Committee |
Date Time |
Place |
Paper Title / Authors |
Abstract |
Paper # |
IT, EMM |
2024-05-30 15:35 |
Chiba |
Chiba University (Nishi-Chiba Campus) |
On the Complexity of Codewords on Fixed-to-Fixed Length Source Coding Mitsuharu Arimura, Mitsugu Iwamoto (UEC) |
(To be available after the conference date) [more] |
|
ISEC |
2024-05-15 14:15 |
Tokyo |
Kikai-Shinko-Kaikan Bldg. |
Single-Shuffle Physical Zero-Knowledge Proof for Sudoku using Interactive Inputs Tomoki Ono, Suthee Ruangwises (UEC), Yoshiki Abe (UEC/AIST), Kyosuke Hatsugai, Mitsugu Iwamoto (UEC) |
[more] |
|
ISEC |
2020-05-20 12:50 |
Online |
Online |
[Invited Talk]
Efficient Private PEZ Protocols for Symmetric Functions (from TCC 2019) Yoshiki Abe, Mitsugu Iwamoto (UEC), Kazuo Ohta (UEC/AIST) ISEC2020-4 |
[more] |
ISEC2020-4 p.23 |
IT, ISEC, WBS |
2019-03-08 14:45 |
Tokyo |
University of Electro-Communications |
A Private PEZ Protocol of 4-Input Majority Vote with 29 PEZ Candies Yoshiki Abe, Shota Yamamoto, Mitsugu Iwamoto, Kazuo Ohta (UEC) IT2018-111 ISEC2018-117 WBS2018-112 |
Secure multi-party computation can be implemented by
using a (big) PEZ dispenser,
which is called as a ¥textit{priva... [more] |
IT2018-111 ISEC2018-117 WBS2018-112 pp.223-228 |
HWS, ISEC, SITE, ICSS, EMM, IPSJ-CSEC, IPSJ-SPT [detail] |
2018-07-25 09:55 |
Hokkaido |
Sapporo Convention Center |
Truly Efficient Robust Secret Sharing for the Real World Yohei Watanabe (UEC), Kazuma Ohara (UEC/NEC), Mitsugu Iwamoto, Kazuo Ohta (UEC) ISEC2018-13 SITE2018-5 HWS2018-10 ICSS2018-16 EMM2018-12 |
Robust secret sharing is secret sharing with the following robustness property: An original message can be recovered eve... [more] |
ISEC2018-13 SITE2018-5 HWS2018-10 ICSS2018-16 EMM2018-12 pp.1-8 |
SITE, EMM, ISEC, ICSS, IPSJ-CSEC, IPSJ-SPT [detail] |
2017-07-14 16:35 |
Tokyo |
|
PUF based Device Authentication without Error Correction Yuichi Komano (Toshiba), Mitsugu Iwamoto, Kazuo Ohta (UEC) ISEC2017-24 SITE2017-16 ICSS2017-23 EMM2017-27 |
[more] |
ISEC2017-24 SITE2017-16 ICSS2017-23 EMM2017-27 pp.123-130 |
ISEC, WBS, IT |
2017-03-10 14:10 |
Tokyo |
TOKAI University |
A Note on Acceptable Information Leakage of Searchable Symmetric Encryption Takeshi Nakai, Takuya Nojima, Mitsugu Iwamoto, Kazuo Ohta (UEC) IT2016-128 ISEC2016-118 WBS2016-104 |
(To be available after the conference date) [more] |
IT2016-128 ISEC2016-118 WBS2016-104 pp.187-193 |
EMM, IT |
2015-05-22 13:40 |
Kyoto |
Kyoto International Community House |
An Audio Secret Sharing Scheme Easy to Reproduce Secret Physically Yuuki Tokushige, Yuto Misawa, Fumiaki Yoshida, Masaya Uwatoko, Mitsugu Iwamoto, Kazuo Ohta (UEC) IT2015-14 EMM2015-14 |
An audio secret sharing scheme is a variant of secret sharing schemes in which a secret and shares are acoustic informat... [more] |
IT2015-14 EMM2015-14 pp.75-80 |
EMM |
2014-05-16 13:30 |
Tokyo |
|
[Tutorial Lecture]
Secret Sharing Schemes and Visual Secret Sharing Schemes
-- What is in common and what is different? -- Mitsugu Iwamoto (UEC) EMM2014-7 |
A Secret sharing scheme is one of the most fundamental primitives in cryptography and has a lot of applications. A visu... [more] |
