Committee |
Date Time |
Place |
Paper Title / Authors |
Abstract |
Paper # |
EID, ITE-IDY, IEIJ-SSL, SID-JC, IEE-EDD [detail] |
2018-01-26 10:10 |
Shizuoka |
Shizuoka Univ., Hamamatsu |
Prototype of transparent OLED lighting indicator Yukinobu Masuda, Shim Chang-Hoon, Ryutaro Sugawara (Kyushu Univ.), Masayuki Yahiro (ISIT), Reiji Hattori (Kyushu Univ.) |
[more] |
|
OME |
2017-12-01 14:20 |
Saga |
Sun Messe Tosu |
[Invited Talk]
Solution-processed organic-inorganic perovskite field-effect transistors with high carrier mobility Toshinori Matsushima, Atula S. D. Sandanayaka, Chuanjiang Qin (Kyushu Univ.), Takashi Fujihara (ISIT), Chihaya Adachi (Kyushu Univ.) OME2017-45 |
Organic-inorganic perovskites are extremely promising as the semiconductor in field-effect transistors because of their ... [more] |
OME2017-45 pp.49-51 |
ICSS, IPSJ-SPT |
2017-03-14 12:20 |
Nagasaki |
University of Nagasaki |
Evaluation of Host Independent and Distributed Detection System of the Network Attack by Using OpenFlow Ryosuke Miyazaki (ISIT/Kyushu Univ.), Junpei Kawamoto (), Shinichi Matsumoto (Kyushu Univ.), Kouichi Sakurai (ISIT/Kyushu Univ.) ICSS2016-69 |
In recent years, cyber attacks are in various ways, and we must detect as many kinds of attacks as possible. Therefore, ... [more] |
ICSS2016-69 pp.177-182 |
ISEC |
2016-09-02 13:25 |
Tokyo |
Kikai-Shinko-Kaikan Bldg. |
An Homomorphic Encryption based on some kind of Indeterminate Equations Koichiro Akiyama (Toshiba), Yasuhiro Goto (HUE), Shinya Okumura (ISIT), Tsuyoshi Takagi (Kyushu Univ.), Koji Nuida, Goichiro Hanaoka (AIST) ISEC2016-43 |
Authors propose a homomorphic public-key encryption whose security is based on a LWE-like problem related to indetermina... [more] |
ISEC2016-43 pp.27-34 |
EMM, ISEC, SITE, ICSS, IPSJ-CSEC, IPSJ-SPT [detail] |
2016-07-15 13:50 |
Yamaguchi |
|
On the Semi-regularity of Polynomial Systems Arising from the Section Finding Problem Shinya Okumura (ISIT), Koichiro Akiyama (Toshiba), Tsuyoshi Takagi (Kyushu Univ.) ISEC2016-34 SITE2016-28 ICSS2016-34 EMM2016-42 |
There are no known quantum algorithms, performed in polynomial time, for solving the section finding problem on algebrai... [more] |
ISEC2016-34 SITE2016-28 ICSS2016-34 EMM2016-42 pp.185-191 |
ICSS, IA |
2016-06-07 09:55 |
Saga |
Saga University |
Report on the 2016 Network and Distributed System Security Symposium Shinichi Matsumoto (ISIT), Daiki Chiba (NTT), Kuniyasu Suzaki (AIST), Mirang Park (Kanagawa Institute of Technology) IA2016-8 ICSS2016-8 |
[more] |
IA2016-8 ICSS2016-8 pp.39-44 |
IT, ISEC, WBS |
2016-03-11 11:15 |
Tokyo |
The University of Electro-Communications |
Performance Comparison of Multivariate Polynomial Encryption Schemes SRP and ABC Takanori Yasuda (ISIT), Kouichi Sakurai (Kyushu Univ.) IT2015-134 ISEC2015-93 WBS2015-117 |
Multivariate public key cryptsystem (MPKC) is one candidate for post-quantum cryptosystem. For the signature scheme Rain... [more] |
IT2015-134 ISEC2015-93 WBS2015-117 pp.205-210 |
ICSS, IPSJ-SPT |
2016-03-03 15:30 |
Kyoto |
Academic Center for Computing and Media Studies, Kyoto University |
Current Status and Issues of the Application of AI Technology for Digital Forensics Shinichi Matsumoto (ISIT), Kouichi Sakurai (Kyushu Univ.) |
[more] |
|
HCGSYMPO (2nd) |
2015-12-16 - 2015-12-18 |
Toyama |
Toyama International Conference Center |
Monitoring of dining based on mastication pattern analysis Misato Kita (Graduate School of Future Univ. Hakodate), Toshio Kawashima (Future Univ. Hakodate), Yuishi Mitsudo (ISIT) |
The meal has a close relationship with health. Therefore, the record of the meal is recorded as an important information... [more] |
|
LOIS, ISEC, SITE |
2015-11-07 10:55 |
Kanagawa |
Kanagawa Univ. |
