IEICE Technical Committee Submission System
Conference Schedule
Online Proceedings
[Sign in]
Tech. Rep. Archives
    [Japanese] / [English] 
( Committee/Place/Topics  ) --Press->
( Paper Keywords:  /  Column:Title Auth. Affi. Abst. Keyword ) --Press->

All Technical Committee Conferences  (All Years)

Search Results: Conference Papers
 Conference Papers (Available on Advance Programs)  (Sort by: Date Descending)
 Results 1 - 20 of 34  /  [Next]  
Committee Date Time Place Paper Title / Authors Abstract Paper #
Tokyo Gakushuin University Proposal of Efficient Quantum Modular Addition Circuit and its Implementation
Kento Oonishi (UTokyo/ Keio Univ.), Tomoki Tanaka (MUFG/ MUFG Bank/ Keio Univ.), Shumpei Uno (MHIR/ Keio Univ.), Naoki Yamamoto (Keio Univ.), Noboru Kunihiro (Tsukuba Univ.)
In this paper, we propose more efficient quantum addition and modular addition circuits and estimate the number of quant... [more]
ISEC, SITE, ICSS, EMM, HWS, BioX, IPSJ-CSEC, IPSJ-SPT [detail] 2019-07-23
Kochi Kochi University of Technology New Quantum Algorithms for Modular Inverse and Their Application on the Elliptic Curve Discrete Logarithm Problem
Ryo Kurama (Univ. of Tokyo), Noboru Kunihiro (Tsukuba Univ.) ISEC2019-24 SITE2019-18 BioX2019-16 HWS2019-19 ICSS2019-22 EMM2019-27
 [more] ISEC2019-24 SITE2019-18 BioX2019-16 HWS2019-19 ICSS2019-22 EMM2019-27
ISEC 2019-05-17
Tokyo Kikai-Shinko-Kaikan Bldg. [Invited Talk] Attacking Noisy Secret CRT-RSA Exponents in Binary Method (from ICISC 2018)
Kento Oonishi, Noboru Kunihiro (UTokyo) ISEC2019-2
In this presentation, we give a security evaluation on the RSA encryption scheme with the Chinese remainder theorem (CRT... [more] ISEC2019-2
IT, ISEC, WBS 2019-03-08
Tokyo University of Electro-Communications Key Reocvery Atttack on Ring-LWE Scheme Using Side-Channel Information in Number Theoretic Transform
Kento Oonishi, Noboru Kunihiro (Tokyo Univ.) IT2018-112 ISEC2018-118 WBS2018-113
Recently, the researches of post-quantum cryptography are conducted because of the realization of quantum computers in t... [more] IT2018-112 ISEC2018-118 WBS2018-113
Tokyo The University of Tokyo A Survey on Physical Experiments for Integer Factoring based on Shor's Algorithm
Noboru Kunihiro (UTokyo)
HWS, ISEC, SITE, ICSS, EMM, IPSJ-CSEC, IPSJ-SPT [detail] 2018-07-25
Hokkaido Sapporo Convention Center Extended Partial Key Exposure Attacks on RSA
Kaichi Suzuki, Atsushi Takayasu, Noboru Kunihiro (Univ. of Tokyo) ISEC2018-29 SITE2018-21 HWS2018-26 ICSS2018-32 EMM2018-28
Thus far, emph{partial key exposure attacks} on RSA, i.e., attackers are given the most significant bits (MSBs) emph{or}... [more] ISEC2018-29 SITE2018-21 HWS2018-26 ICSS2018-32 EMM2018-28
HWS, ISEC, SITE, ICSS, EMM, IPSJ-CSEC, IPSJ-SPT [detail] 2018-07-26
Hokkaido Sapporo Convention Center The Precise Security Analysis of Block Ciphers Enhanced by FX-Construction against a Quantum Algorithm
Syo Yasui, Noboru Kunihiro (UTokyo) ISEC2018-47 SITE2018-39 HWS2018-44 ICSS2018-50 EMM2018-46
 [more] ISEC2018-47 SITE2018-39 HWS2018-44 ICSS2018-50 EMM2018-46
LOIS, ISEC, SITE 2017-11-10
Kyoto   Lattice Attacks on Elliptic Curve Diffie-Hellman key exchange
Sota Onozawa (The Univ. of Tokyo), Atsushi Takayasu (The Univ. of Tokyo/AIST), Noboru Kunihiro (The Univ. of Tokyo) ISEC2017-69 SITE2017-51 LOIS2017-46
Boneh and Venkatesan (Crypto’96) introduced the hidden number problem (HNP) to study the security of Diffie-Hellman key... [more] ISEC2017-69 SITE2017-51 LOIS2017-46
SITE, EMM, ISEC, ICSS, IPSJ-CSEC, IPSJ-SPT [detail] 2017-07-14
Tokyo   Recovering CRT-RSA Secret Keys Using the Information of the Operations Based on 2^m-ary Method.
Kento Oonishi, Noboru Kunihiro (Univ. of Tokyo) ISEC2017-22 SITE2017-14 ICSS2017-21 EMM2017-25
In side channel attacks, the secret keys are obtained from physical data in the implementation of the cryptosystem. For ... [more] ISEC2017-22 SITE2017-14 ICSS2017-21 EMM2017-25
ISEC, WBS, IT 2017-03-09
Tokyo TOKAI University Security Analysis of Ordinary Isogeny Diffie--Hellman
