IEICE Technical Committee Submission System
Conference Schedule
Online Proceedings
[Sign in]
Tech. Rep. Archives
    [Japanese] / [English] 
( Committee/Place/Topics  ) --Press->
 
( Paper Keywords:  /  Column:Title Auth. Affi. Abst. Keyword ) --Press->

All Technical Committee Conferences  (Searched in: All Years)

Search Results: Conference Papers
 Conference Papers (Available on Advance Programs)  (Sort by: Date Descending)
 Results 21 - 40 of 40 [Previous]  /   
Committee Date Time Place Paper Title / Authors Abstract Paper #
SIP, IT, RCS 2021-01-22
16:45
Online Online Revisiting the IND-CPA Security of LWE Encryption Scheme
Takahiro Arai, Bagus Santoso, Kaoru Takemure (UEC) IT2020-111 SIP2020-89 RCS2020-202
In this paper, we propose a new simpler security notion which is
equivalence to the standard IND-CPA notion,
and base... [more]
IT2020-111 SIP2020-89 RCS2020-202
pp.271-276
QIT
(2nd)
2020-12-10
09:00
Online Online [Invited Talk] An Introduction to Provable Secure Post-Quantum Cryptography
Bagus Santoso (UEC)
Public key cryptographic schemes are essential to guarantee the security of network communication over an untrusted comm... [more]
IT 2020-09-04
11:35
Online Online A Secure Computation Protocal of Inner Product Using HQC Cryptosystem
Taiga Nakayama, Masanori Hirotomo (Saga Univ.), Youji Fukuta (Kindai Univ.), Masami Mohri (Gifu Univ.), Yoshiaki Shiraishi (Kobe Univ.) IT2020-23
In big data analysis and data mining, confidential data such as personal information is included in the data to be handl... [more] IT2020-23
pp.31-36
ISEC 2020-05-20
09:45
Online Online Isogeny based ring signature from CSIDH
Taisei Kiyama, Koutarou Suzuki (TUT) ISEC2020-1
CSIDH (Castryck, Lange, Martindale, Panny and Renes, ASIACRYPT ’18) is proposed as a post-quan- tum cryptography using i... [more] ISEC2020-1
pp.1-6
ISEC 2020-05-20
13:10
Online Online [Invited Talk] An Efficient F4-style Based Algorithm to Solve MQ Problems (from IWSEC 2019)
Takuma Ito, Naoyuki shinohara (NICT), Shigenori Uchiyama (TMU) ISEC2020-5
We introduce “An Efficient F4-style Based Algorithm to Solve MQ Problems”we presented in IWSEC 2019. [more] ISEC2020-5
p.25
ISEC 2020-05-20
14:10
Online Online [Invited Talk] How to Construct CSIDH on Edwards Curves (from CT-RSA 2020)
Tomoki Moriya, Hiroshi Onuki, Tsuyoshi Takagi (UTokyo) ISEC2020-8
CSIDH is an isogeny-based key-exchange protocol, that is one of the candidates for post-quantum cryptography. It is base... [more] ISEC2020-8
p.31
HWS, ICD [detail] 2019-11-01
14:15
Osaka DNP Namba SS Bld. A Design of Isogeny-Based Cryptographic Hardware Architecture Using Residue Number System
Shuto Funakoshi, Rei Ueno, Naofumi Homma (Tohoku Univ.) HWS2019-60 ICD2019-21
In this paper, we will propose an efficient hardware architecture of isogeny-based cryptography. The proposed architectu... [more] HWS2019-60 ICD2019-21
pp.19-24
ISEC, SITE, ICSS, EMM, HWS, BioX, IPSJ-CSEC, IPSJ-SPT [detail] 2019-07-23
14:00
Kochi Kochi University of Technology Generic Even-Mansour Construction Based on Group Actions
