|
|
All Technical Committee Conferences (Searched in: All Years)
|
|
Search Results: Conference Papers |
Conference Papers (Available on Advance Programs) (Sort by: Date Descending) |
|
Committee |
Date Time |
Place |
Paper Title / Authors |
Abstract |
Paper # |
RCC, ISEC, IT, WBS |
2023-03-14 09:50 |
Yamaguchi |
(Primary: On-site, Secondary: Online) |
Full key recovery of RSA secret key from noisy binary GCD operation sequences Kenta Tani, Noboru Kunihiro (Univ. of Tsukuba) IT2022-74 ISEC2022-53 WBS2022-71 RCC2022-71 |
In CHES2019, Aldaya et al. reported a vulnerability of the binary GCD algorithm used in RSA key generation in OpenSSL.Fu... [more] |
IT2022-74 ISEC2022-53 WBS2022-71 RCC2022-71 pp.41-48 |
HWS, ISEC, SITE, ICSS, EMM, IPSJ-CSEC, IPSJ-SPT [detail] |
2018-07-25 15:50 |
Hokkaido |
Sapporo Convention Center |
Extended Partial Key Exposure Attacks on RSA Kaichi Suzuki, Atsushi Takayasu, Noboru Kunihiro (Univ. of Tokyo) ISEC2018-29 SITE2018-21 HWS2018-26 ICSS2018-32 EMM2018-28 |
Thus far, emph{partial key exposure attacks} on RSA, i.e., attackers are given the most significant bits (MSBs) emph{or}... [more] |
ISEC2018-29 SITE2018-21 HWS2018-26 ICSS2018-32 EMM2018-28 pp.155-162 |
ISEC, WBS, IT |
2017-03-09 14:00 |
Tokyo |
TOKAI University |
Security Analysis of Ordinary Isogeny Diffie--Hellman Satoshi Furukawa, Atsushi Takayasu, Noboru Kunihiro (The Univ. of Tokyo) IT2016-104 ISEC2016-94 WBS2016-80 |
In this paper, we analyze the security of Ordinary Isogeny Diffie--Hellman (OIDH) key exchange proposed by Stolbunov (Ad... [more] |
IT2016-104 ISEC2016-94 WBS2016-80 pp.33-40 |
ICSS, ISEC, SITE, EMM, IPSJ-CSEC, IPSJ-SPT [detail] |
2014-07-03 14:15 |
Hokkaido |
San-Refure Hakodate |
Security of RSA with Many Decryption Exponents Atsushi Takayasu, Noboru Kunihiro (Univ. of Tokyo) ISEC2014-19 SITE2014-14 ICSS2014-23 EMM2014-19 |
When we use small secret exponents, RSA becomes efficient for its decryption cost and signature generation cost. However... [more] |
ISEC2014-19 SITE2014-14 ICSS2014-23 EMM2014-19 pp.93-96 |
ISEC |
2005-09-16 16:10 |
Tokyo |
Kikai-Shinko-Kaikan Bldg. |
Generating Short Public-Keys for Factoring Based Cryptosytems and Their Cryptanalysis Naoki Kanayama (UEC), Shigenori Uchiyama (NTT) |
In 1995, Vanstone and Zuccherato proposed a novel method of
generating RSA moduli having a predetermined set of bits
... [more] |
ISEC2005-86 pp.73-77 |
|
|
|
Copyright and reproduction :
All rights are reserved and no part of this publication may be reproduced or transmitted in any form or by any means, electronic or mechanical, including photocopy, recording, or any information storage and retrieval system, without permission in writing from the publisher. Notwithstanding, instructors are permitted to photocopy isolated articles for noncommercial classroom use without fee. (License No.: 10GA0019/12GB0052/13GB0056/17GB0034/18GB0034)
|
[Return to Top Page]
[Return to IEICE Web Page]
|