Committee |
Date Time |
Place |
Paper Title / Authors |
Abstract |
Paper # |
ISEC |
2007-12-19 09:30 |
Tokyo |
Kikai-Shinko-Kaikan Bldg. |
Tests of Random Number and Autocorrelation Test for Cryptographic Applications Yuichi Takeda (KAIT), Mituaki Huzii, Toshinari Kamakura, Norio Watanabe, Takakazu Sugiyama (Chuo Univ.) ISEC2007-112 |
[more] |
ISEC2007-112 pp.1-3 |
ISEC |
2007-12-19 09:55 |
Tokyo |
Kikai-Shinko-Kaikan Bldg. |
Verification of DPA against XOR in hardware implementation of AES Yohei Tsuji, Keisuke Iwai, Takakazu Kurokawa (NDA) ISEC2007-113 |
DPA techniques against cryptographic devices based on hardware implementation utilize the transition probability of bit ... [more] |
ISEC2007-113 pp.5-10 |
ISEC |
2007-12-19 10:20 |
Tokyo |
Kikai-Shinko-Kaikan Bldg. |
How to design tables for power-analyses resistance of Table-network-based FPGA implementations of AES Makoto Torikoshi, Yoshio Takahashi, Tsutomu Matsumoto (Yokohama National Univ.) ISEC2007-114 |
Differential power analyses are statistical cryptanalytic methods to estimate the value of hidden cryptographic keys ins... [more] |
ISEC2007-114 pp.11-18 |
ISEC |
2007-12-19 10:45 |
Tokyo |
Kikai-Shinko-Kaikan Bldg. |
An Integration Method of Incomplete Cryptographic System and Spread Spectrum Encoder Ta Minh Thanh, Munetoshi Iwakiri (NDA) ISEC2007-115 |
Digital contents can be copied without degradation, so that problems of illegal distribution of contents occur. Digital ... [more] |
ISEC2007-115 pp.19-24 |
ISEC |
2007-12-19 11:10 |
Tokyo |
Kikai-Shinko-Kaikan Bldg. |
An Applied Method of AES algorithm to Incomplete Cryptographic System. Ta Minh Thanh, Munetoshi Iwakiri (NDA) ISEC2007-116 |
This report proposes a Digital Rights Management (DRM) technique with an applied method of AES algorithm to incomplete c... [more] |
ISEC2007-116 pp.25-31 |
ISEC |
2007-12-19 11:35 |
Tokyo |
Kikai-Shinko-Kaikan Bldg. |
A Study on Quantitative Evaluation Method of System Security Daisakuk Horie (Konica Minolta TC) ISEC2007-117 |
The frame of the evaluation to ensure the security above a certain level has been consolidated like ISO/IEC 27001. But i... [more] |
ISEC2007-117 pp.33-40 |
ISEC |
2007-12-19 13:00 |
Tokyo |
Kikai-Shinko-Kaikan Bldg. |
New Classes of Public Key Cryptosystem Constructed on the Basis of Multivariate Polynomials and Random Coding Masao Kasahara (Osaka Gakuin Univ.) ISEC2007-118 |
[more] |
ISEC2007-118 pp.41-48 |
ISEC |
2007-12-19 13:25 |
Tokyo |
Kikai-Shinko-Kaikan Bldg. |
A Knapsack Cryptosystem Using Two Operations Atsushi Igarashi, Kunikatsu Kobayashi (Yamagata Univ.) ISEC2007-119 |
[more] |
ISEC2007-119 pp.49-53 |
ISEC |
2007-12-19 13:50 |
Tokyo |
Kikai-Shinko-Kaikan Bldg. |
A Consideration on Hitting Set Problem and Incidence Matrix Kunikatsu Kobayashi (Yamagata Univ.) ISEC2007-120 |
We examine a solution of hitting set problem. By using incidence matrix M of graph G, we can decide whether hitting set ... [more] |
ISEC2007-120 pp.55-58 |
ISEC |
2007-12-19 14:15 |
Tokyo |
Kikai-Shinko-Kaikan Bldg. |
Efficiency Analysis of Multi-Scalar Multiplications using Direct Computation Methods Hisashi Yamada, Tsuyoshi Takagi (FUN), Kouichi Sakurai (Kyushu Univ.) ISEC2007-121 |
The most time consuming operation to verify a signature
with the elliptic curve digital signature algorithm (ECDSA)
i... [more] |
ISEC2007-121 pp.59-66 |
ISEC |
2007-12-19 14:40 |
Tokyo |
Kikai-Shinko-Kaikan Bldg. |
Generalized EBRIP Atsuko Miyaji (JAIST) ISEC2007-122 |
[more] |
ISEC2007-122 pp.67-78 |
ISEC |
2007-12-19 15:05 |
Tokyo |
Kikai-Shinko-Kaikan Bldg. |
An Implementation of a Privacy Enhancing SSL/TLS Protocol Based on Group Signatures Hiroki Obayashi, Toru Nakanishi, Jun Kawashima, Nobuo Funabiki (Okayama Univ.) ISEC2007-123 |
While various Web services have spread, a lot of private information leaks have been often caused by the service vendors... [more] |
ISEC2007-123 pp.79-84 |
ISEC |
2007-12-19 15:45 |
Tokyo |
Kikai-Shinko-Kaikan Bldg. |
A Study of IBE to PKE Proxy Re-Encryption Takeo Mizuno, Hiroshi Doi (IISEC) ISEC2007-124 |
A proxy re-encryption scheme allows the proxy to transform ciphertexts encrypted under Alice’s public key into the diffe... [more] |
ISEC2007-124 pp.85-92 |
ISEC |
2007-12-19 16:10 |
Tokyo |
Kikai-Shinko-Kaikan Bldg. |
Attribute-Based Encryption with Partially Hidden Ciphertext Policies Takashi Nishide (Univ. of Electro-Comm./Hitachi Software), Kazuki Yoneyama, Kazuo Ohta (Univ. of Electro-Comm.) ISEC2007-125 |
We propose an attribute-based encryption scheme where encryptor-specified
policies are hidden.
By using our scheme, an... [more] |
ISEC2007-125 pp.93-100 |
ISEC |
2007-12-19 16:35 |
Tokyo |
Kikai-Shinko-Kaikan Bldg. |
A Lossless Image Authentication Scheme for Tamper-Proofing Tomoya Tanaka, Koki Abe (UEC) ISEC2007-126 |
This paper proposes an image authentication scheme that does not have any influence
on images at all.
Conventional se... [more] |
ISEC2007-126 pp.101-106 |
ISEC |
2007-12-19 17:00 |
Tokyo |
Kikai-Shinko-Kaikan Bldg. |
Classification and feature extraction by using computer virus static analysis Kazuki Iwamoto (JCSR), Katsumi Wasaki (Shinshu Univ.) ISEC2007-127 |
About the variant judgment of the computer virus, we consider the method of classification and feature extraction based ... [more] |
ISEC2007-127 pp.107-113 |
ISEC |
2007-12-19 17:25 |
Tokyo |
Kikai-Shinko-Kaikan Bldg. |
Evaluation of a Detection System against Fuzzing Attacks on the SIP Protocol Masaya Ozawa (Chuo Univ.), Eric Y. Chen, Mitsutaka Itoh (NTT PF Lab.), Mitsutoshi Hatori (Chuo Univ.) ISEC2007-128 |
As the number of VoIP users grows rapidly in recent years, the available attack vectors against VoIP systems also increa... [more] |
ISEC2007-128 pp.115-121 |