IEICE Technical Committee Submission System
Conference Schedule
Online Proceedings
[Sign in]
Tech. Rep. Archives
    [Japanese] / [English] 
( Committee/Place/Topics  ) --Press->
 
( Paper Keywords:  /  Column:Title Auth. Affi. Abst. Keyword ) --Press->

All Technical Committee Conferences  (Searched in: All Years)

Search Results: Conference Papers
 Conference Papers (Available on Advance Programs)  (Sort by: Date Descending)
 Results 1 - 20 of 38  /  [Next]  
Committee Date Time Place Paper Title / Authors Abstract Paper #
ISEC 2020-05-20
12:50
Online Online [Invited Talk] Efficient Private PEZ Protocols for Symmetric Functions (from TCC 2019)
Yoshiki Abe, Mitsugu Iwamoto (UEC), Kazuo Ohta (UEC/AIST) ISEC2020-4
 [more] ISEC2020-4
p.23
IT, ISEC, WBS 2019-03-08
14:45
Tokyo University of Electro-Communications A Private PEZ Protocol of 4-Input Majority Vote with 29 PEZ Candies
Yoshiki Abe, Shota Yamamoto, Mitsugu Iwamoto, Kazuo Ohta (UEC) IT2018-111 ISEC2018-117 WBS2018-112
Secure multi-party computation can be implemented by
using a (big) PEZ dispenser,
which is called as a ¥textit{priva... [more]
IT2018-111 ISEC2018-117 WBS2018-112
pp.223-228
IT, ISEC, WBS 2019-03-08
16:45
Tokyo University of Electro-Communications [Invited Talk] Exceptional Experiences of my Research Activities on Modern Cryptography
Kazuo Ohta (UEC) IT2018-115 ISEC2018-121 WBS2018-116
As a fellow receiving a prize commemorative lecture, I look back on 36-year research and education experiences on modern... [more] IT2018-115 ISEC2018-121 WBS2018-116
p.249
HWS, ISEC, SITE, ICSS, EMM, IPSJ-CSEC, IPSJ-SPT [detail] 2018-07-25
09:55
Hokkaido Sapporo Convention Center Truly Efficient Robust Secret Sharing for the Real World
Yohei Watanabe (UEC), Kazuma Ohara (UEC/NEC), Mitsugu Iwamoto, Kazuo Ohta (UEC) ISEC2018-13 SITE2018-5 HWS2018-10 ICSS2018-16 EMM2018-12
Robust secret sharing is secret sharing with the following robustness property: An original message can be recovered eve... [more] ISEC2018-13 SITE2018-5 HWS2018-10 ICSS2018-16 EMM2018-12
pp.1-8
SITE, EMM, ISEC, ICSS, IPSJ-CSEC, IPSJ-SPT [detail] 2017-07-14
16:35
Tokyo   PUF based Device Authentication without Error Correction
Yuichi Komano (Toshiba), Mitsugu Iwamoto, Kazuo Ohta (UEC) ISEC2017-24 SITE2017-16 ICSS2017-23 EMM2017-27
 [more] ISEC2017-24 SITE2017-16 ICSS2017-23 EMM2017-27
pp.123-130
ISEC, WBS, IT 2017-03-10
14:10
Tokyo TOKAI University A Note on Acceptable Information Leakage of Searchable Symmetric Encryption
Takeshi Nakai, Takuya Nojima, Mitsugu Iwamoto, Kazuo Ohta (UEC) IT2016-128 ISEC2016-118 WBS2016-104
(To be available after the conference date) [more] IT2016-128 ISEC2016-118 WBS2016-104
pp.187-193
EMM, IT 2015-05-22
13:40
Kyoto Kyoto International Community House An Audio Secret Sharing Scheme Easy to Reproduce Secret Physically
Yuuki Tokushige, Yuto Misawa, Fumiaki Yoshida, Masaya Uwatoko, Mitsugu Iwamoto, Kazuo Ohta (UEC) IT2015-14 EMM2015-14
