|
|
All Technical Committee Conferences (Searched in: All Years)
|
|
Search Results: Conference Papers |
Conference Papers (Available on Advance Programs) (Sort by: Date Descending) |
|
Committee |
Date Time |
Place |
Paper Title / Authors |
Abstract |
Paper # |
PN |
2021-08-30 10:35 |
Online |
Online |
On Information-Theoretic Secure Authentication Key Exchange via Y00 Quantum Cryptography Takehisa Iwakoshi (Mie Univ.) PN2021-12 |
We propose an information-theoretically secure (ITS) procedure for a secret key agreement to share a secret key with a n... [more] |
PN2021-12 pp.1-6 |
ISEC, WBS, IT |
2017-03-10 12:10 |
Tokyo |
TOKAI University |
Provable Secure Signature Scheme against Quantum Adversaries based on Decisional Isomorphism of Polynomials with Two Secrets Bagus Santoso (UEC) IT2016-122 ISEC2016-112 WBS2016-98 |
Recent research has shown that signature schemes created using Fiat-Shamir transformation might be insecure against quan... [more] |
IT2016-122 ISEC2016-112 WBS2016-98 pp.149-154 |
ISEC, IPSJ-CSEC, SITE, ICSS [detail] |
2010-07-02 09:00 |
Aomori |
Hirosaki University |
Proposal on MPKC Signature Scheme with Check Equations Shigeo Tsujii, Masahito Gotaishi (Chuo University) ISEC2010-23 SITE2010-19 ICSS2010-29 |
A new signature system of multivariate public key cryptosystem (MPKC), which uses separate check equations in order to p... [more] |
ISEC2010-23 SITE2010-19 ICSS2010-29 pp.107-112 |
OPE, EMT, LQE, PN, IEE-EMT |
2010-01-28 15:00 |
Kyoto |
|
A proposal of secure photonic network based on quantum stream cipher Y-00 and its example
-- Criticism against NICT quantum ICT committee -- Osamu Hirota, Satoki Kawanishi (Tamagawa Univ.) PN2009-42 OPE2009-180 LQE2009-162 |
A new threat for high speed photonic network that is a construction of data center of attackers is closed up. This paper... [more] |
PN2009-42 OPE2009-180 LQE2009-162 pp.41-46 |
ISEC |
2009-12-16 13:25 |
Tokyo |
Kikai-Shinko-Kaikan Bldg. |
Beyond the Shannon limit by quantum stream cipher Y-00 and Holevo-Sohma-Hirota theorem
-- General proof -- Osamu Hirota (Tamagawa Univ.) ISEC2009-72 |
One of important problems in cryptography is to prove the existence of a cipher which can break the Shannon limit.
Yue... [more] |
ISEC2009-72 pp.7-14 |
|
|
|
Copyright and reproduction :
All rights are reserved and no part of this publication may be reproduced or transmitted in any form or by any means, electronic or mechanical, including photocopy, recording, or any information storage and retrieval system, without permission in writing from the publisher. Notwithstanding, instructors are permitted to photocopy isolated articles for noncommercial classroom use without fee. (License No.: 10GA0019/12GB0052/13GB0056/17GB0034/18GB0034)
|
[Return to Top Page]
[Return to IEICE Web Page]
|