Thu, Jul 20 AM Room A 09:30 - 11:35 |
(1) |
09:30-09:55 |
A Translation Matrix between Two Isomorphic Extension Fields via Optimal Normal Basis Representation |
Ryo Nanba, Yasuyuki Nogami, Yoshitaka Morikawa (Okayama Univ.) |
(2) |
09:55-10:20 |
Square Root Calculation Algorithm over Type-II All One Polynomial Field |
Hidehiro Kato (Okayama Univ.), Wang Feng, Yasuyuki Nogami, Yoshitaka Morikawa (Okayama Univ.) |
(3) |
10:20-10:45 |
Pairing Computation with MNT Curve over All One Polynomial Field |
Masataka Akane, Takumi Okimoto, Yasuyuki Nogami, Yoshitaka Morikawa (Okayama Univ.) |
(4) |
10:45-11:10 |
Efficient Calculation for Tate Pairing |
Masaaki Shirase, Tsuyoshi Takagi (FUN), Eiji Okamoto (Univ of Tsukuba) |
(5) |
11:10-11:35 |
A Survey on Dedicated Factoring Hardware (Relation Finding Step) |
Tetsuya Izu (FUJITSU), Noboru Kunihiro (UEC), Takeshi Shimoyama (FUJITSU) |
Thu, Jul 20 AM Room B 09:05 - 12:00 |
(6) |
09:05-09:30 |
A Proposal to Hi-Tech Pollution Based on the Criterion of "Relationism-First"
-- A Principle Experiment of EM Environment around VDT and Its Basics Theory -- |
Yoshifumi Fujita (Onomichi Univ.), Mitsuo Ohta (Emeritus Prof. of Hiroshima Univ.) |
(7) |
09:30-09:55 |
A copyright and proprietary rights protection system with an Information Filter and an Information Capsule |
Kota Yamada, Hirotsugu Kinoshita (KU), Tetsuya Morizumi (TNSi) |
(8) |
09:55-10:20 |
Balance between Security and Privacy |
Yasutoshi Ishizaki (Chuo Univ.) |
(9) |
10:20-10:45 |
A Study on Dynamic Risk Analysis Corresponding to Environmental Changes |
Hideaki Kawanishi, Koichi Kato, Tatsuaki Takahashi, Ramirez Caceres Guillermo Horacio, Yoshimi Teshigawara (Soka Univ.) |
(10) |
10:45-11:10 |
Survey and Analysis on Data Delete in PC for Internet Auction |
Satsuki Sato, Yuki Ashino (TDU), Tetsutaro Uehara (KU), Ryoichi Sasaki (TDU) |
(11) |
11:10-11:35 |
Development of Internet Watchdog Systems for Children Protection |
Tatsumi Ueda, Yoshiaki Takai (Hokkaido Univ.) |
(12) |
11:35-12:00 |
Genaral Decline in the Literacy of Science |
Takeshi Shimomura |
Thu, Jul 20 PM Room A 13:00 - 17:50 |
(13) |
13:00-13:25 |
Secure Exponentiation with High Flexibility |
Camille Vuillaume, Katsuyuki Okeya (Hitachi) |
(14) |
13:25-13:50 |
Double-Size Montgomery Multiplication of a Crypto-Coprocessor |
Masayuki Yoshino, Katsuyuki Okeya, Camille Vuillaume (Hitachi) |
(15) |
13:50-14:15 |
An Improved Mehtod for the Table Lookup Multiplication Algorithm over GF(2^m) |
Yoichi Hadama, Daisuke Nakamura (Kobe Univ.), Masanori Hirotomo (Hyogo Inst. of Info. Education Foundation), Masakatu Morii (Kobe Univ.) |
(16) |
14:15-14:40 |
Fast Generation of Safe Primes using Deterministic Primality Tests based on Maurer Method |
Hidehiro Kumakyu, Akito Niwa (Toshiba Solusions Corp.) |
(17) |
14:40-15:05 |
A method for generating elliptic curves suitable for implementing an efficient group signature scheme |
