Committee |
Date Time |
Place |
Paper Title / Authors |
Abstract |
Paper # |
EMM, BioX, ISEC, SITE, ICSS, HWS, IPSJ-CSEC, IPSJ-SPT [detail] |
2023-07-24 18:20 |
Hokkaido |
Hokkaido Jichiro Kaikan |
Implementation of Shor's algorithm for the discrete logarithm problem and experiments using the quantum computer simulator Kaito Kishi, Junpei Yamaguchi, Tetsuya Izu (Fujitsu Research), Noboru Kunihiro (Univ. of Tsukuba) ISEC2023-32 SITE2023-26 BioX2023-35 HWS2023-32 ICSS2023-29 EMM2023-32 |
Classical polynomial-time algorithms for solving the discrete logarithm problem (DLP) over a prime field have not been f... [more] |
ISEC2023-32 SITE2023-26 BioX2023-35 HWS2023-32 ICSS2023-29 EMM2023-32 pp.119-126 |
ISEC |
2013-12-11 15:45 |
Tokyo |
Kikai-Shinko-Kaikan Bldg. |
Another Vulnerability in a Cancelable Biometrics Authentication Scheme Tetsuya Izu, Yumi Sakemi, Masahiko Takenaka, Naoya Torii (Fijitsu Labs.) ISEC2013-79 |
[more] |
ISEC2013-79 pp.39-45 |
EMM, ISEC, SITE, ICSS, IPSJ-CSEC, IPSJ-SPT [detail] |
2013-07-19 14:50 |
Hokkaido |
|
TLS with Pre-shared Key Extended by Identity-based Encryption Yumi Sakemi, Tetsuya Izu, Masahiko Takenaka (Fujitsu Labs.), Akira Kanaoka (Toho Univ.) ISEC2013-43 SITE2013-38 ICSS2013-48 EMM2013-45 |
TLS-PSK is a protocol to support mutual authentication based on pre-shared keys (PSKs). Since TLS-PSK does not need any ... [more] |
ISEC2013-43 SITE2013-38 ICSS2013-48 EMM2013-45 pp.315-321 |
ISEC |
2013-05-23 15:35 |
Tokyo |
Kikai-Shinko-Kaikan Bldg. |
Improvement in Addition formula on Elliptic Curves Yoshitaka Nagai (Future Univ. Hakodate), Tetsuya Izu (Fujitsu Lab), Masaaki Shirase (Future Univ. Hakodate) ISEC2013-7 |
It is important to speed up scalar multiplication in elliptic curve cryptosystem and then various speeding-up techniques... [more] |
ISEC2013-7 pp.39-46 |
ISEC |
2012-05-18 15:20 |
Tokyo |
Kikai-Shinko-Kaikan Bldg. |
A Report on SHARCS 2012 Masaya Yasuda, Tetsuya Izu, Takeshi Shimoyama, Jun Kogure (Fujitsu Lab.) ISEC2012-6 |
We report on the international conference SHARCS 2012, which is dedicated to the challenging subject of special-purpose ... [more] |
ISEC2012-6 pp.33-38 |
ISEC |
2011-12-14 13:15 |
Tokyo |
Kikai-Shinko-Kaikan Bldg. |
A Report on CHES 2011 Tetsuya Izu (FUJITSU Lab.), Atsuo Inomata (NAIST), Katsuyuki Okeya (Renesas Electronics), Ken Kawabata, Yuichi Komano (Toshiba), Kazuo Sakiyama (UEC), Yumi Sakemi (FUJITSU Lab.), Akashi Satoh (AIST), Yuji Suga (IIJ), Tsuyoshi Takagi (Kyusyu Univ.), Junko Takahashi (NTT), Yukiyasu Tsunoo (NEC), Shiho Moriai (Sony), Yohei Hori (AIST), Naofumi Homma (Tohoku Univ.) ISEC2011-65 |
(To be available after the conference date) [more] |
ISEC2011-65 pp.21-24 |
