|
Chair |
|
Masakatu Morii |
Vice Chair |
|
Mitsuru Matsui, Kazuo Ota |
Secretary |
|
Hiroshi Doi, Shiho Moriai |
Assistant |
|
Yoshiaki Shiraishi |
|
Conference Date |
Wed, Dec 13, 2006 09:55 - 17:20 |
Topics |
|
Conference Place |
Kikai-shinkou Building |
Address |
3-5-8, Shiba-kouen, Minato-ku, Tokyo, 105-0011 Japan |
Transportation Guide |
8 min. walk from Kamiya-cho Sta. on Subway Hibiya Line or 10 min. walk from Daimon Sta. both on Subway Asakusa Line and on Oedo Line http://www.jspmi.or.jp/kaikan.htm |
Wed, Dec 13 AM 09:55 - 11:55 |
(1) |
09:55-10:20 |
Autocorrelation Test of Binary Sequence for Cryptographic Applications |
Yuichi Takeda, Mituaki Huzii, Toshinari Kamakura, Norio Watanabe, Takakazu Sugiyama (Chuo Univ.) |
(2) |
10:20-10:45 |
Improved collision attack on Reduced Versions of Tiger |
Hirotaka Yoshida, Dai Watanabe (HITACHI), Bart Preneel (Leuven Univ.) |
(3) |
10:45-11:10 |
On Formalization of Concurrent General Composition of Witness Indistinguishability |
Hirofumi Muratani (Toshiba) |
(4) |
11:10-11:55 |
ID-based Encryption Scheme with Two Dimensional Hierarchical Structure Based on the l-BDHE Assumption |
Kousuke Miyashita, Wataru Kishimoto (Chiba Univ.) |
Wed, Dec 13 PM 12:55 - 17:20 |
(5) |
12:55-13:20 |
Key Generation Schemes for the ID base Public Key Cyrptosystems. |
Ryuichi Sakai (Osaka Electro-Comm Univ.) |
(6) |
13:20-13:45 |
Proposal for an improvement of computing Twisted Ate pairing |
Seiichi Matsuda, Naoki Kanayama, Takeshi Okamoto, Eiji Okamoto (Tsukuba Univ.) |
(7) |
13:45-14:10 |
A note on digital signature using knapsack public key cryptosystem |
Hiraku Sugawara (I.N.C.T. Advanced Course), Tsutomu Ansai (I.N.C.T) |
(8) |
14:10-14:35 |
On experimental study on the application of point tripling formulas for elliplic curve cryptosystems |
Kazuya Okamoto, Akira Hayashi (KIT) |
(9) |
14:35-15:00 |
A Proposal of a Group Siganture Scheme with Membership Revocation Using Prime Numbers and its Implementation |
Naoto Hamada, Takuya Nakayama, Toru Nakanishi, Nobuo Funabiki (Okayama Univ.) |
|
15:00-15:15 |
Break ( 15 min. ) |
(10) |
15:15-15:40 |
Visual Cryptography Schemes with Dihedral Group Access Structure for Many Images |
Miyuki Uno, Mikio Kano (Ibaraki Univ.) |
(11) |
15:40-16:05 |
A Technique to Distinguish the New Software using the Exection File Information |
Chikako Ishizawa, Makoto Nishida (Akita University) |
(12) |
16:05-16:30 |
A Study of Identifier Naming Conventions Suitable for User Authentication |
Megumi Nogita, Yoshiaki Kasahara, Eisuke Itoh, Takahiko Suzuki (Kyushu Univ) |
(13) |
16:30-16:55 |
A Fixed IV Value Independent Key Recovery Attack against WEP |
Yoshiaki Fujikawa, Toshihiro Ohigashi, Hidenori Kuwakado, Masakatu Morii (Kobe Univ.) |
(14) |
16:55-17:20 |
A Practical Key Recovery Attack Against Py |
Takanori Isobe, Toshihiro Ohigashi, Hidenori Kuwakado, Masakatu Morii (Kobe Univ.) |
Contact Address and Latest Schedule Information |
ISEC |
Technical Committee on Information Security (ISEC) [Latest Schedule]
|
Contact Address |
Yoshiaki Shiraishi (Nagoya Inst. of Tech.)
TEL +81-52-735-7240, FAX +81-52-744-1355
E-: ic-c (to ISEC secretaries) |
Last modified: 2006-10-25 11:08:49
|
Notification: Mail addresses are partially hidden against SPAM.
|