|
|
All Technical Committee Conferences (Searched in: All Years)
|
|
Search Results: Conference Papers |
Conference Papers (Available on Advance Programs) (Sort by: Date Descending) |
|
Committee |
Date Time |
Place |
Paper Title / Authors |
Abstract |
Paper # |
ISEC |
2022-05-18 16:00 |
Online |
Online |
[Invited Talk]
Post-Quantum Anonymous One-Sided Authenticated Key Exchange without Random Oracles (from PKC 2022) Ren Ishibashi, Kazuki Yoneyama (Ibaraki Univ.) ISEC2022-6 |
Authenticated Key Exchange (AKE) is a cryptographic protocol to share a common session key among multiple parties. Usual... [more] |
ISEC2022-6 p.21 |
IT, ISEC, RCC, WBS |
2022-03-10 11:10 |
Online |
Online |
Post-Quantum Deterministic Wallets from Isogenies Muhammad Usman, Kazuki Yoneyama (Ibaraki Univ.) IT2021-91 ISEC2021-56 WBS2021-59 RCC2021-66 |
[more] |
IT2021-91 ISEC2021-56 WBS2021-59 RCC2021-66 pp.50-57 |
IT, ISEC, RCC, WBS |
2022-03-11 12:00 |
Online |
Online |
Improvement of Qubits for Quantum Collision Attacks against Reduced SHA-256 and SHA-512 Haruki Fukumura, Kazuki Yoneyama (Ibaraki Univ.) IT2021-116 ISEC2021-81 WBS2021-84 RCC2021-91 |
Hosoyamada and Sasaki showed first quantum collision attacks against 38 steps of SHA-256 and 39 steps of SHA-512. On the... [more] |
IT2021-116 ISEC2021-81 WBS2021-84 RCC2021-91 pp.196-203 |
SITE, ISEC, LOIS |
2021-11-12 13:50 |
Online |
Online |
Security notions of decryption-controllable identity-based encryption Hidekazu Miyanaga, Atsushi Fujioka, Taroh Sasaki (Kanagawa Univ.), Yuki Okano (NTT), Koutarou Suzuki (Toyohashi Univ. of Tech.), Kazuki Yoneyama (Ibaraki Univ.) ISEC2021-43 SITE2021-37 LOIS2021-26 |
In recent years, there have been increasing opportunities for a single user to have multiple devices. A similar situati... [more] |
ISEC2021-43 SITE2021-37 LOIS2021-26 pp.13-17 |
ISEC, IT, WBS |
2020-03-11 09:55 |
Hyogo |
University of Hyogo (Cancelled but technical report was issued) |
Toward Differential Characteristic Search of AES by Annealing Haruka Hirano, Shugo Kakimoto, Kazuki Yoneyama (Ibaraki Univ.), Junpei Yamaguchi (Fujitsu Lab.) IT2019-109 ISEC2019-105 WBS2019-58 |
At Inscypt 2011, Mouha et al. firstly proposed an application of mixed-integer linear programming (MILP) to cryptanalysi... [more] |
IT2019-109 ISEC2019-105 WBS2019-58 pp.127-133 |
IT, ISEC, WBS |
2019-03-07 15:55 |
Tokyo |
University of Electro-Communications |
Relationship between Authentication Reuse and Cryptographic Security Model on Authentication Protocol for Smart card and Reader/Writer Ryosuke Katsuno, Kazuki Yoneyama (Ibaraki Univ.) IT2018-87 ISEC2018-93 WBS2018-88 |
(To be available after the conference date) [more] |
IT2018-87 ISEC2018-93 WBS2018-88 pp.77-82 |
IT, ISEC, WBS |
2019-03-08 15:45 |
Tokyo |
University of Electro-Communications |
Verifiable Delegated Private Bit Comparison Naoki Shirai, Kazuki Yoneyama (Ibaraki Univ.) IT2018-113 ISEC2018-119 WBS2018-114 |
(To be available after the conference date) [more] |
IT2018-113 ISEC2018-119 WBS2018-114 pp.235-242 |
ISEC |
2014-05-09 16:10 |
Tokyo |
Kikai-Shinko-Kaikan Bldg. |
A Report on ASIACRYPT2013 Kazuki Yoneyama (NTT) ISEC2014-7 |
[more] |
ISEC2014-7 pp.43-46 |
ISEC, IT, WBS |
2008-02-28 11:10 |
Tokyo |
|
Random Oracle Model with Inspection of Hash List Kazuki Yoneyama, Satoshi Miyagawa, Kazuo Ohta (UEC) IT2007-34 ISEC2007-131 WBS2007-65 |
[more] |
IT2007-34 ISEC2007-131 WBS2007-65 pp.15-21 |
ISEC |
2007-12-19 16:10 |
Tokyo |
Kikai-Shinko-Kaikan Bldg. |
Attribute-Based Encryption with Partially Hidden Ciphertext Policies Takashi Nishide (Univ. of Electro-Comm./Hitachi Software), Kazuki Yoneyama, Kazuo Ohta (Univ. of Electro-Comm.) ISEC2007-125 |
We propose an attribute-based encryption scheme where encryptor-specified
policies are hidden.
By using our scheme, an... [more] |
ISEC2007-125 pp.93-100 |
IT, ISEC, WBS |
2007-03-16 08:30 |
Gunma |
Gunma Univ. (Kiryu Campus) |
On the Security of Secret Handshake Kazuki Yoneyama, Yutaka Kawai, Takahiro Kondo, Kazuo Ohta, Noboru Kunihiro (UEC) |
[more] |
IT2006-93 ISEC2006-148 WBS2006-90 pp.47-52 |
|
|
|
Copyright and reproduction :
All rights are reserved and no part of this publication may be reproduced or transmitted in any form or by any means, electronic or mechanical, including photocopy, recording, or any information storage and retrieval system, without permission in writing from the publisher. Notwithstanding, instructors are permitted to photocopy isolated articles for noncommercial classroom use without fee. (License No.: 10GA0019/12GB0052/13GB0056/17GB0034/18GB0034)
|
[Return to Top Page]
[Return to IEICE Web Page]
|