|
Chair |
|
Masakatu Morii |
Vice Chair |
|
Mitsuru Matsui, Kazuo Ota |
Secretary |
|
Hiroshi Doi, Shiho Moriai |
Assistant |
|
Yoshiaki Shiraishi |
|
Conference Date |
Wed, Sep 13, 2006 09:30 - 17:25 |
Topics |
|
Conference Place |
Kikai-shinkou Building |
Address |
3-5-8, Shiba-kouen, Minato-ku, Tokyo, 105-0011 Japan |
Transportation Guide |
8 min. walk from Kamiya-cho Sta. on Subway Hibiya Line or 10 min. walk from Daimon Sta. both on Subway Asakusa Line and on Oedo Line http://www.jspmi.or.jp/kaikan.htm |
Wed, Sep 13 09:30 - 12:00 |
(1) |
09:30-09:55 |
Watermarking method with strong robustness considering error correcting code length |
cong li, Kazuo Ohzeki (S I T) |
(2) |
09:55-10:20 |
A Method of Shortening Tardos's Fingerprinting Code Length by Optimizing Parameters |
Taichi Isogai, Hirofumi Muratani, Kenichiro Furuta (Toshiba) |
(3) |
10:20-10:45 |
The Real-Time Steganography Based on Audio-to-Audio Data Bit Steam |
Xuping Huang, Ryota Kawashima, Norihisa Segawa, Yoshihiko Abe (Iwate Pref Univ.) |
(4) |
10:45-11:10 |
Analysis of initial data in a pseudorandom number generator utilizing a one dimensional mapping |
Makoto Homma, Chigak Itoi, Fumiko Okiharu, Ryusuke Watase, Yoshinori Sakamoto (Nihon Univ.) |
(5) |
11:10-11:35 |
Symmetric 128bit Block Cipher(HyRAL) Beased on AES Request |
Kouzou Hirata (LIS Inc.) |
(6) |
11:35-12:00 |
Verification of MRSL based S-BOX in AES as a countermeasure against DPA. |
Minoru Sasaki, Keisuke Iwai, Takakazu Kurokawa (NDA.) |
Wed, Sep 13 13:00 - 17:25 |
(7) |
13:00-13:25 |
Collision Resistance of Double-Block-Length Hash Function against Free-Start Attack |
Shoichi Hirose (Fukui Univ.) |
(8) |
13:25-13:50 |
Side Channel Attacks against HMACs with Design for Hash Functions |
Katsuyuki Okeya (Hitachi) |
(9) |
13:50-14:15 |
Black-Box Traitor Revocable Broadcast Encryption with Short Private Keys |
Jun Furukawa (NEC), Nuttapong Attrapadung (Tokyo Univ.), Satoshi Obana (NEC) |
(10) |
14:15-14:40 |
Re-Encryption Schemes with Applications to Data Storage
-- Investigation of achieving preventative from collusion operating over the torsion subgroup in an elliptic curve -- |
Hirokazu Ougi (Mebius) |
(11) |
14:40-15:05 |
A Method of Software Dynamic Birthmarks using History of API Function Calls |
Osamu Moriyama, Takahiro Furue, Tsuyoshi Toyama, Tsutomu Matsumoto (Yokohama National University) |
|
15:05-15:20 |
Break ( 15 min. ) |
(12) |
15:20-15:45 |
Constructions of K_{HLN}・SE(g)PKC on the basis of K-Construction with hidden location noise(HLN) |
Masao Kasahara (Osaka Gakuin Univ.) |
(13) |
15:45-16:10 |
A Conditional Knapsack Cryptosystem Using High Density Sequences |
Kunikatsu Kobayashi (Yamagata Univ.) |
(14) |
16:10-16:35 |
Key Predistribution Schemes for Sensor Networks Using Lines and Points over a Finite Geometry |
Ritsuko Matsumoto, Hisashi Mouri, Yuichi Kaji (NAIST) |
(15) |
16:35-17:00 |
A study on error correction in secret key agreement scheme using ESPAR antenna |
Kenya Horai, Hisato Iwai, Hideichi Sasaoka (Doshisha Univ.), Takashi Ohira (ATR) |
(16) |
17:00-17:25 |
Unconditional Security of Key Establishment System Using a Variable Directional Antenna |
Kirill Morozov, Kazukuni Kobara (AIST), Hideki Imai (Chuo Univ.) |
Contact Address and Latest Schedule Information |
ISEC |
Technical Committee on Information Security (ISEC) [Latest Schedule]
|
Contact Address |
Yoshiaki Shiraishi (Nagoya Inst. of Tech.)
TEL +81-52-735-7240, FAX +81-52-744-1355
E- : i c- c![](/ken/images/new/ta.gif) ![](/ken/images/new/liam.gif) (to ISEC secretaries) |
Last modified: 2006-07-24 23:48:34
|
Notification: Mail addresses are partially hidden against SPAM.
|