IEICE Technical Committee Submission System
Conference Schedule
Online Proceedings
[Sign in]
Tech. Rep. Archives
    [Japanese] / [English] 
( Committee/Place/Topics  ) --Press->
 
( Paper Keywords:  /  Column:Title Auth. Affi. Abst. Keyword ) --Press->

All Technical Committee Conferences  (Searched in: All Years)

Search Results: Conference Papers
 Conference Papers (Available on Advance Programs)  (Sort by: Date Descending)
 Results 21 - 40 of 87 [Previous]  /  [Next]  
Committee Date Time Place Paper Title / Authors Abstract Paper #
LOIS, ISEC, SITE 2015-11-07
10:55
Kanagawa Kanagawa Univ. Extension of NTRU Using Group Ring and Its Application
Takanori Yasuda, Hiroaki Anada (ISIT), Kouichi Sakurai (Kyushu Univ.) ISEC2015-52 SITE2015-39 LOIS2015-46
 [more] ISEC2015-52 SITE2015-39 LOIS2015-46
pp.103-109
IPSJ-CSEC, ISEC, SITE, ICSS, EMM, IPSJ-SPT [detail] 2015-07-02
10:15
Aichi NAGOYA TRADE & INDUSTRY CENTER Attribute-Based Two-Tier Signatures
Hiroaki Anada (ISIT), Seiko Arita (IISEC), Kouichi Sakurai (Kyushu University) ISEC2015-9 SITE2015-7 ICSS2015-19 EMM2015-17
An attribute-based signature scheme is a digital signature scheme proposed in 2008 by Maji et al.,
in which a message i... [more]
ISEC2015-9 SITE2015-7 ICSS2015-19 EMM2015-17
pp.1-8
QIT
(2nd)
2015-05-25
17:00
Osaka Osaka University MQ Challenge: Solving Problems for Post-Quantum Cryptography and Their Hardness Evaluation
Takanori Yasuda (ISIT), Xavier Dahan (Ochanomizu Univ.), Yun-Ju Huang (ISIT), Tsuyoshi Takagi (Kyushu Univ.), Kouichi Sakurai (ISIT)
 [more]
ISEC, IT, WBS 2015-03-02
10:30
Fukuoka The University of Kitakyushu Accelerating QUAD Stream Cipher using Optimal Extension Field on GPU
Satoshi Tanaka (ISIT/Kyushu Univ.), Chen-Mou Cheng (Kyushu Univ.), Takanori Yasuda (ISIT), Kouichi Sakurai (ISIT/Kyushu Univ.) IT2014-62 ISEC2014-75 WBS2014-54
Evaluating non-linear multivariate polynomial systems over finite
fields is an important subroutine for QUAD stream cip... [more]
IT2014-62 ISEC2014-75 WBS2014-54
pp.1-4
ISEC, LOIS, SITE 2014-11-21
13:25
Hyogo   Accelerating QUAD Stream Cipher using Multi-Stream Method on Graphics Processing Unit
Satoshi Tanaka (ISIT/Kyushu Univ.), Chen-Mou Cheng (Kyushu Univ.), Takanori Yasuda (ISIT), Kouichi Sakurai (ISIT/Kyushu Univ.) ISEC2014-56 SITE2014-47 LOIS2014-26
QUAD is a stream cipher with a provable security based on the theory of multivariate public-key cryptography. However, Q... [more] ISEC2014-56 SITE2014-47 LOIS2014-26
pp.1-6
ISEC, LOIS, SITE 2014-11-21
13:50
Hyogo   Extension of NTRU scheme using non-commutative groups II
Takanori Yasuda, Xavier Dahan, Kouichi Sakurai (ISIT) ISEC2014-57 SITE2014-48 LOIS2014-27
 [more] ISEC2014-57 SITE2014-48 LOIS2014-27
pp.7-11
ICSS, ISEC, SITE, EMM, IPSJ-CSEC, IPSJ-SPT [detail] 2014-07-04
10:40
Hokkaido San-Refure Hakodate Cryptanalysis of a matrix variant of NTRU
Takanori Yasuda (ISIT), Yuya Yamaguchi (Kyushu Univ.), Xavier Dahan, Kouichi Sakurai (ISIT) ISEC2014-33 SITE2014-28 ICSS2014-37 EMM2014-33
Since its introduction in 1996, the cryptosystem NTRU has become a well-established candidate for the next generation pu... [more] ISEC2014-33 SITE2014-28 ICSS2014-37 EMM2014-33
pp.239-246
EMM, ISEC, SITE, ICSS, IPSJ-CSEC, IPSJ-SPT [detail] 2013-07-19
15:15
Hokkaido   Application of Efficient Forms of Elliptic Curves to Ate-like Pairings
Takanori Yasuda (ISIT), Tsuyoshi Takagi (Kyushu Univ.), Kouichi Sakurai (ISIT) ISEC2013-44 SITE2013-39 ICSS2013-49 EMM2013-46
 [more] ISEC2013-44 SITE2013-39 ICSS2013-49 EMM2013-46
pp.323-330
IT, ISEC, WBS 2013-03-07
11:45
Osaka Kwansei Gakuin Univ., Osaka-Umeda Campus A report on Indocrypt2012
Takanori Yasuda (ISIT), Yu Sasaki (NTT), Kouichi Sakurai (Kyushu Univ.) IT2012-69 ISEC2012-87 WBS2012-55
This paper reports on the 13th International Conference on Cryptology
in India (Indocrypt2012), held on December 9 to ... [more]
IT2012-69 ISEC2012-87 WBS2012-55
pp.45-51
IT, ISEC, WBS 2013-03-07
15:55
Osaka Kwansei Gakuin Univ., Osaka-Umeda Campus Notes on Efficient Computing over GF(2^16) using Graphics Processing Unit
Satoshi Tanaka (Kyushu Univ./ISIT), Takanori Yasuda (ISIT), Kouichi Sakurai (Kyushu Univ./ISIT) IT2012-84 ISEC2012-102 WBS2012-70
