Thu, Mar 4 AM ISEC(Room 100) Chair: ISEC: Toru Nakanishi 09:00 - 10:40 |
(1) |
09:00-09:25 |
Formal verification method for Access control model which can describe Dynamic Segregation of Duties IT2009-72 ISEC2009-80 WBS2009-51 |
Michinobu Ochi, Satoshi Ono (Kogakuin Univ.) |
(2) |
09:25-09:50 |
Considerations on Web System Development Process against XSS worms. IT2009-73 ISEC2009-81 WBS2009-52 |
Koji Hiyoshi, Kazuko Oyanagi (Inst. of Information Security) |
(3) |
09:50-10:15 |
Evaluation of Mutual Anonymity in P2P Networks IT2009-74 ISEC2009-82 WBS2009-53 |
Chigusa Kawashima (Univ. of Electro-Comm.), Todorka Alexandrova (Tokyo Metro Univ.), I Gusti Bagus Baskara Nugraha, Hiroyoshi Morita (Univ. of Electro-Comm.) |
(4) |
10:15-10:40 |
A Low Density Knapsack Cryptosystem IT2009-128 ISEC2009-136 WBS2009-107 |
Akira Hayashi (Kanazawa Inst. of Tech.) |
|
10:40-10:50 |
Break ( 10 min. ) |
Thu, Mar 4 AM ISEC(Room 100) Chair: ISEC: Noboru Kunihiro 10:50 - 12:05 |
(5) |
10:50-11:15 |
About Security of Threshold Anonymous Password-Authenticated Key Exchange IT2009-75 ISEC2009-83 WBS2009-54 |
SeongHan Shin, Kazukuni Kobara (AIST), Hideki Imai (Chuo Univ.) |
(6) |
11:15-11:40 |
A 2-round Identification Scheme Secure against Concurrent Man-in-the-Middle Attacks IT2009-76 ISEC2009-84 WBS2009-55 |
Hiroaki Anada, Seiko Arita (IISEC) |
(7) |
11:40-12:05 |
Construction of secure Group Identification based on Digital Signature IT2009-77 ISEC2009-85 WBS2009-56 |
Keisuke Saito, Taiichi Saito (Tokyo Denki Univ.) |
|
12:05-13:25 |
Lunch Break ( 80 min. ) |
Thu, Mar 4 PM ISEC(Room 100) Chair: ISEC: Yasuyuki Nogami 16:35 - 17:50 |
(8) |
16:35-17:00 |
Improved Method for Constructing Pairing-friendly Elliptic Curves with Fixed Coefficients IT2009-78 ISEC2009-86 WBS2009-57 |
Masaaki Shirase (Future Univ-Hakodate) |
(9) |
17:00-17:25 |
An Experiment of Number Field Sieve over GF(p) of Low Hamming Weight Characteristic IT2009-79 ISEC2009-87 WBS2009-58 |
Kenichiro Hayasaka, Tsuyoshi Takagi (Future Univ. Hakodate) |
(10) |
17:25-17:50 |
An RSA Encryption Hardware Algorithm that uses a DSP block on the FPGA IT2009-80 ISEC2009-88 WBS2009-59 |
Kensuke Kawakami, Koji Nakano (Hiroshima Univ.) |
Thu, Mar 4 AM WBS(Room 101) Chair: WBS Fumiaki Maehara 09:00 - 10:40 |
(11) |
09:00-09:25 |
Performance Evaluation of A Multipath Routing Method for Highly Reliable Wireless Communications IT2009-81 ISEC2009-89 WBS2009-60 |
Kento Terai, Shinsuke Hara (Osaka City Univ.) |
(12) |
09:25-09:50 |
Experimental Validation of an Ultra Wideband Spatio-Temporal Channel Sounder Employing an OFDM signal in a Narrowband Interference Environment IT2009-82 ISEC2009-90 WBS2009-61 |
Hiroto Iiduka, Daisuke Sugizaki, Naohiko Iwakiri, Takehiko Kobayashi (Tokyo Denki Univ.) |
(13) |
09:50-10:15 |
Feasibility Study on Cognitive Radio based TV Spectrum Reuse using Leaky Coaxial Cable IT2009-83 ISEC2009-91 WBS2009-62 |
