IEICE Technical Committee Submission System
Conference Schedule
Online Proceedings
[Sign in]
Tech. Rep. Archives
    [Japanese] / [English] 
( Committee/Place/Topics  ) --Press->
 
( Paper Keywords:  /  Column:Title Auth. Affi. Abst. Keyword ) --Press->

All Technical Committee Conferences  (Searched in: All Years)

Search Results: Conference Papers
 Conference Papers (Available on Advance Programs)  (Sort by: Date Descending)
 Results 1 - 20 of 73  /  [Next]  
Committee Date Time Place Paper Title / Authors Abstract Paper #
ICSS, IPSJ-SPT 2024-03-22
11:45
Okinawa OIST
(Primary: On-site, Secondary: Online)
Fast and Secure Scalar Multiplication for the GLS254 Binary Elliptic Curve
Ryosuke Kido, Atsuko Miyaji (OU) ICSS2023-94
Elliptic curve cryptosystems (ECCs) are cryptographic schemes based on the discrete logarithm problem on an elliptic cur... [more] ICSS2023-94
pp.180-187
RCC, ISEC, IT, WBS 2024-03-13
- 2024-03-14
Osaka Osaka Univ. (Suita Campus) [Invited Talk] Cryptographic Research Based on Algebraic Curve Computation
Katsuyuki Takashima (Waseda Univ.) IT2023-116 ISEC2023-115 WBS2023-104 RCC2023-98
We have a wide range of cryptographic primitives based on elliptic curves, i.e., widely deployed public key cryptosystem... [more] IT2023-116 ISEC2023-115 WBS2023-104 RCC2023-98
p.265
EMM, BioX, ISEC, SITE, ICSS, HWS, IPSJ-CSEC, IPSJ-SPT [detail] 2023-07-24
16:40
Hokkaido Hokkaido Jichiro Kaikan Novel Image authentication scheme using error correction code and digital signature
Ken-ichi Sakina (QRTechnology) ISEC2023-28 SITE2023-22 BioX2023-31 HWS2023-28 ICSS2023-25 EMM2023-28
We propose a novel image authentication scheme using Reed-Solomon codes and elliptic curve digital signatures. Conventio... [more] ISEC2023-28 SITE2023-22 BioX2023-31 HWS2023-28 ICSS2023-25 EMM2023-28
pp.91-96
HWS 2023-04-15
09:40
Oita
(Primary: On-site, Secondary: Online)
Investigation of automated design technique of pairing engine
Momoko Fukuda, Makoto Ikeda (UT) HWS2023-10
We have realized a design automation platform of hardware accelerator for pairing operation over multiple elliptic curve... [more] HWS2023-10
pp.37-42
RCC, ISEC, IT, WBS 2023-03-14
09:00
Yamaguchi
(Primary: On-site, Secondary: Online)
Proposal of operation oplus on positive rational numbers compatible with the 2nd-Me scalar multiplication -- Similar construction of an elliptic curve signature by the 2nd-Me scalar multiplication --
Masaaki Shirase (FUN) IT2022-72 ISEC2022-51 WBS2022-69 RCC2022-69
The 2nd-Me scalar multiple $P_{n,Z}^{II}$ can be defined
for points $P,Z in E(F_p)$ of an elliptic curve over a finite... [more]
IT2022-72 ISEC2022-51 WBS2022-69 RCC2022-69
pp.25-32
SIS 2023-03-02
14:10
Chiba Chiba Institute of Technology
(Primary: On-site, Secondary: Online)
Timeout ciphers based on ID-based cryptography
Shota Oriyama, Hiroyuki Tsuji, Tomoaki Kimura (KAIT) SIS2022-45
Encryption technology has become indispensable in the information society, and although encryption technology is used fo... [more] SIS2022-45
pp.27-32
HWS, VLD 2023-03-04
14:20
Okinawa
(Primary: On-site, Secondary: Online)
Side-channel Information Leakage Resistance Evaluation of Cryptographic Multi- chip Modules
