===============================================
Technical Committee on Information Security (ISEC)
Chair: Tsutomu Matsumoto (Yokohama National Univ.)
Vice Chair: Toshiaki Tanaka (KDDI Labs.), Koichi Sakurai (Kyushu Univ.)
Secretary: Junji Shikata (Yokohama National Univ.), Tetsuya Izu (Fujitsu Labs.)
Assistant: Tetsu Iwata (Nagoya Univ.)
DATE:
Wed, Dec 12, 2012 13:00 - 17:00
PLACE:
Kikai-Shinko-Kaikan Bldg.(3-5-8, Shiba-kouen, Minato-ku, Tokyo, 105-0011 Japan. 8 min. walk from Kamiya-cho Sta. on Subway Hibiya Line or 10 min. walk from Daimon Sta. both on Subway Asakusa Line and on Oedo Line. http://www.jspmi.or.jp/kaigishitsu/access.html)
TOPICS:
----------------------------------------
Wed, Dec 12 PM ISEC (13:00 - 17:00)
----------------------------------------
(1) 13:00 - 13:25
Notes on Secure and Smooth Typing Password Generation Method using Markov Process
Takuto Tamai, Hiroyuki Inaba (Kyoto Inst. of Technology)
(2) 13:25 - 13:50
An Extention of Reputation System with Secrecy for Negative Feedbacks
Tomoya Nomura, Toru Nakanishi, Kan Watanabe, Nobuo Funabiki (Okayama Univ.)
(3) 13:50 - 14:15
Implementation and Evaluation of a Method for Preventing Unauthorized Data Transmission
Masato Hata, Masato Tanabe, Katsunari Yoshioka, Tsutomu Matsumoto (Yokohama National Univ.)
----- Break ( 15 min. ) -----
(4) 14:30 - 14:55
Generating elliptic curves having efficient endomorphisms suitable for pairing computation and scalar multiplication
Naoki Kanayama, Eiji Okamoto, Kazutaka Saito (Univ. of Tsukuba)
(5) 14:55 - 15:20
The YNU's Method for Acquiring Power-Consumption Traces Developed for DPA Contest v3
Tsutomu Matsumoto, Takeshi Kishikawa, Hitoshi Ono, Shohei Saito, Yuu Tsuchiya (Yokohama Nat'l Univ.), Akihiko Sasaki (MORITA TECH), Tsuyoshi Toyama (Yokohama Nat'l Univ.)
(6) 15:20 - 15:45
A Report on CRYPTO 2012
Shiho Moriai (NICT)
----- Break ( 15 min. ) -----
(7) 16:00 - 16:30
[Invited Talk]
Breaking and Repairing GCM Security Proofs (from CRYPTO 2012)
Tetsu Iwata, Keisuke Ohashi (Nagoya Univ.), Kazuhiko Minematsu (NEC)
(8) 16:30 - 17:00
[Invited Talk]
On the Impossibility of Constructing Efficient Key Encapsulation and Programmable Hash Functions in Prime Order Groups
Goichiro Hanaoka, Takahiro Matsuda (AIST), Jacob Schuldt (RHUL)
# Information for speakers
General Talk will have 20 minutes for presentation and 5 minutes for discussion.
Invited Talk will have 25 minutes for presentation and 5 minutes for discussion.
=== Technical Committee on Information Security (ISEC) ===
# FUTURE SCHEDULE:
Thu, Mar 7, 2013 - Fri, Mar 8, 2013: Kwansei Gakuin Univ., Osaka-Umeda Campus [Thu, Jan 17], Topics: joint meeting of IT, ISEC, and WBS
# SECRETARY:
Tetsu Iwata (Nagoya University)
TEL +81-52-789-5722, FAX +81-52-789-5723
E-mail: ic-c (to ISEC secretaries)
Last modified: 2012-10-19 23:12:50
|
Notification: Mail addresses are partially hidden against SPAM.
|