Committee |
Date Time |
Place |
Paper Title / Authors |
Abstract |
Paper # |
ISEC |
2007-05-18 09:45 |
Tokyo |
Kikai-Shinko-Kaikan Bldg. |
The 128-bit Blockcipher CLEFIA Taizo Shirai, Kyoji Shibutani, Toru Akishita, Shiho Moriai (Sony), Tetsu Iwata (Nagoya Univ.) ISEC2007-1 |
We propose a new 128-bit blockcipher CLEFIA supporting key lengths of
128, 192 and 256 bits, which is compatible with ... [more] |
ISEC2007-1 pp.1-9 |
ISEC |
2007-05-18 10:10 |
Tokyo |
Kikai-Shinko-Kaikan Bldg. |
Some experiments on the mini-model of the pseudorandom number generator MUGI Dai Watanabe (Hitachi), Toshinobu Kaneko (Tokyo University of Science) ISEC2007-2 |
[more] |
ISEC2007-2 pp.11-16 |
ISEC |
2007-05-18 10:35 |
Tokyo |
Kikai-Shinko-Kaikan Bldg. |
Correction of "Test for the Longest Run of Ones in a Block" Included in NIST Randomness Test Suite Kenji Hamano (The Univ. of Tokyo) ISEC2007-3 |
When random sequences taken from the block cipher DES, which is known to be a good random generator, were tested using “... [more] |
ISEC2007-3 pp.17-21 |
ISEC |
2007-05-18 11:00 |
Tokyo |
Kikai-Shinko-Kaikan Bldg. |
A Fast (4,n)-Threshold Secret Sharing Scheme Using Exclusive-OR Operations, and Its Extension to (k,n)-Threshold Schemes Jun Kurihara, Shinsaku Kiyomoto, Kazuhide Fukushima, Toshiaki Tanaka (KDDI R&D Labs.) ISEC2007-4 |
[more] |
ISEC2007-4 pp.23-30 |
ISEC |
2007-05-18 11:25 |
Tokyo |
Kikai-Shinko-Kaikan Bldg. |
(k,n) Threshold Secret Sharing Schemes Using XOR Operations Yoshihiro Fujii (TOSHIBA SOLUTIONS), Kouya Tochikubo (Nihon Univ.), Norikazu Hosaka, Minako Tada, Takehisa Kato (TOSHIBA SOLUTIONS) ISEC2007-5 |
We propose a fast $(k, n)$-threshold scheme using EXCLUSIVE-OR operations. The proposed scheme is ideal and the size of ... [more] |
ISEC2007-5 pp.31-38 |
ISEC |
2007-05-18 12:50 |
Tokyo |
Kikai-Shinko-Kaikan Bldg. |
Birthday Paradox for Multi-Collisions Kazuhiro Suzuki (Ibaraki Univ.), Dongvu Tonien (Uni.y of Wollongong), Kaoru Kurosawa, Koji Toyota (Ibaraki Univ.) ISEC2007-6 |
In this paper, we study multi-collision probability.
For a hash function $H:D \rightarrow R$
with $|R|=n$,
it has be... [more] |
ISEC2007-6 pp.39-44 |
ISEC |
2007-05-18 13:15 |
Tokyo |
Kikai-Shinko-Kaikan Bldg. |
Security of delegating decryption key in ID-based Encryption Scheme Hirokazu Ougi ISEC2007-7 |
[more] |
ISEC2007-7 pp.45-52 |
ISEC |
2007-05-18 13:40 |
Tokyo |
Kikai-Shinko-Kaikan Bldg. |
Efficient ID-Based Signature without Random Oracle Jiageng Chen, Atsuko Miyaji (JAIST) ISEC2007-8 |
ID-Based signature scheme is a kind of public key signature scheme which uses the user's identity as the public key. Com... [more] |
ISEC2007-8 pp.53-56 |
ISEC |
2007-05-18 14:05 |
Tokyo |
Kikai-Shinko-Kaikan Bldg. |
Consideration on security of digital signatures from the view of Paillier's framework Yutaka Kawai, Kazuo Ohta, Noboru Kunihiro (UEC) ISEC2007-9 |
In the dawn of the research on public key cryptosystem,「There is a certain scheme such that if the scheme proven secure ... [more] |
ISEC2007-9 pp.57-64 |
ISEC |
2007-05-18 14:30 |
Tokyo |
Kikai-Shinko-Kaikan Bldg. |
consideration of quantum Oblivious Transfer Atsushi Waseda (NICT), Takayuki Takagi, Masakazu Soshi, Atsuko Miyaji (JAIST) ISEC2007-10 |
Quantum oblivious transfer (QOT) is one of the important primitive for quantum security. In representative example of Q... [more] |
ISEC2007-10 pp.65-68 |
ISEC |
2007-05-18 15:10 |
Tokyo |
Kikai-Shinko-Kaikan Bldg. |
A multiplication formula on degenerate divisors of genus 4 hyperelliptic curves Naoki Kanayama, Takehiro Yamaguchi, Takeshi Okamoto, Eiji Okamoto (Tsukuba Univ.) ISEC2007-11 |
We show an pairing-friendly genus 4 hyperelliptic curve over finite fields of characteristic 2 and prove an scalar multi... [more] |
ISEC2007-11 pp.69-76 |
ISEC |
2007-05-18 15:35 |
Tokyo |
Kikai-Shinko-Kaikan Bldg. |
Visual Cryptography Schemes with Cyclic Structure for Many Images Miyuki Uno, Mikio Kano (Ibaraki Univ.) ISEC2007-12 |
We consider a visual cryptography sharing scheme with
cyclic access structure
for $n$ secret images and $n$ shares,
... [more] |
ISEC2007-12 pp.77-84 |
ISEC |
2007-05-18 16:00 |
Tokyo |
Kikai-Shinko-Kaikan Bldg. |
A Study on Spam-mail Filtering Based on Cooperation of Users and Providers Takashi Koike (Yahoo), Naoshi Sato (IISEC) ISEC2007-13 |
This study proposes a spam mail filtering method by cooperation of users and internet service providers. The proposed fi... [more] |
ISEC2007-13 pp.85-92 |
ISEC |
2007-05-18 16:25 |
Tokyo |
Kikai-Shinko-Kaikan Bldg. |
On Onewayness of Key-Scheduling Algorithms for eSTREAM's Ciphers Yoshiaki Fujikawa, Toshihiro Ohigashi, Hidenori Kuwakado, Masakatu Morii (Kobe Univ.) ISEC2007-14 |
In the stream cipher, the initial state is generated from a secret key and an initalization vector (IV) in key-schedulin... [more] |
ISEC2007-14 pp.93-99 |
ISEC |
2007-05-18 16:50 |
Tokyo |
Kikai-Shinko-Kaikan Bldg. |
On Equivalent Keys of Stream Ciphers Ryoichi Teramura, Takanori Isobe, Toshihiro Ohigashi, Hidenori Kuwakado, Masakatu Morii (Kobe Univ.) ISEC2007-15 |
When different keys are used in encryption, we call these keys equivalent keys
if ciphertexts generated from these key... [more] |
ISEC2007-15 pp.101-108 |