IEICE Technical Committee Submission System
Conference Schedule
Online Proceedings
[Sign in]
Tech. Rep. Archives
    [Japanese] / [English] 
( Committee/Place/Topics  ) --Press->
 
( Paper Keywords:  /  Column:Title Auth. Affi. Abst. Keyword ) --Press->

All Technical Committee Conferences  (Searched in: All Years)

Search Results: Conference Papers
 Conference Papers (Available on Advance Programs)  (Sort by: Date Descending)
 Results 1 - 20 of 24  /  [Next]  
Committee Date Time Place Paper Title / Authors Abstract Paper #
MW 2021-11-19
13:55
Kagoshima Kagoshima University
(Primary: On-site, Secondary: Online)
A Study on Coverage Extension by a Leaky Dielectric Waveguide with Dielectric Pieces Attached
Hiroto Yamamoto, Atsushi Fukuda, Hiroshi Okazaki, Yasunori Suzuki (NTT DOCOMO) MW2021-81
This paper presents an experimental study of coverage extension by a leaky dielectric waveguide that leaks radio waves f... [more] MW2021-81
pp.81-85
SDM, ICD, ITE-IST [detail] 2021-08-17
16:35
Online Online Design and evaluation of phase shifter for range-extension of ToF imager
Jiang Dingyu, Makoto Ikdeda (UTokyo) SDM2021-35 ICD2021-6
The 3D imaging has been becoming more and more popular in the image sensor field. Among the depth range finding methods,... [more] SDM2021-35 ICD2021-6
pp.28-32
CCS, NLP 2020-06-05
14:25
Online Online Note on the Discrete Fourier Transform on the Galois Extension Field GF(2^q)
Ryota Yamagata, Ibuki Nakamura, Hisato Fujisaka (Hiroshima City Univ.) NLP2020-17 CCS2020-7
In this manuscript, the discrete Fourier transform on a Galois extension field GF($2^q$) is discussed. A efficient discr... [more] NLP2020-17 CCS2020-7
pp.33-34
ISEC, SITE, ICSS, EMM, HWS, BioX, IPSJ-CSEC, IPSJ-SPT [detail] 2019-07-24
09:55
Kochi Kochi University of Technology A Performance Analysis of Supersingular Isogeny Diffie-Hellman with Several Classes of the Quadratic Extension Fields
Yuki Nanjo (Okayama Univ.), Masaaki Shirase (Future Univ. Hakodate), Takuya Kusaka, Yasuyuki Nogami (Okayama Univ.) ISEC2019-36 SITE2019-30 BioX2019-28 HWS2019-31 ICSS2019-34 EMM2019-39
It is well-known that the class of binomial extension field (BEF) is widely used to construct a quadratic extension fiel... [more] ISEC2019-36 SITE2019-30 BioX2019-28 HWS2019-31 ICSS2019-34 EMM2019-39
pp.207-214
ET 2018-11-10
11:00
Tokyo Tokyo Polytechnic University Internet and programming basic course for elementary students
Akira Tanaka (NIT, Tokyo College) ET2018-55
Our laboratory – Information-communication laboratory (Tanaka Lab.) - have provided “Internet course” as a lecture of Ha... [more] ET2018-55
pp.13-18
ISEC 2018-05-16
10:25
Tokyo Ookayama Campus, Tokyo Institute of Technology Determining BLS Curves for Pairing over Efficient Tower of Extension Field
Yuki Nanjo, Md. Al-Amin Khandaker (Okayama Univ.), Masaaki Shirase (Future Univ. Hakodate), Takuya Kusaka, Yasuyuki Nogami (Okayama Univ.) ISEC2018-2
Pairing-based cryptography (PBC) is receiving a lot of attention since it enables many innovative and multi-functional c... [more] ISEC2018-2
pp.9-16
ISEC, WBS, IT 2017-03-09
15:50
Tokyo TOKAI University Construction of covering curves of elliptic curves over finite fields of even characteristic using simple extension
