|
Chair |
|
Kazuo Takaragi (Hitachi) |
Vice Chair |
|
Toru Fujiwara (Osaka Univ.), Naoya Torii (Fujitsu Labs.) |
Secretary |
|
Noboru Kunihiro (Univ. of Tokyo), Katsuyuki Takashima (Mitsubishi Electric) |
Assistant |
|
Toru Nakanishi (Okayama Univ.) |
|
Conference Date |
Fri, May 21, 2010 13:00 - 17:35 |
Topics |
|
Conference Place |
Kikai-Shinko-Kaikan Bldg. |
Address |
3-5-8, Shiba-kouen, Minato-ku, Tokyo, 105-0011 Japan |
Transportation Guide |
8 min. walk from Kamiya-cho Sta. on Subway Hibiya Line or 10 min. walk from Daimon Sta. both on Subway Asakusa Line and on Oedo Line http://www.jspmi.or.jp/kaikan.htm |
Fri, May 21 PM 13:00 - 17:35 |
(1) |
13:00-13:25 |
The Suggestion of Corrected Non-overlapping Template Matching Test |
Yuichi Takeda (KAIT), Mituaki Huzii, Toshinari Kamakura, Norio Watanabe, Takakazu Sugiyama (Chuo Univ.) |
(2) |
13:25-13:50 |
Side-Channel Analysis and Countermeasures of Stream Cipher K2 |
Matt Henricksen, Wun-she Yap, Chee-hoo Yian (I2R), Yuto Nakano, Kazuhide Fukushima, Shinsaku Kiyomoto, Toshiaki Tanaka (KDDI Labs.) |
(3) |
13:50-14:15 |
A Study on Non Linear Function and cryptanalysis of K2 |
Takashi Ohshima, Munetoshi Iwakiri (NDA) |
(4) |
14:15-14:40 |
Comparing with feature of quantum stream cipher Y-00 and CPPM
-- Cipher with randomization of chiphertext -- |
Masaki Sohma, Osamu Hirota (Tamagawa Univ.) |
|
14:40-14:55 |
Break ( 15 min. ) |
(5) |
14:55-15:20 |
Formal verification method for Dynamic Segregation of Duties which is based Functional Role |
Michinobu Ochi, Satoshi Ono (Kogakuin Univ.) |
(6) |
15:20-15:45 |
An Improvement of Attribute-based Encryption |
Hiroki Kunitake, Masahiro Mambo, Eiji Okamoto (Tsukuba Univ.) |
|
15:45-16:20 |
Break ( 35 min. ) |
(7) |
16:20-16:45 |
New Class of Public Key Cryptosystems Constructed Based on Error-Correcting Codes, Using K(III) Scheme
-- Appendix: Proposal of K(IX)SE(g)PKC -- |
Masao Kasahara (Osaka Gakuin Univ.) |
(8) |
16:45-17:10 |
Consideration of Surface in Algebraic Surface Cryptosystems |
Yuichi Komano, Koichiro Akiyama, Yoshikazu Hanatani, Hideyuki Miyake (Toshiba), Yasuhiro Goto (Hokkaido Univ. of Edu.) |
(9) |
17:10-17:35 |
Applying Numerical Analysis Technique To Prime Factorization |
Masaaki Shirase (FUN) |
Announcement for Speakers |
General Talk | Each speech will have 20 minutes for presentation and 5 minutes for discussion. |
Contact Address and Latest Schedule Information |
ISEC |
Technical Committee on Information Security (ISEC) [Latest Schedule]
|
Contact Address |
Toru Nakanishi (Okayama University)
TEL +81-86-251-8249, FAX +81-86-251-8255
E-: ic-c (to ISEC secretaries) |
Last modified: 2010-05-07 09:58:24
|