Fri, May 22 AM 09:55 - 12:00 |
(1) |
09:55-10:20 |
A random number generation by Logistic Map
-- To generate and manage the identification number -- |
Jiguo Dong (Univ. of Electro-Comm.) |
(2) |
10:20-10:45 |
Corrected Non-overlapping Template Matching Test |
Yuichi Takeda (Kanagawa Inst. of Tech.), Mituaki Huzii, Toshinari Kamakura, Norio Watanabe, Takakazu Sugiyama (Chuo Univ.) |
(3) |
10:45-11:10 |
Estimation of CPA attack for AES using Simulation method |
Kimihiro Yamakoshi, Akihiro Yamagishi (NTT) |
(4) |
11:10-11:35 |
Generalized Zero-offset Power Analyses for Restricted Masking Scheme |
Yuichi Komano, Hideo Shimizu, Hanae Nozaki, Atsushi Shimbo (Toshiba Corp.) |
(5) |
11:35-12:00 |
A Novel Construction Method for Visual Secret Sharing Schemes Allowing Rotation of Shares |
Yang Li, Mitsugu Iwamoto, Kazuo Ohta, Kazuo Sakiyama (Univ. of Electro-Comm.) |
Fri, May 22 PM 13:00 - 17:00 |
(6) |
13:00-13:25 |
An Implementation of a Group Signature Scheme with Efficient Verifier-Local Revocation Check |
Amang Sudarsono, Toru Nakanishi, Yumi Sakemi, Yasuyuki Nogami, Nobuo Funabiki (Okayama Univ.) |
(7) |
13:25-13:50 |
Joint Sparse Forms with Twelve Precomputed Points |
Katsuyuki Okeya (Hitachi) |
(8) |
13:50-14:15 |
A Consideration on Generating Ordinary Pairing Friendly Curve of Composite Order That Has Two Large Prime Factors |
Kazushi Nishii, Yumi Sakemi, Yasuyuki Nogami, Yoshitaka Morikawa (Okayama Univ.) |
(9) |
14:15-14:40 |
An Improvement of Cyclic Vector Multiplication Algorithm based on Gauss period Normal Basis |
Erika Yanagi, Kenta Nekado, Yasuyuki Nogami, Yoshitaka Morikawa (Okayama Univ.) |
(10) |
14:40-15:05 |
Another Experimental Security Analysis of OTU2000 through Attacks Based on Lattice Theory |
Daewoo Kim, Masahiro Mambo, Eiji Okamoto (Univ. of Tsukuba.) |
|
15:05-15:20 |
Break ( 15 min. ) |
(11) |
15:20-15:45 |
A Pairing-based Group Key Exchange with an Edge-based Tree |
Atsuko Miyaji (JAIST), Yvo Desmedt (Univ. College London) |
(12) |
15:45-16:10 |
Digital Signature Using Knapsack Problem |
Kunikatsu Kobayashi (Yamagata Univ.), Kotaro Honda (α systems) |
(13) |
16:10-16:35 |
New Classes of Product-Sum Type Public Key Cryptosystems and Fuzzy Vault Scheme Constructed Based on Error-Correcting Codes |
Masao Kasahara (Osaka Gakuin Univ.) |
(14) |
16:35-17:00 |
Cryptanalysis on 2 Dimensional Subset-sum Public Key Cryptosystem |
Ryuichi Sakai (Osaka Electro-Comm Univ.) |