IEICE Technical Committee Submission System
Conference Schedule
Online Proceedings
[Sign in]
Tech. Rep. Archives
    [Japanese] / [English] 
( Committee/Place/Topics  ) --Press->
 
( Paper Keywords:  /  Column:Title Auth. Affi. Abst. Keyword ) --Press->

Technical Committee on Information Security (ISEC)  (Searched in: 2012)

Search Results: Keywords 'from:2012-07-19 to:2012-07-19'

[Go to Official ISEC Homepage (Japanese)] 
Search Results: Conference Papers
 Conference Papers (Available on Advance Programs)  (Sort by: Date Ascending)
 Results 21 - 34 of 34 [Previous]  /   
Committee Date Time Place Paper Title / Authors Abstract Paper #
EMM, ISEC, SITE, ICSS, IPSJ-CSEC, IPSJ-SPT [detail] 2012-07-20
10:30
Hokkaido   An efficient variant of Rainbow without triangular matrix representation
Takanori Yasuda (ISIT), Tsuyoshi Takagi (Kyushu Univ.), Kouichi Sakurai (ISIT) ISEC2012-29 SITE2012-25 ICSS2012-31 EMM2012-21
 [more] ISEC2012-29 SITE2012-25 ICSS2012-31 EMM2012-21
pp.143-150
EMM, ISEC, SITE, ICSS, IPSJ-CSEC, IPSJ-SPT [detail] 2012-07-20
10:55
Hokkaido   A New Higher Order Differential Property of Hierocrypt
Tetsuhiro Takahashi, Toshinobu Kaneko (TUS) ISEC2012-30 SITE2012-26 ICSS2012-32 EMM2012-22
Hierocrypt is a family of block ciphers with SPN structure proposed by Toshiba. Hierocrypt-L1 is for 64-bit block lengt... [more] ISEC2012-30 SITE2012-26 ICSS2012-32 EMM2012-22
pp.151-158
EMM, ISEC, SITE, ICSS, IPSJ-CSEC, IPSJ-SPT [detail] 2012-07-20
11:20
Hokkaido   A New Solving Algorithm for Attack Equation of Higher Order Differential Attack on AES (II)
Yusuke Inoue, Akinobu Kitagawa, Toshinobu Kaneko (TUS) ISEC2012-31 SITE2012-27 ICSS2012-33 EMM2012-23
Ferguson et al. proposed 32-nd higher order differential attacks with partial sum method for 6 and 7 rounds AES. The met... [more] ISEC2012-31 SITE2012-27 ICSS2012-33 EMM2012-23
pp.159-166
EMM, ISEC, SITE, ICSS, IPSJ-CSEC, IPSJ-SPT [detail] 2012-07-20
11:45
Hokkaido   How to purge imaginary path in truncate analysis
Toshinobu Kaneko (TUS) ISEC2012-32 SITE2012-28 ICSS2012-34 EMM2012-24
Truncate path search is an effective method to evaluate an upper bound of the maximum characteristic probability of the ... [more] ISEC2012-32 SITE2012-28 ICSS2012-34 EMM2012-24
pp.167-173
EMM, ISEC, SITE, ICSS, IPSJ-CSEC, IPSJ-SPT [detail] 2012-07-20
13:30
Hokkaido   Privacy Preserving Data Processing with Collaboration of Paillier and RSA Public Key Cryptosystems -- For Overcoming Contradiction of Protection and Utilization of Personal Data --
Shigeo Tsujii, Hiroshi Yamaguchi (Chuo Univ.), Hiroshi Doi (IISEC), Yukiyasu Tsunoo (NEC), Ryo Fujita (Chuo Univ.), Takahiko Syouji (YDK) ISEC2012-33 SITE2012-29 ICSS2012-35 EMM2012-25
 [more] ISEC2012-33 SITE2012-29 ICSS2012-35 EMM2012-25
pp.175-179
EMM, ISEC, SITE, ICSS, IPSJ-CSEC, IPSJ-SPT [detail] 2012-07-20
13:55
Hokkaido   Rationality and Security in Oblivious Transfer
Haruna Higo, Akihiro Yamada, Keisuke Tanaka (Tokyo Inst. of Tech.), Kenji Yasunaga (ISIT) ISEC2012-34 SITE2012-30 ICSS2012-36 EMM2012-26
 [more] ISEC2012-34 SITE2012-30 ICSS2012-36 EMM2012-26
pp.181-188
EMM, ISEC, SITE, ICSS, IPSJ-CSEC, IPSJ-SPT [detail] 2012-07-20
14:20
Hokkaido   An Improved Algorithm for Approximate GCD Problems
Atsushi Takayasu, Noboru Kunihiro (UT) ISEC2012-35 SITE2012-31 ICSS2012-37 EMM2012-27
In this paper, we analyze multivariate approximate common divisor problem(ACDP), given approximate multiples of the inte... [more] ISEC2012-35 SITE2012-31 ICSS2012-37 EMM2012-27
pp.189-194
EMM, ISEC, SITE, ICSS, IPSJ-CSEC, IPSJ-SPT [detail] 2012-07-20
