Committee |
Date Time |
Place |
Paper Title / Authors |
Abstract |
Paper # |
ISEC, IT, WBS |
2008-02-28 10:20 |
Tokyo |
|
A Method to Hide Traffic Flows Using Dummy Packets Mamoru Mimura, Yasuhiro Nakamura (NDA) IT2007-32 ISEC2007-129 WBS2007-63 |
Currently, some traffic analysis technologies with packet capturing are being developed to observe the usage of the netw... [more] |
IT2007-32 ISEC2007-129 WBS2007-63 pp.1-8 |
ISEC, IT, WBS |
2008-02-28 10:45 |
Tokyo |
|
Secure Data Sharing in Mobile Environments Takashi Matsunaka, Takayuki Warabino, Yoji Kishi (KDDI R&D Labs.) IT2007-33 ISEC2007-130 WBS2007-64 |
This paper proposes an approach for sharing data securely on mobile terminals with members of a particular group. In mob... [more] |
IT2007-33 ISEC2007-130 WBS2007-64 pp.9-14 |
ISEC, IT, WBS |
2008-02-28 11:10 |
Tokyo |
|
Random Oracle Model with Inspection of Hash List Kazuki Yoneyama, Satoshi Miyagawa, Kazuo Ohta (UEC) IT2007-34 ISEC2007-131 WBS2007-65 |
[more] |
IT2007-34 ISEC2007-131 WBS2007-65 pp.15-21 |
ISEC, IT, WBS |
2008-02-28 13:00 |
Tokyo |
|
[Invited Talk]
[Invitation Talk] The State of Stream Ciphers Masakatu Morii (Kobe Univ.) IT2007-35 ISEC2007-132 WBS2007-66 |
The author has been working in the field of Network Security and Cryptography. Recently it is in stream cipher. This pap... [more] |
IT2007-35 ISEC2007-132 WBS2007-66 pp.23-30 |
ISEC, IT, WBS |
2008-02-28 14:10 |
Tokyo |
|
[Invited Talk]
Inter-Carrier Interference Cancellation in Mobile Reception of OFDM Makoto Itami (Tokyo Univ. of Sci) IT2007-36 ISEC2007-133 WBS2007-67 |
[more] |
IT2007-36 ISEC2007-133 WBS2007-67 pp.31-37 |
ISEC, IT, WBS |
2008-02-28 15:20 |
Tokyo |
|
[Invited Talk]
Some Results on Secret Key Agreement from Correlated Source Outputs Jun Muramatsu (NTT) IT2007-37 ISEC2007-134 WBS2007-68 |
We consider the situation in which legitimate users Alice and Bob and an eavesdropper Eve each has access to a correlate... [more] |
IT2007-37 ISEC2007-134 WBS2007-68 pp.39-44 |
ISEC, IT, WBS |
2008-02-28 16:30 |
Tokyo |
|
A Knapsack Cryptosystem Using Two Operations (part 2) Kunikatsu Kobayashi, Atsushi Igarashi (Yamagata Univ.) IT2007-38 ISEC2007-135 WBS2007-69 |
We propose a knapsack cryptosystem using two operations addition and multiplication. This knapsack cryptosystem is proof... [more] |
IT2007-38 ISEC2007-135 WBS2007-69 pp.45-48 |
ISEC, IT, WBS |
2008-02-28 16:55 |
Tokyo |
|
A Study on Error Correction Using Block Turbo Codes in Key Agreement Scheme Based on Radio Propagation Takayuki Shimizu, Hisato Iwai, Hideichi Sasaoka (Doshisha Univ.) IT2007-39 ISEC2007-136 WBS2007-70 |
As a countermeasure scheme against eavesdroppers in wireless communications,
key agreement schemes, using an
ESPAR (El... [more] |
IT2007-39 ISEC2007-136 WBS2007-70 pp.49-54 |
ISEC, IT, WBS |
2008-02-28 17:20 |
Tokyo |
|
Conditions for Achieving a Revocable Network Coding Scheme Hidenori Kuwakado, Masakatu Morii (Kobe Univ.) IT2007-40 ISEC2007-137 WBS2007-71 |
In this paper,
we introduce the concept of revocation into network coding.
