Committee |
Date Time |
Place |
Paper Title / Authors |
Abstract |
Paper # |
ISEC, LOIS |
2004-11-08 13:30 |
Osaka |
Osaka Univ. |
A twist technique based on third power residue and non residue Yoshito Hidaka, Mayumi Obara, Yasuyuki Nogami, Yoshitaka Morikawa (Okayama Univ.) |
In this paper, we propose a twist technique based on third power residue and non residue. In addition,with the conventio... [more] |
ISEC2004-78 OIS2004-45 pp.1-6 |
ISEC, LOIS |
2004-11-08 13:55 |
Osaka |
Osaka Univ. |
A Reconfigurable Dual-Field Multiplier for GF(P) and GF(2n) Ryo Namba, Masaru Takesue (Hosei Univ) |
This paper proposes a dual-field multiplier for the cryptographic system on GF(P) and GF(2^n) both with multiple key-siz... [more] |
ISEC2004-79 OIS2004-46 pp.7-12 |
ISEC, LOIS |
2004-11-08 14:20 |
Osaka |
Osaka Univ. |
An Algebraic Surface Public-key Cryptosystem Koichiro Akiyama (TOSHIBA), Yasuhiro Goto (Hokkaido Univ. of Edu.) |
In this paper, we propose a new type of public-key cryptosystem whose security is based on a section finding problem of ... [more] |
ISEC2004-80 OIS2004-47 pp.13-20 |
ISEC, LOIS |
2004-11-08 14:45 |
Osaka |
Osaka Univ. |
A Construction of Public-Key Crptosystem Based on Algebraic Coding and Random Coding Techniques over F2m Masao Kasahara (Osaka Gakuin Univ.) |
[more] |
ISEC2004-81 OIS2004-48 pp.21-26 |
ISEC, LOIS |
2004-11-08 15:30 |
Osaka |
Osaka Univ. |
A Group Signature Scheme with Membership Revocation for Large Groups Fumiaki Kubooka, Toru Nakanishi, Nobuo Funabiki (Okayama Univ.) |
Some group signature schemes with membership revocation were proposed.
In a scheme using an accumulator, the computatio... [more] |
ISEC2004-82 OIS2004-49 pp.27-34 |
ISEC, LOIS |
2004-11-08 15:55 |
Osaka |
Osaka Univ. |
A Threshold Cryptosystem Based on the Paillier's Encryption Takeru Ishihara, Hiroshi Aono, Sadayuki Hongo (NTT DoCoMo), Junji Shikata (Yokohama National univ.) |
The threshold cryptosystem is a threshold distributed version of the
public key cryptosystem.
The threshold cryptosyst... [more] |
ISEC2004-83 OIS2004-50 pp.35-41 |
ISEC, LOIS |
2004-11-08 16:20 |
Osaka |
Osaka Univ. |
How to improve the insecurity of Canetti-Goldreich-Halevi public-key cryptosystems Yoshinari Kobayashi (Chuo Univ.), Shigeo Tsujii (IISEC) |
[more] |
ISEC2004-84 OIS2004-51 pp.43-48 |
ISEC, LOIS |
2004-11-09 09:00 |
Osaka |
Osaka Univ. |
Implentation mechanisms of scalable event-ordering system without single point of attack Eiichi Horita, Satoshi Ono, Hidetaka Ishimoto (NTT) |
[more] |
ISEC2004-85 OIS2004-52 pp.1-8 |
ISEC, LOIS |
2004-11-09 09:25 |
Osaka |
Osaka Univ. |
Time-stamping systems ensuring long term validity based on event-ordering systems Hidetaka Ishimoto, Satoshi Ono, Eiichi Horita (NTT) |
[more] |
ISEC2004-86 OIS2004-53 pp.9-14 |
ISEC, LOIS |
2004-11-09 09:50 |
Osaka |
Osaka Univ. |
A Formal Method for finding the Lowest Cost Attack on Cryptographic Protocols Takane Umayama, Maki Yoshida, Toru Fujiwara (Osaka Univ.) |
Various cryptographic protocols are proposed for providing secure services on computer network. Some cryptographic proto... [more] |
ISEC2004-87 OIS2004-54 pp.15-22 |
ISEC, LOIS |
2004-11-09 10:15 |
Osaka |
Osaka Univ. |
Transformation-Free Proxy Cryptosystems with Limited Authorization Lihua Wang (Tsukuba Univ.), Zhenfu Cao (Shanghai Jiao Tong Univ.), Eiji Okamoto, Ying Miao, Takeshi Okamoto (Tsukuba Univ.) |
