IEICE Technical Committee Submission System
Conference Schedule
Online Proceedings
[Sign in]
Tech. Rep. Archives
    [Japanese] / [English] 
( Committee/Place/Topics  ) --Press->
 
( Paper Keywords:  /  Column:Title Auth. Affi. Abst. Keyword ) --Press->

All Technical Committee Conferences  (All Years)

Search Results: Conference Papers
 Conference Papers (Available on Advance Programs)  (Sort by: Date Descending)
 Results 1 - 20 of 28  /  [Next]  
Committee Date Time Place Paper Title / Authors Abstract Paper #
SITE, ISEC, HWS, EMM, BioX, IPSJ-CSEC, IPSJ-SPT, ICSS [detail] 2020-07-20
16:10
Online Online Short Lattice Signatures in the Standard Model with Efficient Tag Generation and Its Implementation
Kaisei Kajita, Go Ohtake, Kazuto Ogawa (NHK), Koji Nuida, Tsuyoshi Takagi (Univ. of Tokyo) ISEC2020-22 SITE2020-19 BioX2020-25 HWS2020-15 ICSS2020-9 EMM2020-19
We propose new short signature schemes under the Ring-SIS assumption in the standard model by revisiting an existing con... [more] ISEC2020-22 SITE2020-19 BioX2020-25 HWS2020-15 ICSS2020-9 EMM2020-19
pp.53-60
ISEC 2020-05-20
10:45
Online Online Improved Quantum Information Set Decoding Algorithm with Low Memory
Naoto Kimura (Univ. Tokyo), Atsushi Takayasu (NICT), Tsuyoshi Takagi (Univ. Tokyo) ISEC2020-3
The security of code-based cryptoststems relates to the hardness of the syndrome decoding problem. The best decoding alg... [more] ISEC2020-3
pp.15-22
ISEC 2020-05-20
14:10
Online Online [Invited Talk] How to Construct CSIDH on Edwards Curves (from CT-RSA 2020)
Tomoki Moriya, Hiroshi Onuki, Tsuyoshi Takagi (UTokyo) ISEC2020-8
CSIDH is an isogeny-based key-exchange protocol, that is one of the candidates for post-quantum cryptography. It is base... [more] ISEC2020-8
p.31
SITE, ISEC, LOIS 2018-11-04
14:10
Fukuoka   Time Complexity of Syndrome Decoding Problem and Security Analysis of Code-based Signature Scheme
Partha Sarathi Roy (KDDI Research), Kirill Morozov (Univ. of North Texas), Kazuhide Fukushima, Shinsaku Kiyomoto (KDDI Research), Tsuyoshi Takagi (Univ. of Tokyo) ISEC2018-77 SITE2018-55 LOIS2018-37
 [more] ISEC2018-77 SITE2018-55 LOIS2018-37
pp.73-78
HWS, ISEC, SITE, ICSS, EMM, IPSJ-CSEC, IPSJ-SPT [detail] 2018-07-25
10:45
Hokkaido Sapporo Convention Center Code-Based Signature Scheme without Trapdoors
Partha Sarathi Roy (KDDI Research), Kirill Morozov (Univ. of North Texas), Kazuhide Fukushima, Shinsaku Kiyomoto (KDDI Research), Tsuyoshi Takagi (Univ. of Tokyo) ISEC2018-15 SITE2018-7 HWS2018-12 ICSS2018-18 EMM2018-14
 [more] ISEC2018-15 SITE2018-7 HWS2018-12 ICSS2018-18 EMM2018-14
pp.17-22
HWS, ISEC, SITE, ICSS, EMM, IPSJ-CSEC, IPSJ-SPT [detail] 2018-07-26
14:10
Hokkaido Sapporo Convention Center A New Embedding Method for Generalized LWE
Weiyao Wang, Yuntao Wang, Atsushi Takayasu, Tsuyoshi Takagi (Univ. Tokyo) ISEC2018-46 SITE2018-38 HWS2018-43 ICSS2018-49 EMM2018-45
Estimating the computational cost for solving learning with errors (LWE) problem is an indispensable research topic to u... [more] ISEC2018-46 SITE2018-38 HWS2018-43 ICSS2018-49 EMM2018-45
