Fri, May 9 PM 13:10 - 17:35 |
(1) |
13:10-13:35 |
A New Class of Public Key Cryptosystems Constructed Based on Reed-Solomon Codes K(XV)SE(1)PKC |
Masao Kasahara (Waseda Univ./Chuo Univ.) |
(2) |
13:35-14:00 |
An Interorganizational Cryptosystem Using RSA PKC |
Yasuyuki Murakami (OECU), Masao Kasahara (Waseda Univ./Chuo Univ.) |
(3) |
14:00-14:25 |
New Negative Biases in Long-Term Glimpse of RC4 |
Ryoma Ito, Atsuko Miyaji (JAIST) |
|
14:25-14:40 |
Break ( 15 min. ) |
(4) |
14:40-15:05 |
A Study of IDS using Discrete Fourier Transform |
Enkhbold Chimedtseren, Keisuke Iwai, Hidema Tanaka, Takakazu Kurokawa (NDA) |
(5) |
15:05-15:30 |
Verification of secure cloud quantum computing |
Tomoyuki Morimae (Gunma Univ.) |
(6) |
15:30-15:55 |
A Robust DWT Watermarking for Image using Quantized Domain Based on q-logarithm Function |
Ta Minh Thanh (Titech), Ta Minh Tam (VSTV) |
|
15:55-16:10 |
Break ( 15 min. ) |
(7) |
16:10-16:35 |
A Report on ASIACRYPT2013 |
Kazuki Yoneyama (NTT) |
(8) |
16:35-17:05 |
[Invited Talk]
Generic Key Recovery Attack on Feistel Scheme |
Takanori Isobe, Kyoji Shibutani (Sony) |
(9) |
17:05-17:35 |
[Invited Talk]
Limited-Birthday Distinguishers for Hash Functions
-- Collisions beyond the Birthday Bound Can Be Meaningful -- |
Mitsugu Iwamoto (UEC), Yu Sasaki (NTT) |