|
|
All Technical Committee Conferences (Searched in: All Years)
|
|
Search Results: Conference Papers |
Conference Papers (Available on Advance Programs) (Sort by: Date Descending) |
|
Committee |
Date Time |
Place |
Paper Title / Authors |
Abstract |
Paper # |
OPE, OCS, OFT (Joint) [detail] |
2021-02-18 16:15 |
Online |
Online |
Demonstration of light localization in self-similar waveguide arrays Ryo Kikuchi, Takumi Ishikawa, Kohei Haji, Hirohito Yamada, Nobuyuki Matsuda (Tohoku Univ.) OCS2020-44 OFT2020-60 OPE2020-81 |
Mitigating inter-core cross-talks in a closely-packed optical waveguide array is of great importance for increasing the ... [more] |
OCS2020-44 OFT2020-60 OPE2020-81 pp.6-10(OCS), pp.21-25(OFT), pp.26-30(OPE) |
ISEC |
2018-09-07 11:00 |
Tokyo |
Kikai-Shinko-Kaikan Bldg. |
[Invited Talk]
Fast Large-Scale Honest-Majority MPC for Malicious Adversaries Ryo Kikuchi (NTT) ISEC2018-54 |
In this invited talk, we introduce the paper ``Fast Large-Scale Honest-Majority MPC for Malicious Adversaries'' by Koji ... [more] |
ISEC2018-54 p.25 |
ISEC, COMP |
2017-12-21 14:10 |
Kochi |
Eikokuji Campus, Kochi University of Technology |
[Invited Talk]
Foundations and practical studies of secure computation Ryo Kikuchi (NTT) ISEC2017-78 COMP2017-32 |
Secure computation, also known as secure multiparty computation, is a method to compute a function on encrypted data. Th... [more] |
ISEC2017-78 COMP2017-32 p.41 |
ISEC |
2017-05-12 12:00 |
Tokyo |
Kikai-Shinko-Kaikan Bldg. |
[Invited Talk]
How to circumvent the two-ciphertext lower bound for linear gabling schemes
-- from ASIACRYPT 2016 -- Ryo Kikuchi (NTT) ISEC2017-5 |
At EUROCRYPT 2015, Zahur et al. argued that all linear, and thus, efficient, garbling schemes need at least two $k$-bit ... [more] |
ISEC2017-5 p.25 |
EMM, ISEC, SITE, ICSS, IPSJ-CSEC, IPSJ-SPT [detail] |
2013-07-19 13:20 |
Hokkaido |
|
Generalization of Noises in Differential Privacy Akihiro Yamanaka, Ryo Kikuchi, Dai Ikarashi (NTT) ISEC2013-49 SITE2013-44 ICSS2013-54 EMM2013-51 |
In this note we verify a sufficient condition of noises for satisfying Differential Privacy and introduce some new noise... [more] |
ISEC2013-49 SITE2013-44 ICSS2013-54 EMM2013-51 pp.395-402 |
LOIS |
2013-03-07 15:30 |
Okinawa |
|
An Experiment of Purterbation-Reconstruction Method on Power Consumption Data Ryo Kikuchi (NTT), Satoshi Hasegawa (Univ. of Tsukuba), Dai Ikarashi (NTT) LOIS2012-84 |
Recently, an anonymization that realizes both privacy protections and statistical analyses is now attracting attention. ... [more] |
LOIS2012-84 pp.89-94 |
LOIS |
2012-03-09 13:10 |
Okinawa |
Meio Univ. |
t-test for Privacy-Preserved Data Ryo Kikuchi, Akihiro Yamanaka, Dai Ikarashi (NTT) LOIS2011-101 |
As the needs of utilizing the privacy information such as giving the receipt to researchers in the university for
the d... [more] |
LOIS2011-101 pp.171-176 |
|
|
|
Copyright and reproduction :
All rights are reserved and no part of this publication may be reproduced or transmitted in any form or by any means, electronic or mechanical, including photocopy, recording, or any information storage and retrieval system, without permission in writing from the publisher. Notwithstanding, instructors are permitted to photocopy isolated articles for noncommercial classroom use without fee. (License No.: 10GA0019/12GB0052/13GB0056/17GB0034/18GB0034)
|
[Return to Top Page]
[Return to IEICE Web Page]
|