|
|
All Technical Committee Conferences (Searched in: All Years)
|
|
Search Results: Conference Papers |
Conference Papers (Available on Advance Programs) (Sort by: Date Descending) |
|
Committee |
Date Time |
Place |
Paper Title / Authors |
Abstract |
Paper # |
IT, ISEC, WBS |
2012-03-02 09:00 |
Kanagawa |
|
Searchable Symmetric Encryption with small information leakage in index update Toshinori Araki (NEC) IT2011-67 ISEC2011-94 WBS2011-68 |
Searchable symmetric encryption(SSE) has been used for privacy preserving keyword search. Although the importance for pr... [more] |
IT2011-67 ISEC2011-94 WBS2011-68 pp.129-134 |
VLD |
2010-03-12 15:00 |
Okinawa |
|
An ASIC implementation of a group signature algorithm using two-level behavioral synthesis Sumio Morioka, Toshinori Araki, Toshiyuki Isshiki, Satoshi Obana, Kazue Sako (NEC) VLD2009-128 |
We implemented a group signature algorithm, which enables anonymous digital signature, into an ASIC. To the best of the... [more] |
VLD2009-128 pp.175-180 |
ISEC, SITE, IPSJ-CSEC |
2008-07-25 09:55 |
Fukuoka |
Fukuoka Institute of System LSI Design Industry |
Architecture Optimization of a Group Signature Circuit Sumio Morioka, Toshinori Araki, Toshiyuki Isshiki, Satoshi Obana, Kazue Sako, Isamu Teranishi (NEC) |
Group signature scheme is one of the most active research area in recent cryptographic algorithms/applications. Typical... [more] |
ISEC2008-40 pp.37-44 |
|
|
|
Copyright and reproduction :
All rights are reserved and no part of this publication may be reproduced or transmitted in any form or by any means, electronic or mechanical, including photocopy, recording, or any information storage and retrieval system, without permission in writing from the publisher. Notwithstanding, instructors are permitted to photocopy isolated articles for noncommercial classroom use without fee. (License No.: 10GA0019/12GB0052/13GB0056/17GB0034/18GB0034)
|
[Return to Top Page]
[Return to IEICE Web Page]
|