IEICE Technical Committee Submission System
Conference Schedule
Online Proceedings
[Sign in]
Tech. Rep. Archives
    [Japanese] / [English] 
( Committee/Place/Topics  ) --Press->
 
( Paper Keywords:  /  Column:Title Auth. Affi. Abst. Keyword ) --Press->

All Technical Committee Conferences  (Searched in: All Years)

Search Results: Conference Papers
 Conference Papers (Available on Advance Programs)  (Sort by: Date Descending)
 Results 1 - 5 of 5  /   
Committee Date Time Place Paper Title / Authors Abstract Paper #
ISEC, IT, WBS 2015-03-03
13:15
Fukuoka The University of Kitakyushu [Invited Talk] Fast and Secure Implementation of Cryptography and its Practical Application
Shinichi Kawamura (Toshiba) IT2014-99 ISEC2014-112 WBS2014-91
The author will talk about his past research on implementation of cryptography. For the practical use of cryptography, i... [more] IT2014-99 ISEC2014-112 WBS2014-91
pp.231-238
ISEC 2014-05-09
13:35
Tokyo Kikai-Shinko-Kaikan Bldg. An Interorganizational Cryptosystem Using RSA PKC
Yasuyuki Murakami (OECU), Masao Kasahara (Waseda Univ./Chuo Univ.) ISEC2014-2
Usual cryptosystems suppose the personal communication.
However, the secure and effecitive communication system
is des... [more]
ISEC2014-2
pp.7-12
WBS, IT, ISEC 2009-03-09
13:10
Hokkaido Hakodate Mirai Univ. [Invited Talk] Advances in Public-Key Cryptography (RSA, ECC, IBE)
Tsuyoshi Takagi (Future Univ. Hakodate.) IT2008-50 ISEC2008-108 WBS2008-63
We give a brief overview on the development of public-key cryptography starting with RSA cryptosystem. The most frequent... [more] IT2008-50 ISEC2008-108 WBS2008-63
pp.47-48
ISEC 2005-09-16
16:10
Tokyo Kikai-Shinko-Kaikan Bldg. Generating Short Public-Keys for Factoring Based Cryptosytems and Their Cryptanalysis
Naoki Kanayama (UEC), Shigenori Uchiyama (NTT)
In 1995, Vanstone and Zuccherato proposed a novel method of
generating RSA moduli having a predetermined set of bits
... [more]
ISEC2005-86
pp.73-77
COMP 2005-03-18
09:00
Tokyo Tokyo Institute of Technology RSA-based Public-Key Encryption Schemes with Anonymity
Ryotaro Hayashi, Keisuke Tanaka (Tokyo Inst. of Tech.)
Bellare, Boldyreva, Desai, and Pointcheval proposed a new security requirement of the encryption schemes called ``key-pr... [more] COMP2004-73
pp.1-7
 Results 1 - 5 of 5  /   
Choose a download format for default settings. [NEW !!]
Text format pLaTeX format CSV format BibTeX format
Copyright and reproduction : All rights are reserved and no part of this publication may be reproduced or transmitted in any form or by any means, electronic or mechanical, including photocopy, recording, or any information storage and retrieval system, without permission in writing from the publisher. Notwithstanding, instructors are permitted to photocopy isolated articles for noncommercial classroom use without fee. (License No.: 10GA0019/12GB0052/13GB0056/17GB0034/18GB0034)


[Return to Top Page]

[Return to IEICE Web Page]


The Institute of Electronics, Information and Communication Engineers (IEICE), Japan