Committee |
Date Time |
Place |
Paper Title / Authors |
Abstract |
Paper # |
SIP, IT, RCS |
2021-01-22 16:45 |
Online |
Online |
Revisiting the IND-CPA Security of LWE Encryption Scheme Takahiro Arai, Bagus Santoso, Kaoru Takemure (UEC) IT2020-111 SIP2020-89 RCS2020-202 |
In this paper, we propose a new simpler security notion which is
equivalence to the standard IND-CPA notion,
and base... [more] |
IT2020-111 SIP2020-89 RCS2020-202 pp.271-276 |
QIT (2nd) |
2020-12-10 09:00 |
Online |
Online |
[Invited Talk]
An Introduction to Provable Secure Post-Quantum Cryptography Bagus Santoso (UEC) |
Public key cryptographic schemes are essential to guarantee the security of network communication over an untrusted comm... [more] |
|
IT |
2020-09-04 11:35 |
Online |
Online |
A Secure Computation Protocal of Inner Product Using HQC Cryptosystem Taiga Nakayama, Masanori Hirotomo (Saga Univ.), Youji Fukuta (Kindai Univ.), Masami Mohri (Gifu Univ.), Yoshiaki Shiraishi (Kobe Univ.) IT2020-23 |
In big data analysis and data mining, confidential data such as personal information is included in the data to be handl... [more] |
IT2020-23 pp.31-36 |
ISEC |
2020-05-20 09:45 |
Online |
Online |
Isogeny based ring signature from CSIDH Taisei Kiyama, Koutarou Suzuki (TUT) ISEC2020-1 |
CSIDH (Castryck, Lange, Martindale, Panny and Renes, ASIACRYPT ’18) is proposed as a post-quan- tum cryptography using i... [more] |
ISEC2020-1 pp.1-6 |
ISEC |
2020-05-20 13:10 |
Online |
Online |
[Invited Talk]
An Efficient F4-style Based Algorithm to Solve MQ Problems (from IWSEC 2019) Takuma Ito, Naoyuki shinohara (NICT), Shigenori Uchiyama (TMU) ISEC2020-5 |
We introduce “An Efficient F4-style Based Algorithm to Solve MQ Problems”we presented in IWSEC 2019. [more] |
ISEC2020-5 p.25 |
ISEC |
2020-05-20 14:10 |
Online |
Online |
[Invited Talk]
How to Construct CSIDH on Edwards Curves (from CT-RSA 2020) Tomoki Moriya, Hiroshi Onuki, Tsuyoshi Takagi (UTokyo) ISEC2020-8 |
CSIDH is an isogeny-based key-exchange protocol, that is one of the candidates for post-quantum cryptography. It is base... [more] |
ISEC2020-8 p.31 |
HWS, ICD [detail] |
2019-11-01 14:15 |
Osaka |
DNP Namba SS Bld. |
A Design of Isogeny-Based Cryptographic Hardware Architecture Using Residue Number System Shuto Funakoshi, Rei Ueno, Naofumi Homma (Tohoku Univ.) HWS2019-60 ICD2019-21 |
In this paper, we will propose an efficient hardware architecture of isogeny-based cryptography. The proposed architectu... [more] |
HWS2019-60 ICD2019-21 pp.19-24 |
ISEC, SITE, ICSS, EMM, HWS, BioX, IPSJ-CSEC, IPSJ-SPT [detail] |
2019-07-23 14:00 |
Kochi |
Kochi University of Technology |
Generic Even-Mansour Construction Based on Group Actions Hector Hougaard, Chen-Mou Cheng, Miyaji Atsuko (Graduate School of Engineering, Osaka Univ.) ISEC2019-37 SITE2019-31 BioX2019-29 HWS2019-32 ICSS2019-35 EMM2019-40 |
The Even-Mansour cipher over bit-strings can be broken using quantum computers as shown by Kuwakado and Morii, but Alagi... [more] |
ISEC2019-37 SITE2019-31 BioX2019-29 HWS2019-32 ICSS2019-35 EMM2019-40 pp.215-220 |
HWS, ISEC, SITE, ICSS, EMM, IPSJ-CSEC, IPSJ-SPT [detail] |
2018-07-26 14:10 |
Hokkaido |
Sapporo Convention Center |
A New Embedding Method for Generalized LWE Weiyao Wang, Yuntao Wang, Atsushi Takayasu, Tsuyoshi Takagi (Univ. Tokyo) ISEC2018-46 SITE2018-38 HWS2018-43 ICSS2018-49 EMM2018-45 |
Estimating the computational cost for solving learning with errors (LWE) problem is an indispensable research topic to u... [more] |
ISEC2018-46 SITE2018-38 HWS2018-43 ICSS2018-49 EMM2018-45 pp.363-370 |
ISEC |
2018-05-16 16:00 |
Tokyo |
Ookayama Campus, Tokyo Institute of Technology |
[Invited Talk]
Quantum Multicollision Finding Algorithm
-- from ASIACRYPT 2017 -- Akinori Hosoyamada, Yu Sasaki, Keita Xagawa (NTT) ISEC2018-10 |
We introduce the paper ``Quantum Multicollision Finding Algorithm'' by Akinori Hosoyamada, Yu Sasaki, Keita Xagawa, whic... [more] |
ISEC2018-10 p.59 |
ICSS, IPSJ-SPT |
2018-03-07 13:50 |
Hokkaido |
Okinawa Hokubu Koyou Nouryoku Kaihatsu Sougou Center |
