Committee |
Date Time |
Place |
Paper Title / Authors |
Abstract |
Paper # |
NLP |
2022-08-02 09:50 |
Online |
Online |
Characteristics of degree period of commutative polynomials defined by fourth-order recurrence relations with two variables over Z2K Takuma Nishizaka, Daisaburo Yoshioka (Sojo Univ.) NLP2022-28 |
In recent years, a public-key cryptosystem based on Chebyshev polynomials over Z_{2^k} has been presented. Unfortunately... [more] |
NLP2022-28 pp.11-14 |
ISEC |
2020-05-20 13:10 |
Online |
Online |
[Invited Talk]
An Efficient F4-style Based Algorithm to Solve MQ Problems (from IWSEC 2019) Takuma Ito, Naoyuki shinohara (NICT), Shigenori Uchiyama (TMU) ISEC2020-5 |
We introduce “An Efficient F4-style Based Algorithm to Solve MQ Problems”we presented in IWSEC 2019. [more] |
ISEC2020-5 p.25 |
ISEC, SITE, ICSS, EMM, HWS, BioX, IPSJ-CSEC, IPSJ-SPT [detail] |
2019-07-24 13:45 |
Kochi |
Kochi University of Technology |
3 Layers Public Key Cryptosystem with a Short Tandem Repeat DNA for Ultimate Personal Identification
-- Introduction of Short Tandem Repeat Coupled with Mai Nanbaa and its Application -- Shigeo Tsujii, Toshiaki Saisho, Masao Yamasawa, Ko Shikata (Chuo Univ.), Koji Sasaki, Nobuharu Suzuki (Ad.) ISEC2019-52 SITE2019-46 BioX2019-44 HWS2019-47 ICSS2019-50 EMM2019-55 |
Considering the current situation, where personal verification with digital authentication is becoming important in the ... [more] |
ISEC2019-52 SITE2019-46 BioX2019-44 HWS2019-47 ICSS2019-50 EMM2019-55 pp.341-346 |
WBS, IT, ISEC |
2018-03-09 16:10 |
Tokyo |
Katsusika Campas, Tokyo University of Science |
Attacks on several Multivariate PKCs
-- Attack on K(AVII)MVPKC -- Ryuichi Sakai (Osaka Electro-Communication Univ.), Masao Kasahara (Waseda Univ.) IT2017-138 ISEC2017-126 WBS2017-119 |
One of the anthers, Kasahara, have been proposed several public key cryptosystems based on multivariate polynomials wit... [more] |
IT2017-138 ISEC2017-126 WBS2017-119 pp.207-212 |
IT |
2017-09-08 09:00 |
Yamaguchi |
Centcore Yamaguchi Hotel |
A solution of degree determination problem of Chebyshev polynomials over Z/p^kZ Daisaburo Yoshioka (Sojo Univ.) IT2017-38 |
Recently, a public key cryptosystem employing Chebyshev polynomials over a residue ring of integers has been proposed. T... [more] |
IT2017-38 pp.1-4 |
IT, ISEC, WBS |
2016-03-11 11:15 |
Tokyo |
The University of Electro-Communications |
Performance Comparison of Multivariate Polynomial Encryption Schemes SRP and ABC Takanori Yasuda (ISIT), Kouichi Sakurai (Kyushu Univ.) IT2015-134 ISEC2015-93 WBS2015-117 |
Multivariate public key cryptsystem (MPKC) is one candidate for post-quantum cryptosystem. For the signature scheme Rain... [more] |
IT2015-134 ISEC2015-93 WBS2015-117 pp.205-210 |
NLP |
2015-07-22 10:25 |
Hokkaido |
Bibai Onsen Yu-rinkan |
A solution on the degree determination problem of Chebyshev polynomials over the residue ring Z/2^kZ Kento Kawano, Daisaburo Yoshioka (Sojo Univ.) NLP2015-77 |