Norikazu Kubotera, Jun Furukawa, Kazue Sako (NEC) |
|
15:05-15:20 |
Break ( 15 min. ) |
(18) |
15:20-15:45 |
Batch Processing of Interactive Proofs |
Tsuyoshi Yamamoto, Koji Chida (NTT) |
(19) |
15:45-16:10 |
Efficient Implementation of Secure Circuit Evaluation Using Batch Processing |
Koji Chida, Tsuyoshi Yamamoto (NTT) |
(20) |
16:10-16:35 |
Inspection of sufficient conditions of MD5 |
Yuto Nakano, Hidenori Kuwakado, Masakatu Morii (Kobe Univ.) |
(21) |
16:35-17:00 |
Possibility of the Key Recovery Attack against Py |
Takanori Isobe, Toshihiro Ohigashi, Hidenori Kuwakado, Masakatu Morii (Kobe Univ.) |
(22) |
17:00-17:25 |
Tight theoretical estimation of the security of RC6 against chi-square attack |
Takatomi Wada, Atsuko Miyaji (JAIST), Tomohiko Hinoue (OMRON) |
(23) |
17:25-17:50 |
On the security of Piece In Hand Concept based on Sequential Solution Method |
Daisuke Ito, Yoshitomo Fukushima, Toshinobu Kaneko (TUS) |
Thu, Jul 20 PM Room B 13:00 - 17:50 |
(24) |
13:00-13:25 |
A Secure Packet Digesting Algorithm in the Interconnected IP Traceback Systems |
Seiji Nakano, Hidenori Kuwakado, Masakatu Morii (Kobe Univ.) |
(25) |
13:25-13:50 |
IDS for SSL Enncrypted Web Traffic |
Akira Yamada, Yutaka Miyake, Keisuke Takemori (KDDI Labs.) |
(26) |
13:50-14:15 |
DHT-based Dynamic VPN Instantiation Mechanism for Secure Home Network Access |
Ayumu Kubota, Akira Yamada, Yutaka Miyake (KDDI R&D Labs.) |
(27) |
14:15-14:40 |
Performance Improvement of Anomaly Detection System by Simplifying Call Stack Inspection |
Katsuhiro Suzuki (Univ. of Tsukuba), Hirotake Abe (JST), Kazuhiko Kato (Univ. of Tsukuba), Akira Kinno, Yuka Ikebe, Takehiro Nakayama, Atsushi Takeshita (NTT DoCoMo) |
|
14:40-15:20 |
Break ( 40 min. ) |
(28) |
15:20-15:45 |
A Proposal of Response Delay Method for Spam Mail from BOTNET |
Tomonari Sekiyama, Yoshinori Kobayashi (TDU), Masakazu Takahashi (ISS), Ryoichi Sasaki (TDU) |
(29) |
15:45-16:10 |
A Study on Bot Detection using Response Time |
Yuji Hoshizawa, Motoaki Yamamura (SecureBrain) |
(30) |
16:10-16:35 |
A Configuration Parameter Correction for Security Configuration Analyzing System |
Sumitaka Okajo, Katsushi Matsuda (NEC) |
(31) |
16:35-17:00 |
On Enforcement of Noninterference |
Naoyuki Nagatou, Takuo Watanabe (Tokyo Tech) |
(32) |
17:00-17:25 |
Preventing Buffer Overflow Attacks bypassing NXbit Protection |
Takahiro Shinagawa (TUAT) |
(33) |
17:25-17:50 |
Security Enhancement of HTTP-FUSE Knoppix Client by Trusted Computing |
Megumi Nakamura, Seiji Munetoh (IBM Japan), Kuniyasu Suzaki, Kengo Iijima, Toshiki Yagi, Ichiro Osawa (AIST) |
Fri, Jul 21 AM Room A 09:30 - 12:00 |
(34) |
09:30-09:55 |
A Study of Partial Disclosure Problem in Ramp Schemes Using Polynomial Function
-- A Proposal of Cascaded Ramp Scheme -- |
Keiichi Hirota (NTT), Kazuo Mogi (NTT Communications) |
(35) |
09:55-10:20 |
