IEICE Technical Committee Submission System
Conference Schedule
Online Proceedings
[Sign in]
Tech. Rep. Archives
    [Japanese] / [English] 
( Committee/Place/Topics  ) --Press->
 
( Paper Keywords:  /  Column:Title Auth. Affi. Abst. Keyword ) --Press->

Technical Committee on Information Security (ISEC)  (Searched in: 2008)

[Go to Official ISEC Homepage (Japanese)] 
Search Results: Conference Papers
 Conference Papers (Available on Advance Programs)  (Sort by: Title)
 Results 1 - 188 of 188  /   
Committee Date Time Place Paper Title / Authors Abstract Paper #
WBS, IT, ISEC 2009-03-10
09:25
Hokkaido Hakodate Mirai Univ. A BER floor suppression scheme of OFDM system with Overlap-FDE
Tetsuya Kobori, Fumio Takahata (Waseda Univ) IT2008-115 ISEC2008-173 WBS2008-128
An overlap-FDE has a capability of eliminating a guard interval(GI) in OFDM transmission. However it is possible in mult... [more] IT2008-115 ISEC2008-173 WBS2008-128
pp.469-474
ISEC, SITE, IPSJ-CSEC 2008-07-25
16:10
Fukuoka Fukuoka Institute of System LSI Design Industry A Coding Scheme using Matched Filter to protect IEEE802.11i 4-Way Handshake against DoS attack
Ryuzou Nishi (PCC), Yoshiaki Hori, Kouichi Sakurai (Kyushu Univ.) ISEC2008-57
 [more] ISEC2008-57
pp.163-168
WBS, IT, ISEC 2009-03-09
17:10
Hokkaido Hakodate Mirai Univ. A Coding Theorems for Cheating-Detectable (2,2)-Threshold Schemes
Hiroki Koga (Univ. Tsukuba), Mitsugu Iwamoto (Univ. Electro-Communications), Hirosuke Yamamoto (Univ. Tokyo) IT2008-66 ISEC2008-124 WBS2008-79
(To be available after the conference date) [more] IT2008-66 ISEC2008-124 WBS2008-79
pp.143-150
ISEC, SITE, IPSJ-CSEC 2008-07-25
14:40
Fukuoka Fukuoka Institute of System LSI Design Industry A Consideration on Efficient Exponentiation in Extension Field for Pairing-based Cryptography
Tomoki Yoshida, Hidehiro Kato, Kenta Nekado, Yasuyuki Nogami, Yoshitaka Morikawa (Okayama Univ.) ISEC2008-49
In recent years, pairing-based cryptographies such as ID-base cryptography and group signature have been studied.
These... [more]
ISEC2008-49
pp.101-108
ISEC 2008-05-16
11:35
Tokyo Kikai-Shinko-Kaikan Bldg. A Consideration on k-Clique Problem and Graph k-Colorability
Kunikatsu Kobayashi (Yamagata Univ.) ISEC2008-6
We examine the solutions of $k$-clique problem and graph $k$-colorability.We propose the polynomial time algorithms of $... [more] ISEC2008-6
pp.39-42
ISEC 2008-09-12
14:15
Tokyo Kikai-Shinko-Kaikan Bldg. A Factoring Algorithm Searching Squares (part 2)
Kunikatsu Kobayashi (Yamagata Univ.) ISEC2008-66
We propose a probabilistic factoring algorithm searching squares
using a factor base consisting of odd primes. [more]
ISEC2008-66
pp.21-24
ISEC 2008-05-16
14:15
Tokyo Kikai-Shinko-Kaikan Bldg. A Fully Secure Attribute-Based Group Signature Scheme and its Application in an Anonymous Survey for Collection of Attribute Statistics
Keita Emura, Atsuko Miyaji (JAIST) ISEC2008-10
Recently,
many cryptographic schemes based on user's attributes are proposed, e.g., Attribute-Based Group Signature (A... [more]
ISEC2008-10
pp.61-68
WBS, IT, ISEC 2009-03-10
14:50
Hokkaido Hakodate Mirai Univ. A Grouping Method Based on Degree Distribution of Irregular LDPC Codes for Group Shuffled BP Decoding Algorithm
Yoshiyuki Sato, Gou Hosoya, Shigeichi Hirasawa (Waseda Univ.) IT2008-107 ISEC2008-165 WBS2008-120
In this paper, we propose a effective grouping method for the Group Shuffled BP decoding algorithm using the irregular L... [more] IT2008-107 ISEC2008-165 WBS2008-120
pp.421-426
ISEC 2008-12-17
14:15
Tokyo Kikai-Shinko-Kaikan Bldg. A Knapsack Cryptosystem Resisting Wellknown Attacks
Kunikatsu Kobayashi (Yamagata Univ,) ISEC2008-96
We propose a knapsack cryptosystem resisting well-known attacks which use LLL algorithm and Shamir's algorithm. [more] ISEC2008-96
pp.41-44
ISEC, SITE, IPSJ-CSEC 2008-07-25
10:20
Fukuoka Fukuoka Institute of System LSI Design Industry A Lattice Model of the General Confidentiality Policies
Taketoshi Sakuraba (Hitachi), Kouichi Sakurai (Kyushu Univ.)
An information flow policy is defined as a set of information flow rules among security-classes. Implementations of such... [more] ISEC2008-41
pp.45-52
ISEC 2008-12-17
13:25
Tokyo Kikai-Shinko-Kaikan Bldg. A Masquerade Detecting Method Based On the TF-IDF Model
Geng Dai, Zhou Jian, Haruhiko Shirai, Jousuke Kuroiwa, Tomohiro Odaka, Hisakazu Ogura (Fukui Univ) ISEC2008-94
Masquerade is someone who impersonates another user and operates computer system with privileged access. Computer securi... [more] ISEC2008-94
pp.27-32
ISEC 2008-05-16
13:25
Tokyo Kikai-Shinko-Kaikan Bldg. A method to reduce false positive of Anomaly Detection System
Yuka Ikebe, Takehiro Nakayama, Masaji Katagiri (NTT DoCoMo), Satoshi Kawasaki (Univ. of Tsukuba), Hirotake Abe (Toyohashi Univ. of Technology), Takahiro Shinagawa, Kazuhiko Kato (Univ. of Tsukuba) ISEC2008-8
We proposed a new anomaly detection system. In this system, software behavior that deviates from a model representing no... [more] ISEC2008-8
pp.49-56
ISEC, SITE, IPSJ-CSEC 2008-07-25
14:40
Fukuoka Fukuoka Institute of System LSI Design Industry A Methodology for Evaluating Each Measure in the Integrated Evaluation of the Security Measures in a System
Takaaki Shigematsu, Bin-Hui Chou, Yoshiaki Hori, Kouichi Sakurai (Kyushu Univ.)
For covering various requirements for the evaluations of security measures for a system with good coordination among the... [more] ISEC2008-54
pp.139-146
WBS, IT, ISEC 2009-03-10
09:25
Hokkaido Hakodate Mirai Univ. A Necessary and Sufficient Condition for the Existence of a Universal Fixed-Rate Lossless Code
Shigeaki Kuzuoka (Wakayama Univ.) IT2008-97 ISEC2008-155 WBS2008-110
In this paper, a generalized version of fixed-rate lossless source coding, that is, $\varepsilon$-source coding of gener... [more] IT2008-97 ISEC2008-155 WBS2008-110
pp.349-354
ISEC 2008-05-16
10:45
Tokyo Kikai-Shinko-Kaikan Bldg. A New Randomness Test Based on All the Autocorrelation Values
Kenji Hamano, Hirosuke Yamamoto (Tokyo Univ.) ISEC2008-4
Discrete Fourier transform test (dft test) included in the NIST randomness test suite, and autocorrelation test included... [more] ISEC2008-4
pp.23-30
ISEC 2008-09-12
13:50
Tokyo Kikai-Shinko-Kaikan Bldg. A Note on Security of KMN PKC
Takeshi Nasako, Yasuyuki Murakami (Osaka Electro-Comm. Univ.), Masao Kasahara (Osaka Gakuin Univ.) ISEC2008-65
Recently present authors proposed a new class of knapsack type cryptosystem on the basis of MH
PKC(KMN PKC). In this p... [more]
ISEC2008-65
pp.17-20
WBS, IT, ISEC 2009-03-09
11:15
Hokkaido Hakodate Mirai Univ. A Note on Security of Knapsack Type PKC with Random Sequence
Yasuyuki Murakami (Osaka Electro-Comm Univ.) IT2008-48 ISEC2008-106 WBS2008-61
Present author proposed a new method for constructing knapsack PKC
by using a random sequence.
In this paper, we propo... [more]
IT2008-48 ISEC2008-106 WBS2008-61
pp.35-40
WBS, IT, ISEC 2009-03-10
13:00
Hokkaido Hakodate Mirai Univ. A Note on the Security of Cryptographic Hash Functions
Shoichi Hirose (Univ. Fukui) IT2008-85 ISEC2008-143 WBS2008-98
This article discusses relationships between preimage resistance, second-preimage resistance and universal one-wayness o... [more] IT2008-85 ISEC2008-143 WBS2008-98
pp.267-271
ISEC, SITE, IPSJ-CSEC 2008-07-24
13:00
Fukuoka Fukuoka Institute of System LSI Design Industry A Note on the Security of KMN PKC and Presentation of Challenge Problems
Masao Kasahara (Osaka Gakuin Univ.), Yasuyuki Murakami, Takeshi Nasako (Osaka Electro-Comm. Univ.) ISEC2008-16 SITE2008-10
In this paper we discuss on a method for improving the security of the previously propsed KMN PKC where two pairs of cip... [more] ISEC2008-16 SITE2008-10
pp.1-8
WBS, IT, ISEC 2009-03-10
09:00
Hokkaido Hakodate Mirai Univ. A proof of universality of the source coding by most frequent match
Yangao Lin, Tomohiko Uyematsu, Ryutaroh Matsumoto (Tokyo Inst. of Tech.) IT2008-96 ISEC2008-154 WBS2008-109
In the grammar based code proposed by Kieffer and Yang, for a given data string, we first produce a context-free grammar... [more] IT2008-96 ISEC2008-154 WBS2008-109
pp.343-348
ISEC, LOIS 2008-11-13
16:05
Aichi Nagoya Noh Theater A Proposal of an Efficient Forward-Secure Group Signature Scheme Using Pairing
Yuta Hira, Toru Nakanishi, Nobuo Funabiki (Okayama Univ.) ISEC2008-80 OIS2008-56
Group signature scheme is one of signature schemes which keep signer’s identity information secret. To prevent a problem... [more] ISEC2008-80 OIS2008-56
pp.47-54
ISEC, SITE, IPSJ-CSEC 2008-07-25
10:45
Fukuoka Fukuoka Institute of System LSI Design Industry A Proposal of Intrusion Detection using Third-parties Support
Masakazu Fujii, Ken'ichi Takahashi (ISIT), Yoshiaki Hori (Kyushu Univ.), Kouichi Sakurai (ISIT) ISEC2008-37
Intrusions are one of the most important issues in the current Internet environment. A lot of researchers and companies ... [more] ISEC2008-37
pp.15-22
WBS, IT, ISEC 2009-03-09
16:45
Hokkaido Hakodate Mirai Univ. a prototype of ultra wideband spatio-temporal channel sounder and its performance evaluation
Hiroto Iiduka, Masaki Takahashi, Naohiko Iwakiri, Takehiko Kobayashi (Tokyo Denki Univ.) IT2008-76 ISEC2008-134 WBS2008-89
Ultra wideband (UWB) spatio-temporal propagation measurements have been carried out mostly using virtual array antennas ... [more] IT2008-76 ISEC2008-134 WBS2008-89
pp.205-210
ISEC, LOIS 2008-11-13
13:25
Aichi Nagoya Noh Theater A RIA Groupware System using Google Gdata Protocol -- A Schedule Information Sharing System --
Rui Zhuang, Yukio Rikiso (U. of Hyogo) ISEC2008-74 OIS2008-50
We developed a new groupware system using the web service provided by Google with the Google data APIs("GData" for short... [more] ISEC2008-74 OIS2008-50
pp.7-14
ISEC, LOIS 2008-11-13
16:40
Aichi Nagoya Noh Theater [Invited Talk] A Secure and Accessible Knowledge Management System for Home-Based Care Services for the Elderly -- An Area Portal for Tacit Knowledge Sharing and Collaboration in Home-Based Care Services --
Akira Iwata (Nagoya Institute of Technology) ISEC2008-81 OIS2008-57
The demand of home-based care services for elderly are increasing rapidly in Japan in recent years since the number of e... [more] ISEC2008-81 OIS2008-57
pp.55-62
ISEC, SITE, IPSJ-CSEC 2008-07-25
17:00
Fukuoka Fukuoka Institute of System LSI Design Industry A Secure Association Rules Mining Scheme Based on Frequent-Pattern Tree
Chunhua Su, Kouichi Sakurai (Kyushu Univ.) ISEC2008-59
 [more] ISEC2008-59
pp.177-182
WBS, IT, ISEC 2009-03-10
17:05
Hokkaido Hakodate Mirai Univ. A study of incident detection based on correlation analysis between network traffic time series
Junya Kitagawa, Jun'ichi Takeuchi (Kyushu Univ./Info Tech and Nanotechnologies,), Katsunari Yoshioka (Yokohama National Univ.), Daisuke Inoue, Masashi Eto, Koji Nakao (NICT) IT2008-93 ISEC2008-151 WBS2008-106
Damage caused by malwares such as botnets is getting more
serious, as the Internet is spreading. To detect such
incide... [more]
IT2008-93 ISEC2008-151 WBS2008-106
pp.321-328
WBS, IT, ISEC 2009-03-10
15:40
Hokkaido Hakodate Mirai Univ. A Study of Multicast Encryption Key Management Suitable for Frequent Member Replacement
Harumine Yoshiba (Panasonic Corp./Inst. of Info Security), Hidehiko Tanaka (Inst. of Info Security) IT2008-91 ISEC2008-149 WBS2008-104
In this paper, the suitability of multicast encryption key management method for actual business IT systems such as surv... [more] IT2008-91 ISEC2008-149 WBS2008-104
pp.307-314
ISEC, SITE, IPSJ-CSEC 2008-07-25
15:20
Fukuoka Fukuoka Institute of System LSI Design Industry A Study on Detecting Information Leak Virus by Activity Monitoring
Tetsuro Kito (Hitachi, Ltd.), Takahiro Matsuki, Masaaki Matsuoka (LAC), Hirofumi Nakakoji, Masato Terada (Hitachi, Ltd.)
