Committee |
Date Time |
Place |
Paper Title / Authors |
Abstract |
Paper # |
ISEC, IPSJ-CSEC, SITE, ICSS, EMM, IPSJ-SPT [detail] |
2011-07-12 13:30 |
Shizuoka |
Shizuoka University |
Carrier Screen Images Decoding with an Ordinary Digital Camera Rui Shogenji, Junji Ohtsubo (Shizuoka Univ.) ISEC2011-9 SITE2011-6 ICSS2011-14 EMM2011-8 |
There are carrier screen images which used as document security such as anti-counterfeiting technology for the bank note... [more] |
ISEC2011-9 SITE2011-6 ICSS2011-14 EMM2011-8 pp.1-6 |
ISEC, IPSJ-CSEC, SITE, ICSS, EMM, IPSJ-SPT [detail] |
2011-07-12 13:55 |
Shizuoka |
Shizuoka University |
Recovery of Tampered Pixels for Statistical Fragile Watermarking Maki Yoshida, Kazuya Ohkita, Toru Fujiwara (Osaka Univ.) ISEC2011-10 SITE2011-7 ICSS2011-15 EMM2011-9 |
[more] |
ISEC2011-10 SITE2011-7 ICSS2011-15 EMM2011-9 pp.7-12 |
ISEC, IPSJ-CSEC, SITE, ICSS, EMM, IPSJ-SPT [detail] |
2011-07-12 14:20 |
Shizuoka |
Shizuoka University |
Bias Equalizer for Tracing Algorithm of Binary Fingerprinting Codes Minoru Kuribayashi (Kobe Univ.) ISEC2011-11 SITE2011-8 ICSS2011-16 EMM2011-10 |
[more] |
ISEC2011-11 SITE2011-8 ICSS2011-16 EMM2011-10 pp.13-18 |
ISEC, IPSJ-CSEC, SITE, ICSS, EMM, IPSJ-SPT [detail] |
2011-07-12 15:00 |
Shizuoka |
Shizuoka University |
Proposal of 3D Visualization Method for IDS Considering Order Relation of IP addresses Shunichi Mizoguchi, Hiroyuki Inaba (KIT) ISEC2011-12 SITE2011-9 ICSS2011-17 EMM2011-11 |
Recently, illegal access to network is increasing. Therefore the importance of a network intrusion detection system (IDS... [more] |
ISEC2011-12 SITE2011-9 ICSS2011-17 EMM2011-11 pp.19-24 |
ISEC, IPSJ-CSEC, SITE, ICSS, EMM, IPSJ-SPT [detail] |
2011-07-12 15:25 |
Shizuoka |
Shizuoka University |
Study on person profile about coping behavior under virus infected situation Hiroaki Kanda, Noriaki Yoshikai, Shun-ichi Kurino (Nihon University) ISEC2011-13 SITE2011-10 ICSS2011-18 EMM2011-12 |
A virus infection situation can be considered a kind of state of panic. Although many reports about panic phenomena hav... [more] |
ISEC2011-13 SITE2011-10 ICSS2011-18 EMM2011-12 pp.25-30 |
ISEC, IPSJ-CSEC, SITE, ICSS, EMM, IPSJ-SPT [detail] |
2011-07-12 15:50 |
Shizuoka |
Shizuoka University |
Cloud Computing Market Expansion and Risk management in U.S. and an analysis of the consensus building factors
-- from the perspective of networking incentive of actors -- Ema Tanaka (FMMC) ISEC2011-14 SITE2011-11 ICSS2011-19 EMM2011-13 |
[more] |
ISEC2011-14 SITE2011-11 ICSS2011-19 EMM2011-13 pp.31-38 |
ISEC, IPSJ-CSEC, SITE, ICSS, EMM, IPSJ-SPT [detail] |
2011-07-13 09:00 |
Shizuoka |
Shizuoka University |
Matsumoto-Imai Signature by Dual Perturbation
-- Two new Modifiers -- Masahito Gotaishi, Shigeo Tsujii (Chuo Univ.) ISEC2011-15 SITE2011-12 ICSS2011-20 EMM2011-14 |
