IEICE Technical Committee Submission System
Conference Schedule
Online Proceedings
[Sign in]
Tech. Rep. Archives
    [Japanese] / [English] 
( Committee/Place/Topics  ) --Press->
 
( Paper Keywords:  /  Column:Title Auth. Affi. Abst. Keyword ) --Press->

All Technical Committee Conferences  (Searched in: All Years)

Search Results: Conference Papers
 Conference Papers (Available on Advance Programs)  (Sort by: Date Descending)
 Results 1 - 17 of 17  /   
Committee Date Time Place Paper Title / Authors Abstract Paper #
IT, EMM 2024-05-30
15:35
Chiba Chiba University (Nishi-Chiba Campus) On the Complexity of Codewords on Fixed-to-Fixed Length Source Coding
Mitsuharu Arimura, Mitsugu Iwamoto (UEC)
(To be available after the conference date) [more]
ISEC 2024-05-15
14:15
Tokyo Kikai-Shinko-Kaikan Bldg. Single-Shuffle Physical Zero-Knowledge Proof for Sudoku using Interactive Inputs
Tomoki Ono, Suthee Ruangwises (UEC), Yoshiki Abe (UEC/AIST), Kyosuke Hatsugai, Mitsugu Iwamoto (UEC)
 [more]
ISEC 2020-05-20
12:50
Online Online [Invited Talk] Efficient Private PEZ Protocols for Symmetric Functions (from TCC 2019)
Yoshiki Abe, Mitsugu Iwamoto (UEC), Kazuo Ohta (UEC/AIST) ISEC2020-4
 [more] ISEC2020-4
p.23
IT, ISEC, WBS 2019-03-08
14:45
Tokyo University of Electro-Communications A Private PEZ Protocol of 4-Input Majority Vote with 29 PEZ Candies
Yoshiki Abe, Shota Yamamoto, Mitsugu Iwamoto, Kazuo Ohta (UEC) IT2018-111 ISEC2018-117 WBS2018-112
Secure multi-party computation can be implemented by
using a (big) PEZ dispenser,
which is called as a ¥textit{priva... [more]
IT2018-111 ISEC2018-117 WBS2018-112
pp.223-228
HWS, ISEC, SITE, ICSS, EMM, IPSJ-CSEC, IPSJ-SPT [detail] 2018-07-25
09:55
Hokkaido Sapporo Convention Center Truly Efficient Robust Secret Sharing for the Real World
Yohei Watanabe (UEC), Kazuma Ohara (UEC/NEC), Mitsugu Iwamoto, Kazuo Ohta (UEC) ISEC2018-13 SITE2018-5 HWS2018-10 ICSS2018-16 EMM2018-12
Robust secret sharing is secret sharing with the following robustness property: An original message can be recovered eve... [more] ISEC2018-13 SITE2018-5 HWS2018-10 ICSS2018-16 EMM2018-12
pp.1-8
SITE, EMM, ISEC, ICSS, IPSJ-CSEC, IPSJ-SPT [detail] 2017-07-14
16:35
Tokyo   PUF based Device Authentication without Error Correction
Yuichi Komano (Toshiba), Mitsugu Iwamoto, Kazuo Ohta (UEC) ISEC2017-24 SITE2017-16 ICSS2017-23 EMM2017-27
 [more] ISEC2017-24 SITE2017-16 ICSS2017-23 EMM2017-27
pp.123-130
ISEC, WBS, IT 2017-03-10
14:10
Tokyo TOKAI University A Note on Acceptable Information Leakage of Searchable Symmetric Encryption
Takeshi Nakai, Takuya Nojima, Mitsugu Iwamoto, Kazuo Ohta (UEC) IT2016-128 ISEC2016-118 WBS2016-104
(To be available after the conference date) [more] IT2016-128 ISEC2016-118 WBS2016-104
pp.187-193
EMM, IT 2015-05-22
13:40
Kyoto Kyoto International Community House An Audio Secret Sharing Scheme Easy to Reproduce Secret Physically
Yuuki Tokushige, Yuto Misawa, Fumiaki Yoshida, Masaya Uwatoko, Mitsugu Iwamoto, Kazuo Ohta (UEC) IT2015-14 EMM2015-14
An audio secret sharing scheme is a variant of secret sharing schemes in which a secret and shares are acoustic informat... [more] IT2015-14 EMM2015-14
pp.75-80
EMM 2014-05-16
13:30
Tokyo   [Tutorial Lecture] Secret Sharing Schemes and Visual Secret Sharing Schemes -- What is in common and what is different? --
Mitsugu Iwamoto (UEC) EMM2014-7
A Secret sharing scheme is one of the most fundamental primitives in cryptography and has a lot of applications. A visu... [more] EMM2014-7
pp.35-40
ISEC 2014-05-09
17:05
