IEICE Technical Committee Submission System
Conference Schedule
Online Proceedings
[Sign in]
Tech. Rep. Archives
    [Japanese] / [English] 
( Committee/Place/Topics  ) --Press->
 
( Paper Keywords:  /  Column:Title Auth. Affi. Abst. Keyword ) --Press->

All Technical Committee Conferences  (Searched in: All Years)

Search Results: Conference Papers
 Conference Papers (Available on Advance Programs)  (Sort by: Date Descending)
 Results 21 - 36 of 36 [Previous]  /   
Committee Date Time Place Paper Title / Authors Abstract Paper #
ISEC 2011-12-14
16:50
Tokyo Kikai-Shinko-Kaikan Bldg. [Invited Talk] Public-Key Identification Schemes based on Multivariate Quadratic Polynomials
Koichi Sakumoto, Taizo Shirai, Harunaga Hiwatari (Sony) ISEC2011-72
A problem of solving a system of multivariate quadratic polynomials over a finite field, which is called an MQ problem, ... [more] ISEC2011-72
p.39
ISEC, IPSJ-CSEC, SITE, ICSS [detail] 2010-07-02
09:00
Aomori Hirosaki University Proposal on MPKC Signature Scheme with Check Equations
Shigeo Tsujii, Masahito Gotaishi (Chuo University) ISEC2010-23 SITE2010-19 ICSS2010-29
A new signature system of multivariate public key cryptosystem (MPKC), which uses separate check equations in order to p... [more] ISEC2010-23 SITE2010-19 ICSS2010-29
pp.107-112
IBISML 2010-06-14
16:25
Tokyo Takeda Hall, Univ. Tokyo Privacy Preservation in Online Prediction
Jun Sakuma (Univ. of Tsukuba/JST), Hiromi Arai (U. Tsukuba) IBISML2010-9
In this paper, we consider online prediction from expert advice in a situation where each expert observes its own loss a... [more] IBISML2010-9
pp.49-56
IT, ISEC, WBS 2010-03-05
16:10
Nagano Nagano-Engineering Campus, Shinshu University A study on the probabilistic algorithm to solve the elliptic curve discrete logarithm problem
Osamu Ashihara, Yoshitaka Sagara, Nobuhide Sakuragi, Tomoko K. Matsushima (Polytechnic Univ.) IT2009-129 ISEC2009-137 WBS2009-108
In this paper a probabilistic algorithm to solve the ECDLP is presented. This scheme uses the symmetry of the elliptic c... [more] IT2009-129 ISEC2009-137 WBS2009-108
pp.373-380
ISEC, LOIS 2009-11-13
09:00
Gifu Gifu Univ. Proposal on Multivariate Public Key Signature Scheme Applying the STS cryptosystem
Shigeo Tsujii, Masahito Gotaishi, Kohtaro Tadaki (Chuo Univ.) ISEC2009-59 LOIS2009-48
New signature scheme based on Stepwise Triangular Scheme (STS), which is one of the basic trapdoors of Multivariate Publ... [more] ISEC2009-59 LOIS2009-48
pp.55-60
ISEC, IPSJ-CSEC, SITE, ICSS [detail] 2009-07-03
10:20
Akita Akita University Proposal of Integrated MPKC: PPS -- STS Enhanced by Perturbed Piece In Hand Method --
Shigeo Tsujii, Kohtaro Tadaki, Masahito Gotaishi, Ryo Fujita (Chuo Univ.), Masao Kasahara (OGU) ISEC2009-27 SITE2009-19 ICSS2009-41
In this paper, we propose a new MPKC, called PPS, based on (i) the 2-layer nonlinear piece in hand method, (ii) Internal... [more] ISEC2009-27 SITE2009-19 ICSS2009-41
pp.139-146
ISEC 2009-05-22
14:15
Tokyo Kikai-Shinko-Kaikan Bldg. An Improvement of Cyclic Vector Multiplication Algorithm based on Gauss period Normal Basis
Erika Yanagi, Kenta Nekado, Yasuyuki Nogami, Yoshitaka Morikawa (Okayama Univ.) ISEC2009-9
This paper first introduces cyclic vector multiplication algorithm (CVMA) that is a multiplication algorithm with Gauss ... [more] ISEC2009-9
pp.55-60
WBS, IT, ISEC 2009-03-09
13:10
Hokkaido Hakodate Mirai Univ. [Invited Talk] Advances in Public-Key Cryptography (RSA, ECC, IBE)
Tsuyoshi Takagi (Future Univ. Hakodate.) IT2008-50 ISEC2008-108 WBS2008-63
We give a brief overview on the development of public-key cryptography starting with RSA cryptosystem. The most frequent... [more] IT2008-50 ISEC2008-108 WBS2008-63
pp.47-48
