IEICE Technical Committee Submission System
Conference Schedule
Online Proceedings
[Sign in]
Tech. Rep. Archives
    [Japanese] / [English] 
( Committee/Place/Topics  ) --Press->
 
( Paper Keywords:  /  Column:Title Auth. Affi. Abst. Keyword ) --Press->

All Technical Committee Conferences  (Searched in: All Years)

Search Results: Conference Papers
 Conference Papers (Available on Advance Programs)  (Sort by: Date Descending)
 Results 1 - 17 of 17  /   
Committee Date Time Place Paper Title / Authors Abstract Paper #
EMM, BioX, ISEC, SITE, ICSS, HWS, IPSJ-CSEC, IPSJ-SPT [detail] 2022-07-19
13:00
Online Online Side-Channel Attacks on Post-Quantum KEMs Using Multi-class Classification Neural Network
Yutaro Tanaka, Rei Ueno (Tohoku Univ.), Keita Xagawa, Akitra Ito, Junko Takahashi (NTT), Naofumi Homma (Tohoku Univ.) ISEC2022-7 SITE2022-11 BioX2022-32 HWS2022-7 ICSS2022-15 EMM2022-15
(To be available after the conference date) [more] ISEC2022-7 SITE2022-11 BioX2022-32 HWS2022-7 ICSS2022-15 EMM2022-15
pp.1-6
CQ, ICM, NS, NV
(Joint)
2021-11-25
17:10
Fukuoka JR Hakata Stn. Hakata EkiHigashi Rental Room
(Primary: On-site, Secondary: Online)
Access Control with Individual Key Delivery in ICN
Yuma Fukagawa (Fukuoka Univ.), Noriaki Kamiyama (Ritsumeikan Univ.) CQ2021-71
Information-Centric Networking (ICN), which transfers Interest by the name of content without using DNS (Domain Name Sys... [more] CQ2021-71
pp.35-40
QIT
(2nd)
2019-11-18
11:50
Tokyo Gakushuin University On Attacking Next-Generation Public-Key Cryptography by Using LASOLV
Yasuhito Kawano (NTT), Hiroshi Sekigawa (TUS)
This paper proposes a method for attacking the LWE cryptography (lattice-based next-generation public-key cryptography) ... [more]
ISEC 2018-05-16
17:00
Tokyo Ookayama Campus, Tokyo Institute of Technology [Invited Talk] On the Untapped Potential of Encoding Predicates by Arithmetic Circuits and Their Applications (from ASIACRYPT 2017)
Shuichi Katsumata (Univ. Tokyo) ISEC2018-12
In this invited talk, we introduce the paper, “On the Untapped Potential of Encoding Predicates by Arithmetic Circuits a... [more] ISEC2018-12
p.63
ISEC, IT, WBS 2015-03-02
10:30
Fukuoka The University of Kitakyushu Accelerating QUAD Stream Cipher using Optimal Extension Field on GPU
Satoshi Tanaka (ISIT/Kyushu Univ.), Chen-Mou Cheng (Kyushu Univ.), Takanori Yasuda (ISIT), Kouichi Sakurai (ISIT/Kyushu Univ.) IT2014-62 ISEC2014-75 WBS2014-54
Evaluating non-linear multivariate polynomial systems over finite
fields is an important subroutine for QUAD stream cip... [more]
IT2014-62 ISEC2014-75 WBS2014-54
pp.1-4
ISEC, LOIS, SITE 2014-11-21
13:25
Hyogo   Accelerating QUAD Stream Cipher using Multi-Stream Method on Graphics Processing Unit
Satoshi Tanaka (ISIT/Kyushu Univ.), Chen-Mou Cheng (Kyushu Univ.), Takanori Yasuda (ISIT), Kouichi Sakurai (ISIT/Kyushu Univ.) ISEC2014-56 SITE2014-47 LOIS2014-26
QUAD is a stream cipher with a provable security based on the theory of multivariate public-key cryptography. However, Q... [more] ISEC2014-56 SITE2014-47 LOIS2014-26
pp.1-6
ISEC 2014-09-05
16:35
Tokyo Kikai-Shinko-Kaikan Bldg. [Invited Talk] Dual System Encryption via Doubly Selective Security -- A Generic Framework for Fully-Secure Predicate Encryption --
Nuttapong Attrapadung (AIST) ISEC2014-54
Dual system encryption techniques introduced by Waters in Crypto'09 are powerful approaches for constructing fully secur... [more] ISEC2014-54
p.47
ICSS, ISEC, SITE, EMM, IPSJ-CSEC, IPSJ-SPT [detail] 2014-07-04
10:40
Hokkaido San-Refure Hakodate Cryptanalysis of a matrix variant of NTRU
Takanori Yasuda (ISIT), Yuya Yamaguchi (Kyushu Univ.), Xavier Dahan, Kouichi Sakurai (ISIT) ISEC2014-33 SITE2014-28 ICSS2014-37 EMM2014-33
Since its introduction in 1996, the cryptosystem NTRU has become a well-established candidate for the next generation pu... [more] ISEC2014-33 SITE2014-28 ICSS2014-37 EMM2014-33
pp.239-246
ISEC 2011-12-14
16:50
