IEICE Technical Committee Submission System
Conference Schedule
Online Proceedings
[Sign in]
Tech. Rep. Archives
    [Japanese] / [English] 
( Committee/Place/Topics  ) --Press->
 
( Paper Keywords:  /  Column:Title Auth. Affi. Abst. Keyword ) --Press->

All Technical Committee Conferences  (Searched in: All Years)

Search Results: Conference Papers
 Conference Papers (Available on Advance Programs)  (Sort by: Date Descending)
 Results 1 - 20 of 79  /  [Next]  
Committee Date Time Place Paper Title / Authors Abstract Paper #
NLP 2022-08-02
09:50
Online Online Characteristics of degree period of commutative polynomials defined by fourth-order recurrence relations with two variables over Z2K
Takuma Nishizaka, Daisaburo Yoshioka (Sojo Univ.) NLP2022-28
In recent years, a public-key cryptosystem based on Chebyshev polynomials over Z_{2^k} has been presented. Unfortunately... [more] NLP2022-28
pp.11-14
ISEC 2020-05-20
13:10
Online Online [Invited Talk] An Efficient F4-style Based Algorithm to Solve MQ Problems (from IWSEC 2019)
Takuma Ito, Naoyuki shinohara (NICT), Shigenori Uchiyama (TMU) ISEC2020-5
We introduce “An Efficient F4-style Based Algorithm to Solve MQ Problems”we presented in IWSEC 2019. [more] ISEC2020-5
p.25
ISEC, SITE, ICSS, EMM, HWS, BioX, IPSJ-CSEC, IPSJ-SPT [detail] 2019-07-24
13:45
Kochi Kochi University of Technology 3 Layers Public Key Cryptosystem with a Short Tandem Repeat DNA for Ultimate Personal Identification -- Introduction of Short Tandem Repeat Coupled with Mai Nanbaa and its Application --
Shigeo Tsujii, Toshiaki Saisho, Masao Yamasawa, Ko Shikata (Chuo Univ.), Koji Sasaki, Nobuharu Suzuki (Ad.) ISEC2019-52 SITE2019-46 BioX2019-44 HWS2019-47 ICSS2019-50 EMM2019-55
Considering the current situation, where personal verification with digital authentication is becoming important in the ... [more] ISEC2019-52 SITE2019-46 BioX2019-44 HWS2019-47 ICSS2019-50 EMM2019-55
pp.341-346
WBS, IT, ISEC 2018-03-09
16:10
Tokyo Katsusika Campas, Tokyo University of Science Attacks on several Multivariate PKCs -- Attack on K(AVII)MVPKC --
Ryuichi Sakai (Osaka Electro-Communication Univ.), Masao Kasahara (Waseda Univ.) IT2017-138 ISEC2017-126 WBS2017-119
One of the anthers, Kasahara, have been proposed several public key cryptosystems based on multivariate polynomials wit... [more] IT2017-138 ISEC2017-126 WBS2017-119
pp.207-212
IT 2017-09-08
09:00
Yamaguchi Centcore Yamaguchi Hotel A solution of degree determination problem of Chebyshev polynomials over Z/p^kZ
Daisaburo Yoshioka (Sojo Univ.) IT2017-38
Recently, a public key cryptosystem employing Chebyshev polynomials over a residue ring of integers has been proposed. T... [more] IT2017-38
pp.1-4
IT, ISEC, WBS 2016-03-11
11:15
Tokyo The University of Electro-Communications Performance Comparison of Multivariate Polynomial Encryption Schemes SRP and ABC
Takanori Yasuda (ISIT), Kouichi Sakurai (Kyushu Univ.) IT2015-134 ISEC2015-93 WBS2015-117
Multivariate public key cryptsystem (MPKC) is one candidate for post-quantum cryptosystem. For the signature scheme Rain... [more] IT2015-134 ISEC2015-93 WBS2015-117
pp.205-210
NLP 2015-07-22
10:25
Hokkaido Bibai Onsen Yu-rinkan A solution on the degree determination problem of Chebyshev polynomials over the residue ring Z/2^kZ