Quantum Threshold Scheme Using Two States |
Takeshi Okada, Hidenori Kuwakado, Masakatu Morii (Kobe Univ.) |
(36) |
10:20-10:45 |
Traveling Salesman Problem and Tribonacci Sequence |
Kunikatsu Kobayashi, Seiichirou Kokubun (Yamagata Univ.) |
(37) |
10:45-11:10 |
Asymptotic Lower Bound on Round Complexity of Bounded Concurrent Black-Box Zero-Knowledge Proof Protocols |
Hirofumi Muratani (Toshiba) |
(38) |
11:10-11:35 |
Privacy-preserving Scalar Product Comparison Protocol |
Jun Sakuma, Shigenobu Kobayashi (TokyoTech) |
(39) |
11:35-12:00 |
Secure optimization for distributed TSP using scalar product comparison protocol |
Jun Sakuma, Shigenobu Kobayashi (TokyoTech) |
Fri, Jul 21 AM Room B 09:30 - 12:00 |
(40) |
09:30-09:55 |
On the Standardization of Information Security
-- Report on the Madrid Meeting in May, 2006 -- |
Atsuko Miyaji (JAIST), Takeshi Chikazawa (Mitsubishi), Toshio Tatsuta (IISEC), Akira Otsuka (AIST), Kan Yasuda (NTT), Kengo Mori (NEC), Toshiaki Saisho (Toshiba) |
(41) |
09:55-10:20 |
Security Requirements for PIN Authentication in Financial Transactions |
Yuko Tamura (BOJ), Masashi Une (BOJ/AIST) |
(42) |
10:20-10:45 |
Proposal and Evaluation on Epidemiological Approach to Computer Virus |
Ryoichi Sasaki (Dendai) |
(43) |
10:45-11:10 |
Macro and Micro Analysis on Vulnerability Scanning Activities via Distributed Observation over the Internet |
Naoya Fukuno, Tomohiro Kobori, Hiroaki Kikuchi (Tokai Univ.), Masato Terada (Hitach), Norihisa Doi (Chuo Univ.) |
(44) |
11:10-11:35 |
A study on security technologies for paper documents |
Ryu Ebisawa, Yasuhiro Fujii, Yoshiyasu Takahashi, Satoru Tezuka (Hitachi) |
(45) |
11:35-12:00 |
Visualization Technologies of nicter Incident Analysis System |
Koji Nakao, Fumiko Matsumoto, Daisuke Inoue (NICT), Shunsuke Baba, Kazuya Suzuki (YOKOGAWA), Masashi Eto, Katsunari Yoshioka, Kenji Rikitake (NICT), Yoshiaki Hori (ISEE) |
Fri, Jul 21 PM Room A 13:00 - 17:25 |
(46) |
13:00-13:25 |
Hierarchical Key Assignment for Efficient Public-Key Black-Box Tracing against Self-Defensive Pirates |
Tatsuyuki Matsushita (Toshiba Corp.), Hideki Imai (Chuo Univ., AIST) |
(47) |
13:25-13:50 |
Fingerprinting Protocol Equipping Electronic Payment System |
Shinya Yamane, Minoru Kuribayashi, Masakatu Morii (Kobe Univ.) |
(48) |
13:50-14:15 |
An Efficient Anonymous Password-Authenticated Key Exchange Protocol |
SeongHan Shin, Kazukuni Kobara (AIST), Hideki Imai (AIST/Chuo Univ.) |
(49) |
14:15-14:40 |
Password-Authenticated Key Exchange for Multi-Party with Different Passwords Using a Constant Number of Rounds |
Jeong Ok Kwon (Korea Univ./Kyushu Univ.), Kouichi Sakurai (Kyushu Univ.), Dong Hoon Lee (Korea Univ.) |
(50) |
14:40-15:05 |
Distributed Privacy-preserving Document Clustering |
Chunhua Su (Kyushu Univ.), Jianying Zhou, Feng Bao (Inst. for Infocomm Research, Singapore), Kouichi Sakurai (Kyushu Univ.) |
|
