Committee |
Date Time |
Place |
Paper Title / Authors |
Abstract |
Paper # |
ISEC |
2016-05-19 10:00 |
Tokyo |
Kikai-Shinko-Kaikan Bldg. |
Modified method for identification of template using non-overlapping template matching test Yuichi Takeda (KAIT), Huzii Mituaki, Toshinari Kamakura, Norio Watanabe (Chuo Univ.) ISEC2016-1 |
[more] |
ISEC2016-1 pp.1-4 |
ISEC |
2016-05-19 10:25 |
Tokyo |
Kikai-Shinko-Kaikan Bldg. |
IDS using Discrete Fourier Transform with window functions Yusuke Tsuge, Keisuke Iwai, Hidema Tanaka, Takakazu Kurokawa (NDA) ISEC2016-2 |
An Intrusion Detection System (IDS) is countermeasure against network attack. There are mainly two types of detections; ... [more] |
ISEC2016-2 pp.5-11 |
ISEC |
2016-05-19 11:00 |
Tokyo |
Kikai-Shinko-Kaikan Bldg. |
[Invited Talk]
Conversion among Several Classes of Predicate Encryption and Applications to ABE with Various Compactness Tradeoffs Nuttapong Attrapadung, Goichiro Hanaoka, Shota Yamada (AIST) ISEC2016-3 |
Predicate encryption is an extension of public key encryption that enables much flexibility. There are many kinds of pre... [more] |
ISEC2016-3 p.13 |
ISEC |
2016-05-19 11:30 |
Tokyo |
Kikai-Shinko-Kaikan Bldg. |
[Invited Talk]
On New Realizations of Somewhere Statistically Binding Hashing and Positional Accumulators Tatsuaki Okamoto (NTT) ISEC2016-4 |
[more] |
ISEC2016-4 p.15 |
ISEC |
2016-05-19 13:00 |
Tokyo |
Kikai-Shinko-Kaikan Bldg. |
Proposal of Multivariate Public Key CryptoSystem based on Numerous Prime Numbers and its Application to Organizational Communications
-- For Quantum Proof MPKC and IoT Environment -- Shigeo Tsujii, Ryo Fujita, Masahito Gotaishi (Chuo-Univ.) ISEC2016-5 |
[more] |
ISEC2016-5 pp.17-24 |
ISEC |
2016-05-19 13:25 |
Tokyo |
Kikai-Shinko-Kaikan Bldg. |
On the Possibility of Recovering Short Generators over Ideal Lattices for Cyclotomic Fields Shinya Okumura, Masaya Yasuda, Tsuyoshi Takagi (Kyushu Univ.) ISEC2016-6 |
Recently, next-generation high-performance cryptography, e.g. post-quantum cryptography, fully homomorphic encryption sc... [more] |
ISEC2016-6 pp.25-32 |
ISEC |
2016-05-19 13:50 |
Tokyo |
Kikai-Shinko-Kaikan Bldg. |
Analysis of Decreasing Squared-Sum of Gram-Schmidt Lengths for Finding Short Lattice Vectors Masaya Yasuda (Kyushu Univ.), Kazuhiro Yokoyama (Rikkyo Univ.) ISEC2016-7 |
[more] |
ISEC2016-7 pp.33-34 |
ISEC |
2016-05-19 14:30 |
Tokyo |
Kikai-Shinko-Kaikan Bldg. |
Research Problems in "Instrumentation Security" Tsutomu Matsumoto (YNU) ISEC2016-8 |
“Instrumentation Security” studies the security with respect to data acquisition phase in IoT or CPS. It examines attack... [more] |
ISEC2016-8 p.35 |
ISEC |
2016-05-19 14:55 |
Tokyo |
Kikai-Shinko-Kaikan Bldg. |
Instrumentation Security of a Pulse LIDAR System Against Reflected Light Masquerading Kazuki Soma, Daisuke Fujimoto, Tsutomu Matsumoto (YNU) ISEC2016-9 |
A number of automatic safety systems such as Automatic Emergency Braking (AEB) for vehicles functions based on the measu... [more] |
ISEC2016-9 pp.37-44 |
ISEC |
2016-05-19 15:30 |
Tokyo |
Kikai-Shinko-Kaikan Bldg. |
[Invited Talk]
Midori: A Block Cipher for Low Energy Subhadeep Banik, Andrey Bogdanov (DTU), Takanori Isobe, Kyoji Shibutani, Harunaga Hiwatari, Toru Akishita (Sony), Francesco Regazzoni (USI) ISEC2016-10 |
[more] |
ISEC2016-10 p.45 |
ISEC |
2016-05-19 16:00 |
Tokyo |
Kikai-Shinko-Kaikan Bldg. |
[Invited Talk]
How Secure is AES Under Leakage Andrey Bogdanov (DTU), Takanori Isobe (Sony) ISEC2016-11 |
[more] |
ISEC2016-11 p.47 |
ISEC |
2016-05-19 16:30 |
Tokyo |
Kikai-Shinko-Kaikan Bldg. |
[Invited Talk]
Refinements of the k-tree Algorithm for the Generalized Birthday Problem Yu Sasaki (NTT) ISEC2016-12 |
In this invited talk, we introduce the lecture with the same title presented at the international cryptographic conferen... [more] |
ISEC2016-12 p.49 |