|
Chair |
|
Yukiyasu Tsunoo (NEC) |
Vice Chair |
|
Masahiro Mambo (Kanazawa Univ.), Kazuto Ogawa (NHK) |
Secretary |
|
Goichiro Hanaoka (AIST), Yuichi Komano (Toshiba) |
Assistant |
|
Tetsuya Izu (Fujitsu Lab.), Takaaki Mizuki (Tohoku Univ.), Noritaka Yamashita (NEC) |
|
Conference Date |
Thu, May 19, 2016 10:00 - 17:00 |
Topics |
|
Conference Place |
Kikai-Shinko-Kaikan Bldg. |
Copyright and reproduction |
All rights are reserved and no part of this publication may be reproduced or transmitted in any form or by any means, electronic or mechanical, including photocopy, recording, or any information storage and retrieval system, without permission in writing from the publisher. Notwithstanding, instructors are permitted to photocopy isolated articles for noncommercial classroom use without fee. (License No.: 10GA0019/12GB0052/13GB0056/17GB0034/18GB0034) |
Thu, May 19 AM 10:00 - 10:50 |
(1) |
10:00-10:25 |
Modified method for identification of template using non-overlapping template matching test ISEC2016-1 |
Yuichi Takeda (KAIT), Huzii Mituaki, Toshinari Kamakura, Norio Watanabe (Chuo Univ.) |
(2) |
10:25-10:50 |
IDS using Discrete Fourier Transform with window functions ISEC2016-2 |
Yusuke Tsuge, Keisuke Iwai, Hidema Tanaka, Takakazu Kurokawa (NDA) |
|
10:50-11:00 |
Break ( 10 min. ) |
Thu, May 19 AM 11:00 - 12:00 |
(3) |
11:00-11:30 |
[Invited Talk]
Conversion among Several Classes of Predicate Encryption and Applications to ABE with Various Compactness Tradeoffs ISEC2016-3 |
Nuttapong Attrapadung, Goichiro Hanaoka, Shota Yamada (AIST) |
(4) |
11:30-12:00 |
[Invited Talk]
On New Realizations of Somewhere Statistically Binding Hashing and Positional Accumulators ISEC2016-4 |
Tatsuaki Okamoto (NTT) |
|
12:00-13:00 |
Lunch Break ( 60 min. ) |
Thu, May 19 13:00 - 15:20 |
(5) |
13:00-13:25 |
Proposal of Multivariate Public Key CryptoSystem based on Numerous Prime Numbers and its Application to Organizational Communications
-- For Quantum Proof MPKC and IoT Environment -- ISEC2016-5 |
Shigeo Tsujii, Ryo Fujita, Masahito Gotaishi (Chuo-Univ.) |
(6) |
13:25-13:50 |
On the Possibility of Recovering Short Generators over Ideal Lattices for Cyclotomic Fields ISEC2016-6 |
Shinya Okumura, Masaya Yasuda, Tsuyoshi Takagi (Kyushu Univ.) |
(7) |
13:50-14:15 |
Analysis of Decreasing Squared-Sum of Gram-Schmidt Lengths for Finding Short Lattice Vectors ISEC2016-7 |
Masaya Yasuda (Kyushu Univ.), Kazuhiro Yokoyama (Rikkyo Univ.) |
|
14:15-14:30 |
Break ( 15 min. ) |
(8) |
14:30-14:55 |
Research Problems in "Instrumentation Security" ISEC2016-8 |
Tsutomu Matsumoto (YNU) |
(9) |
14:55-15:20 |
Instrumentation Security of a Pulse LIDAR System Against Reflected Light Masquerading ISEC2016-9 |
Kazuki Soma, Daisuke Fujimoto, Tsutomu Matsumoto (YNU) |
|
15:20-15:30 |
Break ( 10 min. ) |
Thu, May 19 PM 15:30 - 17:00 |
(10) |
15:30-16:00 |
[Invited Talk]
Midori: A Block Cipher for Low Energy ISEC2016-10 |
Subhadeep Banik, Andrey Bogdanov (DTU), Takanori Isobe, Kyoji Shibutani, Harunaga Hiwatari, Toru Akishita (Sony), Francesco Regazzoni (USI) |
(11) |
16:00-16:30 |
[Invited Talk]
How Secure is AES Under Leakage ISEC2016-11 |
Andrey Bogdanov (DTU), Takanori Isobe (Sony) |
(12) |
16:30-17:00 |
[Invited Talk]
Refinements of the k-tree Algorithm for the Generalized Birthday Problem ISEC2016-12 |
Yu Sasaki (NTT) |
Announcement for Speakers |
General Talk | Each speech will have 20 minutes for presentation and 5 minutes for discussion. |
Invited Talk | Each speech will have 25 minutes for presentation and 5 minutes for discussion. |
Contact Address and Latest Schedule Information |
ISEC |
Technical Committee on Information Security (ISEC) [Latest Schedule]
|
Contact Address |
Takaaki Mizuki (Tohoku University)
E-: ic-c (to ISEC secretaries) |
Last modified: 2016-05-17 18:29:28
|