IEICE Technical Committee Submission System
Advance Program
Online Proceedings
[Sign in]
Tech. Rep. Archives
 Go Top  Go Back   / Next IPSJ-CSEC Conf [HTML] / [HTML(simple)] / [TEXT]  [Japanese] / [English] 


Technical Committee on Information Security (ISEC) [schedule] [select]
Chair Akira Hayashi
Vice Chair Shinichi Kawamura, Masakatsu Morii
Secretary Atsushi Fujioka, Shoichi Hirose
Assistant Hiroshi Doi

Conference Date Tue, Jul 20, 2004 09:55 - 17:30
Wed, Jul 21, 2004 09:15 - 16:50
Topics  
Conference Place  
Transportation Guide http://www.e.tokushima-u.ac.jp/Access/0-access.htm
Contact
Person
森井昌克(088-656-9446),毛利公美(088-656-7487)

Tue, Jul 20 AM  A1-1
09:55 - 12:00
(1) 09:55-10:20 A Method for Checking the Parity of (#E-1)/2 Mayumi Obara, Yasuyuki Nogami, Yoshitaka Morikawa (Okayama Univ.)
(2) 10:20-10:45 A fast square root computation in extension fields F.Wang, Yasuyuki Nogami, Yoshitaka Morikawa (Okayama Univ.)
(3) 10:45-11:10 A Hardware Organization of Modular Multiplication for RSA Cryptosystem Yi Ge, Takao Sakurai (Univ. of Tokyo), Koki Abe (UEC), Shuichi Sakai (Univ. of Tokyo)
(4) 11:10-11:35 Implementable Quantum Bit String Commitment Toyohiro Tsurumaru (Mitsubishi Electirc)
(5) 11:35-12:00 A More Efficient Modification of KASUMI Type Pseudorandom Permutations Wonil LEE, Kouichi Sakurai (Kyushu Univ.), Seokhie Hong, Sangjin Lee (CIST,Korea Univ.)
Tue, Jul 20 PM  A1-2
13:30 - 17:30
(6) 13:30-13:55 Some Extensions of Multi-Variate Public Key Cryptosystems Ryuichi Sakai (Osaka Electro-Communication Univ.), Masao Kasahara (Osaka Gakuin Univ.)
(7) 13:55-14:20 A Construction of Public Key Cryptosystem based on Random Singular and Non-singular Simultaneous Equations over Extension Field Masao Kasahara (Osaka Gakuin Univ.), Ryuichi Sakai (Osaka Electro-Communication Univ.)
(8) 14:20-14:45 Cryptanalysis of the TSP cryptosystem over the Gaussian integers Akira Hayashi (Kanazawa Inst of Tech)
(9) 14:45-15:10 A secure generic conversion to CCA-secure encryption and relatied problems Eiichiro Fujisaki (NTT Labs)
(10) 15:10-15:35 Optimal Security Proof for PFDH under Strong Existential Unforgeability Bagus Santoso, Kazuo Ohta, Noboru Kunihiro (UEC)
  15:35-15:50 Break ( 15 min. )
(11) 15:50-16:15 An Analysis of Feasibility for the Factoring Device TWIRL (I) Tetsuya Izu, Kouichi Itoh, Jun Kogure, Kiyoshi Kohiyama, Takeshi Shimoyama, Masahiko Takenaka, Naoya Torii, Shouichi Masui (Fujitsu Lab. LTD.), Kenji Mukaida (Fujitsu)
(12) 16:15-16:40 An Analysis of Feasibility for the Factoring Device TWIRL (II) Tetsuya Izu, Kouichi Itoh, Jun Kogure, Kiyoshi Kohiyama, Takeshi Shimoyama, Masahiko Takenaka, Naoya Torii, Shouichi Masui (Fujitsu Lab.), Kenji Mukaida (Fujitsu)
(13) 16:40-17:05 A trial of GNFS implementation (Part V)
-- Speeding up sieving using bucket sort --
Kazumaro Aoki, Hiroki Ueda (NTT)
(14) 17:05-17:30 On validation testing for block cipher modules Jun Yajima, Masahiko Takenaka, Takeshi Shimoyama (FUJITSU LAB.)
Tue, Jul 20 AM  B1-1
09:55 - 12:00
(15) 09:55-10:20 Implementation of Damage Prediction System of Unlawful Access by Event Dependent Model Ryoji Hasui (The Univ. of Tokushima), Yoshiaki Shiraishi (Kinki Univ.), Masakatu Morii (The Univ. of Tokushima)
(16) 10:20-10:45 An Assessment of Wireless Location Privacy Risks in High Precision Positioning System Huang Leping (Nokia), Kaoru Sezaki (Univ. of Tokyo)
(17) 10:45-11:10 A Proposal of Congestion DoS Attack Avoidance System to which Mobile IPv6 Technology Applied Takayoshi Kusaka, Tatsuya Baba, Masataka Kado, Tsutomu Inada (NTT Data Corp.)
(18) 11:10-11:35 A Policy-based Automated Handling Mechanism for Network Security Events Shin Shirahata, Masaki Minami, Jun Murai (KEIO Univ.)