Kento Kawano, Daisaburo Yoshioka (Sojo Univ.) NLP2015-77
A public key cryptosystem based on Chebyshev polynomials over the residue ring Z/2^k Z is recently introduced. In this p... [more] NLP2015-77
pp.53-56
IPSJ-CSEC, ISEC, SITE, ICSS, EMM, IPSJ-SPT [detail] 2015-07-03
11:05
Aichi NAGOYA TRADE & INDUSTRY CENTER Proposal of Accelerating XL algorithm by Assigning Constants to Variables
Masahito Gotaishi, Shigeo Tsujii (Chuo Univ.) ISEC2015-23 SITE2015-21 ICSS2015-33 EMM2015-31
The Fixing strategy, which has been long used in XL algorithm is improved so that more variables can be fi xed. This imp... [more] ISEC2015-23 SITE2015-21 ICSS2015-33 EMM2015-31
pp.137-142
ISEC, LOIS, SITE 2014-11-21
13:25
Hyogo   Accelerating QUAD Stream Cipher using Multi-Stream Method on Graphics Processing Unit
Satoshi Tanaka (ISIT/Kyushu Univ.), Chen-Mou Cheng (Kyushu Univ.), Takanori Yasuda (ISIT), Kouichi Sakurai (ISIT/Kyushu Univ.) ISEC2014-56 SITE2014-47 LOIS2014-26
QUAD is a stream cipher with a provable security based on the theory of multivariate public-key cryptography. However, Q... [more] ISEC2014-56 SITE2014-47 LOIS2014-26
pp.1-6
NLP, CAS 2014-10-16
16:45
Ehime Ehime University Periodical property of Chebyshev polynomials on the residue class rings modulo 2^w
Atsushi Iwasaki, Ken Umeno (Kyoto Univ.) CAS2014-67 NLP2014-61
The odd degree Chebyshev polynomials are known to be permutation polynomials on the residue class rings modulo $2^w$,
... [more]
CAS2014-67 NLP2014-61
pp.81-86
ICSS, ISEC, SITE, EMM, IPSJ-CSEC, IPSJ-SPT [detail] 2014-07-04
10:40
Hokkaido San-Refure Hakodate Cryptanalysis of a matrix variant of NTRU
Takanori Yasuda (ISIT), Yuya Yamaguchi (Kyushu Univ.), Xavier Dahan, Kouichi Sakurai (ISIT) ISEC2014-33 SITE2014-28 ICSS2014-37 EMM2014-33
Since its introduction in 1996, the cryptosystem NTRU has become a well-established candidate for the next generation pu... [more] ISEC2014-33 SITE2014-28 ICSS2014-37 EMM2014-33
pp.239-246
ICSS, IA 2014-06-05
16:15
Hyogo Takikawa Memorial Hall, Kobe University Attack on Knapsack Cryptography by Using Intermediary Plaintext
Yoshihiro Kusanagi, Atsushi Nagao, Masakatu Morii (Kobe Univ.) IA2014-3 ICSS2014-3
Knapsack cryptography is the public key cryptosystem based on knapsack problem (especially subset sum problem).
Density... [more]
IA2014-3 ICSS2014-3
pp.9-14
ISEC 2014-05-09
13:35
Tokyo Kikai-Shinko-Kaikan Bldg. An Interorganizational Cryptosystem Using RSA PKC
Yasuyuki Murakami (OECU), Masao Kasahara (Waseda Univ./Chuo Univ.) ISEC2014-2
Usual cryptosystems suppose the personal communication.
However, the secure and effecitive communication system
is des... [more]
ISEC2014-2
pp.7-12
EMM, ISEC, SITE, ICSS, IPSJ-CSEC, IPSJ-SPT [detail] 2013-07-19
11:05
Hokkaido   Cryptanalysis of Rainbow Signature -- Enrico, you should have hacked further --
Masahito Gotaishi, Shigeo Tsujii (Chuo Univ.) ISEC2013-39 SITE2013-34 ICSS2013-44 EMM2013-41
Thomae et al. have proposed cryptanalysis of Rainbow, a multivariate public key signature system.
The methodology of so... [more]
ISEC2013-39 SITE2013-34 ICSS2013-44 EMM2013-41
pp.275-279
SIS 2013-06-13
13:00