ISEC, IPSJ-CSEC, SITE, ICSS, EMM, IPSJ-SPT [detail] |
2011-07-13 15:20 |
Shizuoka |
Shizuoka University |
Solving DLP with Auxiliary Input over an Elliptic Curve Used in TinyTate Library (Part II) Yumi Sakemi, Tetsuya Izu, Masahiko Takenaka, Masaya Yasuda (Fujitsu Labs) ISEC2011-26 SITE2011-23 ICSS2011-31 EMM2011-25 |
The discrete logarithm problem with auxiliary input (DLPwAI) is a problem
to find a positive integer $\alpha$ from e... [more] |
ISEC2011-26 SITE2011-23 ICSS2011-31 EMM2011-25 pp.151-158 |
ISEC, IPSJ-CSEC, SITE, ICSS [detail] |
2010-07-02 15:20 |
Aomori |
Hirosaki University |
On the examination on speeding Cheon's algorithm Masaya Yasuda, Tetsuya Izu, Masahiko Takenaka (Fujitsu Lab.) ISEC2010-33 SITE2010-29 ICSS2010-39 |
[more] |
ISEC2010-33 SITE2010-29 ICSS2010-39 pp.173-180 |
ISEC, IPSJ-CSEC, SITE, ICSS [detail] |
2010-07-02 16:10 |
Aomori |
Hirosaki University |
DLP with Auxiliary Input and the Security of Cryptographic Protocols Tetsuya Izu, Masahiko Takenaka (FUJITSU Lab,), Goichiro Hanaoka (AIST), Masaya Yasuda (FUJITSU Lab,) ISEC2010-35 SITE2010-31 ICSS2010-41 |
The security of publick-key cryptographic protocols are reduced to the infeasibility of underlying mathematical problems... [more] |
ISEC2010-35 SITE2010-31 ICSS2010-41 pp.189-194 |
ISEC, IPSJ-CSEC, SITE, ICSS [detail] |
2010-07-02 16:35 |
Aomori |
Hirosaki University |
Cost Estimates of CNTW Attack against EMV Signatures Yumi Sakemi (Okayama Univ.), Tetsuya Izu, Masahiko Takenaka (FUJITSU Lab.), Yasuyuki Nogami, Yoshitaka Morikawa (Okayama Univ.) ISEC2010-36 SITE2010-32 ICSS2010-42 |
Specification of EMV signatures is an ISO/IEC 9796-2 compliant format with extra redundancy, and used for certifying cre... [more] |
ISEC2010-36 SITE2010-32 ICSS2010-42 pp.195-201 |
ISEC, LOIS |
2007-11-22 11:35 |
Hyogo |
Kobe University |
Reduction Optimal Polynomials over GF(3) with Four Terms Toshiya Nakajima (Fujitsu Ltd.), Tetsuya Izu (Fujitsu Laboratories Ltd.), Tsuyoshi Takagi (FUN) ISEC2007-103 OIS2007-75 |
In [10] we proposed to use the "Reduction Optimal Trinomials (ROTs)"
which make reduction in GF(3^m) multiplication eff... [more] |
ISEC2007-103 OIS2007-75 pp.27-32 |
ISEC |
2007-09-07 14:20 |
Tokyo |
Kikai-Shinko-Kaikan Bldg. |
CAIRN3: An FPGA Implementation of the Sieving Step with the Lattice Sieving Takeshi Shimoyama, Tetsuya Izu, Jun Kogure (FUJITSU) ISEC2007-84 |
The hardness of the integer factorization problem assures the security of some public-key cryptosystems including RSA, a... [more] |
ISEC2007-84 pp.77-83 |
ISEC, SITE, IPSJ-CSEC |
2007-07-20 14:40 |
Hokkaido |
Future University-Hakodate |
Partial Integrity Assurance Technology PIAT: An Application to Sender Domain Authentication Yoshiki Higashikado, Tetsuya Izu, Masahiko Takenaka, Takashi Yoshioka (FUJITSU Lab.) |
