Committee |
Date Time |
Place |
Paper Title / Authors |
Abstract |
Paper # |
RCC, ISEC, IT, WBS |
2024-03-13 16:35 |
Osaka |
Osaka Univ. (Suita Campus) |
Consideration on Definition Field for Efficient Ring-LWE Problem Rintaro Yamada, Shinya Okumura, Atsuko Miyaji (OU) IT2023-99 ISEC2023-98 WBS2023-87 RCC2023-81 |
Currently, as one of the candidates for the post-quantum cryptography, there are cryptosystems based on the difficulty o... [more] |
IT2023-99 ISEC2023-98 WBS2023-87 RCC2023-81 pp.158-165 |
ICSS |
2023-11-16 16:00 |
Ishikawa |
IT Business Plaza Musashi and Online (Primary: On-site, Secondary: Online) |
Security Analysis of MP-LWE using Weighted Lattice Reduction Yudai Tagawa, Shinya Okumura, Atsuko Miyaji (Osaka Univ.) ICSS2023-57 |
In 2017, Roşca et al. proposed the Middle-Product LWE (MP-LWE) problem, a new LWE problem variant. The MP-LWE problem mi... [more] |
ICSS2023-57 pp.42-48 |
RCC, ISEC, IT, WBS |
2023-03-14 10:30 |
Yamaguchi |
(Primary: On-site, Secondary: Online) |
Security Analysis for Ring-LWE Problem over the Maximal Real and Complex Subfields in Cyclotomic Field Satoshi Uesugi, Shinya Okumura, Miyaji Atsuko (Osaka Univ) IT2022-75 ISEC2022-54 WBS2022-72 RCC2022-72 |
The Learning With Errors problem (LWE) is a mathematical problem that supports the security of lattice based cryptograph... [more] |
IT2022-75 ISEC2022-54 WBS2022-72 RCC2022-72 pp.49-53 |
RCC, ISEC, IT, WBS |
2023-03-14 13:50 |
Yamaguchi |
(Primary: On-site, Secondary: Online) |
A Proposal of Defining Fields for Efficient Ring-LWE Based Cryptography Yuya Okubo, Shinya Okumura (Osaka Univ.), Atsuko Miyaji (Osaka Univ./JAIST) IT2022-91 ISEC2022-70 WBS2022-88 RCC2022-88 |
Currently, as a post-quantum computer cryptography, cryptography based on the difficulty of solving a mathematical probl... [more] |
IT2022-91 ISEC2022-70 WBS2022-88 RCC2022-88 pp.142-148 |
ICSS, IPSJ-SPT |
2023-03-13 17:30 |
Okinawa |
Okinawaken Seinenkaikan (Primary: On-site, Secondary: Online) |
Expanding Underlying Number Fields Reducing from Module-LWE to Ring-LWE Sosuke Funatsu, Atsuko Miyaji, Shinya Okumura (OU) ICSS2022-71 |
We have researched Learning with Errors(LWE) problem and Ring-LWE problem. Module-LWE problem is a version of RLWE probl... [more] |
ICSS2022-71 pp.139-144 |
IT, ISEC, RCC, WBS |
2022-03-10 14:15 |
Online |
Online |
Reconsideration of Attacks on the Search Ring-LWE Problem by Trace Map on Finite Field Tomoka Takahashi, Shinya Okumura, Atsuko Miyaji (Osaka Univ.) IT2021-105 ISEC2021-70 WBS2021-73 RCC2021-80 |
Lattice-based cryptography has attracted a great deal of attention due to the standardization of Post-Quantum Cryptograp... [more] |
IT2021-105 ISEC2021-70 WBS2021-73 RCC2021-80 pp.130-137 |
IT, ISEC, RCC, WBS |
2022-03-10 14:40 |
Online |
Online |
Crypto Analysis for Ring-LWE Problem on Subfield in Cyclotomic Field Satoshi Uesugi, Shinya Okumura, Atsuko Miyaji (OU) IT2021-106 ISEC2021-71 WBS2021-74 RCC2021-81 |
Since the proposal of the quantum computer, steady progress has been made toward its practical use. It has been reported... [more] |
IT2021-106 ISEC2021-71 WBS2021-74 RCC2021-81 pp.138-144 |
QIT (2nd) |
2021-05-24 10:10 |
Online |
Online |
Quantum-Classical Hybrid Algorithm for LWE Problems Yasuhito Kawano (Chubu Univ.) |
This paper introduces a quantum-inspired algorithm, called interpolation, that reduces an LWE problem to another problem... [more] |
|
SIP, IT, RCS |
2021-01-22 16:45 |
Online |
Online |
Revisiting the IND-CPA Security of LWE Encryption Scheme Takahiro Arai, Bagus Santoso, Kaoru Takemure (UEC) IT2020-111 SIP2020-89 RCS2020-202 |
In this paper, we propose a new simpler security notion which is
equivalence to the standard IND-CPA notion,
and base... [more] |
IT2020-111 SIP2020-89 RCS2020-202 pp.271-276 |
QIT (2nd) |
2019-11-18 11:50 |
Tokyo |
Gakushuin University |
On Attacking Next-Generation Public-Key Cryptography by Using LASOLV Yasuhito Kawano (NTT), Hiroshi Sekigawa (TUS) |
This paper proposes a method for attacking the LWE cryptography (lattice-based next-generation public-key cryptography) ... [more] |
|
IT, ISEC, WBS |
2019-03-08 15:20 |
Tokyo |
University of Electro-Communications |
Key Reocvery Atttack on Ring-LWE Scheme Using Side-Channel Information in Number Theoretic Transform Kento Oonishi, Noboru Kunihiro (Tokyo Univ.) IT2018-112 ISEC2018-118 WBS2018-113 |
Recently, the researches of post-quantum cryptography are conducted because of the realization of quantum computers in t... [more] |
IT2018-112 ISEC2018-118 WBS2018-113 pp.229-234 |
HWS, ICD |
2018-10-29 15:20 |
Osaka |
Kobe Univ. Umeda Intelligent Laboratory |
A Design and Implementation of Ring-LWE Cryptography Hardware Based on Number Theoretic Transform Sora Endo, Rei Ueno, Takafumi Aoki, Naofumi Homma (Tohoku Univ.) HWS2018-52 ICD2018-44 |
This paper presents an efficient Ring-LWE cryptographic hardware architecture based on number theoretic transformation. ... [more] |
HWS2018-52 ICD2018-44 pp.31-34 |