Melvin Cabatuan, Masato Saito, Minoru Okada (NAIST) |
(14) |
10:15-10:40 |
An Area Layout-based MAP Estimation for Indoor Localization IT2009-84 ISEC2009-92 WBS2009-63 |
Daisuke Anzai, Shinsuke Hara (Osaka City Univ.) |
|
10:40-10:50 |
Break ( 10 min. ) |
Thu, Mar 4 AM WBS(Room 101) Chair: WBS Kohei Ohno 10:50 - 11:40 |
(15) |
10:50-11:15 |
Direction Finding Performances in UWB Short-Range Phase-Comparison Monopulse Radars IT2009-85 ISEC2009-93 WBS2009-64 |
Hironori Enkouji, Takehiko Nishide, Natsuki Hashimoto, Naohiko Iwakiri, Takehiko Kobayashi (Tokyo Denki Univ.) |
(16) |
11:15-11:40 |
Applicability of MB-OFDM UWB System to In-car Wireless Communication IT2009-86 ISEC2009-94 WBS2009-65 |
Fumiaki Maehara, Ryouhei Kaneko, Akihiro Yamakita (Waseda Univ.) |
|
11:40-13:25 |
Break ( 105 min. ) |
Thu, Mar 4 PM WBS+IT+ISEC[Joint session] (Room 101) Chair: WBS Masato Saito 16:35 - 17:25 |
(17) |
16:35-17:00 |
Analysis of optical wireless multi-level PPM using IM/DD IT2009-87 ISEC2009-95 WBS2009-66 |
Yusuke Kozawa, Hiromasa Habuchi (Ibaraki Univ.) |
(18) |
17:00-17:25 |
A Study on LDPC coded Time Domain Block Equalizer under MIMO Frequency Selective Channels IT2009-88 ISEC2009-96 WBS2009-67 |
Wang Junpeng, Yasunori Iwanami, Eiji Okamoto (Nagoya Inst. of Tech.) |
Thu, Mar 4 AM IT(Room 102) Chair: IT: Tomoharu Shibuya 09:00 - 10:40 |
(19) |
09:00-09:25 |
New Implementation and Evaluation of Knuth-Yao Algorithm and Interval Algorithm IT2009-89 ISEC2009-97 WBS2009-68 |
Shogo Takahashi, Hirosuke Yamamoto (Univ. of Tokyo) |
(20) |
09:25-09:50 |
Error exponent for the additive white gaussian noise channel with noisy feedback IT2009-90 ISEC2009-98 WBS2009-69 |
Akari Sato, Hirosuke Yamamoto (Univ. of Tokyo) |
(21) |
09:50-10:15 |
A Channel Coding Theorem based on the Number of Guesses IT2009-91 ISEC2009-99 WBS2009-70 |
Keishi Okudera, Hirosuke Yamamoto (Univ. of Tokyo) |
(22) |
10:15-10:40 |
Joint channel estimation and LDPC decoding over MIMO channels by nonlinear optimization IT2009-92 ISEC2009-100 WBS2009-71 |
Takefumi Kobayashi, Ryutaroh Matsumoto, Tomohiko Uyematsu (Tokyo Inst. of Tech.) |
|
10:40-10:50 |
Break ( 10 min. ) |
Thu, Mar 4 AM IT(Room 102) Chair: IT: Ryutaroh Matsumoto 10:50 - 12:05 |
(23) |
10:50-11:15 |
An analysis of bit error probability of recursive systematic convolutional codes with Max-log-MAP decoding IT2009-93 ISEC2009-101 WBS2009-72 |
Yoshitake Kawadai, Hideki Yoshikawa (Tohoku Gakuin Univ) |
(24) |
11:15-11:40 |
On the Size of Circulant Matrices for which Reversible Codes Exist IT2009-94 ISEC2009-102 WBS2009-73 |
Tomoharu Shibuya, Keita Nakade (Sophia Univ.) |
(25) |
11:40-12:05 |
1-State Error-Trellis Decoding of LDPC Convolutional Codes Based on Circulant Matrices IT2009-95 ISEC2009-103 WBS2009-74 |
Masato Tajima, Koji Okino, Takashi Miyagoshi (Univ. of Toyama) |
|
12:05-13:25 |
