Committee |
Date Time |
Place |
Paper Title / Authors |
Abstract |
Paper # |
ISEC |
2014-05-09 13:10 |
Tokyo |
Kikai-Shinko-Kaikan Bldg. |
A New Class of Public Key Cryptosystems Constructed Based on Reed-Solomon Codes K(XV)SE(1)PKC Masao Kasahara (Waseda Univ./Chuo Univ.) ISEC2014-1 |
In this paper, we present a new class of public key cryptosystem over F2m based on Reed-Solomon codes,referred to as K(X... [more] |
ISEC2014-1 pp.1-5 |
ISEC |
2014-05-09 13:35 |
Tokyo |
Kikai-Shinko-Kaikan Bldg. |
An Interorganizational Cryptosystem Using RSA PKC Yasuyuki Murakami (OECU), Masao Kasahara (Waseda Univ./Chuo Univ.) ISEC2014-2 |
Usual cryptosystems suppose the personal communication.
However, the secure and effecitive communication system
is des... [more] |
ISEC2014-2 pp.7-12 |
ISEC |
2014-05-09 14:00 |
Tokyo |
Kikai-Shinko-Kaikan Bldg. |
New Negative Biases in Long-Term Glimpse of RC4 Ryoma Ito, Atsuko Miyaji (JAIST) ISEC2014-3 |
RC4 stream cipher was designed by Ron Rivest in 1987 and is widely used for protocol, such as SSL/TLS, WEP, WPA and more... [more] |
ISEC2014-3 pp.13-19 |
ISEC |
2014-05-09 14:40 |
Tokyo |
Kikai-Shinko-Kaikan Bldg. |
A Study of IDS using Discrete Fourier Transform Enkhbold Chimedtseren, Keisuke Iwai, Hidema Tanaka, Takakazu Kurokawa (NDA) ISEC2014-4 |
Intrusion Detection System (IDS) detects an attack with an identifying pattern file which is known as called a signature... [more] |
ISEC2014-4 pp.21-27 |
ISEC |
2014-05-09 15:05 |
Tokyo |
Kikai-Shinko-Kaikan Bldg. |
Verification of secure cloud quantum computing Tomoyuki Morimae (Gunma Univ.) ISEC2014-5 |
[more] |
ISEC2014-5 pp.29-34 |
ISEC |
2014-05-09 15:30 |
Tokyo |
Kikai-Shinko-Kaikan Bldg. |
A Robust DWT Watermarking for Image using Quantized Domain Based on q-logarithm Function Ta Minh Thanh (Titech), Ta Minh Tam (VSTV) ISEC2014-6 |
In this paper, we propose a novel and robust discrete wavelet transformation (DWT) watermarking for image using quantize... [more] |
ISEC2014-6 pp.35-42 |
ISEC |
2014-05-09 16:10 |
Tokyo |
Kikai-Shinko-Kaikan Bldg. |
A Report on ASIACRYPT2013 Kazuki Yoneyama (NTT) ISEC2014-7 |
[more] |
ISEC2014-7 pp.43-46 |
ISEC |
2014-05-09 16:35 |
Tokyo |
Kikai-Shinko-Kaikan Bldg. |
[Invited Talk]
Generic Key Recovery Attack on Feistel Scheme Takanori Isobe, Kyoji Shibutani (Sony) ISEC2014-8 |
[more] |
ISEC2014-8 p.47 |
ISEC |
2014-05-09 17:05 |
Tokyo |
Kikai-Shinko-Kaikan Bldg. |
[Invited Talk]
Limited-Birthday Distinguishers for Hash Functions
-- Collisions beyond the Birthday Bound Can Be Meaningful -- Mitsugu Iwamoto (UEC), Yu Sasaki (NTT) ISEC2014-9 |
In this talk, we explain the paper, with the same title of this talk, appeared at the international cryptographic confer... [more] |
ISEC2014-9 p.49 |