|
Chair |
|
Masakatsu Morii |
Vice Chair |
|
Mitsuru Matsui, Kazuo Ota |
Secretary |
|
Hiroshi Doi, Shiho Moriai |
Assistant |
|
Yoshiaki Shiraishi |
|
Conference Date |
Fri, May 18, 2007 09:45 - 17:15 |
Topics |
|
Conference Place |
Kikai-shinkou Building |
Address |
3-5-8, Shiba-kouen, Minato-ku, Tokyo, 105-0011 Japan |
Transportation Guide |
8 min. walk from Kamiya-cho Sta. on Subway Hibiya Line or 10 min. walk from Daimon Sta. both on Subway Asakusa Line and on Oedo Line http://www.jspmi.or.jp/kaikan.htm |
Copyright and reproduction |
All rights are reserved and no part of this publication may be reproduced or transmitted in any form or by any means, electronic or mechanical, including photocopy, recording, or any information storage and retrieval system, without permission in writing from the publisher. Notwithstanding, instructors are permitted to photocopy isolated articles for noncommercial classroom use without fee. (License No.: 10GA0019/12GB0052/13GB0056/17GB0034/18GB0034) |
Fri, May 18 AM 09:45 - 11:50 |
(1) |
09:45-10:10 |
The 128-bit Blockcipher CLEFIA ISEC2007-1 |
Taizo Shirai, Kyoji Shibutani, Toru Akishita, Shiho Moriai (Sony), Tetsu Iwata (Nagoya Univ.) |
(2) |
10:10-10:35 |
Some experiments on the mini-model of the pseudorandom number generator MUGI ISEC2007-2 |
Dai Watanabe (Hitachi), Toshinobu Kaneko (Tokyo University of Science) |
(3) |
10:35-11:00 |
Correction of "Test for the Longest Run of Ones in a Block" Included in NIST Randomness Test Suite ISEC2007-3 |
Kenji Hamano (The Univ. of Tokyo) |
(4) |
11:00-11:25 |
A Fast (4,n)-Threshold Secret Sharing Scheme Using Exclusive-OR Operations, and Its Extension to (k,n)-Threshold Schemes ISEC2007-4 |
Jun Kurihara, Shinsaku Kiyomoto, Kazuhide Fukushima, Toshiaki Tanaka (KDDI R&D Labs.) |
(5) |
11:25-11:50 |
(k,n) Threshold Secret Sharing Schemes Using XOR Operations ISEC2007-5 |
Yoshihiro Fujii (TOSHIBA SOLUTIONS), Kouya Tochikubo (Nihon Univ.), Norikazu Hosaka, Minako Tada, Takehisa Kato (TOSHIBA SOLUTIONS) |
Fri, May 18 PM 12:50 - 17:15 |
(6) |
12:50-13:15 |
Birthday Paradox for Multi-Collisions ISEC2007-6 |
Kazuhiro Suzuki (Ibaraki Univ.), Dongvu Tonien (Uni.y of Wollongong), Kaoru Kurosawa, Koji Toyota (Ibaraki Univ.) |
(7) |
13:15-13:40 |
Security of delegating decryption key in ID-based Encryption Scheme ISEC2007-7 |
Hirokazu Ougi |
(8) |
13:40-14:05 |
Efficient ID-Based Signature without Random Oracle ISEC2007-8 |
Jiageng Chen, Atsuko Miyaji (JAIST) |
(9) |
14:05-14:30 |
Consideration on security of digital signatures from the view of Paillier's framework ISEC2007-9 |
Yutaka Kawai, Kazuo Ohta, Noboru Kunihiro (UEC) |
(10) |
14:30-14:55 |
consideration of quantum Oblivious Transfer ISEC2007-10 |
Atsushi Waseda (NICT), Takayuki Takagi, Masakazu Soshi, Atsuko Miyaji (JAIST) |
|
14:55-15:10 |
Break ( 15 min. ) |
(11) |
15:10-15:35 |
A multiplication formula on degenerate divisors of genus 4 hyperelliptic curves ISEC2007-11 |
Naoki Kanayama, Takehiro Yamaguchi, Takeshi Okamoto, Eiji Okamoto (Tsukuba Univ.) |
(12) |
15:35-16:00 |
Visual Cryptography Schemes with Cyclic Structure for Many Images ISEC2007-12 |
Miyuki Uno, Mikio Kano (Ibaraki Univ.) |
(13) |
16:00-16:25 |
A Study on Spam-mail Filtering Based on Cooperation of Users and Providers ISEC2007-13 |
Takashi Koike (Yahoo), Naoshi Sato (IISEC) |
(14) |
16:25-16:50 |
On Onewayness of Key-Scheduling Algorithms for eSTREAM's Ciphers ISEC2007-14 |
Yoshiaki Fujikawa, Toshihiro Ohigashi, Hidenori Kuwakado, Masakatu Morii (Kobe Univ.) |
(15) |
16:50-17:15 |
On Equivalent Keys of Stream Ciphers ISEC2007-15 |
Ryoichi Teramura, Takanori Isobe, Toshihiro Ohigashi, Hidenori Kuwakado, Masakatu Morii (Kobe Univ.) |
Contact Address and Latest Schedule Information |
ISEC |
Technical Committee on Information Security (ISEC) [Latest Schedule]
|
Contact Address |
Yoshiaki Shiraishi (Nagoya Inst. of Tech.)
TEL +81-52-735-7240, FAX +81-52-744-1355
E-: ic-c (to ISEC secretaries) |
Last modified: 2007-03-26 11:01:43
|