|
|
All Technical Committee Conferences (Searched in: All Years)
|
|
Search Results: Conference Papers |
Conference Papers (Available on Advance Programs) (Sort by: Date Descending) |
|
Committee |
Date Time |
Place |
Paper Title / Authors |
Abstract |
Paper # |
ICSS |
2013-03-25 11:10 |
Kanagawa |
Yokohama National University |
Design and Implementation of Application Framework for Pairing-based Cryptography Takuya Ban (Nagoya Inst. of Tech.), Masami Mohri (Gifu Univ.), Yoshiaki Shiraishi (Nagoya Inst. of Tech.) ICSS2012-59 |
Applications of pairing-based cryptography are searchable encryption, secure function evaluation and so on. To implement... [more] |
ICSS2012-59 pp.13-18 |
ISEC, LOIS |
2012-11-22 14:45 |
Shizuoka |
Shizuoka City Industry-University Exchange Center |
A New Explicit Relation between Trace, Definition Field, and Embedding Degree Atsuko Miyaji, Xiaonan Shi (JAIST) ISEC2012-69 LOIS2012-44 |
For pairing based cryptography we need elliptic curves defined over extension nite elds Fpm with
moderate embedding ... [more] |
ISEC2012-69 LOIS2012-44 pp.83-88 |
NS, RCS (Joint) |
2010-12-17 13:20 |
Okayama |
Okayama Univ. |
An Implementation of a Pairing-Based Anonymous Credential System with Constant Complexity Amang Sudarono, Toru Nakanishi, Nobuo Funabiki (Okayama Univ.) NS2010-135 |
An anonymous credential system allows the user to convince a verifier of the possession of a certificate issued by the i... [more] |
NS2010-135 pp.179-184 |
ISEC |
2009-09-25 15:20 |
Tokyo |
Kikai-Shinko-Kaikan Bldg. |
An Implementation of Tate Pairing with Non-Supersingular Curves of Embedding degree 1 Tetsuya Izuta, Yumi Sakemi, Kazushi Nishii, Shoichi Takeuchi, Yasuyuki Nogami, Yoshitaka Morikawa (Okayama Univ.) ISEC2009-48 |
Recently, pairing-based cryptographic applications such as ID-based cryptography have received much attention. On the ot... [more] |
ISEC2009-48 pp.59-64 |
ISEC, IPSJ-CSEC, SITE, ICSS [detail] |
2009-07-03 09:30 |
Akita |
Akita University |
Accelerating Cross Twisted Ate Pairing with Ordinary Pairing Friendly Curve of Composite Order That Has Two Large Prime Factors Yumi Sakemi, Kazushi Nishii, Tetsuya Izuta, Tatsuya Yuasa, Yasuyuki Nogami, Yoshitaka Morikawa (Okayama Univ.) ISEC2009-25 SITE2009-17 ICSS2009-39 |
Recently, pairing-based cryptographic applications such as ID-based cryptography have received much attention. On the ot... [more] |
ISEC2009-25 SITE2009-17 ICSS2009-39 pp.125-129 |
ISEC |
2009-05-22 13:50 |
Tokyo |
Kikai-Shinko-Kaikan Bldg. |
A Consideration on Generating Ordinary Pairing Friendly Curve of Composite Order That Has Two Large Prime Factors Kazushi Nishii, Yumi Sakemi, Yasuyuki Nogami, Yoshitaka Morikawa (Okayama Univ.) ISEC2009-8 |
Recently, pairing-based cryptographic applications such as ID-basedcryptography have received muchattention.
On the ot... [more] |
ISEC2009-8 pp.51-54 |
WBS, IT, ISEC |
2009-03-09 13:10 |
Hokkaido |
Hakodate Mirai Univ. |
[Invited Talk]
Advances in Public-Key Cryptography (RSA, ECC, IBE) Tsuyoshi Takagi (Future Univ. Hakodate.) IT2008-50 ISEC2008-108 WBS2008-63 |
We give a brief overview on the development of public-key cryptography starting with RSA cryptosystem. The most frequent... [more] |
IT2008-50 ISEC2008-108 WBS2008-63 pp.47-48 |
|
|
|
Copyright and reproduction :
All rights are reserved and no part of this publication may be reproduced or transmitted in any form or by any means, electronic or mechanical, including photocopy, recording, or any information storage and retrieval system, without permission in writing from the publisher. Notwithstanding, instructors are permitted to photocopy isolated articles for noncommercial classroom use without fee. (License No.: 10GA0019/12GB0052/13GB0056/17GB0034/18GB0034)
|
[Return to Top Page]
[Return to IEICE Web Page]
|