IEICE Technical Committee Submission System
Conference Schedule
Online Proceedings
[Sign in]
Tech. Rep. Archives
    [Japanese] / [English] 
( Committee/Place/Topics  ) --Press->
 
( Paper Keywords:  /  Column:Title Auth. Affi. Abst. Keyword ) --Press->

Technical Committee on Information Security (ISEC)  (Searched in: 2007)

Search Results: Keywords 'from:2007-12-19 to:2007-12-19'

[Go to Official ISEC Homepage (Japanese)] 
Search Results: Conference Papers
 Conference Papers (Available on Advance Programs)  (Sort by: Date Ascending)
 Results 1 - 17 of 17  /   
Committee Date Time Place Paper Title / Authors Abstract Paper #
ISEC 2007-12-19
09:30
Tokyo Kikai-Shinko-Kaikan Bldg. Tests of Random Number and Autocorrelation Test for Cryptographic Applications
Yuichi Takeda (KAIT), Mituaki Huzii, Toshinari Kamakura, Norio Watanabe, Takakazu Sugiyama (Chuo Univ.) ISEC2007-112
 [more] ISEC2007-112
pp.1-3
ISEC 2007-12-19
09:55
Tokyo Kikai-Shinko-Kaikan Bldg. Verification of DPA against XOR in hardware implementation of AES
Yohei Tsuji, Keisuke Iwai, Takakazu Kurokawa (NDA) ISEC2007-113
DPA techniques against cryptographic devices based on hardware implementation utilize the transition probability of bit ... [more] ISEC2007-113
pp.5-10
ISEC 2007-12-19
10:20
Tokyo Kikai-Shinko-Kaikan Bldg. How to design tables for power-analyses resistance of Table-network-based FPGA implementations of AES
Makoto Torikoshi, Yoshio Takahashi, Tsutomu Matsumoto (Yokohama National Univ.) ISEC2007-114
Differential power analyses are statistical cryptanalytic methods to estimate the value of hidden cryptographic keys ins... [more] ISEC2007-114
pp.11-18
ISEC 2007-12-19
10:45
Tokyo Kikai-Shinko-Kaikan Bldg. An Integration Method of Incomplete Cryptographic System and Spread Spectrum Encoder
Ta Minh Thanh, Munetoshi Iwakiri (NDA) ISEC2007-115
Digital contents can be copied without degradation, so that problems of illegal distribution of contents occur. Digital ... [more] ISEC2007-115
pp.19-24
ISEC 2007-12-19
11:10
Tokyo Kikai-Shinko-Kaikan Bldg. An Applied Method of AES algorithm to Incomplete Cryptographic System.
Ta Minh Thanh, Munetoshi Iwakiri (NDA) ISEC2007-116
This report proposes a Digital Rights Management (DRM) technique with an applied method of AES algorithm to incomplete c... [more] ISEC2007-116
pp.25-31
ISEC 2007-12-19
11:35
Tokyo Kikai-Shinko-Kaikan Bldg. A Study on Quantitative Evaluation Method of System Security
Daisakuk Horie (Konica Minolta TC) ISEC2007-117
The frame of the evaluation to ensure the security above a certain level has been consolidated like ISO/IEC 27001. But i... [more] ISEC2007-117
pp.33-40
ISEC 2007-12-19
13:00
Tokyo Kikai-Shinko-Kaikan Bldg. New Classes of Public Key Cryptosystem Constructed on the Basis of Multivariate Polynomials and Random Coding
Masao Kasahara (Osaka Gakuin Univ.) ISEC2007-118
 [more] ISEC2007-118
pp.41-48
ISEC 2007-12-19
13:25
Tokyo Kikai-Shinko-Kaikan Bldg. A Knapsack Cryptosystem Using Two Operations
Atsushi Igarashi, Kunikatsu Kobayashi (Yamagata Univ.) ISEC2007-119
 [more] ISEC2007-119
pp.49-53
ISEC 2007-12-19
13:50
Tokyo Kikai-Shinko-Kaikan Bldg. A Consideration on Hitting Set Problem and Incidence Matrix
Kunikatsu Kobayashi (Yamagata Univ.) ISEC2007-120
We examine a solution of hitting set problem. By using incidence matrix M of graph G, we can decide whether hitting set ... [more] ISEC2007-120
pp.55-58
