IEICE Technical Committee Submission System
Advance Program
Online Proceedings
[Sign in]
Tech. Rep. Archives
 Go Top  Go Back   / Next ISEC Conf [HTML] / [HTML(simple)] / [TEXT]  [Japanese] / [English] 

===============================================
Technical Committee on Information Security (ISEC)
Chair: Akira Hayashi Vice Chair: Shinichi Kawamura, Masakatsu Morii
Secretary: Atsushi Fujioka, Shoichi Hirose
Assistant: Hiroshi Doi

DATE:
Tue, Jul 20, 2004 09:55 - 17:30
Wed, Jul 21, 2004 09:15 - 16:50

PLACE:
(http://www.e.tokushima-u.ac.jp/Access/0-access.htm. 森井昌克(088-656-9446),毛利公美(088-656-7487))

TOPICS:


----------------------------------------
Tue, Jul 20 AM A1-1 (09:55 - 12:00)
----------------------------------------

(1) 09:55 - 10:20
A Method for Checking the Parity of (#E-1)/2
Mayumi Obara, Yasuyuki Nogami, Yoshitaka Morikawa (Okayama Univ.)

(2) 10:20 - 10:45
A fast square root computation in extension fields
F.Wang, Yasuyuki Nogami, Yoshitaka Morikawa (Okayama Univ.)

(3) 10:45 - 11:10
A Hardware Organization of Modular Multiplication for RSA Cryptosystem
Yi Ge, Takao Sakurai (Univ. of Tokyo), Koki Abe (UEC), Shuichi Sakai (Univ. of Tokyo)

(4) 11:10 - 11:35
Implementable Quantum Bit String Commitment
Toyohiro Tsurumaru (Mitsubishi Electirc)

(5) 11:35 - 12:00
A More Efficient Modification of KASUMI Type Pseudorandom Permutations
Wonil LEE, Kouichi Sakurai (Kyushu Univ.), Seokhie Hong, Sangjin Lee (CIST,Korea Univ.)

----------------------------------------
Tue, Jul 20 PM A1-2 (13:30 - 17:30)
----------------------------------------

(6) 13:30 - 13:55
Some Extensions of Multi-Variate Public Key Cryptosystems
Ryuichi Sakai (Osaka Electro-Communication Univ.), Masao Kasahara (Osaka Gakuin Univ.)

(7) 13:55 - 14:20
A Construction of Public Key Cryptosystem based on Random Singular and Non-singular Simultaneous Equations over Extension Field
Masao Kasahara (Osaka Gakuin Univ.), Ryuichi Sakai (Osaka Electro-Communication Univ.)

(8) 14:20 - 14:45
Cryptanalysis of the TSP cryptosystem over the Gaussian integers
Akira Hayashi (Kanazawa Inst of Tech)

(9) 14:45 - 15:10
A secure generic conversion to CCA-secure encryption and relatied problems
Eiichiro Fujisaki (NTT Labs)

(10) 15:10 - 15:35
Optimal Security Proof for PFDH under Strong Existential Unforgeability
Bagus Santoso, Kazuo Ohta, Noboru Kunihiro (UEC)

----- Break ( 15 min. ) -----

(11) 15:50 - 16:15
An Analysis of Feasibility for the Factoring Device TWIRL (I)
Tetsuya Izu, Kouichi Itoh, Jun Kogure, Kiyoshi Kohiyama, Takeshi Shimoyama, Masahiko Takenaka, Naoya Torii, Shouichi Masui (Fujitsu Lab. LTD.), Kenji Mukaida (Fujitsu)

(12) 16:15 - 16:40
An Analysis of Feasibility for the Factoring Device TWIRL (II)
Tetsuya Izu, Kouichi Itoh, Jun Kogure, Kiyoshi Kohiyama, Takeshi Shimoyama, Masahiko Takenaka, Naoya Torii, Shouichi Masui (Fujitsu Lab.), Kenji Mukaida (Fujitsu)

(13) 16:40 - 17:05
A trial of GNFS implementation (Part V)
-- Speeding up sieving using bucket sort --
Kazumaro Aoki, Hiroki Ueda (NTT)

(14) 17:05 - 17:30
On validation testing for block cipher modules
Jun Yajima, Masahiko Takenaka, Takeshi Shimoyama (FUJITSU LAB.)