Lunch Break ( 80 min. ) |
Thu, Mar 4 PM Invited Talk(Room 102) 13:25 - 16:25 |
(26) |
13:25-14:25 |
[Invited Talk]
Indifferentiability Theory and SHA-3 Project
-- Recent Status of Theoretical and Practical Researches on Hash Functions -- IT2009-96 ISEC2009-104 WBS2009-75 |
Kazuo Ohta, Lei Wang, Kazuo Sakiyama (Univ. of Electro-Comm.) |
(27) |
14:25-15:25 |
[Invited Talk]
On the Spread-Spectrum Techniques for Inter-Vechile Communications IT2009-97 ISEC2009-105 WBS2009-76 |
Hiromasa Habuchi (Ibaraki Univ.) |
(28) |
15:25-16:25 |
[Invited Talk]
Codes with unique correlation property and their application IT2009-98 ISEC2009-106 WBS2009-77 |
Tomoko K. Matsushima, Yasuaki Teramachi (Polytechnic Univ.) |
|
16:25-16:35 |
Break ( 10 min. ) |
Thu, Mar 4 PM IT(Room102) Chair: IT: Mitsuharu Arimura 16:35 - 17:50 |
(29) |
16:35-17:00 |
Universal Slepian-Wolf Source Codes Using Low-Density Parity-Check Matrices IT2009-99 ISEC2009-107 WBS2009-78 |
Tetsunao Matsuta, Tomohiko Uyematsu, Ryutaroh Matsumoto (Tokyo Inst. of Tech.) |
(30) |
17:00-17:25 |
Universal Slepian-Wolf Coding for General Sources IT2009-100 ISEC2009-108 WBS2009-79 |
Shigeaki Kuzuoka (Wakayama Univ.) |
(31) |
17:25-17:50 |
Smooth Renyi Entropy and Resolvability IT2009-101 ISEC2009-109 WBS2009-80 |
Tomohiko Uyematsu (Tokyo Inst. of Tech.) |
Fri, Mar 5 AM ISEC(Room 100) Chair: ISEC: Katsuyuki Takashima 09:00 - 10:40 |
(32) |
09:00-09:25 |
A Comparative Study of CPA and MIA on Side-channel Attack Standard Evaluation Boards IT2009-102 ISEC2009-110 WBS2009-81 |
Asuka Taguchi, Yohei Hori, Hideki Imai (Chuo Univ.) |
(33) |
09:25-09:50 |
Countermeasures against Power Analysis Attacks in Assembly code IT2009-103 ISEC2009-111 WBS2009-82 |
Kazunori Kawamura, Keisuke Iwai, Takakazu Kurokawa (NDA) |
(34) |
09:50-10:15 |
Electromagnetic Analysis from power line on SASEBO-R IT2009-104 ISEC2009-112 WBS2009-83 |
Tetsutaro Kanno, Keisuke Iwai, Takakazu Kurokawa (NDA) |
(35) |
10:15-10:40 |
Obtaining Local Information from FPGA Using Electromagnetic Analysis IT2009-105 ISEC2009-113 WBS2009-84 |
Takao Ochiai, Dai Yamamoto, Kouichi Itoh, Masahiko Takenaka, Naoya Torii, Daisuke Uchida, Toshiaki Nagai, Shinichi Wakana (Fujitsu Labs.) |
|
10:40-10:50 |
Break ( 10 min. ) |
Fri, Mar 5 AM ISEC(Room 100) Chair: ISEC: Shoichi Hirose 10:50 - 12:05 |
(36) |
10:50-11:15 |
A Forgery Attack for WPA-TKIP by Modifying Any Packet to the QoS Packet
-- Almost All Implementations of WPA-TKIP Can Be Attacked -- IT2009-106 ISEC2009-114 WBS2009-85 |
Yosuke Todo, Yuki Ozawa (Kobe Univ.), Toshihiro Ohigashi (Hiroshima Univ.), Masakatu Morii (Kobe Univ.) |
(37) |
11:15-11:40 |
A Note on Realistic Damages Caused by a Message Falsification Attack on WPA-TKIP IT2009-107 ISEC2009-115 WBS2009-86 |
Yuki Ozawa, Yosuke Todo (Kobe Univ), Toshihiro Ohigashi (Hiroshima Univ), Masakatu Morii (Kobe Univ) |
(38) |
11:40-12:05 |
