Committee |
Date Time |
Place |
Paper Title / Authors |
Abstract |
Paper # |
ICSS, IPSJ-SPT |
2024-03-22 11:45 |
Okinawa |
OIST (Primary: On-site, Secondary: Online) |
Fast and Secure Scalar Multiplication for the GLS254 Binary Elliptic Curve Ryosuke Kido, Atsuko Miyaji (OU) ICSS2023-94 |
Elliptic curve cryptosystems (ECCs) are cryptographic schemes based on the discrete logarithm problem on an elliptic cur... [more] |
ICSS2023-94 pp.180-187 |
RCC, ISEC, IT, WBS |
2024-03-13 - 2024-03-14 |
Osaka |
Osaka Univ. (Suita Campus) |
[Invited Talk]
Cryptographic Research Based on Algebraic Curve Computation Katsuyuki Takashima (Waseda Univ.) IT2023-116 ISEC2023-115 WBS2023-104 RCC2023-98 |
We have a wide range of cryptographic primitives based on elliptic curves, i.e., widely deployed public key cryptosystem... [more] |
IT2023-116 ISEC2023-115 WBS2023-104 RCC2023-98 p.265 |
ISEC |
2023-05-17 16:25 |
Tokyo |
Kikai-Shinko-Kaikan Bldg. |
[Invited Talk]
Concrete Quantum Cryptanalysis of Binary Elliptic Curves via Addition Chain (from CT-RSA 2023) Ren Taguchi, Atsushi Takayasu (The Univ. of Tokyo) ISEC2023-13 |
(To be available after the conference date) [more] |
ISEC2023-13 p.66 |
HWS |
2023-04-15 09:40 |
Oita |
(Primary: On-site, Secondary: Online) |
Investigation of automated design technique of pairing engine Momoko Fukuda, Makoto Ikeda (UT) HWS2023-10 |
We have realized a design automation platform of hardware accelerator for pairing operation over multiple elliptic curve... [more] |
HWS2023-10 pp.37-42 |
SIS |
2023-03-02 14:10 |
Chiba |
Chiba Institute of Technology (Primary: On-site, Secondary: Online) |
Timeout ciphers based on ID-based cryptography Shota Oriyama, Hiroyuki Tsuji, Tomoaki Kimura (KAIT) SIS2022-45 |
Encryption technology has become indispensable in the information society, and although encryption technology is used fo... [more] |
SIS2022-45 pp.27-32 |
HWS, VLD |
2023-03-04 14:20 |
Okinawa |
(Primary: On-site, Secondary: Online) |
Side-channel Information Leakage Resistance Evaluation of Cryptographic Multi- chip Modules Takumi Matsumaru, Kazuki Monta (Kobe Univ.), Takaaki Okidono (SCU), Takuzi Miki, Makoto Nagata (Kobe Univ.) VLD2022-122 HWS2022-93 |
Demand for multi-chip packaging technology is rising. This study focuses on two types of packaging technologies in parti... [more] |
VLD2022-122 HWS2022-93 pp.273-278 |
VLD, DC, RECONF, ICD, IPSJ-SLDM [detail] |
2022-11-29 14:40 |
Kumamoto |
(Primary: On-site, Secondary: Online) |
Evaluating system level security of cryptography module Takumi Matsumaru, Kazuki Monta (Kobe Univ.), Takaaki Okidono (SCU), Takuji Miki, Makoto Nagata (Kobe Univ.) VLD2022-32 ICD2022-49 DC2022-48 RECONF2022-55 |
Packaging technology is a technique used to encapsulate semiconductor chips in a frame, and has been attracting attentio... [more] |
VLD2022-32 ICD2022-49 DC2022-48 RECONF2022-55 pp.78-81 |
HWS |
2021-04-12 10:25 |
Tokyo |
Tokyo University/Online (Primary: On-site, Secondary: Online) |
Approximate Solution of Large-Scale Job Shop Scheduling Problem and Its Application to Hardware Cryptographic Design Kento Ikeda, Makoto Ikeda (Tokyo Univ.) HWS2021-2 |
The optimal design of cryptographic data paths in hardware can be considered as a job-shop scheduling problem. This prob... [more] |
HWS2021-2 pp.7-12 |
HWS, VLD [detail] |
2021-03-04 14:15 |
Online |
Online |
Experiments of Data Authenticity Verification in Multi-Node IoT Systems Using Elliptic Curve Digital Signature Chips Yuya Takahashi, Takuya Matsumaru, Kazuki Monta (Kobe Univ.), Toshihiro Sato, Takaaki Okidono (ECSEC Lab), Takuji Miki, Noriyuki Miura, Makoto Nagata (Kobe Univ.) VLD2020-85 HWS2020-60 |
Practicality of IoT systems requires the efficiency and speed of crypto processing in edge nodes and remote servers. So ... [more] |
VLD2020-85 HWS2020-60 pp.97-101 |
HWS, VLD [detail] |
2020-03-06 13:50 |
Okinawa |
Okinawa Ken Seinen Kaikan (Cancelled but technical report was issued) |
Design Space Search for Faster Fp256 Elliptic Curve Cryptography Kento Ikeda (Tokyo Univ.), Makoto Ikeda (d.lab) VLD2019-130 HWS2019-103 |
In this study, we created a scheduling of operations by changing parameters such as elliptic curves, their formulas, the... [more] |
VLD2019-130 HWS2019-103 pp.209-214 |
VLD, DC, CPSY, RECONF, ICD, IE, IPSJ-SLDM, IPSJ-EMB, IPSJ-ARC (Joint) [detail] |