Seiya Kukisaki (Chuo Univ.), Mahoro Simura (Tokai Univ.), Jinhui Chao (Chuo Univ.) IT2016-111 ISEC2016-101 WBS2016-87
The GHS attacks present a serious threat to cryptosystems using elliptic curves over extensions of finite fields when th... [more] IT2016-111 ISEC2016-101 WBS2016-87
pp.79-83
IT 2016-07-29
10:40
Fukuoka Seminar House, Fukuoka Univ. A Consideration of an Efficient Calculation over the Extension Field of Degree 3 for Elliptic Curve Pairing Cryptography
Yuta Kodera (Okayama Univ.), Sylvain Duquesne (Univ. Rennes 1), Masaaki Shirase (FUN), Yasuyuki Nogami (Okayama Univ.) IT2016-30
Recently, pairing based cryptography, which is one of public-key cryptographies, has been paid attention. Mathematically... [more] IT2016-30
pp.51-56
RCS, IT, SIP 2016-01-18
13:40
Osaka Kwansei Gakuin Univ. Osaka Umeda Campus Representation of the extension field using the even irreducible polynomial
Shigeki Kobayashi (Nagano nct), Hiroyuki Ebato, Tatsuo Sugimura (Shinshu Univ.) IT2015-64 SIP2015-78 RCS2015-296
This report discribes an representation of the extension field $mathrm{GF}(q^{2m})$ using the even irreducible polynomia... [more] IT2015-64 SIP2015-78 RCS2015-296
pp.97-100
ET 2015-10-31
17:45
Oita Nippon Bunri Univ. (Yufuin Training Institute) Task Extension in Experiential Learning in Field Trip
Kasumi Nishio, Akihiro Kashihara (UEC), Ryo Takaoka (YU) ET2015-55
In field trip involving experiential learning, learners would often extend tasks necessary for achieving a learning goal... [more] ET2015-55
pp.67-72
QIT
(2nd)
2015-05-26
15:40
Osaka Osaka University Measurement theory in local quantum physics
Kazuya Okamura, Masanao Ozawa (Nagoya Univ.)
We aim at establishing measurement theory in local quantum physics.For this purpose, we discuss a representation theory ... [more]
ISEC, IT, WBS 2015-03-02
10:30
Fukuoka The University of Kitakyushu Accelerating QUAD Stream Cipher using Optimal Extension Field on GPU
Satoshi Tanaka (ISIT/Kyushu Univ.), Chen-Mou Cheng (Kyushu Univ.), Takanori Yasuda (ISIT), Kouichi Sakurai (ISIT/Kyushu Univ.) IT2014-62 ISEC2014-75 WBS2014-54
Evaluating non-linear multivariate polynomial systems over finite
fields is an important subroutine for QUAD stream cip... [more]
IT2014-62 ISEC2014-75 WBS2014-54
pp.1-4
IT, ISEC, WBS 2013-03-07
15:55
Osaka Kwansei Gakuin Univ., Osaka-Umeda Campus Notes on Efficient Computing over GF(2^16) using Graphics Processing Unit
Satoshi Tanaka (Kyushu Univ./ISIT), Takanori Yasuda (ISIT), Kouichi Sakurai (Kyushu Univ./ISIT) IT2012-84 ISEC2012-102 WBS2012-70
Multivariate cryptography uses evaluating non-linear multivariate polynomial systems over finite ields for encrypting me... [more] IT2012-84 ISEC2012-102 WBS2012-70
pp.143-147
ISEC, IPSJ-CSEC, SITE, ICSS, EMM, IPSJ-SPT [detail] 2011-07-13
13:50
Shizuoka Shizuoka University Memory saving implementation of Cyclic Vector Multiplication Algorithm
Ryosuke Takahashi, Kenta Nekado, Yusuke Takai, Yasuyuki Nogami, Hiroto Kagotani (Okayama Univ.), Takashi Narita (TEL) ISEC2011-25 SITE2011-22 ICSS2011-30 EMM2011-24
The authors have proposed a cyclic vector multiplication algorithm abbreviated as CVMA
that is flexible to the paramet... [more]
ISEC2011-25 SITE2011-22 ICSS2011-30 EMM2011-24
pp.145-150
IT, ISEC, WBS 2010-03-05
10:50
Nagano Nagano-Engineering Campus, Shinshu University Existing Probability of Gauss Period Normal Basis
