Committee |
Date Time |
Place |
Paper Title / Authors |
Abstract |
Paper # |
QIT (2nd) |
2015-05-25 17:00 |
Osaka |
Osaka University |
MQ Challenge: Solving Problems for Post-Quantum Cryptography and Their Hardness Evaluation Takanori Yasuda (ISIT), Xavier Dahan (Ochanomizu Univ.), Yun-Ju Huang (ISIT), Tsuyoshi Takagi (Kyushu Univ.), Kouichi Sakurai (ISIT) |
[more] |
|
ISEC, IT, WBS |
2015-03-02 10:30 |
Fukuoka |
The University of Kitakyushu |
Accelerating QUAD Stream Cipher using Optimal Extension Field on GPU Satoshi Tanaka (ISIT/Kyushu Univ.), Chen-Mou Cheng (Kyushu Univ.), Takanori Yasuda (ISIT), Kouichi Sakurai (ISIT/Kyushu Univ.) IT2014-62 ISEC2014-75 WBS2014-54 |
Evaluating non-linear multivariate polynomial systems over finite
fields is an important subroutine for QUAD stream cip... [more] |
IT2014-62 ISEC2014-75 WBS2014-54 pp.1-4 |
ISEC, LOIS, SITE |
2014-11-21 13:25 |
Hyogo |
|
Accelerating QUAD Stream Cipher using Multi-Stream Method on Graphics Processing Unit Satoshi Tanaka (ISIT/Kyushu Univ.), Chen-Mou Cheng (Kyushu Univ.), Takanori Yasuda (ISIT), Kouichi Sakurai (ISIT/Kyushu Univ.) ISEC2014-56 SITE2014-47 LOIS2014-26 |
QUAD is a stream cipher with a provable security based on the theory of multivariate public-key cryptography. However, Q... [more] |
ISEC2014-56 SITE2014-47 LOIS2014-26 pp.1-6 |
ISEC, LOIS, SITE |
2014-11-21 13:50 |
Hyogo |
|
Extension of NTRU scheme using non-commutative groups II Takanori Yasuda, Xavier Dahan, Kouichi Sakurai (ISIT) ISEC2014-57 SITE2014-48 LOIS2014-27 |
[more] |
ISEC2014-57 SITE2014-48 LOIS2014-27 pp.7-11 |
ICSS, ISEC, SITE, EMM, IPSJ-CSEC, IPSJ-SPT [detail] |
2014-07-04 10:40 |
Hokkaido |
San-Refure Hakodate |
Cryptanalysis of a matrix variant of NTRU Takanori Yasuda (ISIT), Yuya Yamaguchi (Kyushu Univ.), Xavier Dahan, Kouichi Sakurai (ISIT) ISEC2014-33 SITE2014-28 ICSS2014-37 EMM2014-33 |
Since its introduction in 1996, the cryptosystem NTRU has become a well-established candidate for the next generation pu... [more] |
ISEC2014-33 SITE2014-28 ICSS2014-37 EMM2014-33 pp.239-246 |
ISEC |
2013-12-11 17:15 |
Tokyo |
Kikai-Shinko-Kaikan Bldg. |
Report on PQCrypto2013 Takanori Yasuda (ISIT) ISEC2013-82 |
[more] |
ISEC2013-82 pp.59-62 |
EMM, ISEC, SITE, ICSS, IPSJ-CSEC, IPSJ-SPT [detail] |
2013-07-19 15:15 |
Hokkaido |
|
Application of Efficient Forms of Elliptic Curves to Ate-like Pairings Takanori Yasuda (ISIT), Tsuyoshi Takagi (Kyushu Univ.), Kouichi Sakurai (ISIT) ISEC2013-44 SITE2013-39 ICSS2013-49 EMM2013-46 |
[more] |
ISEC2013-44 SITE2013-39 ICSS2013-49 EMM2013-46 pp.323-330 |
SP, WIT |
2013-06-13 13:00 |
Niigata |
|
Mobile Robot Programming tool using a mobile phone I/F for visually impaired students Naoya Egashira, Ryota Ide (FIT), Akito Teraoka (ISIT), Takafumi Ienaga, Akihiro Yamaguchi, Yoshihiko Kimuro (FIT) SP2013-34 WIT2013-4 |
In order to teach the computer principles to visually impaired students, we have designed the new robot programming too... [more] |
SP2013-34 WIT2013-4 pp.19-24 |
IT, ISEC, WBS |
2013-03-07 11:45 |
Osaka |
Kwansei Gakuin Univ., Osaka-Umeda Campus |
A report on Indocrypt2012 Takanori Yasuda (ISIT), Yu Sasaki (NTT), Kouichi Sakurai (Kyushu Univ.) IT2012-69 ISEC2012-87 WBS2012-55 |
This paper reports on the 13th International Conference on Cryptology
in India (Indocrypt2012), held on December 9 to ... [more] |
IT2012-69 ISEC2012-87 WBS2012-55 pp.45-51 |
IT, ISEC, WBS |
2013-03-07 15:55 |
Osaka |
Kwansei Gakuin Univ., Osaka-Umeda Campus |
Notes on Efficient Computing over GF(2^16) using Graphics Processing Unit Satoshi Tanaka (Kyushu Univ./ISIT), Takanori Yasuda (ISIT), Kouichi Sakurai (Kyushu Univ./ISIT) IT2012-84 ISEC2012-102 WBS2012-70 |
Multivariate cryptography uses evaluating non-linear multivariate polynomial systems over finite ields for encrypting me... [more] |
IT2012-84 ISEC2012-102 WBS2012-70 pp.143-147 |
