|
|
Technical Committee on Information Security (ISEC) (Searched in: 2015)
|
|
Search Results: Keywords 'from:2015-05-15 to:2015-05-15'
|
[Go to Official ISEC Homepage (Japanese)] |
Search Results: Conference Papers |
Conference Papers (Available on Advance Programs) (Sort by: Date Ascending) |
|
Committee |
Date Time |
Place |
Paper Title / Authors |
Abstract |
Paper # |
ISEC |
2015-05-15 13:30 |
Tokyo |
Kikai-Shinko-Kaikan Bldg. |
Proposal for Multivariate Public Key Cryptosystem Based on the Difficulty of 3 Prime Numbers Factorization Problem Shigeo Tsujii, Kohtaro Tadaki, Ryo Fujita, Masahito Gotaishi (Chuo-U) ISEC2015-1 |
[more] |
ISEC2015-1 pp.1-7 |
ISEC |
2015-05-15 13:55 |
Tokyo |
Kikai-Shinko-Kaikan Bldg. |
Truncated Differential Attack on Block Cipher PRINCE Satoshi Setoguchi (Kagoshima Univ), Yasutaka Igarashi, Toshinobu Kaneko (Tokyo Univ of Science), Seiji Fukushima, Tomohiro Hachino (Kagoshima Univ) ISEC2015-2 |
PRINCE is an SPN-type 64-bit block cipher with a 128-bit key in 2012 proposed by Borghoff et al. [1]. The number of roun... [more] |
ISEC2015-2 pp.9-14 |
ISEC |
2015-05-15 14:35 |
Tokyo |
Kikai-Shinko-Kaikan Bldg. |
Path analysis method of anonymous communication system Tor Yukihiro Shibahara, Naoshi Sato (IISEC) ISEC2015-3 |
Anonymous communication system looks effective for the privacy protection because it could assure anonymity of path from... [more] |
ISEC2015-3 pp.15-22 |
ISEC |
2015-05-15 15:00 |
Tokyo |
Kikai-Shinko-Kaikan Bldg. |
Cheating detectable multi-use password protected secret sharing secure against active adversary Atsunori Ichikawa, Wakaha Ogata (TIT) ISEC2015-4 |
(To be available after the conference date) [more] |
ISEC2015-4 pp.23-30 |
ISEC |
2015-05-15 15:25 |
Tokyo |
Kikai-Shinko-Kaikan Bldg. |
On the Security of QUIC Masaya Iseki (titech), Eiichiro Fujisaki (NTT) ISEC2015-5 |
We study the security of Quick UDP Internet Connections (QUIC for short) --
an experimental transport layer network pro... [more] |
ISEC2015-5 pp.31-38 |
ISEC |
2015-05-15 16:05 |
Tokyo |
Kikai-Shinko-Kaikan Bldg. |
[Invited Talk]
All-But-Many Encryption
-- A New Framework for Fully-Equipped UC Commitments -- Eiichiro Fujisaki (NTT) ISEC2015-6 |
In this invited talk, we introduce our recent result presented with the same title at international cryptographic confer... [more] |
ISEC2015-6 p.39 |
ISEC |
2015-05-15 16:35 |
Tokyo |
Kikai-Shinko-Kaikan Bldg. |
[Invited Talk]
Black-Box Separations for One-More (Static) Problems and Its Generalization Jiang Zhang, Zhenfeng Zhang, Yu Chen, Yanfei Guo (CAS), Zongyang Zhang (AIST) ISEC2015-7 |
We will present our ASIACRYPT 2014 paper about the hardness of one-more problems. As previous works only deal with one-m... [more] |
ISEC2015-7 p.41 |
ISEC |
2015-05-15 17:05 |
Tokyo |
Kikai-Shinko-Kaikan Bldg. |
[Invited Talk]
Order-Preserving Encryption Secure Beyond One-Wayness Isamu Teranishi (NEC), Moti Yung, Tal Malkin (Columbia Univ.) ISEC2015-8 |
[more] |
ISEC2015-8 p.43 |
|
|
|
Copyright and reproduction :
All rights are reserved and no part of this publication may be reproduced or transmitted in any form or by any means, electronic or mechanical, including photocopy, recording, or any information storage and retrieval system, without permission in writing from the publisher. Notwithstanding, instructors are permitted to photocopy isolated articles for noncommercial classroom use without fee. (License No.: 10GA0019/12GB0052/13GB0056/17GB0034/18GB0034)
|
[Return to Top Page]
[Return to IEICE Web Page]
|