In this paper transformation-free proxy cryptosystems with limited
authorization (TFP systems) are studied. The TFP sys... [more] |
ISEC2004-88 OIS2004-55 pp.23-28 |
ISEC, LOIS |
2004-11-09 10:55 |
Osaka |
Osaka Univ. |
One-Time Key Type Authentication Scheme for P2P Service Youji Fukuta (The Univ. of Tokushima), Takumi Hosoya, Yoshiaki Shiraishi (Kinki Univ.), Masakatu Morii (The Univ. of Tokushima) |
In P2P service, there is the case a user would not like to register his/her secret information such as password, because... [more] |
ISEC2004-89 OIS2004-56 pp.29-36 |
ISEC, LOIS |
2004-11-09 11:20 |
Osaka |
Osaka Univ. |
Access Control by Service Connector with Single Sign-On Function Youji Fukuta (The Univ. of Tokushima), Takehito Ninomiya, Yoshiaki Shiraishi (Kinki Univ.), Masakatu Morii (The Univ. of Tokushima) |
In operation of server-hosts in client-server model, allowing to connect to general public is a frequent cause of frauds... [more] |
ISEC2004-90 OIS2004-57 pp.37-43 |
ISEC, LOIS |
2004-11-09 11:45 |
Osaka |
Osaka Univ. |
A study of competition and diffusion of IP phone services Naoki Mizutani (Nara Sangyo Univ.) |
It is a rational way for IP phone users to choose the best phone network
considering which network other users join,
... [more] |
ISEC2004-91 OIS2004-58 pp.45-50 |
ISEC, LOIS |
2004-11-09 13:25 |
Osaka |
Osaka Univ. |
Virtual Transmission Monitoring System for Behavior Analysis of Virus Toshihiko Hirooka (The Univ. of Tokushima), Yoshiaki Shiraishi (Kinki Univ.), Masakatu Morii (The Univ. of Tokushima), Yuji Hoshizawa (Secure Brain), Koji Nakao (KDDI) |
The resarch of virus such as detection of virus, or behavior analysis of virus is active. It is difficult to know the be... [more] |
ISEC2004-92 OIS2004-59 pp.51-56 |
ISEC, LOIS |
2004-11-09 13:50 |
Osaka |
Osaka Univ. |
On Constructing the Illegal Code Detecting System on Memory for Virus Analysis Sachihiro Ichikawa, Masaki Kamizono (Univ. of Tokushima), Yoshiaki Shiraishi (Kinki Univ.), Masakatu Morii (Univ. of Tokushima) |
[more] |
ISEC2004-93 OIS2004-60 pp.57-62 |
ISEC, LOIS |
2004-11-09 14:15 |
Osaka |
Osaka Univ. |
Design of Damage Prediction System By Event Dependent Model for Illegal Access Ryoji Hasui (The Univ. of Tokushima), Yoshiaki Shiraishi (Kinki Univ.), Masakatu Morii (The Univ. of Tokushima) |
[more] |
ISEC2004-94 OIS2004-61 pp.63-68 |
ISEC, LOIS |
2004-11-09 14:55 |
Osaka |
Osaka Univ. |
A Software Vulnerability Management System for Server Farm by Using Digital Certificates Motomu Nishikawa, Takeshi Okuda, Suguru Yamaguchi (NAIST) |
In a server farm, application servers are connected to the LAN through
switches. In this case, if one server has a vul... [more] |
ISEC2004-95 OIS2004-62 pp.69-76 |
ISEC, LOIS |
2004-11-09 15:20 |
Osaka |
Osaka Univ. |
Internet Accounting System
-- The Development Using Model Driven Architecture -- Daisuke Horinoue, Kenji Ohmori (Hosei Univ.) |
[more] |
ISEC2004-96 OIS2004-63 pp.77-84 |
ISEC, LOIS |
2004-11-09 15:45 |
Osaka |
Osaka Univ. |
Complexity of the Chabaud-Joux Attack on SHA-0 with Different Message Schedules Mitsuhiro Hattori, Shoichi Hirose, Susumu Yoshida (Kyoto Univ.) |
SHA-0 employs a primitive polynomial of degree 16 over GF(2) in its message scheduling. There are 2048 primitive polynom... [more] |
ISEC2004-97 OIS2004-64 pp.85-91 |