Engineering Sciences/NOLTA-Information Security(Date:2012/09/14)

Presentation
表紙

,  

[Date]2012/9/14
[Paper #]
目次

,  

[Date]2012/9/14
[Paper #]
Security Evaluation of Pairing-Based Cryptosystems using _<ηT>-Pairing over GF(3^n)

Takuya HAYASHI,  Takeshi SHIMOYAMA,  Naoyuki SHINOHARA,  Tsuyoshi TAKAGI,  

[Date]2012/9/14
[Paper #]ISEC2012-43
Computation of pairings and scalar multiplication by using elliptic nets over small characteristic finite fields

Naoki KANAYAMA,  Yang LIU,  Eiji OKAMOTO,  Kazutaka SAITO,  Tadanori TERUYA,  Shigenori UCHIYAMA,  

[Date]2012/9/14
[Paper #]ISEC2012-44
Heuristic improvements of BKZ 2.0

Yoshinori AONO,  Ken NAGANUMA,  

[Date]2012/9/14
[Paper #]ISEC2012-45
Differential cryptanalysis of CIPHERUNICORN-A

Tomoyasu SUZAKI,  Takeshi KAWABATA,  Hiroyasu KUBO,  Teruo SAITO,  Maki SHIGERI,  Yukiyasu TSUNOO,  

[Date]2012/9/14
[Paper #]ISEC2012-46
A Report on EUROCRYPT 2012

Mitsugu IWAMOTO,  

[Date]2012/9/14
[Paper #]ISEC2012-47
[Invited Talk] Cryptanalyses on a Merkle-Damgard Based MAC-Almost Universal Forgery and Distinguishing-H Attacks

Yu SASAKI,  

[Date]2012/9/14
[Paper #]ISEC2012-48
[Invited Talk] Group to Group Commitments Do Not Shrink

Miyako OHKUBO,  

[Date]2012/9/14
[Paper #]ISEC2012-49
Public Key Compression and Modulus Switching for Fully Homomorphic Encryption over the Integers

Jean-Sebastien Coron,  David Naccache,  Mehdi Tibouchi,  

[Date]2012/9/14
[Paper #]ISEC2012-50
Tightly-Secure Signatures From Lossy Identification Schemes

Michel Abdalla,  Pierre-Alain Fouque,  Vadim Lyubashevsky,  Mehdi Tibouchi,  

[Date]2012/9/14
[Paper #]ISEC2012-51
Adaptively Attribute-Hiding (Hierarchical) Inner Product Encryption

Tatsuaki OKAMOTO,  Katsuyuki TAKASHIMA,  

[Date]2012/9/14
[Paper #]ISEC2012-52
New Classes of Public Key Cryptosystems with Concealed Equations of Very High Degree Constructed Based on Cyclic Codes, K(X)SE(1)PKC, K(XVI)SE(2)PKC, Realizing Coding Rate of Exactly 1.0, along with K(III)EIIPKC.

Masao KASAHARA,  

[Date]2012/9/14
[Paper #]ISEC2012-53
Pilot Lamps can Serve as Side Channels

Shohei Saito,  Tsutomu Matsumoto,  

[Date]2012/9/14
[Paper #]ISEC2012-54
Fault Analysis Based on Key Presumption for Multiple Errors

Midori Ono,  Masaya Yoshikawa,  

[Date]2012/9/14
[Paper #]ISEC2012-55
An Efficient Method of Strictly Evaluating Side-Channel Security

Takeshi KISHIKAWA,  Shohei SAITO,  Yuu TSUCHIYA,  Tsuyoshi TOYAMA,  Tsutomu MATSUMOTO,  

[Date]2012/9/14
[Paper #]ISEC2012-56
複写される方へ

,  

[Date]2012/9/14
[Paper #]
Notice for photocopying

,  

[Date]2012/9/14
[Paper #]
奥付

,  

[Date]2012/9/14
[Paper #]
裏表紙

,  

[Date]2012/9/14
[Paper #]