Committee |
Date Time |
Place |
Paper Title / Authors |
Abstract |
Paper # |
ISEC |
2020-05-20 12:50 |
Online |
Online |
[Invited Talk]
Efficient Private PEZ Protocols for Symmetric Functions (from TCC 2019) Yoshiki Abe, Mitsugu Iwamoto (UEC), Kazuo Ohta (UEC/AIST) ISEC2020-4 |
[more] |
ISEC2020-4 p.23 |
IT, ISEC, WBS |
2019-03-08 14:45 |
Tokyo |
University of Electro-Communications |
A Private PEZ Protocol of 4-Input Majority Vote with 29 PEZ Candies Yoshiki Abe, Shota Yamamoto, Mitsugu Iwamoto, Kazuo Ohta (UEC) IT2018-111 ISEC2018-117 WBS2018-112 |
Secure multi-party computation can be implemented by
using a (big) PEZ dispenser,
which is called as a ¥textit{priva... [more] |
IT2018-111 ISEC2018-117 WBS2018-112 pp.223-228 |
IT, ISEC, WBS |
2019-03-08 16:45 |
Tokyo |
University of Electro-Communications |
[Invited Talk]
Exceptional Experiences of my Research Activities on Modern Cryptography Kazuo Ohta (UEC) IT2018-115 ISEC2018-121 WBS2018-116 |
As a fellow receiving a prize commemorative lecture, I look back on 36-year research and education experiences on modern... [more] |
IT2018-115 ISEC2018-121 WBS2018-116 p.249 |
HWS, ISEC, SITE, ICSS, EMM, IPSJ-CSEC, IPSJ-SPT [detail] |
2018-07-25 09:55 |
Hokkaido |
Sapporo Convention Center |
Truly Efficient Robust Secret Sharing for the Real World Yohei Watanabe (UEC), Kazuma Ohara (UEC/NEC), Mitsugu Iwamoto, Kazuo Ohta (UEC) ISEC2018-13 SITE2018-5 HWS2018-10 ICSS2018-16 EMM2018-12 |
Robust secret sharing is secret sharing with the following robustness property: An original message can be recovered eve... [more] |
ISEC2018-13 SITE2018-5 HWS2018-10 ICSS2018-16 EMM2018-12 pp.1-8 |
SITE, EMM, ISEC, ICSS, IPSJ-CSEC, IPSJ-SPT [detail] |
2017-07-14 16:35 |
Tokyo |
|
PUF based Device Authentication without Error Correction Yuichi Komano (Toshiba), Mitsugu Iwamoto, Kazuo Ohta (UEC) ISEC2017-24 SITE2017-16 ICSS2017-23 EMM2017-27 |
[more] |
ISEC2017-24 SITE2017-16 ICSS2017-23 EMM2017-27 pp.123-130 |
ISEC, WBS, IT |
2017-03-10 14:10 |
Tokyo |
TOKAI University |
A Note on Acceptable Information Leakage of Searchable Symmetric Encryption Takeshi Nakai, Takuya Nojima, Mitsugu Iwamoto, Kazuo Ohta (UEC) IT2016-128 ISEC2016-118 WBS2016-104 |
(To be available after the conference date) [more] |
IT2016-128 ISEC2016-118 WBS2016-104 pp.187-193 |
EMM, IT |
2015-05-22 13:40 |
Kyoto |
Kyoto International Community House |
An Audio Secret Sharing Scheme Easy to Reproduce Secret Physically Yuuki Tokushige, Yuto Misawa, Fumiaki Yoshida, Masaya Uwatoko, Mitsugu Iwamoto, Kazuo Ohta (UEC) IT2015-14 EMM2015-14 |
An audio secret sharing scheme is a variant of secret sharing schemes in which a secret and shares are acoustic informat... [more] |
IT2015-14 EMM2015-14 pp.75-80 |
EMM, ISEC, SITE, ICSS, IPSJ-CSEC, IPSJ-SPT [detail] |
2013-07-19 15:40 |
Hokkaido |
|
On Side-Channel Information Using Signal Toggles in AES Circuit Arisa Matsubara, Yunfeng Kuai, Yang Li, Toshiki Nakasone, Kazuo Ohta, Kazuo Sakiyama (UEC) ISEC2013-45 SITE2013-40 ICSS2013-50 EMM2013-47 |
[more] |
ISEC2013-45 SITE2013-40 ICSS2013-50 EMM2013-47 pp.331-338 |
ISEC |
2011-12-14 13:40 |
Tokyo |
Kikai-Shinko-Kaikan Bldg. |
[Invited Talk]
Break Masked AES Implementations Using Fault Sensitivity and Faulty Ciphertext
-- Review of Presentation at CHES2011 -- Yang Li, Kazuo Ohta, Kazuo Sakiyama (Univ. of Electro-Comm.) ISEC2011-66 |
[more] |
ISEC2011-66 p.25 |
ISEC |
2011-12-14 14:40 |
Tokyo |
Kikai-Shinko-Kaikan Bldg. |
[Invited Talk]
Uniquness Enhancement of PUF Responces Based on the Locations of Random Outputting RS Latches Dai Yamamoto (Fujitsu Lab.), Kazuo Sakiyama, Mitsugu Iwamoto, Kazuo Ohta (Univ. of Electro-Comm.), Takao Ochiai, Masahiko Takenaka, Kouichi Itoh (Fujitsu Lab.) ISEC2011-68 |
