IEICE Technical Committee Submission System
Conference Schedule
Online Proceedings
[Sign in]
Tech. Rep. Archives
    [Japanese] / [English] 
( Committee/Place/Topics  ) --Press->
 
( Paper Keywords:  /  Column:Title Auth. Affi. Abst. Keyword ) --Press->

All Technical Committee Conferences  (Searched in: All Years)

Search Results: Conference Papers
 Conference Papers (Available on Advance Programs)  (Sort by: Date Descending)
 Results 21 - 40 of 980 [Previous]  /  [Next]  
Committee Date Time Place Paper Title / Authors Abstract Paper #
RCC, ISEC, IT, WBS 2024-03-14
15:05
Osaka Osaka Univ. (Suita Campus) Improvement of non-interactive privacy-preserving document classification
Yuhei Kitahara (Tokyo Tech), Hibiki Oka, Akira Nakahashi (iric), Wakaha Ogata (Tokyo Tech) IT2023-120 ISEC2023-119 WBS2023-108 RCC2023-102
In the Machine Learning as a Service model, where clients delegate inference to servers, leakage of client inputs or mac... [more] IT2023-120 ISEC2023-119 WBS2023-108 RCC2023-102
pp.279-286
RCC, ISEC, IT, WBS 2024-03-14
16:35
Osaka Osaka Univ. (Suita Campus) Integral Attack with Bit-Based Division Property on Block Cipher LBC
Naoki Shibayama, Yasutaka Igarashi (Tokyo Univ. of Science) IT2023-131 ISEC2023-130 WBS2023-119 RCC2023-113
LBC is a block cipher proposed by Kapalova et al. in 2023. The block size is 64-bit, the secret key size is 80-bit, and ... [more] IT2023-131 ISEC2023-130 WBS2023-119 RCC2023-113
pp.350-357
RCC, ISEC, IT, WBS 2024-03-14
17:00
Osaka Osaka Univ. (Suita Campus) Reconstruction of Boyer quantum algorithm and its application to hash puzzles
Chris Idota, Yuichi Kaji (Nagoya Univ.) IT2023-132 ISEC2023-131 WBS2023-120 RCC2023-114
This study investigates the computational complexity of solving hash puzzles using quantum algorithms. A hash puzzle is ... [more] IT2023-132 ISEC2023-131 WBS2023-120 RCC2023-114
pp.358-365
NS, IN
(Joint)
2024-02-29
11:35
Okinawa Okinawa Convention Center High-speed Anonymous Communication on Programmable Switches Defeating Active De-anonymization Attacks
Yutaro Yoshinaka, Mio Kochiyama, Yuki Koizumi, Junji Takemasa, Toru Hasegawa (Osaka Univ.) NS2023-183
Lightweight anonymity protocol is a class of infrastructure-based anonymous communication providing the finest performan... [more] NS2023-183
pp.68-73
VLD, HWS, ICD 2024-03-01
12:05
Okinawa
(Primary: On-site, Secondary: Online)
Security Evaluation of Fault Analysis for SuperSonic
Shu Takemoto, Yusuke Nozaki, Masaya Yoshikawa (Meijo Univ.) VLD2023-126 HWS2023-86 ICD2023-115
SuperSonic, a low-latency lightweight block cipher, is suitable for securing edge devices with high real-time performanc... [more] VLD2023-126 HWS2023-86 ICD2023-115
pp.141-144
VLD, HWS, ICD 2024-03-01
15:55
Okinawa
(Primary: On-site, Secondary: Online)
Hardware Design Based on Full Parameter Support and Parallelism Optimization for Key Encapsulation Mechanism FIPS203
Yuto Nakamura, Makoto Ikeda (UTokyo) VLD2023-131 HWS2023-91 ICD2023-120
The emergence of quantum computers potentially threatens the security of traditional cryptographic techniques that depen... [more] VLD2023-131 HWS2023-91 ICD2023-120
pp.167-172
VLD, HWS, ICD 2024-03-01
16:20
Okinawa
(Primary: On-site, Secondary: Online)
An Efficient Hardware Approach for High-Speed SPHINCS+ Signature Generation
Yuta Takeshima, Makoto Ikeda (The Univ. of Tokyo) VLD2023-132 HWS2023-92 ICD2023-121
This study addresses the challenges traditional cryptographic systems face with the advent of quantum computers by focus... [more] VLD2023-132 HWS2023-92 ICD2023-121
pp.173-177
VLD, HWS, ICD 2024-03-02
10:50
Okinawa
(Primary: On-site, Secondary: Online)
Design of General Hardware for Optimal Strategy in Isogeny-Based Post-Quantum Cryptography
Kosei Nakamura, Makoto Ikeda (UT) VLD2023-137 HWS2023-97 ICD2023-126
The computation in isogeny-based post-quantum cryptography primarily consists of two operations: scalar multiplication o... [more] VLD2023-137 HWS2023-97 ICD2023-126
pp.198-203
VLD, HWS, ICD 2024-03-02
12:05
Okinawa
(Primary: On-site, Secondary: Online)
A Study on formal verification of GF(2^m) arithmetic circuits including states
Kazuho Sakoda (SCU/Kobe Univ.), Yasuyoshi Uemura (SCU), Naofumi Homma (Tohoku Univ.) VLD2023-140 HWS2023-100 ICD2023-129
This paper describes a formal verification method for arithmetic circuits based on computer algebra. Conventional method... [more] VLD2023-140 HWS2023-100 ICD2023-129
pp.215-220
LOIS, ICM 2024-01-26
11:25
Nagasaki Nagasaki Prefectural Art Museum
(Primary: On-site, Secondary: Online)
A VPN Method for Security Usage of Public Wireless LANs
Hinata Tanoue, Akihiro Shimizu (Kochi Univ. of Tech.) ICM2023-37 LOIS2023-41
In public wireless LAN environments, ensuring security is an important issue. An effective method for secure communicati... [more] ICM2023-37 LOIS2023-41
pp.51-56