In these days, it becomes a serious problem that personal/private information are disclosed by computer viruses which ab... [more] ISEC2008-60
pp.183-188
ISEC 2008-05-16
14:40
Tokyo Kikai-Shinko-Kaikan Bldg. A Study on Higher Order Differnce Operation for Elliptic Curve Scalar Multiplication Using Path Table
Tomoko K. Matsushima, Yoshitaka Sagara, Osamu Ashihara (Polytechnic Univ.) ISEC2008-11
Efficient elliptic curve arithmetic is crucial for cryptosystems based on elliptic curves. Such cryptosystems often requ... [more] ISEC2008-11
pp.69-76
WBS, IT, ISEC 2009-03-09
16:20
Hokkaido Hakodate Mirai Univ. A Study on Interference Suppression using Weighting factors for MB-OFDM systems
Atsushi Minakawa, Masahiro Fujii, Yu Watanabe (Utsunomiya Univ.) IT2008-75 ISEC2008-133 WBS2008-88
Ultira-WideBand (UWB) systems have recently gained popularity for short range high rate communications. UWB systems make... [more] IT2008-75 ISEC2008-133 WBS2008-88
pp.199-204
WBS, IT, ISEC 2009-03-10
11:15
Hokkaido Hakodate Mirai Univ. A Study on Joint Optimization of Power Allocation and Subcarrier Mapping Method for Dual-hop Non-regenerative OFDM Relay Systems
Masato Saito (Nara Inst. of Sci and Tech.), Chandara Athaudage, Jamie Evans (Univ. of Melbourne) IT2008-119 ISEC2008-177 WBS2008-132
In this study, an achievable rate of dual-hop non-regenerative OFDM (Orthogonal Frequency Division Multiplexing) relay s... [more] IT2008-119 ISEC2008-177 WBS2008-132
pp.493-499
ISEC, SITE, IPSJ-CSEC 2008-07-24
16:10
Fukuoka Fukuoka Institute of System LSI Design Industry A Study on Some Direct and Inverse Problems Related to Utility and Risk Based on the Introduction of Higher Order Correlations between Sound and Electromagnetic Waves around an ICT Environment -- Under a Viewpoint of Relationism First --
Yoshifumi Fujita (Onomichi Univ.), Mitsuo Ohta (Peviously, with Hiroshima Univ.) ISEC2008-27 SITE2008-21
 [more] ISEC2008-27 SITE2008-21
pp.81-88
WBS, IT, ISEC 2009-03-09
16:45
Hokkaido Hakodate Mirai Univ. A Study on the Construction of Search Systems Indices
Shigeki Miyake (NTT Network Innovation Lab.) IT2008-65 ISEC2008-123 WBS2008-78
Recall and precision are used to evaluate the performance of full-text search systems, where recall and precision are re... [more] IT2008-65 ISEC2008-123 WBS2008-78
pp.137-141
WBS, IT, ISEC 2009-03-10
12:05
Hokkaido Hakodate Mirai Univ. A Study on the Iterative Compensation of Clipping Noise for MIMO-OFDM systems.
Soichi Minamigi, Hideki Ochiai (Yokohama National Univ) IT2008-121 ISEC2008-179 WBS2008-134
MIMO-OFDM is a promising technique for achieving higher
channel capacity and/or higher communication quality by using ... [more]
IT2008-121 ISEC2008-179 WBS2008-134
pp.507-512
ISEC, LOIS 2008-11-14
12:10
Aichi Nagoya Noh Theater A Study on Visualization of Personal Life Log Considering Disclosure Control
Shin-ichiro Eitoku, Narimune Matsumura, Tomohiro Yamada, Shin-yo Muto, Masanobu Abe (Nippon Telegraph and Telephone Corporation) ISEC2008-88 OIS2008-64
In recent years, because of miniaturization of mobile terminals with various sensors, life-log services have begun to re... [more] ISEC2008-88 OIS2008-64
pp.97-104
ISEC, LOIS 2008-11-13
14:15
Aichi Nagoya Noh Theater A suggestion of the offer and management system of the individual prescription and medication history
Aya Matsudaira, Hiroyuki Suzuki, Takashi Obi, Kouichi Kita, Masahiro Yamaguchi, Joong Sun Lee, Masuyoshi Yachida, Nagaaki Ohyama (Tokyo Tech) ISEC2008-76 OIS2008-52
Now the investigative committee on the medical information network infrastructure examines about the digital prescriptio... [more] ISEC2008-76 OIS2008-52
pp.23-28
ISEC, SITE, IPSJ-CSEC 2008-07-24
13:50
Fukuoka Fukuoka Institute of System LSI Design Industry A System against Leakage though Paper Documents in Multi-Vendor Environment
Yasuhiro Fujii, Ryu Ebisawa, Yoshinori Honda, Seiichi Susaki (HITACHI)
 [more] ISEC2008-23 SITE2008-17
pp.51-58
WBS, IT, ISEC 2009-03-10
17:30
Hokkaido Hakodate Mirai Univ. A Video Packet Detection Method in Wireless Communications
Shoichiro Yamasaki (Polytechnic UIniv.), Hirokazu Tanaka (Hokkaido Univ.) IT2008-113 ISEC2008-171 WBS2008-126
A false detection of packet deteriorates reconstruction quality in wireless multimedia communications. This study prop... [more] IT2008-113 ISEC2008-171 WBS2008-126
pp.459-462
WBS, IT, ISEC 2009-03-09
11:15
Hokkaido Hakodate Mirai Univ. Accelerated Algorithm for Computing the Weight Distribution of Convolutional Codes, part 2
Yasuo Asakura, Masanori Hirotomo, Masakatu Morii (Kobe Univ.), Hiroshi Sasano (Kinki Univ.) IT2008-62 ISEC2008-120 WBS2008-75
In this paper, we propose an generalized AFAST algorithm.
This algorithm detects minimum distance at precomputation.
... [more]
IT2008-62 ISEC2008-120 WBS2008-75
pp.117-122
WBS, IT, ISEC 2009-03-09
09:25
Hokkaido Hakodate Mirai Univ. Access control model for distributed systems and its application for service proxies
Yoshiharu Asakura, Atsushi Honda, Naoshi Higuchi, Yoshinori Saida (NEC) IT2008-44 ISEC2008-102 WBS2008-57
Terminals in a distributed system provide their services for other terminals. In this manuscript, we propose Scope-based... [more] IT2008-44 ISEC2008-102 WBS2008-57
pp.7-13
ISEC 2008-12-17
11:10
Tokyo Kikai-Shinko-Kaikan Bldg. Access management method for Least Privilege implementation By the identity federation cross-organizations
Takahito Motojima, Satoshi Ono (kogakuin univ) ISEC2008-91
As for the business infomation system, service construction is performed again between the organizations which used SaaS... [more] ISEC2008-91
pp.11-14
WBS, IT, ISEC 2009-03-10
10:50
Hokkaido Hakodate Mirai Univ. Achievable Rate of Dual-Hop Non-Regenerative OFDM Relay Systems without FFT-based Relay Process
Shuhei Haraguchi, Masato Saito (Nara Inst. of Sci and Tech.), R. N. Athaudage, Jamie Evans (Univ. of Melbourne), Minoru Okada (Nara Inst. of Sci and Tech.) IT2008-118 ISEC2008-176 WBS2008-131
In this paper, we evaluate dual-hop non-regenerative OFDM (Orthogonal Frequency Division Multiplexing) relay systems wit... [more] IT2008-118 ISEC2008-176 WBS2008-131
pp.487-491
WBS, IT, ISEC 2009-03-10
10:15
Hokkaido Hakodate Mirai Univ. Adaptive Antidictionary Data Compression Using a Set of Restricted Length of Minimal Forbidden Words
Takahiro Ota (Nagano Prefectural Inst. of Tech.), Hiroyoshi Morita (Univ. of Electro-Commu.) IT2008-99 ISEC2008-157 WBS2008-112
An antidictionary is the set of all minimal strings, called Minimal Forbidden Words (MFWs), which never appear in an inp... [more] IT2008-99 ISEC2008-157 WBS2008-112
pp.363-370
WBS, IT, ISEC 2009-03-09
13:10
Hokkaido Hakodate Mirai Univ. [Invited Talk] Advances in Public-Key Cryptography (RSA, ECC, IBE)
Tsuyoshi Takagi (Future Univ. Hakodate.) IT2008-50 ISEC2008-108 WBS2008-63
We give a brief overview on the development of public-key cryptography starting with RSA cryptosystem. The most frequent... [more] IT2008-50 ISEC2008-108 WBS2008-63
pp.47-48
WBS, IT, ISEC 2009-03-09
15:10
Hokkaido Hakodate Mirai Univ. [Invited Talk] Algebraic topology and sensor networks
Yasuaki Hiraoka (Hiroshima Univ./JTS PRESTO), Zin Arai (Hokkaido Univ./JTS PRESTO), Kazunori Hayashi (Kyoto Univ.) IT2008-52 ISEC2008-110 WBS2008-65
 [more] IT2008-52 ISEC2008-110 WBS2008-65
pp.51-56
WBS, IT, ISEC 2009-03-09
17:35
Hokkaido Hakodate Mirai Univ. An AOA-based NLOS Error Mitigation Technique for Location Estimation
Takahiro Aso, Teruyuki Miyajima (Ibaraki Univ) IT2008-78 ISEC2008-136 WBS2008-91
In the applications of ubiquitous sensor networks, it is important to estimate sensor nodes location accurately. In an N... [more] IT2008-78 ISEC2008-136 WBS2008-91
pp.217-221
WBS, IT, ISEC 2009-03-10
15:15
Hokkaido Hakodate Mirai Univ. An Efficient Method for Evaluating Max-Fractional Distance Based on A Primal Path-Following Interior Point Method
Makoto Miwa, Tadashi Wadayama, Ichi Takumi (Nagoya Inst. of Tech.) IT2008-108 ISEC2008-166 WBS2008-121
The max-fractional distance of a binary linear code is deeply related to
the performance of an linear programming (LP)... [more]
IT2008-108 ISEC2008-166 WBS2008-121
pp.427-433
ISEC, SITE, IPSJ-CSEC 2008-07-24
16:35
Fukuoka Fukuoka Institute of System LSI Design Industry An enhancement of VMM snapshot utility for detcting code injection
Ruo Ando, Youki Kadobayashi, Yoichi Shinoda (NICT)
VMM (Virtual Machine Monitor) provide a more fine grained external
observability of virutal machine compared with previ... [more]
ISEC2008-34 SITE2008-28
pp.129-134
ISEC, LOIS 2008-11-13
14:50
Aichi Nagoya Noh Theater An Experiment with DPA and DEMA on FPGA Equipped on SASEBO
Takahiko Syouji, Akira Nozawa, Takayuki Kimura (Y.D.K. Co.,Ltd.), Tomoyasu Suzaki, Noritaka Yamashita, Yukiyasu Tsunoo (NEC Corporation) ISEC2008-77 OIS2008-53
(To be available after the conference date) [more] ISEC2008-77 OIS2008-53
pp.29-34
WBS, IT, ISEC 2009-03-10
17:05
Hokkaido Hakodate Mirai Univ. An ID-Based 2-Functional Proxy Cryptosystem
Lihua Wang (NICT) IT2008-130 ISEC2008-188 WBS2008-143
Proxy cryptosystems are classified into several types according to the proxy’s functions. For example, proxy decryption ... [more] IT2008-130 ISEC2008-188 WBS2008-143
pp.563-568
ISEC 2008-05-16
09:55
Tokyo Kikai-Shinko-Kaikan Bldg. An implementation of an automatic analyzer for side channel attacks
Keisuke Iwai, Daisaku Minamizaki, Takakazu Kurokawa (NDA) ISEC2008-2
Recently, environments for experiments of side-channel attacks are being developed. On the other hand, there is not enou... [more] ISEC2008-2
pp.9-14
ISEC, SITE, IPSJ-CSEC 2008-07-24
13:00
Fukuoka Fukuoka Institute of System LSI Design Industry An Implementation of Partial Integrity Assurance Technology:PIAT for Audio and Video Data (II)
Takashi Yoshioka, Masahiko Takenaka (Fujitsu Labs.)
