IEICE Technical Committee Submission System
Conference Schedule
Online Proceedings
[Sign in]
Tech. Rep. Archives
    [Japanese] / [English] 
( Committee/Place/Topics  ) --Press->
 
( Paper Keywords:  /  Column:Title Auth. Affi. Abst. Keyword ) --Press->

All Technical Committee Conferences  (Searched in: All Years)

Search Results: Conference Papers
 Conference Papers (Available on Advance Programs)  (Sort by: Date Descending)
 Results 1 - 20 of 142  /  [Next]  
Committee Date Time Place Paper Title / Authors Abstract Paper #
ICSS, IPSJ-SPT 2024-03-21
14:30
Okinawa OIST
(Primary: On-site, Secondary: Online)
Considerations on Differential Privacy Mechanisms in MNIST
Naoki Kawahara, Pengxuan Wei, Ryunosuke Higashi, Kenta Okada, Tatsuhiro Yamatsuki, Atsuko Miyaji (Osaka Univ.)
(To be available after the conference date) [more]
ICSS, IPSJ-SPT 2024-03-22
10:55
Okinawa OIST
(Primary: On-site, Secondary: Online)
Improved signature-embedding techniques against backdoor attacks on DNN models
Akira Fujimoto, Yuntao Wang, Atsuko Miyaji (OU)
(To be available after the conference date) [more]
ICSS, IPSJ-SPT 2024-03-22
11:45
Okinawa OIST
(Primary: On-site, Secondary: Online)
Fast and Secure Scalar Multiplication for the GLS254 Binary Elliptic Curve
Ryosuke Kido, Atsuko Miyaji (OU)
(To be available after the conference date) [more]
ICSS, IPSJ-SPT 2024-03-22
12:10
Okinawa OIST
(Primary: On-site, Secondary: Online)
Extension of the linear approximation for stream cipher ChaCha
Yurie Okada, Atsuko Miyaji (OU)
(To be available after the conference date) [more]
RCC, ISEC, IT, WBS 2024-03-13
14:40
Osaka Osaka Univ. (Suita Campus) Performance Evaluation of Post-Quantum Digital Signature Schemes
Ryoto Morizono, Yuntao Wang, Atsuko Miyaji (Osaka Univ.)
(To be available after the conference date) [more]
RCC, ISEC, IT, WBS 2024-03-13
14:15
Osaka Osaka Univ. (Suita Campus) Data processing methods for high-performance Privacy-Preserving Machine Learning
Tatsuhiro Yamatsuki (Osaka Univ.), Atsuko Miyaji (Osaka Univ./JAIST)
(To be available after the conference date) [more]
RCC, ISEC, IT, WBS 2024-03-13
14:40
Osaka Osaka Univ. (Suita Campus) On Privacy Mechanism to Discreat Data fit for Machine Learning
Tomoshi Yagishita, Atsuko Miyaji (OU)
(To be available after the conference date) [more]
RCC, ISEC, IT, WBS 2024-03-13
16:35
Osaka Osaka Univ. (Suita Campus) Consideration on Definition Field for Efficient Ring-LWE Problem
Rintaro Yamada, Shinya Okumura, Atsuko Miyaji (OU)
(To be available after the conference date) [more]
RCC, ISEC, IT, WBS 2024-03-13
17:00
Osaka Osaka Univ. (Suita Campus) Study on the computatinal cost of Triple Sieve algorithm by applying in ideal property
Seishiro Terada, Yuntao Wang, Atsuko Miyaji (Osaka Univ.)
 [more]
RCC, ISEC, IT, WBS 2024-03-14
10:20
Osaka Osaka Univ. (Suita Campus) Consideration of BKZ by reordering lattice basis vectors
Katsuya Katsuya, Yuntao Wang, Atsuko Miyaji (Osaka Univ.)
 [more]
RCC, ISEC, IT, WBS 2024-03-14
09:05
Osaka Osaka Univ. (Suita Campus) Efficient Key-Value Commitments with batch update and verification
Toshiyuki Mineta, Atsuko Miyaji (OU)
(To be available after the conference date) [more]
RCC, ISEC, IT, WBS 2024-03-14
14:15
Osaka Osaka Univ. (Suita Campus) Proposal of Methods to Detect Backdoor Attacks Using Signature Embedding Techniques
Shintaro Yamashita, Wang Yuntao, Atsuko Miyaji (OU)
 [more]
ICSS 2023-11-16
16:00
Ishikawa IT Business Plaza Musashi and Online
(Primary: On-site, Secondary: Online)
Security Analysis of MP-LWE using Weighted Lattice Reduction
Yudai Tagawa, Shinya Okumura, Atsuko Miyaji (Osaka Univ.) ICSS2023-57
