Committee |
Date Time |
Place |
Paper Title / Authors |
Abstract |
Paper # |
ISEC |
2008-05-16 09:30 |
Tokyo |
Kikai-Shinko-Kaikan Bldg. |
Verification of a side-channel attack to an AES circuit on SASEBO Daisaku Minamizaki, Keisuke Iwai, Takakazu Kurokawa (NDA) ISEC2008-1 |
Recently, the research on the side-channel attack is actively done, and SASEBO board that conformed to the INSTAC32 was ... [more] |
ISEC2008-1 pp.1-8 |
ISEC |
2008-05-16 09:55 |
Tokyo |
Kikai-Shinko-Kaikan Bldg. |
An implementation of an automatic analyzer for side channel attacks Keisuke Iwai, Daisaku Minamizaki, Takakazu Kurokawa (NDA) ISEC2008-2 |
Recently, environments for experiments of side-channel attacks are being developed. On the other hand, there is not enou... [more] |
ISEC2008-2 pp.9-14 |
ISEC |
2008-05-16 10:20 |
Tokyo |
Kikai-Shinko-Kaikan Bldg. |
New Impossible Differentials of CLEFIA Etsuko Tsujihara (YDK), Maki Shigeri (NEC Software Hokuriku), Tomoyasu Suzaki (NEC), Takeshi Kawabata (NEC Software Hokuriku), Yukiyasu Tsunoo (NEC) ISEC2008-3 |
This paper reports impossible differential cryptanalysis on the 128-bit block cipher CLEFIA that was proposed in 2007. T... [more] |
ISEC2008-3 pp.15-22 |
ISEC |
2008-05-16 10:45 |
Tokyo |
Kikai-Shinko-Kaikan Bldg. |
A New Randomness Test Based on All the Autocorrelation Values Kenji Hamano, Hirosuke Yamamoto (Tokyo Univ.) ISEC2008-4 |
Discrete Fourier transform test (dft test) included in the NIST randomness test suite, and autocorrelation test included... [more] |
ISEC2008-4 pp.23-30 |
ISEC |
2008-05-16 11:10 |
Tokyo |
Kikai-Shinko-Kaikan Bldg. |
Coalition Resistant Ternary Subset Difference Method Kazuhide Fukushima, Shinsaku Kiyomoto, Toshiaki Tanaka (KDDI Labs.), Kouichi Sakurai (Kyushu Univ.) ISEC2008-5 |
[more] |
ISEC2008-5 pp.31-38 |
ISEC |
2008-05-16 11:35 |
Tokyo |
Kikai-Shinko-Kaikan Bldg. |
A Consideration on k-Clique Problem and Graph k-Colorability Kunikatsu Kobayashi (Yamagata Univ.) ISEC2008-6 |
We examine the solutions of $k$-clique problem and graph $k$-colorability.We propose the polynomial time algorithms of $... [more] |
ISEC2008-6 pp.39-42 |
ISEC |
2008-05-16 13:00 |
Tokyo |
Kikai-Shinko-Kaikan Bldg. |
Reconsideration of Algorithmic Tamper Proof Devices using PIN (part 2) Yuichi Komano (Toshiba), Kazuo Ohta (UEC), Hideyuki Miyake, Atsushi Shimbo (Toshiba) ISEC2008-7 |
Gennaro et al.~discussed the algorithmic tamper proof (ATP) devices using the personal identification number (PIN); and ... [more] |
ISEC2008-7 pp.43-48 |
ISEC |
2008-05-16 13:25 |
Tokyo |
Kikai-Shinko-Kaikan Bldg. |
A method to reduce false positive of Anomaly Detection System Yuka Ikebe, Takehiro Nakayama, Masaji Katagiri (NTT DoCoMo), Satoshi Kawasaki (Univ. of Tsukuba), Hirotake Abe (Toyohashi Univ. of Technology), Takahiro Shinagawa, Kazuhiko Kato (Univ. of Tsukuba) ISEC2008-8 |
We proposed a new anomaly detection system. In this system, software behavior that deviates from a model representing no... [more] |
ISEC2008-8 pp.49-56 |
ISEC |
2008-05-16 13:50 |
Tokyo |
Kikai-Shinko-Kaikan Bldg. |
On the Construction of the Set-Intersection Protocols from Blind Signatures Ryo Nojima (NICT), Youki Kadobayashi (NAIST) ISEC2008-9 |
In this paper, we propose a simple and efficient two-party set-intersection protocol. Contrary to the previous protocols... [more] |
ISEC2008-9 pp.57-60 |
ISEC |
2008-05-16 14:15 |
Tokyo |
Kikai-Shinko-Kaikan Bldg. |
A Fully Secure Attribute-Based Group Signature Scheme and its Application in an Anonymous Survey for Collection of Attribute Statistics Keita Emura, Atsuko Miyaji (JAIST) ISEC2008-10 |
Recently,
many cryptographic schemes based on user's attributes are proposed, e.g., Attribute-Based Group Signature (A... [more] |
ISEC2008-10 pp.61-68 |
ISEC |
2008-05-16 14:40 |
Tokyo |
Kikai-Shinko-Kaikan Bldg. |
A Study on Higher Order Differnce Operation for Elliptic Curve Scalar Multiplication Using Path Table Tomoko K. Matsushima, Yoshitaka Sagara, Osamu Ashihara (Polytechnic Univ.) ISEC2008-11 |
Efficient elliptic curve arithmetic is crucial for cryptosystems based on elliptic curves. Such cryptosystems often requ... [more] |
ISEC2008-11 pp.69-76 |
ISEC |
2008-05-16 15:20 |
Tokyo |
Kikai-Shinko-Kaikan Bldg. |
Integrating Fingerprint and Cryptosystem for Internet-Based Live Pay-TV System Shuhui Hou, Tetsutaro Uehara (Kyoto Univ.), Takashi Satoh (Univ. of Kitakyushu), Yoshitaka Morimura, Michihiko Minoh (Kyoto Univ.) ISEC2008-12 |
In the last few years, live pay-TV system via internet has come to be established with the development of broadband netw... [more] |
ISEC2008-12 pp.77-84 |
ISEC |
2008-05-16 15:45 |
Tokyo |
Kikai-Shinko-Kaikan Bldg. |
New Classes of Public Key Cryptosystem Constructed on the Basis of Multivariate Polynomials and Error Control Coding Masao Kasahara (OGU) ISEC2008-13 |
Extensive studies have been made of the public key cryptosystems based on multivariate polynomials over $\mathbb{F}_{2}$... [more] |
ISEC2008-13 pp.85-90 |
ISEC |
2008-05-16 16:10 |
Tokyo |
Kikai-Shinko-Kaikan Bldg. |
Hybrid Encryption Scheme in IBE with Applications to Data Storage Hirokazu Ougi (free) ISEC2008-14 |
[more] |
ISEC2008-14 pp.91-98 |
ISEC |
2008-05-16 16:35 |
Tokyo |
Kikai-Shinko-Kaikan Bldg. |
Strongly Unforgeable ID-based Signatures Without Random Oracles Chifumi Sato (C4 Technology), Takeshi Okamoto, Eiji Okamoto (Univ. of Tsukuba) ISEC2008-15 |
There is an open problem to construct ID-based signature schemes which satisfy strongly EUF-ID-CMA, without random oracl... [more] |
ISEC2008-15 pp.99-106 |