Committee |
Date Time |
Place |
Paper Title / Authors |
Abstract |
Paper # |
EMM, ISEC, SITE, ICSS, IPSJ-CSEC, IPSJ-SPT [detail] |
2012-07-20 10:30 |
Hokkaido |
|
An efficient variant of Rainbow without triangular matrix representation Takanori Yasuda (ISIT), Tsuyoshi Takagi (Kyushu Univ.), Kouichi Sakurai (ISIT) ISEC2012-29 SITE2012-25 ICSS2012-31 EMM2012-21 |
[more] |
ISEC2012-29 SITE2012-25 ICSS2012-31 EMM2012-21 pp.143-150 |
EMM, ISEC, SITE, ICSS, IPSJ-CSEC, IPSJ-SPT [detail] |
2012-07-20 10:55 |
Hokkaido |
|
A New Higher Order Differential Property of Hierocrypt Tetsuhiro Takahashi, Toshinobu Kaneko (TUS) ISEC2012-30 SITE2012-26 ICSS2012-32 EMM2012-22 |
Hierocrypt is a family of block ciphers with SPN structure proposed by Toshiba. Hierocrypt-L1 is for 64-bit block lengt... [more] |
ISEC2012-30 SITE2012-26 ICSS2012-32 EMM2012-22 pp.151-158 |
EMM, ISEC, SITE, ICSS, IPSJ-CSEC, IPSJ-SPT [detail] |
2012-07-20 11:20 |
Hokkaido |
|
A New Solving Algorithm for Attack Equation of Higher Order Differential Attack on AES (II) Yusuke Inoue, Akinobu Kitagawa, Toshinobu Kaneko (TUS) ISEC2012-31 SITE2012-27 ICSS2012-33 EMM2012-23 |
Ferguson et al. proposed 32-nd higher order differential attacks with partial sum method for 6 and 7 rounds AES. The met... [more] |
ISEC2012-31 SITE2012-27 ICSS2012-33 EMM2012-23 pp.159-166 |
EMM, ISEC, SITE, ICSS, IPSJ-CSEC, IPSJ-SPT [detail] |
2012-07-20 11:45 |
Hokkaido |
|
How to purge imaginary path in truncate analysis Toshinobu Kaneko (TUS) ISEC2012-32 SITE2012-28 ICSS2012-34 EMM2012-24 |
Truncate path search is an effective method to evaluate an upper bound of the maximum characteristic probability of the ... [more] |
ISEC2012-32 SITE2012-28 ICSS2012-34 EMM2012-24 pp.167-173 |
EMM, ISEC, SITE, ICSS, IPSJ-CSEC, IPSJ-SPT [detail] |
2012-07-20 13:30 |
Hokkaido |
|
Privacy Preserving Data Processing with Collaboration of Paillier and RSA Public Key Cryptosystems
-- For Overcoming Contradiction of Protection and Utilization of Personal Data -- Shigeo Tsujii, Hiroshi Yamaguchi (Chuo Univ.), Hiroshi Doi (IISEC), Yukiyasu Tsunoo (NEC), Ryo Fujita (Chuo Univ.), Takahiko Syouji (YDK) ISEC2012-33 SITE2012-29 ICSS2012-35 EMM2012-25 |
[more] |
ISEC2012-33 SITE2012-29 ICSS2012-35 EMM2012-25 pp.175-179 |
EMM, ISEC, SITE, ICSS, IPSJ-CSEC, IPSJ-SPT [detail] |
2012-07-20 13:55 |
Hokkaido |
|
Rationality and Security in Oblivious Transfer Haruna Higo, Akihiro Yamada, Keisuke Tanaka (Tokyo Inst. of Tech.), Kenji Yasunaga (ISIT) ISEC2012-34 SITE2012-30 ICSS2012-36 EMM2012-26 |
[more] |
ISEC2012-34 SITE2012-30 ICSS2012-36 EMM2012-26 pp.181-188 |
EMM, ISEC, SITE, ICSS, IPSJ-CSEC, IPSJ-SPT [detail] |
2012-07-20 14:20 |
Hokkaido |
|
An Improved Algorithm for Approximate GCD Problems Atsushi Takayasu, Noboru Kunihiro (UT) ISEC2012-35 SITE2012-31 ICSS2012-37 EMM2012-27 |
In this paper, we analyze multivariate approximate common divisor problem(ACDP), given approximate multiples of the inte... [more] |
