|
Chair |
|
Tsutomu Matsumoto (Yokohama National Univ.) |
Vice Chair |
|
Toshiaki Tanaka (KDDI Labs.), Koichi Sakurai (Kyushu Univ.) |
Secretary |
|
Junji Shikata (Yokohama National Univ.), Tetsuya Izu (Fujitsu Labs.) |
Assistant |
|
Tetsu Iwata (Nagoya Univ.) |
|
Conference Date |
Wed, Dec 12, 2012 13:00 - 17:00 |
Topics |
|
Conference Place |
Kikai-Shinko-Kaikan Bldg. |
Address |
3-5-8, Shiba-kouen, Minato-ku, Tokyo, 105-0011 Japan |
Transportation Guide |
8 min. walk from Kamiya-cho Sta. on Subway Hibiya Line or 10 min. walk from Daimon Sta. both on Subway Asakusa Line and on Oedo Line http://www.jspmi.or.jp/kaigishitsu/access.html |
Copyright and reproduction |
All rights are reserved and no part of this publication may be reproduced or transmitted in any form or by any means, electronic or mechanical, including photocopy, recording, or any information storage and retrieval system, without permission in writing from the publisher. Notwithstanding, instructors are permitted to photocopy isolated articles for noncommercial classroom use without fee. (License No.: 10GA0019/12GB0052/13GB0056/17GB0034/18GB0034) |
Wed, Dec 12 PM ISEC 13:00 - 17:00 |
(1) |
13:00-13:25 |
Notes on Secure and Smooth Typing Password Generation Method using Markov Process ISEC2012-72 |
Takuto Tamai, Hiroyuki Inaba (Kyoto Inst. of Technology) |
(2) |
13:25-13:50 |
An Extention of Reputation System with Secrecy for Negative Feedbacks ISEC2012-73 |
Tomoya Nomura, Toru Nakanishi, Kan Watanabe, Nobuo Funabiki (Okayama Univ.) |
(3) |
13:50-14:15 |
Implementation and Evaluation of a Method for Preventing Unauthorized Data Transmission ISEC2012-74 |
Masato Hata, Masato Tanabe, Katsunari Yoshioka, Tsutomu Matsumoto (Yokohama National Univ.) |
|
14:15-14:30 |
Break ( 15 min. ) |
(4) |
14:30-14:55 |
Generating elliptic curves having efficient endomorphisms suitable for pairing computation and scalar multiplication ISEC2012-75 |
Naoki Kanayama, Eiji Okamoto, Kazutaka Saito (Univ. of Tsukuba) |
(5) |
14:55-15:20 |
The YNU's Method for Acquiring Power-Consumption Traces Developed for DPA Contest v3 ISEC2012-76 |
Tsutomu Matsumoto, Takeshi Kishikawa, Hitoshi Ono, Shohei Saito, Yuu Tsuchiya (Yokohama Nat'l Univ.), Akihiko Sasaki (MORITA TECH), Tsuyoshi Toyama (Yokohama Nat'l Univ.) |
(6) |
15:20-15:45 |
A Report on CRYPTO 2012 ISEC2012-77 |
Shiho Moriai (NICT) |
|
15:45-16:00 |
Break ( 15 min. ) |
(7) |
16:00-16:30 |
[Invited Talk]
Breaking and Repairing GCM Security Proofs (from CRYPTO 2012) ISEC2012-78 |
Tetsu Iwata, Keisuke Ohashi (Nagoya Univ.), Kazuhiko Minematsu (NEC) |
(8) |
16:30-17:00 |
[Invited Talk]
On the Impossibility of Constructing Efficient Key Encapsulation and Programmable Hash Functions in Prime Order Groups ISEC2012-79 |
Goichiro Hanaoka, Takahiro Matsuda (AIST), Jacob Schuldt (RHUL) |
Announcement for Speakers |
General Talk | Each speech will have 20 minutes for presentation and 5 minutes for discussion. |
Invited Talk | Each speech will have 25 minutes for presentation and 5 minutes for discussion. |
Contact Address and Latest Schedule Information |
ISEC |
Technical Committee on Information Security (ISEC) [Latest Schedule]
|
Contact Address |
Tetsu Iwata (Nagoya University)
TEL +81-52-789-5722, FAX +81-52-789-5723
E-: ic-c (to ISEC secretaries) |
Last modified: 2012-10-19 23:12:50
|