Hector Hougaard, Chen-Mou Cheng, Miyaji Atsuko (Graduate School of Engineering, Osaka Univ.) ISEC2019-37 SITE2019-31 BioX2019-29 HWS2019-32 ICSS2019-35 EMM2019-40
The Even-Mansour cipher over bit-strings can be broken using quantum computers as shown by Kuwakado and Morii, but Alagi... [more] ISEC2019-37 SITE2019-31 BioX2019-29 HWS2019-32 ICSS2019-35 EMM2019-40
pp.215-220
HWS, ISEC, SITE, ICSS, EMM, IPSJ-CSEC, IPSJ-SPT [detail] 2018-07-26
14:10
Hokkaido Sapporo Convention Center A New Embedding Method for Generalized LWE
Weiyao Wang, Yuntao Wang, Atsushi Takayasu, Tsuyoshi Takagi (Univ. Tokyo) ISEC2018-46 SITE2018-38 HWS2018-43 ICSS2018-49 EMM2018-45
Estimating the computational cost for solving learning with errors (LWE) problem is an indispensable research topic to u... [more] ISEC2018-46 SITE2018-38 HWS2018-43 ICSS2018-49 EMM2018-45
pp.363-370
ISEC 2018-05-16
16:00
Tokyo Ookayama Campus, Tokyo Institute of Technology [Invited Talk] Quantum Multicollision Finding Algorithm -- from ASIACRYPT 2017 --
Akinori Hosoyamada, Yu Sasaki, Keita Xagawa (NTT) ISEC2018-10
We introduce the paper ``Quantum Multicollision Finding Algorithm'' by Akinori Hosoyamada, Yu Sasaki, Keita Xagawa, whic... [more] ISEC2018-10
p.59
ICSS, IPSJ-SPT 2018-03-07
13:50
Hokkaido Okinawa Hokubu Koyou Nouryoku Kaihatsu Sougou Center An analysis of the Guo-Johansson-Stankovski attack against QC-MDPC codes
Yohei Maezawa, Tung Chou, Atsuko Miyaji (Osaka Univ,) ICSS2017-57
In ASIACRYPT 2016, the Guo-Johansson-Stankovski (GJS) attack appears as a key-recovery attack against code--based encryp... [more] ICSS2017-57
pp.37-42
ISEC, WBS, IT 2017-03-10
12:10
Tokyo TOKAI University Provable Secure Signature Scheme against Quantum Adversaries based on Decisional Isomorphism of Polynomials with Two Secrets
Bagus Santoso (UEC) IT2016-122 ISEC2016-112 WBS2016-98
Recent research has shown that signature schemes created using Fiat-Shamir transformation might be insecure against quan... [more] IT2016-122 ISEC2016-112 WBS2016-98
pp.149-154
ISEC 2016-09-02
13:25
Tokyo Kikai-Shinko-Kaikan Bldg. An Homomorphic Encryption based on some kind of Indeterminate Equations
Koichiro Akiyama (Toshiba), Yasuhiro Goto (HUE), Shinya Okumura (ISIT), Tsuyoshi Takagi (Kyushu Univ.), Koji Nuida, Goichiro Hanaoka (AIST) ISEC2016-43
Authors propose a homomorphic public-key encryption whose security is based on a LWE-like problem related to indetermina... [more] ISEC2016-43
pp.27-34
IT, ISEC, WBS 2016-03-11
11:15
Tokyo The University of Electro-Communications Performance Comparison of Multivariate Polynomial Encryption Schemes SRP and ABC
Takanori Yasuda (ISIT), Kouichi Sakurai (Kyushu Univ.) IT2015-134 ISEC2015-93 WBS2015-117
Multivariate public key cryptsystem (MPKC) is one candidate for post-quantum cryptosystem. For the signature scheme Rain... [more] IT2015-134 ISEC2015-93 WBS2015-117
pp.205-210
ICSS, ISEC, SITE, EMM, IPSJ-CSEC, IPSJ-SPT [detail] 2014-07-04
10:40
Hokkaido San-Refure Hakodate Cryptanalysis of a matrix variant of NTRU