(19) 11:35-12:00 Intrusion Detection System to Detect Variant Attacks Using Learning Algorithms with Automatic Generation of Training Data Akira Yamada, Yutaka Miyake, Keisuke Takemori, Toshiaki Tanaka (KDDI Labs.)
Tue, Jul 20 PM  B1-2
13:30 - 17:30
(20) 13:30-13:55 Secure Double Block Length Hash Functions Based on Abreast/Tandem Davies-Meyer Shoichi Hirose (Kyoto Univ.)
(21) 13:55-14:20 Implementation and Evaluation of Illegal Copy Protection for Multicast Contents Delivery Masaki Inamura, Toshiaki Tanaka (KDDI R&D Labs.)
(22) 14:20-14:45 Reducing Frequency of Communication on the Consignment Delivering System Protecting Marketing Information Akira Fujiwara, Shingo Okamura, Maki Yoshida, Toru Fujiwara (Osaka Univ.)
(23) 14:45-15:10 A Secure Traitor Tracing Scheme against Key Exposure Kazuto Ogawa, Arisa Fujii, Go Ohtake (NHK), Goichiro Hanaoka, Hideki Imai (U. of Tokyo), Keigo Majima, Kimiyuki Oyamada (NHK)
(24) 15:10-15:35 A report on 3rd annual PKI R&D workshop Satoshi Koga (Kyushu Univ.), Hiroaki Kikuchi (Tokai Univ.)
  15:35-15:50 Break ( 15 min. )
(25) 15:50-16:15 Certification of Program Execution by Tamper Resistant CPU Atsuya Okazaki, Masaki Nakanishi, Shigeru Yamashita, Katsumasa Watanabe (NAIST)
(26) 16:15-16:40 A proposal for protection of low-cost RFID tags using trusted devices Jose Francisco Guevara Vera (Univ. Politécnica de Valencia), Hiroshi Honjo (NTT Data)
(27) 16:40-17:05 A CHAP authentication with a key extracted from a fingerprint Yoichi Shibata (Shizuoka Univ.), Itsukazu Nakamura (Beijin NTT data), Masahiro Mimura, Kenta Takahashi (Hitachi, Ltd), Masakatsu Nishigaki (Shizuoka Univ.)
(28) 17:05-17:30 A consideration from the peculiarity of a handwriting about the anonymity of a handwriting Norihisa Segawa (Iwate Prefectural University), Yuko Murayama (IPU), Masatoshi Miyazaki (Digitally Advanced Integrated Solutions Labs), Yoshiaki Nemoto (Tohoku University)
Wed, Jul 21 AM  A2-1
09:15 - 12:00
(1) 09:15-09:40 Mathematical Modeling and Analysis of Computer Virus Diffusion Process Masato Uchida, Daisuke Satoh (NTT)
(2) 09:40-10:05 An E-mail Virus Diffusion Model Daisuke Satoh, Masato Uchida, Keisuke Ishibashi (NTT), Makoto Kobayashi (NSP)
(3) 10:05-10:30 A proposal of estimation method of worm's infection magnitude by using site level valnerability profiling Kanba Koizumi (Keio Univ), Hideki Koike (Univ Electro-commnicatinos), Tetuji Takada (Sony CSL), Michiaki Yasumura (Keio Univ)
  10:30-10:45 Break ( 15 min. )
(4) 10:45-11:10 Protecting Memories in Multitask OSes -- A Cryptographic Memory System for Resource-poor Platforms Yu Inamura, Toru Egashira, Atsushi Takeshita (NTT DoCoMo)
(5) 11:10-11:35 Protecting Memories in Multitask OSes
-- Tampering Detection --
Toru Egashira, Yu Inamura, Atsushi Takeshita (NTT DoCoMo)
(6) 11:35-12:00 Implementation of Secure Seamless Roaming Method by IPsec/IKE Shingo Fujimoto, Masahiko Takenaka (FUJITSU LTD.)
Wed, Jul 21 PM  A2-2
13:15 - 16:50
(7) 13:15-13:40 A Note on Probabilistic Internal-State Reconstruction Method to Stream Ciphers with Time-variant Tables Toshihiro Ohigashi (The Univ. of Tokushima), Yoshiaki Shiraishi (Kinki Univ.), Masakatu Morii (The Univ. of Tokushima)
(8) 13:40-14:05 SSSM: A New Key Stream Generator with Time-variant Tables Sanzo Ugawa, Toshihiro Ohigashi (The Univ. of Tokushima), Yoshiaki Shiraishi (Kinki Univ.), Masakatu Morii (The Univ. of Tokushima)
(9) 14:05-14:30 Analysis and Evaluation of Guess-and-Determine Attacks on Clock Controlled Stream Ciphers Shinsaku Kiyomoto, Toshiaki Tanaka (KDDI Labs.), Kouichi Sakurai (Kyushu Univ.)
(10) 14:30-14:55 A Study on the DFT Test in NIST SP800-22 Hisashi Yamamoto, Toshinobu Kaneko (T.U.S)
