|
|
All Technical Committee Conferences (Searched in: All Years)
|
|
Search Results: Conference Papers |
Conference Papers (Available on Advance Programs) (Sort by: Date Descending) |
|
Committee |
Date Time |
Place |
Paper Title / Authors |
Abstract |
Paper # |
QIT (2nd) |
2023-05-30 14:50 |
Kyoto |
Katsura Campus, Kyoto University |
Efficient Fault-Tolerant Approximate Quantum Fourier Transform by Precomputed Quantum States Kento Oonishi (MELCO), Noboru Kunihiro (UTsukuba) |
This paper proposes efficient approximate quantum Fourier transformunder fault-tolerant setting. Quantum Fourier transfo... [more] |
|
QIT (2nd) |
2022-12-09 18:00 |
Kanagawa |
Keio Univ. (Primary: On-site, Secondary: Online) |
Shor's Algorithm Using Efficient Approximate Quantum Fourier Transform Kento Oonishi (MELCO), Noboru Kunihiro (UTsukuba) |
Shor's algorithm solves the integer factoring and the discrete logarithm problems in polynomial time. Therefore, the eva... [more] |
|
QIT (2nd) |
2019-11-19 16:00 |
Tokyo |
Gakushuin University |
Proposal of Efficient Quantum Modular Addition Circuit and its Implementation Kento Oonishi (UTokyo/ Keio Univ.), Tomoki Tanaka (MUFG/ MUFG Bank/ Keio Univ.), Shumpei Uno (MHIR/ Keio Univ.), Naoki Yamamoto (Keio Univ.), Noboru Kunihiro (Tsukuba Univ.) |
In this paper, we propose more efficient quantum addition and modular addition circuits and estimate the number of quant... [more] |
|
ISEC |
2019-05-17 10:30 |
Tokyo |
Kikai-Shinko-Kaikan Bldg. |
[Invited Talk]
Attacking Noisy Secret CRT-RSA Exponents in Binary Method (from ICISC 2018) Kento Oonishi, Noboru Kunihiro (UTokyo) ISEC2019-2 |
In this presentation, we give a security evaluation on the RSA encryption scheme with the Chinese remainder theorem (CRT... [more] |
ISEC2019-2 p.3 |
IT, ISEC, WBS |
2019-03-08 15:20 |
Tokyo |
University of Electro-Communications |
Key Reocvery Atttack on Ring-LWE Scheme Using Side-Channel Information in Number Theoretic Transform Kento Oonishi, Noboru Kunihiro (Tokyo Univ.) IT2018-112 ISEC2018-118 WBS2018-113 |
Recently, the researches of post-quantum cryptography are conducted because of the realization of quantum computers in t... [more] |
IT2018-112 ISEC2018-118 WBS2018-113 pp.229-234 |
SITE, EMM, ISEC, ICSS, IPSJ-CSEC, IPSJ-SPT [detail] |
2017-07-14 15:45 |
Tokyo |
|
Recovering CRT-RSA Secret Keys Using the Information of the Operations Based on 2^m-ary Method. Kento Oonishi, Noboru Kunihiro (Univ. of Tokyo) ISEC2017-22 SITE2017-14 ICSS2017-21 EMM2017-25 |
In side channel attacks, the secret keys are obtained from physical data in the implementation of the cryptosystem. For ... [more] |
ISEC2017-22 SITE2017-14 ICSS2017-21 EMM2017-25 pp.107-114 |
|
|
|
Copyright and reproduction :
All rights are reserved and no part of this publication may be reproduced or transmitted in any form or by any means, electronic or mechanical, including photocopy, recording, or any information storage and retrieval system, without permission in writing from the publisher. Notwithstanding, instructors are permitted to photocopy isolated articles for noncommercial classroom use without fee. (License No.: 10GA0019/12GB0052/13GB0056/17GB0034/18GB0034)
|
[Return to Top Page]
[Return to IEICE Web Page]
|