IEICE Technical Report

Print edition: ISSN 0913-5685
Online edition: ISSN 2432-6380

vol. 105, no. 290

Information Security

Workshop Date : 2005-09-16 / Issue Date : 2005-09-09

[PREV] [NEXT]

[TOP] | [2006] | [2007] | [2008] | [2009] | [2010] | [2011] | [2012] | [Japanese] / [English]


ISEC2005-76
Are attacks on Y-00(Optical communication Quantum Cryptography) the true attacks? Part II
Osamu Hirota (tamagawa Univ.)
pp. 1 - 6

ISEC2005-77
Influence of Random Numbers in a DPA Data Masking Countermeasure
Hanae Nozaki, Shinichi Yasuda, Koichi Fujisaki, Atsushi Shimbo, Shinobu Fujita (Toshiba)
pp. 7 - 13

ISEC2005-78
On the collision search and the sufficient conditions of MD5
Jun Yajima, Takeshi Shimoyama (Fujitsu Lab.)
pp. 15 - 22

ISEC2005-79
A Note on Provably Secure Double-Block-Length Hash Functions in a Black-Box Model
Shoichi Hirose (Univ. of Fukui)
pp. 23 - 30

ISEC2005-80
IP Security Policy and Authentication Information Distribution Mechanism using Smart Card
Manabu Hirano (Toyota National College of Technology), Suguru Yamaguchi (Nara Institute of Science and Technology)
pp. 31 - 36

ISEC2005-81
The wide area network storage system based on secret sharing threshold scheme
Yutaka Yonamine, Hironobu Yonaha, Tomokazu Nagata, Shiro Tamaki (Ryukyu Univ.)
pp. 37 - 44

ISEC2005-82
A Construction Method of Secure Cryptographic Location-Based Services
Jun Anzai (Panasonic Mobile Communications), Tsutomu Matsumoto (YNU)
pp. 45 - 52

ISEC2005-83
Interactive Protocol for Privacy-preserving K-mean Clustering
Chunhua Su, Kouichi Sakurai (Kyushu Univ.)
pp. 53 - 60

ISEC2005-84
A New Decoding Algorithm for Secret Sharing Scheme -- Along with New Secret Sharing Scheme --
Masao Kasahara (Osaka Gakuin Univ.)
pp. 61 - 65

ISEC2005-85
Precise Tardos Bound for Fingerprinting Codes
Taichi Isogai, Hirofumi Muratani (Toshiba)
pp. 67 - 72

ISEC2005-86
Generating Short Public-Keys for Factoring Based Cryptosytems and Their Cryptanalysis
Naoki Kanayama (UEC), Shigenori Uchiyama (NTT)
pp. 73 - 77

ISEC2005-87
A privacy-enhanced group signature scheme based on a Modified Nyberg-Rueppel Signature
Kozue Umeda, Atsuko Miyaji (JAIST)
pp. 79 - 86

ISEC2005-88
A Report on The 32nd International Colloquium on Automata, Languages and Programming (ICALP2005), and The Second Workshop on Automated Reasoning for Security Protocol Analysis (ARSPA2005)
Kenji Imamoto, Kouichi Sakurai (Kyushu Univ.)
pp. 87 - 92


The Institute of Electronics, Information and Communication Engineers (IEICE), Japan