IEICE Technical Committee Submission System
Conference Schedule
Online Proceedings
[Sign in]
Tech. Rep. Archives
    [Japanese] / [English] 
( Committee/Place/Topics  ) --Press->
 
( Paper Keywords:  /  Column:Title Auth. Affi. Abst. Keyword ) --Press->

All Technical Committee Conferences  (Searched in: All Years)

Search Results: Conference Papers
 Conference Papers (Available on Advance Programs)  (Sort by: Date Descending)
 Results 1 - 20 of 36  /  [Next]  
Committee Date Time Place Paper Title / Authors Abstract Paper #
VLD, HWS, ICD 2024-02-29
11:15
Okinawa
(Primary: On-site, Secondary: Online)
Design of RISC-V SoC with Post-quantum Encryption Algorithm Acceleration
Jiyuan Xin, Makoto Ikeda (UTokyo) VLD2023-110 HWS2023-70 ICD2023-99
The foundational elements of the Internet of Things (IoT) are increasingly intricate and robust Systems-on-Chips (SoCs) ... [more] VLD2023-110 HWS2023-70 ICD2023-99
pp.66-71
EMM, BioX, ISEC, SITE, ICSS, HWS, IPSJ-CSEC, IPSJ-SPT [detail] 2023-07-24
18:00
Hokkaido Hokkaido Jichiro Kaikan A security analysis on MQ-Sign submitted to Korean Post-Quantum Cryptography standardization
Yasuhiko Ikematsu (Kyushu Univ.), Hyungrok Jo (YNU), Takanori Yasuda (OUS) ISEC2023-31 SITE2023-25 BioX2023-34 HWS2023-31 ICSS2023-28 EMM2023-31
MQ-Sign is a variant of the UOV singature scheme proposed by Shim et al. It has been suggested as a candidate for the st... [more] ISEC2023-31 SITE2023-25 BioX2023-34 HWS2023-31 ICSS2023-28 EMM2023-31
pp.113-118
NS, NWS
(Joint)
2023-01-26
10:30
Yamaguchi Hybrid Meeting (Yamaguchi Prefecture)
(Primary: On-site, Secondary: Online)
Study on Framework for Optimal Selection of Cipher Algorithms in Wireless Communication Systems
Takuya Kurihara, Kazuto Yano, Toshikazu Sakano (ATR) NS2022-150
Cryptographic schemes currently in use may become insecure once quantum computers are realized. Therefore, wireless syst... [more] NS2022-150
pp.1-6
NLP 2022-08-02
09:50
Online Online Characteristics of degree period of commutative polynomials defined by fourth-order recurrence relations with two variables over Z2K
Takuma Nishizaka, Daisaburo Yoshioka (Sojo Univ.) NLP2022-28
In recent years, a public-key cryptosystem based on Chebyshev polynomials over Z_{2^k} has been presented. Unfortunately... [more] NLP2022-28
pp.11-14
EMM, BioX, ISEC, SITE, ICSS, HWS, IPSJ-CSEC, IPSJ-SPT [detail] 2022-07-19
13:00
Online Online Side-Channel Attacks on Post-Quantum KEMs Using Multi-class Classification Neural Network
Yutaro Tanaka, Rei Ueno (Tohoku Univ.), Keita Xagawa, Akitra Ito, Junko Takahashi (NTT), Naofumi Homma (Tohoku Univ.) ISEC2022-7 SITE2022-11 BioX2022-32 HWS2022-7 ICSS2022-15 EMM2022-15
(To be available after the conference date) [more] ISEC2022-7 SITE2022-11 BioX2022-32 HWS2022-7 ICSS2022-15 EMM2022-15
pp.1-6
CQ, ICM, NS, NV
(Joint)
2021-11-25
17:10
Fukuoka JR Hakata Stn. Hakata EkiHigashi Rental Room
(Primary: On-site, Secondary: Online)
Access Control with Individual Key Delivery in ICN
Yuma Fukagawa (Fukuoka Univ.), Noriaki Kamiyama (Ritsumeikan Univ.) CQ2021-71