Takanori Yasuda (ISIT), Yuya Yamaguchi (Kyushu Univ.), Xavier Dahan, Kouichi Sakurai (ISIT) ISEC2014-33 SITE2014-28 ICSS2014-37 EMM2014-33
Since its introduction in 1996, the cryptosystem NTRU has become a well-established candidate for the next generation pu... [more] ISEC2014-33 SITE2014-28 ICSS2014-37 EMM2014-33
pp.239-246
ISEC 2011-12-14
16:50
Tokyo Kikai-Shinko-Kaikan Bldg. [Invited Talk] Public-Key Identification Schemes based on Multivariate Quadratic Polynomials
Koichi Sakumoto, Taizo Shirai, Harunaga Hiwatari (Sony) ISEC2011-72
A problem of solving a system of multivariate quadratic polynomials over a finite field, which is called an MQ problem, ... [more] ISEC2011-72
p.39
ISEC, IPSJ-CSEC, SITE, ICSS [detail] 2010-07-02
09:00
Aomori Hirosaki University Proposal on MPKC Signature Scheme with Check Equations
Shigeo Tsujii, Masahito Gotaishi (Chuo University) ISEC2010-23 SITE2010-19 ICSS2010-29
A new signature system of multivariate public key cryptosystem (MPKC), which uses separate check equations in order to p... [more] ISEC2010-23 SITE2010-19 ICSS2010-29
pp.107-112
ISEC, LOIS 2009-11-13
09:00
Gifu Gifu Univ. Proposal on Multivariate Public Key Signature Scheme Applying the STS cryptosystem
Shigeo Tsujii, Masahito Gotaishi, Kohtaro Tadaki (Chuo Univ.) ISEC2009-59 LOIS2009-48
New signature scheme based on Stepwise Triangular Scheme (STS), which is one of the basic trapdoors of Multivariate Publ... [more] ISEC2009-59 LOIS2009-48
pp.55-60
ISEC, IPSJ-CSEC, SITE, ICSS [detail] 2009-07-03
10:20
Akita Akita University Proposal of Integrated MPKC: PPS -- STS Enhanced by Perturbed Piece In Hand Method --
Shigeo Tsujii, Kohtaro Tadaki, Masahito Gotaishi, Ryo Fujita (Chuo Univ.), Masao Kasahara (OGU) ISEC2009-27 SITE2009-19 ICSS2009-41
In this paper, we propose a new MPKC, called PPS, based on (i) the 2-layer nonlinear piece in hand method, (ii) Internal... [more] ISEC2009-27 SITE2009-19 ICSS2009-41
pp.139-146
ISEC, SITE, IPSJ-CSEC 2007-07-20
14:15
Hokkaido Future University-Hakodate A Generalized Merkle Signature Scheme
Erik Dahmen (TU Darmstadt), Camille Vuillaume, Katsuyuki Okeya (Hitachi), Elena Klintsevich, Johannes Buchmann (TU Darmstadt) ISEC2007-58
We propose GMSS, a new variant of the Merkle signature scheme. GMSS is the first Merkle-type signature scheme that allow... [more] ISEC2007-58
pp.89-96
 Results 21 - 40 of 40 [Previous]  /   
Choose a download format for default settings. [NEW !!]
Text format pLaTeX format CSV format BibTeX format
Copyright and reproduction : All rights are reserved and no part of this publication may be reproduced or transmitted in any form or by any means, electronic or mechanical, including photocopy, recording, or any information storage and retrieval system, without permission in writing from the publisher. Notwithstanding, instructors are permitted to photocopy isolated articles for noncommercial classroom use without fee. (License No.: 10GA0019/12GB0052/13GB0056/17GB0034/18GB0034)


[Return to Top Page]

[Return to IEICE Web Page]


The Institute of Electronics, Information and Communication Engineers (IEICE), Japan