The Partial Integrity Assurance Technology (PIAT) is a signature scheme that guarantees the integrity even if an origina... [more] ISEC2008-21 SITE2008-15
pp.37-44
WBS, IT, ISEC 2009-03-09
16:20
Hokkaido Hakodate Mirai Univ. Analysis of Fast Correlation Attack Using Dynamically Constructed Parity Checks
Youji Fukuta (Aichi Univ. of Edu.), Yoshiaki Shiraishi (Nagoya Inst. of Tech.), Masami Mohri (Gifu Univ.), Masakatu Morii (Kobe Univ.) IT2008-53 ISEC2008-111 WBS2008-66
Stream cipher is one of primitive classes in symmetric key ciphers where plaintext symbols are combined with pseudo rand... [more] IT2008-53 ISEC2008-111 WBS2008-66
pp.57-64
ISEC, SITE, IPSJ-CSEC 2008-07-25
13:25
Fukuoka Fukuoka Institute of System LSI Design Industry Analysis on the Pseudorandom-Function Property of the SHA-256 Compression Function
Hidenori Kuwakado (Kobe Univ.), Shoichi Hirose (Univ. of Fukui) ISEC2008-46
Applications of an iterated hash function such as HMAC require that the compression function of the hash function is a p... [more] ISEC2008-46
pp.81-86
WBS, IT, ISEC 2009-03-09
10:15
Hokkaido Hakodate Mirai Univ. Anomaly detection based on the machine learning of the human behavior on home network
Yuji Shintani, Yasuyoshi Okada, Naoshi Sato (Institute of Information Security) IT2008-46 ISEC2008-104 WBS2008-59
The demand for home security is growing year by year in order to solve on problems at homes, according to surge of robbe... [more] IT2008-46 ISEC2008-104 WBS2008-59
pp.23-28
WBS, IT, ISEC 2009-03-10
09:00
Hokkaido Hakodate Mirai Univ. Approximate ML Symbol Detection of OSTBC-OFDM over Unknown Channels
Tomoya Aizawa, Teruyuki Miyajima (Ibaraki Univ.) IT2008-114 ISEC2008-172 WBS2008-127
 [more] IT2008-114 ISEC2008-172 WBS2008-127
pp.463-467
ISEC, SITE, IPSJ-CSEC 2008-07-25
09:55
Fukuoka Fukuoka Institute of System LSI Design Industry Architecture Optimization of a Group Signature Circuit
Sumio Morioka, Toshinori Araki, Toshiyuki Isshiki, Satoshi Obana, Kazue Sako, Isamu Teranishi (NEC)
Group signature scheme is one of the most active research area in recent cryptographic algorithms/applications. Typical... [more] ISEC2008-40
pp.37-44
WBS, IT, ISEC 2009-03-10
14:15
Hokkaido Hakodate Mirai Univ. Audio Watermarking Based on LDPC Code for Clipping Attack and the decoding-extracting algorithm with self-synchronization(2)
Isao Abe, Yusuke Kobayashi, Raul Martinez-Noriega, Kazuhiko Yamaguchi (Univ of Electro-Comm.) IT2008-106 ISEC2008-164 WBS2008-119
The clipping attack is a serious problem in audio watermarking.When the watermarked audio suffer a clipping attack, it d... [more] IT2008-106 ISEC2008-164 WBS2008-119
pp.415-420
WBS, IT, ISEC 2009-03-10
13:50
Hokkaido Hakodate Mirai Univ. AURORA: A Cryptographic Hash Algorithm Family
Tetsu Iwata (Nagoya Univ.), Kyoji Shibutani, Taizo Shirai, Shiho Moriai, Toru Akishita (Sony Corp.) IT2008-87 ISEC2008-145 WBS2008-100
We propose a new hash function family AURORA supporting output lengths of
224, 256, 384, and 512 bits. The AURORA fami... [more]
IT2008-87 ISEC2008-145 WBS2008-100
pp.277-286
ISEC, SITE, IPSJ-CSEC 2008-07-24
15:45
Fukuoka Fukuoka Institute of System LSI Design Industry Basic Study on Designing Navigation Systems for the Blind
Kazuo Kamata (Utusnomiya Univ.), Tatsufumi Imai (Nippon Signal) ISEC2008-26 SITE2008-20
The final goal of our study is building an effective tool of thought for considering both users and use situations in th... [more] ISEC2008-26 SITE2008-20
pp.73-80
ISEC, SITE, IPSJ-CSEC 2008-07-25
14:15
Fukuoka Fukuoka Institute of System LSI Design Industry Best Match Security -- The proposal of a knowledge-based system for selection of security countermeasures according to user disposition. --
Yumiko Nakazawa (Shizuoka Univ.), Takehisa Kato (Toshiba Solutions Corp.), Takeo Isarida, Fumiyasu Yamada (Shizuoka Univ.), Masakatsu Nishigaki (Shizuoka Univ./JST)
The importance of security measures are considerably increasing in the recent information society. The service providers... [more] ISEC2008-53
pp.133-138
WBS, IT, ISEC 2009-03-10
11:15
Hokkaido Hakodate Mirai Univ. Bit Slice Cryptanalysis of Simplified K2 Stream Cipher
Takashi Ohshima, Munetoshi Iwakiri (National Defense Academy) IT2008-83 ISEC2008-141 WBS2008-96
K2 is a stream cipher based on 32 bits LFSR, outputs 64 bits random number sequences with 128 bits secret key at every p... [more] IT2008-83 ISEC2008-141 WBS2008-96
pp.253-258
ISEC, SITE, IPSJ-CSEC 2008-07-25
11:35
Fukuoka Fukuoka Institute of System LSI Design Industry Clone Resistance of Paper Artifact-Metrics with Segmented Matching
Yoichi Kobayashi, Sho Sakakura, Mitsutoshi Taira, Manabu Yamakoshi, Tsutomu Matsumoto (YNU) ISEC2008-39
It is desired to develop excellent counterfeit deterrence techniques for artifacts such as security documents, credentia... [more] ISEC2008-39
pp.31-36
WBS, IT, ISEC 2009-03-10
10:50
Hokkaido Hakodate Mirai Univ. Closed Forms of the Achievable Rate Region for Wyner's Source Coding Systems
Tetsunao Matsuta, Tomohiko Uyematsu, Ryutaroh Matsumoto (Tokyo Inst. of Tech.) IT2008-100 ISEC2008-158 WBS2008-113
Wyner's source coding system is one of the most fundamental fixed-length source coding systems with side information ava... [more] IT2008-100 ISEC2008-158 WBS2008-113
pp.371-378
ISEC 2008-05-16
11:10
Tokyo Kikai-Shinko-Kaikan Bldg. Coalition Resistant Ternary Subset Difference Method
Kazuhide Fukushima, Shinsaku Kiyomoto, Toshiaki Tanaka (KDDI Labs.), Kouichi Sakurai (Kyushu Univ.) ISEC2008-5
 [more] ISEC2008-5
pp.31-38
WBS, IT, ISEC 2009-03-09
09:00
Hokkaido Hakodate Mirai Univ. Collaborative Decoding Based on Average LLR in a Segment
Jun Hirosawa, Tomoaki Ohtsuki (Keio Univ.) IT2008-68 ISEC2008-126 WBS2008-81
 [more] IT2008-68 ISEC2008-126 WBS2008-81
pp.157-161
WBS, IT, ISEC 2009-03-10
14:50
Hokkaido Hakodate Mirai Univ. Composition of functionalities in UC framework
Tadashi Araragi (NTT), Chunhua Su, Kouichi Sakurai (Kyushu Univ.) IT2008-89 ISEC2008-147 WBS2008-102
This paper initiates a comprehensive approach for design method for functionality in UC framework. By combining some fun... [more] IT2008-89 ISEC2008-147 WBS2008-102
pp.295-299
ISEC, SITE, IPSJ-CSEC 2008-07-24
15:20
Fukuoka Fukuoka Institute of System LSI Design Industry Consistency between Moral Rights and Economic Rights in Digital Rights Management of Webcasting Contents
Haruo Kodama (NIME) ISEC2008-25 SITE2008-19
It is necessary to construct Digital Rights Management(DRM) systems to promote webcasting contents. There are problems o... [more] ISEC2008-25 SITE2008-19
pp.67-72
WBS, IT, ISEC 2009-03-10
16:40
Hokkaido Hakodate Mirai Univ. Construction of EUF-CMA-secure Digital Signatures Based on weak Identity-Based Signatures
Takahiro Oshima, Taiichi Saito (Tokyo Denki Univ.) IT2008-129 ISEC2008-187 WBS2008-142
In 2004, Canetti, Halevi, and Katz proposed a construction of an IND-CCA-secure Public-Key Encryption (PKE) scheme from ... [more] IT2008-129 ISEC2008-187 WBS2008-142
pp.557-562
ISEC 2008-12-17
15:45
Tokyo Kikai-Shinko-Kaikan Bldg. Construction of the experiment environment for the CPA attack
Daisaku Minamizaki, Keisuke Iwai, Takakazu Kurokawa (NDA) ISEC2008-99
SASEBO(Side-channel Attack Standard Evaluation BOard) was developed with the aim of integrating at establishment of the ... [more] ISEC2008-99
pp.61-66
WBS, IT, ISEC 2009-03-10
16:40
Hokkaido Hakodate Mirai Univ. Constructions of Irregular LDPC Code for a Burst Erasure
Gou Hosoya (Wased Univ.), Manabu Kobayashi (Shonan Inst. of Tech.), Shigeichi Hirasawa (Wased Univ.) IT2008-111 ISEC2008-169 WBS2008-124
We develope two methodology of constructing irregular low-density parity-check (LDPC) code for correcting a burst erasur... [more] IT2008-111 ISEC2008-169 WBS2008-124
pp.447-452
WBS, IT, ISEC 2009-03-09
11:15
Hokkaido Hakodate Mirai Univ. Cooperative Spectrum Sensing Techniques Using Decision Comparison for Cognitive Radio Systems Including Malicious Nodes
Toru Sakaguchi, Tomoaki Ohtsuki (Keio Univ.) IT2008-73 ISEC2008-131 WBS2008-86
We consider cooperative spectrum sensing based on energy detection. The performance of cooperative spectrum sensing is l... [more] IT2008-73 ISEC2008-131 WBS2008-86
pp.185-192
ISEC 2008-09-12
14:40
Tokyo Kikai-Shinko-Kaikan Bldg. Cryptosystems on Algebraic Tori -- Parameter Generation with Security and Efficiency --
Tomoko Yonemura, Kenichiro Furuta, Yoshikazu Hanatani, Taichi Isogai, Yuichi Komano, Hirofumi Muratani, Hanae Nozaki, Kenji Ohkuma, Atsushi Shimbo (TOSHIBA Corp.) ISEC2008-67
We study on algebraic tori defined on extension field as cryptographic groups to construct public key encryption schemes... [more] ISEC2008-67
pp.25-32
ISEC 2008-12-17
14:55
Tokyo Kikai-Shinko-Kaikan Bldg. Cryptosystems on Algebraic Tori -- Some Efficient Algorithms for Squaring --
Tomoko Yonemura, Kenichiro Furuta, Yoshikazu Hanatani, Taichi Isogai, Yuichi Komano, Hirofumi Muratani, Hanae Nozaki, Kenji Ohkuma, Atsushi Shimbo (Toshiba Corp.) ISEC2008-97
To construct a efficient algebraic torus-based public key encryption scheme is one of our goals. An efficient scheme is ... [more] ISEC2008-97
