IEICE Technical Committee Submission System
Conference Schedule
Online Proceedings
[Sign in]
Tech. Rep. Archives
    [Japanese] / [English] 
( Committee/Place/Topics  ) --Press->
 
( Paper Keywords:  /  Column:Title Auth. Affi. Abst. Keyword ) --Press->

All Technical Committee Conferences  (Searched in: All Years)

Search Results: Conference Papers
 Conference Papers (Available on Advance Programs)  (Sort by: Date Descending)
 Results 21 - 40 of 58 [Previous]  /  [Next]  
Committee Date Time Place Paper Title / Authors Abstract Paper #
ICM 2021-03-18
10:30
Online Online [Invited Talk] Quantum Technology and Innovation Strategy
Toshio Tonouchi (RIKEN) ICM2020-62
Quantum technology is an innovation technology, which is a key to the rapid and discontinuity development of economy and... [more] ICM2020-62
p.19
QIT
(2nd)
2020-12-10
10:10
Online Online Security of continuous variable quantum key distribution with digital signal processing
Takaya Matsuura, Kento Maeda, Toshihiko Sasaki, Masato Koashi (U-Tokyo)
Continuous-variable (CV) quantum key distribution (QKD) uses homodyne/heterodyne measurement, which is technologically m... [more]
LOIS, ISEC, SITE 2020-11-06
10:30
Online Online Proposal of Optimal Curve Parameters for Pairing Computation on BLS12 Curve and Its Evaluation of Implementation
Daichi Hattori, Yuto Takahashi, Tomoya Tatara, Yuki Nanjo, Yuta Kodera, Takuya Kusaka, Yasuyuki Nogami (Okayama Univ.) ISEC2020-32 SITE2020-29 LOIS2020-12
Pairing-based cryptography is one of the popular cryptographic techniques for achieving safety and usability. Since a pa... [more] ISEC2020-32 SITE2020-29 LOIS2020-12
pp.1-6
ICD, HWS [detail] 2020-10-26
09:25
Online Online Power Analysis Attack Using Pipeline Scheduling on Pairing Hardware
Mitsufumi Yamazaki, Junichi Sakamoto, Tsutomu Matsumoto (YNU) HWS2020-26 ICD2020-15
To reduce the latency of pairing calculation for advanced cryptography, hardware implementations with pipelined modular ... [more] HWS2020-26 ICD2020-15
pp.7-12
HWS, VLD [detail] 2020-03-06
13:50
Okinawa Okinawa Ken Seinen Kaikan
(Cancelled but technical report was issued)
Design Space Search for Faster Fp256 Elliptic Curve Cryptography
Kento Ikeda (Tokyo Univ.), Makoto Ikeda (d.lab) VLD2019-130 HWS2019-103
In this study, we created a scheduling of operations by changing parameters such as elliptic curves, their formulas, the... [more] VLD2019-130 HWS2019-103
pp.209-214
HWS, ICD [detail] 2019-11-01
14:15
Osaka DNP Namba SS Bld. A Design of Isogeny-Based Cryptographic Hardware Architecture Using Residue Number System
Shuto Funakoshi, Rei Ueno, Naofumi Homma (Tohoku Univ.) HWS2019-60 ICD2019-21
In this paper, we will propose an efficient hardware architecture of isogeny-based cryptography. The proposed architectu... [more] HWS2019-60 ICD2019-21
pp.19-24
SIP 2019-08-29
15:10
Tokyo   Implementation of the Elliptic Curve Cryptography over Gaussian Integral Finite Group onto Excel
Kazuki Naganuma, Takashi Suzuki, Hiroyuki Tsuji, Tomoaki Kimura (KAIT) SIP2019-42
The Elliptic Curve Cryptography is known as cryptography safer than the RSA Cryptography. Defining the
elliptic curve o... [more]
SIP2019-42
pp.17-22
ISEC, SITE, ICSS, EMM, HWS, BioX, IPSJ-CSEC, IPSJ-SPT [detail] 2019-07-23
14:25
Kochi Kochi University of Technology Side Channel Security of an FPGA Pairing Implementation with Pipelined Modular Multiplier
Mitsufumi Yamazaki, Junichi Sakamoto, Yuta Okuaki, Tsutomu Matsumoto (YNU) ISEC2019-29 SITE2019-23 BioX2019-21 HWS2019-24 ICSS2019-27 EMM2019-32
Since bilinear pairing is useful in realizing advanced cryptography, side channel security evaluation of its high-speed ... [more] ISEC2019-29 SITE2019-23 BioX2019-21 HWS2019-24 ICSS2019-27 EMM2019-32
pp.151-156
QIT
(2nd)
2019-05-20
09:40
Fukuoka Kyushu University, Chikushi Campus Heralded amplification of nonlocality via entanglement swapping for long-distance device-independent quantum key distribution
Yoshiaki Tsujimoto (NICT), Chenglong You (LSU), Kentaro Wakui, Mikio Fujiwara, Kazuhiro Hayasaka, Shigehito Miki, Hirotaka Terai, Masahide Sasaki (NICT), Jonathan P. Dowling (LSU), Masahiro Takeoka (NICT)
To realize the practical implementation of device-independent quantum key distribution~(DIQKD), the main difficulty is t... [more]
EMM 2019-03-14
11:05
Okinawa TBD Improvement of the Quality of Visual Secret Sharing Schemes with Shares Containing Inconsistent Pixels
Mariko Fujii, Tomoharu Shibuya (Sophia Univ.) EMM2018-114
(k, n)-visual secret sharing scheme ((k, n)-VSSS) is a method to divide a secret image into n images called shares that ... [more] EMM2018-114
pp.123-128
ICSS, IPSJ-SPT 2019-03-07
14:20
Okinawa NICT Okinawa Electromagnetic Technology Center On Improvement of a White-box Cryptographic Scheme