A Reader Only Attack on a MIFARE Classic IT2009-108 ISEC2009-116 WBS2009-87 |
Satoru Imamura (Chuo Univ.), Takashi Kitagawa (Univ. of Tokyo.), Hideki Imai (Chuo Univ.) |
|
12:05-13:25 |
Lunch Break ( 80 min. ) |
Fri, Mar 5 PM ISEC(Room 100) Chair: ISEC: Noboru Kunihiro 13:25 - 15:05 |
(39) |
13:25-13:50 |
An Efficient Random Key Pre-distribution Protocol for Multi-Phase Wireless Sensor Networks (2) IT2009-109 ISEC2009-117 WBS2009-88 |
Hisashige Ito, Atsuko Miyaji, Kazumasa Omote (JAIST) |
(40) |
13:50-14:15 |
Traitor Tracing system with Constant-size Public-key and Ciphertext using q-ary fingerprinting codes IT2009-110 ISEC2009-118 WBS2009-89 |
Ying Zhang (Chuo Univ.), Takashi Kitagawa (Univ. of Tokyo.), Nuttapong Attrapadung (AIST), Hideki Imai (Chuo Univ/AIST) |
(41) |
14:15-14:40 |
Experimental and Theoretical Evaluation of Wolf Fingerprint Using Statistical Information IT2009-111 ISEC2009-119 WBS2009-90 |
Takuya Nakagawa, Hyunho Kang (Chuo Univ.), Shoko Yonezawa, Manabu Inuma, Akira Otsuka (AIST), Hideki Imai (Chuo Univ/AIST) |
(42) |
14:40-15:05 |
An effective attack against a chaos-based image scrambling encryption IT2009-112 ISEC2009-120 WBS2009-91 |
Liang Zhao, Kouichi Sakurai (Kyushu Univ.) |
|
15:05-15:20 |
Break ( 15 min. ) |
Fri, Mar 5 PM ISEC(Room 100) Chair: ISEC: Katsuyuki Takashima 15:20 - 16:35 |
(43) |
15:20-15:45 |
On key recovery for Enocoro with weak key in related-key attack scenario IT2009-113 ISEC2009-121 WBS2009-92 |
Yasutaka Igarashi, Kazuto Okamoto, Toshinobu Kaneko (Tokyo Univ. of Science) |
(44) |
15:45-16:10 |
A Study on Key Estimation Attacks to Stream Cipher based on Statistical Decision Theory IT2009-114 ISEC2009-122 WBS2009-93 |
Ety Yudiasticha (Waseda Univ.), Kazuhiko Minematsu (NEC), Toshiyasu Matsushima (Waseda Univ.) |
(45) |
16:10-16:35 |
Preimage Resistance of Hash Functions on the Dedicated Block Cipher IT2009-115 ISEC2009-123 WBS2009-94 |
Hidenori Kuwakado (Kobe Univ.), Shoichi Hirose (Univ. of Fukui) |
Fri, Mar 5 AM WBS(Room 101) Chair: WBS Naohiko Iwakiri 09:25 - 10:40 |
(46) |
09:25-09:50 |
Bit Error of Hierarchical Transmission in Optical Wireless Channel IT2009-116 ISEC2009-124 WBS2009-95 |
Yusuke Oka, Hiromasa Habuchi (Ibaraki Univ.), Kouji Ohuchi (Shizuoka Univ.) |
(47) |
09:50-10:15 |
Theoretical BER Performance of Continuous OFDM Signals with Nonlinear Amplification IT2009-117 ISEC2009-125 WBS2009-96 |
Yuichiro Goto, Akihiro Yamakita, Fumiaki Maehara (Waseda Univ.) |
(48) |
10:15-10:40 |
On a Blind Time-Domain Equalization Technique in Single-Carrier Block Transmisson IT2009-118 ISEC2009-126 WBS2009-97 |
Ryo Kuwana, Teruyuki Miyajima (Ibaraki Univ.) |
|
10:40-10:50 |
Break ( 10 min. ) |
Fri, Mar 5 AM IT(Room 101) Chair: IT: Hideki Yagi 10:50 - 12:05 |
(49) |
10:50-11:15 |
Discussion on a self-calibrated pipeline A/D converter. IT2009-119 ISEC2009-127 WBS2009-98 |
