Committee |
Date Time |
Place |
Paper Title / Authors |
Abstract |
Paper # |
SITE, ISEC, HWS, EMM, BioX, IPSJ-CSEC, IPSJ-SPT, ICSS [detail] |
2020-07-20 16:10 |
Online |
Online |
Short Lattice Signatures in the Standard Model with Efficient Tag Generation and Its Implementation Kaisei Kajita, Go Ohtake, Kazuto Ogawa (NHK), Koji Nuida, Tsuyoshi Takagi (Univ. of Tokyo) ISEC2020-22 SITE2020-19 BioX2020-25 HWS2020-15 ICSS2020-9 EMM2020-19 |
We propose new short signature schemes under the Ring-SIS assumption in the standard model by revisiting an existing con... [more] |
ISEC2020-22 SITE2020-19 BioX2020-25 HWS2020-15 ICSS2020-9 EMM2020-19 pp.53-60 |
ISEC |
2020-05-20 10:45 |
Online |
Online |
Improved Quantum Information Set Decoding Algorithm with Low Memory Naoto Kimura (Univ. Tokyo), Atsushi Takayasu (NICT), Tsuyoshi Takagi (Univ. Tokyo) ISEC2020-3 |
The security of code-based cryptoststems relates to the hardness of the syndrome decoding problem. The best decoding alg... [more] |
ISEC2020-3 pp.15-22 |
ISEC |
2020-05-20 14:10 |
Online |
Online |
[Invited Talk]
How to Construct CSIDH on Edwards Curves (from CT-RSA 2020) Tomoki Moriya, Hiroshi Onuki, Tsuyoshi Takagi (UTokyo) ISEC2020-8 |
CSIDH is an isogeny-based key-exchange protocol, that is one of the candidates for post-quantum cryptography. It is base... [more] |
ISEC2020-8 p.31 |
SITE, ISEC, LOIS |
2018-11-04 14:10 |
Fukuoka |
|
Time Complexity of Syndrome Decoding Problem and Security Analysis of Code-based Signature Scheme Partha Sarathi Roy (KDDI Research), Kirill Morozov (Univ. of North Texas), Kazuhide Fukushima, Shinsaku Kiyomoto (KDDI Research), Tsuyoshi Takagi (Univ. of Tokyo) ISEC2018-77 SITE2018-55 LOIS2018-37 |
[more] |
ISEC2018-77 SITE2018-55 LOIS2018-37 pp.73-78 |
HWS, ISEC, SITE, ICSS, EMM, IPSJ-CSEC, IPSJ-SPT [detail] |
2018-07-26 14:10 |
Hokkaido |
Sapporo Convention Center |
A New Embedding Method for Generalized LWE Weiyao Wang, Yuntao Wang, Atsushi Takayasu, Tsuyoshi Takagi (Univ. Tokyo) ISEC2018-46 SITE2018-38 HWS2018-43 ICSS2018-49 EMM2018-45 |
Estimating the computational cost for solving learning with errors (LWE) problem is an indispensable research topic to u... [more] |
ISEC2018-46 SITE2018-38 HWS2018-43 ICSS2018-49 EMM2018-45 pp.363-370 |
ISEC |
2016-09-02 13:25 |
Tokyo |
Kikai-Shinko-Kaikan Bldg. |
An Homomorphic Encryption based on some kind of Indeterminate Equations Koichiro Akiyama (Toshiba), Yasuhiro Goto (HUE), Shinya Okumura (ISIT), Tsuyoshi Takagi (Kyushu Univ.), Koji Nuida, Goichiro Hanaoka (AIST) ISEC2016-43 |
Authors propose a homomorphic public-key encryption whose security is based on a LWE-like problem related to indetermina... [more] |
ISEC2016-43 pp.27-34 |
ISEC |
2016-09-02 15:30 |
Tokyo |
Kikai-Shinko-Kaikan Bldg. |
[Invited Talk]
Security estimation for lattice based cryptosystems by progressive BKZ algorithm (From Eurocrypt 2016) Yoshinori Aono (NICT), Yuntao Wang (Kyushu Univ.), Takuya Hayashi (NICT), Tsuyoshi Takagi (Kyushu Univ.) ISEC2016-47 |
