===============================================
Technical Committee on Information Security (ISEC)
Chair: Masakatu Morii Vice Chair: Mitsuru Matsui, Kazuo Ota
Secretary: Hiroshi Doi, Shiho Moriai
Assistant: Yoshiaki Shiraishi
DATE:
Wed, Sep 13, 2006 09:30 - 17:25
PLACE:
Kikai-shinkou Building(3-5-8, Shiba-kouen, Minato-ku, Tokyo, 105-0011 Japan. 8 min. walk from Kamiya-cho Sta. on Subway Hibiya Line or 10 min. walk from Daimon Sta. both on Subway Asakusa Line and on Oedo Line. http://www.jspmi.or.jp/kaikan.htm)
TOPICS:
----------------------------------------
Wed, Sep 13 (09:30 - 12:00)
----------------------------------------
(1) 09:30 - 09:55
Watermarking method with strong robustness considering error correcting code length
cong li, Kazuo Ohzeki (S I T)
(2) 09:55 - 10:20
A Method of Shortening Tardos's Fingerprinting Code Length by Optimizing Parameters
Taichi Isogai, Hirofumi Muratani, Kenichiro Furuta (Toshiba)
(3) 10:20 - 10:45
The Real-Time Steganography Based on Audio-to-Audio Data Bit Steam
Xuping Huang, Ryota Kawashima, Norihisa Segawa, Yoshihiko Abe (Iwate Pref Univ.)
(4) 10:45 - 11:10
Analysis of initial data in a pseudorandom number generator utilizing a one dimensional mapping
Makoto Homma, Chigak Itoi, Fumiko Okiharu, Ryusuke Watase, Yoshinori Sakamoto (Nihon Univ.)
(5) 11:10 - 11:35
Symmetric 128bit Block Cipher(HyRAL) Beased on AES Request
Kouzou Hirata (LIS Inc.)
(6) 11:35 - 12:00
Verification of MRSL based S-BOX in AES as a countermeasure against DPA.
Minoru Sasaki, Keisuke Iwai, Takakazu Kurokawa (NDA.)
----------------------------------------
Wed, Sep 13 (13:00 - 17:25)
----------------------------------------
(7) 13:00 - 13:25
Collision Resistance of Double-Block-Length Hash Function against Free-Start Attack
Shoichi Hirose (Fukui Univ.)
(8) 13:25 - 13:50
Side Channel Attacks against HMACs with Design for Hash Functions
Katsuyuki Okeya (Hitachi)
(9) 13:50 - 14:15
Black-Box Traitor Revocable Broadcast Encryption with Short Private Keys
Jun Furukawa (NEC), Nuttapong Attrapadung (Tokyo Univ.), Satoshi Obana (NEC)
(10) 14:15 - 14:40
Re-Encryption Schemes with Applications to Data Storage
-- Investigation of achieving preventative from collusion operating over the torsion subgroup in an elliptic curve --
Hirokazu Ougi (Mebius)
(11) 14:40 - 15:05
A Method of Software Dynamic Birthmarks using History of API Function Calls
Osamu Moriyama, Takahiro Furue, Tsuyoshi Toyama, Tsutomu Matsumoto (Yokohama National University)
----- Break ( 15 min. ) -----
(12) 15:20 - 15:45
Constructions of K_{HLN}・SE(g)PKC on the basis of K-Construction with hidden location noise(HLN)
Masao Kasahara (Osaka Gakuin Univ.)
(13) 15:45 - 16:10
A Conditional Knapsack Cryptosystem Using High Density Sequences
Kunikatsu Kobayashi (Yamagata Univ.)
(14) 16:10 - 16:35
Key Predistribution Schemes for Sensor Networks Using Lines and Points over a Finite Geometry
Ritsuko Matsumoto, Hisashi Mouri, Yuichi Kaji (NAIST)
(15) 16:35 - 17:00
A study on error correction in secret key agreement scheme using ESPAR antenna
Kenya Horai, Hisato Iwai, Hideichi Sasaoka (Doshisha Univ.), Takashi Ohira (ATR)
(16) 17:00 - 17:25
Unconditional Security of Key Establishment System Using a Variable Directional Antenna
Kirill Morozov, Kazukuni Kobara (AIST), Hideki Imai (Chuo Univ.)
=== Technical Committee on Information Security (ISEC) ===
# FUTURE SCHEDULE:
Thu, Nov 16, 2006 - Fri, Nov 17, 2006: Univ. of Tokyo(Kashiwa Campus) [Fri, Sep 15]
Wed, Dec 13, 2006: Kikai-Shinko-Kaikan Bldg. [Fri, Oct 20]
# SECRETARY:
Yoshiaki Shiraishi (Nagoya Inst. of Tech.)
TEL +81-52-735-7240, FAX +81-52-744-1355
E-mail: i c- c![](/ken/images/new/ta.gif) ![](/ken/images/new/liam.gif) (to ISEC secretaries)
Last modified: 2006-07-24 23:48:34
|
Notification: Mail addresses are partially hidden against SPAM.
|