|
Chair |
|
Kazuo Takaragi (Hitachi) |
Vice Chair |
|
Toru Fujiwara (Osaka Univ.), Naoya Torii (Fujitsu Labs.) |
Secretary |
|
Noboru Kunihiro (Univ. of Tokyo), Katsuyuki Takashima (Mitsubishi Electric) |
Assistant |
|
Toru Nakanishi (Okayama Univ.) |
|
Conference Date |
Fri, May 21, 2010 13:00 - 17:35 |
Topics |
|
Conference Place |
Kikai-Shinko-Kaikan Bldg. |
Address |
3-5-8, Shiba-kouen, Minato-ku, Tokyo, 105-0011 Japan |
Transportation Guide |
8 min. walk from Kamiya-cho Sta. on Subway Hibiya Line or 10 min. walk from Daimon Sta. both on Subway Asakusa Line and on Oedo Line http://www.jspmi.or.jp/kaikan.htm |
Copyright and reproduction |
All rights are reserved and no part of this publication may be reproduced or transmitted in any form or by any means, electronic or mechanical, including photocopy, recording, or any information storage and retrieval system, without permission in writing from the publisher. Notwithstanding, instructors are permitted to photocopy isolated articles for noncommercial classroom use without fee. (License No.: 10GA0019/12GB0052/13GB0056/17GB0034/18GB0034) |
Fri, May 21 PM 13:00 - 17:35 |
(1) |
13:00-13:25 |
The Suggestion of Corrected Non-overlapping Template Matching Test ISEC2010-1 |
Yuichi Takeda (KAIT), Mituaki Huzii, Toshinari Kamakura, Norio Watanabe, Takakazu Sugiyama (Chuo Univ.) |
(2) |
13:25-13:50 |
Side-Channel Analysis and Countermeasures of Stream Cipher K2 ISEC2010-2 |
Matt Henricksen, Wun-she Yap, Chee-hoo Yian (I2R), Yuto Nakano, Kazuhide Fukushima, Shinsaku Kiyomoto, Toshiaki Tanaka (KDDI Labs.) |
(3) |
13:50-14:15 |
A Study on Non Linear Function and cryptanalysis of K2 ISEC2010-3 |
Takashi Ohshima, Munetoshi Iwakiri (NDA) |
(4) |
14:15-14:40 |
Comparing with feature of quantum stream cipher Y-00 and CPPM
-- Cipher with randomization of chiphertext -- ISEC2010-4 |
Masaki Sohma, Osamu Hirota (Tamagawa Univ.) |
|
14:40-14:55 |
Break ( 15 min. ) |
(5) |
14:55-15:20 |
Formal verification method for Dynamic Segregation of Duties which is based Functional Role ISEC2010-5 |
Michinobu Ochi, Satoshi Ono (Kogakuin Univ.) |
(6) |
15:20-15:45 |
An Improvement of Attribute-based Encryption ISEC2010-6 |
Hiroki Kunitake, Masahiro Mambo, Eiji Okamoto (Tsukuba Univ.) |
|
15:45-16:20 |
Break ( 35 min. ) |
(7) |
16:20-16:45 |
New Class of Public Key Cryptosystems Constructed Based on Error-Correcting Codes, Using K(III) Scheme
-- Appendix: Proposal of K(IX)SE(g)PKC -- ISEC2010-7 |
Masao Kasahara (Osaka Gakuin Univ.) |
(8) |
16:45-17:10 |
Consideration of Surface in Algebraic Surface Cryptosystems ISEC2010-8 |
Yuichi Komano, Koichiro Akiyama, Yoshikazu Hanatani, Hideyuki Miyake (Toshiba), Yasuhiro Goto (Hokkaido Univ. of Edu.) |
(9) |
17:10-17:35 |
Applying Numerical Analysis Technique To Prime Factorization ISEC2010-9 |
Masaaki Shirase (FUN) |
Announcement for Speakers |
General Talk | Each speech will have 20 minutes for presentation and 5 minutes for discussion. |
Contact Address and Latest Schedule Information |
ISEC |
Technical Committee on Information Security (ISEC) [Latest Schedule]
|
Contact Address |
Toru Nakanishi (Okayama University)
TEL +81-86-251-8249, FAX +81-86-251-8255
E- : i c- c  (to ISEC secretaries) |
Last modified: 2010-05-07 09:58:24
|