IEICE Technical Committee Submission System
Conference Schedule
Online Proceedings
[Sign in]
Tech. Rep. Archives
    [Japanese] / [English] 
( Committee/Place/Topics  ) --Press->
 
( Paper Keywords:  /  Column:Title Auth. Affi. Abst. Keyword ) --Press->

All Technical Committee Conferences  (Searched in: All Years)

Search Results: Conference Papers
 Conference Papers (Available on Advance Programs)  (Sort by: Date Descending)
 Results 1 - 5 of 5  /   
Committee Date Time Place Paper Title / Authors Abstract Paper #
RCC, ISEC, IT, WBS 2023-03-14
09:50
Yamaguchi
(Primary: On-site, Secondary: Online)
Full key recovery of RSA secret key from noisy binary GCD operation sequences
Kenta Tani, Noboru Kunihiro (Univ. of Tsukuba) IT2022-74 ISEC2022-53 WBS2022-71 RCC2022-71
In CHES2019, Aldaya et al. reported a vulnerability of the binary GCD algorithm used in RSA key generation in OpenSSL.Fu... [more] IT2022-74 ISEC2022-53 WBS2022-71 RCC2022-71
pp.41-48
HWS, ISEC, SITE, ICSS, EMM, IPSJ-CSEC, IPSJ-SPT [detail] 2018-07-25
15:50
Hokkaido Sapporo Convention Center Extended Partial Key Exposure Attacks on RSA
Kaichi Suzuki, Atsushi Takayasu, Noboru Kunihiro (Univ. of Tokyo) ISEC2018-29 SITE2018-21 HWS2018-26 ICSS2018-32 EMM2018-28
Thus far, emph{partial key exposure attacks} on RSA, i.e., attackers are given the most significant bits (MSBs) emph{or}... [more] ISEC2018-29 SITE2018-21 HWS2018-26 ICSS2018-32 EMM2018-28
pp.155-162
ISEC, WBS, IT 2017-03-09
14:00
Tokyo TOKAI University Security Analysis of Ordinary Isogeny Diffie--Hellman
Satoshi Furukawa, Atsushi Takayasu, Noboru Kunihiro (The Univ. of Tokyo) IT2016-104 ISEC2016-94 WBS2016-80
In this paper, we analyze the security of Ordinary Isogeny Diffie--Hellman (OIDH) key exchange proposed by Stolbunov (Ad... [more] IT2016-104 ISEC2016-94 WBS2016-80
pp.33-40
ICSS, ISEC, SITE, EMM, IPSJ-CSEC, IPSJ-SPT [detail] 2014-07-03
14:15
Hokkaido San-Refure Hakodate Security of RSA with Many Decryption Exponents
Atsushi Takayasu, Noboru Kunihiro (Univ. of Tokyo) ISEC2014-19 SITE2014-14 ICSS2014-23 EMM2014-19
When we use small secret exponents, RSA becomes efficient for its decryption cost and signature generation cost. However... [more] ISEC2014-19 SITE2014-14 ICSS2014-23 EMM2014-19
pp.93-96
ISEC 2005-09-16
16:10
Tokyo Kikai-Shinko-Kaikan Bldg. Generating Short Public-Keys for Factoring Based Cryptosytems and Their Cryptanalysis
Naoki Kanayama (UEC), Shigenori Uchiyama (NTT)
In 1995, Vanstone and Zuccherato proposed a novel method of
generating RSA moduli having a predetermined set of bits
... [more]
ISEC2005-86
pp.73-77
 Results 1 - 5 of 5  /   
Choose a download format for default settings. [NEW !!]
Text format pLaTeX format CSV format BibTeX format
Copyright and reproduction : All rights are reserved and no part of this publication may be reproduced or transmitted in any form or by any means, electronic or mechanical, including photocopy, recording, or any information storage and retrieval system, without permission in writing from the publisher. Notwithstanding, instructors are permitted to photocopy isolated articles for noncommercial classroom use without fee. (License No.: 10GA0019/12GB0052/13GB0056/17GB0034/18GB0034)


[Return to Top Page]

[Return to IEICE Web Page]


The Institute of Electronics, Information and Communication Engineers (IEICE), Japan