Recently, the sender domain authentication protocol DKIM (DomainKeys Identified Mail) attracts much attention, in which ... [more] |
ISEC2007-64 pp.129-132 |
ISEC, SITE, IPSJ-CSEC |
2007-07-20 16:10 |
Hokkaido |
Future University-Hakodate |
An Extension of Sanitizable and Deletable Signature Masami Izumi (UEC), Tetsuya Izu (FUJITSU Lab.), Noboru Kunihiro, Kazuo Ohta (UEC) ISEC2007-67 |
Sanitizable or deletable signatures attract much attention because of their privacy-perserving property
in which after ... [more] |
ISEC2007-67 pp.147-154 |
ISEC, SITE, IPSJ-CSEC |
2007-07-20 16:35 |
Hokkaido |
Future University-Hakodate |
(TBA) Masahiko Takenaka, Takeshi Shimoyama, Tetsuya Izu (Fujitsu Labs.) ISEC2007-68 |
[more] |
ISEC2007-68 pp.155-160 |
ISEC, LOIS |
2006-11-17 11:40 |
Chiba |
Univ. of Tokyo(Kashiwa Campus) |
A Survey on Dedicated Factoring Devices (Mini-factoring) Tetsuya Izu (FUJITSU), Noboru Kunihiro (UEC), Takeshi Shimoyama (FUJITSU) |
[more] |
ISEC2006-99 OIS2006-57 pp.27-32 |
ISEC, SITE, IPSJ-CSEC |
2006-07-20 11:10 |
Okayama |
Okayama Univ. |
A Survey on Dedicated Factoring Hardware (Relation Finding Step) Tetsuya Izu (FUJITSU), Noboru Kunihiro (UEC), Takeshi Shimoyama (FUJITSU) |
Dedicated factoring devices have attracted much attention since it might be a new threat for RSA. Among the Number Field... [more] |
ISEC2006-13 SITE2006-10 pp.27-34 |
ISEC, IPSJ-CSEC, SITE |
2005-07-22 14:15 |
Iwate |
Iwate Prefectural University |
Analysis on the Clockwise Transposition Routing for Dedicated Factoring Devices Tetsuya Izu (FUJITSU Lab./Univ. of Electro-Comm.), Noboru Kunihiro, Kazuo Ohta (Univ. of Electro-Comm.), Takeshi Shimoyama (FUJITSU Lab.) |
Recently, dedicated factoring devices have attracted much attention since it might be a threat for a current RSA-based P... [more] |
ISEC2005-57 pp.101-107 |
ISEC, IPSJ-CSEC |
2004-07-20 15:50 |
Tokushima |
Tokushima Univ. |
An Analysis of Feasibility for the Factoring Device TWIRL (I) Tetsuya Izu, Kouichi Itoh, Jun Kogure, Kiyoshi Kohiyama, Takeshi Shimoyama, Masahiko Takenaka, Naoya Torii, Shouichi Masui (Fujitsu Lab. LTD.), Kenji Mukaida (Fujitsu) |
This document reports an overview of our evaluation results of the dedicated factoring device TWIRL by reviewing the cir... [more] |
ISEC2004-23 pp.61-68 |
ISEC, IPSJ-CSEC |
2004-07-20 16:15 |
Tokushima |
Tokushima Univ. |
An Analysis of Feasibility for the Factoring Device TWIRL (II) Tetsuya Izu, Kouichi Itoh, Jun Kogure, Kiyoshi Kohiyama, Takeshi Shimoyama, Masahiko Takenaka, Naoya Torii, Shouichi Masui (Fujitsu Lab.), Kenji Mukaida (Fujitsu) |
[more] |
ISEC2004-24 pp.69-76 |