ISEC2012-35 SITE2012-31 ICSS2012-37 EMM2012-27 pp.189-194 |
EMM, ISEC, SITE, ICSS, IPSJ-CSEC, IPSJ-SPT [detail] |
2012-07-20 14:45 |
Hokkaido |
|
A Batch Mapping Algorithm for Secure Function Evaluation Koki Hamada, Dai Ikarashi, Koji Chida (NTT) ISEC2012-36 SITE2012-32 ICSS2012-38 EMM2012-28 |
We propose an algorithm that realizes batch reference of lookup table for secure function evaluation. Secure function ev... [more] |
ISEC2012-36 SITE2012-32 ICSS2012-38 EMM2012-28 pp.195-199 |
EMM, ISEC, SITE, ICSS, IPSJ-CSEC, IPSJ-SPT [detail] |
2012-07-20 15:25 |
Hokkaido |
|
Efficient elliptic curve scalar multiplication using an elliptic net algorithm Naoki Kanayama, Yang Liu, Eiji Okamoto, Kazutaka Saito, Tadanori Teruya (Univ. of Tsukuba), Shigenori Uchiyama (Tokyo Metro Univ.) ISEC2012-37 SITE2012-33 ICSS2012-39 EMM2012-29 |
[more] |
ISEC2012-37 SITE2012-33 ICSS2012-39 EMM2012-29 pp.201-206 |
EMM, ISEC, SITE, ICSS, IPSJ-CSEC, IPSJ-SPT [detail] |
2012-07-20 15:50 |
Hokkaido |
|
Efficient Proofs for CNF Formulas on Attributes in Pairing-Based Anonymous Credential System Nasima Begum, Toru Nakanishi, Nobuo Funabiki (Okayama Univ.) ISEC2012-38 SITE2012-34 ICSS2012-40 EMM2012-30 |
[more] |
ISEC2012-38 SITE2012-34 ICSS2012-40 EMM2012-30 pp.207-212 |
EMM, ISEC, SITE, ICSS, IPSJ-CSEC, IPSJ-SPT [detail] |
2012-07-20 16:15 |
Hokkaido |
|
Construction of the Tsujii-Shamir-Kasahara (TSK) Multivariate Public Key Cryptosystem, which relies on the Difficulty of Prime Factorization Shigeo Tsujii, Masahito Gotaishi (Chuo Univ.) ISEC2012-39 SITE2012-35 ICSS2012-41 EMM2012-31 |
A new multivariate public-key cryptosystem (MPKC) is proposed. Unlike conventional MPKC system,
the polynomials in the ... [more] |
ISEC2012-39 SITE2012-35 ICSS2012-41 EMM2012-31 pp.213-216 |
EMM, ISEC, SITE, ICSS, IPSJ-CSEC, IPSJ-SPT [detail] |
2012-07-20 09:00 |
Hokkaido |
|
A Proposal of Personal Authentication System using Cocktail Party Effect Kosei Taketa, Hiroyuki Inaba (KIT) ISEC2012-40 SITE2012-36 ICSS2012-42 EMM2012-32 |
Recently, personal authentications have been important because of the increase in use of the portable devices and ICcard... [more] |
ISEC2012-40 SITE2012-36 ICSS2012-42 EMM2012-32 pp.217-221 |
EMM, ISEC, SITE, ICSS, IPSJ-CSEC, IPSJ-SPT [detail] |
2012-07-20 09:25 |
Hokkaido |
|
A Recent Trend in Ethical and Legal Studies on Privacy Takushi Otani (Kibi Internationla Univ.) ISEC2012-41 SITE2012-37 ICSS2012-43 EMM2012-33 |
[more] |
ISEC2012-41 SITE2012-37 ICSS2012-43 EMM2012-33 pp.223-228 |
EMM, ISEC, SITE, ICSS, IPSJ-CSEC, IPSJ-SPT [detail] |
2012-07-20 09:50 |
Hokkaido |
|
Proposal of Virtual Experimental System for Computer Virus Infection Situation Shun-ichi Kurino, Noriaki Yoshikai (Nihon Univ.), Toshio Takahshi (JEED) ISEC2012-42 SITE2012-38 ICSS2012-44 EMM2012-34 |
We have been researching individual behavior and consciousness under
computer virus infection. The situation under viru... [more] |
ISEC2012-42 SITE2012-38 ICSS2012-44 EMM2012-34 pp.229-235 |