Wed, Dec 11 PM 13:00 - 17:40 |
(1) |
13:00-13:25 |
Presentations of a general augmentation scheme, K(V)Scheme, for strengthening several classes of PKC and a new class of system oriented PKC, K(I)SOPKC |
Masao Kasahara (Waseda Univ./Chuo Univ.) |
(2) |
13:25-13:50 |
A novel proposal of $q$-SVD domain for blind watermarking |
Ta Minh Thanh (Tokyo Inst. of Tech.), Ta Minh Tam (VSTV) |
(3) |
13:50-14:15 |
Possibility of the Address Overlap Dos Attack in Live Migration |
Kensuke Kasahara, Satoshi Ono (Kogakuin Univ.) |
(4) |
14:15-14:40 |
Difference of the detection rate of the template in the modified non-overlapping template matching test |
Yuichi Takeda (Kanagawa Inst. of Tech.), Mituaki Huzii, Toshinari Kamakura, Norio Watanabe (Chuo Univ.) |
|
14:40-14:55 |
Break ( 15 min. ) |
(5) |
14:55-15:20 |
The Process by which Faults are Injected on Smart Cards Attacked by an Electromagnetic Irradiation Experiment |
Yuu Tsuchiya, Hitoshi Ono, Tsutomu Matsumoto (Yokohama National Univ.) |
(6) |
15:20-15:45 |
Education for Practical Hardware Security Based on Information Security Education Program |
Yu-ichi Hayashi, Naofumi Homma (Tohoku Univ.), Toshihiro Katashita (AIST), Hideaki Sone (Tohoku Univ.) |
(7) |
15:45-16:10 |
Another Vulnerability in a Cancelable Biometrics Authentication Scheme |
Tetsuya Izu, Yumi Sakemi, Masahiko Takenaka, Naoya Torii (Fijitsu Labs.) |
|
16:10-16:25 |
Break ( 15 min. ) |
(8) |
16:25-16:50 |
A Storage Encryption Scheme: Unconditionally Secure Encryption of Unlimited Number of Keys using A Fixed Secret (Part 2) |
Kazuomi Oishi (Shizuoka Inst. of Science and Tech.) |
(9) |
16:50-17:15 |
A Study on An Analysis Prevention Scheme for Embedded System Firmware |
Kazuomi Oishi (Shizuoka Inst. of Science and Tech.) |
(10) |
17:15-17:40 |
Report on PQCrypto2013 |
Takanori Yasuda (ISIT) |