Committee |
Date Time |
Place |
Paper Title / Authors |
Abstract |
Paper # |
LOIS, ISEC, SITE |
2015-11-07 10:55 |
Kanagawa |
Kanagawa Univ. |
Extension of NTRU Using Group Ring and Its Application Takanori Yasuda, Hiroaki Anada (ISIT), Kouichi Sakurai (Kyushu Univ.) ISEC2015-52 SITE2015-39 LOIS2015-46 |
[more] |
ISEC2015-52 SITE2015-39 LOIS2015-46 pp.103-109 |
IPSJ-CSEC, ISEC, SITE, ICSS, EMM, IPSJ-SPT [detail] |
2015-07-02 10:15 |
Aichi |
NAGOYA TRADE & INDUSTRY CENTER |
Attribute-Based Two-Tier Signatures Hiroaki Anada (ISIT), Seiko Arita (IISEC), Kouichi Sakurai (Kyushu University) ISEC2015-9 SITE2015-7 ICSS2015-19 EMM2015-17 |
An attribute-based signature scheme is a digital signature scheme proposed in 2008 by Maji et al.,
in which a message i... [more] |
ISEC2015-9 SITE2015-7 ICSS2015-19 EMM2015-17 pp.1-8 |
QIT (2nd) |
2015-05-25 17:00 |
Osaka |
Osaka University |
MQ Challenge: Solving Problems for Post-Quantum Cryptography and Their Hardness Evaluation Takanori Yasuda (ISIT), Xavier Dahan (Ochanomizu Univ.), Yun-Ju Huang (ISIT), Tsuyoshi Takagi (Kyushu Univ.), Kouichi Sakurai (ISIT) |
[more] |
|
ISEC, IT, WBS |
2015-03-02 10:30 |
Fukuoka |
The University of Kitakyushu |
Accelerating QUAD Stream Cipher using Optimal Extension Field on GPU Satoshi Tanaka (ISIT/Kyushu Univ.), Chen-Mou Cheng (Kyushu Univ.), Takanori Yasuda (ISIT), Kouichi Sakurai (ISIT/Kyushu Univ.) IT2014-62 ISEC2014-75 WBS2014-54 |
Evaluating non-linear multivariate polynomial systems over finite
fields is an important subroutine for QUAD stream cip... [more] |
IT2014-62 ISEC2014-75 WBS2014-54 pp.1-4 |
ISEC, LOIS, SITE |
2014-11-21 13:25 |
Hyogo |
|
Accelerating QUAD Stream Cipher using Multi-Stream Method on Graphics Processing Unit Satoshi Tanaka (ISIT/Kyushu Univ.), Chen-Mou Cheng (Kyushu Univ.), Takanori Yasuda (ISIT), Kouichi Sakurai (ISIT/Kyushu Univ.) ISEC2014-56 SITE2014-47 LOIS2014-26 |
QUAD is a stream cipher with a provable security based on the theory of multivariate public-key cryptography. However, Q... [more] |
ISEC2014-56 SITE2014-47 LOIS2014-26 pp.1-6 |
ISEC, LOIS, SITE |
2014-11-21 13:50 |
Hyogo |
|
Extension of NTRU scheme using non-commutative groups II Takanori Yasuda, Xavier Dahan, Kouichi Sakurai (ISIT) ISEC2014-57 SITE2014-48 LOIS2014-27 |
[more] |
ISEC2014-57 SITE2014-48 LOIS2014-27 pp.7-11 |
ICSS, ISEC, SITE, EMM, IPSJ-CSEC, IPSJ-SPT [detail] |
2014-07-04 10:40 |
Hokkaido |
San-Refure Hakodate |
Cryptanalysis of a matrix variant of NTRU Takanori Yasuda (ISIT), Yuya Yamaguchi (Kyushu Univ.), Xavier Dahan, Kouichi Sakurai (ISIT) ISEC2014-33 SITE2014-28 ICSS2014-37 EMM2014-33 |
Since its introduction in 1996, the cryptosystem NTRU has become a well-established candidate for the next generation pu... [more] |
ISEC2014-33 SITE2014-28 ICSS2014-37 EMM2014-33 pp.239-246 |
EMM, ISEC, SITE, ICSS, IPSJ-CSEC, IPSJ-SPT [detail] |
2013-07-19 15:15 |
Hokkaido |
|
Application of Efficient Forms of Elliptic Curves to Ate-like Pairings Takanori Yasuda (ISIT), Tsuyoshi Takagi (Kyushu Univ.), Kouichi Sakurai (ISIT) ISEC2013-44 SITE2013-39 ICSS2013-49 EMM2013-46 |
[more] |
ISEC2013-44 SITE2013-39 ICSS2013-49 EMM2013-46 pp.323-330 |
IT, ISEC, WBS |
2013-03-07 11:45 |
Osaka |
Kwansei Gakuin Univ., Osaka-Umeda Campus |
A report on Indocrypt2012 Takanori Yasuda (ISIT), Yu Sasaki (NTT), Kouichi Sakurai (Kyushu Univ.) IT2012-69 ISEC2012-87 WBS2012-55 |
This paper reports on the 13th International Conference on Cryptology
in India (Indocrypt2012), held on December 9 to ... [more] |
IT2012-69 ISEC2012-87 WBS2012-55 pp.45-51 |
IT, ISEC, WBS |
2013-03-07 15:55 |
Osaka |
Kwansei Gakuin Univ., Osaka-Umeda Campus |
