Committee |
Date Time |
Place |
Paper Title / Authors |
Abstract |
Paper # |
ICSS, ISEC, SITE, EMM, IPSJ-CSEC, IPSJ-SPT [detail] |
2014-07-04 14:15 |
Hokkaido |
San-Refure Hakodate |
Vulnerability in a Privacy-preserving Biometric Authentication by using Homomorphic Encryption Yumi Sakemi, Masahiko Takenaka, Naoya Torii, Masaya Yasuda (Fujitsu Labs. Ltd.) ISEC2014-41 SITE2014-36 ICSS2014-45 EMM2014-41 |
[more] |
ISEC2014-41 SITE2014-36 ICSS2014-45 EMM2014-41 pp.287-292 |
ICSS, ISEC, SITE, EMM, IPSJ-CSEC, IPSJ-SPT [detail] |
2014-07-04 14:40 |
Hokkaido |
San-Refure Hakodate |
Countermeasure to Attack against a Privacy-preserving Biometric Authentication by using Homomorphic Encryption Yumi Sakemi, Masahiko Takenaka, Naoya Torii, Masaya Yasuda (Fujitsu Labs. Ltd.) ISEC2014-42 SITE2014-37 ICSS2014-46 EMM2014-42 |
[more] |
ISEC2014-42 SITE2014-37 ICSS2014-46 EMM2014-42 pp.293-300 |
ISEC |
2013-12-11 15:45 |
Tokyo |
Kikai-Shinko-Kaikan Bldg. |
Another Vulnerability in a Cancelable Biometrics Authentication Scheme Tetsuya Izu, Yumi Sakemi, Masahiko Takenaka, Naoya Torii (Fijitsu Labs.) ISEC2013-79 |
[more] |
ISEC2013-79 pp.39-45 |
EMM, ISEC, SITE, ICSS, IPSJ-CSEC, IPSJ-SPT [detail] |
2013-07-19 14:50 |
Hokkaido |
|
TLS with Pre-shared Key Extended by Identity-based Encryption Yumi Sakemi, Tetsuya Izu, Masahiko Takenaka (Fujitsu Labs.), Akira Kanaoka (Toho Univ.) ISEC2013-43 SITE2013-38 ICSS2013-48 EMM2013-45 |
TLS-PSK is a protocol to support mutual authentication based on pre-shared keys (PSKs). Since TLS-PSK does not need any ... [more] |
ISEC2013-43 SITE2013-38 ICSS2013-48 EMM2013-45 pp.315-321 |
ISEC |
2011-12-14 13:15 |
Tokyo |
Kikai-Shinko-Kaikan Bldg. |
A Report on CHES 2011 Tetsuya Izu (FUJITSU Lab.), Atsuo Inomata (NAIST), Katsuyuki Okeya (Renesas Electronics), Ken Kawabata, Yuichi Komano (Toshiba), Kazuo Sakiyama (UEC), Yumi Sakemi (FUJITSU Lab.), Akashi Satoh (AIST), Yuji Suga (IIJ), Tsuyoshi Takagi (Kyusyu Univ.), Junko Takahashi (NTT), Yukiyasu Tsunoo (NEC), Shiho Moriai (Sony), Yohei Hori (AIST), Naofumi Homma (Tohoku Univ.) ISEC2011-65 |
(To be available after the conference date) [more] |
ISEC2011-65 pp.21-24 |
ISEC, IPSJ-CSEC, SITE, ICSS, EMM, IPSJ-SPT [detail] |
2011-07-13 15:20 |
Shizuoka |
Shizuoka University |
Solving DLP with Auxiliary Input over an Elliptic Curve Used in TinyTate Library (Part II) Yumi Sakemi, Tetsuya Izu, Masahiko Takenaka, Masaya Yasuda (Fujitsu Labs) ISEC2011-26 SITE2011-23 ICSS2011-31 EMM2011-25 |
The discrete logarithm problem with auxiliary input (DLPwAI) is a problem
to find a positive integer $\alpha$ from e... [more] |
ISEC2011-26 SITE2011-23 ICSS2011-31 EMM2011-25 pp.151-158 |
ISEC, IPSJ-CSEC, SITE, ICSS [detail] |
2010-07-02 16:35 |
Aomori |
Hirosaki University |
Cost Estimates of CNTW Attack against EMV Signatures Yumi Sakemi (Okayama Univ.), Tetsuya Izu, Masahiko Takenaka (FUJITSU Lab.), Yasuyuki Nogami, Yoshitaka Morikawa (Okayama Univ.) ISEC2010-36 SITE2010-32 ICSS2010-42 |
