IEICE Technical Committee Submission System
Conference Schedule
Online Proceedings
[Sign in]
Tech. Rep. Archives
    [Japanese] / [English] 
( Committee/Place/Topics  ) --Press->
 
( Paper Keywords:  /  Column:Title Auth. Affi. Abst. Keyword ) --Press->

All Technical Committee Conferences  (Searched in: All Years)

Search Results: Conference Papers
 Conference Papers (Available on Advance Programs)  (Sort by: Date Descending)
 Results 1 - 6 of 6  /   
Committee Date Time Place Paper Title / Authors Abstract Paper #
QIT
(2nd)
2023-05-30
14:50
Kyoto Katsura Campus, Kyoto University Efficient Fault-Tolerant Approximate Quantum Fourier Transform by Precomputed Quantum States
Kento Oonishi (MELCO), Noboru Kunihiro (UTsukuba)
This paper proposes efficient approximate quantum Fourier transformunder fault-tolerant setting. Quantum Fourier transfo... [more]
QIT
(2nd)
2022-12-09
18:00
Kanagawa Keio Univ.
(Primary: On-site, Secondary: Online)
Shor's Algorithm Using Efficient Approximate Quantum Fourier Transform
Kento Oonishi (MELCO), Noboru Kunihiro (UTsukuba)
Shor's algorithm solves the integer factoring and the discrete logarithm problems in polynomial time. Therefore, the eva... [more]
QIT
(2nd)
2019-11-19
16:00
Tokyo Gakushuin University Proposal of Efficient Quantum Modular Addition Circuit and its Implementation
Kento Oonishi (UTokyo/ Keio Univ.), Tomoki Tanaka (MUFG/ MUFG Bank/ Keio Univ.), Shumpei Uno (MHIR/ Keio Univ.), Naoki Yamamoto (Keio Univ.), Noboru Kunihiro (Tsukuba Univ.)
In this paper, we propose more efficient quantum addition and modular addition circuits and estimate the number of quant... [more]
ISEC 2019-05-17
10:30
Tokyo Kikai-Shinko-Kaikan Bldg. [Invited Talk] Attacking Noisy Secret CRT-RSA Exponents in Binary Method (from ICISC 2018)
Kento Oonishi, Noboru Kunihiro (UTokyo) ISEC2019-2
In this presentation, we give a security evaluation on the RSA encryption scheme with the Chinese remainder theorem (CRT... [more] ISEC2019-2
p.3
IT, ISEC, WBS 2019-03-08
15:20
Tokyo University of Electro-Communications Key Reocvery Atttack on Ring-LWE Scheme Using Side-Channel Information in Number Theoretic Transform
Kento Oonishi, Noboru Kunihiro (Tokyo Univ.) IT2018-112 ISEC2018-118 WBS2018-113
Recently, the researches of post-quantum cryptography are conducted because of the realization of quantum computers in t... [more] IT2018-112 ISEC2018-118 WBS2018-113
pp.229-234
SITE, EMM, ISEC, ICSS, IPSJ-CSEC, IPSJ-SPT [detail] 2017-07-14
15:45
Tokyo   Recovering CRT-RSA Secret Keys Using the Information of the Operations Based on 2^m-ary Method.
Kento Oonishi, Noboru Kunihiro (Univ. of Tokyo) ISEC2017-22 SITE2017-14 ICSS2017-21 EMM2017-25
In side channel attacks, the secret keys are obtained from physical data in the implementation of the cryptosystem. For ... [more] ISEC2017-22 SITE2017-14 ICSS2017-21 EMM2017-25
pp.107-114
 Results 1 - 6 of 6  /   
Choose a download format for default settings. [NEW !!]
Text format pLaTeX format CSV format BibTeX format
Copyright and reproduction : All rights are reserved and no part of this publication may be reproduced or transmitted in any form or by any means, electronic or mechanical, including photocopy, recording, or any information storage and retrieval system, without permission in writing from the publisher. Notwithstanding, instructors are permitted to photocopy isolated articles for noncommercial classroom use without fee. (License No.: 10GA0019/12GB0052/13GB0056/17GB0034/18GB0034)


[Return to Top Page]

[Return to IEICE Web Page]


The Institute of Electronics, Information and Communication Engineers (IEICE), Japan