Tue, Jul 20 AM A1-1 09:55 - 12:00 |
(1) |
09:55-10:20 |
A Method for Checking the Parity of (#E-1)/2 |
Mayumi Obara, Yasuyuki Nogami, Yoshitaka Morikawa (Okayama Univ.) |
(2) |
10:20-10:45 |
A fast square root computation in extension fields |
F.Wang, Yasuyuki Nogami, Yoshitaka Morikawa (Okayama Univ.) |
(3) |
10:45-11:10 |
A Hardware Organization of Modular Multiplication for RSA Cryptosystem |
Yi Ge, Takao Sakurai (Univ. of Tokyo), Koki Abe (UEC), Shuichi Sakai (Univ. of Tokyo) |
(4) |
11:10-11:35 |
Implementable Quantum Bit String Commitment |
Toyohiro Tsurumaru (Mitsubishi Electirc) |
(5) |
11:35-12:00 |
A More Efficient Modification of KASUMI Type Pseudorandom Permutations |
Wonil LEE, Kouichi Sakurai (Kyushu Univ.), Seokhie Hong, Sangjin Lee (CIST,Korea Univ.) |
Tue, Jul 20 PM A1-2 13:30 - 17:30 |
(6) |
13:30-13:55 |
Some Extensions of Multi-Variate Public Key Cryptosystems |
Ryuichi Sakai (Osaka Electro-Communication Univ.), Masao Kasahara (Osaka Gakuin Univ.) |
(7) |
13:55-14:20 |
A Construction of Public Key Cryptosystem based on Random Singular and Non-singular Simultaneous Equations over Extension Field |
Masao Kasahara (Osaka Gakuin Univ.), Ryuichi Sakai (Osaka Electro-Communication Univ.) |
(8) |
14:20-14:45 |
Cryptanalysis of the TSP cryptosystem over the Gaussian integers |
Akira Hayashi (Kanazawa Inst of Tech) |
(9) |
14:45-15:10 |
A secure generic conversion to CCA-secure encryption and relatied problems |
Eiichiro Fujisaki (NTT Labs) |
(10) |
15:10-15:35 |
Optimal Security Proof for PFDH under Strong Existential Unforgeability |
Bagus Santoso, Kazuo Ohta, Noboru Kunihiro (UEC) |
|
15:35-15:50 |
Break ( 15 min. ) |
(11) |
15:50-16:15 |
An Analysis of Feasibility for the Factoring Device TWIRL (I) |
Tetsuya Izu, Kouichi Itoh, Jun Kogure, Kiyoshi Kohiyama, Takeshi Shimoyama, Masahiko Takenaka, Naoya Torii, Shouichi Masui (Fujitsu Lab. LTD.), Kenji Mukaida (Fujitsu) |
(12) |
16:15-16:40 |
An Analysis of Feasibility for the Factoring Device TWIRL (II) |
Tetsuya Izu, Kouichi Itoh, Jun Kogure, Kiyoshi Kohiyama, Takeshi Shimoyama, Masahiko Takenaka, Naoya Torii, Shouichi Masui (Fujitsu Lab.), Kenji Mukaida (Fujitsu) |
(13) |
16:40-17:05 |
A trial of GNFS implementation (Part V)
-- Speeding up sieving using bucket sort -- |
Kazumaro Aoki, Hiroki Ueda (NTT) |
(14) |
17:05-17:30 |
On validation testing for block cipher modules |
Jun Yajima, Masahiko Takenaka, Takeshi Shimoyama (FUJITSU LAB.) |
Tue, Jul 20 AM B1-1 09:55 - 12:00 |
(15) |
09:55-10:20 |
Implementation of Damage Prediction System of Unlawful Access by Event Dependent Model |
Ryoji Hasui (The Univ. of Tokushima), Yoshiaki Shiraishi (Kinki Univ.), Masakatu Morii (The Univ. of Tokushima) |
(16) |
10:20-10:45 |
An Assessment of Wireless Location Privacy Risks in High Precision Positioning System |
Huang Leping (Nokia), Kaoru Sezaki (Univ. of Tokyo) |
(17) |
10:45-11:10 |
A Proposal of Congestion DoS Attack Avoidance System to which Mobile IPv6 Technology Applied |
Takayoshi Kusaka, Tatsuya Baba, Masataka Kado, Tsutomu Inada (NTT Data Corp.) |
(18) |
11:10-11:35 |
A Policy-based Automated Handling Mechanism for Network Security Events |
Shin Shirahata, Masaki Minami, Jun Murai (KEIO Univ.) |
(19) |
11:35-12:00 |
