Committee |
Date Time |
Place |
Paper Title / Authors |
Abstract |
Paper # |
ICSS, IPSJ-SPT |
2020-03-02 13:30 |
Okinawa |
Okinawa-Ken-Seinen-Kaikan (Cancelled but technical report was issued) |
Implementation of aggregate message authentication and its evaluation Atsuhiro Yamagishi, Yoshio Takeuchi (JDC), Tatsuya Takehisa, Hidekazu Nishiura, Zoa Jiafa (NISSIN), Yu Imamura (JDC), Junji Sikata (YNU), Shoichi Hirose (JDC), Koji Nakao (YNU), Yuko Ishida, Hideki Imai, Yasuo Hirata (JDC) ICSS2019-96 |
[more] |
ICSS2019-96 pp.207-212 |
ICSS |
2019-11-13 16:45 |
Miyazaki |
MRT Terrace(Miyazaki) |
Study on evaluation system for aggregate message authentication and its application to IoT systems Atsuhiro Yamagishi, Yoshio Takeuchi (JDC), Tatsuya Takeuchi, Hidekazu Nishiura (Nissin), Yu Imamura (JDC), Junji Shikata (YNU), Shoichi Hirose (JDC), Koji Nakao (YNU), Yuko Ishida, Hideki Imai, Yasuo Hirata (JDC) ICSS2019-67 |
Utilization of Internet of things (IoT) devices has widely spread, and suppressing the increasing amount of data due to ... [more] |
ICSS2019-67 pp.41-46 |
QIT (2nd) |
2012-05-22 15:50 |
Fukui |
Fukui Univ. |
A Solution to the Mean King's Problem using Quantum Error-Correcting Codes Masakazu Yoshida (Chuo Univ.), Takayuki Miyadera (Kyoto Univ.), Gen Kimura (Shibaura Inst. of Tech.), Hideki Imai (Chuo Univ.) |
Mean King's problem is formulated as a quantum retrodiction problem for noncommutative observables. In this paper, we in... [more] |
|
IT, ISEC, WBS |
2012-03-01 10:55 |
Kanagawa |
|
Object Verification System from Artifact-Metrics Based on Printed Ink Spread Takanori Kobayashi, Takuya Nakamura, Hiroki Sato (Chuo Univ.), Nuttapong Attrapadung, Hideki Imai (AIST) IT2011-47 ISEC2011-74 WBS2011-48 |
Artifact-Metrics is the technology of attestation or a truth judging in which the feature peculiar to an artificial thin... [more] |
IT2011-47 ISEC2011-74 WBS2011-48 pp.9-13 |
IT, ISEC, WBS |
2012-03-01 11:45 |
Kanagawa |
|
Analysis of interdependency of information security in Japan Ryouta Hishiki (Chuou Univ.), Bongkot Jenjarrussakul, Hideyuki Tanaka, Kanta Matsuura (Tokyo Univ.), Hideki Imai (Chuou Univ.) IT2011-49 ISEC2011-76 WBS2011-50 |
In the economy, the activities of the Internet is essential in all
industrial sector.
