|
|
All Technical Committee Conferences (Searched in: All Years)
|
|
Search Results: Conference Papers |
Conference Papers (Available on Advance Programs) (Sort by: Date Descending) |
|
Committee |
Date Time |
Place |
Paper Title / Authors |
Abstract |
Paper # |
WBS, IT, ISEC |
2009-03-10 16:05 |
Hokkaido |
Hakodate Mirai Univ. |
On the Security of Torus-based Cryptography and Pairing Inversion Problem Hirofumi Muratani, Tomoko Yonemura, Kenji Ohkuma, Taichi Isogai, Kenichiro Furuta, Yoshikazu Hanatani, Yuichi Komano, Hanae Nozaki, Atsushi Shimbo (Toshiba Corp.) IT2008-128 ISEC2008-186 WBS2008-141 |
[more] |
IT2008-128 ISEC2008-186 WBS2008-141 pp.551-556 |
ISEC |
2008-12-17 14:55 |
Tokyo |
Kikai-Shinko-Kaikan Bldg. |
Cryptosystems on Algebraic Tori
-- Some Efficient Algorithms for Squaring -- Tomoko Yonemura, Kenichiro Furuta, Yoshikazu Hanatani, Taichi Isogai, Yuichi Komano, Hirofumi Muratani, Hanae Nozaki, Kenji Ohkuma, Atsushi Shimbo (Toshiba Corp.) ISEC2008-97 |
To construct a efficient algebraic torus-based public key encryption scheme is one of our goals. An efficient scheme is ... [more] |
ISEC2008-97 pp.45-52 |
ISEC |
2008-12-17 15:20 |
Tokyo |
Kikai-Shinko-Kaikan Bldg. |
Fast Exponentiation Methods for Cryptosystems on Algebraic Tori Taichi Isogai, Kenji Ohkuma, Yuichi Komano, Atsushi Shimbo, Hanae Nozaki, Yoshikazu Hanatani, Kenichiro Furuta, Hirofumi Muratani, Tomoko Yonemura (Toshiba) ISEC2008-98 |
[more] |
ISEC2008-98 pp.53-60 |
ISEC, LOIS |
2008-11-13 15:15 |
Aichi |
Nagoya Noh Theater |
On the Hardness of Discrete Logarithm Problem in Algebraic Tori Hirofumi Muratani, Tomoko Yonemura, Taichi Isogai, Kenji Ohkuma, Yoshikazu Hanatani, Kenichiro Furuta, Yuichi Komano, Hanae Nozaki, Atsushi Shimbo (Toshiba Corporation) ISEC2008-78 OIS2008-54 |
[more] |
ISEC2008-78 OIS2008-54 pp.35-40 |
ISEC |
2008-09-12 14:40 |
Tokyo |
Kikai-Shinko-Kaikan Bldg. |
Cryptosystems on Algebraic Tori
-- Parameter Generation with Security and Efficiency -- Tomoko Yonemura, Kenichiro Furuta, Yoshikazu Hanatani, Taichi Isogai, Yuichi Komano, Hirofumi Muratani, Hanae Nozaki, Kenji Ohkuma, Atsushi Shimbo (TOSHIBA Corp.) ISEC2008-67 |
We study on algebraic tori defined on extension field as cryptographic groups to construct public key encryption schemes... [more] |
ISEC2008-67 pp.25-32 |
ISEC |
2007-09-07 14:45 |
Tokyo |
Kikai-Shinko-Kaikan Bldg. |
Tardos's Fingerprinting Codes Shortened by Optimizing Code Generation Probabilities and Improving Tracing Algorithm Taichi Isogai, Hirofumi Muratani (Toshiba) ISEC2007-85 |
[more] |
ISEC2007-85 pp.85-90 |
IT, ISEC, WBS |
2007-03-16 09:20 |
Gunma |
Gunma Univ. (Kiryu Campus) |
Computationally Sound Symbolic Criteria for UC-secure Multi-Party Mutual Authentication and Key Exchange Protocols Hirofumi Muratani, Yoshikazu Hanatani (Toshiba) |
[more] |
IT2006-95 ISEC2006-150 WBS2006-92 pp.59-64 |
ISEC |
2006-12-13 10:45 |
Tokyo |
Kikai-Shinko-Kaikan Bldg. |
On Formalization of Concurrent General Composition of Witness Indistinguishability Hirofumi Muratani (Toshiba) |
[more] |
ISEC2006-103 pp.11-16 |
ISEC, LOIS |
2006-11-17 10:10 |
Chiba |
Univ. of Tokyo(Kashiwa Campus) |
Reevaluation of Tardos's Code Taichi Isogai, Hirofumi Muratani (Toshiba) |
[more] |
ISEC2006-96 OIS2006-54 pp.7-12 |
ISEC |
2006-09-13 09:55 |
Tokyo |
Kikai-Shinko-Kaikan Bldg. |
A Method of Shortening Tardos's Fingerprinting Code Length by Optimizing Parameters Taichi Isogai, Hirofumi Muratani, Kenichiro Furuta (Toshiba) |
[more] |
ISEC2006-73 pp.9-14 |
ISEC, SITE, IPSJ-CSEC |
2006-07-21 10:45 |
Okayama |
Okayama Univ. |
Asymptotic Lower Bound on Round Complexity of Bounded Concurrent Black-Box Zero-Knowledge Proof Protocols Hirofumi Muratani (Toshiba) |
We derive a lower bound on the round complexity of an $m$-bounded concurrent black-box zero-knowledge interactive proof ... [more] |
ISEC2006-43 pp.19-26 |
ISEC |
2006-05-19 16:10 |
Tokyo |
Kikai-Shinko-Kaikan Bldg. |
General Composition of a Bounded Concurrent Black-Box Zero-Knowledge Protocol Hirofumi Muratani (TOSHIBA) |
We consider the round-complexity of an $m$-bounded concurrent black-box zero-knowledge interactive proof protocol. In th... [more] |
ISEC2006-7 pp.45-52 |
ISEC |
2005-09-16 15:45 |
Tokyo |
Kikai-Shinko-Kaikan Bldg. |
Precise Tardos Bound for Fingerprinting Codes Taichi Isogai, Hirofumi Muratani (Toshiba) |
``Fingerprinting'' is a technique that user's ID is embedded in digital contents. This technique is used for finding a m... [more] |
ISEC2005-85 pp.67-72 |
|
|
|
Copyright and reproduction :
All rights are reserved and no part of this publication may be reproduced or transmitted in any form or by any means, electronic or mechanical, including photocopy, recording, or any information storage and retrieval system, without permission in writing from the publisher. Notwithstanding, instructors are permitted to photocopy isolated articles for noncommercial classroom use without fee. (License No.: 10GA0019/12GB0052/13GB0056/17GB0034/18GB0034)
|
[Return to Top Page]
[Return to IEICE Web Page]
|