Physical Unclonable Functions (PUFs) are expected to represent an important solution for secure ID generation and authen... [more] |
ISEC2011-68 p.29 |
ISEC, LOIS |
2011-11-15 09:25 |
Osaka |
Osaka Electro-Communication University |
Fault Sensitivity Analysis Against Elliptic Curve Cryptosystems Using Clockwise Collisions Hikaru Sakamoto, Yang Li, Kazuo Ohta, Kazuo Sakiyama (Univ. of Electro-Comm.) ISEC2011-49 LOIS2011-43 |
In this paper, we propose a new fault analysis attack technique using Clockwise Collision. Generally, for the combinatio... [more] |
ISEC2011-49 LOIS2011-43 pp.101-108 |
IT |
2011-05-20 14:20 |
Osaka |
Osaka City University |
Relations among Information Theoretically and Computationally Secure Symmetric Key Encryptions Mitsugu Iwamoto, Kazuo Ohta (Univ. of Electro-Comm.) IT2011-5 |
[more] |
IT2011-5 pp.25-30 |
ISEC, IT, WBS |
2011-03-03 10:00 |
Osaka |
Osaka University |
Efficient Searchable Encryption Schemes Against Frequency Analysis Takashi Ito, Mitsuhiro Hattori, Nori Matsuda (Mitsubishi Electric Corp.), Yusuke Sakai, Kazuo Ohta (Univ. of Electro-Communications) IT2010-68 ISEC2010-72 WBS2010-47 |
Searchable encryption is a scheme that enables keyword search over encrypted data without revealing private information ... [more] |
IT2010-68 ISEC2010-72 WBS2010-47 pp.1-6 |
ISEC, IT, WBS |
2011-03-04 09:25 |
Osaka |
Osaka University |
New Differential Fault Analysis on Trivium Based on Setup-Time Violations Qi Li, Shigeto Gomisawa, Mitsugu Iwamoto, Kazuo Ohta, Kazuo Sakiyama (Univ. of Electro-Comm) IT2010-118 ISEC2010-122 WBS2010-97 |
This paper presents new differential fault analysis (DFA) on a stream cipher Trivium based on setup–time violation... [more] |
IT2010-118 ISEC2010-122 WBS2010-97 pp.333-339 |
ISEC, IPSJ-CSEC, SITE, ICSS [detail] |
2010-07-02 09:50 |
Aomori |
Hirosaki University |
Consideration on the Luby-Rackoff Cipher based on Physically Unclonable Functions Yutaka Kawai (Univ. of Tokyo), Yuichi Komano (Tohisiba), Kazuo Ohta (Univ. of Electro-Comm.) ISEC2010-25 SITE2010-21 ICSS2010-31 |
[more] |
ISEC2010-25 SITE2010-21 ICSS2010-31 pp.119-122 |
IT, ISEC, WBS |
2010-03-04 13:25 |
Nagano |
Nagano-Engineering Campus, Shinshu University |
[Invited Talk]
Indifferentiability Theory and SHA-3 Project
-- Recent Status of Theoretical and Practical Researches on Hash Functions -- Kazuo Ohta, Lei Wang, Kazuo Sakiyama (Univ. of Electro-Comm.) IT2009-96 ISEC2009-104 WBS2009-75 |
The indifferentiability is an important concept in order to discuss the
provable security of hash functions. NIST (Nati... [more] |
IT2009-96 ISEC2009-104 WBS2009-75 pp.159-166 |
ISEC |
2008-09-12 16:10 |
Tokyo |
Kikai-Shinko-Kaikan Bldg. |
The security analysis using meta-reduction under several computational assumptions in the case of ElGamal encryption Yutaka Kawai, Kazuo Ohta (UEC) ISEC2008-70 |
[more] |
ISEC2008-70 pp.47-54 |
ISEC |
2008-05-16 13:00 |
Tokyo |
Kikai-Shinko-Kaikan Bldg. |
Reconsideration of Algorithmic Tamper Proof Devices using PIN (part 2) Yuichi Komano (Toshiba), Kazuo Ohta (UEC), Hideyuki Miyake, Atsushi Shimbo (Toshiba) ISEC2008-7 |
Gennaro et al.~discussed the algorithmic tamper proof (ATP) devices using the personal identification number (PIN); and ... [more] |
ISEC2008-7 pp.43-48 |
ISEC, IT, WBS |
2008-02-28 11:10 |
Tokyo |
|
Random Oracle Model with Inspection of Hash List Kazuki Yoneyama, Satoshi Miyagawa, Kazuo Ohta (UEC) IT2007-34 ISEC2007-131 WBS2007-65 |
[more] |
IT2007-34 ISEC2007-131 WBS2007-65 pp.15-21 |
ISEC, IT, WBS |
2008-02-29 14:15 |
Tokyo |
|
A proposal of modified multi ring signature Mitsuaki Ikeda, Yutaka Kawai, Kazuo Ohta (UEC) IT2007-58 ISEC2007-155 WBS2007-89 |
The $k$-out-of-$n$ signature is a signature scheme where $k$ real signers
among $n$ signers corporate in signature gene... [more] |
IT2007-58 ISEC2007-155 WBS2007-89 pp.65-71 |