Committee |
Date Time |
Place |
Paper Title / Authors |
Abstract |
Paper # |
ISEC, SITE, IPSJ-CSEC |
2006-07-20 09:30 |
Okayama |
Okayama Univ. |
A Translation Matrix between Two Isomorphic Extension Fields via Optimal Normal Basis Representation Ryo Nanba, Yasuyuki Nogami, Yoshitaka Morikawa (Okayama Univ.) |
Some extension fields efficient for fast implementation have been proposed. These extension fields adopt unique modular ... [more] |
ISEC2006-9 SITE2006-6 pp.1-6 |
ISEC, SITE, IPSJ-CSEC |
2006-07-20 09:55 |
Okayama |
Okayama Univ. |
Square Root Calculation Algorithm over Type-II All One Polynomial Field Hidehiro Kato (Okayama Univ.), Wang Feng, Yasuyuki Nogami, Yoshitaka Morikawa (Okayama Univ.) |
The authors proposes a square root (SQRT) algorithm in Fpm (m = r0r1 ・ ・ ・ rn.12d, ri : odd prime,
d > 0 : integer). We... [more] |
ISEC2006-10 SITE2006-7 pp.7-12 |
ISEC, SITE, IPSJ-CSEC |
2006-07-20 10:20 |
Okayama |
Okayama Univ. |
Pairing Computation with MNT Curve over All One Polynomial Field Masataka Akane, Takumi Okimoto, Yasuyuki Nogami, Yoshitaka Morikawa (Okayama Univ.) |
In recent years, many cryptographic applications with bilinear-pairing over elliptic curves have been proposed. The well... [more] |
ISEC2006-11 SITE2006-8 pp.13-18 |
ISEC, SITE, IPSJ-CSEC |
2006-07-20 10:45 |
Okayama |
Okayama Univ. |
Efficient Calculation for Tate Pairing Masaaki Shirase, Tsuyoshi Takagi (FUN), Eiji Okamoto (Univ of Tsukuba) |
[more] |
ISEC2006-12 SITE2006-9 pp.19-26 |
ISEC, SITE, IPSJ-CSEC |
2006-07-20 11:10 |
Okayama |
Okayama Univ. |
A Survey on Dedicated Factoring Hardware (Relation Finding Step) Tetsuya Izu (FUJITSU), Noboru Kunihiro (UEC), Takeshi Shimoyama (FUJITSU) |
Dedicated factoring devices have attracted much attention since it might be a new threat for RSA. Among the Number Field... [more] |
ISEC2006-13 SITE2006-10 pp.27-34 |
ISEC, SITE, IPSJ-CSEC |
2006-07-20 09:05 |
Okayama |
Okayama Univ. |
A Proposal to Hi-Tech Pollution Based on the Criterion of "Relationism-First"
-- A Principle Experiment of EM Environment around VDT and Its Basics Theory -- Yoshifumi Fujita (Onomichi Univ.), Mitsuo Ohta (Emeritus Prof. of Hiroshima Univ.) |
[more] |
ISEC2006-14 SITE2006-11 pp.35-41 |
ISEC, SITE, IPSJ-CSEC |
2006-07-20 09:30 |
Okayama |
Okayama Univ. |
A copyright and proprietary rights protection system with an Information Filter and an Information Capsule Kota Yamada, Hirotsugu Kinoshita (KU), Tetsuya Morizumi (TNSi) |
[more] |
ISEC2006-15 SITE2006-12 pp.43-50 |
ISEC, SITE, IPSJ-CSEC |
2006-07-20 09:55 |
Okayama |
Okayama Univ. |
Balance between Security and Privacy Yasutoshi Ishizaki (Chuo Univ.) |
[more] |
ISEC2006-16 SITE2006-13 pp.51-58 |
ISEC, SITE, IPSJ-CSEC |
2006-07-20 10:20 |
Okayama |
Okayama Univ. |
A Study on Dynamic Risk Analysis Corresponding to Environmental Changes Hideaki Kawanishi, Koichi Kato, Tatsuaki Takahashi, Ramirez Caceres Guillermo Horacio, Yoshimi Teshigawara (Soka Univ.) |
