Fri, May 18 AM 09:45 - 11:50 |
(1) |
09:45-10:10 |
The 128-bit Blockcipher CLEFIA |
Taizo Shirai, Kyoji Shibutani, Toru Akishita, Shiho Moriai (Sony), Tetsu Iwata (Nagoya Univ.) |
(2) |
10:10-10:35 |
Some experiments on the mini-model of the pseudorandom number generator MUGI |
Dai Watanabe (Hitachi), Toshinobu Kaneko (Tokyo University of Science) |
(3) |
10:35-11:00 |
Correction of "Test for the Longest Run of Ones in a Block" Included in NIST Randomness Test Suite |
Kenji Hamano (The Univ. of Tokyo) |
(4) |
11:00-11:25 |
A Fast (4,n)-Threshold Secret Sharing Scheme Using Exclusive-OR Operations, and Its Extension to (k,n)-Threshold Schemes |
Jun Kurihara, Shinsaku Kiyomoto, Kazuhide Fukushima, Toshiaki Tanaka (KDDI R&D Labs.) |
(5) |
11:25-11:50 |
(k,n) Threshold Secret Sharing Schemes Using XOR Operations |
Yoshihiro Fujii (TOSHIBA SOLUTIONS), Kouya Tochikubo (Nihon Univ.), Norikazu Hosaka, Minako Tada, Takehisa Kato (TOSHIBA SOLUTIONS) |
Fri, May 18 PM 12:50 - 17:15 |
(6) |
12:50-13:15 |
Birthday Paradox for Multi-Collisions |
Kazuhiro Suzuki (Ibaraki Univ.), Dongvu Tonien (Uni.y of Wollongong), Kaoru Kurosawa, Koji Toyota (Ibaraki Univ.) |
(7) |
13:15-13:40 |
Security of delegating decryption key in ID-based Encryption Scheme |
Hirokazu Ougi |
(8) |
13:40-14:05 |
Efficient ID-Based Signature without Random Oracle |
Jiageng Chen, Atsuko Miyaji (JAIST) |
(9) |
14:05-14:30 |
Consideration on security of digital signatures from the view of Paillier's framework |
Yutaka Kawai, Kazuo Ohta, Noboru Kunihiro (UEC) |
(10) |
14:30-14:55 |
consideration of quantum Oblivious Transfer |
Atsushi Waseda (NICT), Takayuki Takagi, Masakazu Soshi, Atsuko Miyaji (JAIST) |
|
14:55-15:10 |
Break ( 15 min. ) |
(11) |
15:10-15:35 |
A multiplication formula on degenerate divisors of genus 4 hyperelliptic curves |
Naoki Kanayama, Takehiro Yamaguchi, Takeshi Okamoto, Eiji Okamoto (Tsukuba Univ.) |
(12) |
15:35-16:00 |
Visual Cryptography Schemes with Cyclic Structure for Many Images |
Miyuki Uno, Mikio Kano (Ibaraki Univ.) |
(13) |
16:00-16:25 |
A Study on Spam-mail Filtering Based on Cooperation of Users and Providers |
Takashi Koike (Yahoo), Naoshi Sato (IISEC) |
(14) |
16:25-16:50 |
On Onewayness of Key-Scheduling Algorithms for eSTREAM's Ciphers |
Yoshiaki Fujikawa, Toshihiro Ohigashi, Hidenori Kuwakado, Masakatu Morii (Kobe Univ.) |
(15) |
16:50-17:15 |
On Equivalent Keys of Stream Ciphers |
Ryoichi Teramura, Takanori Isobe, Toshihiro Ohigashi, Hidenori Kuwakado, Masakatu Morii (Kobe Univ.) |