Committee |
Date Time |
Place |
Paper Title / Authors |
Abstract |
Paper # |
VLD, HWS, ICD |
2024-02-29 11:15 |
Okinawa |
(Primary: On-site, Secondary: Online) |
Design of RISC-V SoC with Post-quantum Encryption Algorithm Acceleration Jiyuan Xin, Makoto Ikeda (UTokyo) VLD2023-110 HWS2023-70 ICD2023-99 |
The foundational elements of the Internet of Things (IoT) are increasingly intricate and robust Systems-on-Chips (SoCs) ... [more] |
VLD2023-110 HWS2023-70 ICD2023-99 pp.66-71 |
EMM, BioX, ISEC, SITE, ICSS, HWS, IPSJ-CSEC, IPSJ-SPT [detail] |
2023-07-24 18:00 |
Hokkaido |
Hokkaido Jichiro Kaikan |
A security analysis on MQ-Sign submitted to Korean Post-Quantum Cryptography standardization Yasuhiko Ikematsu (Kyushu Univ.), Hyungrok Jo (YNU), Takanori Yasuda (OUS) ISEC2023-31 SITE2023-25 BioX2023-34 HWS2023-31 ICSS2023-28 EMM2023-31 |
MQ-Sign is a variant of the UOV singature scheme proposed by Shim et al. It has been suggested as a candidate for the st... [more] |
ISEC2023-31 SITE2023-25 BioX2023-34 HWS2023-31 ICSS2023-28 EMM2023-31 pp.113-118 |
NS, NWS (Joint) |
2023-01-26 10:30 |
Yamaguchi |
Hybrid Meeting (Yamaguchi Prefecture) (Primary: On-site, Secondary: Online) |
Study on Framework for Optimal Selection of Cipher Algorithms in Wireless Communication Systems Takuya Kurihara, Kazuto Yano, Toshikazu Sakano (ATR) NS2022-150 |
Cryptographic schemes currently in use may become insecure once quantum computers are realized. Therefore, wireless syst... [more] |
NS2022-150 pp.1-6 |
NLP |
2022-08-02 09:50 |
Online |
Online |
Characteristics of degree period of commutative polynomials defined by fourth-order recurrence relations with two variables over Z2K Takuma Nishizaka, Daisaburo Yoshioka (Sojo Univ.) NLP2022-28 |
In recent years, a public-key cryptosystem based on Chebyshev polynomials over Z_{2^k} has been presented. Unfortunately... [more] |
NLP2022-28 pp.11-14 |
EMM, BioX, ISEC, SITE, ICSS, HWS, IPSJ-CSEC, IPSJ-SPT [detail] |
2022-07-19 13:00 |
Online |
Online |
Side-Channel Attacks on Post-Quantum KEMs Using Multi-class Classification Neural Network Yutaro Tanaka, Rei Ueno (Tohoku Univ.), Keita Xagawa, Akitra Ito, Junko Takahashi (NTT), Naofumi Homma (Tohoku Univ.) ISEC2022-7 SITE2022-11 BioX2022-32 HWS2022-7 ICSS2022-15 EMM2022-15 |
(To be available after the conference date) [more] |
ISEC2022-7 SITE2022-11 BioX2022-32 HWS2022-7 ICSS2022-15 EMM2022-15 pp.1-6 |
CQ, ICM, NS, NV (Joint) |
2021-11-25 17:10 |
Fukuoka |
JR Hakata Stn. Hakata EkiHigashi Rental Room (Primary: On-site, Secondary: Online) |
Access Control with Individual Key Delivery in ICN Yuma Fukagawa (Fukuoka Univ.), Noriaki Kamiyama (Ritsumeikan Univ.) CQ2021-71 |
Information-Centric Networking (ICN), which transfers Interest by the name of content without using DNS (Domain Name Sys... [more] |
CQ2021-71 pp.35-40 |
QIT (2nd) |
2020-12-10 09:00 |
Online |
Online |
[Invited Talk]
An Introduction to Provable Secure Post-Quantum Cryptography Bagus Santoso (UEC) |
Public key cryptographic schemes are essential to guarantee the security of network communication over an untrusted comm... [more] |
|
ISEC |
2020-05-20 13:10 |
Online |
Online |
[Invited Talk]
An Efficient F4-style Based Algorithm to Solve MQ Problems (from IWSEC 2019) Takuma Ito, Naoyuki shinohara (NICT), Shigenori Uchiyama (TMU) ISEC2020-5 |
We introduce “An Efficient F4-style Based Algorithm to Solve MQ Problems”we presented in IWSEC 2019. [more] |
ISEC2020-5 p.25 |
QIT (2nd) |
2019-11-18 11:50 |
Tokyo |
Gakushuin University |
On Attacking Next-Generation Public-Key Cryptography by Using LASOLV Yasuhito Kawano (NTT), Hiroshi Sekigawa (TUS) |
This paper proposes a method for attacking the LWE cryptography (lattice-based next-generation public-key cryptography) ... [more] |
|
SIP |
2019-08-29 15:10 |
Tokyo |
|
Implementation of the Elliptic Curve Cryptography over Gaussian Integral Finite Group onto Excel Kazuki Naganuma, Takashi Suzuki, Hiroyuki Tsuji, Tomoaki Kimura (KAIT) SIP2019-42 |
The Elliptic Curve Cryptography is known as cryptography safer than the RSA Cryptography. Defining the
elliptic curve o... [more] |
SIP2019-42 pp.17-22 |
ISEC |
2018-05-16 17:00 |
Tokyo |