Masakazu Soshi (Hiroshima City Univ.) ICSS2018-72
White-box cryptography provides a method to conceal a secret key embedded in a hardware device for encryption even if an... [more] ICSS2018-72
pp.25-27
IT, ISEC, WBS 2019-03-08
15:20
Tokyo University of Electro-Communications Key Reocvery Atttack on Ring-LWE Scheme Using Side-Channel Information in Number Theoretic Transform
Kento Oonishi, Noboru Kunihiro (Tokyo Univ.) IT2018-112 ISEC2018-118 WBS2018-113
Recently, the researches of post-quantum cryptography are conducted because of the realization of quantum computers in t... [more] IT2018-112 ISEC2018-118 WBS2018-113
pp.229-234
HWS, ICD 2018-10-29
15:20
Osaka Kobe Univ. Umeda Intelligent Laboratory A Design and Implementation of Ring-LWE Cryptography Hardware Based on Number Theoretic Transform
Sora Endo, Rei Ueno, Takafumi Aoki, Naofumi Homma (Tohoku Univ.) HWS2018-52 ICD2018-44
This paper presents an efficient Ring-LWE cryptographic hardware architecture based on number theoretic transformation. ... [more] HWS2018-52 ICD2018-44
pp.31-34
HWS, ISEC, SITE, ICSS, EMM, IPSJ-CSEC, IPSJ-SPT [detail] 2018-07-26
14:10
Hokkaido Sapporo Convention Center A New Embedding Method for Generalized LWE
Weiyao Wang, Yuntao Wang, Atsushi Takayasu, Tsuyoshi Takagi (Univ. Tokyo) ISEC2018-46 SITE2018-38 HWS2018-43 ICSS2018-49 EMM2018-45
Estimating the computational cost for solving learning with errors (LWE) problem is an indispensable research topic to u... [more] ISEC2018-46 SITE2018-38 HWS2018-43 ICSS2018-49 EMM2018-45
pp.363-370
ISEC, COMP 2017-12-21
14:10
Kochi Eikokuji Campus, Kochi University of Technology [Invited Talk] Foundations and practical studies of secure computation
Ryo Kikuchi (NTT) ISEC2017-78 COMP2017-32
Secure computation, also known as secure multiparty computation, is a method to compute a function on encrypted data. Th... [more] ISEC2017-78 COMP2017-32
p.41
SITE, EMM, ISEC, ICSS, IPSJ-CSEC, IPSJ-SPT [detail] 2017-07-14
10:40
Tokyo   Identifying bottlenecks on social implementation of advanced cryptography
Hiroki Kunii, Hiroyuki Date (SECOM) ISEC2017-17 SITE2017-9 ICSS2017-16 EMM2017-20
Advanced cryptography is expected as next-generation cryptosystems and has been investigated by many researchers. In thi... [more] ISEC2017-17 SITE2017-9 ICSS2017-16 EMM2017-20
pp.39-44
ISEC, WBS, IT 2017-03-09
15:50
Tokyo TOKAI University Construction of covering curves of elliptic curves over finite fields of even characteristic using simple extension
Seiya Kukisaki (Chuo Univ.), Mahoro Simura (Tokai Univ.), Jinhui Chao (Chuo Univ.) IT2016-111 ISEC2016-101 WBS2016-87
The GHS attacks present a serious threat to cryptosystems using elliptic curves over extensions of finite fields when th... [more] IT2016-111 ISEC2016-101 WBS2016-87
pp.79-83
ICSS 2016-11-25
15:45
Kanagawa Institute of Information Security Report on WhibOx 2016 White-Box Cryptography and Obfuscation
Kazuomi Oishi (SIST) ICSS2016-43
A report on WhibOx 2016 is presented. WhibOx 2016 is a one-time workshop on white-box cryptogra-phy and obfuscation. It ... [more] ICSS2016-43
pp.27-29
ISEC 2016-09-02
14:50
Tokyo Kikai-Shinko-Kaikan Bldg. Implementation of security evaluation function on a Development Environment of Cryptography using GUI
Toshihiro Nakamura, Keisuke Iwai, Takashi Matsubara, Takakazu Kurokawa (NDA) ISEC2016-46
Security evaluation on cryptography and cryptography development
are two sides of the same coin.
Security evaluation... [more]
ISEC2016-46
pp.49-56
EMM, ISEC, SITE, ICSS, IPSJ-CSEC, IPSJ-SPT [detail] 2016-07-15
13:00
Yamaguchi   Efficient Discrete Gaussian Sampling on Constrained Devices
Yuki Tanaka, Isamu Teranishi, Kazuhiko Minematsu (NEC), Yoshinori Aono (NICT) ISEC2016-32 SITE2016-26 ICSS2016-32 EMM2016-40
Lattice-based cryptography has been attracted by features of simple-implementation, quantum-resilient, and high-level fu... [more] ISEC2016-32 SITE2016-26 ICSS2016-32 EMM2016-40
pp.169-175
 Results 21 - 40 of 58 [Previous]  /  [Next]  
Choose a download format for default settings. [NEW !!]
Text format pLaTeX format CSV format BibTeX format
Copyright and reproduction : All rights are reserved and no part of this publication may be reproduced or transmitted in any form or by any means, electronic or mechanical, including photocopy, recording, or any information storage and retrieval system, without permission in writing from the publisher. Notwithstanding, instructors are permitted to photocopy isolated articles for noncommercial classroom use without fee. (License No.: 10GA0019/12GB0052/13GB0056/17GB0034/18GB0034)


[Return to Top Page]

[Return to IEICE Web Page]


The Institute of Electronics, Information and Communication Engineers (IEICE), Japan