|
Chair |
|
Koichi Sakurai (Kyushu Univ.) |
Vice Chair |
|
Yukiyasu Tsunoo (NEC), Masahiro Mambo (Kanazawa Univ.) |
Secretary |
|
Tetsu Iwata (Nagoya Univ.), Goichiro Hanaoka (AIST) |
Assistant |
|
Tetsuya Izu (Fujitsu Lab.), Junpei Kawamoto (Kyushu Univ.), Yuichi Komano (Toshiba), Shigeyoshi Shima (NEC), Takaaki Mizuki (Tohoku Univ.) |
|
Conference Date |
Fri, May 15, 2015 13:30 - 17:35 |
Topics |
|
Conference Place |
|
Copyright and reproduction |
All rights are reserved and no part of this publication may be reproduced or transmitted in any form or by any means, electronic or mechanical, including photocopy, recording, or any information storage and retrieval system, without permission in writing from the publisher. Notwithstanding, instructors are permitted to photocopy isolated articles for noncommercial classroom use without fee. (License No.: 10GA0019/12GB0052/13GB0056/17GB0034/18GB0034) |
Fri, May 15 PM 13:30 - 14:20 |
(1) |
13:30-13:55 |
Proposal for Multivariate Public Key Cryptosystem Based on the Difficulty of 3 Prime Numbers Factorization Problem ISEC2015-1 |
Shigeo Tsujii, Kohtaro Tadaki, Ryo Fujita, Masahito Gotaishi (Chuo-U) |
(2) |
13:55-14:20 |
Truncated Differential Attack on Block Cipher PRINCE ISEC2015-2 |
Satoshi Setoguchi (Kagoshima Univ), Yasutaka Igarashi, Toshinobu Kaneko (Tokyo Univ of Science), Seiji Fukushima, Tomohiro Hachino (Kagoshima Univ) |
|
14:20-14:35 |
Break ( 15 min. ) |
Fri, May 15 PM 14:35 - 15:50 |
(3) |
14:35-15:00 |
Path analysis method of anonymous communication system Tor ISEC2015-3 |
Yukihiro Shibahara, Naoshi Sato (IISEC) |
(4) |
15:00-15:25 |
Cheating detectable multi-use password protected secret sharing secure against active adversary ISEC2015-4 |
Atsunori Ichikawa, Wakaha Ogata (TIT) |
(5) |
15:25-15:50 |
On the Security of QUIC ISEC2015-5 |
Masaya Iseki (titech), Eiichiro Fujisaki (NTT) |
|
15:50-16:05 |
Break ( 15 min. ) |
Fri, May 15 16:05 - 17:35 |
(6) |
16:05-16:35 |
[Invited Talk]
All-But-Many Encryption
-- A New Framework for Fully-Equipped UC Commitments -- ISEC2015-6 |
Eiichiro Fujisaki (NTT) |
(7) |
16:35-17:05 |
[Invited Talk]
Black-Box Separations for One-More (Static) Problems and Its Generalization ISEC2015-7 |
Jiang Zhang, Zhenfeng Zhang, Yu Chen, Yanfei Guo (CAS), Zongyang Zhang (AIST) |
(8) |
17:05-17:35 |
[Invited Talk]
Order-Preserving Encryption Secure Beyond One-Wayness ISEC2015-8 |
Isamu Teranishi (NEC), Moti Yung, Tal Malkin (Columbia Univ.) |
Announcement for Speakers |
General Talk | Each speech will have 20 minutes for presentation and 5 minutes for discussion. |
Invited Talk | Each speech will have 25 minutes for presentation and 5 minutes for discussion. |
Contact Address and Latest Schedule Information |
ISEC |
Technical Committee on Information Security (ISEC) [Latest Schedule]
|
Contact Address |
Tetsu Iwata (Nagoya University)
TEL +81-52-789-5722, FAX +81-52-789-5723
E- : i c- c  (to ISEC secretaries) |
Last modified: 2016-05-13 15:44:32
|