IEICE Technical Committee Submission System
Conference Schedule
Online Proceedings
[Sign in]
Tech. Rep. Archives
    [Japanese] / [English] 
( Committee/Place/Topics  ) --Press->
 
( Paper Keywords:  /  Column:Title Auth. Affi. Abst. Keyword ) --Press->

All Technical Committee Conferences  (All Years)

Search Results: Conference Papers
 Conference Papers (Available on Advance Programs)  (Sort by: Date Descending)
 Results 1 - 20 of 60  /  [Next]  
Committee Date Time Place Paper Title / Authors Abstract Paper #
IT 2022-07-22
10:25
Okayama Okayama University of Science
(Primary: On-site, Secondary: Online)
Consideration of an authenticatio protocol uses CVMA parameters
Akane Miyoshi, Kazuma Ikesaka, Yuta Kodera, Takuya Kusaka, Yasuyuki Nogami (Okayama Univ) IT2022-21
The authors implements the ElGamal encryption over extension field using the Cyclic Vector Multiplication Algorithm (CVM... [more] IT2022-21
pp.30-35
HWS, ICD [detail] 2021-10-19
15:50
Online Online Design and implementation of a sophisticated control system for an air-conditioner with sensors
Mengfang Duan, Daichi Hattori, Takuya Kusaka, Yasuyuki Nogami (Okayana Univ.) HWS2021-51 ICD2021-25
Recent climate change causes global warming, and the cost of air-conditioning becomes a problem. However, standard produ... [more] HWS2021-51 ICD2021-25
pp.53-56
IT 2020-12-01
14:50
Online Online [Invited Talk] Secure IoT and AI Utilization for Society 5.0
Yasuyuki Nogami (Oyamaya Univ.) IT2020-26
 [more] IT2020-26
pp.13-14
LOIS, ISEC, SITE 2020-11-06
10:30
Online Online Proposal of Optimal Curve Parameters for Pairing Computation on BLS12 Curve and Its Evaluation of Implementation
Daichi Hattori, Yuto Takahashi, Tomoya Tatara, Yuki Nanjo, Yuta Kodera, Takuya Kusaka, Yasuyuki Nogami (Okayama Univ.) ISEC2020-32 SITE2020-29 LOIS2020-12
Pairing-based cryptography is one of the popular cryptographic techniques for achieving safety and usability. Since a pa... [more] ISEC2020-32 SITE2020-29 LOIS2020-12
pp.1-6
CQ, CS
(Joint)
2020-06-26
15:20
Online Online [Special Invited Talk] LPWA and Security Techniques for IoT Era
Yasuyuki Nogami (Okayama Univ.) CS2020-14 CQ2020-21
There are various sensors and small terminals that support many advanced technologies in the IoT era, and while a lot of... [more] CS2020-14 CQ2020-21
pp.59-61(CS), pp.103-105(CQ)
HWS, ICD [detail] 2019-11-01
13:00
Osaka DNP Namba SS Bld. Implementation and Evaluation of EC-ElGamal Encryption with a Twisted Montgomery Curve over Tower Field on Arduino
Yuta Hashimoto, Tadaki Kanenari, Takuya Kusaka, Yasuyuki Nogami (Okayama Univ.) HWS2019-57 ICD2019-18
 [more] HWS2019-57 ICD2019-18
pp.1-5
HWS, ICD [detail] 2019-11-01
13:25
Osaka DNP Namba SS Bld. An Implementation of Tate and Ate Pairing of Embedding Degree 14
Zihao Song, Rikuya Matsumura, Yuki Nanjo, Yasuyuki Nogami, Takuya Kusaka (Okayama Univ.) HWS2019-58 ICD2019-19
Following a coming new age of IoT (Internet of Things) and tremendous growth of processing power of a personal
computer... [more]
HWS2019-58 ICD2019-19
pp.7-12
ISEC, SITE, ICSS, EMM, HWS, BioX, IPSJ-CSEC, IPSJ-SPT [detail] 2019-07-24
09:55
Kochi Kochi University of Technology A Performance Analysis of Supersingular Isogeny Diffie-Hellman with Several Classes of the Quadratic Extension Fields
