka Hamano, Masatsugu Ichino (Waseda Univ), Yasushi Yamazaki (The University of Kitakyushu), Kazuhiro Tsurumaru, Naohisa Komatsu (Waseda Univ) |
(9) |
17:05-17:30 |
Template Protection using Biometric Encryption for CELP Speaker Verification |
Shinya Takayama, Tetsushi Ohki (Waseda Univ.), Yasushi Yamazaki (The Univ. of Kitakyushu), Naohisa Komatsu (Waseda Univ.), Masao Kasahara (Osaka Gakuin Univ.) |
Thu, Nov 22 AM 09:30 - 12:00 |
(10) |
09:30-09:55 |
Applications of Conjugate Codes to Wiretap Channels |
Mitsuru Hamada (Tamagawa Univ./JST) |
(11) |
09:55-10:20 |
A Consideration on Clique Problem and Adjacency Matrix |
Kunikatsu Kobayashi (Yamagata Univ.) |
(12) |
10:20-10:45 |
Knapsack Cryptosystem on Elliptic Curves of Trace Two |
Koichiro Noro, Kunikatsu Kobayashi (Yamagata Univ.) |
(13) |
10:45-11:10 |
Comparative study of Rabin encryption and RSA encryption |
Kensuke Takamura, Akira Hayashi (KIT) |
(14) |
11:10-11:35 |
Cryptanalysis experiment of OTU2000 using the Lagarias-Odlyzko method |
Naoto Yamaguchi, Akira Hayashi (KIT) |
(15) |
11:35-12:00 |
Reduction Optimal Polynomials over GF(3) with Four Terms |
Toshiya Nakajima (Fujitsu Ltd.), Tetsuya Izu (Fujitsu Laboratories Ltd.), Tsuyoshi Takagi (FUN) |
Thu, Nov 22 PM 13:00 - 14:40 |
(16) |
13:00-13:25 |
. |
Hidekazu Nakawatase, , (NTT), Hideaki Hata (Osaka Univ.) |
(17) |
13:25-13:50 |
Workplace surveillance by use of a remote video monitoring system |
Kazuyuki Iso, Katsuya Yamashita, Kyoko Sudo, Kumi Jinzenji, Akira Kojima, Hitoshi Nakazawa (NTT) |
(18) |
13:50-14:15 |
Line spacing and Legibility in a Local Government Web Site |
Yoshiyuki Kazato, Yasuhiko Higaki, Hiroaki Ikeda (Chiba Univ.) |
(19) |
14:15-14:40 |
Available Bandwidth Measurement Technology using Probing Packet |
Motomitsu Adachi, Ryo Kubota, Toshinori Nishimura, Naohisa Komatsu (Waseda Univ.) |
Thu, Nov 22 PM 14:55 - 16:35 |
(20) |
14:55-15:20 |
A random number generation method with a variable degree of safety and its application to Secret Sharing Scheme |
Yasuyuki Tanaka, Harutaka Ishizu, Naohiko Mori (NTT Communications) |
(21) |
15:20-15:45 |
A Key Recovery Attack on WEP with Less Packets |
Toshihiro Ohigashi, Hidenori Kuwakado, Masakatu Morii (Kobe Univ.) |
(22) |
15:45-16:10 |
A Key Recovery Attack with Equivalent Keys of Stream Cipher |
Takanori Isobe, Toshihiro Ohigashi, Hidenori Kuwakado, Masakatu Morii (Kobe Univ.) |
(23) |
16:10-16:35 |
New Weak Keys on RC4 |
Ryoichi Teramura, Toshihiro Ohigashi, Hidenori Kuwakado, Masakatu Morii (Kobe Univ.) |