Therefore, it is also necessar... [more] |
IT2011-49 ISEC2011-76 WBS2011-50 pp.23-29 |
IBISML |
2010-11-04 15:00 |
Tokyo |
IIS, Univ. of Tokyo |
[Poster Presentation]
Quantum Error Correction with Non-Binary LDPC Codes Kenta Kasai (Tokyo Inst. of Tech.), Manabu Hagiwara (AIST), Hideki Imai (Chuo Univ.), Kohichi Sakaniwa (Tokyo Inst. of Tech.) IBISML2010-77 |
Quantum error correction is used in quantum computing and quantum communications to protect quantum information from qua... [more] |
IBISML2010-77 pp.135-145 |
IT |
2010-09-22 10:55 |
Miyagi |
Tohoku Gakuin University |
Study on the performance of the entanglement distillation protocol using the quantum error correcting code Masakazu Yoshida (Chuo Univ.), Manabu Hagiwara, Takayuki Miyadera (AIST), Hideki Imai (Chuo Univ./AIST) IT2010-42 |
Entangled states play crucial roles in the quantum communication. The entanglement distillation protocol enables us to s... [more] |
IT2010-42 pp.51-56 |
ISEC, IPSJ-CSEC, SITE, ICSS [detail] |
2010-07-02 14:15 |
Aomori |
Hirosaki University |
Efficient Augmented PAK Protocols SeongHan Shin, Kazukuni Kobara (AIST), Hideki Imai (Chuo Univ.) ISEC2010-32 SITE2010-28 ICSS2010-38 |
[more] |
ISEC2010-32 SITE2010-28 ICSS2010-38 pp.167-172 |
IT, ISEC, WBS |
2010-03-04 10:50 |
Nagano |
Nagano-Engineering Campus, Shinshu University |
About Security of Threshold Anonymous Password-Authenticated Key Exchange SeongHan Shin, Kazukuni Kobara (AIST), Hideki Imai (Chuo Univ.) IT2009-75 ISEC2009-83 WBS2009-54 |
An anonymous password-authenticated key exchange protocol is
designed to provide both password-only authentication and ... [more] |
IT2009-75 ISEC2009-83 WBS2009-54 pp.23-30 |
IT, ISEC, WBS |
2010-03-05 09:00 |
Nagano |
Nagano-Engineering Campus, Shinshu University |
A Comparative Study of CPA and MIA on Side-channel Attack Standard Evaluation Boards Asuka Taguchi, Yohei Hori, Hideki Imai (Chuo Univ.) IT2009-102 ISEC2009-110 WBS2009-81 |
Correlation Power Analysis (CPA) and Mutual Information Analysis (MIA)
are applied to the AES circuits implemented on ... [more] |
IT2009-102 ISEC2009-110 WBS2009-81 pp.199-204 |
IT, ISEC, WBS |
2010-03-05 11:40 |
Nagano |
Nagano-Engineering Campus, Shinshu University |
A Reader Only Attack on a MIFARE Classic Satoru Imamura (Chuo Univ.), Takashi Kitagawa (Univ. of Tokyo.), Hideki Imai (Chuo Univ.) IT2009-108 ISEC2009-116 WBS2009-87 |
MIFARE Classic card is a contactless smart card which is one of the most popular on the market. For example, it is used ... [more] |
IT2009-108 ISEC2009-116 WBS2009-87 pp.241-246 |
IT, ISEC, WBS |
2010-03-05 13:50 |
Nagano |
Nagano-Engineering Campus, Shinshu University |
Traitor Tracing system with Constant-size Public-key and Ciphertext using q-ary fingerprinting codes Ying Zhang (Chuo Univ.), Takashi Kitagawa (Univ. of Tokyo.), Nuttapong Attrapadung (AIST), Hideki Imai (Chuo Univ/AIST) IT2009-110 ISEC2009-118 WBS2009-89 |
A traitor tracing system enables a publisher to trace a pirate decryption box to one of the secret keys used to create t... [more] |
IT2009-110 ISEC2009-118 WBS2009-89 pp.255-260 |
IT, ISEC, WBS |
2010-03-05 14:15 |
Nagano |
Nagano-Engineering Campus, Shinshu University |
Experimental and Theoretical Evaluation of Wolf Fingerprint Using Statistical Information Takuya Nakagawa, Hyunho Kang (Chuo Univ.), Shoko Yonezawa, Manabu Inuma, Akira Otsuka (AIST), Hideki Imai (Chuo Univ/AIST) IT2009-111 ISEC2009-119 WBS2009-90 |