Yuki Nanjo (Okayama Univ.), Masaaki Shirase (Future Univ. Hakodate), Takuya Kusaka, Yasuyuki Nogami (Okayama Univ.) ISEC2019-36 SITE2019-30 BioX2019-28 HWS2019-31 ICSS2019-34 EMM2019-39
It is well-known that the class of binomial extension field (BEF) is widely used to construct a quadratic extension fiel... [more] ISEC2019-36 SITE2019-30 BioX2019-28 HWS2019-31 ICSS2019-34 EMM2019-39
pp.207-214
IT, ISEC, WBS 2019-03-07
10:55
Tokyo University of Electro-Communications An Implementation and Evaluation of Pairing Library ELiPS for BLS Curve with Several Techniques
Yuto Takahashi, Tadaki Kanenari, Yuki Nanjo, Md. Al-Amin Khandaker, Takuya Kusaka, Yasuyuki Nogami (Okayama Univ.) IT2018-78 ISEC2018-84 WBS2018-79
In recent years, pairing encryption has attracted attention as an encryption method to realize high-performance encrypti... [more] IT2018-78 ISEC2018-84 WBS2018-79
pp.21-26
IT, ISEC, WBS 2019-03-07
11:20
Tokyo University of Electro-Communications A Consideration of the Properties of Edwards Curve Whose Order is a Power of 2
Hiromasa Miura, Kazuya Kobayashi, Takuya Kusaka, Yasuyuki Nogami (Okayama Univ.) IT2018-79 ISEC2018-85 WBS2018-80
Based on the proposal of pairing-based cryptography, ID-based cryptography, searchable cryptography, and attribute-based... [more] IT2018-79 ISEC2018-85 WBS2018-80
pp.27-32
IT, ISEC, WBS 2019-03-07
14:30
Tokyo University of Electro-Communications A Study on the System of Detecting Falsification for Conference Records Using Echo Spread Method and Octave Similarity
Shoya Ogaki (Univ. Kitakyushu), Shunsuke Araki (Kyutech), Takeru Miyazaki, Satoshi Uehara (Univ. Kitakyushu), Yasuyuki Nogami (Okayama Univ.) IT2018-84 ISEC2018-90 WBS2018-85
In this paper, we propose strengthen the robustness against tampering of audio data for conference recording using audio... [more] IT2018-84 ISEC2018-90 WBS2018-85
pp.57-64
IT, ISEC, WBS 2019-03-07
15:30
Tokyo University of Electro-Communications Analyzing Final Round Key of AES Implemented on Microcomputer using Neural Network
Satoshi Kosugi, Sho Joichi, Ken Ikuta, Takuya Kusaka, Yasuyuki Nogami, Norikazu Takahashi (Okayama University) IT2018-86 ISEC2018-92 WBS2018-87
A side channel attack is an attack method that enable external key estimation by observing secondary information generat... [more] IT2018-86 ISEC2018-92 WBS2018-87
pp.71-76
IT, ISEC, WBS 2019-03-08
10:50
Tokyo University of Electro-Communications A Consideration of Computational Delay Time by Using MAC Implemented on CAN
Hiroto Ogura, Ryunosuke Isshiki, Takuya Kusaka, Yasuyuki Nogami, Kamegawa Tetsushi (Okayama Univ.), Shoichi Maeyama (Kagawa Univ.), Shunsuke Araki (Kyutech) IT2018-105 ISEC2018-111 WBS2018-106
CAN(Controller Area Network) is widely used as the vehicle network, however, CAN have no security system. In this manusc... [more] IT2018-105 ISEC2018-111 WBS2018-106
pp.181-186
EMCJ, IEE-EMC, IEE-MAG 2018-11-22
14:00
Overseas KAIST Investigation of CAN transceiver and controller response to electromagnetic disturbance by using current injection probe
Ryunosuke Isshiki, Kengo Iokibe, Takuya Kusaka, Tetsushi Kamegawa, Yasuyuki Nogami (Okayama Univ.) EMCJ2018-63
Recently, connected cars are having a major role on modern traffic system. However, it might include vulnerability and i... [more] EMCJ2018-63
pp.23-28
ISEC 2018-05-16
10:25