Information-Centric Networking (ICN), which transfers Interest by the name of content without using DNS (Domain Name Sys... [more] CQ2021-71
pp.35-40
QIT
(2nd)
2020-12-10
09:00
Online Online [Invited Talk] An Introduction to Provable Secure Post-Quantum Cryptography
Bagus Santoso (UEC)
Public key cryptographic schemes are essential to guarantee the security of network communication over an untrusted comm... [more]
ISEC 2020-05-20
13:10
Online Online [Invited Talk] An Efficient F4-style Based Algorithm to Solve MQ Problems (from IWSEC 2019)
Takuma Ito, Naoyuki shinohara (NICT), Shigenori Uchiyama (TMU) ISEC2020-5
We introduce “An Efficient F4-style Based Algorithm to Solve MQ Problems”we presented in IWSEC 2019. [more] ISEC2020-5
p.25
QIT
(2nd)
2019-11-18
11:50
Tokyo Gakushuin University On Attacking Next-Generation Public-Key Cryptography by Using LASOLV
Yasuhito Kawano (NTT), Hiroshi Sekigawa (TUS)
This paper proposes a method for attacking the LWE cryptography (lattice-based next-generation public-key cryptography) ... [more]
SIP 2019-08-29
15:10
Tokyo   Implementation of the Elliptic Curve Cryptography over Gaussian Integral Finite Group onto Excel
Kazuki Naganuma, Takashi Suzuki, Hiroyuki Tsuji, Tomoaki Kimura (KAIT) SIP2019-42
The Elliptic Curve Cryptography is known as cryptography safer than the RSA Cryptography. Defining the
elliptic curve o... [more]
SIP2019-42
pp.17-22
ISEC 2018-05-16
17:00
Tokyo Ookayama Campus, Tokyo Institute of Technology [Invited Talk] On the Untapped Potential of Encoding Predicates by Arithmetic Circuits and Their Applications (from ASIACRYPT 2017)
Shuichi Katsumata (Univ. Tokyo) ISEC2018-12
In this invited talk, we introduce the paper, “On the Untapped Potential of Encoding Predicates by Arithmetic Circuits a... [more] ISEC2018-12
p.63
IT 2017-09-08
09:00
Yamaguchi Centcore Yamaguchi Hotel A solution of degree determination problem of Chebyshev polynomials over Z/p^kZ
Daisaburo Yoshioka (Sojo Univ.) IT2017-38
Recently, a public key cryptosystem employing Chebyshev polynomials over a residue ring of integers has been proposed. T... [more] IT2017-38
pp.1-4
NS, IN
(Joint)
2017-03-03
15:50
Okinawa OKINAWA ZANPAMISAKI ROYAL HOTEL A Study on the Secure Sharing of User Authentication Private Keys among Devices Belonging to the Same Owner
Hideo Nishimura, Yoshihiko Omori, Takao Yamashita, Tetsuya Iwata (NTT) IN2016-172
In recent authentication based on the public-key cryptography, private keys are generated and kept inside the secure are... [more] IN2016-172
pp.449-454
IT, ISEC, WBS 2016-03-11
11:15
Tokyo The University of Electro-Communications Performance Comparison of Multivariate Polynomial Encryption Schemes SRP and ABC
Takanori Yasuda (ISIT), Kouichi Sakurai (Kyushu Univ.) IT2015-134 ISEC2015-93 WBS2015-117
Multivariate public key cryptsystem (MPKC) is one candidate for post-quantum cryptosystem. For the signature scheme Rain... [more] IT2015-134 ISEC2015-93 WBS2015-117
pp.205-210
ISEC, IT, WBS 2015-03-02
10:30
Fukuoka The University of Kitakyushu Accelerating QUAD Stream Cipher using Optimal Extension Field on GPU
