|
Chair |
|
Masahiro Mambo (Kanazawa Univ.) |
Vice Chair |
|
Kazuto Ogawa (NHK), Atsushi Fujioka (Kanagawa Univ.) |
Secretary |
|
Yuichi Komano (Toshiba), Takaaki Mizuki (Tohoku Univ.) |
Assistant |
|
Toshihiro Ohigashi (Tokai Univ.), Yuuji Suga (IIJ), Atsuo Inomata (Tokyo Denki Univ.) |
|
|
Chair |
|
Hiroo Itoh (Univ. of Electro-Comm.) |
Vice Chair |
|
Yuushi Uno (Osaka Pref. Univ.) |
Secretary |
|
Kazuhisa Seto (Seikei Univ.), Toshiki Saito (Kobe Univ.) |
|
Conference Date |
Wed, Dec 21, 2016 09:30 - 15:50
Thu, Dec 22, 2016 09:30 - 16:20 |
Topics |
|
Conference Place |
Hiroshima University, Administration Bureau, 4F, meeting room |
Address |
1-3-2 Kagamiyama, Higashi Hiroshima Hiroshima, 739-8527 JAPAN |
Copyright and reproduction |
All rights are reserved and no part of this publication may be reproduced or transmitted in any form or by any means, electronic or mechanical, including photocopy, recording, or any information storage and retrieval system, without permission in writing from the publisher. Notwithstanding, instructors are permitted to photocopy isolated articles for noncommercial classroom use without fee. (License No.: 10GA0019/12GB0052/13GB0056/17GB0034/18GB0034) |
Wed, Dec 21 09:30 - 10:10 |
(1) |
09:30-09:50 |
Improvements of Blacklistable Anonymous Credential System Using Accumulator ISEC2016-70 COMP2016-31 |
Yuu Aikou, Toru Nakanishi (Hiroshima Univ) |
(2) |
09:50-10:10 |
A note on security notions of anonymity in Identity-based encryption ISEC2016-71 COMP2016-32 |
Honomu Ootomo, Taroh Sasaki, Atsushi Fujioka (Kanagawa Univ.) |
|
10:10-10:30 |
Break ( 20 min. ) |
Wed, Dec 21 10:30 - 11:30 |
(3) |
10:30-11:30 |
[Invited Talk]
New frontier of machine learning and computation initiated by quantum annealing ISEC2016-72 COMP2016-33 |
Masayuki Ohzeki (Tohoku Univ.) |
|
11:30-12:30 |
Lunch Break ( 60 min. ) |
Wed, Dec 21 12:30 - 14:10 |
(4) |
12:30-12:40 |
|
(5) |
12:40-13:10 |
[Invited Talk]
Fast and Scalable Bilinear-Type Conversion Using Integer Programming ISEC2016-73 COMP2016-34 |
Fumitaka Hoshino, Masayuki Abe (NTT), Miyako Ohkubo (NICT) |
(6) |
13:10-13:40 |
[Invited Talk]
Cryptanalysis of GGH15 Multilinear Maps (from CRYPTO 2016) ISEC2016-74 COMP2016-35 |
Mehdi Tibouchi (NTT) |
(7) |
13:40-14:10 |
[Invited Talk]
Backdoors in Pseudorandom Number Generators: Possibility and Impossibility Results ISEC2016-75 COMP2016-36 |
Jean Paul Degabriele, Kenneth Paterson (RHUL), Jacob Schuldt (AIST), Joanne Woodage (RHUL) |
|
14:10-14:30 |
Break ( 20 min. ) |
Wed, Dec 21 14:30 - 15:50 |
(8) |
14:30-14:50 |
ISEC2016-76 COMP2016-37 |
Miki Miyauchi (NTT) |
(9) |
14:50-15:10 |
ISEC2016-77 COMP2016-38 |
|
(10) |
15:10-15:30 |
A Loosely-Stabilizing Population Protocol for Maximal Independent Set ISEC2016-78 COMP2016-39 |
Seiken Kiyosu, Yuichi Sudo, Hirotsugu Kakugawa, Toshimitsu Masuzawa (Osaka Univ.) |
