Committee |
Date Time |
Place |
Paper Title / Authors |
Abstract |
Paper # |
RCC, ISEC, IT, WBS |
2024-03-13 - 2024-03-14 |
Osaka |
Osaka Univ. (Suita Campus) |
Reconstruction of Boyer quantum algorithm and its application to hash puzzles Chris Idota, Yuichi Kaji (Nagoya Univ.) IT2023-132 ISEC2023-131 WBS2023-120 RCC2023-114 |
This study investigates the computational complexity of solving hash puzzles using quantum algorithms. A hash puzzle is ... [more] |
IT2023-132 ISEC2023-131 WBS2023-120 RCC2023-114 pp.358-365 |
LOIS, SITE, ISEC |
2023-11-09 13:30 |
Hiroshima |
Satellite Campus Hiroshima (Primary: On-site, Secondary: Online) |
Optimum Median-Sum Fingerprinting for Winternitz One-Time Signature Motonari Honda, Yuichi Kaji (NU) ISEC2023-57 SITE2023-51 LOIS2023-15 |
Winternitz one-time signature (OTS) plays a core role in practical quantum-secure hash-based digital signature schemes. ... [more] |
ISEC2023-57 SITE2023-51 LOIS2023-15 pp.18-25 |
WBS, IT, ISEC |
2021-03-04 15:45 |
Online |
Online |
A Real-Time Bluetooth Protocol Fuzzing System Bo Wang, Suzuki Ako (JVCKW), Yuichi Kaji (NU) IT2020-137 ISEC2020-67 WBS2020-56 |
In recent years, with the practical use and spread of Bluetooth IoT (Internet of Things) devices, there are concerns abo... [more] |
IT2020-137 ISEC2020-67 WBS2020-56 pp.152-159 |
ISEC |
2019-05-17 14:55 |
Tokyo |
Kikai-Shinko-Kaikan Bldg. |
The amount of information leakage of decryption keys through timing attacks on RSA decryption system Tomonori Hirata, Yuichi Kaji (Nagoya Univ.) ISEC2019-7 |
[more] |
ISEC2019-7 pp.29-36 |
SITE, ISEC, LOIS |
2018-11-04 15:40 |
Fukuoka |
|
An improvement on Winternitz OTS with puncturing of signing keys Yukichi Kashiwakura, Yuichi Kaji (Nagoya Univ.) ISEC2018-80 SITE2018-58 LOIS2018-40 |
A hash-based digital signature is a quantum-immune alternative of conventional digital signatures. This study improves a... [more] |
ISEC2018-80 SITE2018-58 LOIS2018-40 pp.95-102 |
EMM, ISEC, SITE, ICSS, IPSJ-CSEC, IPSJ-SPT [detail] |
2016-07-15 10:20 |
Yamaguchi |
|
Improvement of Winternitz one time signature and its security proof Yoshio Yatani, Jason Paul Cruz, Yuichi Kaji (NAIST) ISEC2016-29 SITE2016-23 ICSS2016-29 EMM2016-37 |
[more] |
ISEC2016-29 SITE2016-23 ICSS2016-29 EMM2016-37 pp.121-128 |
EMM, IT |
2015-05-22 10:00 |
Kyoto |
Kyoto International Community House |
On the Computational Complexity of Information Flow Problem with Hierarchy Constraint Yuki Takeda, Yuichi Kaji, Minoru Ito (NAIST) IT2015-11 EMM2015-11 |
An information flow problem discusses how to distribute information over a complicated network. It is known that the te... [more] |
IT2015-11 EMM2015-11 pp.57-62 |
IT |
2014-07-17 15:50 |
Hyogo |
Kobe University |
A Flash Code Utilizing Dynamic Segment Allocation Kazuki Kumagai, Yuichi Kaji (NAIST) IT2014-22 |
A novel flash code is proposed, and shown to have good average-case performance through computer simulation.
