Committee |
Date Time |
Place |
Paper Title / Authors |
Abstract |
Paper # |
COMP, ISEC |
2016-12-21 09:30 |
Hiroshima |
Hiroshima University |
Improvements of Blacklistable Anonymous Credential System Using Accumulator Yuu Aikou, Toru Nakanishi (Hiroshima Univ) ISEC2016-70 COMP2016-31 |
In current ID-based user authentication schemes, privacy issues may occur, since users’ behavior histories are collected... [more] |
ISEC2016-70 COMP2016-31 pp.1-7 |
COMP, ISEC |
2016-12-21 09:50 |
Hiroshima |
Hiroshima University |
A note on security notions of anonymity in Identity-based encryption Honomu Ootomo, Taroh Sasaki, Atsushi Fujioka (Kanagawa Univ.) ISEC2016-71 COMP2016-32 |
Discussing security of the ID-based encryption, a kind of the public key encryption, one criterion of security is the an... [more] |
ISEC2016-71 COMP2016-32 pp.9-13 |
COMP, ISEC |
2016-12-21 10:30 |
Hiroshima |
Hiroshima University |
[Invited Talk]
New frontier of machine learning and computation initiated by quantum annealing Masayuki Ohzeki (Tohoku Univ.) ISEC2016-72 COMP2016-33 |
[more] |
ISEC2016-72 COMP2016-33 pp.15-22 |
COMP, ISEC |
2016-12-21 12:40 |
Hiroshima |
Hiroshima University |
[Invited Talk]
Fast and Scalable Bilinear-Type Conversion Using Integer Programming Fumitaka Hoshino, Masayuki Abe (NTT), Miyako Ohkubo (NICT) ISEC2016-73 COMP2016-34 |
[more] |
ISEC2016-73 COMP2016-34 p.23 |
COMP, ISEC |
2016-12-21 13:10 |
Hiroshima |
Hiroshima University |
[Invited Talk]
Cryptanalysis of GGH15 Multilinear Maps (from CRYPTO 2016) Mehdi Tibouchi (NTT) ISEC2016-74 COMP2016-35 |
[more] |
ISEC2016-74 COMP2016-35 p.25 |
COMP, ISEC |
2016-12-21 13:40 |
Hiroshima |
Hiroshima University |
[Invited Talk]
Backdoors in Pseudorandom Number Generators: Possibility and Impossibility Results Jean Paul Degabriele, Kenneth Paterson (RHUL), Jacob Schuldt (AIST), Joanne Woodage (RHUL) ISEC2016-75 COMP2016-36 |
In this talk, we continue the foundational work on backdoored pseudorandom generators (PRGs) initiated by Dodis et al., ... [more] |
ISEC2016-75 COMP2016-36 p.27 |
COMP, ISEC |
2016-12-21 14:30 |
Hiroshima |
Hiroshima University |
Miki Miyauchi (NTT) ISEC2016-76 COMP2016-37 |
(To be available after the conference date) [more] |
ISEC2016-76 COMP2016-37 pp.29-35 |
COMP, ISEC |
2016-12-21 14:50 |
Hiroshima |
Hiroshima University |
ISEC2016-77 COMP2016-38 |
[more] |
ISEC2016-77 COMP2016-38 pp.37-42 |
COMP, ISEC |
2016-12-21 15:10 |
Hiroshima |
Hiroshima University |
A Loosely-Stabilizing Population Protocol for Maximal Independent Set Seiken Kiyosu, Yuichi Sudo, Hirotsugu Kakugawa, Toshimitsu Masuzawa (Osaka Univ.) ISEC2016-78 COMP2016-39 |
Self–stabilizing population protocols are impossible to design for some problems. For example, leader election on ... [more] |
ISEC2016-78 COMP2016-39 pp.43-49 |
COMP, ISEC |
2016-12-21 15:30 |
Hiroshima |
Hiroshima University |
Theoretical Model of Interconnection Networks Consisting of Hosts and Switches Ryota Yasudo (Keio Univ.), Michihiro Koibuchi (NII), Hideharu Amano (Keio Univ.), Koji Nakano (Hiroshima Univ.) ISEC2016-79 COMP2016-40 |
Designing interconnection networks with low average shortest path length (ASPL) is an important object for researchers o... [more] |