In 2017, Roşca et al. proposed the Middle-Product LWE (MP-LWE) problem, a new LWE problem variant. The MP-LWE problem mi... [more] ICSS2023-57
pp.42-48
ICSS 2023-11-16
16:25
Ishikawa IT Business Plaza Musashi and Online
(Primary: On-site, Secondary: Online)
Redefinition of pair-PNB and application to ChaCha differential linear analysis
Kai Izumi, Atsuko Miyaji (Osaka Univ.) ICSS2023-58
ChaCha is the stream cipher adopted in TLS1.3 and analyzing its security is important given its wide deployment. Differe... [more] ICSS2023-58
pp.49-56
ICSS 2023-11-16
16:50
Ishikawa IT Business Plaza Musashi and Online
(Primary: On-site, Secondary: Online)
Improved Secret Key Transport mechanism using CSIDH
Kodai Hayashida, Atsuko Miyaji (Osaka Univ.) ICSS2023-59
In order to achieve secure communication over public networks,it is common practice to share keys and communicate
confi... [more]
ICSS2023-59
pp.57-63
ICSS 2023-11-17
10:25
Ishikawa IT Business Plaza Musashi and Online
(Primary: On-site, Secondary: Online)
Chameleon Hash Function with Forward-Security
Pengxuan Wei, Atsuko Miyaji (Osaka Univ.), Yangguang Tian (University Of Surrey) ICSS2023-61
Chameleon Hash Function (CH) is a hash function with a public and secret key pair. CH is collision-resistant for users w... [more] ICSS2023-61
pp.70-76
LOIS, SITE, ISEC 2023-11-09
14:20
Hiroshima Satellite Campus Hiroshima
(Primary: On-site, Secondary: Online)
Improving Triple Sieve Algorithm on Ideal Lattice
Seishiro Terada, Yuntao Wang, Atsuko Miyaji (Osaka Univ.) ISEC2023-59 SITE2023-53 LOIS2023-17
 [more] ISEC2023-59 SITE2023-53 LOIS2023-17
pp.33-40
RCC, ISEC, IT, WBS 2023-03-14
09:25
Yamaguchi
(Primary: On-site, Secondary: Online)
Security Anslysis of binary elliptic curve GLS254
Yue Gao (Osaka Univ.), ShuFan Wu (Taiwan Univ.), Atsuko Miyaji (Osaka Univ.) IT2022-73 ISEC2022-52 WBS2022-70 RCC2022-70
In now days, light weight system like Iot(Internet of Things) and FPGA have attracted many researchers and have applied... [more] IT2022-73 ISEC2022-52 WBS2022-70 RCC2022-70
pp.33-40
RCC, ISEC, IT, WBS 2023-03-14
10:55
Yamaguchi
(Primary: On-site, Secondary: Online)
Safety Analysis for The Post-quantum Module-LWE Problem on Subfield in Cyclotomic Field
Kosuke Tamura, Shinya Okumura, Atsuko Miyaji (OU) IT2022-76 ISEC2022-55 WBS2022-73 RCC2022-73
 [more] IT2022-76 ISEC2022-55 WBS2022-73 RCC2022-73
pp.54-60
RCC, ISEC, IT, WBS 2023-03-14
13:50
Yamaguchi
(Primary: On-site, Secondary: Online)
A Proposal of Defining Fields for Efficient Ring-LWE Based Cryptography
Yuya Okubo, Shinya Okumura (Osaka Univ.), Atsuko Miyaji (Osaka Univ./JAIST) IT2022-91 ISEC2022-70 WBS2022-88 RCC2022-88
Currently, as a post-quantum computer cryptography, cryptography based on the difficulty of solving a mathematical probl... [more] IT2022-91 ISEC2022-70 WBS2022-88 RCC2022-88
pp.142-148
 Results 1 - 20 of 142  /  [Next]  
Choose a download format for default settings. [NEW !!]
Text format pLaTeX format CSV format BibTeX format
Copyright and reproduction : All rights are reserved and no part of this publication may be reproduced or transmitted in any form or by any means, electronic or mechanical, including photocopy, recording, or any information storage and retrieval system, without permission in writing from the publisher. Notwithstanding, instructors are permitted to photocopy isolated articles for noncommercial classroom use without fee. (License No.: 10GA0019/12GB0052/13GB0056/17GB0034/18GB0034)


[Return to Top Page]

[Return to IEICE Web Page]


The Institute of Electronics, Information and Communication Engineers (IEICE), Japan