Committee |
Date Time |
Place |
Paper Title / Authors |
Abstract |
Paper # |
EMM, BioX, ISEC, SITE, ICSS, HWS, IPSJ-CSEC, IPSJ-SPT [detail] |
2022-07-19 13:00 |
Online |
Online |
Side-Channel Attacks on Post-Quantum KEMs Using Multi-class Classification Neural Network Yutaro Tanaka, Rei Ueno (Tohoku Univ.), Keita Xagawa, Akitra Ito, Junko Takahashi (NTT), Naofumi Homma (Tohoku Univ.) ISEC2022-7 SITE2022-11 BioX2022-32 HWS2022-7 ICSS2022-15 EMM2022-15 |
(To be available after the conference date) [more] |
ISEC2022-7 SITE2022-11 BioX2022-32 HWS2022-7 ICSS2022-15 EMM2022-15 pp.1-6 |
CQ, ICM, NS, NV (Joint) |
2021-11-25 17:10 |
Fukuoka |
JR Hakata Stn. Hakata EkiHigashi Rental Room (Primary: On-site, Secondary: Online) |
Access Control with Individual Key Delivery in ICN Yuma Fukagawa (Fukuoka Univ.), Noriaki Kamiyama (Ritsumeikan Univ.) CQ2021-71 |
Information-Centric Networking (ICN), which transfers Interest by the name of content without using DNS (Domain Name Sys... [more] |
CQ2021-71 pp.35-40 |
QIT (2nd) |
2019-11-18 11:50 |
Tokyo |
Gakushuin University |
On Attacking Next-Generation Public-Key Cryptography by Using LASOLV Yasuhito Kawano (NTT), Hiroshi Sekigawa (TUS) |
This paper proposes a method for attacking the LWE cryptography (lattice-based next-generation public-key cryptography) ... [more] |
|
ISEC |
2018-05-16 17:00 |
Tokyo |
Ookayama Campus, Tokyo Institute of Technology |
[Invited Talk]
On the Untapped Potential of Encoding Predicates by Arithmetic Circuits and Their Applications (from ASIACRYPT 2017) Shuichi Katsumata (Univ. Tokyo) ISEC2018-12 |
In this invited talk, we introduce the paper, “On the Untapped Potential of Encoding Predicates by Arithmetic Circuits a... [more] |
ISEC2018-12 p.63 |
ISEC, IT, WBS |
2015-03-02 10:30 |
Fukuoka |
The University of Kitakyushu |
Accelerating QUAD Stream Cipher using Optimal Extension Field on GPU Satoshi Tanaka (ISIT/Kyushu Univ.), Chen-Mou Cheng (Kyushu Univ.), Takanori Yasuda (ISIT), Kouichi Sakurai (ISIT/Kyushu Univ.) IT2014-62 ISEC2014-75 WBS2014-54 |
Evaluating non-linear multivariate polynomial systems over finite
fields is an important subroutine for QUAD stream cip... [more] |
IT2014-62 ISEC2014-75 WBS2014-54 pp.1-4 |
ISEC, LOIS, SITE |
2014-11-21 13:25 |
Hyogo |
|
Accelerating QUAD Stream Cipher using Multi-Stream Method on Graphics Processing Unit Satoshi Tanaka (ISIT/Kyushu Univ.), Chen-Mou Cheng (Kyushu Univ.), Takanori Yasuda (ISIT), Kouichi Sakurai (ISIT/Kyushu Univ.) ISEC2014-56 SITE2014-47 LOIS2014-26 |
QUAD is a stream cipher with a provable security based on the theory of multivariate public-key cryptography. However, Q... [more] |
ISEC2014-56 SITE2014-47 LOIS2014-26 pp.1-6 |
ISEC |
2014-09-05 16:35 |
Tokyo |
Kikai-Shinko-Kaikan Bldg. |
[Invited Talk]
Dual System Encryption via Doubly Selective Security
-- A Generic Framework for Fully-Secure Predicate Encryption -- Nuttapong Attrapadung (AIST) ISEC2014-54 |
Dual system encryption techniques introduced by Waters in Crypto'09 are powerful approaches for constructing fully secur... [more] |
ISEC2014-54 p.47 |
ICSS, ISEC, SITE, EMM, IPSJ-CSEC, IPSJ-SPT [detail] |
2014-07-04 10:40 |
Hokkaido |
San-Refure Hakodate |
Cryptanalysis of a matrix variant of NTRU Takanori Yasuda (ISIT), Yuya Yamaguchi (Kyushu Univ.), Xavier Dahan, Kouichi Sakurai (ISIT) ISEC2014-33 SITE2014-28 ICSS2014-37 EMM2014-33 |
Since its introduction in 1996, the cryptosystem NTRU has become a well-established candidate for the next generation pu... [more] |