----------------------------------------
Tue, Jul 20 AM B1-1 (09:55 - 12:00)
----------------------------------------

(15) 09:55 - 10:20
Implementation of Damage Prediction System of Unlawful Access by Event Dependent Model
Ryoji Hasui (The Univ. of Tokushima), Yoshiaki Shiraishi (Kinki Univ.), Masakatu Morii (The Univ. of Tokushima)

(16) 10:20 - 10:45
An Assessment of Wireless Location Privacy Risks in High Precision Positioning System
Huang Leping (Nokia), Kaoru Sezaki (Univ. of Tokyo)

(17) 10:45 - 11:10
A Proposal of Congestion DoS Attack Avoidance System to which Mobile IPv6 Technology Applied
Takayoshi Kusaka, Tatsuya Baba, Masataka Kado, Tsutomu Inada (NTT Data Corp.)

(18) 11:10 - 11:35
A Policy-based Automated Handling Mechanism for Network Security Events
Shin Shirahata, Masaki Minami, Jun Murai (KEIO Univ.)

(19) 11:35 - 12:00
Intrusion Detection System to Detect Variant Attacks Using Learning Algorithms with Automatic Generation of Training Data
Akira Yamada, Yutaka Miyake, Keisuke Takemori, Toshiaki Tanaka (KDDI Labs.)

----------------------------------------
Tue, Jul 20 PM B1-2 (13:30 - 17:30)
----------------------------------------

(20) 13:30 - 13:55
Secure Double Block Length Hash Functions Based on Abreast/Tandem Davies-Meyer
Shoichi Hirose (Kyoto Univ.)

(21) 13:55 - 14:20
Implementation and Evaluation of Illegal Copy Protection for Multicast Contents Delivery
Masaki Inamura, Toshiaki Tanaka (KDDI R&D Labs.)

(22) 14:20 - 14:45
Reducing Frequency of Communication on the Consignment Delivering System Protecting Marketing Information
Akira Fujiwara, Shingo Okamura, Maki Yoshida, Toru Fujiwara (Osaka Univ.)

(23) 14:45 - 15:10
A Secure Traitor Tracing Scheme against Key Exposure
Kazuto Ogawa, Arisa Fujii, Go Ohtake (NHK), Goichiro Hanaoka, Hideki Imai (U. of Tokyo), Keigo Majima, Kimiyuki Oyamada (NHK)

(24) 15:10 - 15:35
A report on 3rd annual PKI R&D workshop
Satoshi Koga (Kyushu Univ.), Hiroaki Kikuchi (Tokai Univ.)

----- Break ( 15 min. ) -----

(25) 15:50 - 16:15
Certification of Program Execution by Tamper Resistant CPU
Atsuya Okazaki, Masaki Nakanishi, Shigeru Yamashita, Katsumasa Watanabe (NAIST)

(26) 16:15 - 16:40
A proposal for protection of low-cost RFID tags using trusted devices
Jose Francisco Guevara Vera (Univ. Politécnica de Valencia), Hiroshi Honjo (NTT Data)

(27) 16:40 - 17:05
A CHAP authentication with a key extracted from a fingerprint
Yoichi Shibata (Shizuoka Univ.), Itsukazu Nakamura (Beijin NTT data), Masahiro Mimura, Kenta Takahashi (Hitachi, Ltd), Masakatsu Nishigaki (Shizuoka Univ.)