Satoshi Tanaka (ISIT/Kyushu Univ.), Chen-Mou Cheng (Kyushu Univ.), Takanori Yasuda (ISIT), Kouichi Sakurai (ISIT/Kyushu Univ.) IT2014-62 ISEC2014-75 WBS2014-54
Evaluating non-linear multivariate polynomial systems over finite
fields is an important subroutine for QUAD stream cip... [more]
IT2014-62 ISEC2014-75 WBS2014-54
pp.1-4
ISEC, LOIS, SITE 2014-11-21
13:25
Hyogo   Accelerating QUAD Stream Cipher using Multi-Stream Method on Graphics Processing Unit
Satoshi Tanaka (ISIT/Kyushu Univ.), Chen-Mou Cheng (Kyushu Univ.), Takanori Yasuda (ISIT), Kouichi Sakurai (ISIT/Kyushu Univ.) ISEC2014-56 SITE2014-47 LOIS2014-26
QUAD is a stream cipher with a provable security based on the theory of multivariate public-key cryptography. However, Q... [more] ISEC2014-56 SITE2014-47 LOIS2014-26
pp.1-6
ISEC 2014-09-05
16:35
Tokyo Kikai-Shinko-Kaikan Bldg. [Invited Talk] Dual System Encryption via Doubly Selective Security -- A Generic Framework for Fully-Secure Predicate Encryption --
Nuttapong Attrapadung (AIST) ISEC2014-54
Dual system encryption techniques introduced by Waters in Crypto'09 are powerful approaches for constructing fully secur... [more] ISEC2014-54
p.47
ICSS, ISEC, SITE, EMM, IPSJ-CSEC, IPSJ-SPT [detail] 2014-07-04
10:40
Hokkaido San-Refure Hakodate Cryptanalysis of a matrix variant of NTRU
Takanori Yasuda (ISIT), Yuya Yamaguchi (Kyushu Univ.), Xavier Dahan, Kouichi Sakurai (ISIT) ISEC2014-33 SITE2014-28 ICSS2014-37 EMM2014-33
Since its introduction in 1996, the cryptosystem NTRU has become a well-established candidate for the next generation pu... [more] ISEC2014-33 SITE2014-28 ICSS2014-37 EMM2014-33
pp.239-246
ICSS, IA 2014-06-05
16:15
Hyogo Takikawa Memorial Hall, Kobe University Attack on Knapsack Cryptography by Using Intermediary Plaintext
Yoshihiro Kusanagi, Atsushi Nagao, Masakatu Morii (Kobe Univ.) IA2014-3 ICSS2014-3
Knapsack cryptography is the public key cryptosystem based on knapsack problem (especially subset sum problem).
Density... [more]
IA2014-3 ICSS2014-3
pp.9-14
SIS 2013-06-13
13:00
Kagoshima Houzan Hall (Kagoshima) [Tutorial Lecture] Signal Processing in the Encrypted Domain -- Development of a New Technique for Secure Manipulation of Signals --
Akio Miyazaki (Kyushu Sangyo Univ.) SIS2013-4
We have established the fundamental techniques for computing with signals that are encrypted or otherwise hidden often r... [more] SIS2013-4
pp.17-21
 Results 1 - 20 of 36  /  [Next]  
Choose a download format for default settings. [NEW !!]
Text format pLaTeX format CSV format BibTeX format
Copyright and reproduction : All rights are reserved and no part of this publication may be reproduced or transmitted in any form or by any means, electronic or mechanical, including photocopy, recording, or any information storage and retrieval system, without permission in writing from the publisher. Notwithstanding, instructors are permitted to photocopy isolated articles for noncommercial classroom use without fee. (License No.: 10GA0019/12GB0052/13GB0056/17GB0034/18GB0034)


[Return to Top Page]

[Return to IEICE Web Page]


The Institute of Electronics, Information and Communication Engineers (IEICE), Japan