An analysis of the Guo-Johansson-Stankovski attack against QC-MDPC codes Yohei Maezawa, Tung Chou, Atsuko Miyaji (Osaka Univ,) ICSS2017-57 |
In ASIACRYPT 2016, the Guo-Johansson-Stankovski (GJS) attack appears as a key-recovery attack against code--based encryp... [more] |
ICSS2017-57 pp.37-42 |
ISEC, WBS, IT |
2017-03-10 12:10 |
Tokyo |
TOKAI University |
Provable Secure Signature Scheme against Quantum Adversaries based on Decisional Isomorphism of Polynomials with Two Secrets Bagus Santoso (UEC) IT2016-122 ISEC2016-112 WBS2016-98 |
Recent research has shown that signature schemes created using Fiat-Shamir transformation might be insecure against quan... [more] |
IT2016-122 ISEC2016-112 WBS2016-98 pp.149-154 |
ISEC |
2016-09-02 13:25 |
Tokyo |
Kikai-Shinko-Kaikan Bldg. |
An Homomorphic Encryption based on some kind of Indeterminate Equations Koichiro Akiyama (Toshiba), Yasuhiro Goto (HUE), Shinya Okumura (ISIT), Tsuyoshi Takagi (Kyushu Univ.), Koji Nuida, Goichiro Hanaoka (AIST) ISEC2016-43 |
Authors propose a homomorphic public-key encryption whose security is based on a LWE-like problem related to indetermina... [more] |
ISEC2016-43 pp.27-34 |
IT, ISEC, WBS |
2016-03-11 11:15 |
Tokyo |
The University of Electro-Communications |
Performance Comparison of Multivariate Polynomial Encryption Schemes SRP and ABC Takanori Yasuda (ISIT), Kouichi Sakurai (Kyushu Univ.) IT2015-134 ISEC2015-93 WBS2015-117 |
Multivariate public key cryptsystem (MPKC) is one candidate for post-quantum cryptosystem. For the signature scheme Rain... [more] |
IT2015-134 ISEC2015-93 WBS2015-117 pp.205-210 |
ICSS, ISEC, SITE, EMM, IPSJ-CSEC, IPSJ-SPT [detail] |
2014-07-04 10:40 |
Hokkaido |
San-Refure Hakodate |
Cryptanalysis of a matrix variant of NTRU Takanori Yasuda (ISIT), Yuya Yamaguchi (Kyushu Univ.), Xavier Dahan, Kouichi Sakurai (ISIT) ISEC2014-33 SITE2014-28 ICSS2014-37 EMM2014-33 |
Since its introduction in 1996, the cryptosystem NTRU has become a well-established candidate for the next generation pu... [more] |
ISEC2014-33 SITE2014-28 ICSS2014-37 EMM2014-33 pp.239-246 |
ISEC |
2011-12-14 16:50 |
Tokyo |
Kikai-Shinko-Kaikan Bldg. |
[Invited Talk]
Public-Key Identification Schemes based on Multivariate Quadratic Polynomials Koichi Sakumoto, Taizo Shirai, Harunaga Hiwatari (Sony) ISEC2011-72 |
A problem of solving a system of multivariate quadratic polynomials over a finite field, which is called an MQ problem, ... [more] |
ISEC2011-72 p.39 |
ISEC, IPSJ-CSEC, SITE, ICSS [detail] |
2010-07-02 09:00 |
Aomori |
Hirosaki University |
Proposal on MPKC Signature Scheme with Check Equations Shigeo Tsujii, Masahito Gotaishi (Chuo University) ISEC2010-23 SITE2010-19 ICSS2010-29 |
A new signature system of multivariate public key cryptosystem (MPKC), which uses separate check equations in order to p... [more] |
ISEC2010-23 SITE2010-19 ICSS2010-29 pp.107-112 |
ISEC, LOIS |
2009-11-13 09:00 |
Gifu |
Gifu Univ. |
Proposal on Multivariate Public Key Signature Scheme Applying the STS cryptosystem Shigeo Tsujii, Masahito Gotaishi, Kohtaro Tadaki (Chuo Univ.) ISEC2009-59 LOIS2009-48 |
New signature scheme based on Stepwise Triangular Scheme (STS), which is one of the basic trapdoors of Multivariate Publ... [more] |
ISEC2009-59 LOIS2009-48 pp.55-60 |
ISEC, IPSJ-CSEC, SITE, ICSS [detail] |
2009-07-03 10:20 |
Akita |
Akita University |
Proposal of Integrated MPKC: PPS
-- STS Enhanced by Perturbed Piece In Hand Method -- Shigeo Tsujii, Kohtaro Tadaki, Masahito Gotaishi, Ryo Fujita (Chuo Univ.), Masao Kasahara (OGU) ISEC2009-27 SITE2009-19 ICSS2009-41 |
In this paper, we propose a new MPKC, called PPS, based on (i) the 2-layer nonlinear piece in hand method, (ii) Internal... [more] |
ISEC2009-27 SITE2009-19 ICSS2009-41 pp.139-146 |
ISEC, SITE, IPSJ-CSEC |
2007-07-20 14:15 |
Hokkaido |
Future University-Hakodate |
A Generalized Merkle Signature Scheme Erik Dahmen (TU Darmstadt), Camille Vuillaume, Katsuyuki Okeya (Hitachi), Elena Klintsevich, Johannes Buchmann (TU Darmstadt) ISEC2007-58 |
We propose GMSS, a new variant of the Merkle signature scheme. GMSS is the first Merkle-type signature scheme that allow... [more] |
ISEC2007-58 pp.89-96 |