Extension of NTRU Using Group Ring and Its Application Takanori Yasuda, Hiroaki Anada (ISIT), Kouichi Sakurai (Kyushu Univ.) ISEC2015-52 SITE2015-39 LOIS2015-46 |
[more] |
ISEC2015-52 SITE2015-39 LOIS2015-46 pp.103-109 |
WIT |
2015-10-26 09:00 |
Yamaguchi |
Kawatana Grand Hotel |
A Questionnaire Survey on ICT Environment Used by Visually Impaired Yoshihiko Kimuro, Takafumi Ienaga (FIT), Akito Teraoka (ISIT), Seiji Okimoto (Fukuoka Special Needs Education School for the Visually Impaired) WIT2015-58 |
In the information society, understanding of the basic principles of information technology is one of the common sense.... [more] |
WIT2015-58 pp.39-44 |
IPSJ-CSEC, ISEC, SITE, ICSS, EMM, IPSJ-SPT [detail] |
2015-07-02 10:15 |
Aichi |
NAGOYA TRADE & INDUSTRY CENTER |
Attribute-Based Two-Tier Signatures Hiroaki Anada (ISIT), Seiko Arita (IISEC), Kouichi Sakurai (Kyushu University) ISEC2015-9 SITE2015-7 ICSS2015-19 EMM2015-17 |
An attribute-based signature scheme is a digital signature scheme proposed in 2008 by Maji et al.,
in which a message i... [more] |
ISEC2015-9 SITE2015-7 ICSS2015-19 EMM2015-17 pp.1-8 |
IPSJ-CSEC, ISEC, SITE, ICSS, EMM, IPSJ-SPT [detail] |
2015-07-03 10:40 |
Aichi |
NAGOYA TRADE & INDUSTRY CENTER |
Report on Workshop on Cybersecurity in a Post-Quantum World Takanori Yasuda (ISIT), Tsuyoshi Takagi (Kyushu Univ.) ISEC2015-22 SITE2015-20 ICSS2015-32 EMM2015-30 |
[more] |
ISEC2015-22 SITE2015-20 ICSS2015-32 EMM2015-30 pp.135-136 |
IA, ICSS |
2015-06-11 13:05 |
Fukuoka |
Kyushu Institute of Technology Univ. |
[Invited Talk]
Recent trends in multivariate cryptography Takanori Yasuda (ISIT) IA2015-1 ICSS2015-1 |
[more] |
IA2015-1 ICSS2015-1 pp.1-2 |
IA, ICSS |
2015-06-11 16:25 |
Fukuoka |
Kyushu Institute of Technology Univ. |
Report on the 23rd USENIX Security Symposium Shinichi Matsumoto (ISIT), Kazuomi Oishi (SIST), Kuniyasu Suzaki (AIST) IA2015-8 ICSS2015-8 |
[more] |
IA2015-8 ICSS2015-8 pp.39-44 |
IA, ICSS |
2015-06-12 11:30 |
Fukuoka |
Kyushu Institute of Technology Univ. |
A Report on International Conference NDSS2015 Hiroaki Anada (ISIT), Yuhei Kawakoya (NTTi3), Kuniyasu Suzaki (AIST) IA2015-12 ICSS2015-12 |
International conference NDSS (Network and Distributed System Security Symposium) is one of the top conference of inform... [more] |
IA2015-12 ICSS2015-12 pp.63-68 |
QIT (2nd) |
2015-05-25 17:00 |
Osaka |
Osaka University |
MQ Challenge: Solving Problems for Post-Quantum Cryptography and Their Hardness Evaluation Takanori Yasuda (ISIT), Xavier Dahan (Ochanomizu Univ.), Yun-Ju Huang (ISIT), Tsuyoshi Takagi (Kyushu Univ.), Kouichi Sakurai (ISIT) |
[more] |
|
ISEC, IT, WBS |
2015-03-02 10:30 |
Fukuoka |
The University of Kitakyushu |
Accelerating QUAD Stream Cipher using Optimal Extension Field on GPU Satoshi Tanaka (ISIT/Kyushu Univ.), Chen-Mou Cheng (Kyushu Univ.), Takanori Yasuda (ISIT), Kouichi Sakurai (ISIT/Kyushu Univ.) IT2014-62 ISEC2014-75 WBS2014-54 |
Evaluating non-linear multivariate polynomial systems over finite
fields is an important subroutine for QUAD stream cip... [more] |
IT2014-62 ISEC2014-75 WBS2014-54 pp.1-4 |
ISEC, LOIS, SITE |
2014-11-21 13:25 |
Hyogo |
|
Accelerating QUAD Stream Cipher using Multi-Stream Method on Graphics Processing Unit Satoshi Tanaka (ISIT/Kyushu Univ.), Chen-Mou Cheng (Kyushu Univ.), Takanori Yasuda (ISIT), Kouichi Sakurai (ISIT/Kyushu Univ.) ISEC2014-56 SITE2014-47 LOIS2014-26 |
QUAD is a stream cipher with a provable security based on the theory of multivariate public-key cryptography. However, Q... [more] |
ISEC2014-56 SITE2014-47 LOIS2014-26 pp.1-6 |
ISEC, LOIS, SITE |
2014-11-21 13:50 |
Hyogo |
|
Extension of NTRU scheme using non-commutative groups II Takanori Yasuda, Xavier Dahan, Kouichi Sakurai (ISIT) ISEC2014-57 SITE2014-48 LOIS2014-27 |
[more] |
ISEC2014-57 SITE2014-48 LOIS2014-27 pp.7-11 |