pp.363-370
ISEC 2016-09-02
13:25
Tokyo Kikai-Shinko-Kaikan Bldg. An Homomorphic Encryption based on some kind of Indeterminate Equations
Koichiro Akiyama (Toshiba), Yasuhiro Goto (HUE), Shinya Okumura (ISIT), Tsuyoshi Takagi (Kyushu Univ.), Koji Nuida, Goichiro Hanaoka (AIST) ISEC2016-43
Authors propose a homomorphic public-key encryption whose security is based on a LWE-like problem related to indetermina... [more] ISEC2016-43
pp.27-34
ISEC 2016-09-02
15:30
Tokyo Kikai-Shinko-Kaikan Bldg. [Invited Talk] Security estimation for lattice based cryptosystems by progressive BKZ algorithm (From Eurocrypt 2016)
Yoshinori Aono (NICT), Yuntao Wang (Kyushu Univ.), Takuya Hayashi (NICT), Tsuyoshi Takagi (Kyushu Univ.) ISEC2016-47
We introduce the paper “Improved Progressive BKZ Algorithms and their Precise Cost Estimation by Sharp Simulator” in Eur... [more] ISEC2016-47
p.57
EMM, ISEC, SITE, ICSS, IPSJ-CSEC, IPSJ-SPT [detail] 2016-07-15
13:50
Yamaguchi   On the Semi-regularity of Polynomial Systems Arising from the Section Finding Problem
Shinya Okumura (ISIT), Koichiro Akiyama (Toshiba), Tsuyoshi Takagi (Kyushu Univ.) ISEC2016-34 SITE2016-28 ICSS2016-34 EMM2016-42
There are no known quantum algorithms, performed in polynomial time, for solving the section finding problem on algebrai... [more] ISEC2016-34 SITE2016-28 ICSS2016-34 EMM2016-42
pp.185-191
ISEC 2016-05-19
13:25
Tokyo Kikai-Shinko-Kaikan Bldg. On the Possibility of Recovering Short Generators over Ideal Lattices for Cyclotomic Fields
Shinya Okumura, Masaya Yasuda, Tsuyoshi Takagi (Kyushu Univ.) ISEC2016-6
Recently, next-generation high-performance cryptography, e.g. post-quantum cryptography, fully homomorphic encryption sc... [more] ISEC2016-6
pp.25-32
IPSJ-CSEC, ISEC, SITE, ICSS, EMM, IPSJ-SPT [detail] 2015-07-03
10:40
Aichi NAGOYA TRADE & INDUSTRY CENTER Report on Workshop on Cybersecurity in a Post-Quantum World
Takanori Yasuda (ISIT), Tsuyoshi Takagi (Kyushu Univ.) ISEC2015-22 SITE2015-20 ICSS2015-32 EMM2015-30
 [more] ISEC2015-22 SITE2015-20 ICSS2015-32 EMM2015-30
pp.135-136
QIT
(2nd)
2015-05-25
17:00
Osaka Osaka University MQ Challenge: Solving Problems for Post-Quantum Cryptography and Their Hardness Evaluation
Takanori Yasuda (ISIT), Xavier Dahan (Ochanomizu Univ.), Yun-Ju Huang (ISIT), Tsuyoshi Takagi (Kyushu Univ.), Kouichi Sakurai (ISIT)
 [more]
EMM, ISEC, SITE, ICSS, IPSJ-CSEC, IPSJ-SPT [detail] 2013-07-19
15:15
Hokkaido   Application of Efficient Forms of Elliptic Curves to Ate-like Pairings
Takanori Yasuda (ISIT), Tsuyoshi Takagi (Kyushu Univ.), Kouichi Sakurai (ISIT) ISEC2013-44 SITE2013-39 ICSS2013-49 EMM2013-46
 [more] ISEC2013-44 SITE2013-39 ICSS2013-49 EMM2013-46
pp.323-330
ISEC, LOIS 2012-11-22
15:35
Shizuoka Shizuoka City Industry-University Exchange Center Parallelized Gauss sieve algorithm for solving the shortest vector problem in lattices
Tsukasa Ishiguro, Shinsaku Kiyomoto, Yutaka Miyake (KDDI R&D Labs), Tsuyoshi Takagi (Kyushu Univ) ISEC2012-71 LOIS2012-46
Security of lattice-based cryptosystems is based on the hardness of the Shortest Vector Problem (SVP) in lattices.