ISEC2014-33 SITE2014-28 ICSS2014-37 EMM2014-33 pp.239-246 |
ISEC |
2011-12-14 16:50 |
Tokyo |
Kikai-Shinko-Kaikan Bldg. |
[Invited Talk]
Public-Key Identification Schemes based on Multivariate Quadratic Polynomials Koichi Sakumoto, Taizo Shirai, Harunaga Hiwatari (Sony) ISEC2011-72 |
A problem of solving a system of multivariate quadratic polynomials over a finite field, which is called an MQ problem, ... [more] |
ISEC2011-72 p.39 |
IBISML |
2010-06-14 16:25 |
Tokyo |
Takeda Hall, Univ. Tokyo |
Privacy Preservation in Online Prediction Jun Sakuma (Univ. of Tsukuba/JST), Hiromi Arai (U. Tsukuba) IBISML2010-9 |
In this paper, we consider online prediction from expert advice in a situation where each expert observes its own loss a... [more] |
IBISML2010-9 pp.49-56 |
WBS, IT, ISEC |
2009-03-09 13:10 |
Hokkaido |
Hakodate Mirai Univ. |
[Invited Talk]
Advances in Public-Key Cryptography (RSA, ECC, IBE) Tsuyoshi Takagi (Future Univ. Hakodate.) IT2008-50 ISEC2008-108 WBS2008-63 |
We give a brief overview on the development of public-key cryptography starting with RSA cryptosystem. The most frequent... [more] |
IT2008-50 ISEC2008-108 WBS2008-63 pp.47-48 |
MSS |
2009-01-29 13:25 |
Kanagawa |
Kanagawa Industrial Promotion Center |
A Method of Petri Nets and Calculating the Elementary T-invariants for Public-key Cryptography MEPKC Ryo Yamaguchi, Qi-Wei Ge, Mitsuru Nakata (Yamaguchi Univ.) CST2008-42 |
This paper aims at automatically generating Petri nets that are used as key generator of public-key cryptography MEPKC. ... [more] |
CST2008-42 pp.5-10 |
MSS |
2008-01-29 10:20 |
Tokushima |
The University of Tokushima |
A Method of Generating and Complicating Petri Nets Used as Key-generator of a public-key cryptgraphy MEPKC Ryosuke Murakami, Ryo Yamaguchi, Qi-Wei Ge, Mitsuru Nakata (Yamaguchi Univ) CST2007-48 |
This paper aims at automatically generating Petri nets that
are used as key generator of a public-key cryptography MEP... [more] |
CST2007-48 pp.11-16 |
MSS |
2007-06-29 10:15 |
Okinawa |
|
An algorithm to enumerate all the elementary T-invariants of auto-generated Petri nets Ryo Yamaguchi, Ryosuke Murakami, Mitsuru Nakata, Qi-Wei Ge (Yamaguchi Univ.) CST2007-9 |
In this paper, we propose an algorithm to enumerate all the elementary
T-invariants of auto-generated Petri nets that ... [more] |
CST2007-9 pp.15-20 |
CAS, SIP, VLD |
2007-06-22 13:00 |
Hokkaido |
Hokkaido Tokai Univ. (Sapporo) |
Scalable Dual-Radix Unified Montgomery Multiplier in GF(p) and GF(2n) Kazuyuki Tanimura, Ryuta Nara, Shunitsu Kohara, Youhua Shi, Nozomu Togawa, Masao Yanagisawa, Tatsuo Ohtsuki (Waseda Univ.) CAS2007-26 VLD2007-42 SIP2007-56 |
Modular multiplication is the dominant arithmetic operation in elliptic curve cryptography (ECC), which is one of public... [more] |
CAS2007-26 VLD2007-42 SIP2007-56 pp.43-48 |
WBS, IT, ISEC |
2006-03-16 13:15 |
Aichi |
Nagoya Univ. |
[Invited Talk]
Acceleration of arithmetic in Galois fields by hardware support Naofumi Takagi (Nagoya Univ.) |
In encryption and decryption of public-key cryptographies, such as elliptic curve cryptography (ECC), computation of ari... [more] |
IT2005-72 ISEC2005-129 WBS2005-86 p.49 |
COMP |
2005-09-15 13:20 |
Osaka |
Osaka Univ., Toyonaka Campus |
[Tutorial Lecture]
NA Akinori Kawachi (Tokyo Tech.) |
Applications of quantum information processing to cryptography has played a central role in the quantum information scie... [more] |
|