Wed, Nov 21 PM ISEC 14:15 - 15:30 |
(1) |
14:15-14:40 |
How to Extract AES Key from Smart Card by Fault Injection Attack Using Electromaginetic Irradiataion |
Yuu Tsuchiya, Takeshi Kishikawa, Shohei Saito, Tsuyoshi Toyama (YNU), Akihiko Sasaki (MORITA TECH), Akashi Satoh (VDEC, Univ. Tokyo), Tsutomu Matsumoto (YNU) |
(2) |
14:40-15:05 |
Lightweight Hashing Mode Using Lesamnta-LW Compression Function and MDP Domain Extension |
Asraf Akhimullah, Shoichi Hirose (Fukui Univ.), Emi Matsuyama (SAKAI ELCOM) |
(3) |
15:05-15:30 |
Secure multiplication algorithm based on secret sharing |
Ryota Nakada, Takayuki Nakachi (NTT) |
|
15:30-15:45 |
Break ( 15 min. ) |
Wed, Nov 21 PM LOIS 15:45 - 17:00 |
(4) |
15:45-16:10 |
Implementation and Evaluation of MashMap Framework for Visualizing Location-based Lifelog |
Kohei Takahashi, Shinsuke Matsumoto, Masahide Nakamura (Kobe Univ.) |
(5) |
16:10-16:35 |
Implementing API of Large-scale House Log Data Platform in Smart City |
Shintaro Yamamoto, Kohei Takahashi, Shinsuke Matsumoto, Masahide Nakamura (Kobe Univ.) |
(6) |
16:35-17:00 |
A study of the human resource allocation on the cooperation system of life support services |
Mizue Hayashi (NTT), Yoshiyuki Mihara (NTT WEST), Atsushi Nakadaira, Manabu Okamoto, Takefumi Yamazaki, Atsushi Sato (NTT) |
Thu, Nov 22 AM ISEC 10:45 - 12:00 |
(7) |
10:45-11:10 |
A Web Service Implementation of Anonymous Attributes Authentication System for CNF Formulas |
Yuji Hamada, Toru Nakanishi, Kan Watanabe, Nobuo Funabiki (Okayama Univ.) |
(8) |
11:10-11:35 |
A classification method of application traffic in encrypted tunnel using SVM |
Nguyen Thanh Tuan, Yasuhiro Nakamura (NDA) |
(9) |
11:35-12:00 |
Proposal on Concept of Encrypted State Processing at Semantic Layerbased on Logic
-- Toward Realization of Confidentiality Preserving Retrieval and Creation of Answer by Natural Language -- |
Shigeo Tsujii, Hiroshi Yamaguchi (Chuo- U), Tetsuya Morizumi (Nettsu) |
|
12:00-13:15 |
Lunch ( 75 min. ) |
Thu, Nov 22 LOIS 13:15 - 14:05 |
(10) |
13:15-13:40 |
Secret sharing using the Chinese remainder theorem and its application |
Toshio Tsuji, Masao Kasahara (Osaka Gakuin Univ.) |
(11) |
13:40-14:05 |
A Study on Visualization of Business Process Flow of Information Transfer Network System (My Number System) Using BPMN |
Chikahiro Miyokawa, Takashi Obi, Kazushige Fujita, Masuyoshi Yachida, Joong Sun Lee, Tetsuya Natsume, Naoko Taira, Eikazu Niwano, Makoto Kumakura, Yoshiaki Iwamaru, Nagaaki Ohyama (Tokyo Tech) |
|
14:05-14:20 |
Break ( 15 min. ) |
Thu, Nov 22 ISEC 14:20 - 16:00 |
(12) |
14:20-14:45 |
Efficient elliptic curve exponentiation using DBNS with improved the Greedy algorithm for DBNS |
Yoshio Kawamo, Atsuko Miyaji (JAIST) |
(13) |
14:45-15:10 |
A New Explicit Relation between Trace, Definition Field, and Embedding Degree |
Atsuko Miyaji, Xiaonan Shi (JAIST) |
(14) |
15:10-15:35 |
A note on subgroup decision problem and pairing inversion problem |
Naoki Kanayama (Univ. of Tsukuba), Shigenori Uchiyama (Tokyo Metro. Univ.), Eiji Okamoto (Univ. of Tsukuba) |
(15) |
15:35-16:00 |
Parallelized Gauss sieve algorithm for solving the shortest vector problem in lattices |
Tsukasa Ishiguro, Shinsaku Kiyomoto, Yutaka Miyake (KDDI R&D Labs), Tsuyoshi Takagi (Kyushu Univ) |