pp.45-52
WBS, IT, ISEC 2009-03-09
09:50
Hokkaido Hakodate Mirai Univ. Data Dissemination in Mobile Environment Using Collaborative Approach
Mohd Rashid, Atsushi Kinjo, Tomokazu Nagata, Shiro Tamaki (Univ. of the Ryukyus) IT2008-59 ISEC2008-117 WBS2008-72
Data dissemination in mobile environment has attracted the research community for its various applications. The academic... [more] IT2008-59 ISEC2008-117 WBS2008-72
pp.99-104
ISEC, SITE, IPSJ-CSEC 2008-07-24
13:50
Fukuoka Fukuoka Institute of System LSI Design Industry Design Policy of MPKC based on Piece in Hand Concept
Shigeo Tsujii (iisec), Toshinobu Kaneko (TUS), Kohtaro Tadaki, Masahito Gotaishi (Chuo Univ.) ISEC2008-18 SITE2008-12
Design policy of multivariate public key cryptosystem based on Piece In Hand concept is proposed with focus on quantum c... [more] ISEC2008-18 SITE2008-12
pp.15-22
WBS, IT, ISEC 2009-03-10
17:30
Hokkaido Hakodate Mirai Univ. Detecting anomalies by monitoring terminals in Home Network
Kengo Kuniyoshi, Masakatu Morii (Kobe Univ.) IT2008-94 ISEC2008-152 WBS2008-107
The system like IDS and IPS based on the handcrafted signatures which represent the illegal characteristics is effective... [more] IT2008-94 ISEC2008-152 WBS2008-107
pp.329-334
ISEC, SITE, IPSJ-CSEC 2008-07-25
09:55
Fukuoka Fukuoka Institute of System LSI Design Industry Detecting of Unknown Computer Virus Variants Based on Computer Behavior
Haruka Mimori, Koki Abe (UEC) ISEC2008-35
We observed the behavior of computer viruses by monitoring the behavior of computers infected by the mass-mailing viruse... [more] ISEC2008-35
pp.1-8
ISEC, SITE, IPSJ-CSEC 2008-07-25
15:45
Fukuoka Fukuoka Institute of System LSI Design Industry Development of publicity function of the illegitimate activity host by the IP marking
Takahiro Matsuki, Masaaki Matsuoka (LAC Co., Ltd), Masato Terada, Tetsuro Kito, Hirofumi Nakakoji (Hitachi Ltd.)
Recently, there are many problems regarding the P2P file exchange environment on the Internet.
The need to reconsider t... [more]
ISEC2008-61
pp.189-194
ISEC, LOIS 2008-11-14
11:20
Aichi Nagoya Noh Theater Dynamic Node Relocation Algorithm for Improvement Communication Quality in Multi-hop Wireless Network
Yoko Furuzumi, Yukikazu Nakamoto (Hyogo Univ.) ISEC2008-86 OIS2008-62
We studied how to relocate mobile devices to achieve high communications quality, one of quality of serve in a mobile wi... [more] ISEC2008-86 OIS2008-62
pp.83-88
WBS, IT, ISEC 2009-03-09
17:10
Hokkaido Hakodate Mirai Univ. Easy Key Management in Multiple Association by Using (2,2)-threshold Secret Sharing For A Group File Sharing System
Mariko Uchida (Nagoya Inst. of Tech.), Youji Fukuta (Aichi Univ. of Edu.), Masami Mohri (Gifu Univ.), Yoshiaki Shiraishi (Nagoya Inst. of Tech.) IT2008-55 ISEC2008-113 WBS2008-68
One of security issue of group file sharing system using file server is file leak by illegal operation by server adminis... [more] IT2008-55 ISEC2008-113 WBS2008-68
pp.71-78
ISEC, SITE, IPSJ-CSEC 2008-07-24
13:25
Fukuoka Fukuoka Institute of System LSI Design Industry Efficiency of a Redactable Signature with Tree Construction
Kunihiko Miyazaki, Yasuo Hatano, Yoshinori Honda (Hitachi Ltd.)
A digital signature does not allow any alteration of the document to which it is attached. Appropriate alteration of som... [more] ISEC2008-22 SITE2008-16
pp.45-50
WBS, IT, ISEC 2009-03-10
09:25
Hokkaido Hakodate Mirai Univ. Elliptic curves with a pre-determined embedding degree
Shoujirou Hirasawa, Atsuko Miyaji (JAIST) IT2008-79 ISEC2008-137 WBS2008-92
A paring over an elliptic-curve E(F_{p^m}) to an extension field of F_{p^{mk}} has begun to be attractive to cryptosyste... [more] IT2008-79 ISEC2008-137 WBS2008-92
pp.223-229
ISEC, LOIS 2008-11-14
09:30
Aichi Nagoya Noh Theater Elliptic curves with a pre-determined embedding degree.
Shoujirou Hirasawa, Atsuko Miyaji (Japan Advanced Instisute of Science and Technology) ISEC2008-82 OIS2008-58
Embedding degree k is one indicator to the difference between on the elliptic curve discrete logarithm problem (ECDLP) a... [more] ISEC2008-82 OIS2008-58
pp.63-66
WBS, IT, ISEC 2009-03-10
11:15
Hokkaido Hakodate Mirai Univ. Error Exponents for Wyner's Source Coding System
Tetsunao Matsuta, Shun Watanabe, Tomohiko Uyematsu, Ryutaroh Matsumoto (Tokyo Inst. of Tech.) IT2008-101 ISEC2008-159 WBS2008-114
Wyner's source coding system is one of the most fundamental fixed-length source coding systems with side information.
T... [more]
IT2008-101 ISEC2008-159 WBS2008-114
pp.379-385
WBS, IT, ISEC 2009-03-09
10:50
Hokkaido Hakodate Mirai Univ. Error-Trellis State Complexity of LDPC Convolutional Codes Based on Circulant Matrices
Masato Tajima, Koji Okino, Takashi Miyagoshi (Univ. of Toyama) IT2008-61 ISEC2008-119 WBS2008-74
Let H(D) be the parity-check matrix of an LDPC convolutional code corresponding to the parity-check matrix H of a quasi-... [more] IT2008-61 ISEC2008-119 WBS2008-74
pp.109-116
ISEC 2008-09-12
16:35
Tokyo Kikai-Shinko-Kaikan Bldg. Estimating RSA Private-Keys Generated in Security Chips
Tsutomu Matsumoto, Yoshio Takahashi (YNU) ISEC2008-71
For a particular instance of TPM - Trusted Platform Module, we have shown that the RSA private keys generated inside the... [more] ISEC2008-71
pp.55-62
ISEC, SITE, IPSJ-CSEC 2008-07-25
11:10
Fukuoka Fukuoka Institute of System LSI Design Industry Examination of the issues in designing of electronic signature documentation system
Miyuki Takao, Koichiro Hayashi (IISEC) ISEC2008-38
Electronic signature and Digital timestamp are new technologies which provide high level integrity to digital data. But ... [more] ISEC2008-38
pp.23-30
ISEC 2008-12-17
15:20
Tokyo Kikai-Shinko-Kaikan Bldg. Fast Exponentiation Methods for Cryptosystems on Algebraic Tori
Taichi Isogai, Kenji Ohkuma, Yuichi Komano, Atsushi Shimbo, Hanae Nozaki, Yoshikazu Hanatani, Kenichiro Furuta, Hirofumi Muratani, Tomoko Yonemura (Toshiba) ISEC2008-98
 [more] ISEC2008-98
pp.53-60
WBS, IT, ISEC 2009-03-10
13:25
Hokkaido Hakodate Mirai Univ. Formalizing Security of Hash Functions Against Length-Extension Attacks
Hidenori Kuwakado (Kobe Univ.), Shoichi Hirose (Univ. of Fukui) IT2008-86 ISEC2008-144 WBS2008-99
Although the resistance of length-extension attacksas well as collision resistanceis an important factor for SHA-3,NIST'... [more] IT2008-86 ISEC2008-144 WBS2008-99
pp.273-276
WBS, IT, ISEC 2009-03-10
14:15
Hokkaido Hakodate Mirai Univ. Hardware Implementations of the Cryptographic Hash Function Familiy AURORA
Toru Akishita (Sony), Tadaoki Yamamoto, Hiroyuki Abe (Sony LSI Design) IT2008-88 ISEC2008-146 WBS2008-101
This paper presents optimization techniques and evaluation results in hardware implementations of the hash function fami... [more] IT2008-88 ISEC2008-146 WBS2008-101
pp.287-294
ISEC, SITE, IPSJ-CSEC 2008-07-25
13:50
Fukuoka Fukuoka Institute of System LSI Design Industry Hash Function Using MMO Compression Function and MDP Domain Extension
Shoichi Hirose (Univ. Fukui), Hidenori Kuwakado (Kobe Univ.) ISEC2008-47
 [more] ISEC2008-47
pp.87-94
WBS, IT, ISEC 2009-03-09
09:25
Hokkaido Hakodate Mirai Univ. Hierarchical Modulation Schemes with APSK on the Road side to Vehicle Communication
Yusuke Oka, Hiromasa Habuchi (Ibaraki Univ.), Kouji Ohuchi (Shizuoka Univ.), Koichiro Hashiura (Ibaraki Univ.) IT2008-69 ISEC2008-127 WBS2008-82
In this paper, it is proposed the information broadcasting system that the transmission signal embraces together the wid... [more] IT2008-69 ISEC2008-127 WBS2008-82
pp.163-166
ISEC 2008-09-12
17:00
Tokyo Kikai-Shinko-Kaikan Bldg. How to introduce the dynamic key to a provably Secure Block Cipher using FPGA Partial Reconfiguration
Kenji Takahashi, Tetsuya Ichikawa (Mitsubishi Electric Engineering), Toru Sorimachi (Mitsubishi Electric) ISEC2008-72
Cipher circuits are required both to have high security and to show high performance as to circuit scale and processing ... [more] ISEC2008-72
pp.63-68
ISEC 2008-05-16
16:10
Tokyo Kikai-Shinko-Kaikan Bldg. Hybrid Encryption Scheme in IBE with Applications to Data Storage
Hirokazu Ougi (free) ISEC2008-14
 [more] ISEC2008-14
pp.91-98
ISEC, SITE, IPSJ-CSEC 2008-07-25
16:35
Fukuoka Fukuoka Institute of System LSI Design Industry Illegal Copy Detection Framework for CAD Tools based on Watermarks Embedded in VHDL Codes
Kazuhide Fukushima, Shinsaku Kiyomoto, Toshiaki Tanaka (KDDI R&D Labs.), Kouichi Sakurai, Hiroto Yasuura (Kyushu Univ.) ISEC2008-58
 [more] ISEC2008-58
pp.169-176
ISEC, SITE, IPSJ-CSEC 2008-07-25
13:00
Fukuoka Fukuoka Institute of System LSI Design Industry Implementation of Block Cipher Camellia with a Configurable and Extensible Processor
Kazuyoshi Matsuo, Koki Abe (UEC) ISEC2008-45
Camellia, a block cipher algorithm, has been implemented on a configurable and extensible processor to measure cycles an... [more] ISEC2008-45
pp.75-80
ISEC, SITE, IPSJ-CSEC 2008-07-24
14:15
Fukuoka Fukuoka Institute of System LSI Design Industry Implementation of Palm Position Alignment Method in Palmprint Verification Using Cellular Phone
Haruki Ota, Ryu Watanabe, Toshiaki Tanaka (KDDI Labs.)