EMM, ISEC, SITE, ICSS, IPSJ-CSEC, IPSJ-SPT [detail] |
2012-07-20 10:30 |
Hokkaido |
|
An efficient variant of Rainbow without triangular matrix representation Takanori Yasuda (ISIT), Tsuyoshi Takagi (Kyushu Univ.), Kouichi Sakurai (ISIT) ISEC2012-29 SITE2012-25 ICSS2012-31 EMM2012-21 |
[more] |
ISEC2012-29 SITE2012-25 ICSS2012-31 EMM2012-21 pp.143-150 |
EMM, ISEC, SITE, ICSS, IPSJ-CSEC, IPSJ-SPT [detail] |
2012-07-20 13:55 |
Hokkaido |
|
Rationality and Security in Oblivious Transfer Haruna Higo, Akihiro Yamada, Keisuke Tanaka (Tokyo Inst. of Tech.), Kenji Yasunaga (ISIT) ISEC2012-34 SITE2012-30 ICSS2012-36 EMM2012-26 |
[more] |
ISEC2012-34 SITE2012-30 ICSS2012-36 EMM2012-26 pp.181-188 |
WIT |
2012-05-25 14:10 |
Niigata |
Niigata Univ. satellite campus |
Problems in Educational Materials in DAISY for Mathematics and Science Katsuhito Yamaguchi (Nihon Univ.), Masakazu Suzuki (ISIT) WIT2012-5 |
Because of special situations in Japanese, there are some serious problems in reading out text-based DAISY mathematical ... [more] |
WIT2012-5 pp.23-27 |
IT |
2012-05-25 17:15 |
Fukuoka |
|
Rational Secret Sharing for Non-Simultaneous Channels Akinori Kawachi (Tokyo Inst. of Tech.), Yoshio Okamoto (Univ. of Electro-Comm.), Keisuke Tanaka (Tokyo Inst. of Tech.), Kenji Yasunaga (ISIT) IT2012-8 |
[more] |
IT2012-8 pp.41-46 |
ICSS |
2012-03-16 14:10 |
Tokyo |
Kikai-Shinko-Kaikan Bldg. |
A Behavior-based Detection Method for Outbreaks of Low-rate Attacks Yaokai Feng, Yoshiaki Hori, Kouichi Sakurai, Jun'ichi Takeuchi (ISIT) ICSS2011-45 |
Low-rate attacks can conceal their traffic because they are very much like normal communication. Thus, although a number... [more] |
ICSS2011-45 pp.37-42 |
VLD, DC, IPSJ-SLDM, CPSY, RECONF, ICD, CPM (Joint) [detail] |
2011-11-28 10:55 |
Miyazaki |
NewWelCity Miyazaki |
High accuracy of system LSI energy estimation Wang Xiang (Kyushu Univ.), Norifumi Yoshimatsu (ISIT), Kazuaki Murakami (Kyushu Univ.) VLD2011-56 DC2011-32 |
The goal of this paper is that how to estimate the energy consumption of LSI system accurately with the high simulation ... [more] |
VLD2011-56 DC2011-32 pp.25-30 |
VLD, DC, IPSJ-SLDM, CPSY, RECONF, ICD, CPM (Joint) [detail] |
2011-11-28 15:05 |
Miyazaki |
NewWelCity Miyazaki |
Towards an efficient simulation of SystemC Transaction Level Models Jun Furukawa (Kyushu Univ.), Norifumi Yoshimatsu (ISIT), Kazuaki Murakami (Kyushu Univ.) CPM2011-153 ICD2011-85 |
[more] |
CPM2011-153 ICD2011-85 pp.25-30 |
VLD, DC, IPSJ-SLDM, CPSY, RECONF, ICD, CPM (Joint) [detail] |
2011-11-29 14:40 |
Miyazaki |
NewWelCity Miyazaki |
Platform for Tool as a Service
-- To serve development tools via cloud service -- Takayuki Kando (QTS), Tomohiro Moriyama, Norifumi Yoshimatsu (ISIT), Kazuaki Murakami (Kyushu Univ.) CPSY2011-47 |
Cloud computing has spread, and development tools are able to supply as a service. This way "Tool as a
Service" can red... [more] |
CPSY2011-47 pp.27-32 |
PRMU, IBISML, IPSJ-CVIM [detail] |
2011-09-05 10:30 |
Hokkaido |
|
On Evaluation of Stochastic Complexity based on Bayes Code and Its Applications to Model Selection Yoshinari Takeishi, Masanori Kawakita, Jun'ichi Takeuchi (Kyushu Univ./ISIT) PRMU2011-59 IBISML2011-18 |
We evaluate stochastic complexity of Gaussian mixture by Bayes code length, and apply it to the model selection problem.... [more] |
PRMU2011-59 IBISML2011-18 pp.9-14 |
PRMU, IBISML, IPSJ-CVIM [detail] |
2011-09-06 10:00 |
Hokkaido |
|
Acceleration of boosting discrimination and its application to face detection Ryota Izumi, Masanori Kawakita, Jun'ichi Takeuchi (kyushu Univ/ISIT), Hu Yi, Tetsuya Takamori, Hirokazu Kameyama (Fuji Film) PRMU2011-70 IBISML2011-29 |
We propose an acceleration technique for boosting classification.
Not only classification
accuracy and/or training cos... [more] |
PRMU2011-70 IBISML2011-29 pp.111-117 |