Committee |
Date Time |
Place |
Paper Title / Authors |
Abstract |
Paper # |
ISEC |
2010-09-10 10:45 |
Tokyo |
Kikai-Shinko-Kaikan Bldg. |
Electro Magnetic Analysis and Local Information of Cryptographic Hardware - part 2 - Hidekazu Morita, Tsutomu Matsumoto, Yoshio Takahashi, Junji Shikata (Yokohama National Univ.) ISEC2010-38 |
[more] |
ISEC2010-38 pp.1-8 |
ISEC |
2010-09-10 11:10 |
Tokyo |
Kikai-Shinko-Kaikan Bldg. |
On the Security of the Algebraic Surface Signature Scheme Koichi Sakumoto, Taizo Shirai, Harunaga Hiwatari (Sony) ISEC2010-39 |
ASS-CC proposed by Komano et al. the first signature scheme that is based on hardness of a section finding problem (SFP)... [more] |
ISEC2010-39 pp.9-12 |
ISEC |
2010-09-10 11:35 |
Tokyo |
Kikai-Shinko-Kaikan Bldg. |
Elliptic Net Based Ate Pairing And Its Variants Naoki Ogura (Tokyo Metropolitan Univ.), Naoki Kanayama (Univ. of Tsukuba), Shigenori Uchiyama (Tokyo Metropolitan Univ.), Eiji Okamoto (Univ. of Tsukuba) ISEC2010-40 |
[more] |
ISEC2010-40 pp.13-19 |
ISEC |
2010-09-10 13:00 |
Tokyo |
Kikai-Shinko-Kaikan Bldg. |
A Construction of New Class of Knapsack-Type Public Key Cryptosystem, K(I)ΣPKC, Constructed Based on K(I)Scheme Masao Kasahara (Osaka Gakuin Univ.) ISEC2010-41 |
The present author previously proposed a new scheme of strengthening a wide class of PKC's, referred to as K(I)Scheme.
... [more] |
ISEC2010-41 pp.21-25 |
ISEC |
2010-09-10 13:25 |
Tokyo |
Kikai-Shinko-Kaikan Bldg. |
A Construction of New Class of Knapsack-Type Public Key Cryptosystem, K(II)ΣPKC Masao Kasahara (Osaka Gakuin Univ.) ISEC2010-42 |
In this paper, we present a new class of knapsack type PKC referred to as K(II)$\Sigma$PKC.
In a sharp contrast with th... [more] |
ISEC2010-42 pp.27-30 |
ISEC |
2010-09-10 13:50 |
Tokyo |
Kikai-Shinko-Kaikan Bldg. |
A Knapsack Cryptosystem Using Addition and Subtraction for Encryption Kunikatsu Kobayashi (Yamagata Univ.), Kotaro Honda (Alpha Systems) ISEC2010-43 |
We propose a knapsack cryptosystem using addition and subtraction for encryption. Super increasing sequences which are u... [more] |
ISEC2010-43 pp.31-34 |
ISEC |
2010-09-10 14:15 |
Tokyo |
Kikai-Shinko-Kaikan Bldg. |
On the Extension of Rank Attacks to MPKC Masahito Gotaishi, Shigeo Tsujii (Chuo Univ.) ISEC2010-44 |
A variant of Rank Attack which is applicable to the Complementary STS is discussed. The Complementary
STS is a variant ... [more] |
ISEC2010-44 pp.35-40 |
ISEC |
2010-09-10 14:40 |
Tokyo |
Kikai-Shinko-Kaikan Bldg. |
Cryptanalysis of Double-Layer Square Masahito Gotaishi (Chuo Univ.) ISEC2010-45 |
[more] |
ISEC2010-45 pp.41-45 |
ISEC |
2010-09-10 15:20 |
Tokyo |
Kikai-Shinko-Kaikan Bldg. |
A Proposal of dot drawing CAPTCHA Shinichirou Horie, Toshiyuki Kinoshita (TUT) ISEC2010-46 |
For CAPTCHA technique, deformed characters are traditionally used, however this method is becoming broken by BOT (comput... [more] |
ISEC2010-46 pp.47-52 |
ISEC |
2010-09-10 15:45 |
Tokyo |
Kikai-Shinko-Kaikan Bldg. |
A study on strengthening of the tactile information used in Undercover challenge & response authentication Sun Shifeng, Yuki Fuji, Takahiro Sakai, Takumi Yamamoto, Masakatsu Nishigaki (Shizuoka Univ.) ISEC2010-47 |
Nowadays passwords information could be stolen by shoulder-surfing attack with peeping and/or remote video camera etc. C... [more] |
ISEC2010-47 pp.53-60 |
ISEC |
2010-09-10 16:10 |
Tokyo |
Kikai-Shinko-Kaikan Bldg. |
Watermarking-Based Method for Image Authentication and Image Recovery Jose Antonio Mendoza Noriega, Brian M. Kurkoski (Univ. of Electro-Comm.), Mariko Nakano Miyatake (IPN) ISEC2010-48 |
In this paper an image authentication algorithm is proposed where the modified areas in an image are detected, in additi... [more] |
ISEC2010-48 pp.61-65 |
ISEC |
2010-09-10 16:35 |
Tokyo |
Kikai-Shinko-Kaikan Bldg. |
A general construction method of visual secret sharing scheme with share rotations Mitsugu Iwamoto, Yang Li, Kazuo Sakiyama, Kazuo Ohta (Univ. of Electro-Comm.) ISEC2010-49 |
In this paper, we discuss a visual secret sharing scheme with multiple secret images including share rotation operations... [more] |
ISEC2010-49 pp.67-74 |