Committee |
Date Time |
Place |
Paper Title / Authors |
Abstract |
Paper # |
ISEC |
2007-09-07 09:00 |
Tokyo |
Kikai-Shinko-Kaikan Bldg. |
An Extension of Fast Threshold Schemes Using XOR Operations (1) Jun Kurihara, Shinsaku Kiyomoto, Kazuhide Fukushima, Toshiaki Tanaka (KDDI R&D Labs.) ISEC2007-74 |
[more] |
ISEC2007-74 pp.1-8 |
ISEC |
2007-09-07 09:25 |
Tokyo |
Kikai-Shinko-Kaikan Bldg. |
An Extension of Fast Threshold Schemes Using XOR Operations (2) Jun Kurihara, Shinsaku Kiyomoto, Kazuhide Fukushima, Toshiaki Tanaka (KDDI R&D Labs.) ISEC2007-75 |
[more] |
ISEC2007-75 pp.9-15 |
ISEC |
2007-09-07 09:50 |
Tokyo |
Kikai-Shinko-Kaikan Bldg. |
A Study on Hierarchical Secret Sharing Schemes Using Product and Concatenated Codes Chigusa Kawashima (Polytechnic Univ.), Takahiro Yoshida (Waseda Univ.), Tomoko K. Matsushima (Polytechnic Univ.) ISEC2007-76 |
In this paper, two secret sharing schemes with a hierarchical access structure are investigated. One scheme is based on ... [more] |
ISEC2007-76 pp.17-23 |
ISEC |
2007-09-07 10:15 |
Tokyo |
Kikai-Shinko-Kaikan Bldg. |
visual cryptography schemes with tree access structure for many images Miyuki Uno, Mikio Kano (Ibaraki Univ.) ISEC2007-77 |
Let $T$ be a tree with order $n$ and maximum degree three.
We construct a
visual cryptography sharing scheme with $T$... [more] |
ISEC2007-77 pp.25-31 |
ISEC |
2007-09-07 10:50 |
Tokyo |
Kikai-Shinko-Kaikan Bldg. |
A construction of light weight Panama-like keystream generator Dai Watanabe (Hitachi), Toshinobu Kaneko (TUS) ISEC2007-78 |
[more] |
ISEC2007-78 pp.33-40 |
ISEC |
2007-09-07 11:15 |
Tokyo |
Kikai-Shinko-Kaikan Bldg. |
How To Find Many Collisions of 3-Pass HAVAL Kazuhiro Suzuki, Kaoru Kurosawa (Ibaraki Univ.) ISEC2007-79 |
The hash function HAVAL
is a well known Merkle-Damg\r{a}rd hash function such as MD4 and MD5.
It has three variants, $... [more] |
ISEC2007-79 pp.41-48 |
ISEC |
2007-09-07 11:40 |
Tokyo |
Kikai-Shinko-Kaikan Bldg. |
Sender Authenticated Key Agreements Without Random Oracles Chifumi Sato (C4 Technology), Takeshi Okamoto, Eiji Okamoto (Univ. of Tsukuba) ISEC2007-80 |
The purpose of this paper is to study sender authenticated key agreements by a third party, which uses the received para... [more] |
ISEC2007-80 pp.49-55 |
ISEC |
2007-09-07 13:05 |
Tokyo |
Kikai-Shinko-Kaikan Bldg. |
A New Class of Public Key Cryptosystem Constructed on the Basis of Multivariate Polynomials Rndomly Gererated Masao Kasahara (Osaka Gakuin Univ.) ISEC2007-81 |
[more] |
ISEC2007-81 pp.57-63 |
ISEC |
2007-09-07 13:30 |
Tokyo |
Kikai-Shinko-Kaikan Bldg. |
A Consideration on 3-SAT Problem Kunikatsu Kobayashi (Yamagata Univ.) ISEC2007-82 |
We examine a solving of 3SAT problem. By using t times operations over binary tree with depth n, we can decide whether 3... [more] |
ISEC2007-82 pp.65-67 |
ISEC |
2007-09-07 13:55 |
Tokyo |
Kikai-Shinko-Kaikan Bldg. |
An Implementation of a Pairing-Based Group Signature Scheme with Verifier-Local Revocation Yuta Hira, Hidehiro Kato, Toru Nakanishi, Yasuyuki Nogami, Nobuo Funabiki, Yoshitaka Morikawa (Okayama Univ.) ISEC2007-83 |
Group signature scheme is one of signature schemes which keep signer's identity information secret. A pairing-based grou... [more] |
ISEC2007-83 pp.69-76 |
ISEC |
2007-09-07 14:20 |
Tokyo |
Kikai-Shinko-Kaikan Bldg. |
CAIRN3: An FPGA Implementation of the Sieving Step with the Lattice Sieving Takeshi Shimoyama, Tetsuya Izu, Jun Kogure (FUJITSU) ISEC2007-84 |
The hardness of the integer factorization problem assures the security of some public-key cryptosystems including RSA, a... [more] |
ISEC2007-84 pp.77-83 |
ISEC |
2007-09-07 14:45 |
Tokyo |
Kikai-Shinko-Kaikan Bldg. |
Tardos's Fingerprinting Codes Shortened by Optimizing Code Generation Probabilities and Improving Tracing Algorithm Taichi Isogai, Hirofumi Muratani (Toshiba) ISEC2007-85 |
[more] |
ISEC2007-85 pp.85-90 |
ISEC |
2007-09-07 15:20 |
Tokyo |
Kikai-Shinko-Kaikan Bldg. |
On the Implementation of Asymmetric Fingerprinting Protocol Shinya Yamane, Minoru Kuribayashi, Masakatu Morii (Kobe Univ.) ISEC2007-86 |
[more] |
ISEC2007-86 pp.91-98 |
ISEC |
2007-09-07 15:45 |
Tokyo |
Kikai-Shinko-Kaikan Bldg. |
An Approach to Duality in Public Key Cryptosystems Kazuo Ohta (UEC), Yuichi Komano (Toshiba), Yutaka Kawai (UEC), Shinichi Kawamura (Toshiba) ISEC2007-87 |
The security of cryptosystems is formalized by the combination of adversarial goal GOAL and attack model ATK. Paillier a... [more] |
ISEC2007-87 pp.99-106 |
ISEC |
2007-09-07 16:10 |
Tokyo |
Kikai-Shinko-Kaikan Bldg. |
A Study on Extended Multi-Recipient Encryption
-- Security Notion and Constructions -- Yasuo Hatano (Hitachi/Tokyo Univ. of Science), Kunihiko Miyazaki (Hitachi), Toshinobu Kaneko (TUS) ISEC2007-88 |
[more] |
ISEC2007-88 pp.107-114 |