When a cellular phone is lost or stolen, it may be unjustly used by a malicious user. There are many cellular phones wit... [more] ISEC2008-24 SITE2008-18
pp.59-66
WBS, IT, ISEC 2009-03-10
11:40
Hokkaido Hakodate Mirai Univ. Improvement of LFSR Initial State Reconstruction Algorithm in Fast Correlation Attack Using Dynamically Constructed Parity Check Equations
Hiroaki Saitoh, Masami Mohri (Gifu Univ.), Youji Fukuta (Aichi Univ. of Edu.), Yoshiaki Shiraishi (Nagoya Inst. of Tech.) IT2008-84 ISEC2008-142 WBS2008-97
Fast correlation attack (FCA) has been known as a method of cryptanalysis for the unpredictability of Nonlinear Combiner... [more] IT2008-84 ISEC2008-142 WBS2008-97
pp.259-266
ISEC, SITE, IPSJ-CSEC 2008-07-25
10:20
Fukuoka Fukuoka Institute of System LSI Design Industry Improving Resistance to DoS using Attack History in Signature based Intrusion Detection Systems
Ryoya Miyazawa, Koki Abe (UEC) ISEC2008-36
 [more] ISEC2008-36
pp.9-14
WBS, IT, ISEC 2009-03-09
09:50
Hokkaido Hakodate Mirai Univ. Influence of channel errors on a wireless-controlled rotary inverted pendulum
Reo Kohinata, Takaya Yamazato, Masaaki Katayama (Nagoya Univ.) IT2008-70 ISEC2008-128 WBS2008-83
This paper discusses the influence of channel features to the performance of a wireless-controlled system. As an example... [more] IT2008-70 ISEC2008-128 WBS2008-83
pp.167-172
WBS, IT, ISEC 2009-03-10
14:15
Hokkaido Hakodate Mirai Univ. Influence of scintillation on optical wireless CSK with extended prime code sequences
Yusuke Kozawa, Hiromasa Habuchi (Ibaraki Univ.) IT2008-124 ISEC2008-182 WBS2008-137
In this paper, optical wireless code-shift keying systems with extended prime code sequences are considered.
The bit er... [more]
IT2008-124 ISEC2008-182 WBS2008-137
pp.527-530
ISEC, SITE, IPSJ-CSEC 2008-07-25
11:35
Fukuoka Fukuoka Institute of System LSI Design Industry Information Hideing Method utilizing Low Visible Natural Fiber Pattern for Printed Document
Kitahiro Kaneda, Kenji Hirano, Keiichi Iwamura, Seiichiro Hangai (T.U.S.)
Digital watermarks provide the capability to add extra information to various media, such as still images, movies and au... [more] ISEC2008-44
pp.69-74
ISEC, SITE, IPSJ-CSEC 2008-07-24
15:45
Fukuoka Fukuoka Institute of System LSI Design Industry Information Leakage Prevention Function of host based for P2P File Exchange Environment
Masaaki Matsuoka, Takahiro Matsuki (LAC Co., Ltd), Masato Terada, Tetsuro Kito, Hirofumi Nakakoji (Hitachi Ltd.)
Recently, there are many incidents to which the classified information of the individual or the organization flows out i... [more] ISEC2008-32 SITE2008-26
pp.115-122
ISEC 2008-05-16
15:20
Tokyo Kikai-Shinko-Kaikan Bldg. Integrating Fingerprint and Cryptosystem for Internet-Based Live Pay-TV System
Shuhui Hou, Tetsutaro Uehara (Kyoto Univ.), Takashi Satoh (Univ. of Kitakyushu), Yoshitaka Morimura, Michihiko Minoh (Kyoto Univ.) ISEC2008-12
In the last few years, live pay-TV system via internet has come to be established with the development of broadband netw... [more] ISEC2008-12
pp.77-84
ISEC, SITE, IPSJ-CSEC 2008-07-25
13:00
Fukuoka Fukuoka Institute of System LSI Design Industry Invalidation of a Mailing-list Address against Spam
Kenichi Takahashi (ISIT), Akihiro Sakai, Kouichi Sakurai (Kyushu Univ.)
 [more] ISEC2008-50
pp.109-116
WBS, IT, ISEC 2009-03-10
13:50
Hokkaido Hakodate Mirai Univ. Investigation on an effect of Single/Double Optical Hard Limiter in the optical CDMA systems -- Effect of quantum noises on OHL --
Chinatsu Ito (Polytechnic Univ.), Noboru Ochiai (Ibarki Pref. Academy of Industrial Tech.), Takeshi Nagao (Sansou System), Tomoko K. Matsushima, Yasuaki Teramachi (Polytechnic Univ.) IT2008-123 ISEC2008-181 WBS2008-136
Degradation of bit error rate by multi user interferences(MUI) was considered asa big problem for direct modulation opti... [more] IT2008-123 ISEC2008-181 WBS2008-136
pp.519-526
WBS, IT, ISEC 2009-03-09
11:40
Hokkaido Hakodate Mirai Univ. [Special Talk] ISSSTA2008 and ICUWB2008 Conference Report
Kohei Ohno (Tokyo Univ. of Science), Tetsushi Ikegami (Meiji Univ.) IT2008-74 ISEC2008-132 WBS2008-87
An international conference ISSSTA 2008 (10th IEEE International Symposium on Spread Spectrum Techniques and Applicatio... [more] IT2008-74 ISEC2008-132 WBS2008-87
pp.193-198
ISEC, SITE, IPSJ-CSEC 2008-07-24
14:15
Fukuoka Fukuoka Institute of System LSI Design Industry Knapsack Cryptosystem on Elliptic Curves of Trace Tow
Koichiro Noro, Kunikatsu Kobayashi (Yamagata Univ.) ISEC2008-19 SITE2008-13
The LLL algorithm is strong algorithm that decrypts the additional type Knapsack cryptosystem.However, the LLL algorithm... [more] ISEC2008-19 SITE2008-13
pp.23-26
WBS, IT, ISEC 2009-03-09
09:25
Hokkaido Hakodate Mirai Univ. Markovian Coded Gaussian Filter with its application to Filterbanks
Tohru Kohda, Yutaka Jitsumatsu, Tatsuma Kuwazaki, Kenjiro Fujino (Kyushu Univ.) IT2008-58 ISEC2008-116 WBS2008-71
In code division multiple access (CDMA) systems, spreading code is introduced as the third axis in addition to the time ... [more] IT2008-58 ISEC2008-116 WBS2008-71
pp.91-98
WBS, IT, ISEC 2009-03-10
15:15
Hokkaido Hakodate Mirai Univ. McEliece Digital Signature with LDPC codes -- Practicality and Security Evaluation --
Shigenori Yamakawa (Chuo Univ.), Yang Cui, Manabu Hagiwara, Kazukuni Kobara (AIST/Chuo Univ.), Hideki Imai (Chuo Univ./AIST) IT2008-126 ISEC2008-184 WBS2008-139
Most of the current public-key cryptosystems (PKCs) are considered to be broken if a quantum computer
is realized in th... [more]
IT2008-126 ISEC2008-184 WBS2008-139
pp.537-543
ISEC 2008-12-17
10:20
Tokyo Kikai-Shinko-Kaikan Bldg. Measure of failure for the company infrastructure
Koichiro Ozasa, Satoshi Ono (Kogakuin Univ.) ISEC2008-89
Today ,Dependence degree to IT infrastructure of a company rises, and I consider the reason why fail over of obstacle me... [more] ISEC2008-89
pp.1-5
WBS, IT, ISEC 2009-03-10
15:40
Hokkaido Hakodate Mirai Univ. Minimum span analysis for a combined graph ensemble of low-density parity-check codes
Yujin Ishikawa, Yoshiyuki Sato, Gou Hosoya, Shigeichi Hirasawa (Waseda Univ.) IT2008-109 ISEC2008-167 WBS2008-122
The combination of the low-density parity-check (LDPC) code and the belif-propagation (BP) decoding algorithm exhibits a... [more] IT2008-109 ISEC2008-167 WBS2008-122
pp.435-440
WBS, IT, ISEC 2009-03-09
10:15
Hokkaido Hakodate Mirai Univ. Modulation Classification Based on Amplitude and Cosine moments
Shinji Ohara, Masato Kita, Ikuo Oka, Shingo Ata (Osaka City Univ.) IT2008-60 ISEC2008-118 WBS2008-73
Recently cognitive radios attract much attention, because it leads to flexible and high capacity wireless systems. Modul... [more] IT2008-60 ISEC2008-118 WBS2008-73
pp.105-108
WBS, IT, ISEC 2009-03-10
15:15
Hokkaido Hakodate Mirai Univ. Multi-receiver Authentication Codes with Secrecy and Revocation Capability for Multiple Message Transmissions
Shinpei Chiba, Takahiro Yoshida (Chuo Univ), Nuttapong Attrapadung (AIST), Hideki Imai (Chuo Univ/AIST) IT2008-90 ISEC2008-148 WBS2008-103
In this paper,we consider an extension of Multi-receiver Authentication Codes for Multiple Message Transmissions(MRA-MMT... [more] IT2008-90 ISEC2008-148 WBS2008-103
pp.301-306
ISEC, LOIS 2008-11-13
15:40
Aichi Nagoya Noh Theater Multivariate Public-Key Cryptosystems Constructed Based on K(I).SE(1)Scheme and Applications of MPKC on Common Key Cryptosystem
Masao Kasahara (Osaka Gakuin Univ.) ISEC2008-79 OIS2008-55
 [more] ISEC2008-79 OIS2008-55
pp.41-46
ISEC 2008-12-17
11:35
Tokyo Kikai-Shinko-Kaikan Bldg. Negotiate the Trust built in The Internet
Takashi Hosokawa, Satoshi Ono (Kogakuin Univ.) ISEC2008-92
 [more] ISEC2008-92
pp.15-18
WBS, IT, ISEC 2009-03-09
09:50
Hokkaido Hakodate Mirai Univ. Network Usage Control Based on Evaluation of User Security
Takuma Hori, Yasuyoshi Okada, Naoshi Sato (Institute of Information Security) IT2008-45 ISEC2008-103 WBS2008-58
The network should be maintained so available that every user could communicate safely. The Internet has been built unde... [more] IT2008-45 ISEC2008-103 WBS2008-58
pp.15-22
ISEC 2008-05-16
15:45
Tokyo Kikai-Shinko-Kaikan Bldg. New Classes of Public Key Cryptosystem Constructed on the Basis of Multivariate Polynomials and Error Control Coding
Masao Kasahara (OGU) ISEC2008-13
Extensive studies have been made of the public key cryptosystems based on multivariate polynomials over $\mathbb{F}_{2}$... [more] ISEC2008-13
pp.85-90
ISEC 2008-09-12
13:00
Tokyo Kikai-Shinko-Kaikan Bldg. New Classes of Public Key Cryptosystems Constructed on the Basis of Low-Density Multivariate Polynomials -- Along with K(I) Knapsack Scheme --
Masao Kasahara (Osaka Gakuin Univ.) ISEC2008-63
Extensive studies have been made of the public key cryptosystems based on multivariate polynomials over $\mathbb{F}_{2}$... [more] ISEC2008-63
pp.1-7
ISEC 2008-05-16
10:20
Tokyo Kikai-Shinko-Kaikan Bldg. New Impossible Differentials of CLEFIA
Etsuko Tsujihara (YDK), Maki Shigeri (NEC Software Hokuriku), Tomoyasu Suzaki (NEC), Takeshi Kawabata (NEC Software Hokuriku), Yukiyasu Tsunoo (NEC) ISEC2008-3
This paper reports impossible differential cryptanalysis on the 128-bit block cipher CLEFIA that was proposed in 2007. T... [more] ISEC2008-3
pp.15-22
ISEC 2008-09-12
13:25
Tokyo Kikai-Shinko-Kaikan Bldg. New Trapdoors in Knapsack Public-Key Cryptosystem with Two Sequences as Public Key
Yasuyuki Murakami, Takeshi Nasako (Osaka Electro-Comm. Univ.), Masao Kasahara (Osaka Gakuin Univ.) ISEC2008-64
Present authors proposed a new class of knasack PKC (KMN PKC) which uses two sequences as the public key.