Tohru Kohda, Masatora Ogata (Kyushu Univ.) |
(50) |
11:15-11:40 |
The quantized error of AD/DA conversion using beta-expansion IT2009-120 ISEC2009-128 WBS2009-99 |
Tohru Kohda, Yuuki Fukae (Kyushu Univ.) |
(51) |
11:40-12:05 |
Frequency estimator using Newton method IT2009-121 ISEC2009-129 WBS2009-100 |
Tohru Kohda, Kohnosuke Ogiwara (Kyushu Univ.) |
|
12:05-13:25 |
Lunch Break ( 80 min. ) |
Fri, Mar 5 PM IT(Room 101) Chair: IT: Shigeaki Kuzuoka 13:25 - 15:05 |
(52) |
13:25-13:50 |
Behavior Level Design of Turbo TCM Decoder
-- Automatic Synthesis of Pipeline Processing Circuit and Comparison of RTL Design -- IT2009-122 ISEC2009-130 WBS2009-101 |
Hayato Taira, Haruo Ogiwara (Nagaoka Univ. of Tech.) |
(53) |
13:50-14:15 |
Feasibility study of the pre-processing for enhancing text data compression efficiency IT2009-123 ISEC2009-131 WBS2009-102 |
Hirofumi Nakamura (Miyakonojo Natl. Coll. of Tech), Kiyomitsu Kajisa (Kagoshima Natl. Coll. of Tech), Takayasu Fuchida (Kagoshima Univ.) |
(54) |
14:15-14:40 |
Antidictionary Coding Scheme Based on Array Structures IT2009-124 ISEC2009-132 WBS2009-103 |
Keita Suzuki, Hirotada Fukae (Univ. of Electro-Comm.), Takahiro Ota (Nagano Prefectural Inst. of Tech.), Hiroyoshi Morita (Univ. of Electro-Comm.) |
(55) |
14:40-15:05 |
Redundancy analysis of the universal source code with a singular prior IT2009-125 ISEC2009-133 WBS2009-104 |
Tatsuya Hashimoto, Tsutomu Kawabata (Univ. of Electro-Comm.) |
|
15:05-15:20 |
Break ( 15 min. ) |
Fri, Mar 5 PM ISEC+IT[Joint session](Room 101) Chair: ISEC: Ryuichi Sakai 15:20 - 16:35 |
(56) |
15:20-15:45 |
New Classes of Public Key Cryptosystems Constructed Based on Error-Correcting Codes and Probabilistic Structure IT2009-126 ISEC2009-134 WBS2009-105 |
Masao Kasahara (Osaka Gakuin Univ.) |
(57) |
15:45-16:10 |
A Construction of New Class of Linear Multivariate Public Key Cryptosystem Constructed Based on Error Correcting Codes IT2009-127 ISEC2009-135 WBS2009-106 |
Masao Kasahara (Osaka Gakuin Univ.) |
(58) |
16:10-16:35 |
A study on the probabilistic algorithm to solve the elliptic curve discrete logarithm problem IT2009-129 ISEC2009-137 WBS2009-108 |
Osamu Ashihara, Yoshitaka Sagara, Nobuhide Sakuragi, Tomoko K. Matsushima (Polytechnic Univ.) |
Fri, Mar 5 AM ISEC+IT[Joint session](Room 102) Chair: ISEC: Toshihiro Ohigashi 09:00 - 10:40 |
(59) |
09:00-09:25 |
A Note on Practical Key Derivation Functions IT2009-130 ISEC2009-138 WBS2009-109 |
Shoichi Hirose (Univ. of Fukui.) |
(60) |
09:25-09:50 |
Collision Attack on DM Compression Function Using Reduced AES-256 IT2009-131 ISEC2009-139 WBS2009-110 |
Tetsuya Kobayashi, Shoichi Hirose (Univ. Fukui) |
(61) |
09:50-10:15 |
Reducing Disclosed Credentials in Automated Trust Negotiation Using Preference IT2009-132 ISEC2009-140 WBS2009-111 |
Taichi Hanaoka, Yoshimichi Ito, Noboru Babaguchi (Osaka Univ.) |
(62) |