(28) 17:05 - 17:30
A consideration from the peculiarity of a handwriting about the anonymity of a handwriting
Norihisa Segawa (Iwate Prefectural University), Yuko Murayama (IPU), Masatoshi Miyazaki (Digitally Advanced Integrated Solutions Labs), Yoshiaki Nemoto (Tohoku University)

----------------------------------------
Wed, Jul 21 AM A2-1 (09:15 - 12:00)
----------------------------------------

(1) 09:15 - 09:40
Mathematical Modeling and Analysis of Computer Virus Diffusion Process
Masato Uchida, Daisuke Satoh (NTT)

(2) 09:40 - 10:05
An E-mail Virus Diffusion Model
Daisuke Satoh, Masato Uchida, Keisuke Ishibashi (NTT), Makoto Kobayashi (NSP)

(3) 10:05 - 10:30
A proposal of estimation method of worm's infection magnitude by using site level valnerability profiling
Kanba Koizumi (Keio Univ), Hideki Koike (Univ Electro-commnicatinos), Tetuji Takada (Sony CSL), Michiaki Yasumura (Keio Univ)

----- Break ( 15 min. ) -----

(4) 10:45 - 11:10
Protecting Memories in Multitask OSes -- A Cryptographic Memory System for Resource-poor Platforms
Yu Inamura, Toru Egashira, Atsushi Takeshita (NTT DoCoMo)

(5) 11:10 - 11:35
Protecting Memories in Multitask OSes
-- Tampering Detection --
Toru Egashira, Yu Inamura, Atsushi Takeshita (NTT DoCoMo)

(6) 11:35 - 12:00
Implementation of Secure Seamless Roaming Method by IPsec/IKE
Shingo Fujimoto, Masahiko Takenaka (FUJITSU LTD.)

----------------------------------------
Wed, Jul 21 PM A2-2 (13:15 - 16:50)
----------------------------------------

(7) 13:15 - 13:40
A Note on Probabilistic Internal-State Reconstruction Method to Stream Ciphers with Time-variant Tables
Toshihiro Ohigashi (The Univ. of Tokushima), Yoshiaki Shiraishi (Kinki Univ.), Masakatu Morii (The Univ. of Tokushima)

(8) 13:40 - 14:05
SSSM: A New Key Stream Generator with Time-variant Tables
Sanzo Ugawa, Toshihiro Ohigashi (The Univ. of Tokushima), Yoshiaki Shiraishi (Kinki Univ.), Masakatu Morii (The Univ. of Tokushima)

(9) 14:05 - 14:30
Analysis and Evaluation of Guess-and-Determine Attacks on Clock Controlled Stream Ciphers
Shinsaku Kiyomoto, Toshiaki Tanaka (KDDI Labs.), Kouichi Sakurai (Kyushu Univ.)

(10) 14:30 - 14:55
A Study on the DFT Test in NIST SP800-22
Hisashi Yamamoto, Toshinobu Kaneko (T.U.S)

----- Break ( 15 min. ) -----

(11) 15:10 - 15:35
The mechanism of DPRP in Flexible Private Network
Hidekazu Suzuki, Akira Watanabe (Meijo Univ.)

(12) 15:35 - 16:00
The Proposal of Practical Cipher Communication Systems
Shinya Masuda, Akira Watanabe (Meijo Univ.)

(13) 16:00 - 16:25
Researches on Detection Method of Island Hop in Flexible Private Network
Daisuke Takeo, Akira Watanabe (Meijo Univ.)

(14) 16:25 - 16:50
A Loosely Managed Privacy Protection Method using Information Entropy
Miyuki Imada, Koichi Takasugi, Masakatsu Ohta (NTT)

----------------------------------------
Wed, Jul 21 AM B2-1 (09:40 - 12:00)
----------------------------------------

(15) 09:40 - 10:05
Development of DPA evaluation platform for 8 bit processor
Koichi Fujisaki, Yuki Tomoeda, Hideyuki Miyake, Yuichi Komano, Atsushi Shimbo, Shinichi Kawamura (Toshiba)

(16) 10:05 - 10:30
Side Channel Attacks on XTR and Efficient Countermeasures
DongGuk Han (kyushu Univ.), Jongin Lim (Korea Univ.), Kouichi Sakurai (Kyushu univ.)

