Committee |
Date Time |
Place |
Paper Title / Authors |
Abstract |
Paper # |
ISEC |
2011-12-14 16:50 |
Tokyo |
Kikai-Shinko-Kaikan Bldg. |
[Invited Talk]
Public-Key Identification Schemes based on Multivariate Quadratic Polynomials Koichi Sakumoto, Taizo Shirai, Harunaga Hiwatari (Sony) ISEC2011-72 |
A problem of solving a system of multivariate quadratic polynomials over a finite field, which is called an MQ problem, ... [more] |
ISEC2011-72 p.39 |
ISEC, IPSJ-CSEC, SITE, ICSS [detail] |
2010-07-02 09:00 |
Aomori |
Hirosaki University |
Proposal on MPKC Signature Scheme with Check Equations Shigeo Tsujii, Masahito Gotaishi (Chuo University) ISEC2010-23 SITE2010-19 ICSS2010-29 |
A new signature system of multivariate public key cryptosystem (MPKC), which uses separate check equations in order to p... [more] |
ISEC2010-23 SITE2010-19 ICSS2010-29 pp.107-112 |
IBISML |
2010-06-14 16:25 |
Tokyo |
Takeda Hall, Univ. Tokyo |
Privacy Preservation in Online Prediction Jun Sakuma (Univ. of Tsukuba/JST), Hiromi Arai (U. Tsukuba) IBISML2010-9 |
In this paper, we consider online prediction from expert advice in a situation where each expert observes its own loss a... [more] |
IBISML2010-9 pp.49-56 |
IT, ISEC, WBS |
2010-03-05 16:10 |
Nagano |
Nagano-Engineering Campus, Shinshu University |
A study on the probabilistic algorithm to solve the elliptic curve discrete logarithm problem Osamu Ashihara, Yoshitaka Sagara, Nobuhide Sakuragi, Tomoko K. Matsushima (Polytechnic Univ.) IT2009-129 ISEC2009-137 WBS2009-108 |
In this paper a probabilistic algorithm to solve the ECDLP is presented. This scheme uses the symmetry of the elliptic c... [more] |
IT2009-129 ISEC2009-137 WBS2009-108 pp.373-380 |
ISEC, LOIS |
2009-11-13 09:00 |
Gifu |
Gifu Univ. |
Proposal on Multivariate Public Key Signature Scheme Applying the STS cryptosystem Shigeo Tsujii, Masahito Gotaishi, Kohtaro Tadaki (Chuo Univ.) ISEC2009-59 LOIS2009-48 |
New signature scheme based on Stepwise Triangular Scheme (STS), which is one of the basic trapdoors of Multivariate Publ... [more] |
ISEC2009-59 LOIS2009-48 pp.55-60 |
ISEC, IPSJ-CSEC, SITE, ICSS [detail] |
2009-07-03 10:20 |
Akita |
Akita University |
Proposal of Integrated MPKC: PPS
-- STS Enhanced by Perturbed Piece In Hand Method -- Shigeo Tsujii, Kohtaro Tadaki, Masahito Gotaishi, Ryo Fujita (Chuo Univ.), Masao Kasahara (OGU) ISEC2009-27 SITE2009-19 ICSS2009-41 |
In this paper, we propose a new MPKC, called PPS, based on (i) the 2-layer nonlinear piece in hand method, (ii) Internal... [more] |
ISEC2009-27 SITE2009-19 ICSS2009-41 pp.139-146 |
ISEC |
2009-05-22 14:15 |
Tokyo |
Kikai-Shinko-Kaikan Bldg. |
An Improvement of Cyclic Vector Multiplication Algorithm based on Gauss period Normal Basis Erika Yanagi, Kenta Nekado, Yasuyuki Nogami, Yoshitaka Morikawa (Okayama Univ.) ISEC2009-9 |
This paper first introduces cyclic vector multiplication algorithm (CVMA) that is a multiplication algorithm with Gauss ... [more] |
ISEC2009-9 pp.55-60 |
WBS, IT, ISEC |
2009-03-09 13:10 |
Hokkaido |
Hakodate Mirai Univ. |
[Invited Talk]
Advances in Public-Key Cryptography (RSA, ECC, IBE) Tsuyoshi Takagi (Future Univ. Hakodate.) IT2008-50 ISEC2008-108 WBS2008-63 |