10:15-10:40 |
Bio-metric Authentication using Motion Image of Speakers Face IT2009-133 ISEC2009-141 WBS2009-112 |
Mari Ozaki, Ryuichi Sakai (Osaka Electro-Comm Univ.) |
|
10:40-10:50 |
Break ( 10 min. ) |
Fri, Mar 5 AM IT(Room 102) Chair: IT: Tetsuya Kojima 10:50 - 12:05 |
(63) |
10:50-11:15 |
Existing Probability of Gauss Period Normal Basis IT2009-134 ISEC2009-142 WBS2009-113 |
Kenta Nekado, Yasuyuki Nogami, Yoshitaka Morikawa (Okayama Univ.) |
(64) |
11:15-11:40 |
On Constant Weight Codes with Large Linear Complexity from Cyclic Difference Set IT2009-135 ISEC2009-143 WBS2009-114 |
Takayasu Kaida (Kinki Univ.) |
(65) |
11:40-12:05 |
On the Redundancy Rate of FF and VF Source Codes for General Sources IT2009-136 ISEC2009-144 WBS2009-115 |
Mitsuharu Arimura (Shonan Inst. of Tech.), Ken-ichi Iwata (Univ. of Fukui) |
|
12:05-13:25 |
Lunch Break ( 80 min. ) |
Fri, Mar 5 PM IT+ISEC[Joint session] (Room 102) Chair: IT: Mitsuru Hamada 13:25 - 15:05 |
(66) |
13:25-13:50 |
Constructions of A Large Class of Optimum Linear Codes for Small Number of Information Symbols IT2009-137 ISEC2009-145 WBS2009-116 |
Masao Kasahara (Osaka Gakuin Univ.), Shigeichi Hirasawa (Waseda Univ.) |
(67) |
13:50-14:15 |
Secure Key Rate of the BB84 Protocol using Finite Sample Bits IT2009-138 ISEC2009-146 WBS2009-117 |
Yousuke Sano, Ryutaroh Matsumoto, Tomohiko Uyematsu (Tokyo Inst. of Tech.) |
(68) |
14:15-14:40 |
Bit Transmission Probability Maximizing the Key Rate of the BB84 Protocol IT2009-139 ISEC2009-147 WBS2009-118 |
Sonny Lumbantoruan, Ryutaroh Matsumoto, Tomohiko Uyematsu (Tokyo Inst. of Tech.) |
(69) |
14:40-15:05 |
On the Capacity of the AND Anti-Collusion Fingerprinting Codes IT2009-140 ISEC2009-148 WBS2009-119 |
Hiroki Koga (Univ. of Tsukuba.) |
|
15:05-15:20 |
Break ( 15 min. ) |
Fri, Mar 5 PM IT+ISEC[Joint session] (Room 102) Chair: IT: Hiroki Koga 15:20 - 17:25 |
(70) |
15:20-15:45 |
On Access Structures of Secret Sharing Scheme based on Bivariate Polynomial Interpolation Scheme IT2009-141 ISEC2009-149 WBS2009-120 |
Hideaki Kashiwagura, Mikihiko Nishiara (Shinshu Univ) |
(71) |
15:45-16:10 |
Secure Linear Network Coding using Surplus Resources IT2009-142 ISEC2009-150 WBS2009-121 |
Tomoki Kubo, Kunihiko Harada, Hirosuke Yamamoto (Univ. of Tokyo) |
(72) |
16:10-16:35 |
Vulnerability of MRD-Code-based Universal Secure Network Coding against Stronger Eavesdroppers IT2009-143 ISEC2009-151 WBS2009-122 |
Eitaro Shioji, Ryutaroh Matsumoto, Tomohiko Uyematsu (Tokyo Inst. of Tech.) |
(73) |
16:35-17:00 |
Construction of wiretap codes from ordinary channel codes IT2009-144 ISEC2009-152 WBS2009-123 |
Masahito Hayashi (Tohoku Univ./National Univ. of Singapore), Ryutaroh Matsumoto (Tokyo Inst. of Tech.) |
(74) |
17:00-17:25 |
Basics of Design and Analysis of Codes for Wiretap Channels IT2009-145 ISEC2009-153 WBS2009-124 |
Mitsuru Hamada (Tamagawa Univ.) |