IEICE Technical Report

Online edition: ISSN 2432-6380

Volume 120, Number 28

Information Security

Workshop Date : 2020-05-20 / Issue Date : 2020-05-13

[PREV] [NEXT]

[TOP] | [2017] | [2018] | [2019] | [2020] | [2021] | [2022] | [2023] | [Japanese] / [English]

[PROGRAM] [BULK PDF DOWNLOAD]


Table of contents

ISEC2020-1
Isogeny based ring signature from CSIDH
Taisei Kiyama, Koutarou Suzuki (TUT)
pp. 1 - 6

ISEC2020-2
Distinguishing, Forgery, and Plaintext Recovery Attacks against Google Adiantum
Makoto Habu, Tetsu Iwata (Nagoya Univ.)
pp. 7 - 14

ISEC2020-3
Improved Quantum Information Set Decoding Algorithm with Low Memory
Naoto Kimura (Univ. Tokyo), Atsushi Takayasu (NICT), Tsuyoshi Takagi (Univ. Tokyo)
pp. 15 - 22

ISEC2020-4
[Invited Talk] Efficient Private PEZ Protocols for Symmetric Functions (from TCC 2019)
Yoshiki Abe, Mitsugu Iwamoto (UEC), Kazuo Ohta (UEC/AIST)
p. 23

ISEC2020-5
[Invited Talk] An Efficient F4-style Based Algorithm to Solve MQ Problems (from IWSEC 2019)
Takuma Ito, Naoyuki shinohara (NICT), Shigenori Uchiyama (TMU)
p. 25

ISEC2020-6
[Invited Talk] Almost Optimal Cheating-Detectable (2,2,n) Ramp Secret Sharing Scheme (from CANDAR 2019)
Tomoki Agematsu (NEC), Satoshi Obana (Hosei univ)
p. 27

ISEC2020-7
[Invited Talk] Tweakable TWINE: Building a Tweakable Block Cipher on Generalized Feistel Structure (from IWSEC 2019)
Kosei Sakamoto (University of Hyogo), Kazuhiko Minematsu (NEC), Nao Shibata, Maki Shigeri, Hiroyasu Kubo (NES), Yuki Funabiki (Kobe Univ.), Andrey Bogdanov (DTU), Sumio Morioka (Interstellar), Takanori Isobe (University of Hyogo/NICT)
p. 29

ISEC2020-8
[Invited Talk] How to Construct CSIDH on Edwards Curves (from CT-RSA 2020)
Tomoki Moriya, Hiroshi Onuki, Tsuyoshi Takagi (UTokyo)
p. 31

ISEC2020-9
Making Variance of Mining Time Smaller for Computational Problems Based on Hash Functions -- Serial Concatenation and Parallel Concatenation --
Hiroaki Anada (Univ. Nagasaki), Kouichi Sakurai (Kyushu Univ.)
pp. 33 - 40

ISEC2020-10
Evaluation of re-centralization by inequality and convergence on blockchain networks
Mitsuyoshi Imamura (Tsukuba Univ.), Kazumasa Omote (Tsukuba Univ./NICT)
pp. 41 - 45

ISEC2020-11
An Anonymous Trust-Marking Scheme on NEM Blockchain Systems
Tomoki Fujitani (Univ.Tsukuba/NICT), Keita Emura (NICT), Kazumasa Omote (Univ.Tsukuba/NICT)
pp. 47 - 54

ISEC2020-12
Identity-based Authenticated Key Exchange for IoT Devices and its Security against Malicious Private Key Generator
Kazuma Wariki, Taroh Sasaki, Atsushi Fujioka (Kanagawa Univ.), Koutarou Suzuki (Toyohashi Univ. of Tech.), Junichi Tomida (NTT)
pp. 55 - 61

ISEC2020-13
A Study on robustness of PE malware detection models
Wanjia Zheng (U. Tsukuba), Kazumasa Omote (U. Tsukuba/NICT)
pp. 63 - 70

Note: Each article is a technical report without peer review, and its polished version will be published elsewhere.


The Institute of Electronics, Information and Communication Engineers (IEICE), Japan