IEICE Technical Committee Submission System
Advance Program
Online Proceedings
[Sign in]
Tech. Rep. Archives
 Go Top  Go Back   Prev ISEC Conf / Next ISEC Conf [HTML] / [HTML(simple)] / [TEXT]  [Japanese] / [English] 


Technical Committee on Information Security (ISEC) [schedule] [select]
Chair Tsutomu Matsumoto (Yokohama National Univ.)
Vice Chair Toshiaki Tanaka (KDDI Labs.), Koichi Sakurai (Kyushu Univ.)
Secretary Junji Shikata (Yokohama National Univ.), Tetsuya Izu (Fujitsu Labs.)
Assistant Tetsu Iwata (Nagoya Univ.)

Conference Date Wed, Dec 12, 2012 13:00 - 17:00
Topics  
Conference Place Kikai-Shinko-Kaikan Bldg. 
Address 3-5-8, Shiba-kouen, Minato-ku, Tokyo, 105-0011 Japan
Transportation Guide 8 min. walk from Kamiya-cho Sta. on Subway Hibiya Line or 10 min. walk from Daimon Sta. both on Subway Asakusa Line and on Oedo Line
http://www.jspmi.or.jp/kaigishitsu/access.html
Copyright
and
reproduction
All rights are reserved and no part of this publication may be reproduced or transmitted in any form or by any means, electronic or mechanical, including photocopy, recording, or any information storage and retrieval system, without permission in writing from the publisher. Notwithstanding, instructors are permitted to photocopy isolated articles for noncommercial classroom use without fee. (License No.: 10GA0019/12GB0052/13GB0056/17GB0034/18GB0034)

Wed, Dec 12 PM  ISEC
13:00 - 17:00
(1) 13:00-13:25 Notes on Secure and Smooth Typing Password Generation Method using Markov Process ISEC2012-72 Takuto Tamai, Hiroyuki Inaba (Kyoto Inst. of Technology)
(2) 13:25-13:50 An Extention of Reputation System with Secrecy for Negative Feedbacks ISEC2012-73 Tomoya Nomura, Toru Nakanishi, Kan Watanabe, Nobuo Funabiki (Okayama Univ.)
(3) 13:50-14:15 Implementation and Evaluation of a Method for Preventing Unauthorized Data Transmission ISEC2012-74 Masato Hata, Masato Tanabe, Katsunari Yoshioka, Tsutomu Matsumoto (Yokohama National Univ.)
  14:15-14:30 Break ( 15 min. )
(4) 14:30-14:55 Generating elliptic curves having efficient endomorphisms suitable for pairing computation and scalar multiplication ISEC2012-75 Naoki Kanayama, Eiji Okamoto, Kazutaka Saito (Univ. of Tsukuba)
(5) 14:55-15:20 The YNU's Method for Acquiring Power-Consumption Traces Developed for DPA Contest v3 ISEC2012-76 Tsutomu Matsumoto, Takeshi Kishikawa, Hitoshi Ono, Shohei Saito, Yuu Tsuchiya (Yokohama Nat'l Univ.), Akihiko Sasaki (MORITA TECH), Tsuyoshi Toyama (Yokohama Nat'l Univ.)
(6) 15:20-15:45 A Report on CRYPTO 2012 ISEC2012-77 Shiho Moriai (NICT)
  15:45-16:00 Break ( 15 min. )
(7) 16:00-16:30 [Invited Talk]
Breaking and Repairing GCM Security Proofs (from CRYPTO 2012) ISEC2012-78
Tetsu Iwata, Keisuke Ohashi (Nagoya Univ.), Kazuhiko Minematsu (NEC)
(8) 16:30-17:00 [Invited Talk]
On the Impossibility of Constructing Efficient Key Encapsulation and Programmable Hash Functions in Prime Order Groups ISEC2012-79
Goichiro Hanaoka, Takahiro Matsuda (AIST), Jacob Schuldt (RHUL)

Announcement for Speakers
General TalkEach speech will have 20 minutes for presentation and 5 minutes for discussion.
Invited TalkEach speech will have 25 minutes for presentation and 5 minutes for discussion.

Contact Address and Latest Schedule Information
ISEC Technical Committee on Information Security (ISEC)   [Latest Schedule]
Contact Address Tetsu Iwata (Nagoya University)
TEL +81-52-789-5722, FAX +81-52-789-5723
E--mail: ic-c (to ISEC secretaries) 


Last modified: 2012-10-19 23:12:50


Notification: Mail addresses are partially hidden against SPAM.

[Download Paper's Information (in Japanese)] <-- Press download button after click here.
 
[Cover and Index of IEICE Technical Report by Issue]
 

[Presentation and Participation FAQ] (in Japanese)
 

[Return to ISEC Schedule Page]   /  
 
 Go Top  Go Back   Prev ISEC Conf / Next ISEC Conf [HTML] / [HTML(simple)] / [TEXT]  [Japanese] / [English] 


[Return to Top Page]

[Return to IEICE Web Page]


The Institute of Electronics, Information and Communication Engineers (IEICE), Japan