|
Chair |
|
Shinichi Kawamura |
Vice Chair |
|
Masakatsu Morii, Mitsuru Matsui |
Secretary |
|
Shoichi Hirose, Hiroshi Doi |
Assistant |
|
Shiho Moriai |
|
Conference Date |
Fri, Sep 16, 2005 10:20 - 17:25 |
Topics |
|
Conference Place |
Kikai-Shinko-Kaikan Bldg |
Address |
3-5-8, Shibakoen, Minato-ku, Tokyo |
Transportation Guide |
http://www.jspmi.or.jp/kaikan.htm |
Fri, Sep 16 AM 10:20 - 12:00 |
(1) |
10:20-10:45 |
Are attacks on Y-00(Optical communication Quantum Cryptography) the true attacks? PartII |
Osamu Hirota (tamagawa Univ.) |
(2) |
10:45-11:10 |
Influence of Random Numbers in a DPA Data Masking Countermeasure |
Hanae Nozaki, Shinichi Yasuda, Koichi Fujisaki, Atsushi Shimbo, Shinobu Fujita (Toshiba) |
(3) |
11:10-11:35 |
On the collision search and the sufficient conditions of MD5 |
Jun Yajima, Takeshi Shimoyama (Fujitsu Lab.) |
(4) |
11:35-12:00 |
A Note on Provably Secure Double-Block-Length Hash Functions in a Black-Box Model |
Shoichi Hirose (Univ. of Fukui) |
Fri, Sep 16 PM 13:25 - 17:25 |
(5) |
13:25-13:50 |
IP Security Policy and Authentication Information Distribution Mechanism using Smart Card |
Manabu Hirano (Toyota National College of Technology), Suguru Yamaguchi (Nara Institute of Science and Technology) |
(6) |
13:50-14:15 |
The wide area network storage system based on secret sharing threshold scheme |
Yutaka Yonamine, Hironobu Yonaha, Tomokazu Nagata, Shiro Tamaki (Ryukyu Univ.) |
(7) |
14:15-14:40 |
A Construction Method of Secure Cryptographic Location-Based Services |
Jun Anzai (Panasonic Mobile Communications), Tsutomu Matsumoto (YNU) |
(8) |
14:40-15:05 |
Interactive Protocol for Privacy-preserving K-mean Clustering |
Chunhua Su, Kouichi Sakurai (Kyushu Univ.) |
|
15:05-15:20 |
Break ( 15 min. ) |
(9) |
15:20-15:45 |
A New Decoding Algorithm for Secret Sharing Scheme
-- Along with New Secret Sharing Scheme -- |
Masao Kasahara (Osaka Gakuin Univ.) |
(10) |
15:45-16:10 |
Precise Tardos Bound for Fingerprinting Codes |
Taichi Isogai, Hirofumi Muratani (Toshiba) |
(11) |
16:10-16:35 |
Generating Short Public-Keys for Factoring Based Cryptosytems and Their Cryptanalysis |
Naoki Kanayama (UEC), Shigenori Uchiyama (NTT) |
(12) |
16:35-17:00 |
A privacy-enhanced group signature scheme based on a Modified Nyberg-Rueppel Signature |
Kozue Umeda, Atsuko Miyaji (JAIST) |
(13) |
17:00-17:25 |
A Report on The 32nd International Colloquium on Automata, Languages and Programming (ICALP2005), and The Second Workshop on Automated Reasoning for Security Protocol Analysis (ARSPA2005) |
Kenji Imamoto, Kouichi Sakurai (Kyushu Univ.) |
Announcement for Speakers |
General Talk | Each speech will have 20 minutes for presentation and 5 minutes for discussion. |
Contact Address and Latest Schedule Information |
ISEC |
Technical Committee on Information Security (ISEC) [Latest Schedule]
|
Contact Address |
Shoichi Hirose(School of Engineering, The University of Fukui)
TEL0776-27-9738,FAX0776-27-9738
E-: ic-c (to ISEC secretaries) |
Last modified: 2005-08-31 08:09:26
|