IEICE Technical Committee Submission System
Conference Schedule
Online Proceedings
[Sign in]
Tech. Rep. Archives
    [Japanese] / [English] 
( Committee/Place/Topics  ) --Press->
 
( Paper Keywords:  /  Column:Title Auth. Affi. Abst. Keyword ) --Press->

All Technical Committee Conferences  (Searched in: All Years)

Search Results: Conference Papers
 Conference Papers (Available on Advance Programs)  (Sort by: Date Descending)
 Results 1 - 4 of 4  /   
Committee Date Time Place Paper Title / Authors Abstract Paper #
ISEC, SITE, ICSS, EMM, HWS, BioX, IPSJ-CSEC, IPSJ-SPT [detail] 2019-07-23
14:00
Kochi Kochi University of Technology Generic Even-Mansour Construction Based on Group Actions
Hector Hougaard, Chen-Mou Cheng, Miyaji Atsuko (Graduate School of Engineering, Osaka Univ.) ISEC2019-37 SITE2019-31 BioX2019-29 HWS2019-32 ICSS2019-35 EMM2019-40
The Even-Mansour cipher over bit-strings can be broken using quantum computers as shown by Kuwakado and Morii, but Alagi... [more] ISEC2019-37 SITE2019-31 BioX2019-29 HWS2019-32 ICSS2019-35 EMM2019-40
pp.215-220
IT, ISEC, WBS 2019-03-08
09:50
Tokyo University of Electro-Communications Proposal of Online Pachinko using smart contract
Kotaro Yamaguchi, Hideaki Miyaji, PoChu, Hsu, Atsuko Miyaji, Chen-Mou Cheng (O.U.) IT2018-103 ISEC2018-109 WBS2018-104
Smart Contract is a mechanism that defines transaction contents based on a contract in a program and automatically check... [more] IT2018-103 ISEC2018-109 WBS2018-104
pp.169-174
ISEC, IT, WBS 2015-03-02
10:30
Fukuoka The University of Kitakyushu Accelerating QUAD Stream Cipher using Optimal Extension Field on GPU
Satoshi Tanaka (ISIT/Kyushu Univ.), Chen-Mou Cheng (Kyushu Univ.), Takanori Yasuda (ISIT), Kouichi Sakurai (ISIT/Kyushu Univ.) IT2014-62 ISEC2014-75 WBS2014-54
Evaluating non-linear multivariate polynomial systems over finite
fields is an important subroutine for QUAD stream cip... [more]
IT2014-62 ISEC2014-75 WBS2014-54
pp.1-4
ISEC, LOIS, SITE 2014-11-21
13:25
Hyogo   Accelerating QUAD Stream Cipher using Multi-Stream Method on Graphics Processing Unit
Satoshi Tanaka (ISIT/Kyushu Univ.), Chen-Mou Cheng (Kyushu Univ.), Takanori Yasuda (ISIT), Kouichi Sakurai (ISIT/Kyushu Univ.) ISEC2014-56 SITE2014-47 LOIS2014-26
QUAD is a stream cipher with a provable security based on the theory of multivariate public-key cryptography. However, Q... [more] ISEC2014-56 SITE2014-47 LOIS2014-26
pp.1-6
 Results 1 - 4 of 4  /   
Choose a download format for default settings. [NEW !!]
Text format pLaTeX format CSV format BibTeX format
Copyright and reproduction : All rights are reserved and no part of this publication may be reproduced or transmitted in any form or by any means, electronic or mechanical, including photocopy, recording, or any information storage and retrieval system, without permission in writing from the publisher. Notwithstanding, instructors are permitted to photocopy isolated articles for noncommercial classroom use without fee. (License No.: 10GA0019/12GB0052/13GB0056/17GB0034/18GB0034)


[Return to Top Page]

[Return to IEICE Web Page]


The Institute of Electronics, Information and Communication Engineers (IEICE), Japan