(To be available after the conference date) [more] |
ISEC2006-17 SITE2006-14 pp.59-66 |
ISEC, SITE, IPSJ-CSEC |
2006-07-20 10:45 |
Okayama |
Okayama Univ. |
Survey and Analysis on Data Delete in PC for Internet Auction Satsuki Sato, Yuki Ashino (TDU), Tetsutaro Uehara (KU), Ryoichi Sasaki (TDU) |
[more] |
ISEC2006-18 SITE2006-15 pp.67-73 |
ISEC, SITE, IPSJ-CSEC |
2006-07-20 11:10 |
Okayama |
Okayama Univ. |
Development of Internet Watchdog Systems for Children Protection Tatsumi Ueda, Yoshiaki Takai (Hokkaido Univ.) |
[more] |
ISEC2006-19 SITE2006-16 pp.75-80 |
ISEC, SITE, IPSJ-CSEC |
2006-07-20 11:35 |
Okayama |
Okayama Univ. |
Genaral Decline in the Literacy of Science Takeshi Shimomura |
[more] |
|
ISEC, SITE, IPSJ-CSEC |
2006-07-20 13:00 |
Okayama |
Okayama Univ. |
Secure Exponentiation with High Flexibility Camille Vuillaume, Katsuyuki Okeya (Hitachi) |
[more] |
ISEC2006-20 SITE2006-17 pp.81-86 |
ISEC, SITE, IPSJ-CSEC |
2006-07-20 13:25 |
Okayama |
Okayama Univ. |
Double-Size Montgomery Multiplication of a Crypto-Coprocessor Masayuki Yoshino, Katsuyuki Okeya, Camille Vuillaume (Hitachi) |
(To be available after the conference date) [more] |
ISEC2006-21 SITE2006-18 pp.87-94 |
ISEC, SITE, IPSJ-CSEC |
2006-07-20 13:50 |
Okayama |
Okayama Univ. |
An Improved Mehtod for the Table Lookup Multiplication Algorithm over GF(2^m) Yoichi Hadama, Daisuke Nakamura (Kobe Univ.), Masanori Hirotomo (Hyogo Inst. of Info. Education Foundation), Masakatu Morii (Kobe Univ.) |
[more] |
ISEC2006-22 SITE2006-19 pp.95-102 |
ISEC, SITE, IPSJ-CSEC |
2006-07-20 14:15 |
Okayama |
Okayama Univ. |
Fast Generation of Safe Primes using Deterministic Primality Tests based on Maurer Method Hidehiro Kumakyu, Akito Niwa (Toshiba Solusions Corp.) |
A prime number of the form 2p + 1, where p is also a prime is often used in cryptography.The prime of this form is calle... [more] |
ISEC2006-23 SITE2006-20 pp.103-110 |
ISEC, SITE, IPSJ-CSEC |
2006-07-20 14:40 |
Okayama |
Okayama Univ. |
A method for generating elliptic curves suitable for implementing an efficient group signature scheme Norikazu Kubotera, Jun Furukawa, Kazue Sako (NEC) |
[more] |
ISEC2006-24 SITE2006-21 pp.111-117 |
ISEC, SITE, IPSJ-CSEC |
2006-07-20 15:20 |
Okayama |
Okayama Univ. |
Batch Processing of Interactive Proofs Tsuyoshi Yamamoto, Koji Chida (NTT) |
[more] |
ISEC2006-25 SITE2006-22 pp.119-124 |
ISEC, SITE, IPSJ-CSEC |
2006-07-20 15:45 |
Okayama |
Okayama Univ. |
Efficient Implementation of Secure Circuit Evaluation Using Batch Processing Koji Chida, Tsuyoshi Yamamoto (NTT) |
[more] |
ISEC2006-26 SITE2006-23 pp.125-132 |
ISEC, SITE, IPSJ-CSEC |
2006-07-20 16:10 |
Okayama |
Okayama Univ. |
Inspection of sufficient conditions of MD5 Yuto Nakano, Hidenori Kuwakado, Masakatu Morii (Kobe Univ.) |
Sufficient conditions for finding the collision pairs of MD5 are about
600 conditions on internal variables, but the ne... [more] |
ISEC2006-27 SITE2006-24 pp.133-139 |