We introduce the paper “Improved Progressive BKZ Algorithms and their Precise Cost Estimation by Sharp Simulator” in Eur... [more] |
ISEC2016-47 p.57 |
EMM, ISEC, SITE, ICSS, IPSJ-CSEC, IPSJ-SPT [detail] |
2016-07-15 13:50 |
Yamaguchi |
|
On the Semi-regularity of Polynomial Systems Arising from the Section Finding Problem Shinya Okumura (ISIT), Koichiro Akiyama (Toshiba), Tsuyoshi Takagi (Kyushu Univ.) ISEC2016-34 SITE2016-28 ICSS2016-34 EMM2016-42 |
There are no known quantum algorithms, performed in polynomial time, for solving the section finding problem on algebrai... [more] |
ISEC2016-34 SITE2016-28 ICSS2016-34 EMM2016-42 pp.185-191 |
ISEC |
2016-05-19 13:25 |
Tokyo |
Kikai-Shinko-Kaikan Bldg. |
On the Possibility of Recovering Short Generators over Ideal Lattices for Cyclotomic Fields Shinya Okumura, Masaya Yasuda, Tsuyoshi Takagi (Kyushu Univ.) ISEC2016-6 |
Recently, next-generation high-performance cryptography, e.g. post-quantum cryptography, fully homomorphic encryption sc... [more] |
ISEC2016-6 pp.25-32 |
IPSJ-CSEC, ISEC, SITE, ICSS, EMM, IPSJ-SPT [detail] |
2015-07-03 10:40 |
Aichi |
NAGOYA TRADE & INDUSTRY CENTER |
Report on Workshop on Cybersecurity in a Post-Quantum World Takanori Yasuda (ISIT), Tsuyoshi Takagi (Kyushu Univ.) ISEC2015-22 SITE2015-20 ICSS2015-32 EMM2015-30 |
[more] |
ISEC2015-22 SITE2015-20 ICSS2015-32 EMM2015-30 pp.135-136 |
QIT (2nd) |
2015-05-25 17:00 |
Osaka |
Osaka University |
MQ Challenge: Solving Problems for Post-Quantum Cryptography and Their Hardness Evaluation Takanori Yasuda (ISIT), Xavier Dahan (Ochanomizu Univ.), Yun-Ju Huang (ISIT), Tsuyoshi Takagi (Kyushu Univ.), Kouichi Sakurai (ISIT) |
[more] |
|
EMM, ISEC, SITE, ICSS, IPSJ-CSEC, IPSJ-SPT [detail] |
2013-07-19 15:15 |
Hokkaido |
|
Application of Efficient Forms of Elliptic Curves to Ate-like Pairings Takanori Yasuda (ISIT), Tsuyoshi Takagi (Kyushu Univ.), Kouichi Sakurai (ISIT) ISEC2013-44 SITE2013-39 ICSS2013-49 EMM2013-46 |
[more] |
ISEC2013-44 SITE2013-39 ICSS2013-49 EMM2013-46 pp.323-330 |
ICD |
2013-04-11 11:40 |
Ibaraki |
Advanced Industrial Science and Technology (AIST) |
[Invited Talk]
Filament Scaling Forming Technique and Level-Verify-Write Scheme with Endurance Over 10 million Cycles in ReRAM Akifumi Kawahara, Ken Kawai, Yuuichirou Ikeda, Yoshikazu Katoh, Ryotaro Azuma, Yuhei Yoshimoto, Kouhei Tanabe, Zhiqiang Wei, Takeki Ninomiya, Koji Katayama, Shunsaku Muraoka, Atsushi Himeno, Kazuhiko Shimakawa, Takeshi Takagi, Kunitoshi Aono (Panasonic) ICD2013-4 |
Endurance characteristics over 10 million cycles almost 10 times higher as existing, and the small filament for leading ... [more] |
ICD2013-4 pp.15-20 |
ISEC, LOIS |
2012-11-22 15:35 |
Shizuoka |
Shizuoka City Industry-University Exchange Center |
Parallelized Gauss sieve algorithm for solving the shortest vector problem in lattices Tsukasa Ishiguro, Shinsaku Kiyomoto, Yutaka Miyake (KDDI R&D Labs), Tsuyoshi Takagi (Kyushu Univ) ISEC2012-71 LOIS2012-46 |
Security of lattice-based cryptosystems is based on the hardness of the Shortest Vector Problem (SVP) in lattices.
