Committee |
Date Time |
Place |
Paper Title / Authors |
Abstract |
Paper # |
ICM |
2021-03-18 10:30 |
Online |
Online |
[Invited Talk]
Quantum Technology and Innovation Strategy Toshio Tonouchi (RIKEN) ICM2020-62 |
Quantum technology is an innovation technology, which is a key to the rapid and discontinuity development of economy and... [more] |
ICM2020-62 p.19 |
QIT (2nd) |
2020-12-10 10:10 |
Online |
Online |
Security of continuous variable quantum key distribution with digital signal processing Takaya Matsuura, Kento Maeda, Toshihiko Sasaki, Masato Koashi (U-Tokyo) |
Continuous-variable (CV) quantum key distribution (QKD) uses homodyne/heterodyne measurement, which is technologically m... [more] |
|
LOIS, ISEC, SITE |
2020-11-06 10:30 |
Online |
Online |
Proposal of Optimal Curve Parameters for Pairing Computation on BLS12 Curve and Its Evaluation of Implementation Daichi Hattori, Yuto Takahashi, Tomoya Tatara, Yuki Nanjo, Yuta Kodera, Takuya Kusaka, Yasuyuki Nogami (Okayama Univ.) ISEC2020-32 SITE2020-29 LOIS2020-12 |
Pairing-based cryptography is one of the popular cryptographic techniques for achieving safety and usability. Since a pa... [more] |
ISEC2020-32 SITE2020-29 LOIS2020-12 pp.1-6 |
ICD, HWS [detail] |
2020-10-26 09:25 |
Online |
Online |
Power Analysis Attack Using Pipeline Scheduling on Pairing Hardware Mitsufumi Yamazaki, Junichi Sakamoto, Tsutomu Matsumoto (YNU) HWS2020-26 ICD2020-15 |
To reduce the latency of pairing calculation for advanced cryptography, hardware implementations with pipelined modular ... [more] |
HWS2020-26 ICD2020-15 pp.7-12 |
HWS, VLD [detail] |
2020-03-06 13:50 |
Okinawa |
Okinawa Ken Seinen Kaikan (Cancelled but technical report was issued) |
Design Space Search for Faster Fp256 Elliptic Curve Cryptography Kento Ikeda (Tokyo Univ.), Makoto Ikeda (d.lab) VLD2019-130 HWS2019-103 |
In this study, we created a scheduling of operations by changing parameters such as elliptic curves, their formulas, the... [more] |
VLD2019-130 HWS2019-103 pp.209-214 |
HWS, ICD [detail] |
2019-11-01 14:15 |
Osaka |
DNP Namba SS Bld. |
A Design of Isogeny-Based Cryptographic Hardware Architecture Using Residue Number System Shuto Funakoshi, Rei Ueno, Naofumi Homma (Tohoku Univ.) HWS2019-60 ICD2019-21 |
In this paper, we will propose an efficient hardware architecture of isogeny-based cryptography. The proposed architectu... [more] |
HWS2019-60 ICD2019-21 pp.19-24 |
SIP |
2019-08-29 15:10 |
Tokyo |
|
Implementation of the Elliptic Curve Cryptography over Gaussian Integral Finite Group onto Excel Kazuki Naganuma, Takashi Suzuki, Hiroyuki Tsuji, Tomoaki Kimura (KAIT) SIP2019-42 |
The Elliptic Curve Cryptography is known as cryptography safer than the RSA Cryptography. Defining the
elliptic curve o... [more] |
SIP2019-42 pp.17-22 |
ISEC, SITE, ICSS, EMM, HWS, BioX, IPSJ-CSEC, IPSJ-SPT [detail] |
2019-07-23 14:25 |
Kochi |
Kochi University of Technology |
Side Channel Security of an FPGA Pairing Implementation with Pipelined Modular Multiplier Mitsufumi Yamazaki, Junichi Sakamoto, Yuta Okuaki, Tsutomu Matsumoto (YNU) ISEC2019-29 SITE2019-23 BioX2019-21 HWS2019-24 ICSS2019-27 EMM2019-32 |
Since bilinear pairing is useful in realizing advanced cryptography, side channel security evaluation of its high-speed ... [more] |
ISEC2019-29 SITE2019-23 BioX2019-21 HWS2019-24 ICSS2019-27 EMM2019-32 pp.151-156 |
QIT (2nd) |
2019-05-20 09:40 |
Fukuoka |
Kyushu University, Chikushi Campus |
Heralded amplification of nonlocality via entanglement swapping for long-distance device-independent quantum key distribution Yoshiaki Tsujimoto (NICT), Chenglong You (LSU), Kentaro Wakui, Mikio Fujiwara, Kazuhiro Hayasaka, Shigehito Miki, Hirotaka Terai, Masahide Sasaki (NICT), Jonathan P. Dowling (LSU), Masahiro Takeoka (NICT) |
To realize the practical implementation of device-independent quantum key distribution~(DIQKD), the main difficulty is t... [more] |
|
EMM |
2019-03-14 11:05 |
Okinawa |
TBD |
Improvement of the Quality of Visual Secret Sharing Schemes with Shares Containing Inconsistent Pixels Mariko Fujii, Tomoharu Shibuya (Sophia Univ.) EMM2018-114 |
(k, n)-visual secret sharing scheme ((k, n)-VSSS) is a method to divide a secret image into n images called shares that ... [more] |