Kagoshima Houzan Hall (Kagoshima) [Tutorial Lecture] Signal Processing in the Encrypted Domain -- Development of a New Technique for Secure Manipulation of Signals --
Akio Miyazaki (Kyushu Sangyo Univ.) SIS2013-4
We have established the fundamental techniques for computing with signals that are encrypted or otherwise hidden often r... [more] SIS2013-4
pp.17-21
IE 2013-04-26
15:25
Tokyo Chuo Univ. Morphological pattern spectrum based image-manipulation detection
Tomohiro Takeda, Yasushi Tsukada, Takeshi Kumaki, Takeshi Ogura, Takeshi Fujino (Ritsumeikan Univ.) IE2013-5
Because of development of semiconductor technology, the demand for analog image has been declining recently as the techn... [more] IE2013-5
pp.23-28
IT, ISEC, WBS 2013-03-07
15:30
Osaka Kwansei Gakuin Univ., Osaka-Umeda Campus A knapsack cryptosystem with a randomly signed key
Akira Hayashi (Kanazawa Inst. of Tech.) IT2012-83 ISEC2012-101 WBS2012-69
The knapsack cryptosystem invented by Merkle and Hellman is broken with high probability by Shamir's attack. A novel cr... [more] IT2012-83 ISEC2012-101 WBS2012-69
pp.139-141
ISEC 2012-09-21
15:50
Tokyo Kikai-Shinko-Kaikan Bldg. New Classes of Public Key Cryptosystems with Concealed Equations of Very High Degree Constructed Based on Cyclic Codes, K(X)SE(1)PKC, K(XVI)SE(2)PKC, Realizing Coding Rate of Exactly 1.0, along with K(III)ΣΠPKC
Masao Kasahara (21st ICRC) ISEC2012-53
In this paper, we first present a new class of public-key cryptosystems, K(X)BASESE(1)PKC based on cyclic codes. Althoug... [more] ISEC2012-53
pp.43-50
EMM, ISEC, SITE, ICSS, IPSJ-CSEC, IPSJ-SPT [detail] 2012-07-20
16:15
Hokkaido   Construction of the Tsujii-Shamir-Kasahara (TSK) Multivariate Public Key Cryptosystem, which relies on the Difficulty of Prime Factorization
Shigeo Tsujii, Masahito Gotaishi (Chuo Univ.) ISEC2012-39 SITE2012-35 ICSS2012-41 EMM2012-31
A new multivariate public-key cryptosystem (MPKC) is proposed. Unlike conventional MPKC system,
the polynomials in the ... [more]
ISEC2012-39 SITE2012-35 ICSS2012-41 EMM2012-31
pp.213-216
ISEC 2012-05-18
14:55
Tokyo Kikai-Shinko-Kaikan Bldg. Construction of New Classes of Product-sum Type Public Key Cryptosystem, K(II)ΣΠPKC, Constructed Based on the Maximum Length Code -- A Possibility of Opening Up a New Field of Applications of Cryptosystem --
Masao Kasahara (21stCICRC) ISEC2012-5
In this paper, we present a new class of knapsack type PKC referred to as K(\ii)$\Sigma\Pi$PKC.
In K(\ii)$\Sigma\Pi$PK... [more]
ISEC2012-5
pp.25-32
 Results 1 - 20 of 79  /  [Next]  
Choose a download format for default settings. [NEW !!]
Text format pLaTeX format CSV format BibTeX format
Copyright and reproduction : All rights are reserved and no part of this publication may be reproduced or transmitted in any form or by any means, electronic or mechanical, including photocopy, recording, or any information storage and retrieval system, without permission in writing from the publisher. Notwithstanding, instructors are permitted to photocopy isolated articles for noncommercial classroom use without fee. (License No.: 10GA0019/12GB0052/13GB0056/17GB0034/18GB0034)


[Return to Top Page]

[Return to IEICE Web Page]


The Institute of Electronics, Information and Communication Engineers (IEICE), Japan