IEICE Technical Committee Submission System
Conference Schedule
Online Proceedings
[Sign in]
Tech. Rep. Archives
    [Japanese] / [English] 
( Committee/Place/Topics  ) --Press->
 
( Paper Keywords:  /  Column:Title Auth. Affi. Abst. Keyword ) --Press->

Technical Committee on Information Security (ISEC)  (Searched in: 2009)

Search Results: Keywords 'from:2009-05-22 to:2009-05-22'

[Go to Official ISEC Homepage (Japanese)] 
Search Results: Conference Papers
 Conference Papers (Available on Advance Programs)  (Sort by: Date Ascending)
 Results 1 - 14 of 14  /   
Committee Date Time Place Paper Title / Authors Abstract Paper #
ISEC 2009-05-22
09:55
Tokyo Kikai-Shinko-Kaikan Bldg. A random number generation by Logistic Map -- To generate and manage the identification number --
Jiguo Dong (Univ. of Electro-Comm.) ISEC2009-1
We propose generation and the management method of random number sequence($R_i$) of n(for example: $128$) bit. Pseudo-ra... [more] ISEC2009-1
pp.1-7
ISEC 2009-05-22
10:20
Tokyo Kikai-Shinko-Kaikan Bldg. Corrected Non-overlapping Template Matching Test
Yuichi Takeda (Kanagawa Inst. of Tech.), Mituaki Huzii, Toshinari Kamakura, Norio Watanabe, Takakazu Sugiyama (Chuo Univ.) ISEC2009-2
 [more] ISEC2009-2
pp.9-12
ISEC 2009-05-22
10:45
Tokyo Kikai-Shinko-Kaikan Bldg. Estimation of CPA attack for AES using Simulation method
Kimihiro Yamakoshi, Akihiro Yamagishi (NTT) ISEC2009-3
(To be available after the conference date) [more] ISEC2009-3
pp.13-20
ISEC 2009-05-22
11:10
Tokyo Kikai-Shinko-Kaikan Bldg. Generalized Zero-offset Power Analyses for Restricted Masking Scheme
Yuichi Komano, Hideo Shimizu, Hanae Nozaki, Atsushi Shimbo (Toshiba Corp.) ISEC2009-4
 [more] ISEC2009-4
pp.21-28
ISEC 2009-05-22
11:35
Tokyo Kikai-Shinko-Kaikan Bldg. A Novel Construction Method for Visual Secret Sharing Schemes Allowing Rotation of Shares
Yang Li, Mitsugu Iwamoto, Kazuo Ohta, Kazuo Sakiyama (Univ. of Electro-Comm.) ISEC2009-5
In 2006, Iwamoto et al. introduced a visual secret sharing (VSS) schemes that allows rotation operation for shares in de... [more] ISEC2009-5
pp.29-36
ISEC 2009-05-22
13:00
Tokyo Kikai-Shinko-Kaikan Bldg. An Implementation of a Group Signature Scheme with Efficient Verifier-Local Revocation Check
Amang Sudarsono, Toru Nakanishi, Yumi Sakemi, Yasuyuki Nogami, Nobuo Funabiki (Okayama Univ.) ISEC2009-6
A group signature scheme with efficient verifier-local revocation check has been proposed. This scheme provides a more e... [more] ISEC2009-6
pp.37-42
ISEC 2009-05-22
13:25
Tokyo Kikai-Shinko-Kaikan Bldg. Joint Sparse Forms with Twelve Precomputed Points
Katsuyuki Okeya (Hitachi) ISEC2009-7
 [more] ISEC2009-7
pp.43-50
ISEC 2009-05-22
13:50
Tokyo Kikai-Shinko-Kaikan Bldg. A Consideration on Generating Ordinary Pairing Friendly Curve of Composite Order That Has Two Large Prime Factors
Kazushi Nishii, Yumi Sakemi, Yasuyuki Nogami, Yoshitaka Morikawa (Okayama Univ.) ISEC2009-8
Recently, pairing-based cryptographic applications such as ID-basedcryptography have received muchattention.
On the ot... [more]
ISEC2009-8
pp.51-54
ISEC 2009-05-22
14:15
Tokyo Kikai-Shinko-Kaikan Bldg. An Improvement of Cyclic Vector Multiplication Algorithm based on Gauss period Normal Basis
Erika Yanagi, Kenta Nekado, Yasuyuki Nogami, Yoshitaka Morikawa (Okayama Univ.) ISEC2009-9
This paper first introduces cyclic vector multiplication algorithm (CVMA) that is a multiplication algorithm with Gauss ... [more] ISEC2009-9
pp.55-60
ISEC 2009-05-22
14:40
Tokyo Kikai-Shinko-Kaikan Bldg. Another Experimental Security Analysis of OTU2000 through Attacks Based on Lattice Theory
Daewoo Kim, Masahiro Mambo, Eiji Okamoto (Univ. of Tsukuba.) ISEC2009-10
OTU 2000 was proposed as a quantum cyrptosystem which may not be broken even if quantum computers are constructed. In th... [more] ISEC2009-10
pp.61-68
ISEC 2009-05-22
15:20
Tokyo Kikai-Shinko-Kaikan Bldg. A Pairing-based Group Key Exchange with an Edge-based Tree
Atsuko Miyaji (JAIST), Yvo Desmedt (Univ. College London) ISEC2009-11
 [more] ISEC2009-11
pp.69-76
ISEC 2009-05-22
15:45
Tokyo Kikai-Shinko-Kaikan Bldg. Digital Signature Using Knapsack Problem
Kunikatsu Kobayashi (Yamagata Univ.), Kotaro Honda (α systems) ISEC2009-12
We propose a digital signature using the knapsack problem. The security of this digital signature is based on the diffic... [more] ISEC2009-12
pp.77-80
ISEC 2009-05-22
16:10
Tokyo Kikai-Shinko-Kaikan Bldg. New Classes of Product-Sum Type Public Key Cryptosystems and Fuzzy Vault Scheme Constructed Based on Error-Correcting Codes
Masao Kasahara (Osaka Gakuin Univ.) ISEC2009-13
In this paper, in Part I, we propose a new method for constructing the public-key cryptosystems. We propose a new class ... [more] ISEC2009-13
pp.81-87
ISEC 2009-05-22
16:35
Tokyo Kikai-Shinko-Kaikan Bldg. Cryptanalysis on 2 Dimensional Subset-sum Public Key Cryptosystem
Ryuichi Sakai (Osaka Electro-Comm Univ.) ISEC2009-14
 [more] ISEC2009-14
pp.89-92
 Results 1 - 14 of 14  /   
Choose a download format for default settings. [NEW !!]
Text format pLaTeX format CSV format BibTeX format
Copyright and reproduction : All rights are reserved and no part of this publication may be reproduced or transmitted in any form or by any means, electronic or mechanical, including photocopy, recording, or any information storage and retrieval system, without permission in writing from the publisher. Notwithstanding, instructors are permitted to photocopy isolated articles for noncommercial classroom use without fee. (License No.: 10GA0019/12GB0052/13GB0056/17GB0034/18GB0034)


[Return to Top Page]

[Return to IEICE Web Page]


The Institute of Electronics, Information and Communication Engineers (IEICE), Japan