Committee |
Date Time |
Place |
Paper Title / Authors |
Abstract |
Paper # |
ISEC |
2013-12-11 13:00 |
Tokyo |
Kikai-Shinko-Kaikan Bldg. |
Presentations of a general augmentation scheme, K(V)Scheme, for strengthening several classes of PKC and a new class of system oriented PKC, K(I)SOPKC Masao Kasahara (Waseda Univ./Chuo Univ.) ISEC2013-73 |
[more] |
ISEC2013-73 pp.1-6 |
ISEC |
2013-12-11 13:25 |
Tokyo |
Kikai-Shinko-Kaikan Bldg. |
A novel proposal of $q$-SVD domain for blind watermarking Ta Minh Thanh (Tokyo Inst. of Tech.), Ta Minh Tam (VSTV) ISEC2013-74 |
In this paper, we propose a novel watermarking based on $q$-SVD domain. We embed the watermark into the low-frequency of... [more] |
ISEC2013-74 pp.7-13 |
ISEC |
2013-12-11 13:50 |
Tokyo |
Kikai-Shinko-Kaikan Bldg. |
Possibility of the Address Overlap Dos Attack in Live Migration Kensuke Kasahara, Satoshi Ono (Kogakuin Univ.) ISEC2013-75 |
[more] |
ISEC2013-75 pp.15-20 |
ISEC |
2013-12-11 14:15 |
Tokyo |
Kikai-Shinko-Kaikan Bldg. |
Difference of the detection rate of the template in the modified non-overlapping template matching test Yuichi Takeda (Kanagawa Inst. of Tech.), Mituaki Huzii, Toshinari Kamakura, Norio Watanabe (Chuo Univ.) ISEC2013-76 |
[more] |
ISEC2013-76 pp.21-23 |
ISEC |
2013-12-11 14:55 |
Tokyo |
Kikai-Shinko-Kaikan Bldg. |
The Process by which Faults are Injected on Smart Cards Attacked by an Electromagnetic Irradiation Experiment Yuu Tsuchiya, Hitoshi Ono, Tsutomu Matsumoto (Yokohama National Univ.) ISEC2013-77 |
Fault injection attack, inducing partial fault in a cryptographic module and extracting the inside key, has been conside... [more] |
ISEC2013-77 pp.25-31 |
ISEC |
2013-12-11 15:20 |
Tokyo |
Kikai-Shinko-Kaikan Bldg. |
Education for Practical Hardware Security Based on Information Security Education Program Yu-ichi Hayashi, Naofumi Homma (Tohoku Univ.), Toshihiro Katashita (AIST), Hideaki Sone (Tohoku Univ.) ISEC2013-78 |
This paper reports an education course for the development of human resources in hardware security in a practical educat... [more] |
ISEC2013-78 pp.33-37 |
ISEC |
2013-12-11 15:45 |
Tokyo |
Kikai-Shinko-Kaikan Bldg. |
Another Vulnerability in a Cancelable Biometrics Authentication Scheme Tetsuya Izu, Yumi Sakemi, Masahiko Takenaka, Naoya Torii (Fijitsu Labs.) ISEC2013-79 |
[more] |
ISEC2013-79 pp.39-45 |
ISEC |
2013-12-11 16:25 |
Tokyo |
Kikai-Shinko-Kaikan Bldg. |
A Storage Encryption Scheme: Unconditionally Secure Encryption of Unlimited Number of Keys using A Fixed Secret (Part 2) Kazuomi Oishi (Shizuoka Inst. of Science and Tech.) ISEC2013-80 |
A storage encryption scheme is studied. In a storage encryption scheme, data encryption and key encryption are executed.... [more] |
ISEC2013-80 pp.47-51 |
ISEC |
2013-12-11 16:50 |
Tokyo |
Kikai-Shinko-Kaikan Bldg. |
A Study on An Analysis Prevention Scheme for Embedded System Firmware Kazuomi Oishi (Shizuoka Inst. of Science and Tech.) ISEC2013-81 |
There are increasing attacks against embedded system software as well as PC software. Software of embedded system is cal... [more] |
ISEC2013-81 pp.53-57 |
ISEC |
2013-12-11 17:15 |
Tokyo |
Kikai-Shinko-Kaikan Bldg. |
Report on PQCrypto2013 Takanori Yasuda (ISIT) ISEC2013-82 |
[more] |
ISEC2013-82 pp.59-62 |