ISEC 2007-12-19
14:15
Tokyo Kikai-Shinko-Kaikan Bldg. Efficiency Analysis of Multi-Scalar Multiplications using Direct Computation Methods
Hisashi Yamada, Tsuyoshi Takagi (FUN), Kouichi Sakurai (Kyushu Univ.) ISEC2007-121
The most time consuming operation to verify a signature
with the elliptic curve digital signature algorithm (ECDSA)
i... [more]
ISEC2007-121
pp.59-66
ISEC 2007-12-19
14:40
Tokyo Kikai-Shinko-Kaikan Bldg. Generalized EBRIP
Atsuko Miyaji (JAIST) ISEC2007-122
 [more] ISEC2007-122
pp.67-78
ISEC 2007-12-19
15:05
Tokyo Kikai-Shinko-Kaikan Bldg. An Implementation of a Privacy Enhancing SSL/TLS Protocol Based on Group Signatures
Hiroki Obayashi, Toru Nakanishi, Jun Kawashima, Nobuo Funabiki (Okayama Univ.) ISEC2007-123
While various Web services have spread, a lot of private information leaks have been often caused by the service vendors... [more] ISEC2007-123
pp.79-84
ISEC 2007-12-19
15:45
Tokyo Kikai-Shinko-Kaikan Bldg. A Study of IBE to PKE Proxy Re-Encryption
Takeo Mizuno, Hiroshi Doi (IISEC) ISEC2007-124
A proxy re-encryption scheme allows the proxy to transform ciphertexts encrypted under Alice’s public key into the diffe... [more] ISEC2007-124
pp.85-92
ISEC 2007-12-19
16:10
Tokyo Kikai-Shinko-Kaikan Bldg. Attribute-Based Encryption with Partially Hidden Ciphertext Policies
Takashi Nishide (Univ. of Electro-Comm./Hitachi Software), Kazuki Yoneyama, Kazuo Ohta (Univ. of Electro-Comm.) ISEC2007-125
We propose an attribute-based encryption scheme where encryptor-specified
policies are hidden.
By using our scheme, an... [more]
ISEC2007-125
pp.93-100
ISEC 2007-12-19
16:35
Tokyo Kikai-Shinko-Kaikan Bldg. A Lossless Image Authentication Scheme for Tamper-Proofing
Tomoya Tanaka, Koki Abe (UEC) ISEC2007-126
This paper proposes an image authentication scheme that does not have any influence
on images at all.
Conventional se... [more]
ISEC2007-126
pp.101-106
ISEC 2007-12-19
17:00
Tokyo Kikai-Shinko-Kaikan Bldg. Classification and feature extraction by using computer virus static analysis
Kazuki Iwamoto (JCSR), Katsumi Wasaki (Shinshu Univ.) ISEC2007-127
About the variant judgment of the computer virus, we consider the method of classification and feature extraction based ... [more] ISEC2007-127
pp.107-113
ISEC 2007-12-19
17:25
Tokyo Kikai-Shinko-Kaikan Bldg. Evaluation of a Detection System against Fuzzing Attacks on the SIP Protocol
Masaya Ozawa (Chuo Univ.), Eric Y. Chen, Mitsutaka Itoh (NTT PF Lab.), Mitsutoshi Hatori (Chuo Univ.) ISEC2007-128
As the number of VoIP users grows rapidly in recent years, the available attack vectors against VoIP systems also increa... [more] ISEC2007-128
pp.115-121
 Results 1 - 17 of 17  /   
Choose a download format for default settings. [NEW !!]
Text format pLaTeX format CSV format BibTeX format
Copyright and reproduction : All rights are reserved and no part of this publication may be reproduced or transmitted in any form or by any means, electronic or mechanical, including photocopy, recording, or any information storage and retrieval system, without permission in writing from the publisher. Notwithstanding, instructors are permitted to photocopy isolated articles for noncommercial classroom use without fee. (License No.: 10GA0019/12GB0052/13GB0056/17GB0034/18GB0034)


[Return to Top Page]

[Return to IEICE Web Page]


The Institute of Electronics, Information and Communication Engineers (IEICE), Japan