Notes on Efficient Computing over GF(2^16) using Graphics Processing Unit Satoshi Tanaka (Kyushu Univ./ISIT), Takanori Yasuda (ISIT), Kouichi Sakurai (Kyushu Univ./ISIT) IT2012-84 ISEC2012-102 WBS2012-70 |
Multivariate cryptography uses evaluating non-linear multivariate polynomial systems over finite ields for encrypting me... [more] |
IT2012-84 ISEC2012-102 WBS2012-70 pp.143-147 |
PRMU, HIP |
2012-12-14 10:00 |
Yamagata |
|
Large Capacity Barcode with Confidentiality and Error Correction maintaining Compatibility Nobuyuki Teraura (TCRI), Kouichi Sakurai (KU) PRMU2012-77 HIP2012-66 |
The barcode (NW-7,CODE39) which has spread now is printed on business form etc., and is utilized for logistics, distribu... [more] |
PRMU2012-77 HIP2012-66 pp.43-48 |
EA, EMM |
2012-11-17 11:20 |
Oita |
OITA Univ. |
Examination of the compatible barcode for product code with confidentiality and large capacity Nobuyuki Teraura (TCRI), Kouichi Sakurai (Kyudai) EA2012-101 EMM2012-83 |
The barcode for goods (EAN/JAN code) which has spread now is printed by packaging of goods etc., and is utilized for poi... [more] |
EA2012-101 EMM2012-83 pp.117-122 |
EMM, ISEC, SITE, ICSS, IPSJ-CSEC, IPSJ-SPT [detail] |
2012-07-20 10:30 |
Hokkaido |
|
An efficient variant of Rainbow without triangular matrix representation Takanori Yasuda (ISIT), Tsuyoshi Takagi (Kyushu Univ.), Kouichi Sakurai (ISIT) ISEC2012-29 SITE2012-25 ICSS2012-31 EMM2012-21 |
[more] |
ISEC2012-29 SITE2012-25 ICSS2012-31 EMM2012-21 pp.143-150 |
ICSS |
2012-03-16 14:10 |
Tokyo |
Kikai-Shinko-Kaikan Bldg. |
A Behavior-based Detection Method for Outbreaks of Low-rate Attacks Yaokai Feng, Yoshiaki Hori, Kouichi Sakurai, Jun'ichi Takeuchi (ISIT) ICSS2011-45 |
Low-rate attacks can conceal their traffic because they are very much like normal communication. Thus, although a number... [more] |
ICSS2011-45 pp.37-42 |
ISEC, LOIS |
2011-11-15 16:05 |
Osaka |
Osaka Electro-Communication University |
On the Insecurity of Randomized Arithmetic Codes Based on Markov Model Liang Zhao, Takashi Nishide (Kyushu Univ.), Avishek Adhikari (Univ. of Calcutta), Kyung-Hyune Rhee (Pukyong National Univ.), Kouichi Sakurai (Kyushu Univ.) ISEC2011-61 LOIS2011-55 |
An improvement of arithmetic coding (AC) has been proposed in the paper (Communications in Nonlinear Science and Numeric... [more] |
ISEC2011-61 LOIS2011-55 pp.181-188 |
COMP |
2011-06-30 13:35 |
Hiroshima |
Hiroshima Univ. |
Improving the Cloud Revenue using a Failure-aware Server Management Model Laiping Zhao, Kouichi Sakurai (Kyushu Univ.) COMP2011-19 |
[more] |
COMP2011-19 pp.25-32 |
ISEC |
2011-05-13 13:30 |
Tokyo |
Kikai-Shinko-Kaikan Bldg. |
Revisited: Security of multivariate polynomial signatures over non-commutative rings Takanori Yasuda (ISIT), Kouichi Sakurai (Kyushu Univ.) ISEC2011-1 |
[more] |
ISEC2011-1 pp.1-7 |
ISEC |
2011-05-13 13:55 |
Tokyo |
Kikai-Shinko-Kaikan Bldg. |
A note on the reduction of the size of keys of Rainbow Takanori Yasuda (ISIT), Kouichi Sakurai, Tsuyoshi Takagi (Kyushu Univ.) ISEC2011-2 |
[more] |
ISEC2011-2 pp.9-16 |
ISEC |
2011-05-13 14:20 |
Tokyo |
Kikai-Shinko-Kaikan Bldg. |
Fast Implementation and Experimentation of Multivariate Polynomial Cryptosystems on GPU Satoshi Tanaka, Kouichi Sakurai (Kyushu Univ.) ISEC2011-3 |
In this paper, we try to fast implementation of QUAD and SPELT. They are stream ciphers with multivariate polynomial (MP... [more] |
ISEC2011-3 pp.17-22 |
ICSS |
2010-11-05 14:55 |
Hiroshima |
Hiroshima City University |
A Document Access Control Model Based on Role and Security Policy Liangjian Mao, Kouichi Sakurai (Kyushu Univ.) ICSS2010-51 |
With the rapid development of information technology, electronic document security issues have become increasingly promi... [more] |
ICSS2010-51 pp.41-46 |