KMN PKC uses... [more]
ISEC2008-64
pp.9-16
ISEC, LOIS 2008-11-13
13:00
Aichi Nagoya Noh Theater On Host-based Packet Capturing Mechanism for Network Forensics
Shunsuke Inai (Nagoya Institute of Technology), Youji Fukuta (Aichi Univ. of Edu.), Shoji Mizobuchi (Kinki Univ.), Masami Mohri (Gifu Univ.), Yoshiaki Shiraishi (Nagoya Institute of Technology), Ryoji Noguchi (Toyotsu Syscom Corp.) ISEC2008-73 OIS2008-49
Digital forensics is application of computer crime investigation and analysis techniques in the interests of determing p... [more] ISEC2008-73 OIS2008-49
pp.1-6
WBS, IT, ISEC 2009-03-10
16:40
Hokkaido Hakodate Mirai Univ. On incident forecasting using independent component alalysis
Eisuke Nishino, Jun'ichi Takeuchi (Kyushu Univ./Info Tech and Nanotechnologies), Katsunari Yoshioka (Yokohama National Univ.), Daisuke Inoue, Masashi Eto, Koji Nakao (NICT) IT2008-92 ISEC2008-150 WBS2008-105
For network security, measures against security incidents of worm infection and DDoS attack are important.In general, pr... [more] IT2008-92 ISEC2008-150 WBS2008-105
pp.315-320
ISEC, LOIS 2008-11-14
10:45
Aichi Nagoya Noh Theater On lattice bases for the Lagarias-Odlyzko attack against TSP cryptosystems
Takeshi Taniguchi, Akira Hayashi (Kanazawa Institute of Technology) ISEC2008-85 OIS2008-61
The Lagarias-Odlyzko (LO) method is a tool for attacks against many variants of knapsack cryptosystems.Specifically it i... [more] ISEC2008-85 OIS2008-61
pp.79-82
ISEC 2008-12-17
13:50
Tokyo Kikai-Shinko-Kaikan Bldg. On Security and Constructibility of Linear Quotient Codes for Quantum Cryptography
Mitsuru Hamada (Tamagawa Univ.) ISEC2008-95
 [more] ISEC2008-95
pp.33-40
WBS, IT, ISEC 2009-03-10
11:40
Hokkaido Hakodate Mirai Univ. On the Admissible Rate Region of Slepian-Wolf Coding Problem with LDPC Code and Mismatched Decoder
Kazuhiro Yamasaki, Ryutaroh Matsumoto, Tomohiko Uyematsu (Tokyo Inst. of Tech.) IT2008-102 ISEC2008-160 WBS2008-115
Recently, the application of the {\it low density parity check} (LDPC) codes to Slepian-Wolf source coding problem is st... [more] IT2008-102 ISEC2008-160 WBS2008-115
pp.387-393
WBS, IT, ISEC 2009-03-10
15:40
Hokkaido Hakodate Mirai Univ. On the Computational Complexity of the Discrete Logarithm Problem over Algebraic Tori
Yuji Nishigaki, Shingo Hasegawa, Shuji Isobe, Eisuke Koizumi, Masao Sakai, Hiroki Shizuya (Tohoku Univ.) IT2008-127 ISEC2008-185 WBS2008-140
In this paper we investigate the computational complexity of the discrete logarithm problem over algebraic tori (TDLP).
... [more]
IT2008-127 ISEC2008-185 WBS2008-140
pp.545-550
ISEC 2008-05-16
13:50
Tokyo Kikai-Shinko-Kaikan Bldg. On the Construction of the Set-Intersection Protocols from Blind Signatures
Ryo Nojima (NICT), Youki Kadobayashi (NAIST) ISEC2008-9
In this paper, we propose a simple and efficient two-party set-intersection protocol. Contrary to the previous protocols... [more] ISEC2008-9
pp.57-60
ISEC, LOIS 2008-11-13
15:15
Aichi Nagoya Noh Theater On the Hardness of Discrete Logarithm Problem in Algebraic Tori
Hirofumi Muratani, Tomoko Yonemura, Taichi Isogai, Kenji Ohkuma, Yoshikazu Hanatani, Kenichiro Furuta, Yuichi Komano, Hanae Nozaki, Atsushi Shimbo (Toshiba Corporation) ISEC2008-78 OIS2008-54
 [more] ISEC2008-78 OIS2008-54
pp.35-40
WBS, IT, ISEC 2009-03-09
10:50
Hokkaido Hakodate Mirai Univ. On the Possibility of Taking off Prime Number Generation in RSA-based Access Control
Jin Tamura (NICT) IT2008-47 ISEC2008-105 WBS2008-60
An Access Control Scheme, which was proposed by Chick et al. in CRYPTO89, has applied into many applications (Broadcast ... [more] IT2008-47 ISEC2008-105 WBS2008-60
pp.29-33
ISEC, SITE, IPSJ-CSEC 2008-07-24
13:25
Fukuoka Fukuoka Institute of System LSI Design Industry On the security of Piece In Hand Matrix Multivariate Public Key Cryptosystems -- MPKC systems proposed in SCIS'07 --
Toshinobu Kaneko, Yasutaka Igarashi, Daisuke Ito, Kiyoshi Hayakawa (Tokyo Univ. of Sci.) ISEC2008-17 SITE2008-11
MOCHIGOMA (Piece in Hand) system is an encryption algorithm proposed by
Tujii et al. in 2003, for enhancing the securi... [more]
ISEC2008-17 SITE2008-11
pp.9-14
WBS, IT, ISEC 2009-03-10
16:05
Hokkaido Hakodate Mirai Univ. On the Security of Torus-based Cryptography and Pairing Inversion Problem
Hirofumi Muratani, Tomoko Yonemura, Kenji Ohkuma, Taichi Isogai, Kenichiro Furuta, Yoshikazu Hanatani, Yuichi Komano, Hanae Nozaki, Atsushi Shimbo (Toshiba Corp.) IT2008-128 ISEC2008-186 WBS2008-141
 [more] IT2008-128 ISEC2008-186 WBS2008-141
pp.551-556
ISEC, SITE, IPSJ-CSEC 2008-07-24
14:40
Fukuoka Fukuoka Institute of System LSI Design Industry On the Standardization of Information Security -- ISO/IEC JTC1/SC27/WG2 Report on the Kyoto Meeting in April, 2008 --
Atsuko Miyaji (JAIST), Takeshi Chikazawa (IPA), Toshio Tatsuta (IISEC), Hajime Watanabe (AIST), Kenji Ohkuma (Toshiba/IPA) ISEC2008-20 SITE2008-14
 [more] ISEC2008-20 SITE2008-14
pp.27-36
ISEC, SITE, IPSJ-CSEC 2008-07-24
17:00
Fukuoka Fukuoka Institute of System LSI Design Industry Ontology and Epistemology in Semantic Network for Pluralistic Society -- From the Aspect of Access Control Agent for Social Systems --
Tetsuya Morizumi (TNSI), Hirotsugu Kinoshita (KU), Shigeo Tsujii (IISEC) ISEC2008-29 SITE2008-23
This paper describes why philosophical consideration takes part in designing information filter agent built into "SNS co... [more] ISEC2008-29 SITE2008-23
pp.97-102
WBS, IT, ISEC 2009-03-10
13:25
Hokkaido Hakodate Mirai Univ. Optimal Axis Compensation in Quantum Key Distribution Protocols
Shun Watanabe, Ryutaroh Matsumoto, Tomohiko Uyematsu (Tokyo Inst. of Tech.) IT2008-104 ISEC2008-162 WBS2008-117
We show the optimal axis compensations
maximizing the key generation rate
for unital channels.
We consider the case ... [more]
IT2008-104 ISEC2008-162 WBS2008-117
pp.401-407
ISEC, LOIS 2008-11-14
11:45
Aichi Nagoya Noh Theater Overseas Trends on and a Consideration about Privacy Protection and Utilization Technologies
Takashi Hatashima, Shigeaki Tanimoto, Katsumi Takahashi (Nippon Telegraph and Telephone Corporation) ISEC2008-87 OIS2008-63
For realizing a secure IT society under the ubiquitous environments, it is important that implementing security counterm... [more] ISEC2008-87 OIS2008-63
pp.89-96
ISEC, SITE, IPSJ-CSEC 2008-07-25
16:10
Fukuoka Fukuoka Institute of System LSI Design Industry P2P Node Detection method based on Connection Analysis
Tomohiro Shigemoto, Kazuya Okochi, Masato Terada (Hitachi Ltd.)
