|
|
All Technical Committee Conferences (Searched in: Recent 10 Years)
|
|
Search Results: Conference Papers |
Conference Papers (Available on Advance Programs) (Sort by: Date Descending) |
|
Committee |
Date Time |
Place |
Paper Title / Authors |
Abstract |
Paper # |
EMM, BioX, ISEC, SITE, ICSS, HWS, IPSJ-CSEC, IPSJ-SPT [detail] |
2024-07-22 13:25 |
Hokkaido |
Sapporo Convention Center (Hokkaido) |
CSI-FiSh Variant with Quadratic Twists on Edwards Curves Yuki Iwata (Toyohashi University of Technology), Hiroki Minamide (National Institute of Technology, Tokyo College), Takeshi Nakai, Koutarou Suzuki (Toyohashi University of Technology) ISEC2024-9 SITE2024-6 BioX2024-19 HWS2024-9 ICSS2024-13 EMM2024-15 |
CSI-FiSh is an isogeny-based signature scheme based on CSIDH.
CSI-FiSh works on challenge spaces ${-1,0,1}$ using quadr... [more] |
ISEC2024-9 SITE2024-6 BioX2024-19 HWS2024-9 ICSS2024-13 EMM2024-15 pp.8-15 |
EMM, BioX, ISEC, SITE, ICSS, HWS, IPSJ-CSEC, IPSJ-SPT [detail] |
2023-07-24 15:20 |
Hokkaido |
Hokkaido Jichiro Kaikan (Hokkaido) |
Threshold ring signature based on isogeny Naho Isogai, Takeshi Nakai, Koutarou Suzuki (TUT) ISEC2023-25 SITE2023-19 BioX2023-28 HWS2023-25 ICSS2023-22 EMM2023-25 |
RippleSign is the first $T$-out-of-$N$ threshold ring signature scheme based on isogeny,which has an issue that the sign... [more] |
ISEC2023-25 SITE2023-19 BioX2023-28 HWS2023-25 ICSS2023-22 EMM2023-25 pp.72-79 |
RCC, ISEC, IT, WBS |
2023-03-14 13:25 |
Yamaguchi |
(Yamaguchi, Online) (Primary: On-site, Secondary: Online) |
Signature scheme based on OSIDH Kohtaroh Aoyagi (TUT), Hiroki Minamide (NITTC), Koutarou Suzuki (TUT) IT2022-90 ISEC2022-69 WBS2022-87 RCC2022-87 |
Isogeny-based cryptography, post-quantum cryptography, is a cryptographic technique that has attracted attention because... [more] |
IT2022-90 ISEC2022-69 WBS2022-87 RCC2022-87 pp.135-141 |
RCC, ISEC, IT, WBS |
2023-03-15 11:50 |
Yamaguchi |
(Yamaguchi, Online) (Primary: On-site, Secondary: Online) |
Steganography for Graphs using Graph Spectrum Kazuhisa Kawaguchi, Kenji Toyonaga (TUT), Chako Takahashi (Yamagata Univ), Takeshi Nakai, Koutarou Suzuki (TUT) IT2022-116 ISEC2022-95 WBS2022-113 RCC2022-113 |
Steganography aims to hide the fact that a message is being communicated by embedding it in another information medium.T... [more] |
IT2022-116 ISEC2022-95 WBS2022-113 RCC2022-113 pp.305-312 |
SITE, ISEC, LOIS |
2021-11-12 13:50 |
Online |
Online (Online) |
Security notions of decryption-controllable identity-based encryption Hidekazu Miyanaga, Atsushi Fujioka, Taroh Sasaki (Kanagawa Univ.), Yuki Okano (NTT), Koutarou Suzuki (Toyohashi Univ. of Tech.), Kazuki Yoneyama (Ibaraki Univ.) ISEC2021-43 SITE2021-37 LOIS2021-26 |
In recent years, there have been increasing opportunities for a single user to have multiple devices. A similar situati... [more] |
ISEC2021-43 SITE2021-37 LOIS2021-26 pp.13-17 |
WBS, IT, ISEC |
2021-03-04 12:10 |
Online |
Online (Online) |
Efficient parallel computing method of isogeny based cryptography Ryota Udani, Koutarou Suzuki (TUT) IT2020-124 ISEC2020-54 WBS2020-43 |
Jao et al. proposed SIDH, a key exchange protocol based on isogeny between supersingular elliptic curves. It is expected... [more] |
IT2020-124 ISEC2020-54 WBS2020-43 pp.81-85 |
ISEC |
2020-05-20 09:45 |
Online |
Online (Online) |
Isogeny based ring signature from CSIDH Taisei Kiyama, Koutarou Suzuki (TUT) ISEC2020-1 |
CSIDH (Castryck, Lange, Martindale, Panny and Renes, ASIACRYPT ’18) is proposed as a post-quan- tum cryptography using i... [more] |
ISEC2020-1 pp.1-6 |
ISEC |
2020-05-20 16:05 |
Online |
Online (Online) |
Identity-based Authenticated Key Exchange for IoT Devices and its Security against Malicious Private Key Generator Kazuma Wariki, Taroh Sasaki, Atsushi Fujioka (Kanagawa Univ.), Koutarou Suzuki (Toyohashi Univ. of Tech.), Junichi Tomida (NTT) ISEC2020-12 |
With a rapid increase in the number of IoT devices, many
identity-based authenticated key exchange (IBAKE) protocols fo... [more] |
ISEC2020-12 pp.55-61 |
|
|
|
Copyright and reproduction :
All rights are reserved and no part of this publication may be reproduced or transmitted in any form or by any means, electronic or mechanical, including photocopy, recording, or any information storage and retrieval system, without permission in writing from the publisher. Notwithstanding, instructors are permitted to photocopy isolated articles for noncommercial classroom use without fee. (License No.: 10GA0019/12GB0052/13GB0056/17GB0034/18GB0034)
|
[Return to Top Page]
[Return to IEICE Web Page]
|