Committee |
Date Time |
Place |
Paper Title / Authors |
Abstract |
Paper # |
SITE, EMM, ISEC, ICSS, IPSJ-CSEC, IPSJ-SPT [detail] |
2017-07-14 15:45 |
Tokyo |
|
Recovering CRT-RSA Secret Keys Using the Information of the Operations Based on 2^m-ary Method. Kento Oonishi, Noboru Kunihiro (Univ. of Tokyo) ISEC2017-22 SITE2017-14 ICSS2017-21 EMM2017-25 |
In side channel attacks, the secret keys are obtained from physical data in the implementation of the cryptosystem. For ... [more] |
ISEC2017-22 SITE2017-14 ICSS2017-21 EMM2017-25 pp.107-114 |
ISEC, IT, WBS |
2015-03-03 13:15 |
Fukuoka |
The University of Kitakyushu |
[Invited Talk]
Fast and Secure Implementation of Cryptography and its Practical Application Shinichi Kawamura (Toshiba) IT2014-99 ISEC2014-112 WBS2014-91 |
The author will talk about his past research on implementation of cryptography. For the practical use of cryptography, i... [more] |
IT2014-99 ISEC2014-112 WBS2014-91 pp.231-238 |
ISEC |
2014-05-09 13:35 |
Tokyo |
Kikai-Shinko-Kaikan Bldg. |
An Interorganizational Cryptosystem Using RSA PKC Yasuyuki Murakami (OECU), Masao Kasahara (Waseda Univ./Chuo Univ.) ISEC2014-2 |
Usual cryptosystems suppose the personal communication.
However, the secure and effecitive communication system
is des... [more] |
ISEC2014-2 pp.7-12 |
SITE, IPSJ-CE |
2011-12-17 15:15 |
Shimane |
|
On Electronic Government System for Overcoming Contradiction between Protection and Utilization of Personal Information and Privacy
-- Part 1 -- Shigeo Tsujii, Hiroshi Yamaguchi, Masahito Gotaishi (Chuo University), Yukiyasu Tsunoo (NEC), Mikio Ihori (IOG), Takuma Yamamoto (Kanamic) SITE2011-28 |
First the concept of 3 layers of electronic government is proposed. 3 layers are mental, social system, and technologica... [more] |
SITE2011-28 pp.19-24 |
ISEC |
2011-05-13 16:40 |
Tokyo |
Kikai-Shinko-Kaikan Bldg. |
A Study on Side Channel Cryptanalysis of RSA Hardware Focused on Operands for Multiple-precision Multiplication Takeshi Kishikawa, Tsutomu Matsumoto (YNU) ISEC2011-8 |
A lot of side channel attack methods and countermeasures have been studied for modular powering based cryptosystems such... [more] |
ISEC2011-8 pp.51-57 |
ISEC |
2010-05-21 17:10 |
Tokyo |
Kikai-Shinko-Kaikan Bldg. |
Applying Numerical Analysis Technique To Prime Factorization Masaaki Shirase (FUN) ISEC2010-9 |
It is important to analyze the hardness of prime factorization
which the security of RSA cryptosystems is based on.
... [more] |
ISEC2010-9 pp.57-62 |
WBS, IT, ISEC |
2009-03-09 13:10 |
Hokkaido |
Hakodate Mirai Univ. |
[Invited Talk]
Advances in Public-Key Cryptography (RSA, ECC, IBE) Tsuyoshi Takagi (Future Univ. Hakodate.) IT2008-50 ISEC2008-108 WBS2008-63 |
We give a brief overview on the development of public-key cryptography starting with RSA cryptosystem. The most frequent... [more] |
IT2008-50 ISEC2008-108 WBS2008-63 pp.47-48 |
ISEC, LOIS |
2007-11-22 10:45 |
Hyogo |
Kobe University |
Comparative study of Rabin encryption and RSA encryption Kensuke Takamura, Akira Hayashi (KIT) ISEC2007-101 OIS2007-73 |
The Rabin cryptosystem is a public key system that is proven to be as intractable as integer factoring. One of its featu... [more] |
ISEC2007-101 OIS2007-73 pp.19-21 |
COMP |
2007-09-20 10:35 |
Aichi |
|
Alternating tricodes and modified RSA cryptosystems Feng Ding, Shuji Jimbo, Kosaburo Hashiguchi (Okayama Univ.) COMP2007-33 |
In previous papers, we introduce the notions of bicodes, alternating bicodes and tricodes, and propose modified RSA cryp... [more] |
COMP2007-33 pp.5-12 |
ISEC |
2007-09-07 15:45 |
Tokyo |
Kikai-Shinko-Kaikan Bldg. |
An Approach to Duality in Public Key Cryptosystems Kazuo Ohta (UEC), Yuichi Komano (Toshiba), Yutaka Kawai (UEC), Shinichi Kawamura (Toshiba) ISEC2007-87 |
The security of cryptosystems is formalized by the combination of adversarial goal GOAL and attack model ATK. Paillier a... [more] |
ISEC2007-87 pp.99-106 |
ISEC |
2006-05-19 13:00 |
Tokyo |
Kikai-Shinko-Kaikan Bldg. |
High Performance Computing over Finite Fields Akira Nishida (Tokyo Univ.) |
This presentation surveys resent researches for solving large sparse linear systems over finite fields from the view poi... [more] |
|
ISEC |
2005-09-16 16:10 |
Tokyo |
Kikai-Shinko-Kaikan Bldg. |
Generating Short Public-Keys for Factoring Based Cryptosytems and Their Cryptanalysis Naoki Kanayama (UEC), Shigenori Uchiyama (NTT) |
In 1995, Vanstone and Zuccherato proposed a novel method of
generating RSA moduli having a predetermined set of bits
... [more] |
ISEC2005-86 pp.73-77 |
COMP |
2005-03-18 09:00 |
Tokyo |
Tokyo Institute of Technology |
RSA-based Public-Key Encryption Schemes with Anonymity Ryotaro Hayashi, Keisuke Tanaka (Tokyo Inst. of Tech.) |
Bellare, Boldyreva, Desai, and Pointcheval proposed a new security requirement of the encryption schemes called ``key-pr... [more] |
COMP2004-73 pp.1-7 |
ISEC, IPSJ-CSEC |
2004-07-20 10:45 |
Tokushima |
Tokushima Univ. |
A Hardware Organization of Modular Multiplication for RSA Cryptosystem Yi Ge, Takao Sakurai (Univ. of Tokyo), Koki Abe (UEC), Shuichi Sakai (Univ. of Tokyo) |
Hardware organized modular multiplication based on division algorithm is one of the effective methods used for RSA encry... [more] |
ISEC2004-15 pp.15-20 |