Satoshi Furukawa, Atsushi Takayasu, Noboru Kunihiro (The Univ. of Tokyo) IT2016-104 ISEC2016-94 WBS2016-80
In this paper, we analyze the security of Ordinary Isogeny Diffie--Hellman (OIDH) key exchange proposed by Stolbunov (Ad... [more] IT2016-104 ISEC2016-94 WBS2016-80
COMP, ISEC 2016-12-22
Hiroshima Hiroshima University [Invited Talk] Adversary-dependent Lossy Trapdoor Function from Hardness of Factoring Semi-smooth RSA Subgroup
Takashi Yamakawa (UT), Shota Yamada, Goichiro Hanaoka (AIST), Noboru Kunihiro (UT) ISEC2016-83 COMP2016-44
 [more] ISEC2016-83 COMP2016-44
EMM, ISEC, SITE, ICSS, IPSJ-CSEC, IPSJ-SPT [detail] 2016-07-15
Yamaguchi   Worst Case Short Lattice Point Enumeration on Block Reduced Bases
Atsushi Takayasu, Noboru Kunihiro (Univ. Tokyo) ISEC2016-33 SITE2016-27 ICSS2016-33 EMM2016-41
(To be available after the conference date) [more] ISEC2016-33 SITE2016-27 ICSS2016-33 EMM2016-41
ISEC 2014-12-19
Tokyo Kikai-Shinko-Kaikan Bldg. [Invited Talk] Self-bilinear Map on Unknown Order Groups from Indistinguishability Obfuscation and Its Applications
Takashi Yamakawa (Univ. of Tokyo), Shota Yamada, Goichiro Hanaoka (AIST), Noboru Kunihiro (Univ. of Tokyo) ISEC2014-73
 [more] ISEC2014-73
ICSS, ISEC, SITE, EMM, IPSJ-CSEC, IPSJ-SPT [detail] 2014-07-03
Hokkaido San-Refure Hakodate Security of RSA with Many Decryption Exponents
Atsushi Takayasu, Noboru Kunihiro (Univ. of Tokyo) ISEC2014-19 SITE2014-14 ICSS2014-23 EMM2014-19
When we use small secret exponents, RSA becomes efficient for its decryption cost and signature generation cost. However... [more] ISEC2014-19 SITE2014-14 ICSS2014-23 EMM2014-19
EMM, ISEC, SITE, ICSS, IPSJ-CSEC, IPSJ-SPT [detail] 2013-07-19
Hokkaido   Recovering RSA Secret Keys from Observed Analog Data (I)
Noboru Kunihiro, Atsushi Takayasu (Univ. of Tokyo) ISEC2013-46 SITE2013-41 ICSS2013-51 EMM2013-48
 [more] ISEC2013-46 SITE2013-41 ICSS2013-51 EMM2013-48
EMM, ISEC, SITE, ICSS, IPSJ-CSEC, IPSJ-SPT [detail] 2012-07-20
Hokkaido   An Improved Algorithm for Approximate GCD Problems
Atsushi Takayasu, Noboru Kunihiro (UT) ISEC2012-35 SITE2012-31 ICSS2012-37 EMM2012-27
In this paper, we analyze multivariate approximate common divisor problem(ACDP), given approximate multiples of the inte... [more] ISEC2012-35 SITE2012-31 ICSS2012-37 EMM2012-27
ISEC 2012-05-18
Tokyo Kikai-Shinko-Kaikan Bldg. A Report on ASIACRYPT2011
Noboru Kunihiro (UT) ISEC2012-7
 [more] ISEC2012-7
ISEC 2011-12-14
Tokyo Kikai-Shinko-Kaikan Bldg. A Report on CRYPTO 2011
Yuji Suga (IIJ), Noboru Kunihiro (The University of Tokyo), Jun Kogure (IPA), Kanta Matsuura (The University of Tokyo) ISEC2011-69
The annual international cryptology conference CRYPTO 2011 was held on August 14th - 18th, 2011, at University of Califo... [more] ISEC2011-69
ISEC, IT, WBS 2011-03-04
Osaka Osaka University On the (Im)possibility Results for Strong Attack Models for Public Key Cryptosystems
Yutaka Kawai (Univ. of Tokyo), Yusuke Sakai (Univ. of Electro-Comm.), Noboru Kunihiro (Univ. of Tokyo) IT2010-128 ISEC2010-132 WBS2010-107
 [more] IT2010-128 ISEC2010-132 WBS2010-107
ISEC, IPSJ-CSEC, SITE, ICSS [detail] 2009-07-02
Akita Akita University Simplified Proof for Small Secret Key Attack on RSA and its Extension
Noboru Kunihiro (Univ. of Tokyo), Kaoru Kurosawa (Ibaragi Univ.) ISEC2009-15 SITE2009-7 ICSS2009-29
 [more] ISEC2009-15 SITE2009-7 ICSS2009-29
 Results 1 - 20 of 34  /  [Next]  
Choose a download format for default settings. [NEW !!]
Text format pLaTeX format CSV format BibTeX format
Copyright and reproduction : All rights are reserved and no part of this publication may be reproduced or transmitted in any form or by any means, electronic or mechanical, including photocopy, recording, or any information storage and retrieval system, without permission in writing from the publisher. Notwithstanding, instructors are permitted to photocopy isolated articles for noncommercial classroom use without fee. (License No.: 10GA0019/12GB0052/13GB0056/17GB0034/18GB0034)

[Return to Top Page]

[Return to IEICE Web Page]

The Institute of Electronics, Information and Communication Engineers (IEICE), Japan