IEICE Technical Committee Submission System
Conference Schedule
Online Proceedings
[Sign in]
Tech. Rep. Archives
    [Japanese] / [English] 
( Committee/Place/Topics  ) --Press->
 
( Paper Keywords:  /  Column:Title Auth. Affi. Abst. Keyword ) --Press->

All Technical Committee Conferences  (Searched in: All Years)

Search Results: Conference Papers
 Conference Papers (Available on Advance Programs)  (Sort by: Date Descending)
 Results 1 - 12 of 12  /   
Committee Date Time Place Paper Title / Authors Abstract Paper #
RCC, ISEC, IT, WBS 2024-03-13
16:35
Osaka Osaka Univ. (Suita Campus) Consideration on Definition Field for Efficient Ring-LWE Problem
Rintaro Yamada, Shinya Okumura, Atsuko Miyaji (OU) IT2023-99 ISEC2023-98 WBS2023-87 RCC2023-81
Currently, as one of the candidates for the post-quantum cryptography, there are cryptosystems based on the difficulty o... [more] IT2023-99 ISEC2023-98 WBS2023-87 RCC2023-81
pp.158-165
ICSS 2023-11-16
16:00
Ishikawa IT Business Plaza Musashi and Online
(Primary: On-site, Secondary: Online)
Security Analysis of MP-LWE using Weighted Lattice Reduction
Yudai Tagawa, Shinya Okumura, Atsuko Miyaji (Osaka Univ.) ICSS2023-57
In 2017, Roşca et al. proposed the Middle-Product LWE (MP-LWE) problem, a new LWE problem variant. The MP-LWE problem mi... [more] ICSS2023-57
pp.42-48
RCC, ISEC, IT, WBS 2023-03-14
10:30
Yamaguchi
(Primary: On-site, Secondary: Online)
Security Analysis for Ring-LWE Problem over the Maximal Real and Complex Subfields in Cyclotomic Field
Satoshi Uesugi, Shinya Okumura, Miyaji Atsuko (Osaka Univ) IT2022-75 ISEC2022-54 WBS2022-72 RCC2022-72
The Learning With Errors problem (LWE) is a mathematical problem that supports the security of lattice based cryptograph... [more] IT2022-75 ISEC2022-54 WBS2022-72 RCC2022-72
pp.49-53
RCC, ISEC, IT, WBS 2023-03-14
13:50
Yamaguchi
(Primary: On-site, Secondary: Online)
A Proposal of Defining Fields for Efficient Ring-LWE Based Cryptography
Yuya Okubo, Shinya Okumura (Osaka Univ.), Atsuko Miyaji (Osaka Univ./JAIST) IT2022-91 ISEC2022-70 WBS2022-88 RCC2022-88
Currently, as a post-quantum computer cryptography, cryptography based on the difficulty of solving a mathematical probl... [more] IT2022-91 ISEC2022-70 WBS2022-88 RCC2022-88
pp.142-148
ICSS, IPSJ-SPT 2023-03-13
17:30
Okinawa Okinawaken Seinenkaikan
(Primary: On-site, Secondary: Online)
Expanding Underlying Number Fields Reducing from Module-LWE to Ring-LWE
Sosuke Funatsu, Atsuko Miyaji, Shinya Okumura (OU) ICSS2022-71
We have researched Learning with Errors(LWE) problem and Ring-LWE problem. Module-LWE problem is a version of RLWE probl... [more] ICSS2022-71
pp.139-144
IT, ISEC, RCC, WBS 2022-03-10
14:15
Online Online Reconsideration of Attacks on the Search Ring-LWE Problem by Trace Map on Finite Field
Tomoka Takahashi, Shinya Okumura, Atsuko Miyaji (Osaka Univ.) IT2021-105 ISEC2021-70 WBS2021-73 RCC2021-80
Lattice-based cryptography has attracted a great deal of attention due to the standardization of Post-Quantum Cryptograp... [more] IT2021-105 ISEC2021-70 WBS2021-73 RCC2021-80
pp.130-137
IT, ISEC, RCC, WBS 2022-03-10
14:40
Online Online Crypto Analysis for Ring-LWE Problem on Subfield in Cyclotomic Field
Satoshi Uesugi, Shinya Okumura, Atsuko Miyaji (OU) IT2021-106 ISEC2021-71 WBS2021-74 RCC2021-81
Since the proposal of the quantum computer, steady progress has been made toward its practical use. It has been reported... [more] IT2021-106 ISEC2021-71 WBS2021-74 RCC2021-81
pp.138-144
QIT
(2nd)
2021-05-24
10:10
Online Online Quantum-Classical Hybrid Algorithm for LWE Problems
Yasuhito Kawano (Chubu Univ.)
This paper introduces a quantum-inspired algorithm, called interpolation, that reduces an LWE problem to another problem... [more]
SIP, IT, RCS 2021-01-22
16:45
Online Online Revisiting the IND-CPA Security of LWE Encryption Scheme
Takahiro Arai, Bagus Santoso, Kaoru Takemure (UEC) IT2020-111 SIP2020-89 RCS2020-202
In this paper, we propose a new simpler security notion which is
equivalence to the standard IND-CPA notion,
and base... [more]
IT2020-111 SIP2020-89 RCS2020-202
pp.271-276
QIT
(2nd)
2019-11-18
11:50
Tokyo Gakushuin University On Attacking Next-Generation Public-Key Cryptography by Using LASOLV
Yasuhito Kawano (NTT), Hiroshi Sekigawa (TUS)
This paper proposes a method for attacking the LWE cryptography (lattice-based next-generation public-key cryptography) ... [more]
IT, ISEC, WBS 2019-03-08
15:20
Tokyo University of Electro-Communications Key Reocvery Atttack on Ring-LWE Scheme Using Side-Channel Information in Number Theoretic Transform
Kento Oonishi, Noboru Kunihiro (Tokyo Univ.) IT2018-112 ISEC2018-118 WBS2018-113
Recently, the researches of post-quantum cryptography are conducted because of the realization of quantum computers in t... [more] IT2018-112 ISEC2018-118 WBS2018-113
pp.229-234
HWS, ICD 2018-10-29
15:20
Osaka Kobe Univ. Umeda Intelligent Laboratory A Design and Implementation of Ring-LWE Cryptography Hardware Based on Number Theoretic Transform
Sora Endo, Rei Ueno, Takafumi Aoki, Naofumi Homma (Tohoku Univ.) HWS2018-52 ICD2018-44
This paper presents an efficient Ring-LWE cryptographic hardware architecture based on number theoretic transformation. ... [more] HWS2018-52 ICD2018-44
pp.31-34
 Results 1 - 12 of 12  /   
Choose a download format for default settings. [NEW !!]
Text format pLaTeX format CSV format BibTeX format
Copyright and reproduction : All rights are reserved and no part of this publication may be reproduced or transmitted in any form or by any means, electronic or mechanical, including photocopy, recording, or any information storage and retrieval system, without permission in writing from the publisher. Notwithstanding, instructors are permitted to photocopy isolated articles for noncommercial classroom use without fee. (License No.: 10GA0019/12GB0052/13GB0056/17GB0034/18GB0034)


[Return to Top Page]

[Return to IEICE Web Page]


The Institute of Electronics, Information and Communication Engineers (IEICE), Japan