Wed, Dec 19 AM 09:30 - 12:00 |
(1) |
09:30-09:55 |
Tests of Random Number and Autocorrelation Test for Cryptographic Applications |
Yuichi Takeda (KAIT), Mituaki Huzii, Toshinari Kamakura, Norio Watanabe, Takakazu Sugiyama (Chuo Univ.) |
(2) |
09:55-10:20 |
Verification of DPA against XOR in hardware implementation of AES |
Yohei Tsuji, Keisuke Iwai, Takakazu Kurokawa (NDA) |
(3) |
10:20-10:45 |
How to design tables for power-analyses resistance of Table-network-based FPGA implementations of AES |
Makoto Torikoshi, Yoshio Takahashi, Tsutomu Matsumoto (Yokohama National Univ.) |
(4) |
10:45-11:10 |
An Integration Method of Incomplete Cryptographic System and Spread Spectrum Encoder |
Ta Minh Thanh, Munetoshi Iwakiri (NDA) |
(5) |
11:10-11:35 |
An Applied Method of AES algorithm to Incomplete Cryptographic System. |
Ta Minh Thanh, Munetoshi Iwakiri (NDA) |
(6) |
11:35-12:00 |
A Study on Quantitative Evaluation Method of System Security |
Daisakuk Horie (Konica Minolta TC) |
Wed, Dec 19 PM 13:00 - 17:50 |
(7) |
13:00-13:25 |
New Classes of Public Key Cryptosystem Constructed on the Basis of Multivariate Polynomials and Random Coding |
Masao Kasahara (Osaka Gakuin Univ.) |
(8) |
13:25-13:50 |
A Knapsack Cryptosystem Using Two Operations |
Atsushi Igarashi, Kunikatsu Kobayashi (Yamagata Univ.) |
(9) |
13:50-14:15 |
A Consideration on Hitting Set Problem and Incidence Matrix |
Kunikatsu Kobayashi (Yamagata Univ.) |
(10) |
14:15-14:40 |
Efficiency Analysis of Multi-Scalar Multiplications using Direct Computation Methods |
Hisashi Yamada, Tsuyoshi Takagi (FUN), Kouichi Sakurai (Kyushu Univ.) |
(11) |
14:40-15:05 |
Generalized EBRIP |
Atsuko Miyaji (JAIST) |
(12) |
15:05-15:30 |
An Implementation of a Privacy Enhancing SSL/TLS Protocol Based on Group Signatures |
Hiroki Obayashi, Toru Nakanishi, Jun Kawashima, Nobuo Funabiki (Okayama Univ.) |
|
15:30-15:45 |
Break ( 15 min. ) |
(13) |
15:45-16:10 |
A Study of IBE to PKE Proxy Re-Encryption |
Takeo Mizuno, Hiroshi Doi (IISEC) |
(14) |
16:10-16:35 |
Attribute-Based Encryption with Partially Hidden Ciphertext Policies |
Takashi Nishide (Univ. of Electro-Comm./Hitachi Software), Kazuki Yoneyama, Kazuo Ohta (Univ. of Electro-Comm.) |
(15) |
16:35-17:00 |
A Lossless Image Authentication Scheme for Tamper-Proofing |
Tomoya Tanaka, Koki Abe (UEC) |
(16) |
17:00-17:25 |
Classification and feature extraction by using computer virus static analysis |
Kazuki Iwamoto (JCSR), Katsumi Wasaki (Shinshu Univ.) |
(17) |
17:25-17:50 |
Evaluation of a Detection System against Fuzzing Attacks on the SIP Protocol |
Masaya Ozawa (Chuo Univ.), Eric Y. Chen, Mitsutaka Itoh (NTT PF Lab.), Mitsutoshi Hatori (Chuo Univ.) |