IEICE Technical Committee Submission System
Conference Schedule
Online Proceedings
[Sign in]
Tech. Rep. Archives
    [Japanese] / [English] 
( Committee/Place/Topics  ) --Press->
 
( Paper Keywords:  /  Column:Title Auth. Affi. Abst. Keyword ) --Press->

All Technical Committee Conferences  (Searched in: All Years)

Search Results: Conference Papers
 Conference Papers (Available on Advance Programs)  (Sort by: Date Descending)
 Results 1 - 20 of 40  /  [Next]  
Committee Date Time Place Paper Title / Authors Abstract Paper #
QIT
(2nd)
2023-12-17
17:30
Okinawa OIST
(Primary: On-site, Secondary: Online)
[Poster Presentation] Improvement of Quantum Read-only Memory and its Application to Resource Evaluation for Factoring Small Integers on NISQ Devices
Kiyonari Katsura, Noboru Kunihiro (Tsukuba Univ.)
The discovery of Shor's algorithm for integer factorization has revealed the potential vulnerability of current cryptogr... [more]
EMM, BioX, ISEC, SITE, ICSS, HWS, IPSJ-CSEC, IPSJ-SPT [detail] 2023-07-24
18:20
Hokkaido Hokkaido Jichiro Kaikan Implementation of Shor's algorithm for the discrete logarithm problem and experiments using the quantum computer simulator
Kaito Kishi, Junpei Yamaguchi, Tetsuya Izu (Fujitsu Research), Noboru Kunihiro (Univ. of Tsukuba) ISEC2023-32 SITE2023-26 BioX2023-35 HWS2023-32 ICSS2023-29 EMM2023-32
Classical polynomial-time algorithms for solving the discrete logarithm problem (DLP) over a prime field have not been f... [more] ISEC2023-32 SITE2023-26 BioX2023-35 HWS2023-32 ICSS2023-29 EMM2023-32
pp.119-126
QIT
(2nd)
2023-05-30
14:50
Kyoto Katsura Campus, Kyoto University Efficient Fault-Tolerant Approximate Quantum Fourier Transform by Precomputed Quantum States
Kento Oonishi (MELCO), Noboru Kunihiro (UTsukuba)
This paper proposes efficient approximate quantum Fourier transformunder fault-tolerant setting. Quantum Fourier transfo... [more]
RCC, ISEC, IT, WBS 2023-03-14
09:50
Yamaguchi
(Primary: On-site, Secondary: Online)
Full key recovery of RSA secret key from noisy binary GCD operation sequences
Kenta Tani, Noboru Kunihiro (Univ. of Tsukuba) IT2022-74 ISEC2022-53 WBS2022-71 RCC2022-71
In CHES2019, Aldaya et al. reported a vulnerability of the binary GCD algorithm used in RSA key generation in OpenSSL.Fu... [more] IT2022-74 ISEC2022-53 WBS2022-71 RCC2022-71
pp.41-48
QIT
(2nd)
2022-12-09
17:45
Kanagawa Keio Univ.
(Primary: On-site, Secondary: Online)
Success probability of quantum phase estimation algorithms using approximate quantum Fourier transforms
Kiyonari Katsura, Noboru Kunihiro (Tsukuba Univ.)
It is known that the RSA can be solved in realistic time by Shor's algorithm with the large-scale quantum computer. In o... [more]
QIT
(2nd)
2022-12-09
18:00
Kanagawa Keio Univ.
(Primary: On-site, Secondary: Online)
Shor's Algorithm Using Efficient Approximate Quantum Fourier Transform
Kento Oonishi (MELCO), Noboru Kunihiro (UTsukuba)
Shor's algorithm solves the integer factoring and the discrete logarithm problems in polynomial time. Therefore, the eva... [more]
QIT
(2nd)
2019-11-19