Abstract The most basic way to cryptanalyze Multivariate Public Key Cryptosystems (MPKC) is solving the equation system ... [more] |
ISEC2011-15 SITE2011-12 ICSS2011-20 EMM2011-14 pp.79-83 |
ISEC, IPSJ-CSEC, SITE, ICSS, EMM, IPSJ-SPT [detail] |
2011-07-13 09:25 |
Shizuoka |
Shizuoka University |
A Note on Security of (u|u+v) Σ PKC against Low-Density Attack Yasuyuki Murakami (Osaka Electro-Comm. Univ.), Masao Kasahara (Osaka Gakuin Univ.) ISEC2011-16 SITE2011-13 ICSS2011-21 EMM2011-15 |
In SCIS2011, we presented a new class of knapsack PKC,
constructed based on $(u|u+v)$ construction, referred to as $(u|... [more] |
ISEC2011-16 SITE2011-13 ICSS2011-21 EMM2011-15 pp.85-90 |
ISEC, IPSJ-CSEC, SITE, ICSS, EMM, IPSJ-SPT [detail] |
2011-07-13 09:50 |
Shizuoka |
Shizuoka University |
A Low Density Multiple Choice Knapsack Cryptosystem Akira Hayashi, Toshihiro Koike (KIT) ISEC2011-17 SITE2011-14 ICSS2011-22 EMM2011-16 |
The knapsack cryptosystem invented by Merkle and Hellman is known to be insecure against the low density attack by Lagar... [more] |
ISEC2011-17 SITE2011-14 ICSS2011-22 EMM2011-16 pp.91-96 |
ISEC, IPSJ-CSEC, SITE, ICSS, EMM, IPSJ-SPT [detail] |
2011-07-13 10:15 |
Shizuoka |
Shizuoka University |
The proposal of the evaluation for decryption failure about GGH series Yosuke Todo, Masakatu Morii (Kobe Univ.) ISEC2011-18 SITE2011-15 ICSS2011-23 EMM2011-17 |
The GGH cryptosystem is a public key cryptosystem proposed by O. Goldreich, S. Goldwasser and S. Halevil in 1997. This c... [more] |
ISEC2011-18 SITE2011-15 ICSS2011-23 EMM2011-17 pp.97-102 |
ISEC, IPSJ-CSEC, SITE, ICSS, EMM, IPSJ-SPT [detail] |
2011-07-13 10:55 |
Shizuoka |
Shizuoka University |
Security Evaluation of HyRAL against Saturation Cryptanalysis(II) Naoki Shibayama, Yasutaka Igarashi, Toshinobu Kaneko, Seiichiro Hangai (Tokyo Univ. of Science) ISEC2011-19 SITE2011-16 ICSS2011-24 EMM2011-18 |
In this paper, we focuse on the saturation attack on block cipher HyRAL that was proposed by Hirata in 2010.
It has bee... [more] |
ISEC2011-19 SITE2011-16 ICSS2011-24 EMM2011-18 pp.103-109 |
ISEC, IPSJ-CSEC, SITE, ICSS, EMM, IPSJ-SPT [detail] |
2011-07-13 11:20 |
Shizuoka |
Shizuoka University |
Strongly Asymmetric Public Key Agreement Algorithms Luigi Accardi (Roma II Univ.), Satoshi Iriyama (Tokyo Univ. of Science), Massimo Regoli (Roma II Univ.), Masanori Ohya (Tokyo Univ. of Science) ISEC2011-20 SITE2011-17 ICSS2011-25 EMM2011-19 |
Our goal is to discuss the main ideas, general construction and abstract scheme
of a new class of cryptographic algori... [more] |
ISEC2011-20 SITE2011-17 ICSS2011-25 EMM2011-19 pp.111-114 |
ISEC, IPSJ-CSEC, SITE, ICSS, EMM, IPSJ-SPT [detail] |
2011-07-13 11:45 |
Shizuoka |
Shizuoka University |
Strongly Asymmetric PKD Cryptographic Algorithms