Specification of EMV signatures is an ISO/IEC 9796-2 compliant format with extra redundancy, and used for certifying cre... [more] |
ISEC2010-36 SITE2010-32 ICSS2010-42 pp.195-201 |
ISEC |
2009-12-16 15:20 |
Tokyo |
Kikai-Shinko-Kaikan Bldg. |
GLV Method for Non-Supersingular Paring-Friendly Curves of Embedding Degree 1 Shoichi Takeuchi, Tetsuya Izuta, Yumi Sakemi, Kazushi Nishii, Yasuyuki Nogami, Yoshitaka Morikawa (Okayama Univ.) ISEC2009-76 |
Recently, some pairing-based cryptographies that uses a non-supersingular pairing-friendly curve whose order has large p... [more] |
ISEC2009-76 pp.37-41 |
ISEC |
2009-09-25 15:20 |
Tokyo |
Kikai-Shinko-Kaikan Bldg. |
An Implementation of Tate Pairing with Non-Supersingular Curves of Embedding degree 1 Tetsuya Izuta, Yumi Sakemi, Kazushi Nishii, Shoichi Takeuchi, Yasuyuki Nogami, Yoshitaka Morikawa (Okayama Univ.) ISEC2009-48 |
Recently, pairing-based cryptographic applications such as ID-based cryptography have received much attention. On the ot... [more] |
ISEC2009-48 pp.59-64 |
ISEC, IPSJ-CSEC, SITE, ICSS [detail] |
2009-07-03 09:30 |
Akita |
Akita University |
Accelerating Cross Twisted Ate Pairing with Ordinary Pairing Friendly Curve of Composite Order That Has Two Large Prime Factors Yumi Sakemi, Kazushi Nishii, Tetsuya Izuta, Tatsuya Yuasa, Yasuyuki Nogami, Yoshitaka Morikawa (Okayama Univ.) ISEC2009-25 SITE2009-17 ICSS2009-39 |
Recently, pairing-based cryptographic applications such as ID-based cryptography have received much attention. On the ot... [more] |
ISEC2009-25 SITE2009-17 ICSS2009-39 pp.125-129 |
ISEC |
2009-05-22 13:00 |
Tokyo |
Kikai-Shinko-Kaikan Bldg. |
An Implementation of a Group Signature Scheme with Efficient Verifier-Local Revocation Check Amang Sudarsono, Toru Nakanishi, Yumi Sakemi, Yasuyuki Nogami, Nobuo Funabiki (Okayama Univ.) ISEC2009-6 |
A group signature scheme with efficient verifier-local revocation check has been proposed. This scheme provides a more e... [more] |
ISEC2009-6 pp.37-42 |
ISEC |
2009-05-22 13:50 |
Tokyo |
Kikai-Shinko-Kaikan Bldg. |
A Consideration on Generating Ordinary Pairing Friendly Curve of Composite Order That Has Two Large Prime Factors Kazushi Nishii, Yumi Sakemi, Yasuyuki Nogami, Yoshitaka Morikawa (Okayama Univ.) ISEC2009-8 |
Recently, pairing-based cryptographic applications such as ID-basedcryptography have received muchattention.
On the ot... [more] |
ISEC2009-8 pp.51-54 |
IT |
2007-07-20 11:25 |
Hyogo |
Kobe Univ. |
Constructing Self-Dual Normal Bases in Odd-Degree Extension Field Yumi Sakemi, Hiroaki Nasu, Ryo Nanba, Yasuyuki Nogami, Yoshitaka Morikawa (Okayama Univ.) IT2007-19 |
A self-dual normal basis only exists in odd-degree extension field when characteristic $p$ is an odd prime.
However, a ... [more] |
IT2007-19 pp.23-27 |