Tokyo Ookayama Campus, Tokyo Institute of Technology Determining BLS Curves for Pairing over Efficient Tower of Extension Field
Yuki Nanjo, Md. Al-Amin Khandaker (Okayama Univ.), Masaaki Shirase (Future Univ. Hakodate), Takuya Kusaka, Yasuyuki Nogami (Okayama Univ.) ISEC2018-2
Pairing-based cryptography (PBC) is receiving a lot of attention since it enables many innovative and multi-functional c... [more] ISEC2018-2
pp.9-16
EMCJ 2018-01-18
15:00
Okayama   Investigation of Reaction of Error Control of CAN Protocol in Case of Electromagnetic Disturbance Injection
Ryunosuke Isshiki, Takuya Kusaka, Kengo Iokibe, Yasuyuki Nogami (Okayama Univ.) EMCJ2017-92
CAN (Controller Area Network) is employed widely as in-vehicle network protocol. Since the protocol is employed in a sit... [more] EMCJ2017-92
pp.25-30
EMCJ 2017-11-22
13:50
Tokyo Kikai-Shinko-Kaikan Bldg. Improvement of Noise Source Amplitude Modulation Method to Identify Source Devices of Electromagnetic Interference
Chiaki Ishida, Shinpei Yoshino, Chiaki Ogawa, Kengo Iokibe, Yoshitaka Tyota, Yasuyuki Nogami (Okayama Univ.) EMCJ2017-70
For a low cost determination of noise sources to reduce electromagnetic interference (EMI), we have proposed a method to... [more] EMCJ2017-70
pp.35-40
IT 2016-07-29
10:15
Fukuoka Seminar House, Fukuoka Univ. A Consideration of an Efficient Calculation over the Extension Field of Degree 4 for Elliptic Curve Pairing Cryptography
Akihito Sanada (Okayama Univ.), Sylvain Duquesne (Univ. Rennes 1), Masaaki Shirase (FUN), Yasuyuki Nogami (Okayama Univ.) IT2016-29
Pairing based cryptography with BLS(Boneh-Lynn-Shacham) curve is defined over extension field of degree 24 .
Base exten... [more]
IT2016-29
pp.45-50
IT 2016-07-29
10:40
Fukuoka Seminar House, Fukuoka Univ. A Consideration of an Efficient Calculation over the Extension Field of Degree 3 for Elliptic Curve Pairing Cryptography
Yuta Kodera (Okayama Univ.), Sylvain Duquesne (Univ. Rennes 1), Masaaki Shirase (FUN), Yasuyuki Nogami (Okayama Univ.) IT2016-30
Recently, pairing based cryptography, which is one of public-key cryptographies, has been paid attention. Mathematically... [more] IT2016-30
pp.51-56
IT 2015-09-04
10:50
Ishikawa Hakusan Shobutei A Consideration on Trace Sequence over Finite Field
Yasuyuki Nogami, Hiroto Ino (Okayama Univ.), Kazuyoshi Tsuchiya (Koden), Satoshi Uehara (Kitakyu Univ.), Robert H, Morelos Zaragoza (SJSU) IT2015-38
The authors have proposed a class of pseudo multi-value sequences generated by trace and power residue over nite eld. ... [more] IT2015-38
pp.25-29
 Results 1 - 20 of 60  /  [Next]  
Choose a download format for default settings. [NEW !!]
Text format pLaTeX format CSV format BibTeX format
Copyright and reproduction : All rights are reserved and no part of this publication may be reproduced or transmitted in any form or by any means, electronic or mechanical, including photocopy, recording, or any information storage and retrieval system, without permission in writing from the publisher. Notwithstanding, instructors are permitted to photocopy isolated articles for noncommercial classroom use without fee. (License No.: 10GA0019/12GB0052/13GB0056/17GB0034/18GB0034)


[Return to Top Page]

[Return to IEICE Web Page]


The Institute of Electronics, Information and Communication Engineers (IEICE), Japan