IEICE Technical Committee Submission System
Conference Schedule
Online Proceedings
[Sign in]
Tech. Rep. Archives
    [Japanese] / [English] 
( Committee/Place/Topics  ) --Press->
 
( Paper Keywords:  /  Column:Title Auth. Affi. Abst. Keyword ) --Press->

All Technical Committee Conferences  (Searched in: All Years)

Search Results: Conference Papers
 Conference Papers (Available on Advance Programs)  (Sort by: Date Descending)
 Results 1 - 20 of 24  /  [Next]  
Committee Date Time Place Paper Title / Authors Abstract Paper #
RCC, ISEC, IT, WBS 2023-03-14
09:00
Yamaguchi
(Primary: On-site, Secondary: Online)
Proposal of operation oplus on positive rational numbers compatible with the 2nd-Me scalar multiplication -- Similar construction of an elliptic curve signature by the 2nd-Me scalar multiplication --
Masaaki Shirase (FUN) IT2022-72 ISEC2022-51 WBS2022-69 RCC2022-69
The 2nd-Me scalar multiple $P_{n,Z}^{II}$ can be defined
for points $P,Z in E(F_p)$ of an elliptic curve over a finite... [more]
IT2022-72 ISEC2022-51 WBS2022-69 RCC2022-69
pp.25-32
ISEC, SITE, LOIS 2022-11-18
17:20
Online Online Security Proof and Parameters for a Lattice-based Fuzzy Signature Scheme
Yuichi Hasegawa, Shingo Sato, Junji Shikata (Yokohama National Univ.) ISEC2022-45 SITE2022-49 LOIS2022-29
Recently, password-based authentication is often used for entity authentication of systems. However, because recently cy... [more] ISEC2022-45 SITE2022-49 LOIS2022-29
pp.92-99
IT, ISEC, RCC, WBS 2022-03-10
10:30
Online Online Threshold Signature Scheme Suitable for a Short Message
Takuya Inomoto (Osaka Univ.), Atsuko Miyaji (Osaka Univ./JAIST) IT2021-90 ISEC2021-55 WBS2021-58 RCC2021-65
A threshold signature is a digital signature that is used for information generated by multiple people. In threshold sig... [more] IT2021-90 ISEC2021-55 WBS2021-58 RCC2021-65
pp.42-49
WBS, IT, ISEC 2021-03-05
10:55
Online Online Digital Signatures with Wildcards
Tomoki Miyazawa, Junji Shikata (Yokohama National Univ.) IT2020-147 ISEC2020-77 WBS2020-66
Recently, many IoT devices have been used, and the number of IoT devices will increase in near future. In such era, it w... [more] IT2020-147 ISEC2020-77 WBS2020-66
pp.213-218
HWS, VLD [detail] 2021-03-04
14:15
Online Online Experiments of Data Authenticity Verification in Multi-Node IoT Systems Using Elliptic Curve Digital Signature Chips
Yuya Takahashi, Takuya Matsumaru, Kazuki Monta (Kobe Univ.), Toshihiro Sato, Takaaki Okidono (ECSEC Lab), Takuji Miki, Noriyuki Miura, Makoto Nagata (Kobe Univ.) VLD2020-85 HWS2020-60
Practicality of IoT systems requires the efficiency and speed of crypto processing in edge nodes and remote servers. So ... [more] VLD2020-85 HWS2020-60
pp.97-101
VLD, DC, CPSY, RECONF, ICD, IE, IPSJ-SLDM, IPSJ-EMB, IPSJ-ARC
(Joint) [detail]
2019-11-15
10:05
Ehime Ehime Prefecture Gender Equality Center Evaluation of operating performance of ECDSA hardware module
Yuya Takahashi, Monta kazuki (Kobe Univ.), Toshihiro Sato, Takaaki Okidono (ECSEC Lab), Takuji Miki, Noriyuki Miura, Makoto Nagata (Kobe Univ.) ICD2019-35 IE2019-41
There are limits to how much IoT power and encryption speed can be improved at the software level. Therefore, it is nece... [more] ICD2019-35 IE2019-41
pp.37-40
HWS, VLD 2019-03-02
10:25
Okinawa Okinawa Ken Seinen Kaikan ASIC Chip Implementation and Evaluation of Elliptic Curve Digital Signature Algorithm
Sosuke Sato, Hiroki Yoshida, Kazuki Monta (Kobe Univ.), Takaaki Okidono (ECSEC), Takuji Miki, Noriyuki Miura, Makoto Nagata (Kobe Univ.) VLD2018-138 HWS2018-101
We have designed and fabricated application specific semiconductor integrated circuit (ASIC) chips that embody the gener... [more] VLD2018-138 HWS2018-101
pp.267-269
ISEC 2018-05-16
10:00
Tokyo Ookayama Campus, Tokyo Institute of Technology Hardness of Discrete Logarithm Problem Based on New Operation on Elliptic Curve over Finite Field and New Digital Signature
Masaaki Shirase (FUN) ISEC2018-1
In the previous works, a new operation on elliptic curve over finite field $E(Fp)$, the Me operation $oplus$, is defined... [more] ISEC2018-1
pp.1-8
IT, ISEC, WBS 2016-03-11
10:00
Tokyo The University of Electro-Communications Reconsideration of Fail-Stop Signature Schemes and Their UC-Security
Masahiro Nomura (Ex-Chiba Univ.), Katsuhiro Nakamura (Chiba Univ.) IT2015-131 ISEC2015-90 WBS2015-114
Fail-Stop Signature (FSS) schemes [1],[2] are signature schemes which satisfy unforgeability even against a forger with ... [more] IT2015-131 ISEC2015-90 WBS2015-114
pp.181-188
ISEC 2014-09-05
14:10
Tokyo Kikai-Shinko-Kaikan Bldg. Fail-Stop Signature Scheme with TTP and Its UC-Security
Masahiro Nomura, Katsuhiro Nakamura (Chiba Univ.) ISEC2014-49
