IEICE Technical Committee Submission System
Conference Schedule
Online Proceedings
[Sign in]
Tech. Rep. Archives
    [Japanese] / [English] 
( Committee/Place/Topics  ) --Press->
 
( Paper Keywords:  /  Column:Title Auth. Affi. Abst. Keyword ) --Press->

All Technical Committee Conferences  (Searched in: All Years)

Search Results: Conference Papers
 Conference Papers (Available on Advance Programs)  (Sort by: Date Descending)
 Results 1 - 13 of 13  /   
Committee Date Time Place Paper Title / Authors Abstract Paper #
EMM, BioX, ISEC, SITE, ICSS, HWS, IPSJ-CSEC, IPSJ-SPT [detail] 2023-07-24
14:00
Hokkaido Hokkaido Jichiro Kaikan Key Generation by Secure Computation of ID-NIKS based on Discrete Logarithm Problem over Composite Modulus
Hayato Inoue, Mizuki Miki, Yasuyuki Murakami (OECU) ISEC2023-21 SITE2023-15 BioX2023-24 HWS2023-21 ICSS2023-18 EMM2023-21
In 1990, Murakami and Kasahara proposed an ID based non-interactive key-sharing scheme (MK scheme) that uses the discret... [more] ISEC2023-21 SITE2023-15 BioX2023-24 HWS2023-21 ICSS2023-18 EMM2023-21
pp.45-51
EMM, BioX, ISEC, SITE, ICSS, HWS, IPSJ-CSEC, IPSJ-SPT [detail] 2023-07-24
18:20
Hokkaido Hokkaido Jichiro Kaikan Implementation of Shor's algorithm for the discrete logarithm problem and experiments using the quantum computer simulator
Kaito Kishi, Junpei Yamaguchi, Tetsuya Izu (Fujitsu Research), Noboru Kunihiro (Univ. of Tsukuba) ISEC2023-32 SITE2023-26 BioX2023-35 HWS2023-32 ICSS2023-29 EMM2023-32
Classical polynomial-time algorithms for solving the discrete logarithm problem (DLP) over a prime field have not been f... [more] ISEC2023-32 SITE2023-26 BioX2023-35 HWS2023-32 ICSS2023-29 EMM2023-32
pp.119-126
ISEC, SITE, ICSS, EMM, HWS, BioX, IPSJ-CSEC, IPSJ-SPT [detail] 2019-07-24
14:10
Kochi Kochi University of Technology Anonymous Public-Key Certificates based on Elliptic Curve
Kazuomi Oishi (SIST) ISEC2019-53 SITE2019-47 BioX2019-45 HWS2019-48 ICSS2019-51 EMM2019-56
Anonymous public-key certificates can guarantee anonymity of the certificate users and are useful for applications in wh... [more] ISEC2019-53 SITE2019-47 BioX2019-45 HWS2019-48 ICSS2019-51 EMM2019-56
pp.347-352
ISEC 2018-05-16
10:00
Tokyo Ookayama Campus, Tokyo Institute of Technology Hardness of Discrete Logarithm Problem Based on New Operation on Elliptic Curve over Finite Field and New Digital Signature
Masaaki Shirase (FUN) ISEC2018-1
In the previous works, a new operation on elliptic curve over finite field $E(Fp)$, the Me operation $oplus$, is defined... [more] ISEC2018-1
pp.1-8
COMP, ISEC 2016-12-22
13:00
Hiroshima Hiroshima University [Invited Talk] Extended Tower Number Field Sieve: A New Complexity for the Medium Prime Case (from CRYPTO 2015)
Taechan Kim (NTT) ISEC2016-84 COMP2016-45
In this invited talk, we introduce the paper, "Extended tower number field sieve: A new complexity for the medium prime ... [more] ISEC2016-84 COMP2016-45
p.75
IT 2014-07-18
14:00
Hyogo Kobe University Note on attack for a public key agreement based on non-commutative algebra
Takaaki Miyamoto, Satoshi Iriyama (TUS) IT2014-33
Accardi, Ohya devised a (QP-KEX) public key sharing scheme based on a noncommutative algebra.
This is configured with ... [more]
IT2014-33
pp.123-125
ISEC, IPSJ-CSEC, SITE, ICSS, EMM, IPSJ-SPT [detail] 2011-07-13
15:20
Shizuoka Shizuoka University Solving DLP with Auxiliary Input over an Elliptic Curve Used in TinyTate Library (Part II)
Yumi Sakemi, Tetsuya Izu, Masahiko Takenaka, Masaya Yasuda (Fujitsu Labs) ISEC2011-26 SITE2011-23 ICSS2011-31 EMM2011-25
The discrete logarithm problem with auxiliary input (DLPwAI) is a problem
