IEICE Technical Committee Submission System
Conference Schedule
Online Proceedings
[Sign in]
Tech. Rep. Archives
    [Japanese] / [English] 
( Committee/Place/Topics  ) --Press->
 
( Paper Keywords:  /  Column:Title Auth. Affi. Abst. Keyword ) --Press->

Technical Committee on Information Security (ISEC)  (Searched in: 2008)

Search Results: Keywords 'from:2008-05-16 to:2008-05-16'

[Go to Official ISEC Homepage (Japanese)] 
Search Results: Conference Papers
 Conference Papers (Available on Advance Programs)  (Sort by: Date Ascending)
 Results 1 - 15 of 15  /   
Committee Date Time Place Paper Title / Authors Abstract Paper #
ISEC 2008-05-16
09:30
Tokyo Kikai-Shinko-Kaikan Bldg. Verification of a side-channel attack to an AES circuit on SASEBO
Daisaku Minamizaki, Keisuke Iwai, Takakazu Kurokawa (NDA) ISEC2008-1
Recently, the research on the side-channel attack is actively done, and SASEBO board that conformed to the INSTAC32 was ... [more] ISEC2008-1
pp.1-8
ISEC 2008-05-16
09:55
Tokyo Kikai-Shinko-Kaikan Bldg. An implementation of an automatic analyzer for side channel attacks
Keisuke Iwai, Daisaku Minamizaki, Takakazu Kurokawa (NDA) ISEC2008-2
Recently, environments for experiments of side-channel attacks are being developed. On the other hand, there is not enou... [more] ISEC2008-2
pp.9-14
ISEC 2008-05-16
10:20
Tokyo Kikai-Shinko-Kaikan Bldg. New Impossible Differentials of CLEFIA
Etsuko Tsujihara (YDK), Maki Shigeri (NEC Software Hokuriku), Tomoyasu Suzaki (NEC), Takeshi Kawabata (NEC Software Hokuriku), Yukiyasu Tsunoo (NEC) ISEC2008-3
This paper reports impossible differential cryptanalysis on the 128-bit block cipher CLEFIA that was proposed in 2007. T... [more] ISEC2008-3
pp.15-22
ISEC 2008-05-16
10:45
Tokyo Kikai-Shinko-Kaikan Bldg. A New Randomness Test Based on All the Autocorrelation Values
Kenji Hamano, Hirosuke Yamamoto (Tokyo Univ.) ISEC2008-4
Discrete Fourier transform test (dft test) included in the NIST randomness test suite, and autocorrelation test included... [more] ISEC2008-4
pp.23-30
ISEC 2008-05-16
11:10
Tokyo Kikai-Shinko-Kaikan Bldg. Coalition Resistant Ternary Subset Difference Method
Kazuhide Fukushima, Shinsaku Kiyomoto, Toshiaki Tanaka (KDDI Labs.), Kouichi Sakurai (Kyushu Univ.) ISEC2008-5
 [more] ISEC2008-5
pp.31-38
ISEC 2008-05-16
11:35
Tokyo Kikai-Shinko-Kaikan Bldg. A Consideration on k-Clique Problem and Graph k-Colorability
Kunikatsu Kobayashi (Yamagata Univ.) ISEC2008-6
We examine the solutions of $k$-clique problem and graph $k$-colorability.We propose the polynomial time algorithms of $... [more] ISEC2008-6
pp.39-42
ISEC 2008-05-16
13:00
Tokyo Kikai-Shinko-Kaikan Bldg. Reconsideration of Algorithmic Tamper Proof Devices using PIN (part 2)
Yuichi Komano (Toshiba), Kazuo Ohta (UEC), Hideyuki Miyake, Atsushi Shimbo (Toshiba) ISEC2008-7
Gennaro et al.~discussed the algorithmic tamper proof (ATP) devices using the personal identification number (PIN); and ... [more] ISEC2008-7
pp.43-48
ISEC 2008-05-16
13:25
Tokyo Kikai-Shinko-Kaikan Bldg. A method to reduce false positive of Anomaly Detection System
Yuka Ikebe, Takehiro Nakayama, Masaji Katagiri (NTT DoCoMo), Satoshi Kawasaki (Univ. of Tsukuba), Hirotake Abe (Toyohashi Univ. of Technology), Takahiro Shinagawa, Kazuhiko Kato (Univ. of Tsukuba) ISEC2008-8
