Fri, Sep 17 PM 13:00 - 15:05 |
(1) |
13:00-13:25 |
Study of Security Protocol Analyzer Considering Provable Security |
Shinsaku Kiyomoto, Haruki Ota, Toshiaki Tanaka (KDDI Labs.) |
(2) |
13:25-13:50 |
A trial of GNFS implementation (Part VI)
-- lattice sieve -- |
Kazumaro Aoki, Hiroki Ueda (NTT), Yuji Kida (Rikkyo Univ.) |
(3) |
13:50-14:15 |
A countermeasure against side channel attack using mask logic elements |
Hideo Shimizu (Toshiba) |
(4) |
14:15-14:40 |
Provably Secure Double Block Length Hash Functions with Rate 1/2 |
Shoichi Hirose (Kyoto Univ.) |
(5) |
14:40-15:05 |
Action Research for Timestamp Interoperability |
Yo Ishigaki, Yasushi Matsumoto (SECOM IS Lab.) |
Fri, Sep 17 PM 15:15 - 17:45 |
(6) |
15:15-15:40 |
Improvement of Subset Difference Method Using One-way Function |
Mai Nakagawa (Chiva Univ) |
(7) |
15:40-16:05 |
Trade-off Traitor Tracing |
Goichiro Hanaoka (U. of Tokyo), Kazuto Ogawa, Arisa Fujii, Go Ohtake, Keigo Majima, Kimiyuki Oyamada (NHK), Hideki Imai (U. of Tokyo) |
(8) |
16:05-16:30 |
Proposal of MOCHIGOMA(Piece in Hand) Concept for Multivariate Type Public Key Cryptosystem |
Shigeo Tsujii (iisec), Ryou Fujita (TUS), Kohtaro Tadaki (Chuo U) |
(9) |
16:30-16:55 |
On the Security of the Full-Domain Hash variant of Chaum's Undeniable Signature schemes |
Yoshinari Kobayashi (Chuo Univ.), Taiichi Saito (Tokyo Denki Univ.), Shigeo Tsujii (IISEC) |
(10) |
16:55-17:20 |
New Notions of Security for Public-Key Cryptosystems with Adversarial Random Oracles (Survey) |
Mototsugu Nishioka (HITACHI) |
(11) |
17:20-17:45 |
ID-based Encryption for Directed Acyclic Graph Hierarchies and Applications to Key-evolving Encryption Primitives |
Nuttapong Attrapadung, Goichiro Hanaoka, Kazukuni Kobara, Hideki Imai (Tokyo Univ.) |