IEICE Technical Committee Submission System
Conference Schedule
Online Proceedings
[Sign in]
Tech. Rep. Archives
    [Japanese] / [English] 
( Committee/Place/Topics  ) --Press->
 
( Paper Keywords:  /  Column:Title Auth. Affi. Abst. Keyword ) --Press->

All Technical Committee Conferences  (Searched in: All Years)

Search Results: Conference Papers
 Conference Papers (Available on Advance Programs)  (Sort by: Date Descending)
 Results 1 - 5 of 5  /   
Committee Date Time Place Paper Title / Authors Abstract Paper #
HIP, HCS, HI-SIGCOASTER [detail] 2020-05-14
10:20
Online Online The role of perceiving eye-expressions in judging genuine and fake smiles
Riko Nakashima (Waseda Univ.), Tomoko Isomura (RHUL/Waseda Univ.), Tatsunori Ishii, Katsumi Watanabe (Waseda Univ.) HCS2020-1 HIP2020-1
(To be available after the conference date) [more] HCS2020-1 HIP2020-1
pp.1-6
QIT
(2nd)
2019-05-21
13:30
Fukuoka Kyushu University, Chikushi Campus [Invited Talk] Qubit as a quantum sensor of absolute power
T. Hönigl-Decrinis (NPL), R. Shaikhaidarov (RHUL), S. E. de Graaf (NPL), V. N. Antonov (Skoltech/RHUL), O. V. Astafiev (Skoltech/RHUL/NPL)
 [more]
COMP, ISEC 2016-12-21
13:40
Hiroshima Hiroshima University [Invited Talk] Backdoors in Pseudorandom Number Generators: Possibility and Impossibility Results
Jean Paul Degabriele, Kenneth Paterson (RHUL), Jacob Schuldt (AIST), Joanne Woodage (RHUL) ISEC2016-75 COMP2016-36
In this talk, we continue the foundational work on backdoored pseudorandom generators (PRGs) initiated by Dodis et al., ... [more] ISEC2016-75 COMP2016-36
p.27
ISEC 2012-12-12
16:30
Tokyo Kikai-Shinko-Kaikan Bldg. [Invited Talk] On the Impossibility of Constructing Efficient Key Encapsulation and Programmable Hash Functions in Prime Order Groups
Goichiro Hanaoka, Takahiro Matsuda (AIST), Jacob Schuldt (RHUL) ISEC2012-79
In this invited talk, we introduce the lecture with the same title presented at the 32nd International Cryptology Confer... [more] ISEC2012-79
p.43
ISEC 2012-05-18
16:55
Tokyo Kikai-Shinko-Kaikan Bldg. [Invited Talk] On the Joint Security of Encryption and Signature, Revisited
Kenneth Paterson (RHUL), Jacob Schuldt (RCIS, AIST), Martijn Stam (Univ. of Bristol), Susan Thomson (RHUL) ISEC2012-8
The folklore principle of key separation dictates using different keys for different cryptographic operations. While thi... [more] ISEC2012-8
p.43
 Results 1 - 5 of 5  /   
Choose a download format for default settings. [NEW !!]
Text format pLaTeX format CSV format BibTeX format
Copyright and reproduction : All rights are reserved and no part of this publication may be reproduced or transmitted in any form or by any means, electronic or mechanical, including photocopy, recording, or any information storage and retrieval system, without permission in writing from the publisher. Notwithstanding, instructors are permitted to photocopy isolated articles for noncommercial classroom use without fee. (License No.: 10GA0019/12GB0052/13GB0056/17GB0034/18GB0034)


[Return to Top Page]

[Return to IEICE Web Page]


The Institute of Electronics, Information and Communication Engineers (IEICE), Japan