Engineering Sciences/NOLTA-Information Security(Date:2016/09/02)

Presentation
A New Class of Public Key Cryptosystems Constructed Based on Cyclic Codes, K(XVII)SE(1)PKC, along with Revisit to K(AII)Scheme and Proposals of K(AII・V)?ΠPKC

Masao Kasahara(21CICRC),  

[Date]2016-09-02
[Paper #]ISEC2016-42
ImplicitなHintを用いた因数分解に関する一考察

Kazuji Haginoya(Ibaraki Univ.),  Kanako Komiya(Ibaraki Univ.),  

[Date]2016-09-02
[Paper #]ISEC2016-44
[Invited Talk] Adaptively Secure Identity-Based Encryption Scheme from Lattices with Asymptotically Shorter Public Parameters

Shota Yamada(AIST),  

[Date]2016-09-02
[Paper #]ISEC2016-48
Bundling Proofs of Knowledge and its Application to Signatures

Hiroaki Anada(Univ. Nagasaki),  Seiko Arita(IISEC),  

[Date]2016-09-02
[Paper #]ISEC2016-39
Implementation of security evaluation function on a Development Environment of Cryptography using GUI

Toshihiro Nakamura(NDA),  Keisuke Iwai(NDA),  Takashi Matsubara(NDA),  Takakazu Kurokawa(NDA),  

[Date]2016-09-02
[Paper #]ISEC2016-46
A Note on Secure Execution of Random Bisection Cut

Itaru Ueda(Tohoku Univ.),  Akihiro Nishimura(Tohoku Univ.),  Yu-ichi Hayashi(Tohoku Gakuin Univ.),  Takaaki Mizuki(Tohoku Univ.),  Hideaki Sone(Tohoku Univ.),  

[Date]2016-09-02
[Paper #]ISEC2016-38
Tamper Resistant Software utilizing Data Memory

Kazuomi Oishi(SIST),  

[Date]2016-09-02
[Paper #]ISEC2016-45
[Invited Talk] Security estimation for lattice based cryptosystems by progressive BKZ algorithm (From Eurocrypt 2016)

Yoshinori Aono(NICT),  Yuntao Wang(Kyushu Univ.),  Takuya Hayashi(NICT),  Tsuyoshi Takagi(Kyushu Univ.),  

[Date]2016-09-02
[Paper #]ISEC2016-47
An Homomorphic Encryption based on some kind of Indeterminate Equations

Koichiro Akiyama(Toshiba),  Yasuhiro Goto(HUE),  Shinya Okumura(ISIT),  Tsuyoshi Takagi(Kyushu Univ.),  Koji Nuida(AIST),  Goichiro Hanaoka(AIST),  

[Date]2016-09-02
[Paper #]ISEC2016-43
[Invited Talk] On the Influence of Message Length in PMAC's Security Bounds (from Eurocrypt 2016)

Kan Yasuda(NTT),  

[Date]2016-09-02
[Paper #]ISEC2016-49
[Invited Talk] Anonymous Traitor Tracing: How to Embed Arbitrary Information in a Key (from Eurocrypt 2016)

Ryo Nishimaki(NTT),  Daniel Wichs(NEU),  Mark Zhandry(Princeton),  

[Date]2016-09-02
[Paper #]ISEC2016-41
[Invited Talk] Constant-round Leakage-resilient Zero-knowledge from Collision Resistance (from EUROCRYPT 2016)

Susumu Kiyoshima(NTT),  

[Date]2016-09-02
[Paper #]ISEC2016-40