14:45
Hokkaido   A Batch Mapping Algorithm for Secure Function Evaluation
Koki Hamada, Dai Ikarashi, Koji Chida (NTT) ISEC2012-36 SITE2012-32 ICSS2012-38 EMM2012-28
We propose an algorithm that realizes batch reference of lookup table for secure function evaluation. Secure function ev... [more] ISEC2012-36 SITE2012-32 ICSS2012-38 EMM2012-28
pp.195-199
EMM, ISEC, SITE, ICSS, IPSJ-CSEC, IPSJ-SPT [detail] 2012-07-20
15:25
Hokkaido   Efficient elliptic curve scalar multiplication using an elliptic net algorithm
Naoki Kanayama, Yang Liu, Eiji Okamoto, Kazutaka Saito, Tadanori Teruya (Univ. of Tsukuba), Shigenori Uchiyama (Tokyo Metro Univ.) ISEC2012-37 SITE2012-33 ICSS2012-39 EMM2012-29
 [more] ISEC2012-37 SITE2012-33 ICSS2012-39 EMM2012-29
pp.201-206
EMM, ISEC, SITE, ICSS, IPSJ-CSEC, IPSJ-SPT [detail] 2012-07-20
15:50
Hokkaido   Efficient Proofs for CNF Formulas on Attributes in Pairing-Based Anonymous Credential System
Nasima Begum, Toru Nakanishi, Nobuo Funabiki (Okayama Univ.) ISEC2012-38 SITE2012-34 ICSS2012-40 EMM2012-30
 [more] ISEC2012-38 SITE2012-34 ICSS2012-40 EMM2012-30
pp.207-212
EMM, ISEC, SITE, ICSS, IPSJ-CSEC, IPSJ-SPT [detail] 2012-07-20
16:15
Hokkaido   Construction of the Tsujii-Shamir-Kasahara (TSK) Multivariate Public Key Cryptosystem, which relies on the Difficulty of Prime Factorization
Shigeo Tsujii, Masahito Gotaishi (Chuo Univ.) ISEC2012-39 SITE2012-35 ICSS2012-41 EMM2012-31
A new multivariate public-key cryptosystem (MPKC) is proposed. Unlike conventional MPKC system,
the polynomials in the ... [more]
ISEC2012-39 SITE2012-35 ICSS2012-41 EMM2012-31
pp.213-216
EMM, ISEC, SITE, ICSS, IPSJ-CSEC, IPSJ-SPT [detail] 2012-07-20
09:00
Hokkaido   A Proposal of Personal Authentication System using Cocktail Party Effect
Kosei Taketa, Hiroyuki Inaba (KIT) ISEC2012-40 SITE2012-36 ICSS2012-42 EMM2012-32
Recently, personal authentications have been important because of the increase in use of the portable devices and ICcard... [more] ISEC2012-40 SITE2012-36 ICSS2012-42 EMM2012-32
pp.217-221
EMM, ISEC, SITE, ICSS, IPSJ-CSEC, IPSJ-SPT [detail] 2012-07-20
09:25
Hokkaido   A Recent Trend in Ethical and Legal Studies on Privacy
Takushi Otani (Kibi Internationla Univ.) ISEC2012-41 SITE2012-37 ICSS2012-43 EMM2012-33
 [more] ISEC2012-41 SITE2012-37 ICSS2012-43 EMM2012-33
pp.223-228
EMM, ISEC, SITE, ICSS, IPSJ-CSEC, IPSJ-SPT [detail] 2012-07-20
09:50
Hokkaido   Proposal of Virtual Experimental System for Computer Virus Infection Situation
Shun-ichi Kurino, Noriaki Yoshikai (Nihon Univ.), Toshio Takahshi (JEED) ISEC2012-42 SITE2012-38 ICSS2012-44 EMM2012-34
We have been researching individual behavior and consciousness under
computer virus infection. The situation under viru... [more]
ISEC2012-42 SITE2012-38 ICSS2012-44 EMM2012-34
pp.229-235
 Results 21 - 34 of 34 [Previous]  /   
Choose a download format for default settings. [NEW !!]
Text format pLaTeX format CSV format BibTeX format
Copyright and reproduction : All rights are reserved and no part of this publication may be reproduced or transmitted in any form or by any means, electronic or mechanical, including photocopy, recording, or any information storage and retrieval system, without permission in writing from the publisher. Notwithstanding, instructors are permitted to photocopy isolated articles for noncommercial classroom use without fee. (License No.: 10GA0019/12GB0052/13GB0056/17GB0034/18GB0034)


[Return to Top Page]

[Return to IEICE Web Page]


The Institute of Electronics, Information and Communication Engineers (IEICE), Japan