Recently, increasing number of information leaks by viruses in the P2P network are becoming big problem. And P2P file sh... [more] ISEC2008-62
pp.195-200
WBS, IT, ISEC 2009-03-09
14:10
Hokkaido Hakodate Mirai Univ. [Invited Talk] Performance Evaluation of Error Correcting Codes
Toru Fujiwara (Osaka Univ.) IT2008-51 ISEC2008-109 WBS2008-64
In this talk, performance analysis on error correcting codes used in digtal watermarking and in network coding is discus... [more] IT2008-51 ISEC2008-109 WBS2008-64
p.49
WBS, IT, ISEC 2009-03-10
13:25
Hokkaido Hakodate Mirai Univ. Phase Compensation for Narrowband Power-Line Communication Channels with Cyclic Time-Varying Features
Yoshie Sugiura, Takaya Yamazato, Masaaki Katayama (Nagoya Univ.) IT2008-122 ISEC2008-180 WBS2008-135
Phase transfer functions of power-line channels often show sharp and
periodic variation synchronous to the (double of) ... [more]
IT2008-122 ISEC2008-180 WBS2008-135
pp.513-518
ISEC 2008-12-17
16:10
Tokyo Kikai-Shinko-Kaikan Bldg. Power Analysis against a FPGA Implementation of the AES with SubBytes in a memory table
Hiroyuki Kawakita, Yusei Nishimoto, Kiyohiko Ishikawa, Hiroyuki Imaizumi (NHK) ISEC2008-100
 [more] ISEC2008-100
pp.67-72
WBS, IT, ISEC 2009-03-09
17:35
Hokkaido Hakodate Mirai Univ. Practical Methodology of Secret Key Agreement System Using Variable Directional Antenna
Takayuki Umaba (ATR), Masahiko Maeda (ATR/Univ. of Hyogo,), Yosuke Harada (ATR/Doshisha Univ.), Masazumi Ueba (ATR), Satoru Aikawa (ATR/Univ. of Hyogo,), Hisato Iwai, Hideichi Sasaoka (Doshisha Univ.) IT2008-56 ISEC2008-114 WBS2008-69
This paper describes a practical methodology of secret agreement system with privacy amplification. We defined parameter... [more] IT2008-56 ISEC2008-114 WBS2008-69
pp.79-84
ISEC, SITE, IPSJ-CSEC 2008-07-25
13:25
Fukuoka Fukuoka Institute of System LSI Design Industry Proposal of a Cue & Response Based User Authentication Using Unclear Image
Takumi Yamamoto, Takeo Isarida, Masakatsu Nishigaki (Shizuoka Univ.)
 [more] ISEC2008-51
pp.117-124
ISEC, SITE, IPSJ-CSEC 2008-07-25
11:10
Fukuoka Fukuoka Institute of System LSI Design Industry Proposal of Anonymos Routing Technique with DHT
Masaki Kondo, Shoichi Saito, Hiroshi Matsuo (Nagoya Inst. of Tech.)
The immense amount of information is processed on the network by the spread of the Internet.Therefore problems such as l... [more] ISEC2008-43
pp.61-68
WBS, IT, ISEC 2009-03-10
11:40
Hokkaido Hakodate Mirai Univ. Proposal of MIMO-SDM System considering Correlation of Channels
Tatsuhiko Yoshihara, Masayuki Yoshida, Fumiaki Maehara, Fumio Takahata (Waseda Univ.), Takashi Onodera (Sharp Corp.) IT2008-120 ISEC2008-178 WBS2008-133
A MIMO-OFDM-SDM system, which provides good transmission quality irrespective of various condition of propagation channe... [more] IT2008-120 ISEC2008-178 WBS2008-133
pp.501-506
WBS, IT, ISEC 2009-03-09
09:00
Hokkaido Hakodate Mirai Univ. Proposal of Piece Falsification Detection Method on JetJigsaw
Tatsuyuki Matsushita, Kentaro Umesawa, Shinji Yamanaka (Toshiba) IT2008-43 ISEC2008-101 WBS2008-56
In SCIS2009, we proposed JetJigsaw, a content delivery method with content protection mechanism[SCIS2009]. We introduced... [more] IT2008-43 ISEC2008-101 WBS2008-56
pp.1-6
ISEC 2008-05-16
13:00
Tokyo Kikai-Shinko-Kaikan Bldg. Reconsideration of Algorithmic Tamper Proof Devices using PIN (part 2)
Yuichi Komano (Toshiba), Kazuo Ohta (UEC), Hideyuki Miyake, Atsushi Shimbo (Toshiba) ISEC2008-7
Gennaro et al.~discussed the algorithmic tamper proof (ATP) devices using the personal identification number (PIN); and ... [more] ISEC2008-7
pp.43-48
WBS, IT, ISEC 2009-03-09
10:15
Hokkaido Hakodate Mirai Univ. Reduced-Rank MMSE Signal Detection for MC/CDMA Communication Systems
Akihiko Furuya, Tsuyoshi Ichikawa, Kohei Otake (Hosei Univ.) IT2008-71 ISEC2008-129 WBS2008-84
The MC/CDMA communication system has received much attention as one of the most promising systems for the future high-sp... [more] IT2008-71 ISEC2008-129 WBS2008-84
pp.173-178
ISEC 2008-09-12
15:20
Tokyo Kikai-Shinko-Kaikan Bldg. Reduction of Public-Key Size in a Revocable Group Signature Scheme with Constant Costs for Signing and Verifying
Hiroki Fujii, Yuta Hira, Toru Nakanishi, Nobuo Funabiki (Okayama Univ.) ISEC2008-68
Group signature scheme is the digital signature scheme enhancing the privacy of the user. We proposed a revocable scheme... [more] ISEC2008-68
pp.33-38
ISEC, SITE, IPSJ-CSEC 2008-07-25
10:45
Fukuoka Fukuoka Institute of System LSI Design Industry Relational Algebra in Multi-Party Protocol to Enable Secure and Unlimited Databases
Masanori Shimura, Tsukasa Endo (UEC), Kunihiko Miyazaki (Hitachi Ltd.), Hiroshi Yoshiura (UEC)
As personal information comes to be in digital and transferred on networks, its leakage is becoming more and more seriou... [more] ISEC2008-42
pp.53-60
WBS, IT, ISEC 2009-03-09
16:20
Hokkaido Hakodate Mirai Univ. Relationship among Conditional Complexities of Individual Sequences
Yuki Tanaka, Tomohiko Uyematsu, Ryutaroh Matsumoto (Tokyo Inst. of Tech.) IT2008-64 ISEC2008-122 WBS2008-77
Conditional complexities of individual sequences are known as lower bounds on the compression rate attainable by some cl... [more] IT2008-64 ISEC2008-122 WBS2008-77
pp.129-136
WBS, IT, ISEC 2009-03-10
17:05
Hokkaido Hakodate Mirai Univ. Reliability Function, Asymptotic Distance Ratio, and The Probability of Undetected Error for Product Codes
Toshihisa Nishijima (Hosei Univ.), Kin-ichiroh Tokiwa (Osaka Sangyo Univ.) IT2008-112 ISEC2008-170 WBS2008-125
It is well known that each bound of reliability function, asymptotic distance ratio, and the probability of undetected e... [more] IT2008-112 ISEC2008-170 WBS2008-125
pp.453-457
ISEC, SITE, IPSJ-CSEC 2008-07-25
15:45
Fukuoka Fukuoka Institute of System LSI Design Industry Ring Authenticated Group Key Establishment with Member Repudiation
Elliot T. Taniguchi, Hirosuke Yamamoto (Univ. of Tokyo) ISEC2008-56
In this paper, we first extend the Deniable Ring Authentication Protocol proposed by M. Naor to include key establishmen... [more] ISEC2008-56
pp.155-162
ISEC 2008-09-12
15:45
Tokyo Kikai-Shinko-Kaikan Bldg. Security Analysis on Electronic Money Systems including Compromise of Cryptographic Algorithms and/or Devices
Masataka Suzuki, Katsuhisa Hirokawa (BOJ) ISEC2008-69
This paper mainly focuses on note-based types of prepaid electronic money systems. Assuming compromise of cryptographic ... [more] ISEC2008-69
pp.39-46
WBS, IT, ISEC 2009-03-09
11:40
Hokkaido Hakodate Mirai Univ. Security Gap between Double-Sequence Knapsack PKC and Single-Sequence Knapsack PKC against Low-Density Attack
Takeshi Nasako, Yasuyuki Murakami (Osaka Electro-Comm Univ.), Masao Kasahara (Osaka Gakuin Univ.) IT2008-49 ISEC2008-107 WBS2008-62
Recently present authors proposed a double-sequence knapsack public key cryptosystem on the basis of MH PKC(KMN PKC). We... [more] IT2008-49 ISEC2008-107 WBS2008-62
pp.41-45
ISEC, SITE, IPSJ-CSEC 2008-07-25
13:50
Fukuoka Fukuoka Institute of System LSI Design Industry Self expandable RBAC for distributed systems
Yoshiharu Asakura, Atsushi Honda, Naoshi Higuchi, Yoshinori Saida (NEC)
(To be available after the conference date) [more] ISEC2008-52
pp.125-132
ISEC 2008-12-17
13:00
Tokyo Kikai-Shinko-Kaikan Bldg. Self-construction of Home Domain by Using Entry Device List
Sho Ikeyama, Yoshihiro Hori, Yoshiaki Shiraishi, Akira Iwata (NIT) ISEC2008-93
As digitalized contents increased, contents protection has become natural. However, usability has been sacrificed compar... [more] ISEC2008-93
pp.19-26
WBS, IT, ISEC 2009-03-09
16:45
Hokkaido Hakodate Mirai Univ. Sharing Multilevel Secrets among Groups Using Concatenation of Reed-Solomon Codes
Hachiro Fujita (Tokyo Metropolitan Univ.), Chigusa Kawashima (Univ. of Electro-Comm.), Tomoko K. Matsushima (Polytechnic Univ.) IT2008-54 ISEC2008-112 WBS2008-67
 [more] IT2008-54 ISEC2008-112 WBS2008-67
pp.65-70
WBS, IT, ISEC 2009-03-09
09:00
Hokkaido Hakodate Mirai Univ. Spectrum spreading sequences generated by chaotic dynamics and its correlational properties
Tohru Kohda, Takao Une, Yuichiro Koura (Kyushu Univ.) IT2008-57 ISEC2008-115 WBS2008-70
The performance of code division multiple access (CDMA) system
largely depends on the SS codes.
Many methods of genera... [more]
IT2008-57 ISEC2008-115 WBS2008-70
pp.85-90
WBS, IT, ISEC 2009-03-10
13:00
Hokkaido Hakodate Mirai Univ. Strongly Secure Privacy Amplification Cannot Be Obtained by Encoder of Slepian-Wolf Code
Shun Watanabe, Tsuki Saitou, Ryutaroh Matsumoto, Tomohiko Uyematsu (Tokyo Inst. of Tech.) IT2008-103 ISEC2008-161 WBS2008-116
The privacy amplification is a technique to distill
a secret key from a random variable by a function
so that the dist... [more]
IT2008-103 ISEC2008-161 WBS2008-116
pp.395-400
ISEC 2008-05-16
16:35
Tokyo Kikai-Shinko-Kaikan Bldg. Strongly Unforgeable ID-based Signatures Without Random Oracles
Chifumi Sato (C4 Technology), Takeshi Okamoto, Eiji Okamoto (Univ. of Tsukuba) ISEC2008-15
There is an open problem to construct ID-based signature schemes which satisfy strongly EUF-ID-CMA, without random oracl... [more] ISEC2008-15
pp.99-106
ISEC, SITE, IPSJ-CSEC 2008-07-24
16:10
Fukuoka Fukuoka Institute of System LSI Design Industry Study of Database for information sharing of P2P File Exchange Environment
Masato Terada (Hitachi), Yuichi Miyagawa (CROSSWARP), Masaaki Matsuoka, Takahiro Matsuki (LAC), Tetsuro Kito, Hirofumi Nakakoji (Hitachi)
Recently, there are many problems regarding the P2P file exchange environment on the Internet. The need to reconsider th... [more] ISEC2008-33 SITE2008-27
pp.123-128
ISEC, LOIS 2008-11-13
13:50
Aichi Nagoya Noh Theater Study of e-P.O.Box Basic System for The Social Security Service
Takashi Obi, Masuyoshi Yachida, Joong Sun Lee, Yuji Homma, Nagaaki Ohyama (Tokyo Inst. of Tech.), Takumi Kashiwagi, Hiromasa Kawamura, Eikazu Niwano (Nippon Tetegraph and telephone Corporation) ISEC2008-75 OIS2008-51
It is the current situation that people's social security information is separately managed by each organization and the... [more] ISEC2008-75 OIS2008-51
pp.15-22
ISEC, SITE, IPSJ-CSEC 2008-07-24
17:25
Fukuoka Fukuoka Institute of System LSI Design Industry Study of method for expressing context
Yuhei Yamashita, Hirotsugu Kinoshita (Kanagawa Univ.), Tetsuya Morizumi (TNSi/IIS) ISEC2008-30 SITE2008-24
In the contemporary society that overflows with information, it becomes difficult to treat the flood of information.
