Committee |
Date Time |
Place |
Paper Title / Authors |
Abstract |
Paper # |
ISEC |
2006-12-13 09:55 |
Tokyo |
Kikai-Shinko-Kaikan Bldg. |
Autocorrelation Test of Binary Sequence for Cryptographic Applications Yuichi Takeda, Mituaki Huzii, Toshinari Kamakura, Norio Watanabe, Takakazu Sugiyama (Chuo Univ.) |
[more] |
ISEC2006-101 pp.1-3 |
ISEC |
2006-12-13 10:20 |
Tokyo |
Kikai-Shinko-Kaikan Bldg. |
Improved collision attack on Reduced Versions of Tiger Hirotaka Yoshida, Dai Watanabe (HITACHI), Bart Preneel (Leuven Univ.) |
[more] |
ISEC2006-102 pp.5-10 |
ISEC |
2006-12-13 10:45 |
Tokyo |
Kikai-Shinko-Kaikan Bldg. |
On Formalization of Concurrent General Composition of Witness Indistinguishability Hirofumi Muratani (Toshiba) |
[more] |
ISEC2006-103 pp.11-16 |
ISEC |
2006-12-13 11:10 |
Tokyo |
Kikai-Shinko-Kaikan Bldg. |
ID-based Encryption Scheme with Two Dimensional Hierarchical Structure Based on the l-BDHE Assumption Kousuke Miyashita, Wataru Kishimoto (Chiba Univ.) |
[more] |
ISEC2006-104 pp.17-23 |
ISEC |
2006-12-13 12:55 |
Tokyo |
Kikai-Shinko-Kaikan Bldg. |
Key Generation Schemes for the ID base Public Key Cyrptosystems. Ryuichi Sakai (Osaka Electro-Comm Univ.) |
[more] |
ISEC2006-105 pp.25-28 |
ISEC |
2006-12-13 13:20 |
Tokyo |
Kikai-Shinko-Kaikan Bldg. |
Proposal for an improvement of computing Twisted Ate pairing Seiichi Matsuda, Naoki Kanayama, Takeshi Okamoto, Eiji Okamoto (Tsukuba Univ.) |
[more] |
ISEC2006-106 pp.29-34 |
ISEC |
2006-12-13 13:45 |
Tokyo |
Kikai-Shinko-Kaikan Bldg. |
A note on digital signature using knapsack public key cryptosystem Hiraku Sugawara (I.N.C.T. Advanced Course), Tsutomu Ansai (I.N.C.T) |
[more] |
ISEC2006-107 pp.35-39 |
ISEC |
2006-12-13 14:10 |
Tokyo |
Kikai-Shinko-Kaikan Bldg. |
On experimental study on the application of point tripling formulas for elliplic curve cryptosystems Kazuya Okamoto, Akira Hayashi (KIT) |
[more] |
ISEC2006-108 pp.41-45 |
ISEC |
2006-12-13 14:35 |
Tokyo |
Kikai-Shinko-Kaikan Bldg. |
A Proposal of a Group Siganture Scheme with Membership Revocation Using Prime Numbers and its Implementation Naoto Hamada, Takuya Nakayama, Toru Nakanishi, Nobuo Funabiki (Okayama Univ.) |
Group signature schemes with membership revocation have been intensively researched. In this paper, we propose a new gro... [more] |
ISEC2006-109 pp.47-54 |
ISEC |
2006-12-13 15:15 |
Tokyo |
Kikai-Shinko-Kaikan Bldg. |
Visual Cryptography Schemes with Dihedral Group Access Structure for Many Images Miyuki Uno, Mikio Kano (Ibaraki Univ.) |
[more] |
ISEC2006-110 pp.55-62 |
ISEC |
2006-12-13 15:40 |
Tokyo |
Kikai-Shinko-Kaikan Bldg. |
A Technique to Distinguish the New Software using the Exection File Information Chikako Ishizawa, Makoto Nishida (Akita University) |
[more] |
ISEC2006-111 pp.63-66 |
ISEC |
2006-12-13 16:05 |
Tokyo |
Kikai-Shinko-Kaikan Bldg. |
A Study of Identifier Naming Conventions Suitable for User Authentication Megumi Nogita, Yoshiaki Kasahara, Eisuke Itoh, Takahiko Suzuki (Kyushu Univ) |
[more] |
ISEC2006-112 pp.67-72 |
ISEC |
2006-12-13 16:30 |
Tokyo |
Kikai-Shinko-Kaikan Bldg. |
A Fixed IV Value Independent Key Recovery Attack against WEP Yoshiaki Fujikawa, Toshihiro Ohigashi, Hidenori Kuwakado, Masakatu Morii (Kobe Univ.) |
[more] |
ISEC2006-113 pp.73-79 |
ISEC |
2006-12-13 16:55 |
Tokyo |
Kikai-Shinko-Kaikan Bldg. |
A Practical Key Recovery Attack Against Py Takanori Isobe, Toshihiro Ohigashi, Hidenori Kuwakado, Masakatu Morii (Kobe Univ.) |
[more] |
ISEC2006-114 pp.81-87 |