IEICE Technical Committee Submission System
Conference Schedule
Online Proceedings
[Sign in]
Tech. Rep. Archives
    [Japanese] / [English] 
( Committee/Place/Topics  ) --Press->
 
( Paper Keywords:  /  Column:Title Auth. Affi. Abst. Keyword ) --Press->

All Technical Committee Conferences  (Searched in: All Years)

Search Results: Conference Papers
 Conference Papers (Available on Advance Programs)  (Sort by: Date Descending)
 Results 21 - 34 of 34 [Previous]  /   
Committee Date Time Place Paper Title / Authors Abstract Paper #
ISEC 2006-09-13
17:00
Tokyo Kikai-Shinko-Kaikan Bldg. Unconditional Security of Key Establishment System Using a Variable Directional Antenna
Kirill Morozov, Kazukuni Kobara (AIST), Hideki Imai (Chuo Univ.)
 [more] ISEC2006-87
pp.111-118
ISEC, SITE, IPSJ-CSEC 2006-07-21
13:00
Okayama Okayama Univ. Hierarchical Key Assignment for Efficient Public-Key Black-Box Tracing against Self-Defensive Pirates
Tatsuyuki Matsushita (Toshiba Corp.), Hideki Imai (Chuo Univ., AIST)
We propose a hierarchical key-assignment method by which the transmission overhead in a public-key black-box tracing sch... [more] ISEC2006-52
pp.91-98
ISEC, SITE, IPSJ-CSEC 2006-07-21
13:50
Okayama Okayama Univ. An Efficient Anonymous Password-Authenticated Key Exchange Protocol
SeongHan Shin, Kazukuni Kobara (AIST), Hideki Imai (AIST/Chuo Univ.)
Recently, Viet et al., \cite{VYT05} have proposed an anonymous
password-authenticated key exchange (PAKE) protocol agai... [more]
ISEC2006-54
pp.107-114
ISEC, IPSJ-CSEC, SITE 2005-07-22
10:20
Iwate Iwate Prefectural University Efficient N-Party Password-based Authenticated Key Exchange Protocol
SeongHan Shin, Kazukuni Kobara, Hideki Imai (Univ. of Tokyo)
In this paper, we propose an efficient N-party
password-authenticated key exchange (so-called {\sf N-PAKE})
protocol a... [more]
ISEC2005-45
pp.17-23
ISEC, IPSJ-CSEC, SITE 2005-07-22
10:45
Iwate Iwate Prefectural University Relations Among Notions of Security for Identity Based Encryption Schemes
Peng Yang (Univ. of Tokyo), Goichiro Hanaoka (AIST/Univ. of Tokyo), Yang Cui, Rui Zhang, Nuttapong Attrapadung, Kanta Matsuura (Univ. of Tokyo), Hideki Imai (Univ. of Tokyo/AIST)
We prove the equivalences among indistinguishability, semantic security and non-malleability under adaptive chosen ident... [more] ISEC2005-46
pp.25-32
ISEC, IPSJ-CSEC, SITE 2005-07-22
13:00
Iwate Iwate Prefectural University Critical cryptoanalysis for Y-00
Kentaro Imafuku (AIST), Hideki Imai (Tokyo Univ.), Tsuyoshi Nishioka, Toshio Hasegawa, Hirokazu Ishizuka (Melco)
 [more] ISEC2005-54
pp.81-87
IT 2005-05-27
13:30
Overseas Univ. of Hawaii A Remark On GEM
Rui Zhang, Goichiro Hanaoka, Hideki Imai (Univ. of Tokyo)
 [more] IT2005-28
pp.35-40
IT 2005-05-27
14:10
Overseas Univ. of Hawaii Efficient Strong Multiple Encryption from Relaxed Conditions
Yang Cui, Kazukuni Kobara, Hideki Imai (Univ. of Tokyo)
Security of communication systems could be enhanced by multiple
encryption has been noted by Shannon's pioneering work,... [more]
IT2005-30
pp.47-51
IT 2005-05-27
14:50
Overseas Univ. of Hawaii A Novel Approach to Algebraic and Fast Correlation Attacks for Cryptanalysis of Certain Keystream Generators
Miodrag Mihaljevic (Serb.Acad.Sci&Arts), Marc Fossorier (Univ. of Hawaii), Hideki Imai (Univ. of Tokyo)
 [more] IT2005-32
pp.59-64
ISEC 2004-09-17
15:40
Tokyo Kikai-Shinko-Kaikan Bldg. Trade-off Traitor Tracing
Goichiro Hanaoka (U. of Tokyo), Kazuto Ogawa, Arisa Fujii, Go Ohtake, Keigo Majima, Kimiyuki Oyamada (NHK), Hideki Imai (U. of Tokyo)
 [more] ISEC2004-73
pp.39-46
ISEC 2004-09-17
17:20
Tokyo Kikai-Shinko-Kaikan Bldg. ID-based Encryption for Directed Acyclic Graph Hierarchies and Applications to Key-evolving Encryption Primitives
Nuttapong Attrapadung, Goichiro Hanaoka, Kazukuni Kobara, Hideki Imai (Tokyo Univ.)
 [more] ISEC2004-77
pp.69-76
ISEC, IPSJ-CSEC 2004-07-20
14:45
Tokushima Tokushima Univ. A Secure Traitor Tracing Scheme against Key Exposure
Kazuto Ogawa, Arisa Fujii, Go Ohtake (NHK), Goichiro Hanaoka, Hideki Imai (U. of Tokyo), Keigo Majima, Kimiyuki Oyamada (NHK)
Copyright protection is a major issue in distributing content on the Internet. One well-known method of protecting copyr... [more] ISEC2004-35
pp.151-158
ISEC, IPSJ-CSEC 2004-07-21
14:30
Tokushima Tokushima Univ. Unconditionally Secure Polynomial Evaluation And Its Application To Electronic Voting
Akira Otsuka (IPA), Hideki Imai (Univ. of Tokyo)
 [more] ISEC2004-63
pp.157-164
ISEC, IPSJ-CSEC 2004-07-21
15:10
Tokushima Tokushima Univ. Refrehshable Tokens with Optional Linkability
Rie Shigetomi (Univ. of Tokyo), Akira Otsuka (IPA), Keith Martin (Royal Holloway), Hideki Imai (Univ. of Tokyo)
As more services are provided digitally and digital service providers collect more information about users, potential pr... [more] ISEC2004-64
pp.165-172
 Results 21 - 34 of 34 [Previous]  /   
Choose a download format for default settings. [NEW !!]
Text format pLaTeX format CSV format BibTeX format


[Return to Top Page]

[Return to IEICE Web Page]


The Institute of Electronics, Information and Communication Engineers (IEICE), Japan