Kenta Nekado, Yasuyuki Nogami, Yoshitaka Morikawa (Okayama Univ.) IT2009-134 ISEC2009-142 WBS2009-113
Recently, for several pairing-based cryptographic applications, convenient basis which can construct extension field for... [more] IT2009-134 ISEC2009-142 WBS2009-113
pp.403-407
ISEC 2009-12-16
15:45
Tokyo Kikai-Shinko-Kaikan Bldg. A Construction Method of Basis Conversion Matrix by Using Small Multiplicative Group for Cryptographic Applications
Hidehiro Kato, Yasuyuki Nogami (Okayama Univ.), Satoshi Uehara (The Univ. of Kitakyushu), Yoshitaka Morikawa (Okayama Univ.) ISEC2009-77
Several methods for finding a basis conversion matrix between two different bases in extension field F_{p^m}... [more] ISEC2009-77
pp.43-50
ISEC 2009-05-22
14:15
Tokyo Kikai-Shinko-Kaikan Bldg. An Improvement of Cyclic Vector Multiplication Algorithm based on Gauss period Normal Basis
Erika Yanagi, Kenta Nekado, Yasuyuki Nogami, Yoshitaka Morikawa (Okayama Univ.) ISEC2009-9
This paper first introduces cyclic vector multiplication algorithm (CVMA) that is a multiplication algorithm with Gauss ... [more] ISEC2009-9
pp.55-60
ISEC 2008-12-17
14:55
Tokyo Kikai-Shinko-Kaikan Bldg. Cryptosystems on Algebraic Tori -- Some Efficient Algorithms for Squaring --
Tomoko Yonemura, Kenichiro Furuta, Yoshikazu Hanatani, Taichi Isogai, Yuichi Komano, Hirofumi Muratani, Hanae Nozaki, Kenji Ohkuma, Atsushi Shimbo (Toshiba Corp.) ISEC2008-97
To construct a efficient algebraic torus-based public key encryption scheme is one of our goals. An efficient scheme is ... [more] ISEC2008-97
pp.45-52
ISEC 2008-09-12
14:40
Tokyo Kikai-Shinko-Kaikan Bldg. Cryptosystems on Algebraic Tori -- Parameter Generation with Security and Efficiency --
Tomoko Yonemura, Kenichiro Furuta, Yoshikazu Hanatani, Taichi Isogai, Yuichi Komano, Hirofumi Muratani, Hanae Nozaki, Kenji Ohkuma, Atsushi Shimbo (TOSHIBA Corp.) ISEC2008-67
We study on algebraic tori defined on extension field as cryptographic groups to construct public key encryption schemes... [more] ISEC2008-67
pp.25-32
ISEC, SITE, IPSJ-CSEC 2008-07-25
14:40
Fukuoka Fukuoka Institute of System LSI Design Industry A Consideration on Efficient Exponentiation in Extension Field for Pairing-based Cryptography
Tomoki Yoshida, Hidehiro Kato, Kenta Nekado, Yasuyuki Nogami, Yoshitaka Morikawa (Okayama Univ.) ISEC2008-49
In recent years, pairing-based cryptographies such as ID-base cryptography and group signature have been studied.
These... [more]
ISEC2008-49
pp.101-108
 Results 1 - 20 of 24  /  [Next]  
Choose a download format for default settings. [NEW !!]
Text format pLaTeX format CSV format BibTeX format
Copyright and reproduction : All rights are reserved and no part of this publication may be reproduced or transmitted in any form or by any means, electronic or mechanical, including photocopy, recording, or any information storage and retrieval system, without permission in writing from the publisher. Notwithstanding, instructors are permitted to photocopy isolated articles for noncommercial classroom use without fee. (License No.: 10GA0019/12GB0052/13GB0056/17GB0034/18GB0034)


[Return to Top Page]

[Return to IEICE Web Page]


The Institute of Electronics, Information and Communication Engineers (IEICE), Japan