|
|
All Technical Committee Conferences (Searched in: All Years)
|
|
Search Results: Conference Papers |
Conference Papers (Available on Advance Programs) (Sort by: Date Descending) |
|
Committee |
Date Time |
Place |
Paper Title / Authors |
Abstract |
Paper # |
ISEC |
2006-09-13 17:00 |
Tokyo |
Kikai-Shinko-Kaikan Bldg. |
Unconditional Security of Key Establishment System Using a Variable Directional Antenna Kirill Morozov, Kazukuni Kobara (AIST), Hideki Imai (Chuo Univ.) |
[more] |
ISEC2006-87 pp.111-118 |
ISEC, SITE, IPSJ-CSEC |
2006-07-21 13:00 |
Okayama |
Okayama Univ. |
Hierarchical Key Assignment for Efficient Public-Key Black-Box Tracing against Self-Defensive Pirates Tatsuyuki Matsushita (Toshiba Corp.), Hideki Imai (Chuo Univ., AIST) |
We propose a hierarchical key-assignment method by which the transmission overhead in a public-key black-box tracing sch... [more] |
ISEC2006-52 pp.91-98 |
ISEC, SITE, IPSJ-CSEC |
2006-07-21 13:50 |
Okayama |
Okayama Univ. |
An Efficient Anonymous Password-Authenticated Key Exchange Protocol SeongHan Shin, Kazukuni Kobara (AIST), Hideki Imai (AIST/Chuo Univ.) |
Recently, Viet et al., \cite{VYT05} have proposed an anonymous
password-authenticated key exchange (PAKE) protocol agai... [more] |
ISEC2006-54 pp.107-114 |
ISEC, IPSJ-CSEC, SITE |
2005-07-22 10:20 |
Iwate |
Iwate Prefectural University |
Efficient N-Party Password-based Authenticated Key Exchange Protocol SeongHan Shin, Kazukuni Kobara, Hideki Imai (Univ. of Tokyo) |
In this paper, we propose an efficient N-party
password-authenticated key exchange (so-called {\sf N-PAKE})
protocol a... [more] |
ISEC2005-45 pp.17-23 |
ISEC, IPSJ-CSEC, SITE |
2005-07-22 10:45 |
Iwate |
Iwate Prefectural University |
Relations Among Notions of Security for Identity Based Encryption Schemes Peng Yang (Univ. of Tokyo), Goichiro Hanaoka (AIST/Univ. of Tokyo), Yang Cui, Rui Zhang, Nuttapong Attrapadung, Kanta Matsuura (Univ. of Tokyo), Hideki Imai (Univ. of Tokyo/AIST) |
We prove the equivalences among indistinguishability, semantic security and non-malleability under adaptive chosen ident... [more] |
ISEC2005-46 pp.25-32 |
ISEC, IPSJ-CSEC, SITE |
2005-07-22 13:00 |
Iwate |
Iwate Prefectural University |
Critical cryptoanalysis for Y-00 Kentaro Imafuku (AIST), Hideki Imai (Tokyo Univ.), Tsuyoshi Nishioka, Toshio Hasegawa, Hirokazu Ishizuka (Melco) |
[more] |
ISEC2005-54 pp.81-87 |
IT |
2005-05-27 13:30 |
Overseas |
Univ. of Hawaii |
A Remark On GEM Rui Zhang, Goichiro Hanaoka, Hideki Imai (Univ. of Tokyo) |
[more] |
IT2005-28 pp.35-40 |
IT |
2005-05-27 14:10 |
Overseas |
Univ. of Hawaii |
Efficient Strong Multiple Encryption from Relaxed Conditions Yang Cui, Kazukuni Kobara, Hideki Imai (Univ. of Tokyo) |
Security of communication systems could be enhanced by multiple
encryption has been noted by Shannon's pioneering work,... [more] |
IT2005-30 pp.47-51 |
IT |
2005-05-27 14:50 |
Overseas |
Univ. of Hawaii |
A Novel Approach to Algebraic and Fast Correlation Attacks for Cryptanalysis of Certain Keystream Generators Miodrag Mihaljevic (Serb.Acad.Sci&Arts), Marc Fossorier (Univ. of Hawaii), Hideki Imai (Univ. of Tokyo) |
[more] |
IT2005-32 pp.59-64 |
ISEC |
2004-09-17 15:40 |
Tokyo |
Kikai-Shinko-Kaikan Bldg. |
Trade-off Traitor Tracing Goichiro Hanaoka (U. of Tokyo), Kazuto Ogawa, Arisa Fujii, Go Ohtake, Keigo Majima, Kimiyuki Oyamada (NHK), Hideki Imai (U. of Tokyo) |
[more] |
ISEC2004-73 pp.39-46 |
ISEC |
2004-09-17 17:20 |
Tokyo |
Kikai-Shinko-Kaikan Bldg. |
ID-based Encryption for Directed Acyclic Graph Hierarchies and Applications to Key-evolving Encryption Primitives Nuttapong Attrapadung, Goichiro Hanaoka, Kazukuni Kobara, Hideki Imai (Tokyo Univ.) |
[more] |
ISEC2004-77 pp.69-76 |
ISEC, IPSJ-CSEC |
2004-07-20 14:45 |
Tokushima |
Tokushima Univ. |
A Secure Traitor Tracing Scheme against Key Exposure Kazuto Ogawa, Arisa Fujii, Go Ohtake (NHK), Goichiro Hanaoka, Hideki Imai (U. of Tokyo), Keigo Majima, Kimiyuki Oyamada (NHK) |
Copyright protection is a major issue in distributing content on the Internet. One well-known method of protecting copyr... [more] |
ISEC2004-35 pp.151-158 |
ISEC, IPSJ-CSEC |
2004-07-21 14:30 |
Tokushima |
Tokushima Univ. |
Unconditionally Secure Polynomial Evaluation And Its Application To Electronic Voting Akira Otsuka (IPA), Hideki Imai (Univ. of Tokyo) |
[more] |
ISEC2004-63 pp.157-164 |
ISEC, IPSJ-CSEC |
2004-07-21 15:10 |
Tokushima |
Tokushima Univ. |
Refrehshable Tokens with Optional Linkability Rie Shigetomi (Univ. of Tokyo), Akira Otsuka (IPA), Keith Martin (Royal Holloway), Hideki Imai (Univ. of Tokyo) |
As more services are provided digitally and digital service providers collect more information about users, potential pr... [more] |
ISEC2004-64 pp.165-172 |
|
|
|
[Return to Top Page]
[Return to IEICE Web Page]
|