Wed, Dec 16 PM 13:00 - 17:00 |
(1) |
13:00-13:25 |
The feedback period length of Bijective function |
Toru Ito (NETCOMSEC) |
(2) |
13:25-13:50 |
Beyond the Shannon limit by quantum stream cipher Y-00 and Holevo-Sohma-Hirota theorem
-- General proof -- |
Osamu Hirota (Tamagawa Univ.) |
(3) |
13:50-14:15 |
Constructive Codes Achieving the Secrecy Capacity of Wiretap Channels |
Mitsuru Hamada (Tamagawa Univ.) |
(4) |
14:15-14:40 |
On Viterbi search for the maximum differential characteristic probability of a cipher with certain Feistel structure |
Yasutaka Igarashi, Toshinobu Kaneko (Tokyo Univ. of Science) |
|
14:40-14:55 |
Break ( 15 min. ) |
(5) |
14:55-15:20 |
Electro Magnetic Analysis and Local Information of Cryptographic Hardware |
Hidekazu Morita, Yoshio Takahashi, Tsutomu Matsumoto, Junji Shikata (Yokohama National Univ.)) |
(6) |
15:20-15:45 |
GLV Method for Non-Supersingular Paring-Friendly Curves of Embedding Degree 1 |
Shoichi Takeuchi, Tetsuya Izuta, Yumi Sakemi, Kazushi Nishii, Yasuyuki Nogami, Yoshitaka Morikawa (Okayama Univ.) |
(7) |
15:45-16:10 |
A Construction Method of Basis Conversion Matrix by Using Small Multiplicative Group for Cryptographic Applications |
Hidehiro Kato, Yasuyuki Nogami (Okayama Univ.), Satoshi Uehara (The Univ. of Kitakyushu), Yoshitaka Morikawa (Okayama Univ.) |
(8) |
16:10-16:35 |
Improvement of the Internal Perturbation Modifier
-- An example of Perturbed Matsumoto-Imai -- |
Masahito Gotaishi, Shigeo Tsujii (Chuo Univ.) |
(9) |
16:35-17:00 |
Redesigning of a role hierarchy for role-based access control |
Yoshiharu Asakura (NEC/Univ. of Hyogo), Yukikazu Nakamoto (Univ. of Hyogo) |