IEICE Technical Committee Submission System
Conference Schedule
Online Proceedings
[Sign in]
Tech. Rep. Archives
    [Japanese] / [English] 
( Committee/Place/Topics  ) --Press->
 
( Paper Keywords:  /  Column:Title Auth. Affi. Abst. Keyword ) --Press->

All Technical Committee Conferences  (Searched in: Recent 10 Years)

Search Results: Conference Papers
 Conference Papers (Available on Advance Programs)  (Sort by: Date Descending)
 Results 1 - 8 of 8  /   
Committee Date Time Place Paper Title / Authors Abstract Paper #
EMM, BioX, ISEC, SITE, ICSS, HWS, IPSJ-CSEC, IPSJ-SPT [detail] 2024-07-22
13:25
Hokkaido Sapporo Convention Center (Hokkaido) CSI-FiSh Variant with Quadratic Twists on Edwards Curves
Yuki Iwata (Toyohashi University of Technology), Hiroki Minamide (National Institute of Technology, Tokyo College), Takeshi Nakai, Koutarou Suzuki (Toyohashi University of Technology) ISEC2024-9 SITE2024-6 BioX2024-19 HWS2024-9 ICSS2024-13 EMM2024-15
CSI-FiSh is an isogeny-based signature scheme based on CSIDH.
CSI-FiSh works on challenge spaces ${-1,0,1}$ using quadr... [more]
ISEC2024-9 SITE2024-6 BioX2024-19 HWS2024-9 ICSS2024-13 EMM2024-15
pp.8-15
EMM, BioX, ISEC, SITE, ICSS, HWS, IPSJ-CSEC, IPSJ-SPT [detail] 2023-07-24
15:20
Hokkaido Hokkaido Jichiro Kaikan (Hokkaido) Threshold ring signature based on isogeny
Naho Isogai, Takeshi Nakai, Koutarou Suzuki (TUT) ISEC2023-25 SITE2023-19 BioX2023-28 HWS2023-25 ICSS2023-22 EMM2023-25
RippleSign is the first $T$-out-of-$N$ threshold ring signature scheme based on isogeny,which has an issue that the sign... [more] ISEC2023-25 SITE2023-19 BioX2023-28 HWS2023-25 ICSS2023-22 EMM2023-25
pp.72-79
RCC, ISEC, IT, WBS 2023-03-14
13:25
Yamaguchi (Yamaguchi, Online)
(Primary: On-site, Secondary: Online)
Signature scheme based on OSIDH
Kohtaroh Aoyagi (TUT), Hiroki Minamide (NITTC), Koutarou Suzuki (TUT) IT2022-90 ISEC2022-69 WBS2022-87 RCC2022-87
Isogeny-based cryptography, post-quantum cryptography, is a cryptographic technique that has attracted attention because... [more] IT2022-90 ISEC2022-69 WBS2022-87 RCC2022-87
pp.135-141
RCC, ISEC, IT, WBS 2023-03-15
11:50
Yamaguchi (Yamaguchi, Online)
(Primary: On-site, Secondary: Online)
Steganography for Graphs using Graph Spectrum
Kazuhisa Kawaguchi, Kenji Toyonaga (TUT), Chako Takahashi (Yamagata Univ), Takeshi Nakai, Koutarou Suzuki (TUT) IT2022-116 ISEC2022-95 WBS2022-113 RCC2022-113
Steganography aims to hide the fact that a message is being communicated by embedding it in another information medium.T... [more] IT2022-116 ISEC2022-95 WBS2022-113 RCC2022-113
pp.305-312
SITE, ISEC, LOIS 2021-11-12
13:50
Online Online (Online) Security notions of decryption-controllable identity-based encryption
Hidekazu Miyanaga, Atsushi Fujioka, Taroh Sasaki (Kanagawa Univ.), Yuki Okano (NTT), Koutarou Suzuki (Toyohashi Univ. of Tech.), Kazuki Yoneyama (Ibaraki Univ.) ISEC2021-43 SITE2021-37 LOIS2021-26
In recent years, there have been increasing opportunities for a single user to have multiple devices. A similar situati... [more] ISEC2021-43 SITE2021-37 LOIS2021-26
pp.13-17
WBS, IT, ISEC 2021-03-04
12:10
Online Online (Online) Efficient parallel computing method of isogeny based cryptography
Ryota Udani, Koutarou Suzuki (TUT) IT2020-124 ISEC2020-54 WBS2020-43
Jao et al. proposed SIDH, a key exchange protocol based on isogeny between supersingular elliptic curves. It is expected... [more] IT2020-124 ISEC2020-54 WBS2020-43
pp.81-85
ISEC 2020-05-20
09:45
Online Online (Online) Isogeny based ring signature from CSIDH
Taisei Kiyama, Koutarou Suzuki (TUT) ISEC2020-1
CSIDH (Castryck, Lange, Martindale, Panny and Renes, ASIACRYPT ’18) is proposed as a post-quan- tum cryptography using i... [more] ISEC2020-1
pp.1-6
ISEC 2020-05-20
16:05
Online Online (Online) Identity-based Authenticated Key Exchange for IoT Devices and its Security against Malicious Private Key Generator
Kazuma Wariki, Taroh Sasaki, Atsushi Fujioka (Kanagawa Univ.), Koutarou Suzuki (Toyohashi Univ. of Tech.), Junichi Tomida (NTT) ISEC2020-12
With a rapid increase in the number of IoT devices, many
identity-based authenticated key exchange (IBAKE) protocols fo... [more]
ISEC2020-12
pp.55-61
 Results 1 - 8 of 8  /   
Choose a download format for default settings. [NEW !!]
Text format pLaTeX format CSV format BibTeX format
Copyright and reproduction : All rights are reserved and no part of this publication may be reproduced or transmitted in any form or by any means, electronic or mechanical, including photocopy, recording, or any information storage and retrieval system, without permission in writing from the publisher. Notwithstanding, instructors are permitted to photocopy isolated articles for noncommercial classroom use without fee. (License No.: 10GA0019/12GB0052/13GB0056/17GB0034/18GB0034)


[Return to Top Page]

[Return to IEICE Web Page]


The Institute of Electronics, Information and Communication Engineers (IEICE), Japan