Ookayama Campus, Tokyo Institute of Technology |
[Invited Talk]
On the Untapped Potential of Encoding Predicates by Arithmetic Circuits and Their Applications (from ASIACRYPT 2017) Shuichi Katsumata (Univ. Tokyo) ISEC2018-12 |
In this invited talk, we introduce the paper, “On the Untapped Potential of Encoding Predicates by Arithmetic Circuits a... [more] |
ISEC2018-12 p.63 |
IT |
2017-09-08 09:00 |
Yamaguchi |
Centcore Yamaguchi Hotel |
A solution of degree determination problem of Chebyshev polynomials over Z/p^kZ Daisaburo Yoshioka (Sojo Univ.) IT2017-38 |
Recently, a public key cryptosystem employing Chebyshev polynomials over a residue ring of integers has been proposed. T... [more] |
IT2017-38 pp.1-4 |
NS, IN (Joint) |
2017-03-03 15:50 |
Okinawa |
OKINAWA ZANPAMISAKI ROYAL HOTEL |
A Study on the Secure Sharing of User Authentication Private Keys among Devices Belonging to the Same Owner Hideo Nishimura, Yoshihiko Omori, Takao Yamashita, Tetsuya Iwata (NTT) IN2016-172 |
In recent authentication based on the public-key cryptography, private keys are generated and kept inside the secure are... [more] |
IN2016-172 pp.449-454 |
IT, ISEC, WBS |
2016-03-11 11:15 |
Tokyo |
The University of Electro-Communications |
Performance Comparison of Multivariate Polynomial Encryption Schemes SRP and ABC Takanori Yasuda (ISIT), Kouichi Sakurai (Kyushu Univ.) IT2015-134 ISEC2015-93 WBS2015-117 |
Multivariate public key cryptsystem (MPKC) is one candidate for post-quantum cryptosystem. For the signature scheme Rain... [more] |
IT2015-134 ISEC2015-93 WBS2015-117 pp.205-210 |
ISEC, IT, WBS |
2015-03-02 10:30 |
Fukuoka |
The University of Kitakyushu |
Accelerating QUAD Stream Cipher using Optimal Extension Field on GPU Satoshi Tanaka (ISIT/Kyushu Univ.), Chen-Mou Cheng (Kyushu Univ.), Takanori Yasuda (ISIT), Kouichi Sakurai (ISIT/Kyushu Univ.) IT2014-62 ISEC2014-75 WBS2014-54 |
Evaluating non-linear multivariate polynomial systems over finite
fields is an important subroutine for QUAD stream cip... [more] |
IT2014-62 ISEC2014-75 WBS2014-54 pp.1-4 |
ISEC, LOIS, SITE |
2014-11-21 13:25 |
Hyogo |
|
Accelerating QUAD Stream Cipher using Multi-Stream Method on Graphics Processing Unit Satoshi Tanaka (ISIT/Kyushu Univ.), Chen-Mou Cheng (Kyushu Univ.), Takanori Yasuda (ISIT), Kouichi Sakurai (ISIT/Kyushu Univ.) ISEC2014-56 SITE2014-47 LOIS2014-26 |
QUAD is a stream cipher with a provable security based on the theory of multivariate public-key cryptography. However, Q... [more] |
ISEC2014-56 SITE2014-47 LOIS2014-26 pp.1-6 |
ISEC |
2014-09-05 16:35 |
Tokyo |
Kikai-Shinko-Kaikan Bldg. |
[Invited Talk]
Dual System Encryption via Doubly Selective Security
-- A Generic Framework for Fully-Secure Predicate Encryption -- Nuttapong Attrapadung (AIST) ISEC2014-54 |
Dual system encryption techniques introduced by Waters in Crypto'09 are powerful approaches for constructing fully secur... [more] |
ISEC2014-54 p.47 |
ICSS, ISEC, SITE, EMM, IPSJ-CSEC, IPSJ-SPT [detail] |
2014-07-04 10:40 |
Hokkaido |
San-Refure Hakodate |
Cryptanalysis of a matrix variant of NTRU Takanori Yasuda (ISIT), Yuya Yamaguchi (Kyushu Univ.), Xavier Dahan, Kouichi Sakurai (ISIT) ISEC2014-33 SITE2014-28 ICSS2014-37 EMM2014-33 |
Since its introduction in 1996, the cryptosystem NTRU has become a well-established candidate for the next generation pu... [more] |
ISEC2014-33 SITE2014-28 ICSS2014-37 EMM2014-33 pp.239-246 |
ICSS, IA |
2014-06-05 16:15 |
Hyogo |
Takikawa Memorial Hall, Kobe University |
Attack on Knapsack Cryptography by Using Intermediary Plaintext Yoshihiro Kusanagi, Atsushi Nagao, Masakatu Morii (Kobe Univ.) IA2014-3 ICSS2014-3 |
Knapsack cryptography is the public key cryptosystem based on knapsack problem (especially subset sum problem).
Density... [more] |
IA2014-3 ICSS2014-3 pp.9-14 |
SIS |
2013-06-13 13:00 |
Kagoshima |
Houzan Hall (Kagoshima) |
[Tutorial Lecture]
Signal Processing in the Encrypted Domain
-- Development of a New Technique for Secure Manipulation of Signals -- Akio Miyazaki (Kyushu Sangyo Univ.) SIS2013-4 |
We have established the fundamental techniques for computing with signals that are encrypted or otherwise hidden often r... [more] |
SIS2013-4 pp.17-21 |