Micc... [more] |
ISEC2012-71 LOIS2012-46 pp.93-99 |
ISEC |
2012-09-21 09:20 |
Tokyo |
Kikai-Shinko-Kaikan Bldg. |
Security Evaluation of Pairing-Based Cryptosystems using eta-T Pairing over GF(3^n) Takuya Hayashi (Kyushu Univ.), Takeshi Shimoyama (Fujitsu Labs.), Naoyuki Shinohara (NICT), Tsuyoshi Takagi (Kyushu Univ.) ISEC2012-43 |
[more] |
ISEC2012-43 pp.1-5 |
EMM, ISEC, SITE, ICSS, IPSJ-CSEC, IPSJ-SPT [detail] |
2012-07-20 10:30 |
Hokkaido |
|
An efficient variant of Rainbow without triangular matrix representation Takanori Yasuda (ISIT), Tsuyoshi Takagi (Kyushu Univ.), Kouichi Sakurai (ISIT) ISEC2012-29 SITE2012-25 ICSS2012-31 EMM2012-21 |
[more] |
ISEC2012-29 SITE2012-25 ICSS2012-31 EMM2012-21 pp.143-150 |
ICD |
2012-04-23 14:20 |
Iwate |
Seion-so, Tsunagi Hot Spring (Iwate) |
[Invited Talk]
An 8Mb Multi-Layered Cross-Point ReRAM Macro with 443MB/s Write Throughput Akifumi Kawahara, Ryotaro Azuma, Yuuichirou Ikeda, Ken Kawai, Yoshikazu Katoh, Yukio Hayakawa, Kiyotaka Tsuji, Shinichi Yoneda, Atsushi Himeno, Kazuhiko Shimakawa, Takeshi Takagi, Takumi Mikawa, Kunitoshi Aono (Panasonic) ICD2012-3 |
We developed an 8Mb multi-layered cross-point ReRAM Macro with 443MB/s write throughput (64 bits parallel write per 17.2... [more] |
ICD2012-3 pp.13-18 |
ISEC |
2011-12-14 13:15 |
Tokyo |
Kikai-Shinko-Kaikan Bldg. |
A Report on CHES 2011 Tetsuya Izu (FUJITSU Lab.), Atsuo Inomata (NAIST), Katsuyuki Okeya (Renesas Electronics), Ken Kawabata, Yuichi Komano (Toshiba), Kazuo Sakiyama (UEC), Yumi Sakemi (FUJITSU Lab.), Akashi Satoh (AIST), Yuji Suga (IIJ), Tsuyoshi Takagi (Kyusyu Univ.), Junko Takahashi (NTT), Yukiyasu Tsunoo (NEC), Shiho Moriai (Sony), Yohei Hori (AIST), Naofumi Homma (Tohoku Univ.) ISEC2011-65 |
(To be available after the conference date) [more] |
ISEC2011-65 pp.21-24 |
ISEC |
2011-05-13 13:55 |
Tokyo |
Kikai-Shinko-Kaikan Bldg. |
A note on the reduction of the size of keys of Rainbow Takanori Yasuda (ISIT), Kouichi Sakurai, Tsuyoshi Takagi (Kyushu Univ.) ISEC2011-2 |
[more] |
ISEC2011-2 pp.9-16 |
IT, ISEC, WBS |
2010-03-04 17:00 |
Nagano |
Nagano-Engineering Campus, Shinshu University |
An Experiment of Number Field Sieve over GF(p) of Low Hamming Weight Characteristic Kenichiro Hayasaka, Tsuyoshi Takagi (Future Univ. Hakodate) IT2009-79 ISEC2009-87 WBS2009-58 |
The security of DSA and Diffie-Hellman key exchange is based on the
difficulty of the discrete logarithm problems (DLP)... [more] |
IT2009-79 ISEC2009-87 WBS2009-58 pp.53-60 |