IEICE Technical Committee Submission System
Conference Schedule
Online Proceedings
[Sign in]
Tech. Rep. Archives
    [Japanese] / [English] 
( Committee/Place/Topics  ) --Press->
 
( Paper Keywords:  /  Column:Title Auth. Affi. Abst. Keyword ) --Press->

All Technical Committee Conferences  (Searched in: All Years)

Search Results: Conference Papers
 Conference Papers (Available on Advance Programs)  (Sort by: Date Descending)
 Results 1 - 6 of 6  /   
Committee Date Time Place Paper Title / Authors Abstract Paper #
ISEC 2023-05-17
14:45
Tokyo Kikai-Shinko-Kaikan Bldg. BDD enumeration for Module-LWE using lattice rotation structure
Togo Sakurai, Atsushi Takayasu (The Univ. of Tokyo) ISEC2023-10
Module-LWE is the analog of LWE that includes algebraic structures. In July 2022, two cryptographic schemes based on Mod... [more] ISEC2023-10
pp.54-61
ICD, HWS [detail] 2020-10-26
11:20
Online Online Feasibility of lattice attacks on ECDSA
Kotaro Abe, Makoto Ikeda (Tokyo Univ.) HWS2020-30 ICD2020-19
ECDSA secret key is recovered via lattice attacks when only a few bits of nonce$(k)$ are leaked. In this paper, we evalu... [more] HWS2020-30 ICD2020-19
pp.30-35
ISEC, SITE, LOIS 2019-11-01
14:00
Osaka Osaka Univ. Lattice basis reduction over projected lattices and its application to solving the LWE problem
Satoshi Nakamura, Nariaki Tateiwa (Kyushu Univ.), Koha Kinjo (NTT), Yasuhiko Ikematsu, Masaya Yasuda (Kyushu Univ.) ISEC2019-68 SITE2019-62 LOIS2019-27
The security of modern lattice-based schemes is based on the computational hardness of solving the learning with errors ... [more] ISEC2019-68 SITE2019-62 LOIS2019-27
pp.41-48
SITE, EMM, ISEC, ICSS, IPSJ-CSEC, IPSJ-SPT [detail] 2017-07-14
16:10
Tokyo   Report of solving SVP's by using DeepLLL
Junpei Yamaguchi, Masaya Yasuda (Kyushu Univ.) ISEC2017-23 SITE2017-15 ICSS2017-22 EMM2017-26
Lattice-based cryptography is based on the computational herdbess of lattice problems such as Shortest vector problem (S... [more] ISEC2017-23 SITE2017-15 ICSS2017-22 EMM2017-26
pp.115-122
ISEC 2016-09-02
15:30
Tokyo Kikai-Shinko-Kaikan Bldg. [Invited Talk] Security estimation for lattice based cryptosystems by progressive BKZ algorithm (From Eurocrypt 2016)
Yoshinori Aono (NICT), Yuntao Wang (Kyushu Univ.), Takuya Hayashi (NICT), Tsuyoshi Takagi (Kyushu Univ.) ISEC2016-47
We introduce the paper “Improved Progressive BKZ Algorithms and their Precise Cost Estimation by Sharp Simulator” in Eur... [more] ISEC2016-47
p.57
ISEC 2012-09-21
10:10
Tokyo Kikai-Shinko-Kaikan Bldg. Heuristic improvements of BKZ 2.0
Yoshinori Aono (NICT), Ken Naganuma (Hitachi) ISEC2012-45
It has been considered an important problem to figure out practical intractability of
the shortest (closest) vector pr... [more]
ISEC2012-45
pp.15-22
 Results 1 - 6 of 6  /   
Choose a download format for default settings. [NEW !!]
Text format pLaTeX format CSV format BibTeX format
Copyright and reproduction : All rights are reserved and no part of this publication may be reproduced or transmitted in any form or by any means, electronic or mechanical, including photocopy, recording, or any information storage and retrieval system, without permission in writing from the publisher. Notwithstanding, instructors are permitted to photocopy isolated articles for noncommercial classroom use without fee. (License No.: 10GA0019/12GB0052/13GB0056/17GB0034/18GB0034)


[Return to Top Page]

[Return to IEICE Web Page]


The Institute of Electronics, Information and Communication Engineers (IEICE), Japan