Tokyo Kikai-Shinko-Kaikan Bldg. [Invited Talk] Public-Key Identification Schemes based on Multivariate Quadratic Polynomials
Koichi Sakumoto, Taizo Shirai, Harunaga Hiwatari (Sony) ISEC2011-72
A problem of solving a system of multivariate quadratic polynomials over a finite field, which is called an MQ problem, ... [more] ISEC2011-72
p.39
IBISML 2010-06-14
16:25
Tokyo Takeda Hall, Univ. Tokyo Privacy Preservation in Online Prediction
Jun Sakuma (Univ. of Tsukuba/JST), Hiromi Arai (U. Tsukuba) IBISML2010-9
In this paper, we consider online prediction from expert advice in a situation where each expert observes its own loss a... [more] IBISML2010-9
pp.49-56
WBS, IT, ISEC 2009-03-09
13:10
Hokkaido Hakodate Mirai Univ. [Invited Talk] Advances in Public-Key Cryptography (RSA, ECC, IBE)
Tsuyoshi Takagi (Future Univ. Hakodate.) IT2008-50 ISEC2008-108 WBS2008-63
We give a brief overview on the development of public-key cryptography starting with RSA cryptosystem. The most frequent... [more] IT2008-50 ISEC2008-108 WBS2008-63
pp.47-48
MSS 2009-01-29
13:25
Kanagawa Kanagawa Industrial Promotion Center A Method of Petri Nets and Calculating the Elementary T-invariants for Public-key Cryptography MEPKC
Ryo Yamaguchi, Qi-Wei Ge, Mitsuru Nakata (Yamaguchi Univ.) CST2008-42
This paper aims at automatically generating Petri nets that are used as key generator of public-key cryptography MEPKC. ... [more] CST2008-42
pp.5-10
MSS 2008-01-29
10:20
Tokushima The University of Tokushima A Method of Generating and Complicating Petri Nets Used as Key-generator of a public-key cryptgraphy MEPKC
Ryosuke Murakami, Ryo Yamaguchi, Qi-Wei Ge, Mitsuru Nakata (Yamaguchi Univ) CST2007-48
This paper aims at automatically generating Petri nets that
are used as key generator of a public-key cryptography MEP... [more]
CST2007-48
pp.11-16
MSS 2007-06-29
10:15
Okinawa   An algorithm to enumerate all the elementary T-invariants of auto-generated Petri nets
Ryo Yamaguchi, Ryosuke Murakami, Mitsuru Nakata, Qi-Wei Ge (Yamaguchi Univ.) CST2007-9
In this paper, we propose an algorithm to enumerate all the elementary
T-invariants of auto-generated Petri nets that ... [more]
CST2007-9
pp.15-20
CAS, SIP, VLD 2007-06-22
13:00
Hokkaido Hokkaido Tokai Univ. (Sapporo) Scalable Dual-Radix Unified Montgomery Multiplier in GF(p) and GF(2n)
Kazuyuki Tanimura, Ryuta Nara, Shunitsu Kohara, Youhua Shi, Nozomu Togawa, Masao Yanagisawa, Tatsuo Ohtsuki (Waseda Univ.) CAS2007-26 VLD2007-42 SIP2007-56
Modular multiplication is the dominant arithmetic operation in elliptic curve cryptography (ECC), which is one of public... [more] CAS2007-26 VLD2007-42 SIP2007-56
pp.43-48
WBS, IT, ISEC 2006-03-16
13:15
Aichi Nagoya Univ. [Invited Talk] Acceleration of arithmetic in Galois fields by hardware support
Naofumi Takagi (Nagoya Univ.)
In encryption and decryption of public-key cryptographies, such as elliptic curve cryptography (ECC), computation of ari... [more] IT2005-72 ISEC2005-129 WBS2005-86
p.49
COMP 2005-09-15
13:20
Osaka Osaka Univ., Toyonaka Campus [Tutorial Lecture] NA
Akinori Kawachi (Tokyo Tech.)
Applications of quantum information processing to cryptography has played a central role in the quantum information scie... [more]
 Results 1 - 17 of 17  /   
Choose a download format for default settings. [NEW !!]
Text format pLaTeX format CSV format BibTeX format
Copyright and reproduction : All rights are reserved and no part of this publication may be reproduced or transmitted in any form or by any means, electronic or mechanical, including photocopy, recording, or any information storage and retrieval system, without permission in writing from the publisher. Notwithstanding, instructors are permitted to photocopy isolated articles for noncommercial classroom use without fee. (License No.: 10GA0019/12GB0052/13GB0056/17GB0034/18GB0034)


[Return to Top Page]

[Return to IEICE Web Page]


The Institute of Electronics, Information and Communication Engineers (IEICE), Japan