Committee |
Date Time |
Place |
Paper Title / Authors |
Abstract |
Paper # |
ISEC, LOIS |
2011-11-14 10:00 |
Osaka |
Osaka Electro-Communication University |
Evaluation and Improvement against a Lattice Trapdoor Function in the Alwen-Peikert Construction Yosuke Todo, Masakatu Morii (Kobe Univ.) ISEC2011-34 LOIS2011-28 |
In 2009, Peikert proposed a public-key cryptosystem that is secure against the chosen ciphertext attack. In this cryptos... [more] |
ISEC2011-34 LOIS2011-28 pp.1-6 |
ISEC, LOIS |
2011-11-14 10:25 |
Osaka |
Osaka Electro-Communication University |
A Lattice Attack against (u|u+v)ΣPKC Atsushi Nagao, Yosuke Todo, Masakatu Morii (Kobe Univ.) ISEC2011-35 LOIS2011-29 |
In 2010, Kasahara et al. proposed a knapsack cryptosystem secure against a low-density attack.
The cryptosystem were a... [more] |
ISEC2011-35 LOIS2011-29 pp.7-12 |
ISEC, LOIS |
2011-11-14 10:50 |
Osaka |
Osaka Electro-Communication University |
On the attack against Gentry's somewhat homomorphic encryption using LLL algorithm (II) Jun Yajima, Masaya Yasuda, Takeshi Shimoyama, Jun Kogure (FUJITSU LAB.) ISEC2011-36 LOIS2011-30 |
[more] |
ISEC2011-36 LOIS2011-30 pp.13-17 |
ISEC, LOIS |
2011-11-14 11:15 |
Osaka |
Osaka Electro-Communication University |
An element-selective knapsack cryptosystem with encryption multipliers Yuki Okada, Akira Hayashi (KIT) ISEC2011-37 LOIS2011-31 |
The Merkle-Hellman knapsack cryptosystem is known to be vulnerable to the low density attack by Lagarias-Odlyzko. In thi... [more] |
ISEC2011-37 LOIS2011-31 pp.19-23 |
ISEC, LOIS |
2011-11-14 12:40 |
Osaka |
Osaka Electro-Communication University |
A study on necessary location information accuracy in lifelog Hiromitsu Ueda, Yukio Rikiso (Univ. of Hyogo) ISEC2011-38 LOIS2011-32 |
Lifelog is a set of captured continuous data records of daily lives. Among those data, location information is one of th... [more] |
ISEC2011-38 LOIS2011-32 pp.25-32 |
ISEC, LOIS |
2011-11-14 13:10 |
Osaka |
Osaka Electro-Communication University |
Evaluation method for telephone conversations retrieval using precision and recall Hiroyuki Nishi, Yuuki Yokobayashi, Haiyen, Yoshimasa Kimura, Toshio Kakinoki (Sojo Univ) ISEC2011-39 LOIS2011-33 |
Telephone conversation retrieval systems are required for mail order, help desk and similar telecommunications services.... [more] |
ISEC2011-39 LOIS2011-33 pp.33-38 |
ISEC, LOIS |
2011-11-14 13:40 |
Osaka |
Osaka Electro-Communication University |
Proposal of “Knowledge Recommender” the Business-knowledge Sharing System and Rating Evaluation
-- Application for Building Energy Management Service -- Minako Toba (Hitachi, Ltd.) ISEC2011-40 LOIS2011-34 |
knowledge-recommender system, called “Knowledge Recommender,” for business-knowledge sharing is proposed. This system li... [more] |
ISEC2011-40 LOIS2011-34 pp.39-46 |
ISEC, LOIS |
2011-11-14 14:20 |
Osaka |
Osaka Electro-Communication University |
Three dimensional Dyck Path Cipher Jun Hashimoto, Akira Hayashi (KIT) ISEC2011-41 LOIS2011-35 |
The knapsack cryptosystem invented by Merkle and Hellman is known to be insecure against the low density attack of Lagar... [more] |
ISEC2011-41 LOIS2011-35 pp.47-54 |
ISEC, LOIS |
2011-11-14 14:45 |
Osaka |
Osaka Electro-Communication University |
Hidden Pair of Bijection Signature system (2)
-- Discussion of the Security -- Masahito Gotaishi, Shigeo Tsujii (Chuo Univ.) ISEC2011-42 LOIS2011-36 |
The actual parameters as well as the possibility of attack are discussed on the new MPKC signature system "Hidden Pair o... [more] |
ISEC2011-42 LOIS2011-36 pp.55-60 |
ISEC, LOIS |
2011-11-14 15:10 |
Osaka |
Osaka Electro-Communication University |
Ramp secret sharing scheme based on MBR codes Masazumi Kurihara (UEC), Hidenori Kuwakado (Kobe University) ISEC2011-43 LOIS2011-37 |
Some Ramp secret sharing system based on minimum bandwidth regenerating code(MBR code) for repairable distributed storag... [more] |
ISEC2011-43 LOIS2011-37 pp.61-68 |