Intrusion Detection System to Detect Variant Attacks Using Learning Algorithms with Automatic Generation of Training Data |
Akira Yamada, Yutaka Miyake, Keisuke Takemori, Toshiaki Tanaka (KDDI Labs.) |
Tue, Jul 20 PM B1-2 13:30 - 17:30 |
(20) |
13:30-13:55 |
Secure Double Block Length Hash Functions Based on Abreast/Tandem Davies-Meyer |
Shoichi Hirose (Kyoto Univ.) |
(21) |
13:55-14:20 |
Implementation and Evaluation of Illegal Copy Protection for Multicast Contents Delivery |
Masaki Inamura, Toshiaki Tanaka (KDDI R&D Labs.) |
(22) |
14:20-14:45 |
Reducing Frequency of Communication on the Consignment Delivering System Protecting Marketing Information |
Akira Fujiwara, Shingo Okamura, Maki Yoshida, Toru Fujiwara (Osaka Univ.) |
(23) |
14:45-15:10 |
A Secure Traitor Tracing Scheme against Key Exposure |
Kazuto Ogawa, Arisa Fujii, Go Ohtake (NHK), Goichiro Hanaoka, Hideki Imai (U. of Tokyo), Keigo Majima, Kimiyuki Oyamada (NHK) |
(24) |
15:10-15:35 |
A report on 3rd annual PKI R&D workshop |
Satoshi Koga (Kyushu Univ.), Hiroaki Kikuchi (Tokai Univ.) |
|
15:35-15:50 |
Break ( 15 min. ) |
(25) |
15:50-16:15 |
Certification of Program Execution by Tamper Resistant CPU |
Atsuya Okazaki, Masaki Nakanishi, Shigeru Yamashita, Katsumasa Watanabe (NAIST) |
(26) |
16:15-16:40 |
A proposal for protection of low-cost RFID tags using trusted devices |
Jose Francisco Guevara Vera (Univ. Politécnica de Valencia), Hiroshi Honjo (NTT Data) |
(27) |
16:40-17:05 |
A CHAP authentication with a key extracted from a fingerprint |
Yoichi Shibata (Shizuoka Univ.), Itsukazu Nakamura (Beijin NTT data), Masahiro Mimura, Kenta Takahashi (Hitachi, Ltd), Masakatsu Nishigaki (Shizuoka Univ.) |
(28) |
17:05-17:30 |
A consideration from the peculiarity of a handwriting about the anonymity of a handwriting |
Norihisa Segawa (Iwate Prefectural University), Yuko Murayama (IPU), Masatoshi Miyazaki (Digitally Advanced Integrated Solutions Labs), Yoshiaki Nemoto (Tohoku University) |
Wed, Jul 21 AM A2-1 09:15 - 12:00 |
(1) |
09:15-09:40 |
Mathematical Modeling and Analysis of Computer Virus Diffusion Process |
Masato Uchida, Daisuke Satoh (NTT) |
(2) |
09:40-10:05 |
An E-mail Virus Diffusion Model |
Daisuke Satoh, Masato Uchida, Keisuke Ishibashi (NTT), Makoto Kobayashi (NSP) |
(3) |
10:05-10:30 |
A proposal of estimation method of worm's infection magnitude by using site level valnerability profiling |
Kanba Koizumi (Keio Univ), Hideki Koike (Univ Electro-commnicatinos), Tetuji Takada (Sony CSL), Michiaki Yasumura (Keio Univ) |
|
10:30-10:45 |
Break ( 15 min. ) |
(4) |
10:45-11:10 |
Protecting Memories in Multitask OSes -- A Cryptographic Memory System for Resource-poor Platforms |
Yu Inamura, Toru Egashira, Atsushi Takeshita (NTT DoCoMo) |
(5) |
11:10-11:35 |
Protecting Memories in Multitask OSes
-- Tampering Detection -- |
Toru Egashira, Yu Inamura, Atsushi Takeshita (NTT DoCoMo) |
(6) |
11:35-12:00 |
Implementation of Secure Seamless Roaming Method by IPsec/IKE |
Shingo Fujimoto, Masahiko Takenaka (FUJITSU LTD.) |
Wed, Jul 21 PM A2-2 13:15 - 16:50 |
(7) |
13:15-13:40 |
A Note on Probabilistic Internal-State Reconstruction Method to Stream Ciphers with Time-variant Tables |
Toshihiro Ohigashi (The Univ. of Tokushima), Yoshiaki Shiraishi (Kinki Univ.), Masakatu Morii (The Univ. of Tokushima) |