MSS 2009-01-29
13:25
Kanagawa Kanagawa Industrial Promotion Center A Method of Petri Nets and Calculating the Elementary T-invariants for Public-key Cryptography MEPKC
Ryo Yamaguchi, Qi-Wei Ge, Mitsuru Nakata (Yamaguchi Univ.) CST2008-42
This paper aims at automatically generating Petri nets that are used as key generator of public-key cryptography MEPKC. ... [more] CST2008-42
pp.5-10
MSS 2008-01-29
10:20
Tokushima The University of Tokushima A Method of Generating and Complicating Petri Nets Used as Key-generator of a public-key cryptgraphy MEPKC
Ryosuke Murakami, Ryo Yamaguchi, Qi-Wei Ge, Mitsuru Nakata (Yamaguchi Univ) CST2007-48
This paper aims at automatically generating Petri nets that
are used as key generator of a public-key cryptography MEP... [more]
CST2007-48
pp.11-16
MSS 2007-06-29
10:15
Okinawa   An algorithm to enumerate all the elementary T-invariants of auto-generated Petri nets
Ryo Yamaguchi, Ryosuke Murakami, Mitsuru Nakata, Qi-Wei Ge (Yamaguchi Univ.) CST2007-9
In this paper, we propose an algorithm to enumerate all the elementary
T-invariants of auto-generated Petri nets that ... [more]
CST2007-9
pp.15-20
CAS, SIP, VLD 2007-06-22
13:00
Hokkaido Hokkaido Tokai Univ. (Sapporo) Scalable Dual-Radix Unified Montgomery Multiplier in GF(p) and GF(2n)
Kazuyuki Tanimura, Ryuta Nara, Shunitsu Kohara, Youhua Shi, Nozomu Togawa, Masao Yanagisawa, Tatsuo Ohtsuki (Waseda Univ.) CAS2007-26 VLD2007-42 SIP2007-56
Modular multiplication is the dominant arithmetic operation in elliptic curve cryptography (ECC), which is one of public... [more] CAS2007-26 VLD2007-42 SIP2007-56
pp.43-48
ICD, VLD 2007-03-08
15:50
Okinawa Mielparque Okinawa Design of RSA Encryption circuit with embedded Fixed Private Key using Via Programmable Logic VPEX
Hiroshi Shimomura, Kazuki Okuyama, Akihiro Nakamura, Takeshi Fujino (Ritsumei Univ.)
We have been studied the Via Programmable Logic Architecture VPEX (Via Programmable Logic using EXOR Array) . As similar... [more] VLD2006-136 ICD2006-227
pp.103-108
ISEC, SITE, IPSJ-CSEC 2006-07-20
09:30
Okayama Okayama Univ. A Translation Matrix between Two Isomorphic Extension Fields via Optimal Normal Basis Representation
Ryo Nanba, Yasuyuki Nogami, Yoshitaka Morikawa (Okayama Univ.)
Some extension fields efficient for fast implementation have been proposed. These extension fields adopt unique modular ... [more] ISEC2006-9 SITE2006-6
pp.1-6
WBS, IT, ISEC 2006-03-16
13:15
Aichi Nagoya Univ. [Invited Talk] Acceleration of arithmetic in Galois fields by hardware support
Naofumi Takagi (Nagoya Univ.)
In encryption and decryption of public-key cryptographies, such as elliptic curve cryptography (ECC), computation of ari... [more] IT2005-72 ISEC2005-129 WBS2005-86
p.49
COMP 2005-09-15
13:20
Osaka Osaka Univ., Toyonaka Campus [Tutorial Lecture] NA
Akinori Kawachi (Tokyo Tech.)
Applications of quantum information processing to cryptography has played a central role in the quantum information scie... [more]
 Results 21 - 36 of 36 [Previous]  /   
Choose a download format for default settings. [NEW !!]
Text format pLaTeX format CSV format BibTeX format
Copyright and reproduction : All rights are reserved and no part of this publication may be reproduced or transmitted in any form or by any means, electronic or mechanical, including photocopy, recording, or any information storage and retrieval system, without permission in writing from the publisher. Notwithstanding, instructors are permitted to photocopy isolated articles for noncommercial classroom use without fee. (License No.: 10GA0019/12GB0052/13GB0056/17GB0034/18GB0034)


[Return to Top Page]

[Return to IEICE Web Page]


The Institute of Electronics, Information and Communication Engineers (IEICE), Japan