Committee |
Date Time |
Place |
Paper Title / Authors |
Abstract |
Paper # |
ISEC |
2010-05-21 13:00 |
Tokyo |
Kikai-Shinko-Kaikan Bldg. |
The Suggestion of Corrected Non-overlapping Template Matching Test Yuichi Takeda (KAIT), Mituaki Huzii, Toshinari Kamakura, Norio Watanabe, Takakazu Sugiyama (Chuo Univ.) ISEC2010-1 |
[more] |
ISEC2010-1 pp.1-4 |
ISEC |
2010-05-21 13:25 |
Tokyo |
Kikai-Shinko-Kaikan Bldg. |
Side-Channel Analysis and Countermeasures of Stream Cipher K2 Matt Henricksen, Wun-she Yap, Chee-hoo Yian (I2R), Yuto Nakano, Kazuhide Fukushima, Shinsaku Kiyomoto, Toshiaki Tanaka (KDDI Labs.) ISEC2010-2 |
In this paper we provide the first side-channel analysis of the K2 stream cipher. We apply timing attacks, power analysi... [more] |
ISEC2010-2 pp.5-10 |
ISEC |
2010-05-21 13:50 |
Tokyo |
Kikai-Shinko-Kaikan Bldg. |
A Study on Non Linear Function and cryptanalysis of K2 Takashi Ohshima, Munetoshi Iwakiri (NDA) ISEC2010-3 |
K2 is the LFSR type stream cipher which outputs 64 bits of key stream every cycle with 128 bits secret key, used for BRE... [more] |
ISEC2010-3 pp.11-15 |
ISEC |
2010-05-21 14:15 |
Tokyo |
Kikai-Shinko-Kaikan Bldg. |
Comparing with feature of quantum stream cipher Y-00 and CPPM
-- Cipher with randomization of chiphertext -- Masaki Sohma, Osamu Hirota (Tamagawa Univ.) ISEC2010-4 |
The basis of the information theoretic security of the symmetric ky cipher is based on the Shannon theory published in 1... [more] |
ISEC2010-4 pp.17-24 |
ISEC |
2010-05-21 14:55 |
Tokyo |
Kikai-Shinko-Kaikan Bldg. |
Formal verification method for Dynamic Segregation of Duties which is based Functional Role Michinobu Ochi, Satoshi Ono (Kogakuin Univ.) ISEC2010-5 |
[more] |
ISEC2010-5 pp.25-32 |
ISEC |
2010-05-21 15:20 |
Tokyo |
Kikai-Shinko-Kaikan Bldg. |
An Improvement of Attribute-based Encryption Hiroki Kunitake, Masahiro Mambo, Eiji Okamoto (Tsukuba Univ.) ISEC2010-6 |
Attribute-Based Encryption(ABE) allows only entities having a specified set of attributes can decrypt ciphertexts. ABE i... [more] |
ISEC2010-6 pp.33-39 |
ISEC |
2010-05-21 16:20 |
Tokyo |
Kikai-Shinko-Kaikan Bldg. |
New Class of Public Key Cryptosystems Constructed Based on Error-Correcting Codes, Using K(III) Scheme
-- Appendix: Proposal of K(IX)SE(g)PKC -- Masao Kasahara (Osaka Gakuin Univ.) ISEC2010-7 |
In this paper, we present a new scheme referred to as K(?) scheme which would be very effective for improving a certain ... [more] |
ISEC2010-7 pp.41-48 |
ISEC |
2010-05-21 16:45 |
Tokyo |
Kikai-Shinko-Kaikan Bldg. |
Consideration of Surface in Algebraic Surface Cryptosystems Yuichi Komano, Koichiro Akiyama, Yoshikazu Hanatani, Hideyuki Miyake (Toshiba), Yasuhiro Goto (Hokkaido Univ. of Edu.) ISEC2010-8 |
[more] |
ISEC2010-8 pp.49-56 |
ISEC |
2010-05-21 17:10 |
Tokyo |
Kikai-Shinko-Kaikan Bldg. |
Applying Numerical Analysis Technique To Prime Factorization Masaaki Shirase (FUN) ISEC2010-9 |
It is important to analyze the hardness of prime factorization
which the security of RSA cryptosystems is based on.
... [more] |
ISEC2010-9 pp.57-62 |