|
|
All Technical Committee Conferences (Searched in: All Years)
|
|
Search Results: Conference Papers |
Conference Papers (Available on Advance Programs) (Sort by: Date Descending) |
|
Committee |
Date Time |
Place |
Paper Title / Authors |
Abstract |
Paper # |
RCC, ISEC, IT, WBS |
2024-03-14 11:00 |
Osaka |
Osaka Univ. (Suita Campus) |
[Invited Talk]
Cryptographic Research Based on Algebraic Curve Computation Katsuyuki Takashima (Waseda Univ.) IT2023-116 ISEC2023-115 WBS2023-104 RCC2023-98 |
We have a wide range of cryptographic primitives based on elliptic curves, i.e., widely deployed public key cryptosystem... [more] |
IT2023-116 ISEC2023-115 WBS2023-104 RCC2023-98 p.265 |
EMM, BioX, ISEC, SITE, ICSS, HWS, IPSJ-CSEC, IPSJ-SPT [detail] |
2023-07-24 17:20 |
Hokkaido |
Hokkaido Jichiro Kaikan |
An Identity-based Signature Scheme with Tight Security Reduction Jiawei Chen, Hyungrok Jo, Shingo Sato, Junji Shikata (YNU) ISEC2023-29 SITE2023-23 BioX2023-32 HWS2023-29 ICSS2023-26 EMM2023-29 |
In this paper, we propose an identity-based signature (IBS) scheme based on the supersingular isogeny problem, with tigh... [more] |
ISEC2023-29 SITE2023-23 BioX2023-32 HWS2023-29 ICSS2023-26 EMM2023-29 pp.97-104 |
RCC, ISEC, IT, WBS |
2023-03-14 11:20 |
Yamaguchi |
(Primary: On-site, Secondary: Online) |
An analysis of the cost to find an isomorphism between hyperelliptic curves in isogeny-based cryptography Daiki Hayashida (Mitsubishi Electric Corp.), Masahiro Ishii (Tokyo Tech) IT2022-77 ISEC2022-56 WBS2022-74 RCC2022-74 |
Isogeny-based cryptography has been attracting attention as one of the candidates for post-quantum computer cryptography... [more] |
IT2022-77 ISEC2022-56 WBS2022-74 RCC2022-74 pp.61-67 |
RCC, ISEC, IT, WBS |
2023-03-14 13:25 |
Yamaguchi |
(Primary: On-site, Secondary: Online) |
Signature scheme based on OSIDH Kohtaroh Aoyagi (TUT), Hiroki Minamide (NITTC), Koutarou Suzuki (TUT) IT2022-90 ISEC2022-69 WBS2022-87 RCC2022-87 |
Isogeny-based cryptography, post-quantum cryptography, is a cryptographic technique that has attracted attention because... [more] |
IT2022-90 ISEC2022-69 WBS2022-87 RCC2022-87 pp.135-141 |
IT, ISEC, RCC, WBS |
2022-03-10 13:50 |
Online |
Online |
A study of explicit formulae of the isogenies between abelian surfaces Daiki Hayashida (Mitsubishi Electric Corp.), Masahiro Ishii (Tokyo Tech) IT2021-104 ISEC2021-69 WBS2021-72 RCC2021-79 |
In this paper, we focus on isogenies over abelian varieties for isogeny-based cryptography and propose the efficient alg... [more] |
IT2021-104 ISEC2021-69 WBS2021-72 RCC2021-79 pp.122-129 |
IA, ICSS |
2021-06-21 13:30 |
Online |
Online |
secure isogeny-based cryptosystem CSIDH for side-channel attacks Hayato Arai, Atusko Miyaji (Osaka Univ.) IA2021-2 ICSS2021-2 |
CSIDH (Commutative Supersingular Isogeny Diffie Hellman) is a kind of post-quantum cryptography that uses isogenies to e... [more] |
IA2021-2 ICSS2021-2 pp.8-13 |
WBS, IT, ISEC |
2021-03-04 11:45 |
Online |
Online |
Security analysis for the isogeny-based cryptography CSIDH Hayato Arai, Atsuko Miyaji, Kenta Kodera (Osaka Univ.) IT2020-123 ISEC2020-53 WBS2020-42 |
CSIDH (Commutative Supersingular Isogeny Diffie Hellman) is a kind of post-quantum cryptography that uses isogenies to e... [more] |
IT2020-123 ISEC2020-53 WBS2020-42 pp.73-80 |
ISEC |
2020-05-20 14:10 |
Online |
Online |
[Invited Talk]
How to Construct CSIDH on Edwards Curves (from CT-RSA 2020) Tomoki Moriya, Hiroshi Onuki, Tsuyoshi Takagi (UTokyo) ISEC2020-8 |
CSIDH is an isogeny-based key-exchange protocol, that is one of the candidates for post-quantum cryptography. It is base... [more] |
ISEC2020-8 p.31 |
HWS, ICD [detail] |
2019-11-01 14:15 |
Osaka |
DNP Namba SS Bld. |
A Design of Isogeny-Based Cryptographic Hardware Architecture Using Residue Number System Shuto Funakoshi, Rei Ueno, Naofumi Homma (Tohoku Univ.) HWS2019-60 ICD2019-21 |
In this paper, we will propose an efficient hardware architecture of isogeny-based cryptography. The proposed architectu... [more] |
HWS2019-60 ICD2019-21 pp.19-24 |
|
|
|
Copyright and reproduction :
All rights are reserved and no part of this publication may be reproduced or transmitted in any form or by any means, electronic or mechanical, including photocopy, recording, or any information storage and retrieval system, without permission in writing from the publisher. Notwithstanding, instructors are permitted to photocopy isolated articles for noncommercial classroom use without fee. (License No.: 10GA0019/12GB0052/13GB0056/17GB0034/18GB0034)
|
[Return to Top Page]
[Return to IEICE Web Page]
|