T... [more]
ISEC2008-30 SITE2008-24
pp.103-108
WBS, IT, ISEC 2009-03-10
14:40
Hokkaido Hakodate Mirai Univ. Study on Multipulse PPM using Replaced Permutation System for Broadcasting Optical Wireless Communications
Toshiki Kato, Fumie Ono (Yokohama National Univ.), Hiromasa Habuchi (Ibaraki Univ.) IT2008-125 ISEC2008-183 WBS2008-138
In this paper, a repeated permutation multipulse pulse position modulation system for broadcasting optical wireless comm... [more] IT2008-125 ISEC2008-183 WBS2008-138
pp.531-535
ISEC, SITE, IPSJ-CSEC 2008-07-24
16:35
Fukuoka Fukuoka Institute of System LSI Design Industry Study on Reputation Systems for Trusty Information Network
Noriaki Yoshikai (Niohn Univ.) ISEC2008-28 SITE2008-22
 [more] ISEC2008-28 SITE2008-22
pp.89-96
WBS, IT, ISEC 2009-03-10
16:05
Hokkaido Hakodate Mirai Univ. Sufficient Conditions for Convergence of the Sum-Product Decoding
Tomoharu Shibuya (Sophia Univ.) IT2008-110 ISEC2008-168 WBS2008-123
Recently, Mooij et al. proposed sufficient conditions for convergence
of the sum-product algorithm, which was stated as... [more]
IT2008-110 ISEC2008-168 WBS2008-123
pp.441-446
WBS, IT, ISEC 2009-03-09
11:40
Hokkaido Hakodate Mirai Univ. Sum-Product decoding of 3GPP Turbo Code
Toru Anzai, Toshiyuki Shohon, Haruo Ogiwara (Nagaoka Univ. of Tech.) IT2008-63 ISEC2008-121 WBS2008-76
Turbo code has been adopted for the third-generation mobile phone standard (3GPP standard), and it will be adopted for n... [more] IT2008-63 ISEC2008-121 WBS2008-76
pp.123-128
WBS, IT, ISEC 2009-03-10
10:50
Hokkaido Hakodate Mirai Univ. The Distinguishing Attack on the Stream Cipher Consisting of the SPN Structure
Rei Onga, Ryoichi Teramura, Masakatu Morii (Kobe Univ.) IT2008-82 ISEC2008-140 WBS2008-95
The square attack is the key recovery attack on the block cipher like AES and Camellia.
This paper proposes a distingui... [more]
IT2008-82 ISEC2008-140 WBS2008-95
pp.245-251
ISEC 2008-09-12
16:10
Tokyo Kikai-Shinko-Kaikan Bldg. The security analysis using meta-reduction under several computational assumptions in the case of ElGamal encryption
Yutaka Kawai, Kazuo Ohta (UEC) ISEC2008-70
 [more] ISEC2008-70
pp.47-54
WBS, IT, ISEC 2009-03-10
10:15
Hokkaido Hakodate Mirai Univ. Theoretical Analysis of Bit Error Rate for MB-OFDM System in the Presence of Frequency Characteristics between Sub-bands
Ryouhei Kaneko, Fumiaki Maehara (Waseda Univ.) IT2008-117 ISEC2008-175 WBS2008-130
Multiband orthogonal frequency division multiplexing (MB-OFDM) system for ultra wideband (UWB) communication spreads sub... [more] IT2008-117 ISEC2008-175 WBS2008-130
pp.481-485
WBS, IT, ISEC 2009-03-10
09:50
Hokkaido Hakodate Mirai Univ. Theoretical Analysis of Error Rate for IP Packet on Coded OFDM Systems
Yu Komatsu, Fumiaki Maehara (Waseda Univ.) IT2008-116 ISEC2008-174 WBS2008-129
OFDM is one of the promising techniques to realize IP-based broadband wireless communications systems. Since performance... [more] IT2008-116 ISEC2008-174 WBS2008-129
pp.475-479
ISEC, LOIS 2008-11-14
09:55
Aichi Nagoya Noh Theater Theoretical analysis of RC4 PRGA by Using Nonzero Bit Differences
Masahiro Sukegawa, Atsuko Miyaji (Japan Advanced Institute of Science and Technology) ISEC2008-83 OIS2008-59
In this paper, we focus on a shuffle-exchange structure of PRGA.
We investigate how the structure mixes the permutatio... [more]
ISEC2008-83 OIS2008-59
pp.67-72
WBS, IT, ISEC 2009-03-10
09:50
Hokkaido Hakodate Mirai Univ. Theoretical analysis of RC4 PRGA by Using Nonzero Bit Differences with pseudo-colliding key pair (1)
Masahiro Sukegawa, Atsuko Miyaji (JAIST) IT2008-80 ISEC2008-138 WBS2008-93
In this paper, we focus on a keystream of RC4 PRGA. The analysis of the
transitions of two permutations, $S$ and $S'$,... [more]
IT2008-80 ISEC2008-138 WBS2008-93
pp.231-237
WBS, IT, ISEC 2009-03-10
10:15
Hokkaido Hakodate Mirai Univ. Theoretical analysis of RC4 PRGA by Using Nonzero Bit Differences with pseudo-colliding key pair (2)
Mitsuki Ajiro, Masahiro Sukegawa, Atsuko Miyaji (JAIST) IT2008-81 ISEC2008-139 WBS2008-94
In this paper, we focus on a keystream of RC4 PRGA. The analysis of the transitions of two permutations, S and S′,
with... [more]
IT2008-81 ISEC2008-139 WBS2008-94
pp.239-244
WBS, IT, ISEC 2009-03-09
17:10
Hokkaido Hakodate Mirai Univ. TOA UWB Position Estimation with 2 receivers and one known reflector
Jan Kietlinski-Zaleski, Takaya Yamazato, Masaaki Katayama (Nagoya Univ.) IT2008-77 ISEC2008-135 WBS2008-90
Ultra-Wideband is an attractive technology for short range positioning, especially indoors. However, for normal Time of ... [more] IT2008-77 ISEC2008-135 WBS2008-90
pp.211-216
WBS, IT, ISEC 2009-03-10
17:55
Hokkaido Hakodate Mirai Univ. Traffic Data Visualization of a Campus-wide Network
Shun Matsumoto, Takao Miyamoto, Shigeki Aoki, Motoi Iwata, Akira Shiozaki (Osaka Pref. Univ.) IT2008-95 ISEC2008-153 WBS2008-108
Due to increasing number of attacks over the network, it becomes essential for network administrators to properly to kee... [more] IT2008-95 ISEC2008-153 WBS2008-108
pp.335-342
ISEC, SITE, IPSJ-CSEC 2008-07-25
14:15
Fukuoka Fukuoka Institute of System LSI Design Industry Traitor Tracing from ID based Broadcast Encryption
Ryuichi Sakai (OECU) ISEC2008-48
ID based broadcast encryption scheme based on the key setting of Mitsunari-Ssakai-Kasahara
traitor tracing has several... [more]
ISEC2008-48
pp.95-100
WBS, IT, ISEC 2009-03-09
17:35
Hokkaido Hakodate Mirai Univ. Travel Time Forecasting based on Wavelet Method
Yusuke Kakihara, Jun'ichi Takeuchi (Kyushu Univ), Takashi Fujita, Eijen Yao (NEC Corp.), Hiromasa Oka (Mitsubishi Electric Information Network Corp.) IT2008-67 ISEC2008-125 WBS2008-80
A wavelet-based approach for travel time prediction is introduced.It is based on a multiple resolution decomposition
of... [more]
IT2008-67 ISEC2008-125 WBS2008-80
pp.151-156
ISEC, LOIS 2008-11-14
10:20
Aichi Nagoya Noh Theater Uniquely decipherable Rabin cryptosystem with modulus p^kq
Kensuke Takamura, Akira Hayashi (Kanazawa Institute of Technology) ISEC2008-84 OIS2008-60
T. Takagi proposed and analyzed variants of the RSA cryptosystem, in which the modulus is $p^k q$. He also suggested a v... [more] ISEC2008-84 OIS2008-60
pp.73-78
WBS, IT, ISEC 2009-03-10
09:50
Hokkaido Hakodate Mirai Univ. Universal Lossless Source Coding Based on Sequential Grammar Transforms
Masaki Jono, Tomohiko Uyematsu, Ryutaroh Matsumoto (Tokyo Inst. of Tech.) IT2008-98 ISEC2008-156 WBS2008-111
The grammar-based code proposed by Kieffer and Yang is a large class of universal codes.
Usually, the grammar-based cod... [more]
IT2008-98 ISEC2008-156 WBS2008-111
pp.355-362
ISEC, SITE, IPSJ-CSEC 2008-07-24
15:20
Fukuoka Fukuoka Institute of System LSI Design Industry Variable Probabilistic Packet Mareking with TTL for IP Traceback
Tadashi Kiuchi, Yoshiaki Hori, Kouichi Sakurai (Kyushu Univ.)
There are various kinds of menaces that exist within the network. There is a menace called the DoS
attacks in the one o... [more]
ISEC2008-31 SITE2008-25
pp.109-114
ISEC 2008-05-16
09:30
Tokyo Kikai-Shinko-Kaikan Bldg. Verification of a side-channel attack to an AES circuit on SASEBO
Daisaku Minamizaki, Keisuke Iwai, Takakazu Kurokawa (NDA) ISEC2008-1
Recently, the research on the side-channel attack is actively done, and SASEBO board that conformed to the INSTAC32 was ... [more] ISEC2008-1
pp.1-8
WBS, IT, ISEC 2009-03-10
13:50
Hokkaido Hakodate Mirai Univ. Video Watermarking Using Ramp Secret Sharing Scheme
Shingo Saito, Kazuhiko Yamaguchi (Univ. of Electro-Comm) IT2008-105 ISEC2008-163 WBS2008-118
 [more] IT2008-105 ISEC2008-163 WBS2008-118
pp.409-414
ISEC, SITE, IPSJ-CSEC 2008-07-25
15:20
Fukuoka Fukuoka Institute of System LSI Design Industry Watermarking Method with a Quasi-One-Way Function
Kazuo Ohzeki, Engyoku Gi (SIT) ISEC2008-55
This paper describes the one-way function for use in an image watermarking to improve authentication ability. The one-wa... [more] ISEC2008-55
pp.147-154
ISEC 2008-12-17
10:45
Tokyo Kikai-Shinko-Kaikan Bldg. Web Server Software Struture for Scalability
Haruki Mori, Satoshi Ono (Kogakuin Univ.) ISEC2008-90
 [more] ISEC2008-90
pp.7-9
WBS, IT, ISEC 2009-03-09
10:50
Hokkaido Hakodate Mirai Univ. Weighted Cooperative Sensing for Shadowing Enviroments in Cognitive Radio
Kento Nakamura, Tomoaki Ohtsuki (Keio Univ.) IT2008-72 ISEC2008-130 WBS2008-85
In Cognitive radio that is expected for the effective use of frequency, the spectrum sensing method that judges presence... [more] IT2008-72 ISEC2008-130 WBS2008-85
pp.179-184
 Results 1 - 188 of 188  /   
Choose a download format for default settings. [NEW !!]
Text format pLaTeX format CSV format BibTeX format
Copyright and reproduction : All rights are reserved and no part of this publication may be reproduced or transmitted in any form or by any means, electronic or mechanical, including photocopy, recording, or any information storage and retrieval system, without permission in writing from the publisher. Notwithstanding, instructors are permitted to photocopy isolated articles for noncommercial classroom use without fee. (License No.: 10GA0019/12GB0052/13GB0056/17GB0034/18GB0034)


[Return to Top Page]

[Return to IEICE Web Page]


The Institute of Electronics, Information and Communication Engineers (IEICE), Japan