An audio secret sharing scheme is a variant of secret sharing schemes in which a secret and shares are acoustic informat... [more] IT2015-14 EMM2015-14
pp.75-80
EMM, ISEC, SITE, ICSS, IPSJ-CSEC, IPSJ-SPT [detail] 2013-07-19
15:40
Hokkaido   On Side-Channel Information Using Signal Toggles in AES Circuit
Arisa Matsubara, Yunfeng Kuai, Yang Li, Toshiki Nakasone, Kazuo Ohta, Kazuo Sakiyama (UEC) ISEC2013-45 SITE2013-40 ICSS2013-50 EMM2013-47
 [more] ISEC2013-45 SITE2013-40 ICSS2013-50 EMM2013-47
pp.331-338
ISEC 2011-12-14
13:40
Tokyo Kikai-Shinko-Kaikan Bldg. [Invited Talk] Break Masked AES Implementations Using Fault Sensitivity and Faulty Ciphertext -- Review of Presentation at CHES2011 --
Yang Li, Kazuo Ohta, Kazuo Sakiyama (Univ. of Electro-Comm.) ISEC2011-66
 [more] ISEC2011-66
p.25
ISEC 2011-12-14
14:40
Tokyo Kikai-Shinko-Kaikan Bldg. [Invited Talk] Uniquness Enhancement of PUF Responces Based on the Locations of Random Outputting RS Latches
Dai Yamamoto (Fujitsu Lab.), Kazuo Sakiyama, Mitsugu Iwamoto, Kazuo Ohta (Univ. of Electro-Comm.), Takao Ochiai, Masahiko Takenaka, Kouichi Itoh (Fujitsu Lab.) ISEC2011-68
Physical Unclonable Functions (PUFs) are expected to represent an important solution for secure ID generation and authen... [more] ISEC2011-68
p.29
ISEC, LOIS 2011-11-15
09:25
Osaka Osaka Electro-Communication University Fault Sensitivity Analysis Against Elliptic Curve Cryptosystems Using Clockwise Collisions
Hikaru Sakamoto, Yang Li, Kazuo Ohta, Kazuo Sakiyama (Univ. of Electro-Comm.) ISEC2011-49 LOIS2011-43
In this paper, we propose a new fault analysis attack technique using Clockwise Collision. Generally, for the combinatio... [more] ISEC2011-49 LOIS2011-43
pp.101-108
IT 2011-05-20
14:20
Osaka Osaka City University Relations among Information Theoretically and Computationally Secure Symmetric Key Encryptions
Mitsugu Iwamoto, Kazuo Ohta (Univ. of Electro-Comm.) IT2011-5
 [more] IT2011-5
pp.25-30
ISEC, IT, WBS 2011-03-03
10:00
Osaka Osaka University Efficient Searchable Encryption Schemes Against Frequency Analysis
Takashi Ito, Mitsuhiro Hattori, Nori Matsuda (Mitsubishi Electric Corp.), Yusuke Sakai, Kazuo Ohta (Univ. of Electro-Communications) IT2010-68 ISEC2010-72 WBS2010-47
Searchable encryption is a scheme that enables keyword search over encrypted data without revealing private information ... [more] IT2010-68 ISEC2010-72 WBS2010-47
pp.1-6
ISEC, IT, WBS 2011-03-04
09:25
Osaka Osaka University New Differential Fault Analysis on Trivium Based on Setup-Time Violations
Qi Li, Shigeto Gomisawa, Mitsugu Iwamoto, Kazuo Ohta, Kazuo Sakiyama (Univ. of Electro-Comm) IT2010-118 ISEC2010-122 WBS2010-97
This paper presents new differential fault analysis (DFA) on a stream cipher Trivium based on setup–time violation... [more] IT2010-118 ISEC2010-122 WBS2010-97
pp.333-339
ISEC 2010-09-10
16:35
Tokyo Kikai-Shinko-Kaikan Bldg. A general construction method of visual secret sharing scheme with share rotations
Mitsugu Iwamoto, Yang Li, Kazuo Sakiyama, Kazuo Ohta (Univ. of Electro-Comm.) ISEC2010-49