Takumi Matsumaru, Kazuki Monta (Kobe Univ.), Takaaki Okidono (SCU), Takuzi Miki, Makoto Nagata (Kobe Univ.) VLD2022-122 HWS2022-93
Demand for multi-chip packaging technology is rising. This study focuses on two types of packaging technologies in parti... [more] VLD2022-122 HWS2022-93
pp.273-278
VLD, DC, RECONF, ICD, IPSJ-SLDM [detail] 2022-11-29
14:40
Kumamoto  
(Primary: On-site, Secondary: Online)
Evaluating system level security of cryptography module
Takumi Matsumaru, Kazuki Monta (Kobe Univ.), Takaaki Okidono (SCU), Takuji Miki, Makoto Nagata (Kobe Univ.) VLD2022-32 ICD2022-49 DC2022-48 RECONF2022-55
Packaging technology is a technique used to encapsulate semiconductor chips in a frame, and has been attracting attentio... [more] VLD2022-32 ICD2022-49 DC2022-48 RECONF2022-55
pp.78-81
ISEC, SITE, LOIS 2022-11-18
15:20
Online Online On the difficulty of the 2nd MeDLP
Masaaki Shirase (FUN) ISEC2022-37 SITE2022-41 LOIS2022-21
The Me scalar multiplication is defined for the Me operations on elliptic curves over finite fields, and Me version of t... [more] ISEC2022-37 SITE2022-41 LOIS2022-21
pp.39-46
HWS, ICD [detail] 2021-10-19
16:15
Online Online Security evaluatuion of pairing-based cryptography against Special extended Number Field Sieve method
Saito Kikuoka, Makoto Ikeda (Tokyo Univ.) HWS2021-52 ICD2021-26
Pairing-based cryptography is an extension of elliptic-curve-based cryptography for applications realizing functional cr... [more] HWS2021-52 ICD2021-26
pp.57-62
HWS 2021-04-12
10:25
Tokyo Tokyo University/Online
(Primary: On-site, Secondary: Online)
Approximate Solution of Large-Scale Job Shop Scheduling Problem and Its Application to Hardware Cryptographic Design
Kento Ikeda, Makoto Ikeda (Tokyo Univ.) HWS2021-2
The optimal design of cryptographic data paths in hardware can be considered as a job-shop scheduling problem. This prob... [more] HWS2021-2
pp.7-12
HWS, VLD [detail] 2021-03-04
14:15
Online Online Experiments of Data Authenticity Verification in Multi-Node IoT Systems Using Elliptic Curve Digital Signature Chips
Yuya Takahashi, Takuya Matsumaru, Kazuki Monta (Kobe Univ.), Toshihiro Sato, Takaaki Okidono (ECSEC Lab), Takuji Miki, Noriyuki Miura, Makoto Nagata (Kobe Univ.) VLD2020-85 HWS2020-60
Practicality of IoT systems requires the efficiency and speed of crypto processing in edge nodes and remote servers. So ... [more] VLD2020-85 HWS2020-60
pp.97-101
SITE, ISEC, HWS, EMM, BioX, IPSJ-CSEC, IPSJ-SPT, ICSS [detail] 2020-07-21
16:35
Online Online Secure and Compact Elliptic Curve LR Scalar Multiplication
Yaoan Jin, Atsuko Miyaji (Osaka Univ) ISEC2020-31 SITE2020-28 BioX2020-34 HWS2020-24 ICSS2020-18 EMM2020-28
Elliptic curve cryptography (ECC) can ensure an equivalent security with much smaller key sizes. Elliptic curve scalar m... [more] ISEC2020-31 SITE2020-28 BioX2020-34 HWS2020-24 ICSS2020-18 EMM2020-28
pp.111-118
HWS, VLD [detail] 2020-03-06
13:50
Okinawa Okinawa Ken Seinen Kaikan
(Cancelled but technical report was issued)
Design Space Search for Faster Fp256 Elliptic Curve Cryptography
Kento Ikeda (Tokyo Univ.), Makoto Ikeda (d.lab) VLD2019-130 HWS2019-103
In this study, we created a scheduling of operations by changing parameters such as elliptic curves, their formulas, the... [more] VLD2019-130 HWS2019-103
