Committee |
Date Time |
Place |
Paper Title / Authors |
Abstract |
Paper # |
ISEC |
2004-09-17 13:00 |
Tokyo |
Kikai-Shinko-Kaikan Bldg. |
Study of Security Protocol Analyzer Considering Provable Security Shinsaku Kiyomoto, Haruki Ota, Toshiaki Tanaka (KDDI Labs.) |
In this paper, we design
a security protocol analyzer to verify cryptographic security protocols. Our analyzer checks ... [more] |
ISEC2004-67 pp.1-8 |
ISEC |
2004-09-17 13:25 |
Tokyo |
Kikai-Shinko-Kaikan Bldg. |
A trial of GNFS implementation (Part VI)
-- lattice sieve -- Kazumaro Aoki, Hiroki Ueda (NTT), Yuji Kida (Rikkyo Univ.) |
The number field sieve is considered as the fastest algorithm for factoring an integer which does not include small fact... [more] |
ISEC2004-68 pp.9-14 |
ISEC |
2004-09-17 13:50 |
Tokyo |
Kikai-Shinko-Kaikan Bldg. |
A countermeasure against side channel attack using mask logic elements Hideo Shimizu (Toshiba) |
We propose the new method of realizing the mask method which is a countermeasure against side channel attack of differen... [more] |
ISEC2004-69 pp.15-20 |
ISEC |
2004-09-17 14:15 |
Tokyo |
Kikai-Shinko-Kaikan Bldg. |
Provably Secure Double Block Length Hash Functions with Rate 1/2 Shoichi Hirose (Kyoto Univ.) |
There has been no known construction of an double-block-length hash
function which is optimally collision resistant, th... [more] |
ISEC2004-70 pp.21-26 |
ISEC |
2004-09-17 14:40 |
Tokyo |
Kikai-Shinko-Kaikan Bldg. |
Action Research for Timestamp Interoperability Yo Ishigaki, Yasushi Matsumoto (SECOM IS Lab.) |
The business trend about timestamp is currently active and various services areappearing. In the near future, RFC 3161 (... [more] |
ISEC2004-71 pp.27-32 |
ISEC |
2004-09-17 15:15 |
Tokyo |
Kikai-Shinko-Kaikan Bldg. |
Improvement of Subset Difference Method Using One-way Function Mai Nakagawa (Chiva Univ) |
(To be available after the conference date) [more] |
ISEC2004-72 pp.33-38 |
ISEC |
2004-09-17 15:40 |
Tokyo |
Kikai-Shinko-Kaikan Bldg. |
Trade-off Traitor Tracing Goichiro Hanaoka (U. of Tokyo), Kazuto Ogawa, Arisa Fujii, Go Ohtake, Keigo Majima, Kimiyuki Oyamada (NHK), Hideki Imai (U. of Tokyo) |
[more] |
ISEC2004-73 pp.39-46 |
ISEC |
2004-09-17 16:05 |
Tokyo |
Kikai-Shinko-Kaikan Bldg. |
Proposal of MOCHIGOMA(Piece in Hand) Concept for Multivariate Type Public Key Cryptosystem Shigeo Tsujii (iisec), Ryou Fujita (TUS), Kohtaro Tadaki (Chuo U) |
[more] |
ISEC2004-74 pp.47-54 |
ISEC |
2004-09-17 16:30 |
Tokyo |
Kikai-Shinko-Kaikan Bldg. |
On the Security of the Full-Domain Hash variant of Chaum's Undeniable Signature schemes Yoshinari Kobayashi (Chuo Univ.), Taiichi Saito (Tokyo Denki Univ.), Shigeo Tsujii (IISEC) |
[more] |
ISEC2004-75 pp.55-60 |
ISEC |
2004-09-17 16:55 |
Tokyo |
Kikai-Shinko-Kaikan Bldg. |
New Notions of Security for Public-Key Cryptosystems with Adversarial Random Oracles (Survey) Mototsugu Nishioka (HITACHI) |
[more] |
ISEC2004-76 pp.61-68 |
ISEC |
2004-09-17 17:20 |
Tokyo |
Kikai-Shinko-Kaikan Bldg. |
ID-based Encryption for Directed Acyclic Graph Hierarchies and Applications to Key-evolving Encryption Primitives Nuttapong Attrapadung, Goichiro Hanaoka, Kazukuni Kobara, Hideki Imai (Tokyo Univ.) |
[more] |
ISEC2004-77 pp.69-76 |