----- Break ( 15 min. ) -----

(17) 10:45 - 11:10
Evaluation of DPA by Logic Simulation and Construction of Leake Models
Minoru Saeki, Daisuke Suzuki (Mitsubishi Electric Corp), Tetsuya Ichikawa (MEE)

(18) 11:10 - 11:35
An Attack on Cryptographic Hardware Design with Data Masking Method
Tetsuya Ichikawa (MEE), Daisuke Suzuki, Minoru Saeki (Mitsubishi Electric Corp)

(19) 11:35 - 12:00
Countermeasure against DPA Considering Transition Probabilities
Daisuke Suzuki, Minoru Saeki (Mitsubishi Electric Corp.), Tetsuya Ichikawa (MEE)

----------------------------------------
Wed, Jul 21 PM B2-2 (13:15 - 16:25)
----------------------------------------

(20) 13:15 - 13:40
An Electronic Weighted Voting Protocol with Tallying Cost Reduced
Shinji Nakatake, Toru Nakanishi, Nobuo Funabiki, Yuji Sugiyama (Okayama Univ.)

(21) 13:40 - 14:05
Electronic Voting Scheme Based on MIX-net and Homomorphism
Natsuki Ishida (HitachiSoftware), Wakaha Ogata (titech)

(22) 14:05 - 14:30
An improved attack on a receipt-free and universally verifiable mix-type voting scheme
Yong-Sork Her, Kenji Imamoto, Kouichi Sakurai (Kyushu Univ.)

(23) 14:30 - 14:55
Unconditionally Secure Polynomial Evaluation And Its Application To Electronic Voting
Akira Otsuka (IPA), Hideki Imai (Univ. of Tokyo)

----- Break ( 15 min. ) -----

(24) 15:10 - 15:35
Refrehshable Tokens with Optional Linkability
Rie Shigetomi (Univ. of Tokyo), Akira Otsuka (IPA), Keith Martin (Royal Holloway), Hideki Imai (Univ. of Tokyo)

(25) 15:35 - 16:00
Transferable Off-line Anonymous Electronic Ticekt System
Kyoko Mikami, Asuka Nakamura (Tsuda College), Rie Shigetomi (Univ. of Tokyo), Takahide Ogawa (Tsuda College)

(26) 16:00 - 16:25
Electronic Voting System Using Mobile Phone with Camera
Hiroshi Motosugi, Kenichi Katsuragawa, Ryoichi Sasaki (TDU)

# Information for speakers
General Talk will have 20 minutes for presentation and 5 minutes for discussion.


=== Technical Committee on Information Security (ISEC) ===
# FUTURE SCHEDULE:

Fri, Sep 17, 2004: Kikai-Shinko-Kaikan Bldg. [Tue, Jul 20]

# SECRETARY:
Shoichi Hirose(Graduate School of Informatics,Kyoto University)
TEL075-753-5316,FAX075-753-4982
E-mail:shrseek-u


Last modified: 2004-07-14 09:17:21


Notification: Mail addresses are partially hidden against SPAM.

[Download Paper's Information (in Japanese)] <-- Press download button after click here.
 
[Cover and Index of IEICE Technical Report by Issue]
 

[Presentation and Participation FAQ] (in Japanese)
 

[Return to ISEC Schedule Page]   /  
 
 Go Top  Go Back   / Next ISEC Conf [HTML] / [HTML(simple)] / [TEXT]  [Japanese] / [English] 


[Return to Top Page]

[Return to IEICE Web Page]


The Institute of Electronics, Information and Communication Engineers (IEICE), Japan