IEICE Technical Report

Print edition: ISSN 0913-5685      Online edition: ISSN 2432-6380

Volume 111, Number 124

Social Implications of Technology and Information Ethics

Workshop Date : 2011-07-12 - 2011-07-13 / Issue Date : 2011-07-05

[PREV] [NEXT]

[TOP] | [2008] | [2009] | [2010] | [2011] | [2012] | [2013] | [2014] | [Japanese] / [English]

[PROGRAM] [BULK PDF DOWNLOAD]


Table of contents

SITE2011-6
Carrier Screen Images Decoding with an Ordinary Digital Camera
Rui Shogenji, Junji Ohtsubo (Shizuoka Univ.)
pp. 1 - 6

SITE2011-7
Recovery of Tampered Pixels for Statistical Fragile Watermarking
Maki Yoshida, Kazuya Ohkita, Toru Fujiwara (Osaka Univ.)
pp. 7 - 12

SITE2011-8
Bias Equalizer for Tracing Algorithm of Binary Fingerprinting Codes
Minoru Kuribayashi (Kobe Univ.)
pp. 13 - 18

SITE2011-9
Proposal of 3D Visualization Method for IDS Considering Order Relation of IP addresses
Shunichi Mizoguchi, Hiroyuki Inaba (KIT)
pp. 19 - 24

SITE2011-10
Study on person profile about coping behavior under virus infected situation
Hiroaki Kanda, Noriaki Yoshikai, Shun-ichi Kurino (Nihon University)
pp. 25 - 30

SITE2011-11
Cloud Computing Market Expansion and Risk management in U.S. and an analysis of the consensus building factors -- from the perspective of networking incentive of actors --
Ema Tanaka (FMMC)
pp. 31 - 38

SITE2011-12
Matsumoto-Imai Signature by Dual Perturbation -- Two new Modifiers --
Masahito Gotaishi, Shigeo Tsujii (Chuo Univ.)
pp. 79 - 83

SITE2011-13
A Note on Security of (u|u+v) Σ PKC against Low-Density Attack
Yasuyuki Murakami (Osaka Electro-Comm. Univ.), Masao Kasahara (Osaka Gakuin Univ.)
pp. 85 - 90

SITE2011-14
A Low Density Multiple Choice Knapsack Cryptosystem
Akira Hayashi, Toshihiro Koike (KIT)
pp. 91 - 96

SITE2011-15
The proposal of the evaluation for decryption failure about GGH series
Yosuke Todo, Masakatu Morii (Kobe Univ.)
pp. 97 - 102

SITE2011-16
Security Evaluation of HyRAL against Saturation Cryptanalysis(II)
Naoki Shibayama, Yasutaka Igarashi, Toshinobu Kaneko, Seiichiro Hangai (Tokyo Univ. of Science)
pp. 103 - 109

SITE2011-17
Strongly Asymmetric Public Key Agreement Algorithms
Luigi Accardi (Roma II Univ.), Satoshi Iriyama (Tokyo Univ. of Science), Massimo Regoli (Roma II Univ.), Masanori Ohya (Tokyo Univ. of Science)
pp. 111 - 114

SITE2011-18
Strongly Asymmetric PKD Cryptographic Algorithms -- an implementation using the matrix model --
Luigi Accardi (Roma II Univ.), Satoshi Iriyama (Tokyo Univ. of Science), Massimo Regoli (Roma II Univ.), Masanori Ohya (Tokyo Univ. of Science)
pp. 115 - 121

SITE2011-19
On Usage of Practical Web Application Source Code for Learning Support on Secure Coding
Ryosuke Miyaji, Seikoh Nishita (Takushoku Univ)
pp. 123 - 129

SITE2011-20
Public Key Cryptosystems Constructed Based on Cyclic Codes, Realizing Coding Rate of Exactly 1.0, K(XI)SE(g)PKC and K(XII)SE(g)PKC
Masao Kasahara (Osaka Gakuin Univ.)
pp. 131 - 136

SITE2011-21
Construction of New Classes of Product-Sum Type Public Key Cryptosystem, K(IV)ΣPKC and K(I)ΣΠPKC
Masao Kasahara (Osaka Gakuin Univ)
pp. 137 - 144

SITE2011-22
Memory saving implementation of Cyclic Vector Multiplication Algorithm
Ryosuke Takahashi, Kenta Nekado, Yusuke Takai, Yasuyuki Nogami, Hiroto Kagotani (Okayama Univ.), Takashi Narita (TEL)
pp. 145 - 150

SITE2011-23
Solving DLP with Auxiliary Input over an Elliptic Curve Used in TinyTate Library (Part II)
Yumi Sakemi, Tetsuya Izu, Masahiko Takenaka, Masaya Yasuda (Fujitsu Labs)
pp. 151 - 158

Note: Each article is a technical report without peer review, and its polished version will be published elsewhere.


The Institute of Electronics, Information and Communication Engineers (IEICE), Japan