Committee |
Date Time |
Place |
Paper Title / Authors |
Abstract |
Paper # |
ISEC |
2009-05-22 09:55 |
Tokyo |
Kikai-Shinko-Kaikan Bldg. |
A random number generation by Logistic Map
-- To generate and manage the identification number -- Jiguo Dong (Univ. of Electro-Comm.) ISEC2009-1 |
We propose generation and the management method of random number sequence($R_i$) of n(for example: $128$) bit. Pseudo-ra... [more] |
ISEC2009-1 pp.1-7 |
ISEC |
2009-05-22 10:20 |
Tokyo |
Kikai-Shinko-Kaikan Bldg. |
Corrected Non-overlapping Template Matching Test Yuichi Takeda (Kanagawa Inst. of Tech.), Mituaki Huzii, Toshinari Kamakura, Norio Watanabe, Takakazu Sugiyama (Chuo Univ.) ISEC2009-2 |
[more] |
ISEC2009-2 pp.9-12 |
ISEC |
2009-05-22 10:45 |
Tokyo |
Kikai-Shinko-Kaikan Bldg. |
Estimation of CPA attack for AES using Simulation method Kimihiro Yamakoshi, Akihiro Yamagishi (NTT) ISEC2009-3 |
(To be available after the conference date) [more] |
ISEC2009-3 pp.13-20 |
ISEC |
2009-05-22 11:10 |
Tokyo |
Kikai-Shinko-Kaikan Bldg. |
Generalized Zero-offset Power Analyses for Restricted Masking Scheme Yuichi Komano, Hideo Shimizu, Hanae Nozaki, Atsushi Shimbo (Toshiba Corp.) ISEC2009-4 |
[more] |
ISEC2009-4 pp.21-28 |
ISEC |
2009-05-22 11:35 |
Tokyo |
Kikai-Shinko-Kaikan Bldg. |
A Novel Construction Method for Visual Secret Sharing Schemes Allowing Rotation of Shares Yang Li, Mitsugu Iwamoto, Kazuo Ohta, Kazuo Sakiyama (Univ. of Electro-Comm.) ISEC2009-5 |
In 2006, Iwamoto et al. introduced a visual secret sharing (VSS) schemes that allows rotation operation for shares in de... [more] |
ISEC2009-5 pp.29-36 |
ISEC |
2009-05-22 13:00 |
Tokyo |
Kikai-Shinko-Kaikan Bldg. |
An Implementation of a Group Signature Scheme with Efficient Verifier-Local Revocation Check Amang Sudarsono, Toru Nakanishi, Yumi Sakemi, Yasuyuki Nogami, Nobuo Funabiki (Okayama Univ.) ISEC2009-6 |
A group signature scheme with efficient verifier-local revocation check has been proposed. This scheme provides a more e... [more] |
ISEC2009-6 pp.37-42 |
ISEC |
2009-05-22 13:25 |
Tokyo |
Kikai-Shinko-Kaikan Bldg. |
Joint Sparse Forms with Twelve Precomputed Points Katsuyuki Okeya (Hitachi) ISEC2009-7 |
[more] |
ISEC2009-7 pp.43-50 |
ISEC |
2009-05-22 13:50 |
Tokyo |
Kikai-Shinko-Kaikan Bldg. |
A Consideration on Generating Ordinary Pairing Friendly Curve of Composite Order That Has Two Large Prime Factors Kazushi Nishii, Yumi Sakemi, Yasuyuki Nogami, Yoshitaka Morikawa (Okayama Univ.) ISEC2009-8 |
Recently, pairing-based cryptographic applications such as ID-basedcryptography have received muchattention.
On the ot... [more] |
ISEC2009-8 pp.51-54 |
ISEC |
2009-05-22 14:15 |
Tokyo |
Kikai-Shinko-Kaikan Bldg. |
An Improvement of Cyclic Vector Multiplication Algorithm based on Gauss period Normal Basis Erika Yanagi, Kenta Nekado, Yasuyuki Nogami, Yoshitaka Morikawa (Okayama Univ.) ISEC2009-9 |
This paper first introduces cyclic vector multiplication algorithm (CVMA) that is a multiplication algorithm with Gauss ... [more] |
ISEC2009-9 pp.55-60 |
ISEC |
2009-05-22 14:40 |
Tokyo |
Kikai-Shinko-Kaikan Bldg. |
Another Experimental Security Analysis of OTU2000 through Attacks Based on Lattice Theory Daewoo Kim, Masahiro Mambo, Eiji Okamoto (Univ. of Tsukuba.) ISEC2009-10 |
OTU 2000 was proposed as a quantum cyrptosystem which may not be broken even if quantum computers are constructed. In th... [more] |
ISEC2009-10 pp.61-68 |
ISEC |
2009-05-22 15:20 |
Tokyo |
Kikai-Shinko-Kaikan Bldg. |
A Pairing-based Group Key Exchange with an Edge-based Tree Atsuko Miyaji (JAIST), Yvo Desmedt (Univ. College London) ISEC2009-11 |
[more] |
ISEC2009-11 pp.69-76 |
ISEC |
2009-05-22 15:45 |
Tokyo |
Kikai-Shinko-Kaikan Bldg. |
Digital Signature Using Knapsack Problem Kunikatsu Kobayashi (Yamagata Univ.), Kotaro Honda (α systems) ISEC2009-12 |
We propose a digital signature using the knapsack problem. The security of this digital signature is based on the diffic... [more] |
ISEC2009-12 pp.77-80 |
ISEC |
2009-05-22 16:10 |
Tokyo |
Kikai-Shinko-Kaikan Bldg. |
New Classes of Product-Sum Type Public Key Cryptosystems and Fuzzy Vault Scheme Constructed Based on Error-Correcting Codes Masao Kasahara (Osaka Gakuin Univ.) ISEC2009-13 |
In this paper, in Part I, we propose a new method for constructing the public-key cryptosystems. We propose a new class ... [more] |
ISEC2009-13 pp.81-87 |
ISEC |
2009-05-22 16:35 |
Tokyo |
Kikai-Shinko-Kaikan Bldg. |
Cryptanalysis on 2 Dimensional Subset-sum Public Key Cryptosystem Ryuichi Sakai (Osaka Electro-Comm Univ.) ISEC2009-14 |
[more] |
ISEC2009-14 pp.89-92 |