The propo... [more] |
IT2014-22 pp.59-64 |
IT |
2014-07-17 16:15 |
Hyogo |
Kobe University |
Bounds on the Entropy of Multinomial Distribution Yuichi Kaji (NAIST) IT2014-23 |
The purpose of this study is to derive an upper-bound and a lower-bound of the entropy of a multinomial distribution. In... [more] |
IT2014-23 pp.65-70 |
ICSS, ISEC, SITE, EMM, IPSJ-CSEC, IPSJ-SPT [detail] |
2014-07-03 15:45 |
Hokkaido |
San-Refure Hakodate |
Data authentication scheme suitable for broadcast in the sensor networks Akihito Sakai, Yuichi Kaji, Minoru Ito (NAIST) ISEC2014-25 SITE2014-20 ICSS2014-29 EMM2014-25 |
Data broadcasting is often utilized in a sensor network system, but the authentication of the broadcast data is not a si... [more] |
ISEC2014-25 SITE2014-20 ICSS2014-29 EMM2014-25 pp.155-162 |
ICSS, ISEC, SITE, EMM, IPSJ-CSEC, IPSJ-SPT [detail] |
2014-07-04 11:30 |
Hokkaido |
San-Refure Hakodate |
Quantitative Evaluation of the Key Information That is Learned through Timing Attack
-- The Contribution of Bucketing Technique for RSA Cryptosystem -- Yasuyuki Kobayashi, Yuichi Kaji (NAIST), Hiroyuki Seki (Nagoya Univ.), Minoru Ito (NAIST) ISEC2014-35 SITE2014-30 ICSS2014-39 EMM2014-35 |
Timing attacks are regarded as serious threats to many practical cryptographic algorithms, but it is difficult to estima... [more] |
ISEC2014-35 SITE2014-30 ICSS2014-39 EMM2014-35 pp.253-258 |
IT, ISEC, WBS |
2013-03-07 15:30 |
Osaka |
Kwansei Gakuin Univ., Osaka-Umeda Campus |
Verification of a Conjecture on Performance of Floating codes using Hamming Codes Naoyoshi Okamae, Toru Fujiwara (Osaka Univ.), Yuichi Kaji (NAIST) IT2012-80 ISEC2012-98 WBS2012-66 |
Floating codes aim to store rewritable data in irreversible memories
like flash memories, whose value can only transit ... [more] |
IT2012-80 ISEC2012-98 WBS2012-66 pp.119-124 |
IT |
2013-01-21 15:10 |
Tokyo |
Univ. of Electro-Communications |
Multi-Mode Encoding with Binary-Indexed Flash Code Michael Joseph Tan (NAIST), Proceso Fernandez, Nino Salazar, Jayzon Ty (ADMU), Yuichi Kaji (NAIST) IT2012-56 |
A new flash code is proposed in this paper. This flash code has two modes of encoding: one extending the binary-indexed ... [more] |
IT2012-56 pp.41-46 |
IT |
2012-01-20 16:00 |
Ibaraki |
University of Tsukuba |
Performance Evaluation of Index-Less Flash Codes for Non-Uniform Write Operations Yuichi Kaji (NAIST) IT2011-43 |
The performance of a flash code is often evaluated in terms of the number of possible write operations. A write operatio... [more] |
IT2011-43 pp.25-30 |
IT |
2011-01-18 10:40 |
Nara |
|
Index-Less Flash Codes with Reduced Block Size with Little Overhead Yuichi Kaji (NAIST) IT2010-54 |
An improvement of the index-less indexed flash codes (ILIFC) is
investigated. A flash code is a coding scheme for flash... [more] |
IT2010-54 pp.1-6 |
SS |
2010-12-14 17:30 |
Gunma |
Ikaho-Onsen Hotel Tenbo |
Secure User-Role Assignment in Cross-Organizational Role-Based Access Control Yuki Tomotani, Yuichi Kaji, Hiroyuki Seki (NAIST) SS2010-46 |
This paper proposes a mechanism for representing user-role assignments
of the role-based access control (RBAC) system. ... [more] |
SS2010-46 pp.43-48 |
IT |
2010-01-07 15:30 |
Overseas |
Univ. of Hawaii |
Two-dimensional barcode system with extreme density
-- some investigation on the error correcting mechanism -- Yuichi Kaji (NAIST) IT2009-56 |
A preliminary issue of the error correcting mechanism for a
two-dimensional barcode system is studied. To write down in... [more] |
IT2009-56 pp.29-34 |
SR, AN, USN (Joint) |
2009-10-22 13:40 |
Miyagi |
Tohoku Univ. |
Proposal and Evaluation of a Group Key Management Scheme for Ad-hoc Sensor Networks Jun Noda (NEC), Yuichi Kaji (Nara Inst. of Science and Tech.), Toshiyasu Nakao (NEC) USN2009-28 |
We propose a new group key management scheme for ad-hoc sensor networks. In ad-hoc sensor networks, we need an appropria... [more] |
USN2009-28 pp.1-6 |
IT |
2009-09-30 16:25 |
Tokyo |
Sophia Univ. |
On the code rate and code performance of SFA-LDPC codes Yuichi Kaji (NAIST) IT2009-46 |
This paper investigates the performance of simple full-length
array-type (SFA) LDPC codes, which are a basic subclass o... [more] |
IT2009-46 pp.79-84 |
IT |
2008-09-12 15:35 |
Okinawa |
Culture Resort Festone (Okinawa) |
On the Number of Minimum Weight Codewords of SFA-LDPC Codes Yuichi Kaji, Kenji Sugiyama (NAIST) IT2008-38 |
This paper studies the number of minimum weight codewords of SFA-LDPC codes which are certain subclasses of quasi-cyclic... [more] |
IT2008-38 pp.105-110 |