pp.209-214
ISEC, SITE, LOIS 2019-11-01
13:10
Osaka Osaka Univ. Character on elliptic curves over finite fields and even-oddness of the order of points
Masaaki Shirase (FUN) ISEC2019-66 SITE2019-60 LOIS2019-25
Let $p$ be a prime $ge 5$, $q$ be a power of $p$, and $Fq$ be a finite field with $q$ elements. Let $E/Fq$ be an ellipti... [more] ISEC2019-66 SITE2019-60 LOIS2019-25
pp.25-32
SIP 2019-08-29
15:10
Tokyo   Implementation of the Elliptic Curve Cryptography over Gaussian Integral Finite Group onto Excel
Kazuki Naganuma, Takashi Suzuki, Hiroyuki Tsuji, Tomoaki Kimura (KAIT) SIP2019-42
The Elliptic Curve Cryptography is known as cryptography safer than the RSA Cryptography. Defining the
elliptic curve o... [more]
SIP2019-42
pp.17-22
ISEC, SITE, ICSS, EMM, HWS, BioX, IPSJ-CSEC, IPSJ-SPT [detail] 2019-07-24
14:10
Kochi Kochi University of Technology Anonymous Public-Key Certificates based on Elliptic Curve
Kazuomi Oishi (SIST) ISEC2019-53 SITE2019-47 BioX2019-45 HWS2019-48 ICSS2019-51 EMM2019-56
Anonymous public-key certificates can guarantee anonymity of the certificate users and are useful for applications in wh... [more] ISEC2019-53 SITE2019-47 BioX2019-45 HWS2019-48 ICSS2019-51 EMM2019-56
pp.347-352
IT, ISEC, WBS 2019-03-07
11:20
Tokyo University of Electro-Communications A Consideration of the Properties of Edwards Curve Whose Order is a Power of 2
Hiromasa Miura, Kazuya Kobayashi, Takuya Kusaka, Yasuyuki Nogami (Okayama Univ.) IT2018-79 ISEC2018-85 WBS2018-80
Based on the proposal of pairing-based cryptography, ID-based cryptography, searchable cryptography, and attribute-based... [more] IT2018-79 ISEC2018-85 WBS2018-80
pp.27-32
ISEC 2018-05-16
10:00
Tokyo Ookayama Campus, Tokyo Institute of Technology Hardness of Discrete Logarithm Problem Based on New Operation on Elliptic Curve over Finite Field and New Digital Signature
Masaaki Shirase (FUN) ISEC2018-1
In the previous works, a new operation on elliptic curve over finite field $E(Fp)$, the Me operation $oplus$, is defined... [more] ISEC2018-1
pp.1-8
ICSS, IPSJ-SPT 2018-03-07
13:00
Hokkaido Okinawa Hokubu Koyou Nouryoku Kaihatsu Sougou Center On the effectiveness of solving ECDLP using Characteristic set methods
Tomoya Nishiguchi, Chen Mou, Kenta kodera, Atuko Miyaji (Osaka Univ.) ICSS2017-55
An elliptic curves cryptosystem is cryptography which guarantee safety in public key cryptosystem.When we use index calc... [more] ICSS2017-55
pp.25-30
 Results 1 - 20 of 73  /  [Next]  
Choose a download format for default settings. [NEW !!]
Text format pLaTeX format CSV format BibTeX format
Copyright and reproduction : All rights are reserved and no part of this publication may be reproduced or transmitted in any form or by any means, electronic or mechanical, including photocopy, recording, or any information storage and retrieval system, without permission in writing from the publisher. Notwithstanding, instructors are permitted to photocopy isolated articles for noncommercial classroom use without fee. (License No.: 10GA0019/12GB0052/13GB0056/17GB0034/18GB0034)


[Return to Top Page]

[Return to IEICE Web Page]


The Institute of Electronics, Information and Communication Engineers (IEICE), Japan