(11) |
15:30-15:50 |
Theoretical Model of Interconnection Networks Consisting of Hosts and Switches ISEC2016-79 COMP2016-40 |
Ryota Yasudo (Keio Univ.), Michihiro Koibuchi (NII), Hideharu Amano (Keio Univ.), Koji Nakano (Hiroshima Univ.) |
Thu, Dec 22 09:30 - 10:10 |
(12) |
09:30-09:50 |
Effect on Mix Columns to the Security of Minalpher ISEC2016-80 COMP2016-41 |
Yuki Kishi, Taroh Sasaki, Atsushi Fujioka (Kanagawa Univ) |
(13) |
09:50-10:10 |
Reconsideration on Re-keying scheme from CARDIS 2015 (part 2) ISEC2016-81 COMP2016-42 |
Yuichi Komano (Toshiba) |
|
10:10-10:30 |
Break ( 20 min. ) |
Thu, Dec 22 10:30 - 11:30 |
(14) |
10:30-11:30 |
[Invited Talk]
Theory and Practice of Succinct Data Structures ISEC2016-82 COMP2016-43 |
Kunihiko Sadakane (Univ. of Tokyo) |
|
11:30-12:30 |
Lunch Break ( 60 min. ) |
Thu, Dec 22 12:30 - 14:00 |
(15) |
12:30-13:00 |
[Invited Talk]
Adversary-dependent Lossy Trapdoor Function from Hardness of Factoring Semi-smooth RSA Subgroup ISEC2016-83 COMP2016-44 |
Takashi Yamakawa (UT), Shota Yamada, Goichiro Hanaoka (AIST), Noboru Kunihiro (UT) |
(16) |
13:00-13:30 |
[Invited Talk]
Extended Tower Number Field Sieve: A New Complexity for the Medium Prime Case (from CRYPTO 2015) ISEC2016-84 COMP2016-45 |
Taechan Kim (NTT) |
(17) |
13:30-14:00 |
[Invited Talk]
The SKINNY Family of Block Ciphers and its Low-Latency Variant MANTIS ISEC2016-85 COMP2016-46 |
Yu Sasaki (NTT) |
|
14:00-14:20 |
Break ( 20 min. ) |
Thu, Dec 22 14:20 - 15:20 |
(18) |
14:20-15:20 |
[Invited Talk]
How small can the diameter of an undirected graph be?
-- Toward low-latency large-scale interconnection networks -- ISEC2016-86 COMP2016-47 |
Ikki Fujiwara (NICT) |
|
15:20-15:40 |
Break ( 20 min. ) |
Thu, Dec 22 15:40 - 16:20 |
(19) |
15:40-16:00 |
Reduction of Search Number for Equivalence Structure Extraction Under Equivalence Structure Conservation Assumption ISEC2016-87 COMP2016-48 |
Seiya Satoh (AIST), Yoshinobu Takahashi (University of Electro-Communications), Hiroshi Yamakawa (Dwango AI Lab) |
(20) |
16:00-16:20 |
Improvement of Finger Outlines Extraction in Hand Images Including Unusual Patterns with a Color Glove ISEC2016-88 COMP2016-49 |
Kotaro Moriuchi, Noriaki Fujishima (NIT, Matsue College) |
Announcement for Speakers |
General Talk | Each speech will have 15 minutes for presentation and 5 minutes for discussion. |
Contact Address and Latest Schedule Information |
ISEC |
Technical Committee on Information Security (ISEC) [Latest Schedule]
|
Contact Address |
Takaaki Mizuki (Tohoku University)
E-: ic-c (to ISEC secretaries) |
COMP |
Technical Committee on Theoretical Foundations of Computing (COMP) [Latest Schedule]
|
Contact Address |
Toshiki Saitoh
Graduate School of Engineering, Kobe University.
Address: 1-1 Rokkodai, Nada, Kobe, 657-8501, Japan.
E-: iheedeptbe-u |
Last modified: 2016-12-19 10:07:11
|