As security requirements of fail-stop signature (FSS) schemes, non-repudiability and unforgeability are required. In thi... [more] ISEC2014-49
pp.13-20
ISEC, IT, WBS 2014-03-11
11:00
Aichi Nagoya Univ., Higashiyama Campus A Note on Indistinguishability of Fail-Stop Signature Schemes
Masahiro Nomura, Katsuhiro Nakamura (Chiba Univ.) IT2013-79 ISEC2013-108 WBS2013-68
Fail-Stop signature (FSS) schemes are digital signature schemes in which there are many signatures that pass the signatu... [more] IT2013-79 ISEC2013-108 WBS2013-68
pp.155-161
EMM 2014-03-07
15:00
Ishikawa JAIST [Poster Presentation] Compatible 2d-code having tamper detection system with QR-code
Takayuki Ishihara, Michiharu Niimi, Hideki Noda (Kyushu Inst. of Tech.) EMM2013-106
The matrix barcodes known as Quick Response
(QR) codes, which are enable us to import printed digital information
int... [more]
EMM2013-106
pp.39-44
ISEC 2013-05-23
14:10
Tokyo Kikai-Shinko-Kaikan Bldg. Car2Cloud Communication Enhanced by In-Vehicle Implicit Asking
Tsutomu Matsumoto, Hikotaro Suzuki, Katsunari Yoshioka (Yokohama National Univ.), Yosuke Maekawa, Hisashi Oguma (TOYOTA InfoTechnology Center) ISEC2013-4
When implementing advanced automotive services in cooperation with external data centers, it is very important to ensure... [more] ISEC2013-4
pp.23-28
EMM 2013-03-07
13:30
Kyoto   Information hiding for QR-code using Wet Paper Code
Michiharu Niimi, Hideki Noda (Kyushu Inst. of Tech.) EMM2012-107
The matrix barcodes known as Quick Response
(QR) codes, which are enable us to import printed digital information
int... [more]
EMM2012-107
pp.1-6
IT, ISEC, WBS 2013-03-07
10:55
Osaka Kwansei Gakuin Univ., Osaka-Umeda Campus Consideration on Security Requirements of Fail-stop Signature Schemes
Masahiro Nomura, Katsuhiro Nakamura (Chiba Univ.) IT2012-67 ISEC2012-85 WBS2012-53
A fail-stop signature (FSS) scheme is a digital signature scheme with forgery-proof function, in which even if an advers... [more] IT2012-67 ISEC2012-85 WBS2012-53
pp.31-38
ISEC, IT, WBS 2011-03-03
11:15
Osaka Osaka University A Study on Forward Secure Leakage Resilient Signature Schemes
Kentaro Moto, Daisuke Moriyama, Hiroshi Doi (IISEC) IT2010-71 ISEC2010-75 WBS2010-50
Recently there are a lot of secure digital signature schemes proved by a security notion. The standard security notion f... [more] IT2010-71 ISEC2010-75 WBS2010-50
pp.23-30
IT, ISEC, WBS 2010-03-04
11:40
Nagano Nagano-Engineering Campus, Shinshu University Construction of secure Group Identification based on Digital Signature
Keisuke Saito, Taiichi Saito (Tokyo Denki Univ.) IT2009-77 ISEC2009-85 WBS2009-56
A conversion from a digital signature scheme to an ID-based identification scheme proposed by Kurosawa and Heng.
And th... [more]
IT2009-77 ISEC2009-85 WBS2009-56
pp.39-43
CAS, NLP 2009-09-24
10:30
Hiroshima Hiroshima Univ. Higashi Senda Campus Correlation-Based Image Watermarking Based on Smoothing
Hideaki Kadota, Masayoshi Nakamoto, Shuichi Ohno (Hiroshima Univ.) CAS2009-25 NLP2009-61
Digital watermarking is a copyright protection method by embedding watermark data in the digital contents.
In this wor... [more]
CAS2009-25 NLP2009-61
pp.7-12
CAS, NLP 2009-09-24
10:55
Hiroshima Hiroshima Univ. Higashi Senda Campus Detection Method for Digital Watermark with Dual-Sided Correlation
Tomotaka Harano, Masayoshi Nakamoto, Hideaki Kadota, Shuichi Ohno (Hiroshima Univ.) CAS2009-26 NLP2009-62
The watermark systems should be robust against common image processing operations, such as noise adding and JPEG compres... [more] CAS2009-26 NLP2009-62
pp.13-18
ISEC 2009-05-22
15:45
Tokyo Kikai-Shinko-Kaikan Bldg. Digital Signature Using Knapsack Problem
Kunikatsu Kobayashi (Yamagata Univ.), Kotaro Honda (α systems) ISEC2009-12
We propose a digital signature using the knapsack problem. The security of this digital signature is based on the diffic... [more] ISEC2009-12
pp.77-80
 Results 1 - 20 of 24  /  [Next]  
Choose a download format for default settings. [NEW !!]
Text format pLaTeX format CSV format BibTeX format
Copyright and reproduction : All rights are reserved and no part of this publication may be reproduced or transmitted in any form or by any means, electronic or mechanical, including photocopy, recording, or any information storage and retrieval system, without permission in writing from the publisher. Notwithstanding, instructors are permitted to photocopy isolated articles for noncommercial classroom use without fee. (License No.: 10GA0019/12GB0052/13GB0056/17GB0034/18GB0034)


[Return to Top Page]

[Return to IEICE Web Page]


The Institute of Electronics, Information and Communication Engineers (IEICE), Japan