EMM2014-7 pp.35-40 |
ISEC |
2014-05-09 17:05 |
Tokyo |
Kikai-Shinko-Kaikan Bldg. |
[Invited Talk]
Limited-Birthday Distinguishers for Hash Functions
-- Collisions beyond the Birthday Bound Can Be Meaningful -- Mitsugu Iwamoto (UEC), Yu Sasaki (NTT) ISEC2014-9 |
In this talk, we explain the paper, with the same title of this talk, appeared at the international cryptographic confer... [more] |
ISEC2014-9 p.49 |
ISEC |
2012-09-21 11:15 |
Tokyo |
Kikai-Shinko-Kaikan Bldg. |
A Report on EUROCRYPT2012 Mitsugu Iwamoto (UEC) ISEC2012-47 |
The 31st EUROCRYPT 2012 was held
on 15th--19th April, 2012, at Cambridge University, United Kingdom
as an flagsh... [more] |
ISEC2012-47 pp.29-31 |
ISEC |
2011-12-14 14:40 |
Tokyo |
Kikai-Shinko-Kaikan Bldg. |
[Invited Talk]
Uniquness Enhancement of PUF Responces Based on the Locations of Random Outputting RS Latches Dai Yamamoto (Fujitsu Lab.), Kazuo Sakiyama, Mitsugu Iwamoto, Kazuo Ohta (Univ. of Electro-Comm.), Takao Ochiai, Masahiko Takenaka, Kouichi Itoh (Fujitsu Lab.) ISEC2011-68 |
Physical Unclonable Functions (PUFs) are expected to represent an important solution for secure ID generation and authen... [more] |
ISEC2011-68 p.29 |
IT |
2011-05-20 14:20 |
Osaka |
Osaka City University |
Relations among Information Theoretically and Computationally Secure Symmetric Key Encryptions Mitsugu Iwamoto, Kazuo Ohta (Univ. of Electro-Comm.) IT2011-5 |
[more] |
IT2011-5 pp.25-30 |
ISEC, IT, WBS |
2011-03-04 09:25 |
Osaka |
Osaka University |
New Differential Fault Analysis on Trivium Based on Setup-Time Violations Qi Li, Shigeto Gomisawa, Mitsugu Iwamoto, Kazuo Ohta, Kazuo Sakiyama (Univ. of Electro-Comm) IT2010-118 ISEC2010-122 WBS2010-97 |
This paper presents new differential fault analysis (DFA) on a stream cipher Trivium based on setup–time violation... [more] |
IT2010-118 ISEC2010-122 WBS2010-97 pp.333-339 |
ISEC |
2010-09-10 16:35 |
Tokyo |
Kikai-Shinko-Kaikan Bldg. |
A general construction method of visual secret sharing scheme with share rotations Mitsugu Iwamoto, Yang Li, Kazuo Sakiyama, Kazuo Ohta (Univ. of Electro-Comm.) ISEC2010-49 |
In this paper, we discuss a visual secret sharing scheme with multiple secret images including share rotation operations... [more] |
ISEC2010-49 pp.67-74 |
ISEC |
2009-05-22 11:35 |
Tokyo |
Kikai-Shinko-Kaikan Bldg. |
A Novel Construction Method for Visual Secret Sharing Schemes Allowing Rotation of Shares Yang Li, Mitsugu Iwamoto, Kazuo Ohta, Kazuo Sakiyama (Univ. of Electro-Comm.) ISEC2009-5 |
In 2006, Iwamoto et al. introduced a visual secret sharing (VSS) schemes that allows rotation operation for shares in de... [more] |
ISEC2009-5 pp.29-36 |
WBS, IT, ISEC |
2009-03-09 17:10 |
Hokkaido |
Hakodate Mirai Univ. |
A Coding Theorems for Cheating-Detectable (2,2)-Threshold Schemes Hiroki Koga (Univ. Tsukuba), Mitsugu Iwamoto (Univ. Electro-Communications), Hirosuke Yamamoto (Univ. Tokyo) IT2008-66 ISEC2008-124 WBS2008-79 |
(To be available after the conference date) [more] |
IT2008-66 ISEC2008-124 WBS2008-79 pp.143-150 |