  14:55-15:10 Break ( 15 min. )
(11) 15:10-15:35 The mechanism of DPRP in Flexible Private Network Hidekazu Suzuki, Akira Watanabe (Meijo Univ.)
(12) 15:35-16:00 The Proposal of Practical Cipher Communication Systems Shinya Masuda, Akira Watanabe (Meijo Univ.)
(13) 16:00-16:25 Researches on Detection Method of Island Hop in Flexible Private Network Daisuke Takeo, Akira Watanabe (Meijo Univ.)
(14) 16:25-16:50 A Loosely Managed Privacy Protection Method using Information Entropy Miyuki Imada, Koichi Takasugi, Masakatsu Ohta (NTT)
Wed, Jul 21 AM  B2-1
09:40 - 12:00
(15) 09:40-10:05 Development of DPA evaluation platform for 8 bit processor Koichi Fujisaki, Yuki Tomoeda, Hideyuki Miyake, Yuichi Komano, Atsushi Shimbo, Shinichi Kawamura (Toshiba)
(16) 10:05-10:30 Side Channel Attacks on XTR and Efficient Countermeasures DongGuk Han (kyushu Univ.), Jongin Lim (Korea Univ.), Kouichi Sakurai (Kyushu univ.)
  10:30-10:45 Break ( 15 min. )
(17) 10:45-11:10 Evaluation of DPA by Logic Simulation and Construction of Leake Models Minoru Saeki, Daisuke Suzuki (Mitsubishi Electric Corp), Tetsuya Ichikawa (MEE)
(18) 11:10-11:35 An Attack on Cryptographic Hardware Design with Data Masking Method Tetsuya Ichikawa (MEE), Daisuke Suzuki, Minoru Saeki (Mitsubishi Electric Corp)
(19) 11:35-12:00 Countermeasure against DPA Considering Transition Probabilities Daisuke Suzuki, Minoru Saeki (Mitsubishi Electric Corp.), Tetsuya Ichikawa (MEE)
Wed, Jul 21 PM  B2-2
13:15 - 16:25
(20) 13:15-13:40 An Electronic Weighted Voting Protocol with Tallying Cost Reduced Shinji Nakatake, Toru Nakanishi, Nobuo Funabiki, Yuji Sugiyama (Okayama Univ.)
(21) 13:40-14:05 Electronic Voting Scheme Based on MIX-net and Homomorphism Natsuki Ishida (HitachiSoftware), Wakaha Ogata (titech)
(22) 14:05-14:30 An improved attack on a receipt-free and universally verifiable mix-type voting scheme Yong-Sork Her, Kenji Imamoto, Kouichi Sakurai (Kyushu Univ.)
(23) 14:30-14:55 Unconditionally Secure Polynomial Evaluation And Its Application To Electronic Voting Akira Otsuka (IPA), Hideki Imai (Univ. of Tokyo)
  14:55-15:10 Break ( 15 min. )
(24) 15:10-15:35 Refrehshable Tokens with Optional Linkability Rie Shigetomi (Univ. of Tokyo), Akira Otsuka (IPA), Keith Martin (Royal Holloway), Hideki Imai (Univ. of Tokyo)
(25) 15:35-16:00 Transferable Off-line Anonymous Electronic Ticekt System Kyoko Mikami, Asuka Nakamura (Tsuda College), Rie Shigetomi (Univ. of Tokyo), Takahide Ogawa (Tsuda College)
(26) 16:00-16:25 Electronic Voting System Using Mobile Phone with Camera Hiroshi Motosugi, Kenichi Katsuragawa, Ryoichi Sasaki (TDU)

Announcement for Speakers
General TalkEach speech will have 20 minutes for presentation and 5 minutes for discussion.

Contact Address and Latest Schedule Information
ISEC Technical Committee on Information Security (ISEC)   [Latest Schedule]
Contact Address Shoichi Hirose(Graduate School of Informatics,Kyoto University)
TEL075-753-5316,FAX075-753-4982
E-:shrseek-u 


Last modified: 2004-07-14 09:17:21


Notification: Mail addresses are partially hidden against SPAM.

[Download Paper's Information (in Japanese)] <-- Press download button after click here.
 

[On-Site Price List of Paper Version of Proceedings (Technical Report)] (in Japanese)
 
[Presentation and Participation FAQ] (in Japanese)
 
[Cover and Index of IEICE Technical Report by Issue]
 

[Return to ISEC Schedule Page]   /  
 
 Go Top  Go Back   / Next IPSJ-CSEC Conf [HTML] / [HTML(simple)] / [TEXT]  [Japanese] / [English] 


[Return to Top Page]

[Return to IEICE Web Page]


The Institute of Electronics, Information and Communication Engineers (IEICE), Japan