-- an implementation using the matrix model -- Luigi Accardi (Roma II Univ.), Satoshi Iriyama (Tokyo Univ. of Science), Massimo Regoli (Roma II Univ.), Masanori Ohya (Tokyo Univ. of Science) ISEC2011-21 SITE2011-18 ICSS2011-26 EMM2011-20 |
This work follows the paper of the authors: \textit{Strongly asymmetric PKD cryptographic algorithms}, which introduces ... [more] |
ISEC2011-21 SITE2011-18 ICSS2011-26 EMM2011-20 pp.115-121 |
ISEC, IPSJ-CSEC, SITE, ICSS, EMM, IPSJ-SPT [detail] |
2011-07-13 13:25 |
Shizuoka |
Shizuoka University |
On Usage of Practical Web Application Source Code for Learning Support on Secure Coding Ryosuke Miyaji, Seikoh Nishita (Takushoku Univ) ISEC2011-22 SITE2011-19 ICSS2011-27 EMM2011-21 |
Security holes (vulnerabilities) in web applications causes security
incidents like personal information leakage and vi... [more] |
ISEC2011-22 SITE2011-19 ICSS2011-27 EMM2011-21 pp.123-129 |
ISEC, IPSJ-CSEC, SITE, ICSS, EMM, IPSJ-SPT [detail] |
2011-07-13 13:50 |
Shizuoka |
Shizuoka University |
Memory saving implementation of Cyclic Vector Multiplication Algorithm Ryosuke Takahashi, Kenta Nekado, Yusuke Takai, Yasuyuki Nogami, Hiroto Kagotani (Okayama Univ.), Takashi Narita (TEL) ISEC2011-25 SITE2011-22 ICSS2011-30 EMM2011-24 |
The authors have proposed a cyclic vector multiplication algorithm abbreviated as CVMA
that is flexible to the paramet... [more] |
ISEC2011-25 SITE2011-22 ICSS2011-30 EMM2011-24 pp.145-150 |
ISEC, IPSJ-CSEC, SITE, ICSS, EMM, IPSJ-SPT [detail] |
2011-07-13 14:30 |
Shizuoka |
Shizuoka University |
Public Key Cryptosystems Constructed Based on Cyclic Codes, Realizing Coding Rate of Exactly 1.0, K(XI)SE(g)PKC and K(XII)SE(g)PKC Masao Kasahara (Osaka Gakuin Univ.) ISEC2011-23 SITE2011-20 ICSS2011-28 EMM2011-22 |
In this paper, we first present a new class of public-key cryptosystems, K(\ix)SE(1)PKC based on error-correcting codes ... [more] |
ISEC2011-23 SITE2011-20 ICSS2011-28 EMM2011-22 pp.131-136 |
ISEC, IPSJ-CSEC, SITE, ICSS, EMM, IPSJ-SPT [detail] |
2011-07-13 14:55 |
Shizuoka |
Shizuoka University |
Construction of New Classes of Product-Sum Type Public Key Cryptosystem, K(IV)ΣPKC and K(I)ΣΠPKC Masao Kasahara (Osaka Gakuin Univ) ISEC2011-24 SITE2011-21 ICSS2011-29 EMM2011-23 |
In this paper, we present a new class of knapsack type PKC referred to as K(IV)$\Sigma$PKC. In a sharp contrast with the... [more] |
ISEC2011-24 SITE2011-21 ICSS2011-29 EMM2011-23 pp.137-144 |
ISEC, IPSJ-CSEC, SITE, ICSS, EMM, IPSJ-SPT [detail] |
2011-07-13 15:20 |
Shizuoka |
Shizuoka University |
Solving DLP with Auxiliary Input over an Elliptic Curve Used in TinyTate Library (Part II) Yumi Sakemi, Tetsuya Izu, Masahiko Takenaka, Masaya Yasuda (Fujitsu Labs) ISEC2011-26 SITE2011-23 ICSS2011-31 EMM2011-25 |
The discrete logarithm problem with auxiliary input (DLPwAI) is a problem
to find a positive integer $\alpha$ from e... [more] |
ISEC2011-26 SITE2011-23 ICSS2011-31 EMM2011-25 pp.151-158 |