|
Chair |
|
Tsutomu Matsumoto (Yokohama National Univ.) |
Vice Chair |
|
Toshiaki Tanaka (KDDI Labs.), Koichi Sakurai (Kyushu Univ.) |
Secretary |
|
Junji Shikata (Yokohama National Univ.), Tetsuya Izu (Fujitsu Labs.) |
Assistant |
|
Tetsu Iwata (Nagoya Univ.) |
|
Conference Date |
Thu, May 23, 2013 12:55 - 17:35 |
Topics |
|
Conference Place |
Kikai-Shinko-Kaikan Bldg. |
Address |
3-5-8, Shiba-kouen, Minato-ku, Tokyo, 105-0011 Japan |
Transportation Guide |
8 min. walk from Kamiya-cho Sta. on Subway Hibiya Line or 10 min. walk from Daimon Sta. both on Subway Asakusa Line and on Oedo Line http://www.jspmi.or.jp/kaigishitsu/access.html |
Copyright and reproduction |
All rights are reserved and no part of this publication may be reproduced or transmitted in any form or by any means, electronic or mechanical, including photocopy, recording, or any information storage and retrieval system, without permission in writing from the publisher. Notwithstanding, instructors are permitted to photocopy isolated articles for noncommercial classroom use without fee. (License No.: 10GA0019/12GB0052/13GB0056/17GB0034/18GB0034) |
Thu, May 23 PM 12:55 - 17:35 |
(1) |
12:55-13:20 |
Using KCV with CTR Mode and CENC ISEC2013-1 |
Kazuma Iki, Tetsu Iwata (Nagoya Univ.) |
(2) |
13:20-13:45 |
Timed-Release Identity-Based Encryption ISEC2013-2 |
Toru Oshikiri, Taiichi Saito (Tokyo Denki Univ.) |
(3) |
13:45-14:10 |
Information theoretical analysis of side-channel attack (2) ISEC2013-3 |
Hiroaki Mizuno, Keisuke Iwai, Hidema Tanaka, Takakazu Kurokawa (National Defense Academy) |
(4) |
14:10-14:35 |
Car2Cloud Communication Enhanced by In-Vehicle Implicit Asking ISEC2013-4 |
Tsutomu Matsumoto, Hikotaro Suzuki, Katsunari Yoshioka (Yokohama National Univ.), Yosuke Maekawa, Hisashi Oguma (TOYOTA InfoTechnology Center) |
|
14:35-14:45 |
Break ( 10 min. ) |
(5) |
14:45-15:10 |
A New Class of Public Key Cryptosystems Constructed Based on Reed-Solomon Codes K(XII)SE(1)PKC ISEC2013-5 |
Masao Kasahara (Waseda Univ.) |
(6) |
15:10-15:35 |
A Consideration on Pairing Inversion Problem of Pairing Based Cryptography with BN Curve ISEC2013-6 |
Yasuyuki Nogami, Yuki Kono, Shoichi Akagi (Okayama Univ.) |
(7) |
15:35-16:00 |
Improvement in Addition formula on Elliptic Curves ISEC2013-7 |
Yoshitaka Nagai (Future Univ. Hakodate), Tetsuya Izu (Fujitsu Lab), Masaaki Shirase (Future Univ. Hakodate) |
|
16:00-16:10 |
Break ( 10 min. ) |
(8) |
16:10-16:35 |
A Report on ASIACRYPT 2012 ISEC2013-8 |
Takahiro Matsuda (AIST) |
(9) |
16:35-17:05 |
[Invited Talk]
The Five-Card Trick Can Be Done with Four Cards (from ASIACRYPT 2012) ISEC2013-9 |
Takaaki Mizuki (Tohoku Univ.) |
(10) |
17:05-17:35 |
[Invited Talk]
Investigating Fundamental Security Requirements on Whirlpool: Improved Preimage and Collision Attacks ISEC2013-10 |
Yu Sasaki (NTT) |
Announcement for Speakers |
General Talk | Each speech will have 20 minutes for presentation and 5 minutes for discussion. |
Invited Talk | Each speech will have 25 minutes for presentation and 5 minutes for discussion. |
Contact Address and Latest Schedule Information |
ISEC |
Technical Committee on Information Security (ISEC) [Latest Schedule]
|
Contact Address |
Tetsu Iwata (Nagoya University)
TEL +81-52-789-5722, FAX +81-52-789-5723
E-: ic-c (to ISEC secretaries) |
Last modified: 2013-03-15 19:57:04
|