A public key cryptosystem based on Chebyshev polynomials over the residue ring Z/2^k Z is recently introduced. In this p... [more] |
NLP2015-77 pp.53-56 |
IPSJ-CSEC, ISEC, SITE, ICSS, EMM, IPSJ-SPT [detail] |
2015-07-03 11:05 |
Aichi |
NAGOYA TRADE & INDUSTRY CENTER |
Proposal of Accelerating XL algorithm by Assigning Constants to Variables Masahito Gotaishi, Shigeo Tsujii (Chuo Univ.) ISEC2015-23 SITE2015-21 ICSS2015-33 EMM2015-31 |
The Fixing strategy, which has been long used in XL algorithm is improved so that more variables can be fixed. This imp... [more] |
ISEC2015-23 SITE2015-21 ICSS2015-33 EMM2015-31 pp.137-142 |
ISEC, LOIS, SITE |
2014-11-21 13:25 |
Hyogo |
|
Accelerating QUAD Stream Cipher using Multi-Stream Method on Graphics Processing Unit Satoshi Tanaka (ISIT/Kyushu Univ.), Chen-Mou Cheng (Kyushu Univ.), Takanori Yasuda (ISIT), Kouichi Sakurai (ISIT/Kyushu Univ.) ISEC2014-56 SITE2014-47 LOIS2014-26 |
QUAD is a stream cipher with a provable security based on the theory of multivariate public-key cryptography. However, Q... [more] |
ISEC2014-56 SITE2014-47 LOIS2014-26 pp.1-6 |
NLP, CAS |
2014-10-16 16:45 |
Ehime |
Ehime University |
Periodical property of Chebyshev polynomials on the residue class rings modulo 2^w Atsushi Iwasaki, Ken Umeno (Kyoto Univ.) CAS2014-67 NLP2014-61 |
The odd degree Chebyshev polynomials are known to be permutation polynomials on the residue class rings modulo $2^w$,
... [more] |
CAS2014-67 NLP2014-61 pp.81-86 |
ICSS, ISEC, SITE, EMM, IPSJ-CSEC, IPSJ-SPT [detail] |
2014-07-04 10:40 |
Hokkaido |
San-Refure Hakodate |
Cryptanalysis of a matrix variant of NTRU Takanori Yasuda (ISIT), Yuya Yamaguchi (Kyushu Univ.), Xavier Dahan, Kouichi Sakurai (ISIT) ISEC2014-33 SITE2014-28 ICSS2014-37 EMM2014-33 |
Since its introduction in 1996, the cryptosystem NTRU has become a well-established candidate for the next generation pu... [more] |
ISEC2014-33 SITE2014-28 ICSS2014-37 EMM2014-33 pp.239-246 |
ICSS, IA |
2014-06-05 16:15 |
Hyogo |
Takikawa Memorial Hall, Kobe University |
Attack on Knapsack Cryptography by Using Intermediary Plaintext Yoshihiro Kusanagi, Atsushi Nagao, Masakatu Morii (Kobe Univ.) IA2014-3 ICSS2014-3 |
Knapsack cryptography is the public key cryptosystem based on knapsack problem (especially subset sum problem).
Density... [more] |
IA2014-3 ICSS2014-3 pp.9-14 |
ISEC |
2014-05-09 13:35 |
Tokyo |
Kikai-Shinko-Kaikan Bldg. |
An Interorganizational Cryptosystem Using RSA PKC Yasuyuki Murakami (OECU), Masao Kasahara (Waseda Univ./Chuo Univ.) ISEC2014-2 |
Usual cryptosystems suppose the personal communication.
However, the secure and effecitive communication system
is des... [more] |
ISEC2014-2 pp.7-12 |
EMM, ISEC, SITE, ICSS, IPSJ-CSEC, IPSJ-SPT [detail] |
2013-07-19 11:05 |
Hokkaido |
|
Cryptanalysis of Rainbow Signature
-- Enrico, you should have hacked further -- Masahito Gotaishi, Shigeo Tsujii (Chuo Univ.) ISEC2013-39 SITE2013-34 ICSS2013-44 EMM2013-41 |
Thomae et al. have proposed cryptanalysis of Rainbow, a multivariate public key signature system.