to find a positive integer $\alpha$ from e... [more]
ISEC2011-26 SITE2011-23 ICSS2011-31 EMM2011-25
pp.151-158
ISEC, IT, WBS 2011-03-04
09:25
Osaka Osaka University GHS attack to elliptic curves on cubic fields of odd characteristic using B.Smith's hyperellptic-to-nonhyperelliptic transform
Kazuki Ohkawa (Chuo Univ.), Tsutomu Iijima, Jinhui Chao (Chuo Univ.) IT2010-93 ISEC2010-97 WBS2010-72
GHS attack to elliptic curves over cubic fields with hyperelliptic covering of genus three is not effective.In this pape... [more] IT2010-93 ISEC2010-97 WBS2010-72
pp.151-157
IT, ISEC, WBS 2010-03-04
17:00
Nagano Nagano-Engineering Campus, Shinshu University An Experiment of Number Field Sieve over GF(p) of Low Hamming Weight Characteristic
Kenichiro Hayasaka, Tsuyoshi Takagi (Future Univ. Hakodate) IT2009-79 ISEC2009-87 WBS2009-58
The security of DSA and Diffie-Hellman key exchange is based on the
difficulty of the discrete logarithm problems (DLP)... [more]
IT2009-79 ISEC2009-87 WBS2009-58
pp.53-60
IT, ISEC, WBS 2010-03-05
16:10
Nagano Nagano-Engineering Campus, Shinshu University A study on the probabilistic algorithm to solve the elliptic curve discrete logarithm problem
Osamu Ashihara, Yoshitaka Sagara, Nobuhide Sakuragi, Tomoko K. Matsushima (Polytechnic Univ.) IT2009-129 ISEC2009-137 WBS2009-108
In this paper a probabilistic algorithm to solve the ECDLP is presented. This scheme uses the symmetry of the elliptic c... [more] IT2009-129 ISEC2009-137 WBS2009-108
pp.373-380
WBS, IT, ISEC 2009-03-10
15:40
Hokkaido Hakodate Mirai Univ. On the Computational Complexity of the Discrete Logarithm Problem over Algebraic Tori
Yuji Nishigaki, Shingo Hasegawa, Shuji Isobe, Eisuke Koizumi, Masao Sakai, Hiroki Shizuya (Tohoku Univ.) IT2008-127 ISEC2008-185 WBS2008-140
In this paper we investigate the computational complexity of the discrete logarithm problem over algebraic tori (TDLP).
... [more]
IT2008-127 ISEC2008-185 WBS2008-140
pp.545-550
ISEC 2008-09-12
14:40
Tokyo Kikai-Shinko-Kaikan Bldg. Cryptosystems on Algebraic Tori -- Parameter Generation with Security and Efficiency --
Tomoko Yonemura, Kenichiro Furuta, Yoshikazu Hanatani, Taichi Isogai, Yuichi Komano, Hirofumi Muratani, Hanae Nozaki, Kenji Ohkuma, Atsushi Shimbo (TOSHIBA Corp.) ISEC2008-67
We study on algebraic tori defined on extension field as cryptographic groups to construct public key encryption schemes... [more] ISEC2008-67
pp.25-32
ISEC, IPSJ-CSEC, SITE 2005-07-22
09:55
Iwate Iwate Prefectural University Murakami-Kasahara ID-based Key Sharing Scheme Revisited -- In Comparison With Maurer-Yacobi Scheme --
Yasuyuki Murakami (Osaka Electro-Comm. Univ.), Masao Kasahara (Osaka Gakuin Univ.)
In Sept.~1990, the present authors firstly discussed DLP over
composite number and presented an ID-based Key Sharing Sc... [more]
ISEC2005-44
pp.9-16
 Results 1 - 13 of 13  /   
Choose a download format for default settings. [NEW !!]
Text format pLaTeX format CSV format BibTeX format
Copyright and reproduction : All rights are reserved and no part of this publication may be reproduced or transmitted in any form or by any means, electronic or mechanical, including photocopy, recording, or any information storage and retrieval system, without permission in writing from the publisher. Notwithstanding, instructors are permitted to photocopy isolated articles for noncommercial classroom use without fee. (License No.: 10GA0019/12GB0052/13GB0056/17GB0034/18GB0034)


[Return to Top Page]

[Return to IEICE Web Page]


The Institute of Electronics, Information and Communication Engineers (IEICE), Japan