Tokyo Kikai-Shinko-Kaikan Bldg. [Invited Talk] Limited-Birthday Distinguishers for Hash Functions -- Collisions beyond the Birthday Bound Can Be Meaningful --
Mitsugu Iwamoto (UEC), Yu Sasaki (NTT) ISEC2014-9
In this talk, we explain the paper, with the same title of this talk, appeared at the international cryptographic confer... [more] ISEC2014-9
p.49
ISEC 2012-09-21
11:15
Tokyo Kikai-Shinko-Kaikan Bldg. A Report on EUROCRYPT2012
Mitsugu Iwamoto (UEC) ISEC2012-47
The 31st EUROCRYPT 2012 was held
on 15th--19th April, 2012, at Cambridge University, United Kingdom
as an flagsh... [more]
ISEC2012-47
pp.29-31
ISEC 2011-12-14
14:40
Tokyo Kikai-Shinko-Kaikan Bldg. [Invited Talk] Uniquness Enhancement of PUF Responces Based on the Locations of Random Outputting RS Latches
Dai Yamamoto (Fujitsu Lab.), Kazuo Sakiyama, Mitsugu Iwamoto, Kazuo Ohta (Univ. of Electro-Comm.), Takao Ochiai, Masahiko Takenaka, Kouichi Itoh (Fujitsu Lab.) ISEC2011-68
Physical Unclonable Functions (PUFs) are expected to represent an important solution for secure ID generation and authen... [more] ISEC2011-68
p.29
IT 2011-05-20
14:20
Osaka Osaka City University Relations among Information Theoretically and Computationally Secure Symmetric Key Encryptions
Mitsugu Iwamoto, Kazuo Ohta (Univ. of Electro-Comm.) IT2011-5
 [more] IT2011-5
pp.25-30
ISEC, IT, WBS 2011-03-04
09:25
Osaka Osaka University New Differential Fault Analysis on Trivium Based on Setup-Time Violations
Qi Li, Shigeto Gomisawa, Mitsugu Iwamoto, Kazuo Ohta, Kazuo Sakiyama (Univ. of Electro-Comm) IT2010-118 ISEC2010-122 WBS2010-97
This paper presents new differential fault analysis (DFA) on a stream cipher Trivium based on setup–time violation... [more] IT2010-118 ISEC2010-122 WBS2010-97
pp.333-339
ISEC 2010-09-10
16:35
Tokyo Kikai-Shinko-Kaikan Bldg. A general construction method of visual secret sharing scheme with share rotations
Mitsugu Iwamoto, Yang Li, Kazuo Sakiyama, Kazuo Ohta (Univ. of Electro-Comm.) ISEC2010-49
In this paper, we discuss a visual secret sharing scheme with multiple secret images including share rotation operations... [more] ISEC2010-49
pp.67-74
ISEC 2009-05-22
11:35
Tokyo Kikai-Shinko-Kaikan Bldg. A Novel Construction Method for Visual Secret Sharing Schemes Allowing Rotation of Shares
Yang Li, Mitsugu Iwamoto, Kazuo Ohta, Kazuo Sakiyama (Univ. of Electro-Comm.) ISEC2009-5
In 2006, Iwamoto et al. introduced a visual secret sharing (VSS) schemes that allows rotation operation for shares in de... [more] ISEC2009-5
pp.29-36
WBS, IT, ISEC 2009-03-09
17:10
Hokkaido Hakodate Mirai Univ. A Coding Theorems for Cheating-Detectable (2,2)-Threshold Schemes
Hiroki Koga (Univ. Tsukuba), Mitsugu Iwamoto (Univ. Electro-Communications), Hirosuke Yamamoto (Univ. Tokyo) IT2008-66 ISEC2008-124 WBS2008-79
(To be available after the conference date) [more] IT2008-66 ISEC2008-124 WBS2008-79
pp.143-150
 Results 1 - 17 of 17  /   
Choose a download format for default settings. [NEW !!]
Text format pLaTeX format CSV format BibTeX format
Copyright and reproduction : All rights are reserved and no part of this publication may be reproduced or transmitted in any form or by any means, electronic or mechanical, including photocopy, recording, or any information storage and retrieval system, without permission in writing from the publisher. Notwithstanding, instructors are permitted to photocopy isolated articles for noncommercial classroom use without fee. (License No.: 10GA0019/12GB0052/13GB0056/17GB0034/18GB0034)


[Return to Top Page]

[Return to IEICE Web Page]


The Institute of Electronics, Information and Communication Engineers (IEICE), Japan