Co-organized by IEICE & IPSJ

List of Accepted Papers

    Regular Papers (13 articles)

  • Impossible Boomerang Attack for Block Cipher Structures
  • Threshold-Signers Universal Designated Verifier Signatures
  • An Error-Tolerant Variant of a Short 2-Secure Fingerprint Code and Its Security Evaluation
  • Improved Distinguishing Attacks on HC-256
  • Efficient Intrusion Detection Based on Static Analysis and Stack Walks
  • Tamper-Tolerant Software: Modeling and Implementation
  • Reducing Complexity Assumptions for Oblivious Transfer
  • Strongly Secure Authenticated Key Exchange without NAXOS' approach
  • A Generic Construction of Timed-Release Encryption with Pre-open Capability
  • An Efficient Identity-Based Signcryption Scheme for Multiple Receivers
  • Bit-Free Collision: Application to APOP Attack
  • A Proposal of Efficient Remote Biometric Authentication Protocol
  • ID-Based Group Password-Authenticated Key Exchange

    Short Papers (10 articles)

  • A Secure and Fast Multivariate Signature Algorithm
  • Chosen Public Key and Ciphertext Secure Proxy Re-encryption Schemes
  • A Ciphertext-Policy Attribute-Based Encryption Scheme with Strong Recipient Anonymity
  • How to Implement Furukawa-Imai Group Signature Scheme with Barreto-Naehrig Curve
  • A new framework to automate constrained microaggregation
  • Security Analysis of Three Provably Secure ID-based Signcryption Schemes
  • A Formal Approach to Interoperability between Licenses for Content Protection
  • An Adaptation of Proxy Signature for Secure and Serverless Authentication in 3GPP Release 8 Networks
  • Key Generation for Fast Inversion of the Paillier Encryption Function
  • Rule-based Fingerprint Quality Estimation System using the Optimal Orientation Certainty Level Approach