The methodology of so... [more] |
ISEC2013-39 SITE2013-34 ICSS2013-44 EMM2013-41 pp.275-279 |
SIS |
2013-06-13 13:00 |
Kagoshima |
Houzan Hall (Kagoshima) |
[Tutorial Lecture]
Signal Processing in the Encrypted Domain
-- Development of a New Technique for Secure Manipulation of Signals -- Akio Miyazaki (Kyushu Sangyo Univ.) SIS2013-4 |
We have established the fundamental techniques for computing with signals that are encrypted or otherwise hidden often r... [more] |
SIS2013-4 pp.17-21 |
IE |
2013-04-26 15:25 |
Tokyo |
Chuo Univ. |
Morphological pattern spectrum based image-manipulation detection Tomohiro Takeda, Yasushi Tsukada, Takeshi Kumaki, Takeshi Ogura, Takeshi Fujino (Ritsumeikan Univ.) IE2013-5 |
Because of development of semiconductor technology, the demand for analog image has been declining recently as the techn... [more] |
IE2013-5 pp.23-28 |
IT, ISEC, WBS |
2013-03-07 15:30 |
Osaka |
Kwansei Gakuin Univ., Osaka-Umeda Campus |
A knapsack cryptosystem with a randomly signed key Akira Hayashi (Kanazawa Inst. of Tech.) IT2012-83 ISEC2012-101 WBS2012-69 |
The knapsack cryptosystem invented by Merkle and Hellman is broken with high probability by Shamir's attack. A novel cr... [more] |
IT2012-83 ISEC2012-101 WBS2012-69 pp.139-141 |
ISEC |
2012-09-21 15:50 |
Tokyo |
Kikai-Shinko-Kaikan Bldg. |
New Classes of Public Key Cryptosystems with Concealed Equations of Very High Degree Constructed Based on Cyclic Codes, K(X)SE(1)PKC, K(XVI)SE(2)PKC, Realizing Coding Rate of Exactly 1.0, along with K(III)ΣΠPKC Masao Kasahara (21st ICRC) ISEC2012-53 |
In this paper, we first present a new class of public-key cryptosystems, K(X)BASESE(1)PKC based on cyclic codes. Althoug... [more] |
ISEC2012-53 pp.43-50 |
EMM, ISEC, SITE, ICSS, IPSJ-CSEC, IPSJ-SPT [detail] |
2012-07-20 16:15 |
Hokkaido |
|
Construction of the Tsujii-Shamir-Kasahara (TSK) Multivariate Public Key Cryptosystem, which relies on the Difficulty of Prime Factorization Shigeo Tsujii, Masahito Gotaishi (Chuo Univ.) ISEC2012-39 SITE2012-35 ICSS2012-41 EMM2012-31 |
A new multivariate public-key cryptosystem (MPKC) is proposed. Unlike conventional MPKC system,
the polynomials in the ... [more] |
ISEC2012-39 SITE2012-35 ICSS2012-41 EMM2012-31 pp.213-216 |
ISEC |
2012-05-18 14:55 |
Tokyo |
Kikai-Shinko-Kaikan Bldg. |
Construction of New Classes of Product-sum Type Public Key Cryptosystem, K(II)ΣΠPKC, Constructed Based on the Maximum Length Code
-- A Possibility of Opening Up a New Field of Applications of Cryptosystem -- Masao Kasahara (21stCICRC) ISEC2012-5 |
In this paper, we present a new class of knapsack type PKC referred to as K(\ii)$\Sigma\Pi$PKC.
In K(\ii)$\Sigma\Pi$PK... [more] |
ISEC2012-5 pp.25-32 |