|
|
All Technical Committee Conferences (Searched in: All Years)
|
|
Search Results: Conference Papers |
Conference Papers (Available on Advance Programs) (Sort by: Date Descending) |
|
Committee |
Date Time |
Place |
Paper Title / Authors |
Abstract |
Paper # |
ICSS, IPSJ-SPT |
2014-03-27 15:20 |
Okinawa |
Meio Univiersity |
An authenticated key exchange protocol for the network between a server and terminals Yumiko Murakami, Yutaka Kawai, Nobuhiro Kobayashi (Mitsubishi Electric) ICSS2013-67 |
[more] |
ICSS2013-67 pp.31-35 |
ISEC, IT, WBS |
2011-03-04 15:20 |
Osaka |
Osaka University |
On the (Im)possibility Results for Strong Attack Models for Public Key Cryptosystems Yutaka Kawai (Univ. of Tokyo), Yusuke Sakai (Univ. of Electro-Comm.), Noboru Kunihiro (Univ. of Tokyo) IT2010-128 ISEC2010-132 WBS2010-107 |
[more] |
IT2010-128 ISEC2010-132 WBS2010-107 pp.395-402 |
ISEC, IPSJ-CSEC, SITE, ICSS [detail] |
2010-07-02 09:50 |
Aomori |
Hirosaki University |
Consideration on the Luby-Rackoff Cipher based on Physically Unclonable Functions Yutaka Kawai (Univ. of Tokyo), Yuichi Komano (Tohisiba), Kazuo Ohta (Univ. of Electro-Comm.) ISEC2010-25 SITE2010-21 ICSS2010-31 |
[more] |
ISEC2010-25 SITE2010-21 ICSS2010-31 pp.119-122 |
ISEC |
2008-09-12 16:10 |
Tokyo |
Kikai-Shinko-Kaikan Bldg. |
The security analysis using meta-reduction under several computational assumptions in the case of ElGamal encryption Yutaka Kawai, Kazuo Ohta (UEC) ISEC2008-70 |
[more] |
ISEC2008-70 pp.47-54 |
ISEC, IT, WBS |
2008-02-29 14:15 |
Tokyo |
|
A proposal of modified multi ring signature Mitsuaki Ikeda, Yutaka Kawai, Kazuo Ohta (UEC) IT2007-58 ISEC2007-155 WBS2007-89 |
The $k$-out-of-$n$ signature is a signature scheme where $k$ real signers
among $n$ signers corporate in signature gene... [more] |
IT2007-58 ISEC2007-155 WBS2007-89 pp.65-71 |
ISEC |
2007-09-07 15:45 |
Tokyo |
Kikai-Shinko-Kaikan Bldg. |
An Approach to Duality in Public Key Cryptosystems Kazuo Ohta (UEC), Yuichi Komano (Toshiba), Yutaka Kawai (UEC), Shinichi Kawamura (Toshiba) ISEC2007-87 |
The security of cryptosystems is formalized by the combination of adversarial goal GOAL and attack model ATK. Paillier a... [more] |
ISEC2007-87 pp.99-106 |
ISEC |
2007-05-18 14:05 |
Tokyo |
Kikai-Shinko-Kaikan Bldg. |
Consideration on security of digital signatures from the view of Paillier's framework Yutaka Kawai, Kazuo Ohta, Noboru Kunihiro (UEC) ISEC2007-9 |
In the dawn of the research on public key cryptosystem,「There is a certain scheme such that if the scheme proven secure ... [more] |
ISEC2007-9 pp.57-64 |
IT, ISEC, WBS |
2007-03-16 08:30 |
Gunma |
Gunma Univ. (Kiryu Campus) |
On the Security of Secret Handshake Kazuki Yoneyama, Yutaka Kawai, Takahiro Kondo, Kazuo Ohta, Noboru Kunihiro (UEC) |
[more] |
IT2006-93 ISEC2006-148 WBS2006-90 pp.47-52 |
|
|
|
Copyright and reproduction :
All rights are reserved and no part of this publication may be reproduced or transmitted in any form or by any means, electronic or mechanical, including photocopy, recording, or any information storage and retrieval system, without permission in writing from the publisher. Notwithstanding, instructors are permitted to photocopy isolated articles for noncommercial classroom use without fee. (License No.: 10GA0019/12GB0052/13GB0056/17GB0034/18GB0034)
|
[Return to Top Page]
[Return to IEICE Web Page]
|