ISEC, LOIS |
2011-11-14 15:35 |
Osaka |
Osaka Electro-Communication University |
Formalization and Verification of Arithmetic Algorithms by Mizar Yoshiki Aoki, Hiroyuki Okazaki, Yasunari Shidama (Shinshu Univ.) ISEC2011-44 LOIS2011-38 |
In this report, we formalize some number theoretical algorithms,
Euclidean Algorithm and Extended Euclidean Algorithm
... [more] |
ISEC2011-44 LOIS2011-38 pp.69-74 |
ISEC, LOIS |
2011-11-14 16:10 |
Osaka |
Osaka Electro-Communication University |
Designing a Filter for Internet Flow Control under Macro Dynamics
-- Towards Innovating Autonomous Network Architecture for Future Dynamics-aware Internet -- Jian-Qin Liu (NICT), Wuyi Yue (Konan Univ.), Hiroaki Umehara (NICT) ISEC2011-45 LOIS2011-39 |
The stability is one of the major aspects of the Internet flow dynamics, which greatly influence the network performance... [more] |
ISEC2011-45 LOIS2011-39 pp.75-78 |
ISEC, LOIS |
2011-11-14 16:40 |
Osaka |
Osaka Electro-Communication University |
Efficient Decoding of QR Code using Error Correcting Capability
-- Decoding Method using Erasure Error Correction and the Ability -- Keisuke Saito, Masakatu Morii (Kobe Univ.) ISEC2011-46 LOIS2011-40 |
The QR code is widely used since it is useful for the mobile phone with CCD camera. It is printed on surface of media fo... [more] |
ISEC2011-46 LOIS2011-40 pp.79-84 |
ISEC, LOIS |
2011-11-14 17:10 |
Osaka |
Osaka Electro-Communication University |
A suudy of machine learning corresponding to the change of a turn and the of the recognition object Tatsumo Hoji, Yuta Yamada, Akihiro Shimizu (Kochi Univ. of Tech.) ISEC2011-47 LOIS2011-41 |
Recently, with the spread of network cameras, video surveillance cameras has been used as a tool to improve customer ser... [more] |
ISEC2011-47 LOIS2011-41 pp.85-92 |
ISEC, LOIS |
2011-11-15 09:00 |
Osaka |
Osaka Electro-Communication University |
Proposal and Evaluation of a Secure WEP Operation against Existing Key Recovery Attacks Tsubasa Tsukaune, Yosuke Todo, Masakatu Morii (Kobe Univ.) ISEC2011-48 LOIS2011-42 |
WEP is a security protocol in a wireless LAN network, and its vulnerability has been pointed out.Many key recovering att... [more] |
ISEC2011-48 LOIS2011-42 pp.93-100 |
ISEC, LOIS |
2011-11-15 09:25 |
Osaka |
Osaka Electro-Communication University |
Fault Sensitivity Analysis Against Elliptic Curve Cryptosystems Using Clockwise Collisions Hikaru Sakamoto, Yang Li, Kazuo Ohta, Kazuo Sakiyama (Univ. of Electro-Comm.) ISEC2011-49 LOIS2011-43 |
In this paper, we propose a new fault analysis attack technique using Clockwise Collision. Generally, for the combinatio... [more] |
ISEC2011-49 LOIS2011-43 pp.101-108 |
ISEC, LOIS |
2011-11-15 09:50 |
Osaka |
Osaka Electro-Communication University |
Optimized Right-to-Left Scalar Multiplication RIP Algorithms Atsuko Miyaji, Yiren Mo (JAIST) ISEC2011-50 LOIS2011-44 |
[more] |
ISEC2011-50 LOIS2011-44 pp.109-114 |
ISEC, LOIS |
2011-11-15 10:15 |
Osaka |
Osaka Electro-Communication University |
Efficient Privacy Preserving Set Operations Atsuko Miyaji, Mohammad Rahman (JAIST) ISEC2011-51 LOIS2011-45 |
[more] |
ISEC2011-51 LOIS2011-45 pp.115-122 |
ISEC, LOIS |
2011-11-15 10:55 |
Osaka |
Osaka Electro-Communication University |
A Method to Find Vulnerable Cryptographic Algorithms in SSH Protocol Satoshi Hara (UEC), Kenichiro Muto, Sakae Chikara, Yoshiaki Seki (NTT) ISEC2011-52 LOIS2011-46 |
Secure Shell (SSH), a network protocol for secure data communication between two networked computers that connects via a... [more] |
ISEC2011-52 LOIS2011-46 pp.123-128 |
ISEC, LOIS |
2011-11-15 11:25 |
Osaka |
Osaka Electro-Communication University |
Secure and Effective Password Management System Ryo Hirano, Masakatu Morii (Kobe Univ.) ISEC2011-53 LOIS2011-47 |
Secure authentication schemes are being widely investigated
in order to avoid many risks on the internet. It is
necess... [more] |
ISEC2011-53 LOIS2011-47 pp.129-134 |