Micc... [more]
ISEC2012-71 LOIS2012-46
pp.93-99
ISEC 2012-09-21
09:20
Tokyo Kikai-Shinko-Kaikan Bldg. Security Evaluation of Pairing-Based Cryptosystems using eta-T Pairing over GF(3^n)
Takuya Hayashi (Kyushu Univ.), Takeshi Shimoyama (Fujitsu Labs.), Naoyuki Shinohara (NICT), Tsuyoshi Takagi (Kyushu Univ.) ISEC2012-43
 [more] ISEC2012-43
pp.1-5
EMM, ISEC, SITE, ICSS, IPSJ-CSEC, IPSJ-SPT [detail] 2012-07-20
10:30
Hokkaido   An efficient variant of Rainbow without triangular matrix representation
Takanori Yasuda (ISIT), Tsuyoshi Takagi (Kyushu Univ.), Kouichi Sakurai (ISIT) ISEC2012-29 SITE2012-25 ICSS2012-31 EMM2012-21
 [more] ISEC2012-29 SITE2012-25 ICSS2012-31 EMM2012-21
pp.143-150
ISEC 2011-12-14
13:15
Tokyo Kikai-Shinko-Kaikan Bldg. A Report on CHES 2011
Tetsuya Izu (FUJITSU Lab.), Atsuo Inomata (NAIST), Katsuyuki Okeya (Renesas Electronics), Ken Kawabata, Yuichi Komano (Toshiba), Kazuo Sakiyama (UEC), Yumi Sakemi (FUJITSU Lab.), Akashi Satoh (AIST), Yuji Suga (IIJ), Tsuyoshi Takagi (Kyusyu Univ.), Junko Takahashi (NTT), Yukiyasu Tsunoo (NEC), Shiho Moriai (Sony), Yohei Hori (AIST), Naofumi Homma (Tohoku Univ.) ISEC2011-65
(To be available after the conference date) [more] ISEC2011-65
pp.21-24
ISEC 2011-05-13
13:55
Tokyo Kikai-Shinko-Kaikan Bldg. A note on the reduction of the size of keys of Rainbow
Takanori Yasuda (ISIT), Kouichi Sakurai, Tsuyoshi Takagi (Kyushu Univ.) ISEC2011-2
 [more] ISEC2011-2
pp.9-16
IT, ISEC, WBS 2010-03-04
17:00
Nagano Nagano-Engineering Campus, Shinshu University An Experiment of Number Field Sieve over GF(p) of Low Hamming Weight Characteristic
Kenichiro Hayasaka, Tsuyoshi Takagi (Future Univ. Hakodate) IT2009-79 ISEC2009-87 WBS2009-58
The security of DSA and Diffie-Hellman key exchange is based on the
difficulty of the discrete logarithm problems (DLP)... [more]
IT2009-79 ISEC2009-87 WBS2009-58
pp.53-60
WBS, IT, ISEC 2009-03-09
13:10
Hokkaido Hakodate Mirai Univ. [Invited Talk] Advances in Public-Key Cryptography (RSA, ECC, IBE)
Tsuyoshi Takagi (Future Univ. Hakodate.) IT2008-50 ISEC2008-108 WBS2008-63
We give a brief overview on the development of public-key cryptography starting with RSA cryptosystem. The most frequent... [more] IT2008-50 ISEC2008-108 WBS2008-63
pp.47-48
 Results 1 - 20 of 28  /  [Next]  
Choose a download format for default settings. [NEW !!]
Text format pLaTeX format CSV format BibTeX format
Copyright and reproduction : All rights are reserved and no part of this publication may be reproduced or transmitted in any form or by any means, electronic or mechanical, including photocopy, recording, or any information storage and retrieval system, without permission in writing from the publisher. Notwithstanding, instructors are permitted to photocopy isolated articles for noncommercial classroom use without fee. (License No.: 10GA0019/12GB0052/13GB0056/17GB0034/18GB0034)


[Return to Top Page]

[Return to IEICE Web Page]


The Institute of Electronics, Information and Communication Engineers (IEICE), Japan