Although the evaluation of biometric systems is often focusing on the
high performance matching approaches, it is not a... [more] |
IT2009-111 ISEC2009-119 WBS2009-90 pp.261-268 |
ISEC, LOIS |
2009-11-12 13:30 |
Gifu |
Gifu Univ. |
Constructing New Differential Path and Algebraic Cryptanalysis for Full-SHA-1 Makoto Sugita (NTT/AIST), Mitsuru Kawazoe (Osaka Prefecture Univ.), Hideki Imai (AIST/ Chuo Univ.) ISEC2009-51 LOIS2009-40 |
Since the cryptanalysis for SHA-1 was proposed [19], many improvements have been proposed. Recently a new result was pro... [more] |
ISEC2009-51 LOIS2009-40 pp.1-8 |
RECONF |
2009-05-15 11:00 |
Fukui |
|
Development and Evaluation of Cryptographic Hardware Generated by Behavior-level Synthesis Yohei Hori, Mai Itoh (Chuo Univ.), Hideki Imai (Chuo Univ./AIST) RECONF2009-12 |
Cryptography is widely applied to various consumer electronics to
protect digital contents, users' privacy, product co... [more] |
RECONF2009-12 pp.67-72 |
WBS, IT, ISEC |
2009-03-10 15:15 |
Hokkaido |
Hakodate Mirai Univ. |
Multi-receiver Authentication Codes with Secrecy and Revocation Capability for Multiple Message Transmissions Shinpei Chiba, Takahiro Yoshida (Chuo Univ), Nuttapong Attrapadung (AIST), Hideki Imai (Chuo Univ/AIST) IT2008-90 ISEC2008-148 WBS2008-103 |
In this paper,we consider an extension of Multi-receiver Authentication Codes for Multiple Message Transmissions(MRA-MMT... [more] |
IT2008-90 ISEC2008-148 WBS2008-103 pp.301-306 |
WBS, IT, ISEC |
2009-03-10 15:15 |
Hokkaido |
Hakodate Mirai Univ. |
McEliece Digital Signature with LDPC codes
-- Practicality and Security Evaluation -- Shigenori Yamakawa (Chuo Univ.), Yang Cui, Manabu Hagiwara, Kazukuni Kobara (AIST/Chuo Univ.), Hideki Imai (Chuo Univ./AIST) IT2008-126 ISEC2008-184 WBS2008-139 |
Most of the current public-key cryptosystems (PKCs) are considered to be broken if a quantum computer
is realized in th... [more] |
IT2008-126 ISEC2008-184 WBS2008-139 pp.537-543 |
VLD, DC, IPSJ-SLDM, CPSY, RECONF, ICD, CPM (Joint) [detail] |
2008-11-18 15:20 |
Fukuoka |
Kitakyushu Science and Research Park |
Development of Side-channel Attack Standard Evaluation BOard and Tool Yohei Hori, Toshihiro Katashita, Hirofumi Sakane, Kenji Toda, Akashi Satoh (National Institute of Advanced Industrial Science and Technology), Hideki Imai (Chuo Univ.) RECONF2008-54 |
Side-channel Attack Standard Evaluation BOards (SASEBO) and their
analysis tools are developed to provide uniform exp... [more] |
RECONF2008-54 pp.87-92 |
IT |
2008-09-11 17:30 |
Okinawa |
Culture Resort Festone (Okinawa) |
Consideration to Fast Simulation for Error Rate of Each Bit Position on LDPC Codes Yuto Matsunaga (Chuo Univ.), Manabu Hagiwara, Hideki Imai (Chuo Univ./AIST) IT2008-27 |
This paper, we consider fast simulation for error rate of each bit position on LDPC Codes.QC LDPC Codes has a theorem th... [more] |
IT2008-27 pp.43-48 |
ISEC, SITE, IPSJ-CSEC |
2007-07-19 16:35 |
Hokkaido |
Future University-Hakodate |
On Anonymous Password-Authenticated Key Exchange SeongHan Shin, Kazukuni Kobara, Hideki Imai (AIST/Chuo Univ.) ISEC2007-37 SITE2007-31 |
An anonymous password-authenticated key exchange (PAKE) protocol is
designed to provide both user's password-based auth... [more] |
ISEC2007-37 SITE2007-31 pp.145-151 |