The revocation means that
a source can ... [more] |
IT2007-40 ISEC2007-137 WBS2007-71 pp.55-58 |
ISEC, IT, WBS |
2008-02-28 17:45 |
Tokyo |
|
A Study on Efficient Scalar Multiplication for Elliptic Curve Cryptosystems Naoya Terashima, Tomoko K. Matsushima, Osamu Ashihara (Polytechnic Univ.) IT2007-41 ISEC2007-138 WBS2007-72 |
Efficient elliptic curve arithmetic is crucial for cryptosystems based on elliptic curves. Such cryptosystems often requ... [more] |
IT2007-41 ISEC2007-138 WBS2007-72 pp.59-66 |
ISEC, IT, WBS |
2008-02-28 10:45 |
Tokyo |
|
Secret key can be obtained from both compatible and incompatible measurements in the six-state QKD protocol Ryutaroh Matsumoto (Tokyo Inst. of Tech.) IT2007-43 ISEC2007-140 WBS2007-74 |
We give an example of a quantum channel over which
the six-state quantum key distribution protocol
allows the legitima... [more] |
IT2007-43 ISEC2007-140 WBS2007-74 pp.73-75 |
ISEC, IT, WBS |
2008-02-28 11:10 |
Tokyo |
|
Adaptive Sum-Product decoding to estimate the state of the channel Kenji Aikawa, Brian Kurkoski, Kazuhiko Yamaguchi (UEC) IT2007-44 ISEC2007-141 WBS2007-75 |
The combination of LDPC codes and sum-product decoding algorithm can
achieve performance near the Shannon limit. Howeve... [more] |
IT2007-44 ISEC2007-141 WBS2007-75 pp.77-82 |
ISEC, IT, WBS |
2008-02-28 11:35 |
Tokyo |
|
A Decoding Algorithm and its Analysis for Low-Density Parity-Check Codes with Unequal-Error Protection Capabilities Makoto Nurita, Brian Kurkoski, Kazuhiko Yamaguchi (UEC) IT2007-45 ISEC2007-142 WBS2007-76 |
Unequal-error protection codes have two or more levels of the error protection capability, and code bits can be protecte... [more] |
IT2007-45 ISEC2007-142 WBS2007-76 pp.83-88 |
ISEC, IT, WBS |
2008-02-28 16:30 |
Tokyo |
|
An iterative signal detection scheme for MIMO SC-FDE using ISI canceller and MLD Masakazu Utsunomiya, Yasunori Iwanami, Eiji Okamoto (Nagoya Inst. of Tech) IT2007-46 ISEC2007-143 WBS2007-77 |
In this paper we have proposed a novel receiver structure using SC-FDE (Single-Carrier Frequency Domain Equalization), w... [more] |
IT2007-46 ISEC2007-143 WBS2007-77 pp.89-94 |
ISEC, IT, WBS |
2008-02-28 16:55 |
Tokyo |
|
A Single-Carrier Transmission Method with Frequency-Domain Equalizing and Space-Time Block Coding Shinichiro Miyazaki, Shoichiro Yamasaki (Polytechnic Univ.), Ryuji Kohno (Yokohama National Univ.) IT2007-47 ISEC2007-144 WBS2007-78 |
A single career transmission method with frequency domain equalization is excellent in respect that the amplitude variab... [more] |
IT2007-47 ISEC2007-144 WBS2007-78 pp.95-98 |
ISEC, IT, WBS |
2008-02-28 17:20 |
Tokyo |
|
The theoretical analysis of the slot selection push-type packet compensation protocol for the broadcasting system. Koichiro Hashiura, Hiromasa Habuchi (Ibaraki Univ) IT2007-48 ISEC2007-145 WBS2007-79 |
The purpose of this paper, to analyze the performance of the packet compensation protocol with slot selection. The slot ... [more] |
IT2007-48 ISEC2007-145 WBS2007-79 pp.99-103 |
ISEC, IT, WBS |
2008-02-29 08:30 |
Tokyo |
|
High-Precision Differential Side-channel Analysis Using Band-Pass Filter Toru Hisakado, Noritaka Yamashita, Tomoyasu Suzaki, Yukiyasu Tsunoo (NEC), Takahiko Shouji, Akira Nozawa, Takayuki Kimura (YDK) IT2007-49 ISEC2007-146 WBS2007-80 |
In this paper, we describe high-precision method for differential side-channel analysis(DSCA) using a band-pass filter. ... [more] |
IT2007-49 ISEC2007-146 WBS2007-80 pp.1-6 |
ISEC, IT, WBS |
2008-02-29 08:55 |
Tokyo |
|
Security evaluation of Enocoro-128 ver.1.1 against resynchronization attack Kei Konosu, Kenichiro Muto, Hiroki Furuichi (TUS), Dai Watanabe (Hitachi), Toshinobu Kaneko (TUS) IT2007-50 ISEC2007-147 WBS2007-81 |
Enocoro is a pseudorandom number generator for a stream cipher proposed by Hitachi,Ltd at ISEC in September, 2007.
In... [more] |
IT2007-50 ISEC2007-147 WBS2007-81 pp.7-13 |
ISEC, IT, WBS |
2008-02-29 09:20 |
Tokyo |
|
Side Channel Attacks from Signal Lines of Cryptographic Modules
-- Experiments for FPGA-Implemented AES -- Ryota Watanabe, Makoto Torikoshi, Yoshio Takahashi, Tsutomu Matsumoto (Yokohama National Univ.) IT2007-51 ISEC2007-148 WBS2007-82 |
[more] |
IT2007-51 ISEC2007-148 WBS2007-82 pp.15-22 |
ISEC, IT, WBS |
2008-02-29 09:45 |
Tokyo |
|
Security Analysis of DRBG Algorithm in NIST SP 800-90 Shoichi Hirose (Univ. of Fukui) IT2007-52 ISEC2007-149 WBS2007-83 |
We discuss the security of HMAC_DRBG specified in NIST SP 800-90.
We show that HMAC_DRBG is a pseudorandom bit generato... [more] |
IT2007-52 ISEC2007-149 WBS2007-83 pp.23-28 |