EMM 2024-01-16
15:25
Miyagi Tohoku Univ.
(Primary: On-site, Secondary: Online)
[Invited Talk] Federated Learning with Enhanced Privacy Protection in AI
Lihua Wang (NICT) EMM2023-83
Federated learning is a crucial methodology in artificial intelligence where multiple organizations collaborate to perfo... [more] EMM2023-83
p.19
QIT
(2nd)
2023-12-17
17:30
Okinawa OIST
(Primary: On-site, Secondary: Online)
[Poster Presentation] Certified Deletion for Mult-bit Message Using Pseudorandom Functions
Duo XU (NU)
With the aid of quantum communication, one can delete messages from receiver’s memory. This is what so called Certified ... [more]
QIT
(2nd)
2023-12-17
17:30
Okinawa OIST
(Primary: On-site, Secondary: Online)
[Poster Presentation] Verification of identifiability of quantum states in quantum key delivery
Shunya Tajima, Atsushi Okamoto, Akihisa Tomita (hokudai)
In quantum key distribution, it is required that when creating the transmission state, the state is identical in all deg... [more]
ICM, NS, CQ, NV
(Joint)
2023-11-21
13:15
Ehime Ehime Prefecture Gender Equality Center
(Primary: On-site, Secondary: Online)
[Encouragement Talk] Security Evaluation of Low-latency Cipher based on Improved Simon against Deep Learning Analysis using Profiled Power Consumption
Shu Takemoto, Yusuke Nozaki, Masaya Yoshikawa (Meijo Univ.) NS2023-114
Society 5.0 aims to solve problems in social systems through the intercommunication of small devices. On the other hand,... [more] NS2023-114
pp.20-25
ICM, NS, CQ, NV
(Joint)
2023-11-22
10:30
Ehime Ehime Prefecture Gender Equality Center
(Primary: On-site, Secondary: Online)
[Invited Talk] Highly confidential and high-density data transmission technology in underwater optical wireless communication
Takahiro Kodama (Kagawa Univ.) NS2023-120
In the context of underwater optical communication, there is a demand for the design and development of transceivers tai... [more] NS2023-120
pp.56-61
ICSS 2023-11-16
14:30
Ishikawa IT Business Plaza Musashi and Online
(Primary: On-site, Secondary: Online)
Formal Verification of an Edge Computing Platform based on Modular Architecture using Intel SGX
Yuma Nishihira (Tokai Univ.), Hayato Kimura (Univ. of Hyogo), Toshihiro Ohigashi (Tokai Univ.) ICSS2023-54
The proliferation of IoT devices requires an edge computing infrastructure that can process large amounts of data in a f... [more] ICSS2023-54
pp.22-29
ICSS 2023-11-16
16:00
Ishikawa IT Business Plaza Musashi and Online
(Primary: On-site, Secondary: Online)
Security Analysis of MP-LWE using Weighted Lattice Reduction
Yudai Tagawa, Shinya Okumura, Atsuko Miyaji (Osaka Univ.) ICSS2023-57
In 2017, Roşca et al. proposed the Middle-Product LWE (MP-LWE) problem, a new LWE problem variant. The MP-LWE problem mi... [more] ICSS2023-57
pp.42-48
ICSS 2023-11-16
16:25
Ishikawa IT Business Plaza Musashi and Online
(Primary: On-site, Secondary: Online)
Redefinition of pair-PNB and application to ChaCha differential linear analysis
Kai Izumi, Atsuko Miyaji (Osaka Univ.) ICSS2023-58
ChaCha is the stream cipher adopted in TLS1.3 and analyzing its security is important given its wide deployment. Differe... [more] ICSS2023-58
pp.49-56
ICSS 2023-11-16
16:50
Ishikawa IT Business Plaza Musashi and Online
(Primary: On-site, Secondary: Online)
Improved Secret Key Transport mechanism using CSIDH
Kodai Hayashida, Atsuko Miyaji (Osaka Univ.) ICSS2023-59
In order to achieve secure communication over public networks,it is common practice to share keys and communicate
confi... [more]
ICSS2023-59
pp.57-63
VLD, DC, RECONF, ICD, IPSJ-SLDM [detail] 2023-11-16
13:20
Kumamoto Civic Auditorium Sears Home Yume Hall
(Primary: On-site, Secondary: Online)
Tamper Resistance Evaluation on FPGA for Low-Latency Cipher Sonic
Shu Takemoto, Yusuke Nozaki, Masaya Yoshikawa (Meijo Univ.) VLD2023-49 ICD2023-57 DC2023-56 RECONF2023-52
Industry 5.0 promotes smart factories for system optimization by utilizing IoT and AI in the industrial field. The smart... [more] VLD2023-49 ICD2023-57 DC2023-56 RECONF2023-52
pp.101-105
 Results 21 - 40 of 980 [Previous]  /  [Next]  
Choose a download format for default settings. [NEW !!]
Text format pLaTeX format CSV format BibTeX format
Copyright and reproduction : All rights are reserved and no part of this publication may be reproduced or transmitted in any form or by any means, electronic or mechanical, including photocopy, recording, or any information storage and retrieval system, without permission in writing from the publisher. Notwithstanding, instructors are permitted to photocopy isolated articles for noncommercial classroom use without fee. (License No.: 10GA0019/12GB0052/13GB0056/17GB0034/18GB0034)


[Return to Top Page]

[Return to IEICE Web Page]


The Institute of Electronics, Information and Communication Engineers (IEICE), Japan