|
Chair |
|
Kazuo Takaragi (Hitachi) |
Vice Chair |
|
Toru Fujiwara (Osaka Univ.), Naoya Torii (Fujitsu Labs.) |
Secretary |
|
Noboru Kunihiro (Univ. of Tokyo), Katsuyuki Takashima (Mitsubishi Electric) |
Assistant |
|
Toru Nakanishi (Okayama Univ.) |
|
Conference Date |
Wed, Dec 16, 2009 13:00 - 17:00 |
Topics |
|
Conference Place |
Kikai-Shinko-Kaikan Bldg. |
Address |
3-5-8, Shiba-kouen, Minato-ku, Tokyo, 105-0011 Japan |
Transportation Guide |
8 min. walk from Kamiya-cho Sta. on Subway Hibiya Line or 10 min. walk from Daimon Sta. both on Subway Asakusa Line and on Oedo Line http://www.jspmi.or.jp/kaikan.htm |
Copyright and reproduction |
All rights are reserved and no part of this publication may be reproduced or transmitted in any form or by any means, electronic or mechanical, including photocopy, recording, or any information storage and retrieval system, without permission in writing from the publisher. Notwithstanding, instructors are permitted to photocopy isolated articles for noncommercial classroom use without fee. (License No.: 10GA0019/12GB0052/13GB0056/17GB0034/18GB0034) |
Wed, Dec 16 PM 13:00 - 17:00 |
(1) |
13:00-13:25 |
The feedback period length of Bijective function ISEC2009-71 |
Toru Ito (NETCOMSEC) |
(2) |
13:25-13:50 |
Beyond the Shannon limit by quantum stream cipher Y-00 and Holevo-Sohma-Hirota theorem
-- General proof -- ISEC2009-72 |
Osamu Hirota (Tamagawa Univ.) |
(3) |
13:50-14:15 |
Constructive Codes Achieving the Secrecy Capacity of Wiretap Channels ISEC2009-73 |
Mitsuru Hamada (Tamagawa Univ.) |
(4) |
14:15-14:40 |
On Viterbi search for the maximum differential characteristic probability of a cipher with certain Feistel structure ISEC2009-74 |
Yasutaka Igarashi, Toshinobu Kaneko (Tokyo Univ. of Science) |
|
14:40-14:55 |
Break ( 15 min. ) |
(5) |
14:55-15:20 |
Electro Magnetic Analysis and Local Information of Cryptographic Hardware ISEC2009-75 |
Hidekazu Morita, Yoshio Takahashi, Tsutomu Matsumoto, Junji Shikata (Yokohama National Univ.)) |
(6) |
15:20-15:45 |
GLV Method for Non-Supersingular Paring-Friendly Curves of Embedding Degree 1 ISEC2009-76 |
Shoichi Takeuchi, Tetsuya Izuta, Yumi Sakemi, Kazushi Nishii, Yasuyuki Nogami, Yoshitaka Morikawa (Okayama Univ.) |
(7) |
15:45-16:10 |
A Construction Method of Basis Conversion Matrix by Using Small Multiplicative Group for Cryptographic Applications ISEC2009-77 |
Hidehiro Kato, Yasuyuki Nogami (Okayama Univ.), Satoshi Uehara (The Univ. of Kitakyushu), Yoshitaka Morikawa (Okayama Univ.) |
(8) |
16:10-16:35 |
Improvement of the Internal Perturbation Modifier
-- An example of Perturbed Matsumoto-Imai -- ISEC2009-78 |
Masahito Gotaishi, Shigeo Tsujii (Chuo Univ.) |
(9) |
16:35-17:00 |
Redesigning of a role hierarchy for role-based access control ISEC2009-79 |
Yoshiharu Asakura (NEC/Univ. of Hyogo), Yukikazu Nakamoto (Univ. of Hyogo) |
Announcement for Speakers |
General Talk | Each speech will have 20 minutes for presentation and 5 minutes for discussion. |
Contact Address and Latest Schedule Information |
ISEC |
Technical Committee on Information Security (ISEC) [Latest Schedule]
|
Contact Address |
Toru Nakanishi (Okayama University)
TEL +81-86-251-8249, FAX +81-86-251-8255
E-: ic-c (to ISEC secretaries) |
Last modified: 2009-10-22 09:54:53
|