(8) |
13:40-14:05 |
SSSM: A New Key Stream Generator with Time-variant Tables |
Sanzo Ugawa, Toshihiro Ohigashi (The Univ. of Tokushima), Yoshiaki Shiraishi (Kinki Univ.), Masakatu Morii (The Univ. of Tokushima) |
(9) |
14:05-14:30 |
Analysis and Evaluation of Guess-and-Determine Attacks on Clock Controlled Stream Ciphers |
Shinsaku Kiyomoto, Toshiaki Tanaka (KDDI Labs.), Kouichi Sakurai (Kyushu Univ.) |
(10) |
14:30-14:55 |
A Study on the DFT Test in NIST SP800-22 |
Hisashi Yamamoto, Toshinobu Kaneko (T.U.S) |
|
14:55-15:10 |
Break ( 15 min. ) |
(11) |
15:10-15:35 |
The mechanism of DPRP in Flexible Private Network |
Hidekazu Suzuki, Akira Watanabe (Meijo Univ.) |
(12) |
15:35-16:00 |
The Proposal of Practical Cipher Communication Systems |
Shinya Masuda, Akira Watanabe (Meijo Univ.) |
(13) |
16:00-16:25 |
Researches on Detection Method of Island Hop in Flexible Private Network |
Daisuke Takeo, Akira Watanabe (Meijo Univ.) |
(14) |
16:25-16:50 |
A Loosely Managed Privacy Protection Method using Information Entropy |
Miyuki Imada, Koichi Takasugi, Masakatsu Ohta (NTT) |
Wed, Jul 21 AM B2-1 09:40 - 12:00 |
(15) |
09:40-10:05 |
Development of DPA evaluation platform for 8 bit processor |
Koichi Fujisaki, Yuki Tomoeda, Hideyuki Miyake, Yuichi Komano, Atsushi Shimbo, Shinichi Kawamura (Toshiba) |
(16) |
10:05-10:30 |
Side Channel Attacks on XTR and Efficient Countermeasures |
DongGuk Han (kyushu Univ.), Jongin Lim (Korea Univ.), Kouichi Sakurai (Kyushu univ.) |
|
10:30-10:45 |
Break ( 15 min. ) |
(17) |
10:45-11:10 |
Evaluation of DPA by Logic Simulation and Construction of Leake Models |
Minoru Saeki, Daisuke Suzuki (Mitsubishi Electric Corp), Tetsuya Ichikawa (MEE) |
(18) |
11:10-11:35 |
An Attack on Cryptographic Hardware Design with Data Masking Method |
Tetsuya Ichikawa (MEE), Daisuke Suzuki, Minoru Saeki (Mitsubishi Electric Corp) |
(19) |
11:35-12:00 |
Countermeasure against DPA Considering Transition Probabilities |
Daisuke Suzuki, Minoru Saeki (Mitsubishi Electric Corp.), Tetsuya Ichikawa (MEE) |
Wed, Jul 21 PM B2-2 13:15 - 16:25 |
(20) |
13:15-13:40 |
An Electronic Weighted Voting Protocol with Tallying Cost Reduced |
Shinji Nakatake, Toru Nakanishi, Nobuo Funabiki, Yuji Sugiyama (Okayama Univ.) |
(21) |
13:40-14:05 |
Electronic Voting Scheme Based on MIX-net and Homomorphism |
Natsuki Ishida (HitachiSoftware), Wakaha Ogata (titech) |
(22) |
14:05-14:30 |
An improved attack on a receipt-free and universally verifiable mix-type voting scheme |
Yong-Sork Her, Kenji Imamoto, Kouichi Sakurai (Kyushu Univ.) |
(23) |
14:30-14:55 |
Unconditionally Secure Polynomial Evaluation And Its Application To Electronic Voting |
Akira Otsuka (IPA), Hideki Imai (Univ. of Tokyo) |
|
14:55-15:10 |
Break ( 15 min. ) |
(24) |
15:10-15:35 |
Refrehshable Tokens with Optional Linkability |
Rie Shigetomi (Univ. of Tokyo), Akira Otsuka (IPA), Keith Martin (Royal Holloway), Hideki Imai (Univ. of Tokyo) |
(25) |
15:35-16:00 |
Transferable Off-line Anonymous Electronic Ticekt System |
Kyoko Mikami, Asuka Nakamura (Tsuda College), Rie Shigetomi (Univ. of Tokyo), Takahide Ogawa (Tsuda College) |
(26) |
16:00-16:25 |
Electronic Voting System Using Mobile Phone with Camera |
Hiroshi Motosugi, Kenichi Katsuragawa, Ryoichi Sasaki (TDU) |