We proposed a new anomaly detection system. In this system, software behavior that deviates from a model representing no... [more] ISEC2008-8
pp.49-56
ISEC 2008-05-16
13:50
Tokyo Kikai-Shinko-Kaikan Bldg. On the Construction of the Set-Intersection Protocols from Blind Signatures
Ryo Nojima (NICT), Youki Kadobayashi (NAIST) ISEC2008-9
In this paper, we propose a simple and efficient two-party set-intersection protocol. Contrary to the previous protocols... [more] ISEC2008-9
pp.57-60
ISEC 2008-05-16
14:15
Tokyo Kikai-Shinko-Kaikan Bldg. A Fully Secure Attribute-Based Group Signature Scheme and its Application in an Anonymous Survey for Collection of Attribute Statistics
Keita Emura, Atsuko Miyaji (JAIST) ISEC2008-10
Recently,
many cryptographic schemes based on user's attributes are proposed, e.g., Attribute-Based Group Signature (A... [more]
ISEC2008-10
pp.61-68
ISEC 2008-05-16
14:40
Tokyo Kikai-Shinko-Kaikan Bldg. A Study on Higher Order Differnce Operation for Elliptic Curve Scalar Multiplication Using Path Table
Tomoko K. Matsushima, Yoshitaka Sagara, Osamu Ashihara (Polytechnic Univ.) ISEC2008-11
Efficient elliptic curve arithmetic is crucial for cryptosystems based on elliptic curves. Such cryptosystems often requ... [more] ISEC2008-11
pp.69-76
ISEC 2008-05-16
15:20
Tokyo Kikai-Shinko-Kaikan Bldg. Integrating Fingerprint and Cryptosystem for Internet-Based Live Pay-TV System
Shuhui Hou, Tetsutaro Uehara (Kyoto Univ.), Takashi Satoh (Univ. of Kitakyushu), Yoshitaka Morimura, Michihiko Minoh (Kyoto Univ.) ISEC2008-12
In the last few years, live pay-TV system via internet has come to be established with the development of broadband netw... [more] ISEC2008-12
pp.77-84
ISEC 2008-05-16
15:45
Tokyo Kikai-Shinko-Kaikan Bldg. New Classes of Public Key Cryptosystem Constructed on the Basis of Multivariate Polynomials and Error Control Coding
Masao Kasahara (OGU) ISEC2008-13
Extensive studies have been made of the public key cryptosystems based on multivariate polynomials over $\mathbb{F}_{2}$... [more] ISEC2008-13
pp.85-90
ISEC 2008-05-16
16:10
Tokyo Kikai-Shinko-Kaikan Bldg. Hybrid Encryption Scheme in IBE with Applications to Data Storage
Hirokazu Ougi (free) ISEC2008-14
 [more] ISEC2008-14
pp.91-98
ISEC 2008-05-16
16:35
Tokyo Kikai-Shinko-Kaikan Bldg. Strongly Unforgeable ID-based Signatures Without Random Oracles
Chifumi Sato (C4 Technology), Takeshi Okamoto, Eiji Okamoto (Univ. of Tsukuba) ISEC2008-15
There is an open problem to construct ID-based signature schemes which satisfy strongly EUF-ID-CMA, without random oracl... [more] ISEC2008-15
pp.99-106
 Results 1 - 15 of 15  /   
Choose a download format for default settings. [NEW !!]
Text format pLaTeX format CSV format BibTeX format
Copyright and reproduction : All rights are reserved and no part of this publication may be reproduced or transmitted in any form or by any means, electronic or mechanical, including photocopy, recording, or any information storage and retrieval system, without permission in writing from the publisher. Notwithstanding, instructors are permitted to photocopy isolated articles for noncommercial classroom use without fee. (License No.: 10GA0019/12GB0052/13GB0056/17GB0034/18GB0034)


[Return to Top Page]

[Return to IEICE Web Page]


The Institute of Electronics, Information and Communication Engineers (IEICE), Japan