2019-11-15 10:05 |
Ehime |
Ehime Prefecture Gender Equality Center |
Evaluation of operating performance of ECDSA hardware module Yuya Takahashi, Monta kazuki (Kobe Univ.), Toshihiro Sato, Takaaki Okidono (ECSEC Lab), Takuji Miki, Noriyuki Miura, Makoto Nagata (Kobe Univ.) ICD2019-35 IE2019-41 |
There are limits to how much IoT power and encryption speed can be improved at the software level. Therefore, it is nece... [more] |
ICD2019-35 IE2019-41 pp.37-40 |
SIP |
2019-08-29 15:10 |
Tokyo |
|
Implementation of the Elliptic Curve Cryptography over Gaussian Integral Finite Group onto Excel Kazuki Naganuma, Takashi Suzuki, Hiroyuki Tsuji, Tomoaki Kimura (KAIT) SIP2019-42 |
The Elliptic Curve Cryptography is known as cryptography safer than the RSA Cryptography. Defining the
elliptic curve o... [more] |
SIP2019-42 pp.17-22 |
ISEC |
2018-05-16 10:00 |
Tokyo |
Ookayama Campus, Tokyo Institute of Technology |
Hardness of Discrete Logarithm Problem Based on New Operation on Elliptic Curve over Finite Field and New Digital Signature Masaaki Shirase (FUN) ISEC2018-1 |
In the previous works, a new operation on elliptic curve over finite field $E(Fp)$, the Me operation $oplus$, is defined... [more] |
ISEC2018-1 pp.1-8 |
WBS, IT, ISEC |
2018-03-08 10:15 |
Tokyo |
Katsusika Campas, Tokyo University of Science |
High Efficient Scalar Multiplication in Elliptic Curve Cryptography Noboru Takeuchi, Toshiyuki Kinoshita (TUT) IT2017-120 ISEC2017-108 WBS2017-101 |
(To be available after the conference date) [more] |
IT2017-120 ISEC2017-108 WBS2017-101 pp.97-101 |
ICSS, IPSJ-SPT |
2018-03-07 13:00 |
Hokkaido |
Okinawa Hokubu Koyou Nouryoku Kaihatsu Sougou Center |
On the effectiveness of solving ECDLP using Characteristic set methods Tomoya Nishiguchi, Chen Mou, Kenta kodera, Atuko Miyaji (Osaka Univ.) ICSS2017-55 |
An elliptic curves cryptosystem is cryptography which guarantee safety in public key cryptosystem.When we use index calc... [more] |
ICSS2017-55 pp.25-30 |
ISEC, WBS, IT |
2017-03-09 14:25 |
Tokyo |
TOKAI University |
Elliptic Curves Subjected to the GHS Attack on Composite Degree Extension Fields of Odd Characteristic Part II Tappei Kobayashi (Chuo Univ.), Tsutomu Iijima (Koden Electronics), Jinhui Chao (Chuo Univ.) IT2016-105 ISEC2016-95 WBS2016-81 |
The GHS attack to elliptic/hyperelliptic curves cryptosystem is an attack to solve discrete logarithm problems (DLP) in ... [more] |
IT2016-105 ISEC2016-95 WBS2016-81 pp.41-48 |
ISEC, WBS, IT |
2017-03-09 15:25 |
Tokyo |
TOKAI University |
Security evaluation of elliptic curve cryptosystems with special addition formula Kodera Kenta (Osaka Univ.), Miyaji Atsuko (Osaka Univ./JAIST), Cheng Chen-Mou (Osaka Univ.) IT2016-110 ISEC2016-100 WBS2016-86 |
Recently, multivariate polynomial is applied to solve Elliptic Curve Discrete Logarithm Probrem (ECDLP). Not only Weiers... [more] |
IT2016-110 ISEC2016-100 WBS2016-86 pp.73-78 |
ISEC, WBS, IT |
2017-03-09 15:50 |
Tokyo |
TOKAI University |
Construction of covering curves of elliptic curves over finite fields of even characteristic using simple extension Seiya Kukisaki (Chuo Univ.), Mahoro Simura (Tokai Univ.), Jinhui Chao (Chuo Univ.) IT2016-111 ISEC2016-101 WBS2016-87 |
The GHS attacks present a serious threat to cryptosystems using elliptic curves over extensions of finite fields when th... [more] |
IT2016-111 ISEC2016-101 WBS2016-87 pp.79-83 |
ICSS, IPSJ-SPT |
2016-03-04 15:40 |
Kyoto |
Academic Center for Computing and Media Studies, Kyoto University |
Improvement and implementation of scalar multiplication algorithms with side-channel protection Keisuke Kito (JAIST), Atsuko Miyaji (Osaka Univ./JAIST/JST CREST) ICSS2015-71 |
Elliptic Curve Cryptosystems require shorter key length than traditional cryptosystems and is suitable for memory limite... [more] |
ICSS2015-71 pp.147-152 |
VLD, DC, IPSJ-SLDM, CPSY, RECONF, ICD, CPM (Joint) [detail] |
2015-12-01 13:10 |
Nagasaki |
Nagasaki Kinro Fukushi Kaikan |
Implementation of ECDSA Using Gate-level Pipelined Self-synchronous Circuit Masato Tamura, Makoto Ikeda (Univ. of Tokyo) VLD2015-39 DC2015-35 |
In this paper, we investigated the implementation method of elliptic curve digital signature algorithm using self-synchr... [more] |
VLD2015-39 DC2015-35 pp.7-12 |