ISEC2016-79 COMP2016-40 pp.51-58 |
COMP, ISEC |
2016-12-22 09:30 |
Hiroshima |
Hiroshima University |
Effect on Mix Columns to the Security of Minalpher Yuki Kishi, Taroh Sasaki, Atsushi Fujioka (Kanagawa Univ) ISEC2016-80 COMP2016-41 |
This article is about Mix Columns in Minalpher. SPN strcture have Mix Columns. Mix Columns have an influence on sa... [more] |
ISEC2016-80 COMP2016-41 pp.59-62 |
COMP, ISEC |
2016-12-22 09:50 |
Hiroshima |
Hiroshima University |
Reconsideration on Re-keying scheme from CARDIS 2015 (part 2) Yuichi Komano (Toshiba) ISEC2016-81 COMP2016-42 |
[more] |
ISEC2016-81 COMP2016-42 pp.63-69 |
COMP, ISEC |
2016-12-22 10:30 |
Hiroshima |
Hiroshima University |
[Invited Talk]
Theory and Practice of Succinct Data Structures Kunihiko Sadakane (Univ. of Tokyo) ISEC2016-82 COMP2016-43 |
Succinct data structures are data structures that can compress data to the limit and perform search and other operations... [more] |
ISEC2016-82 COMP2016-43 p.71 |
COMP, ISEC |
2016-12-22 12:30 |
Hiroshima |
Hiroshima University |
[Invited Talk]
Adversary-dependent Lossy Trapdoor Function from Hardness of Factoring Semi-smooth RSA Subgroup Takashi Yamakawa (UT), Shota Yamada, Goichiro Hanaoka (AIST), Noboru Kunihiro (UT) ISEC2016-83 COMP2016-44 |
[more] |
ISEC2016-83 COMP2016-44 p.73 |
COMP, ISEC |
2016-12-22 13:00 |
Hiroshima |
Hiroshima University |
[Invited Talk]
Extended Tower Number Field Sieve: A New Complexity for the Medium Prime Case (from CRYPTO 2015) Taechan Kim (NTT) ISEC2016-84 COMP2016-45 |
In this invited talk, we introduce the paper, "Extended tower number field sieve: A new complexity for the medium prime ... [more] |
ISEC2016-84 COMP2016-45 p.75 |
COMP, ISEC |
2016-12-22 13:30 |
Hiroshima |
Hiroshima University |
[Invited Talk]
The SKINNY Family of Block Ciphers and its Low-Latency Variant MANTIS Yu Sasaki (NTT) ISEC2016-85 COMP2016-46 |
[more] |
ISEC2016-85 COMP2016-46 p.77 |
COMP, ISEC |
2016-12-22 14:20 |
Hiroshima |
Hiroshima University |
[Invited Talk]
How small can the diameter of an undirected graph be?
-- Toward low-latency large-scale interconnection networks -- Ikki Fujiwara (NICT) ISEC2016-86 COMP2016-47 |
[more] |
ISEC2016-86 COMP2016-47 p.79 |
COMP, ISEC |
2016-12-22 15:40 |
Hiroshima |
Hiroshima University |
Reduction of Search Number for Equivalence Structure Extraction Under Equivalence Structure Conservation Assumption Seiya Satoh (AIST), Yoshinobu Takahashi (University of Electro-Communications), Hiroshi Yamakawa (Dwango AI Lab) ISEC2016-87 COMP2016-48 |
We consider $K$-tuples that are composed of IDs that identify $K$D sequences where the number of IDs is $N$. An equivale... [more] |
ISEC2016-87 COMP2016-48 pp.81-86 |
COMP, ISEC |
2016-12-22 16:00 |
Hiroshima |
Hiroshima University |
Improvement of Finger Outlines Extraction in Hand Images Including Unusual Patterns with a Color Glove Kotaro Moriuchi, Noriaki Fujishima (NIT, Matsue College) ISEC2016-88 COMP2016-49 |
In this study, the authors have investigated problems which cause mistakes when finger outlines are extracted using palm... [more] |
ISEC2016-88 COMP2016-49 pp.87-91 |