Committee |
Date Time |
Place |
Paper Title / Authors |
Abstract |
Paper # |
ISEC |
2020-05-20 12:50 |
Online |
Online |
[Invited Talk]
Efficient Private PEZ Protocols for Symmetric Functions (from TCC 2019) Yoshiki Abe, Mitsugu Iwamoto (UEC), Kazuo Ohta (UEC/AIST) ISEC2020-4 |
[more] |
ISEC2020-4 p.23 |
IT, ISEC, WBS |
2019-03-08 14:45 |
Tokyo |
University of Electro-Communications |
A Private PEZ Protocol of 4-Input Majority Vote with 29 PEZ Candies Yoshiki Abe, Shota Yamamoto, Mitsugu Iwamoto, Kazuo Ohta (UEC) IT2018-111 ISEC2018-117 WBS2018-112 |
Secure multi-party computation can be implemented by
using a (big) PEZ dispenser,
which is called as a ¥textit{priva... [more] |
IT2018-111 ISEC2018-117 WBS2018-112 pp.223-228 |
IT, ISEC, WBS |
2019-03-08 16:45 |
Tokyo |
University of Electro-Communications |
[Invited Talk]
Exceptional Experiences of my Research Activities on Modern Cryptography Kazuo Ohta (UEC) IT2018-115 ISEC2018-121 WBS2018-116 |
As a fellow receiving a prize commemorative lecture, I look back on 36-year research and education experiences on modern... [more] |
IT2018-115 ISEC2018-121 WBS2018-116 p.249 |
HWS, ISEC, SITE, ICSS, EMM, IPSJ-CSEC, IPSJ-SPT [detail] |
2018-07-25 09:55 |
Hokkaido |
Sapporo Convention Center |
Truly Efficient Robust Secret Sharing for the Real World Yohei Watanabe (UEC), Kazuma Ohara (UEC/NEC), Mitsugu Iwamoto, Kazuo Ohta (UEC) ISEC2018-13 SITE2018-5 HWS2018-10 ICSS2018-16 EMM2018-12 |
Robust secret sharing is secret sharing with the following robustness property: An original message can be recovered eve... [more] |
ISEC2018-13 SITE2018-5 HWS2018-10 ICSS2018-16 EMM2018-12 pp.1-8 |
SITE, EMM, ISEC, ICSS, IPSJ-CSEC, IPSJ-SPT [detail] |
2017-07-14 16:35 |
Tokyo |
|
PUF based Device Authentication without Error Correction Yuichi Komano (Toshiba), Mitsugu Iwamoto, Kazuo Ohta (UEC) ISEC2017-24 SITE2017-16 ICSS2017-23 EMM2017-27 |
[more] |
ISEC2017-24 SITE2017-16 ICSS2017-23 EMM2017-27 pp.123-130 |
ISEC, WBS, IT |
2017-03-10 14:10 |
Tokyo |
TOKAI University |
A Note on Acceptable Information Leakage of Searchable Symmetric Encryption Takeshi Nakai, Takuya Nojima, Mitsugu Iwamoto, Kazuo Ohta (UEC) IT2016-128 ISEC2016-118 WBS2016-104 |
(To be available after the conference date) [more] |
IT2016-128 ISEC2016-118 WBS2016-104 pp.187-193 |
EMM, IT |
2015-05-22 13:40 |
Kyoto |
Kyoto International Community House |
An Audio Secret Sharing Scheme Easy to Reproduce Secret Physically Yuuki Tokushige, Yuto Misawa, Fumiaki Yoshida, Masaya Uwatoko, Mitsugu Iwamoto, Kazuo Ohta (UEC) IT2015-14 EMM2015-14 |
An audio secret sharing scheme is a variant of secret sharing schemes in which a secret and shares are acoustic informat... [more] |
IT2015-14 EMM2015-14 pp.75-80 |
EMM, ISEC, SITE, ICSS, IPSJ-CSEC, IPSJ-SPT [detail] |
2013-07-19 15:40 |
Hokkaido |
|
On Side-Channel Information Using Signal Toggles in AES Circuit Arisa Matsubara, Yunfeng Kuai, Yang Li, Toshiki Nakasone, Kazuo Ohta, Kazuo Sakiyama (UEC) ISEC2013-45 SITE2013-40 ICSS2013-50 EMM2013-47 |
[more] |
ISEC2013-45 SITE2013-40 ICSS2013-50 EMM2013-47 pp.331-338 |
ISEC |
2011-12-14 13:40 |
Tokyo |
Kikai-Shinko-Kaikan Bldg. |
[Invited Talk]
Break Masked AES Implementations Using Fault Sensitivity and Faulty Ciphertext
-- Review of Presentation at CHES2011 -- Yang Li, Kazuo Ohta, Kazuo Sakiyama (Univ. of Electro-Comm.) ISEC2011-66 |
[more] |
ISEC2011-66 p.25 |
ISEC |
2011-12-14 14:40 |
Tokyo |
Kikai-Shinko-Kaikan Bldg. |
[Invited Talk]
Uniquness Enhancement of PUF Responces Based on the Locations of Random Outputting RS Latches Dai Yamamoto (Fujitsu Lab.), Kazuo Sakiyama, Mitsugu Iwamoto, Kazuo Ohta (Univ. of Electro-Comm.), Takao Ochiai, Masahiko Takenaka, Kouichi Itoh (Fujitsu Lab.) ISEC2011-68 |
Physical Unclonable Functions (PUFs) are expected to represent an important solution for secure ID generation and authen... [more] |
ISEC2011-68 p.29 |
ISEC, LOIS |
2011-11-15 09:25 |
Osaka |
Osaka Electro-Communication University |
