Committee |
Date Time |
Place |
Paper Title / Authors |
Abstract |
Paper # |
ISEC |
2008-09-12 13:00 |
Tokyo |
Kikai-Shinko-Kaikan Bldg. |
New Classes of Public Key Cryptosystems Constructed on the Basis of Low-Density Multivariate Polynomials
-- Along with K(I) Knapsack Scheme -- Masao Kasahara (Osaka Gakuin Univ.) ISEC2008-63 |
Extensive studies have been made of the public key cryptosystems based on multivariate polynomials over $\mathbb{F}_{2}$... [more] |
ISEC2008-63 pp.1-7 |
ISEC |
2008-09-12 13:25 |
Tokyo |
Kikai-Shinko-Kaikan Bldg. |
New Trapdoors in Knapsack Public-Key Cryptosystem with Two Sequences as Public Key Yasuyuki Murakami, Takeshi Nasako (Osaka Electro-Comm. Univ.), Masao Kasahara (Osaka Gakuin Univ.) ISEC2008-64 |
Present authors proposed a new class of knasack PKC (KMN PKC) which uses two sequences as the public key.
KMN PKC uses... [more] |
ISEC2008-64 pp.9-16 |
ISEC |
2008-09-12 13:50 |
Tokyo |
Kikai-Shinko-Kaikan Bldg. |
A Note on Security of KMN PKC Takeshi Nasako, Yasuyuki Murakami (Osaka Electro-Comm. Univ.), Masao Kasahara (Osaka Gakuin Univ.) ISEC2008-65 |
Recently present authors proposed a new class of knapsack type cryptosystem on the basis of MH
PKC(KMN PKC). In this p... [more] |
ISEC2008-65 pp.17-20 |
ISEC |
2008-09-12 14:15 |
Tokyo |
Kikai-Shinko-Kaikan Bldg. |
A Factoring Algorithm Searching Squares (part 2) Kunikatsu Kobayashi (Yamagata Univ.) ISEC2008-66 |
We propose a probabilistic factoring algorithm searching squares
using a factor base consisting of odd primes. [more] |
ISEC2008-66 pp.21-24 |
ISEC |
2008-09-12 14:40 |
Tokyo |
Kikai-Shinko-Kaikan Bldg. |
Cryptosystems on Algebraic Tori
-- Parameter Generation with Security and Efficiency -- Tomoko Yonemura, Kenichiro Furuta, Yoshikazu Hanatani, Taichi Isogai, Yuichi Komano, Hirofumi Muratani, Hanae Nozaki, Kenji Ohkuma, Atsushi Shimbo (TOSHIBA Corp.) ISEC2008-67 |
We study on algebraic tori defined on extension field as cryptographic groups to construct public key encryption schemes... [more] |
ISEC2008-67 pp.25-32 |
ISEC |
2008-09-12 15:20 |
Tokyo |
Kikai-Shinko-Kaikan Bldg. |
Reduction of Public-Key Size in a Revocable Group Signature Scheme with Constant Costs for Signing and Verifying Hiroki Fujii, Yuta Hira, Toru Nakanishi, Nobuo Funabiki (Okayama Univ.) ISEC2008-68 |
Group signature scheme is the digital signature scheme enhancing the privacy of the user. We proposed a revocable scheme... [more] |
ISEC2008-68 pp.33-38 |
ISEC |
2008-09-12 15:45 |
Tokyo |
Kikai-Shinko-Kaikan Bldg. |
Security Analysis on Electronic Money Systems including Compromise of Cryptographic Algorithms and/or Devices Masataka Suzuki, Katsuhisa Hirokawa (BOJ) ISEC2008-69 |
This paper mainly focuses on note-based types of prepaid electronic money systems. Assuming compromise of cryptographic ... [more] |
ISEC2008-69 pp.39-46 |
ISEC |
2008-09-12 16:10 |
Tokyo |
Kikai-Shinko-Kaikan Bldg. |
The security analysis using meta-reduction under several computational assumptions in the case of ElGamal encryption Yutaka Kawai, Kazuo Ohta (UEC) ISEC2008-70 |
[more] |
ISEC2008-70 pp.47-54 |
ISEC |
2008-09-12 16:35 |
Tokyo |
Kikai-Shinko-Kaikan Bldg. |
Estimating RSA Private-Keys Generated in Security Chips Tsutomu Matsumoto, Yoshio Takahashi (YNU) ISEC2008-71 |
For a particular instance of TPM - Trusted Platform Module, we have shown that the RSA private keys generated inside the... [more] |
ISEC2008-71 pp.55-62 |
ISEC |
2008-09-12 17:00 |
Tokyo |
Kikai-Shinko-Kaikan Bldg. |
How to introduce the dynamic key to a provably Secure Block Cipher using FPGA Partial Reconfiguration Kenji Takahashi, Tetsuya Ichikawa (Mitsubishi Electric Engineering), Toru Sorimachi (Mitsubishi Electric) ISEC2008-72 |
Cipher circuits are required both to have high security and to show high performance as to circuit scale and processing ... [more] |
ISEC2008-72 pp.63-68 |