In this paper, we discuss a visual secret sharing scheme with multiple secret images including share rotation operations... [more] ISEC2010-49
pp.67-74
ISEC, IPSJ-CSEC, SITE, ICSS [detail] 2010-07-02
09:50
Aomori Hirosaki University Consideration on the Luby-Rackoff Cipher based on Physically Unclonable Functions
Yutaka Kawai (Univ. of Tokyo), Yuichi Komano (Tohisiba), Kazuo Ohta (Univ. of Electro-Comm.) ISEC2010-25 SITE2010-21 ICSS2010-31
 [more] ISEC2010-25 SITE2010-21 ICSS2010-31
pp.119-122
IT, ISEC, WBS 2010-03-04
13:25
Nagano Nagano-Engineering Campus, Shinshu University [Invited Talk] Indifferentiability Theory and SHA-3 Project -- Recent Status of Theoretical and Practical Researches on Hash Functions --
Kazuo Ohta, Lei Wang, Kazuo Sakiyama (Univ. of Electro-Comm.) IT2009-96 ISEC2009-104 WBS2009-75
The indifferentiability is an important concept in order to discuss the
provable security of hash functions. NIST (Nati... [more]
IT2009-96 ISEC2009-104 WBS2009-75
pp.159-166
ISEC, IPSJ-CSEC, SITE, ICSS [detail] 2009-07-03
09:55
Akita Akita University How to Construct Cryptosystems and Hash Functions in Weakened Random Oracle Models
Yusuke Naito (Mitsubishi Electric), Lei Wang, Kazuo Ohta (Univ. of Electro-Comm.) ISEC2009-26 SITE2009-18 ICSS2009-40
 [more] ISEC2009-26 SITE2009-18 ICSS2009-40
pp.131-138
ISEC, IPSJ-CSEC, SITE, ICSS [detail] 2009-07-03
11:35
Akita Akita University Improving Efficiency of an 'On the Fly' Identification Scheme by Perfecting Zero-Knowledgeness
Bagus Santoso (AIST), Kazuo Ohta, Kazuo Sakiyama (Univ. of Electro-Comm.), Goichiro Hanaoka (AIST) ISEC2009-30 SITE2009-22 ICSS2009-44
In this paper, we present a new methodology for constructing
an efficient identification scheme, and based on it,
we... [more]
ISEC2009-30 SITE2009-22 ICSS2009-44
pp.161-168
ISEC 2009-05-22
11:35
Tokyo Kikai-Shinko-Kaikan Bldg. A Novel Construction Method for Visual Secret Sharing Schemes Allowing Rotation of Shares
Yang Li, Mitsugu Iwamoto, Kazuo Ohta, Kazuo Sakiyama (Univ. of Electro-Comm.) ISEC2009-5
In 2006, Iwamoto et al. introduced a visual secret sharing (VSS) schemes that allows rotation operation for shares in de... [more] ISEC2009-5
pp.29-36
 Results 1 - 20 of 38  /  [Next]  
Choose a download format for default settings. [NEW !!]
Text format pLaTeX format CSV format BibTeX format
Copyright and reproduction : All rights are reserved and no part of this publication may be reproduced or transmitted in any form or by any means, electronic or mechanical, including photocopy, recording, or any information storage and retrieval system, without permission in writing from the publisher. Notwithstanding, instructors are permitted to photocopy isolated articles for noncommercial classroom use without fee. (License No.: 10GA0019/12GB0052/13GB0056/17GB0034/18GB0034)


[Return to Top Page]

[Return to IEICE Web Page]


The Institute of Electronics, Information and Communication Engineers (IEICE), Japan