Co-organized by IEICE & IPSJ

List of Accepted Papers

Regular Papers (22 articles)

    Track I (13 articles)
    • Kimmo Halunen, Juha Roning : Preimage Attacks Against Variants of Very Smooth Hash
    • Minoru Kuribayashi : Experimental Assessment of Probabilistic Fingerprinting Codes over AWGN Channel
    • Benjamin Justus, Daniel Loebenberger : Differential Addition in generalized Edwards Coordinates
    • Yamin Liu, Bao Li, Xianhui Lu, Yazhe Zhang : PA1 and IND-CCA2 Do Not Guarantee PA2: Brief Examples
    • Subhamoy Maitra, Santanu Sarkar, Sourav Sen Gupta : Publishing Upper Half of RSA Decryption Exponent
    • Jun Yajima, Takeshi Shimoyama : Matrix Representation of Conditions for the Collision Attack of SHA-1 and its Application to the Message Modification
    • Yusuke Sakai, Goichiro Hanaoka, Kaoru Kurosawa, Kazuo Ohta : A Generic Method for Reducing Ciphertext Length of Reproducible KEMs in the RO Model
    • Takuho Mitsunaga, Yoshifumi Manabe, Tatsuaki Okamoto : Efficient Secure Auction Protocols Based on the Boneh-Goh-Nissim Encryption
    • Atsushi Fujioka, Koutarou Suzuki, Kazuki Yoneyama : Hierarchical ID-based Authenticated Key Exchange Resilient to Ephemeral Key Leakage
    • Thanh-Ha Le, Mael Berthier : Mutual Information Analysis under the view of Higher-Order Statistics
    • Keita Emura, Goichiro Hanaoka, Yusuke Sakai : Group Signature Implies PKE with Non-interactive Opening and Threshold PKE
    • Yu Sasaki : Known-Key Attacks on Rijndael with Large Blocks and Strengthening ShiftRow Parameter
    • Naoki Ogura, Go Yamamoto, Tetsutaro Kobayashi, Shigenori Uchiyama : An Improvement of Key Generation Algorithm for Gentry's Homomorphic Encryption Scheme
    Track II (6 articles)
    • Lena Wiese : Horizontal Fragmentation for Data Outsourcing with Formula-Based Confidentiality Constraints
    • Fumiko Satoh, Naohiko Uramoto : Validating Security Policy Conformance with WS-Security Requirements
    • Marek Klonowski, Michal Przykucki, Tomasz Struminski, Malgorzata Sulkowska : Practical Universal Random Sampling
    • Carlos T. Calafate, Javier Campos, Marga N?cher, Pietro Manzoni, Juan-Carlos Cano : A-HIP: A Solution Offering Secure and Anonymous Communications in MANETs
    • Mansoor Alicherry, Angelos D. Keromytis : Securing MANET Multicast Using DIPLOMA
    • Tomonori Izumida, Kokichi Futatsugi, Akira Mori : A Generic Binary Analysis Method for Malware
    Track III (3 articles)
    • Margus Niitsoo : Optimal Adversary Behavior for the Serial Model of Financial Attack Trees
    • Tadashi Iyama, Shinsaku Kiyomoto, Kazuhide Fukushima, Toshiaki Tanaka, Tsuyoshi Takagi : Efficient Implementation of Pairing on BREW Mobile phones
    • Lasse Harjumaa, Ilkka Tervonen : Introducing Mitigation Use Cases to Enhance the Scope of Test Cases

Short Papers (10 articles)

    Track I (5 articles)
    • Xin Jiang, Lei Hu, Jintai Ding, Siwei Sun : On the Kipnis-Shamir Method Solving the MinRank Problem
    • Yasufumi Hashimoto : On Small Secret Key Attack against RSA with High Bits Known Prime Factor
    • Masaharu Fukase, Kazunori Yamaguchi : Exhaustive Search for Finding a Very Short Vector in High Dimensional Lattices
    • Kazuki Yoneyama, Masayuki Terada, Sadayuki Hongo, Kazuo Ohta : Universally Composable NBAC-based Fair Voucher Exchange for Mobile Environments
    • Joachim Biskup, Cornelia Tadros : Policy-Based Secrecy in the Runs & Systems Framework and Controlled Query Evaluation
    Track II (2 articles)
    • Sachiko Yoshihama, Takuya Mishina, Tsutomu Matsumoto : Web-based Data Leakage Prevention
    • Chen Bangdao, A.W.Roscoe, Ronald Kainda, L.H. Nguyen : The Missing Link: Human Interactive Security Protocols in Mobile Payment
    Track III (3 articles)
    • Ulas Bardak, Seiya Hasegawa, Kazuko Mishima, Takayuki Saito : Automated Scheduling of Volunteers Through Adapting a Nurse Scheduling Infrastructure
    • Olli Sjoblom : Data Mining in Aviation Safety
    • Tetsuya Izu, Masahiko Takenaka, Takashi Yoshioka : A Prototype System for Ensuring Integrity of Extracted Video Data