IEICE Technical Committee Submission System
Conference Schedule
Online Proceedings
[Sign in]
Tech. Rep. Archives
    [Japanese] / [English] 
( Committee/Place/Topics  ) --Press->
 
( Paper Keywords:  /  Column:Title Auth. Affi. Abst. Keyword ) --Press->

Technical Committee on Information Security (ISEC)  (Searched in: 2008)

Search Results: Keywords 'from:2008-09-12 to:2008-09-12'

[Go to Official ISEC Homepage (Japanese)] 
Search Results: Conference Papers
 Conference Papers (Available on Advance Programs)  (Sort by: Date Ascending)
 Results 1 - 10 of 10  /   
Committee Date Time Place Paper Title / Authors Abstract Paper #
ISEC 2008-09-12
13:00
Tokyo Kikai-Shinko-Kaikan Bldg. New Classes of Public Key Cryptosystems Constructed on the Basis of Low-Density Multivariate Polynomials -- Along with K(I) Knapsack Scheme --
Masao Kasahara (Osaka Gakuin Univ.) ISEC2008-63
Extensive studies have been made of the public key cryptosystems based on multivariate polynomials over $\mathbb{F}_{2}$... [more] ISEC2008-63
pp.1-7
ISEC 2008-09-12
13:25
Tokyo Kikai-Shinko-Kaikan Bldg. New Trapdoors in Knapsack Public-Key Cryptosystem with Two Sequences as Public Key
Yasuyuki Murakami, Takeshi Nasako (Osaka Electro-Comm. Univ.), Masao Kasahara (Osaka Gakuin Univ.) ISEC2008-64
Present authors proposed a new class of knasack PKC (KMN PKC) which uses two sequences as the public key.
KMN PKC uses... [more]
ISEC2008-64
pp.9-16
ISEC 2008-09-12
13:50
Tokyo Kikai-Shinko-Kaikan Bldg. A Note on Security of KMN PKC
Takeshi Nasako, Yasuyuki Murakami (Osaka Electro-Comm. Univ.), Masao Kasahara (Osaka Gakuin Univ.) ISEC2008-65
Recently present authors proposed a new class of knapsack type cryptosystem on the basis of MH
PKC(KMN PKC). In this p... [more]
ISEC2008-65
pp.17-20
ISEC 2008-09-12
14:15
Tokyo Kikai-Shinko-Kaikan Bldg. A Factoring Algorithm Searching Squares (part 2)
Kunikatsu Kobayashi (Yamagata Univ.) ISEC2008-66
We propose a probabilistic factoring algorithm searching squares
using a factor base consisting of odd primes. [more]
ISEC2008-66
pp.21-24
ISEC 2008-09-12
14:40
Tokyo Kikai-Shinko-Kaikan Bldg. Cryptosystems on Algebraic Tori -- Parameter Generation with Security and Efficiency --
Tomoko Yonemura, Kenichiro Furuta, Yoshikazu Hanatani, Taichi Isogai, Yuichi Komano, Hirofumi Muratani, Hanae Nozaki, Kenji Ohkuma, Atsushi Shimbo (TOSHIBA Corp.) ISEC2008-67
We study on algebraic tori defined on extension field as cryptographic groups to construct public key encryption schemes... [more] ISEC2008-67
pp.25-32
ISEC 2008-09-12
15:20
Tokyo Kikai-Shinko-Kaikan Bldg. Reduction of Public-Key Size in a Revocable Group Signature Scheme with Constant Costs for Signing and Verifying
Hiroki Fujii, Yuta Hira, Toru Nakanishi, Nobuo Funabiki (Okayama Univ.) ISEC2008-68
Group signature scheme is the digital signature scheme enhancing the privacy of the user. We proposed a revocable scheme... [more] ISEC2008-68
pp.33-38
ISEC 2008-09-12
15:45
Tokyo Kikai-Shinko-Kaikan Bldg. Security Analysis on Electronic Money Systems including Compromise of Cryptographic Algorithms and/or Devices
Masataka Suzuki, Katsuhisa Hirokawa (BOJ) ISEC2008-69
This paper mainly focuses on note-based types of prepaid electronic money systems. Assuming compromise of cryptographic ... [more] ISEC2008-69
pp.39-46
ISEC 2008-09-12
16:10
Tokyo Kikai-Shinko-Kaikan Bldg. The security analysis using meta-reduction under several computational assumptions in the case of ElGamal encryption
Yutaka Kawai, Kazuo Ohta (UEC) ISEC2008-70
 [more] ISEC2008-70
pp.47-54
ISEC 2008-09-12
16:35
Tokyo Kikai-Shinko-Kaikan Bldg. Estimating RSA Private-Keys Generated in Security Chips
Tsutomu Matsumoto, Yoshio Takahashi (YNU) ISEC2008-71
For a particular instance of TPM - Trusted Platform Module, we have shown that the RSA private keys generated inside the... [more] ISEC2008-71
pp.55-62
ISEC 2008-09-12
17:00
Tokyo Kikai-Shinko-Kaikan Bldg. How to introduce the dynamic key to a provably Secure Block Cipher using FPGA Partial Reconfiguration
Kenji Takahashi, Tetsuya Ichikawa (Mitsubishi Electric Engineering), Toru Sorimachi (Mitsubishi Electric) ISEC2008-72
Cipher circuits are required both to have high security and to show high performance as to circuit scale and processing ... [more] ISEC2008-72
pp.63-68
 Results 1 - 10 of 10  /   
Choose a download format for default settings. [NEW !!]
Text format pLaTeX format CSV format BibTeX format
Copyright and reproduction : All rights are reserved and no part of this publication may be reproduced or transmitted in any form or by any means, electronic or mechanical, including photocopy, recording, or any information storage and retrieval system, without permission in writing from the publisher. Notwithstanding, instructors are permitted to photocopy isolated articles for noncommercial classroom use without fee. (License No.: 10GA0019/12GB0052/13GB0056/17GB0034/18GB0034)


[Return to Top Page]

[Return to IEICE Web Page]


The Institute of Electronics, Information and Communication Engineers (IEICE), Japan