IEICE Technical Committee Submission System
Conference Schedule
Online Proceedings
[Sign in]
Tech. Rep. Archives
    [Japanese] / [English] 
( Committee/Place/Topics  ) --Press->
 
( Paper Keywords:  /  Column:Title Auth. Affi. Abst. Keyword ) --Press->

Technical Committee on Information Security (ISEC)  (Searched in: 2014)

Search Results: Keywords 'from:2014-05-09 to:2014-05-09'

[Go to Official ISEC Homepage (Japanese)] 
Search Results: Conference Papers
 Conference Papers (Available on Advance Programs)  (Sort by: Date Ascending)
 Results 1 - 9 of 9  /   
Committee Date Time Place Paper Title / Authors Abstract Paper #
ISEC 2014-05-09
13:10
Tokyo Kikai-Shinko-Kaikan Bldg. A New Class of Public Key Cryptosystems Constructed Based on Reed-Solomon Codes K(XV)SE(1)PKC
Masao Kasahara (Waseda Univ./Chuo Univ.) ISEC2014-1
In this paper, we present a new class of public key cryptosystem over F2m based on Reed-Solomon codes,referred to as K(X... [more] ISEC2014-1
pp.1-5
ISEC 2014-05-09
13:35
Tokyo Kikai-Shinko-Kaikan Bldg. An Interorganizational Cryptosystem Using RSA PKC
Yasuyuki Murakami (OECU), Masao Kasahara (Waseda Univ./Chuo Univ.) ISEC2014-2
Usual cryptosystems suppose the personal communication.
However, the secure and effecitive communication system
is des... [more]
ISEC2014-2
pp.7-12
ISEC 2014-05-09
14:00
Tokyo Kikai-Shinko-Kaikan Bldg. New Negative Biases in Long-Term Glimpse of RC4
Ryoma Ito, Atsuko Miyaji (JAIST) ISEC2014-3
RC4 stream cipher was designed by Ron Rivest in 1987 and is widely used for protocol, such as SSL/TLS, WEP, WPA and more... [more] ISEC2014-3
pp.13-19
ISEC 2014-05-09
14:40
Tokyo Kikai-Shinko-Kaikan Bldg. A Study of IDS using Discrete Fourier Transform
Enkhbold Chimedtseren, Keisuke Iwai, Hidema Tanaka, Takakazu Kurokawa (NDA) ISEC2014-4
Intrusion Detection System (IDS) detects an attack with an identifying pattern file which is known as called a signature... [more] ISEC2014-4
pp.21-27
ISEC 2014-05-09
15:05
Tokyo Kikai-Shinko-Kaikan Bldg. Verification of secure cloud quantum computing
Tomoyuki Morimae (Gunma Univ.) ISEC2014-5
 [more] ISEC2014-5
pp.29-34
ISEC 2014-05-09
15:30
Tokyo Kikai-Shinko-Kaikan Bldg. A Robust DWT Watermarking for Image using Quantized Domain Based on q-logarithm Function
Ta Minh Thanh (Titech), Ta Minh Tam (VSTV) ISEC2014-6
In this paper, we propose a novel and robust discrete wavelet transformation (DWT) watermarking for image using quantize... [more] ISEC2014-6
pp.35-42
ISEC 2014-05-09
16:10
Tokyo Kikai-Shinko-Kaikan Bldg. A Report on ASIACRYPT2013
Kazuki Yoneyama (NTT) ISEC2014-7
 [more] ISEC2014-7
pp.43-46
ISEC 2014-05-09
16:35
Tokyo Kikai-Shinko-Kaikan Bldg. [Invited Talk] Generic Key Recovery Attack on Feistel Scheme
Takanori Isobe, Kyoji Shibutani (Sony) ISEC2014-8
 [more] ISEC2014-8
p.47
ISEC 2014-05-09
17:05
Tokyo Kikai-Shinko-Kaikan Bldg. [Invited Talk] Limited-Birthday Distinguishers for Hash Functions -- Collisions beyond the Birthday Bound Can Be Meaningful --
Mitsugu Iwamoto (UEC), Yu Sasaki (NTT) ISEC2014-9
In this talk, we explain the paper, with the same title of this talk, appeared at the international cryptographic confer... [more] ISEC2014-9
p.49
 Results 1 - 9 of 9  /   
Choose a download format for default settings. [NEW !!]
Text format pLaTeX format CSV format BibTeX format
Copyright and reproduction : All rights are reserved and no part of this publication may be reproduced or transmitted in any form or by any means, electronic or mechanical, including photocopy, recording, or any information storage and retrieval system, without permission in writing from the publisher. Notwithstanding, instructors are permitted to photocopy isolated articles for noncommercial classroom use without fee. (License No.: 10GA0019/12GB0052/13GB0056/17GB0034/18GB0034)


[Return to Top Page]

[Return to IEICE Web Page]


The Institute of Electronics, Information and Communication Engineers (IEICE), Japan