IEICE Technical Committee Submission System
Conference Schedule
Online Proceedings
[Sign in]
Tech. Rep. Archives
    [Japanese] / [English] 
( Committee/Place/Topics  ) --Press->
 
( Paper Keywords:  /  Column:Title Auth. Affi. Abst. Keyword ) --Press->

Technical Committee on Information Security (ISEC)  (Searched in: 2007)

Search Results: Keywords 'from:2007-09-07 to:2007-09-07'

[Go to Official ISEC Homepage (Japanese)] 
Search Results: Conference Papers
 Conference Papers (Available on Advance Programs)  (Sort by: Date Ascending)
 Results 1 - 15 of 15  /   
Committee Date Time Place Paper Title / Authors Abstract Paper #
ISEC 2007-09-07
09:00
Tokyo Kikai-Shinko-Kaikan Bldg. An Extension of Fast Threshold Schemes Using XOR Operations (1)
Jun Kurihara, Shinsaku Kiyomoto, Kazuhide Fukushima, Toshiaki Tanaka (KDDI R&D Labs.) ISEC2007-74
 [more] ISEC2007-74
pp.1-8
ISEC 2007-09-07
09:25
Tokyo Kikai-Shinko-Kaikan Bldg. An Extension of Fast Threshold Schemes Using XOR Operations (2)
Jun Kurihara, Shinsaku Kiyomoto, Kazuhide Fukushima, Toshiaki Tanaka (KDDI R&D Labs.) ISEC2007-75
 [more] ISEC2007-75
pp.9-15
ISEC 2007-09-07
09:50
Tokyo Kikai-Shinko-Kaikan Bldg. A Study on Hierarchical Secret Sharing Schemes Using Product and Concatenated Codes
Chigusa Kawashima (Polytechnic Univ.), Takahiro Yoshida (Waseda Univ.), Tomoko K. Matsushima (Polytechnic Univ.) ISEC2007-76
In this paper, two secret sharing schemes with a hierarchical access structure are investigated. One scheme is based on ... [more] ISEC2007-76
pp.17-23
ISEC 2007-09-07
10:15
Tokyo Kikai-Shinko-Kaikan Bldg. visual cryptography schemes with tree access structure for many images
Miyuki Uno, Mikio Kano (Ibaraki Univ.) ISEC2007-77
Let $T$ be a tree with order $n$ and maximum degree three.
We construct a
visual cryptography sharing scheme with $T$... [more]
ISEC2007-77
pp.25-31
ISEC 2007-09-07
10:50
Tokyo Kikai-Shinko-Kaikan Bldg. A construction of light weight Panama-like keystream generator
Dai Watanabe (Hitachi), Toshinobu Kaneko (TUS) ISEC2007-78
 [more] ISEC2007-78
pp.33-40
ISEC 2007-09-07
11:15
Tokyo Kikai-Shinko-Kaikan Bldg. How To Find Many Collisions of 3-Pass HAVAL
Kazuhiro Suzuki, Kaoru Kurosawa (Ibaraki Univ.) ISEC2007-79
The hash function HAVAL
is a well known Merkle-Damg\r{a}rd hash function such as MD4 and MD5.
It has three variants, $... [more]
ISEC2007-79
pp.41-48
ISEC 2007-09-07
11:40
Tokyo Kikai-Shinko-Kaikan Bldg. Sender Authenticated Key Agreements Without Random Oracles
Chifumi Sato (C4 Technology), Takeshi Okamoto, Eiji Okamoto (Univ. of Tsukuba) ISEC2007-80
The purpose of this paper is to study sender authenticated key agreements by a third party, which uses the received para... [more] ISEC2007-80
pp.49-55
ISEC 2007-09-07
13:05
Tokyo Kikai-Shinko-Kaikan Bldg. A New Class of Public Key Cryptosystem Constructed on the Basis of Multivariate Polynomials Rndomly Gererated
Masao Kasahara (Osaka Gakuin Univ.) ISEC2007-81
 [more] ISEC2007-81
pp.57-63
ISEC 2007-09-07
13:30
Tokyo Kikai-Shinko-Kaikan Bldg. A Consideration on 3-SAT Problem
Kunikatsu Kobayashi (Yamagata Univ.) ISEC2007-82
We examine a solving of 3SAT problem. By using t times operations over binary tree with depth n, we can decide whether 3... [more] ISEC2007-82
pp.65-67
ISEC 2007-09-07
13:55
Tokyo Kikai-Shinko-Kaikan Bldg. An Implementation of a Pairing-Based Group Signature Scheme with Verifier-Local Revocation
Yuta Hira, Hidehiro Kato, Toru Nakanishi, Yasuyuki Nogami, Nobuo Funabiki, Yoshitaka Morikawa (Okayama Univ.) ISEC2007-83
Group signature scheme is one of signature schemes which keep signer's identity information secret. A pairing-based grou... [more] ISEC2007-83
pp.69-76
ISEC 2007-09-07
14:20
Tokyo Kikai-Shinko-Kaikan Bldg. CAIRN3: An FPGA Implementation of the Sieving Step with the Lattice Sieving
Takeshi Shimoyama, Tetsuya Izu, Jun Kogure (FUJITSU) ISEC2007-84
The hardness of the integer factorization problem assures the security of some public-key cryptosystems including RSA, a... [more] ISEC2007-84
pp.77-83
ISEC 2007-09-07
14:45
Tokyo Kikai-Shinko-Kaikan Bldg. Tardos's Fingerprinting Codes Shortened by Optimizing Code Generation Probabilities and Improving Tracing Algorithm
Taichi Isogai, Hirofumi Muratani (Toshiba) ISEC2007-85
 [more] ISEC2007-85
pp.85-90
ISEC 2007-09-07
15:20
Tokyo Kikai-Shinko-Kaikan Bldg. On the Implementation of Asymmetric Fingerprinting Protocol
Shinya Yamane, Minoru Kuribayashi, Masakatu Morii (Kobe Univ.) ISEC2007-86
 [more] ISEC2007-86
pp.91-98
ISEC 2007-09-07
15:45
Tokyo Kikai-Shinko-Kaikan Bldg. An Approach to Duality in Public Key Cryptosystems
Kazuo Ohta (UEC), Yuichi Komano (Toshiba), Yutaka Kawai (UEC), Shinichi Kawamura (Toshiba) ISEC2007-87
The security of cryptosystems is formalized by the combination of adversarial goal GOAL and attack model ATK. Paillier a... [more] ISEC2007-87
pp.99-106
ISEC 2007-09-07
16:10
Tokyo Kikai-Shinko-Kaikan Bldg. A Study on Extended Multi-Recipient Encryption -- Security Notion and Constructions --
Yasuo Hatano (Hitachi/Tokyo Univ. of Science), Kunihiko Miyazaki (Hitachi), Toshinobu Kaneko (TUS) ISEC2007-88
 [more] ISEC2007-88
pp.107-114
 Results 1 - 15 of 15  /   
Choose a download format for default settings. [NEW !!]
Text format pLaTeX format CSV format BibTeX format
Copyright and reproduction : All rights are reserved and no part of this publication may be reproduced or transmitted in any form or by any means, electronic or mechanical, including photocopy, recording, or any information storage and retrieval system, without permission in writing from the publisher. Notwithstanding, instructors are permitted to photocopy isolated articles for noncommercial classroom use without fee. (License No.: 10GA0019/12GB0052/13GB0056/17GB0034/18GB0034)


[Return to Top Page]

[Return to IEICE Web Page]


The Institute of Electronics, Information and Communication Engineers (IEICE), Japan