15:05-15:20 |
Break ( 15 min. ) |
(51) |
15:20-15:45 |
Key-Management Scheme for Secure Multicast based on Network Topology |
Kazuhide Fukushima, Shinsaku Kiyomoto, Toshiaki Tanaka (KDDI R&D Lab.), Kouichi Sakurai (Kyushu Univ.) |
(52) |
15:45-16:10 |
The proposal and evaluation of stream authentication using Merkle Hash Tree and IDA |
Yasutaka Shinzaki, Takeshi Ogino, Shintaro Ueda, Hiroshi Shigeno (Keio Univ.) |
(53) |
16:10-16:35 |
An Implementation of a Privacy Enhancing Questionnaire System for Evaluating Classes |
Koji Tanigawa, Toru Nakanishi, Nobuo Funabiki (Okayama Univ.) |
(54) |
16:35-17:00 |
Proposal on whistle-blower protection technology to prevent the exposure of accuser from an indictment document |
Masataka Tada, Mituyuki Takatuka, Takanobu Masubuchi, Ryoichi Sasaki (Tokyo Den Univ.) |
(55) |
17:00-17:25 |
3MN: An Anonymous Communication System Based on Multiple Encryption and Probabilistic Selections of Actions |
Naoki Miyake, Yoshimichi Ito, Noboru Babaguchi (Osaka Univ.) |
Fri, Jul 21 PM Room B 13:00 - 17:25 |
(56) |
13:00-13:25 |
Watermarking Method by Alternative Representation of Document Backgrounds |
Takashi Hashimoto, Kurato Maeno, Hiroyuki Hota (Oki Electric Industry Co., Ltd.) |
(57) |
13:25-13:50 |
A User Authentication using Blind Spot and Papillary Light Reflex (part2) |
Yuji Ozawa, Daisuke Arai, Masakatsu Nishigaki (Shizuoka Univ) |
(58) |
13:50-14:15 |
An Improvement of User Authentication Using Schema of Visual Memory
-- An extension of the system using hint -- |
Takumi Yamamoto, Atsushi Harada, Takeo Isarida, Masakatsu Nishigaki (Shizuoka Univ) |
(59) |
14:15-14:40 |
Extracting Contexts From Keystroke Data |
Munetoshi Ishikawa, Mizuki Oka, Kazuhiko Kato (Tsukuba Univ.) |
(60) |
14:40-15:05 |
Development of IH-ZIP: A Data Compression Tool for Information Hiding |
Katsunari Yoshioka, Kotaro Sonoda, Osamu Takizawa, Koji Nakao (NICT), Tsutomu Matsumoto (Yokohama National Univ.) |
|
15:05-15:20 |
Break ( 15 min. ) |
(61) |
15:20-15:45 |
A Proposal on Cancelable Biometrics for Image Matching based biometrics |
Shinji Hirata, Kenta Takahashi, Masahiro Mimura (Hitachi) |
(62) |
15:45-16:10 |
Comparison of revocation problem between ID based encryption and biometric authentication schemes |
Akitoshi Izumi (Kyushu Univ), Yoshifumi Ueshige (ISIT), Kouichi Sakurai (Kyushu Univ) |
(63) |
16:10-16:35 |
A Design of DRM systems with hardware-based authentication |
Hiromi Fukaya (Pastel Co.), Kouichi Sakurai (Kyushu Univ.) |
(64) |
16:35-17:00 |
A Note on Cryptographic Infrastructures based on a Unique Device with Tamper-Resistant |
Kenji Imamoto, Kouichi Sakurai (Kyushu Univ.) |
(65) |
17:00-17:25 |
Interactive Textured Cube Based Network Traffic Visualization for Network Monitoring and Security |
Erwan Le Malecot (Inst. of Sys., Inf. Tech. and nanotech.), Masayoshi Kohara, Yoshiaki Hori, Kouichi Sakurai (Kyushu Univ.) |