Fault Sensitivity Analysis Against Elliptic Curve Cryptosystems Using Clockwise Collisions Hikaru Sakamoto, Yang Li, Kazuo Ohta, Kazuo Sakiyama (Univ. of Electro-Comm.) ISEC2011-49 LOIS2011-43 |
In this paper, we propose a new fault analysis attack technique using Clockwise Collision. Generally, for the combinatio... [more] |
ISEC2011-49 LOIS2011-43 pp.101-108 |
IT |
2011-05-20 14:20 |
Osaka |
Osaka City University |
Relations among Information Theoretically and Computationally Secure Symmetric Key Encryptions Mitsugu Iwamoto, Kazuo Ohta (Univ. of Electro-Comm.) IT2011-5 |
[more] |
IT2011-5 pp.25-30 |
ISEC, IT, WBS |
2011-03-03 10:00 |
Osaka |
Osaka University |
Efficient Searchable Encryption Schemes Against Frequency Analysis Takashi Ito, Mitsuhiro Hattori, Nori Matsuda (Mitsubishi Electric Corp.), Yusuke Sakai, Kazuo Ohta (Univ. of Electro-Communications) IT2010-68 ISEC2010-72 WBS2010-47 |
Searchable encryption is a scheme that enables keyword search over encrypted data without revealing private information ... [more] |
IT2010-68 ISEC2010-72 WBS2010-47 pp.1-6 |
ISEC, IT, WBS |
2011-03-04 09:25 |
Osaka |
Osaka University |
New Differential Fault Analysis on Trivium Based on Setup-Time Violations Qi Li, Shigeto Gomisawa, Mitsugu Iwamoto, Kazuo Ohta, Kazuo Sakiyama (Univ. of Electro-Comm) IT2010-118 ISEC2010-122 WBS2010-97 |
This paper presents new differential fault analysis (DFA) on a stream cipher Trivium based on setup–time violation... [more] |
IT2010-118 ISEC2010-122 WBS2010-97 pp.333-339 |
ISEC |
2010-09-10 16:35 |
Tokyo |
Kikai-Shinko-Kaikan Bldg. |
A general construction method of visual secret sharing scheme with share rotations Mitsugu Iwamoto, Yang Li, Kazuo Sakiyama, Kazuo Ohta (Univ. of Electro-Comm.) ISEC2010-49 |
In this paper, we discuss a visual secret sharing scheme with multiple secret images including share rotation operations... [more] |
ISEC2010-49 pp.67-74 |
ISEC, IPSJ-CSEC, SITE, ICSS [detail] |
2010-07-02 09:50 |
Aomori |
Hirosaki University |
Consideration on the Luby-Rackoff Cipher based on Physically Unclonable Functions Yutaka Kawai (Univ. of Tokyo), Yuichi Komano (Tohisiba), Kazuo Ohta (Univ. of Electro-Comm.) ISEC2010-25 SITE2010-21 ICSS2010-31 |
[more] |
ISEC2010-25 SITE2010-21 ICSS2010-31 pp.119-122 |
IT, ISEC, WBS |
2010-03-04 13:25 |
Nagano |
Nagano-Engineering Campus, Shinshu University |
[Invited Talk]
Indifferentiability Theory and SHA-3 Project
-- Recent Status of Theoretical and Practical Researches on Hash Functions -- Kazuo Ohta, Lei Wang, Kazuo Sakiyama (Univ. of Electro-Comm.) IT2009-96 ISEC2009-104 WBS2009-75 |
The indifferentiability is an important concept in order to discuss the
provable security of hash functions. NIST (Nati... [more] |
IT2009-96 ISEC2009-104 WBS2009-75 pp.159-166 |
ISEC, IPSJ-CSEC, SITE, ICSS [detail] |
2009-07-03 09:55 |
Akita |
Akita University |
How to Construct Cryptosystems and Hash Functions in Weakened Random Oracle Models Yusuke Naito (Mitsubishi Electric), Lei Wang, Kazuo Ohta (Univ. of Electro-Comm.) ISEC2009-26 SITE2009-18 ICSS2009-40 |
[more] |
ISEC2009-26 SITE2009-18 ICSS2009-40 pp.131-138 |
ISEC, IPSJ-CSEC, SITE, ICSS [detail] |
2009-07-03 11:35 |
Akita |
Akita University |
Improving Efficiency of an 'On the Fly' Identification Scheme by Perfecting Zero-Knowledgeness Bagus Santoso (AIST), Kazuo Ohta, Kazuo Sakiyama (Univ. of Electro-Comm.), Goichiro Hanaoka (AIST) ISEC2009-30 SITE2009-22 ICSS2009-44 |
In this paper, we present a new methodology for constructing
an efficient identification scheme, and based on it,
we... [more] |
ISEC2009-30 SITE2009-22 ICSS2009-44 pp.161-168 |
ISEC |
2009-05-22 11:35 |
Tokyo |
Kikai-Shinko-Kaikan Bldg. |
A Novel Construction Method for Visual Secret Sharing Schemes Allowing Rotation of Shares Yang Li, Mitsugu Iwamoto, Kazuo Ohta, Kazuo Sakiyama (Univ. of Electro-Comm.) ISEC2009-5 |
In 2006, Iwamoto et al. introduced a visual secret sharing (VSS) schemes that allows rotation operation for shares in de... [more] |
ISEC2009-5 pp.29-36 |