Multivariate cryptography uses evaluating non-linear multivariate polynomial systems over finite ields for encrypting me... [more] IT2012-84 ISEC2012-102 WBS2012-70
pp.143-147
PRMU, HIP 2012-12-14
10:00
Yamagata   Large Capacity Barcode with Confidentiality and Error Correction maintaining Compatibility
Nobuyuki Teraura (TCRI), Kouichi Sakurai (KU) PRMU2012-77 HIP2012-66
The barcode (NW-7,CODE39) which has spread now is printed on business form etc., and is utilized for logistics, distribu... [more] PRMU2012-77 HIP2012-66
pp.43-48
EA, EMM 2012-11-17
11:20
Oita OITA Univ. Examination of the compatible barcode for product code with confidentiality and large capacity
Nobuyuki Teraura (TCRI), Kouichi Sakurai (Kyudai) EA2012-101 EMM2012-83
The barcode for goods (EAN/JAN code) which has spread now is printed by packaging of goods etc., and is utilized for poi... [more] EA2012-101 EMM2012-83
pp.117-122
EMM, ISEC, SITE, ICSS, IPSJ-CSEC, IPSJ-SPT [detail] 2012-07-20
10:30
Hokkaido   An efficient variant of Rainbow without triangular matrix representation
Takanori Yasuda (ISIT), Tsuyoshi Takagi (Kyushu Univ.), Kouichi Sakurai (ISIT) ISEC2012-29 SITE2012-25 ICSS2012-31 EMM2012-21
 [more] ISEC2012-29 SITE2012-25 ICSS2012-31 EMM2012-21
pp.143-150
ICSS 2012-03-16
14:10
Tokyo Kikai-Shinko-Kaikan Bldg. A Behavior-based Detection Method for Outbreaks of Low-rate Attacks
Yaokai Feng, Yoshiaki Hori, Kouichi Sakurai, Jun'ichi Takeuchi (ISIT) ICSS2011-45
Low-rate attacks can conceal their traffic because they are very much like normal communication. Thus, although a number... [more] ICSS2011-45
pp.37-42
ISEC, LOIS 2011-11-15
16:05
Osaka Osaka Electro-Communication University On the Insecurity of Randomized Arithmetic Codes Based on Markov Model
Liang Zhao, Takashi Nishide (Kyushu Univ.), Avishek Adhikari (Univ. of Calcutta), Kyung-Hyune Rhee (Pukyong National Univ.), Kouichi Sakurai (Kyushu Univ.) ISEC2011-61 LOIS2011-55
An improvement of arithmetic coding (AC) has been proposed in the paper (Communications in Nonlinear Science and Numeric... [more] ISEC2011-61 LOIS2011-55
pp.181-188
COMP 2011-06-30
13:35
Hiroshima Hiroshima Univ. Improving the Cloud Revenue using a Failure-aware Server Management Model
Laiping Zhao, Kouichi Sakurai (Kyushu Univ.) COMP2011-19
 [more] COMP2011-19
pp.25-32
ISEC 2011-05-13
13:30
Tokyo Kikai-Shinko-Kaikan Bldg. Revisited: Security of multivariate polynomial signatures over non-commutative rings
Takanori Yasuda (ISIT), Kouichi Sakurai (Kyushu Univ.) ISEC2011-1
 [more] ISEC2011-1
pp.1-7
ISEC 2011-05-13
13:55
Tokyo Kikai-Shinko-Kaikan Bldg. A note on the reduction of the size of keys of Rainbow
Takanori Yasuda (ISIT), Kouichi Sakurai, Tsuyoshi Takagi (Kyushu Univ.) ISEC2011-2
 [more] ISEC2011-2
pp.9-16
ISEC 2011-05-13
14:20
Tokyo Kikai-Shinko-Kaikan Bldg. Fast Implementation and Experimentation of Multivariate Polynomial Cryptosystems on GPU
Satoshi Tanaka, Kouichi Sakurai (Kyushu Univ.) ISEC2011-3
In this paper, we try to fast implementation of QUAD and SPELT. They are stream ciphers with multivariate polynomial (MP... [more] ISEC2011-3
pp.17-22
ICSS 2010-11-05
14:55
Hiroshima Hiroshima City University A Document Access Control Model Based on Role and Security Policy
Liangjian Mao, Kouichi Sakurai (Kyushu Univ.) ICSS2010-51
With the rapid development of information technology, electronic document security issues have become increasingly promi... [more] ICSS2010-51
pp.41-46
 Results 21 - 40 of 87 [Previous]  /  [Next]  
Choose a download format for default settings. [NEW !!]
Text format pLaTeX format CSV format BibTeX format
Copyright and reproduction : All rights are reserved and no part of this publication may be reproduced or transmitted in any form or by any means, electronic or mechanical, including photocopy, recording, or any information storage and retrieval system, without permission in writing from the publisher. Notwithstanding, instructors are permitted to photocopy isolated articles for noncommercial classroom use without fee. (License No.: 10GA0019/12GB0052/13GB0056/17GB0034/18GB0034)


[Return to Top Page]

[Return to IEICE Web Page]


The Institute of Electronics, Information and Communication Engineers (IEICE), Japan