We give a brief overview on the development of public-key cryptography starting with RSA cryptosystem. The most frequent... [more] |
IT2008-50 ISEC2008-108 WBS2008-63 pp.47-48 |
MSS |
2009-01-29 13:25 |
Kanagawa |
Kanagawa Industrial Promotion Center |
A Method of Petri Nets and Calculating the Elementary T-invariants for Public-key Cryptography MEPKC Ryo Yamaguchi, Qi-Wei Ge, Mitsuru Nakata (Yamaguchi Univ.) CST2008-42 |
This paper aims at automatically generating Petri nets that are used as key generator of public-key cryptography MEPKC. ... [more] |
CST2008-42 pp.5-10 |
MSS |
2008-01-29 10:20 |
Tokushima |
The University of Tokushima |
A Method of Generating and Complicating Petri Nets Used as Key-generator of a public-key cryptgraphy MEPKC Ryosuke Murakami, Ryo Yamaguchi, Qi-Wei Ge, Mitsuru Nakata (Yamaguchi Univ) CST2007-48 |
This paper aims at automatically generating Petri nets that
are used as key generator of a public-key cryptography MEP... [more] |
CST2007-48 pp.11-16 |
MSS |
2007-06-29 10:15 |
Okinawa |
|
An algorithm to enumerate all the elementary T-invariants of auto-generated Petri nets Ryo Yamaguchi, Ryosuke Murakami, Mitsuru Nakata, Qi-Wei Ge (Yamaguchi Univ.) CST2007-9 |
In this paper, we propose an algorithm to enumerate all the elementary
T-invariants of auto-generated Petri nets that ... [more] |
CST2007-9 pp.15-20 |
CAS, SIP, VLD |
2007-06-22 13:00 |
Hokkaido |
Hokkaido Tokai Univ. (Sapporo) |
Scalable Dual-Radix Unified Montgomery Multiplier in GF(p) and GF(2n) Kazuyuki Tanimura, Ryuta Nara, Shunitsu Kohara, Youhua Shi, Nozomu Togawa, Masao Yanagisawa, Tatsuo Ohtsuki (Waseda Univ.) CAS2007-26 VLD2007-42 SIP2007-56 |
Modular multiplication is the dominant arithmetic operation in elliptic curve cryptography (ECC), which is one of public... [more] |
CAS2007-26 VLD2007-42 SIP2007-56 pp.43-48 |
ICD, VLD |
2007-03-08 15:50 |
Okinawa |
Mielparque Okinawa |
Design of RSA Encryption circuit with embedded Fixed Private Key using Via Programmable Logic VPEX Hiroshi Shimomura, Kazuki Okuyama, Akihiro Nakamura, Takeshi Fujino (Ritsumei Univ.) |
We have been studied the Via Programmable Logic Architecture VPEX (Via Programmable Logic using EXOR Array) . As similar... [more] |
VLD2006-136 ICD2006-227 pp.103-108 |
ISEC, SITE, IPSJ-CSEC |
2006-07-20 09:30 |
Okayama |
Okayama Univ. |
A Translation Matrix between Two Isomorphic Extension Fields via Optimal Normal Basis Representation Ryo Nanba, Yasuyuki Nogami, Yoshitaka Morikawa (Okayama Univ.) |
Some extension fields efficient for fast implementation have been proposed. These extension fields adopt unique modular ... [more] |
ISEC2006-9 SITE2006-6 pp.1-6 |
WBS, IT, ISEC |
2006-03-16 13:15 |
Aichi |
Nagoya Univ. |
[Invited Talk]
Acceleration of arithmetic in Galois fields by hardware support Naofumi Takagi (Nagoya Univ.) |
In encryption and decryption of public-key cryptographies, such as elliptic curve cryptography (ECC), computation of ari... [more] |
IT2005-72 ISEC2005-129 WBS2005-86 p.49 |
COMP |
2005-09-15 13:20 |
Osaka |
Osaka Univ., Toyonaka Campus |
[Tutorial Lecture]
NA Akinori Kawachi (Tokyo Tech.) |
Applications of quantum information processing to cryptography has played a central role in the quantum information scie... [more] |
|