16:00
Tokyo Gakushuin University Proposal of Efficient Quantum Modular Addition Circuit and its Implementation
Kento Oonishi (UTokyo/ Keio Univ.), Tomoki Tanaka (MUFG/ MUFG Bank/ Keio Univ.), Shumpei Uno (MHIR/ Keio Univ.), Naoki Yamamoto (Keio Univ.), Noboru Kunihiro (Tsukuba Univ.)
In this paper, we propose more efficient quantum addition and modular addition circuits and estimate the number of quant... [more]
ISEC, SITE, ICSS, EMM, HWS, BioX, IPSJ-CSEC, IPSJ-SPT [detail] 2019-07-23
14:25
Kochi Kochi University of Technology New Quantum Algorithms for Modular Inverse and Their Application on the Elliptic Curve Discrete Logarithm Problem
Ryo Kurama (Univ. of Tokyo), Noboru Kunihiro (Tsukuba Univ.) ISEC2019-24 SITE2019-18 BioX2019-16 HWS2019-19 ICSS2019-22 EMM2019-27
 [more] ISEC2019-24 SITE2019-18 BioX2019-16 HWS2019-19 ICSS2019-22 EMM2019-27
pp.119-124
ISEC 2019-05-17
10:30
Tokyo Kikai-Shinko-Kaikan Bldg. [Invited Talk] Attacking Noisy Secret CRT-RSA Exponents in Binary Method (from ICISC 2018)
Kento Oonishi, Noboru Kunihiro (UTokyo) ISEC2019-2
In this presentation, we give a security evaluation on the RSA encryption scheme with the Chinese remainder theorem (CRT... [more] ISEC2019-2
p.3
IT, ISEC, WBS 2019-03-08
15:20
Tokyo University of Electro-Communications Key Reocvery Atttack on Ring-LWE Scheme Using Side-Channel Information in Number Theoretic Transform
Kento Oonishi, Noboru Kunihiro (Tokyo Univ.) IT2018-112 ISEC2018-118 WBS2018-113
Recently, the researches of post-quantum cryptography are conducted because of the realization of quantum computers in t... [more] IT2018-112 ISEC2018-118 WBS2018-113
pp.229-234
QIT
(2nd)
2018-11-27
15:30
Tokyo The University of Tokyo A Survey on Physical Experiments for Integer Factoring based on Shor's Algorithm
Noboru Kunihiro (UTokyo)
 [more]
HWS, ISEC, SITE, ICSS, EMM, IPSJ-CSEC, IPSJ-SPT [detail] 2018-07-25
15:50
Hokkaido Sapporo Convention Center Extended Partial Key Exposure Attacks on RSA
Kaichi Suzuki, Atsushi Takayasu, Noboru Kunihiro (Univ. of Tokyo) ISEC2018-29 SITE2018-21 HWS2018-26 ICSS2018-32 EMM2018-28
Thus far, emph{partial key exposure attacks} on RSA, i.e., attackers are given the most significant bits (MSBs) emph{or}... [more] ISEC2018-29 SITE2018-21 HWS2018-26 ICSS2018-32 EMM2018-28
pp.155-162
HWS, ISEC, SITE, ICSS, EMM, IPSJ-CSEC, IPSJ-SPT [detail] 2018-07-26
14:35
Hokkaido Sapporo Convention Center The Precise Security Analysis of Block Ciphers Enhanced by FX-Construction against a Quantum Algorithm
Syo Yasui, Noboru Kunihiro (UTokyo) ISEC2018-47 SITE2018-39 HWS2018-44 ICSS2018-50 EMM2018-46
 [more] ISEC2018-47 SITE2018-39 HWS2018-44 ICSS2018-50 EMM2018-46
pp.371-378
LOIS, ISEC, SITE 2017-11-10
15:10
Kyoto   Lattice Attacks on Elliptic Curve Diffie-Hellman key exchange
Sota Onozawa (The Univ. of Tokyo), Atsushi Takayasu (The Univ. of Tokyo/AIST), Noboru Kunihiro (The Univ. of Tokyo) ISEC2017-69 SITE2017-51 LOIS2017-46
Boneh and Venkatesan (Crypto’96) introduced the hidden number problem (HNP) to study the security of Diffie-Hellman key... [more] ISEC2017-69 SITE2017-51 LOIS2017-46