EMM2018-114 pp.123-128 |
ICSS, IPSJ-SPT |
2019-03-07 14:20 |
Okinawa |
NICT Okinawa Electromagnetic Technology Center |
On Improvement of a White-box Cryptographic Scheme Masakazu Soshi (Hiroshima City Univ.) ICSS2018-72 |
White-box cryptography provides a method to conceal a secret key embedded in a hardware device for encryption even if an... [more] |
ICSS2018-72 pp.25-27 |
IT, ISEC, WBS |
2019-03-08 15:20 |
Tokyo |
University of Electro-Communications |
Key Reocvery Atttack on Ring-LWE Scheme Using Side-Channel Information in Number Theoretic Transform Kento Oonishi, Noboru Kunihiro (Tokyo Univ.) IT2018-112 ISEC2018-118 WBS2018-113 |
Recently, the researches of post-quantum cryptography are conducted because of the realization of quantum computers in t... [more] |
IT2018-112 ISEC2018-118 WBS2018-113 pp.229-234 |
HWS, ICD |
2018-10-29 15:20 |
Osaka |
Kobe Univ. Umeda Intelligent Laboratory |
A Design and Implementation of Ring-LWE Cryptography Hardware Based on Number Theoretic Transform Sora Endo, Rei Ueno, Takafumi Aoki, Naofumi Homma (Tohoku Univ.) HWS2018-52 ICD2018-44 |
This paper presents an efficient Ring-LWE cryptographic hardware architecture based on number theoretic transformation. ... [more] |
HWS2018-52 ICD2018-44 pp.31-34 |
HWS, ISEC, SITE, ICSS, EMM, IPSJ-CSEC, IPSJ-SPT [detail] |
2018-07-26 14:10 |
Hokkaido |
Sapporo Convention Center |
A New Embedding Method for Generalized LWE Weiyao Wang, Yuntao Wang, Atsushi Takayasu, Tsuyoshi Takagi (Univ. Tokyo) ISEC2018-46 SITE2018-38 HWS2018-43 ICSS2018-49 EMM2018-45 |
Estimating the computational cost for solving learning with errors (LWE) problem is an indispensable research topic to u... [more] |
ISEC2018-46 SITE2018-38 HWS2018-43 ICSS2018-49 EMM2018-45 pp.363-370 |
ISEC, COMP |
2017-12-21 14:10 |
Kochi |
Eikokuji Campus, Kochi University of Technology |
[Invited Talk]
Foundations and practical studies of secure computation Ryo Kikuchi (NTT) ISEC2017-78 COMP2017-32 |
Secure computation, also known as secure multiparty computation, is a method to compute a function on encrypted data. Th... [more] |
ISEC2017-78 COMP2017-32 p.41 |
SITE, EMM, ISEC, ICSS, IPSJ-CSEC, IPSJ-SPT [detail] |
2017-07-14 10:40 |
Tokyo |
|
Identifying bottlenecks on social implementation of advanced cryptography Hiroki Kunii, Hiroyuki Date (SECOM) ISEC2017-17 SITE2017-9 ICSS2017-16 EMM2017-20 |
Advanced cryptography is expected as next-generation cryptosystems and has been investigated by many researchers. In thi... [more] |
ISEC2017-17 SITE2017-9 ICSS2017-16 EMM2017-20 pp.39-44 |
ISEC, WBS, IT |
2017-03-09 15:50 |
Tokyo |
TOKAI University |
Construction of covering curves of elliptic curves over finite fields of even characteristic using simple extension Seiya Kukisaki (Chuo Univ.), Mahoro Simura (Tokai Univ.), Jinhui Chao (Chuo Univ.) IT2016-111 ISEC2016-101 WBS2016-87 |
The GHS attacks present a serious threat to cryptosystems using elliptic curves over extensions of finite fields when th... [more] |
IT2016-111 ISEC2016-101 WBS2016-87 pp.79-83 |
ICSS |
2016-11-25 15:45 |
Kanagawa |
Institute of Information Security |
Report on WhibOx 2016 White-Box Cryptography and Obfuscation Kazuomi Oishi (SIST) ICSS2016-43 |
A report on WhibOx 2016 is presented. WhibOx 2016 is a one-time workshop on white-box cryptogra-phy and obfuscation. It ... [more] |
ICSS2016-43 pp.27-29 |
ISEC |
2016-09-02 14:50 |
Tokyo |
Kikai-Shinko-Kaikan Bldg. |
Implementation of security evaluation function on a Development Environment of Cryptography using GUI Toshihiro Nakamura, Keisuke Iwai, Takashi Matsubara, Takakazu Kurokawa (NDA) ISEC2016-46 |
Security evaluation on cryptography and cryptography development
are two sides of the same coin.
Security evaluation... [more] |
ISEC2016-46 pp.49-56 |
EMM, ISEC, SITE, ICSS, IPSJ-CSEC, IPSJ-SPT [detail] |
2016-07-15 13:00 |
Yamaguchi |
|
Efficient Discrete Gaussian Sampling on Constrained Devices Yuki Tanaka, Isamu Teranishi, Kazuhiko Minematsu (NEC), Yoshinori Aono (NICT) ISEC2016-32 SITE2016-26 ICSS2016-32 EMM2016-40 |
Lattice-based cryptography has been attracted by features of simple-implementation, quantum-resilient, and high-level fu... [more] |
ISEC2016-32 SITE2016-26 ICSS2016-32 EMM2016-40 pp.169-175 |