pp.115-122
SITE, EMM, ISEC, ICSS, IPSJ-CSEC, IPSJ-SPT [detail] 2017-07-14
15:45
Tokyo   Recovering CRT-RSA Secret Keys Using the Information of the Operations Based on 2^m-ary Method.
Kento Oonishi, Noboru Kunihiro (Univ. of Tokyo) ISEC2017-22 SITE2017-14 ICSS2017-21 EMM2017-25
In side channel attacks, the secret keys are obtained from physical data in the implementation of the cryptosystem. For ... [more] ISEC2017-22 SITE2017-14 ICSS2017-21 EMM2017-25
pp.107-114
ISEC, WBS, IT 2017-03-09
14:00
Tokyo TOKAI University Security Analysis of Ordinary Isogeny Diffie--Hellman
Satoshi Furukawa, Atsushi Takayasu, Noboru Kunihiro (The Univ. of Tokyo) IT2016-104 ISEC2016-94 WBS2016-80
In this paper, we analyze the security of Ordinary Isogeny Diffie--Hellman (OIDH) key exchange proposed by Stolbunov (Ad... [more] IT2016-104 ISEC2016-94 WBS2016-80
pp.33-40
COMP, ISEC 2016-12-22
12:30
Hiroshima Hiroshima University [Invited Talk] Adversary-dependent Lossy Trapdoor Function from Hardness of Factoring Semi-smooth RSA Subgroup
Takashi Yamakawa (UT), Shota Yamada, Goichiro Hanaoka (AIST), Noboru Kunihiro (UT) ISEC2016-83 COMP2016-44
 [more] ISEC2016-83 COMP2016-44
p.73
EMM, ISEC, SITE, ICSS, IPSJ-CSEC, IPSJ-SPT [detail] 2016-07-15
13:25
Yamaguchi   Worst Case Short Lattice Point Enumeration on Block Reduced Bases
Atsushi Takayasu, Noboru Kunihiro (Univ. Tokyo) ISEC2016-33 SITE2016-27 ICSS2016-33 EMM2016-41
(To be available after the conference date) [more] ISEC2016-33 SITE2016-27 ICSS2016-33 EMM2016-41
pp.177-184
ISEC 2014-12-19
15:55
Tokyo Kikai-Shinko-Kaikan Bldg. [Invited Talk] Self-bilinear Map on Unknown Order Groups from Indistinguishability Obfuscation and Its Applications
Takashi Yamakawa (Univ. of Tokyo), Shota Yamada, Goichiro Hanaoka (AIST), Noboru Kunihiro (Univ. of Tokyo) ISEC2014-73
 [more] ISEC2014-73
p.21
ICSS, ISEC, SITE, EMM, IPSJ-CSEC, IPSJ-SPT [detail] 2014-07-03
14:15
Hokkaido San-Refure Hakodate Security of RSA with Many Decryption Exponents
Atsushi Takayasu, Noboru Kunihiro (Univ. of Tokyo) ISEC2014-19 SITE2014-14 ICSS2014-23 EMM2014-19
When we use small secret exponents, RSA becomes efficient for its decryption cost and signature generation cost. However... [more] ISEC2014-19 SITE2014-14 ICSS2014-23 EMM2014-19
pp.93-96
 Results 1 - 20 of 40  /  [Next]  
Choose a download format for default settings. [NEW !!]
Text format pLaTeX format CSV format BibTeX format
Copyright and reproduction : All rights are reserved and no part of this publication may be reproduced or transmitted in any form or by any means, electronic or mechanical, including photocopy, recording, or any information storage and retrieval system, without permission in writing from the publisher. Notwithstanding, instructors are permitted to photocopy isolated articles for noncommercial classroom use without fee. (License No.: 10GA0019/12GB0052/13GB0056/17GB0034/18GB0034)


[Return to Top Page]

[Return to IEICE Web Page]


The Institute of Electronics, Information and Communication Engineers (IEICE), Japan