Committee |
Date Time |
Place |
Paper Title / Authors |
Abstract |
Paper # |
MW |
2021-11-19 13:55 |
Kagoshima |
Kagoshima University (Primary: On-site, Secondary: Online) |
A Study on Coverage Extension by a Leaky Dielectric Waveguide with Dielectric Pieces Attached Hiroto Yamamoto, Atsushi Fukuda, Hiroshi Okazaki, Yasunori Suzuki (NTT DOCOMO) MW2021-81 |
This paper presents an experimental study of coverage extension by a leaky dielectric waveguide that leaks radio waves f... [more] |
MW2021-81 pp.81-85 |
SDM, ICD, ITE-IST [detail] |
2021-08-17 16:35 |
Online |
Online |
Design and evaluation of phase shifter for range-extension of ToF imager Jiang Dingyu, Makoto Ikdeda (UTokyo) SDM2021-35 ICD2021-6 |
The 3D imaging has been becoming more and more popular in the image sensor field. Among the depth range finding methods,... [more] |
SDM2021-35 ICD2021-6 pp.28-32 |
CCS, NLP |
2020-06-05 14:25 |
Online |
Online |
Note on the Discrete Fourier Transform on the Galois Extension Field GF(2^q) Ryota Yamagata, Ibuki Nakamura, Hisato Fujisaka (Hiroshima City Univ.) NLP2020-17 CCS2020-7 |
In this manuscript, the discrete Fourier transform on a Galois extension field GF($2^q$) is discussed. A efficient discr... [more] |
NLP2020-17 CCS2020-7 pp.33-34 |
ISEC, SITE, ICSS, EMM, HWS, BioX, IPSJ-CSEC, IPSJ-SPT [detail] |
2019-07-24 09:55 |
Kochi |
Kochi University of Technology |
A Performance Analysis of Supersingular Isogeny Diffie-Hellman with Several Classes of the Quadratic Extension Fields Yuki Nanjo (Okayama Univ.), Masaaki Shirase (Future Univ. Hakodate), Takuya Kusaka, Yasuyuki Nogami (Okayama Univ.) ISEC2019-36 SITE2019-30 BioX2019-28 HWS2019-31 ICSS2019-34 EMM2019-39 |
It is well-known that the class of binomial extension field (BEF) is widely used to construct a quadratic extension fiel... [more] |
ISEC2019-36 SITE2019-30 BioX2019-28 HWS2019-31 ICSS2019-34 EMM2019-39 pp.207-214 |
ET |
2018-11-10 11:00 |
Tokyo |
Tokyo Polytechnic University |
Internet and programming basic course for elementary students Akira Tanaka (NIT, Tokyo College) ET2018-55 |
Our laboratory – Information-communication laboratory (Tanaka Lab.) - have provided “Internet course” as a lecture of Ha... [more] |
ET2018-55 pp.13-18 |
ISEC |
2018-05-16 10:25 |
Tokyo |
Ookayama Campus, Tokyo Institute of Technology |
Determining BLS Curves for Pairing over Efficient Tower of Extension Field Yuki Nanjo, Md. Al-Amin Khandaker (Okayama Univ.), Masaaki Shirase (Future Univ. Hakodate), Takuya Kusaka, Yasuyuki Nogami (Okayama Univ.) ISEC2018-2 |
Pairing-based cryptography (PBC) is receiving a lot of attention since it enables many innovative and multi-functional c... [more] |
ISEC2018-2 pp.9-16 |
ISEC, WBS, IT |
2017-03-09 15:50 |
Tokyo |
TOKAI University |
Construction of covering curves of elliptic curves over finite fields of even characteristic using simple extension Seiya Kukisaki (Chuo Univ.), Mahoro Simura (Tokai Univ.), Jinhui Chao (Chuo Univ.) IT2016-111 ISEC2016-101 WBS2016-87 |
The GHS attacks present a serious threat to cryptosystems using elliptic curves over extensions of finite fields when th... [more] |
IT2016-111 ISEC2016-101 WBS2016-87 pp.79-83 |
IT |
2016-07-29 10:40 |
Fukuoka |
Seminar House, Fukuoka Univ. |
A Consideration of an Efficient Calculation over the Extension Field of Degree 3 for Elliptic Curve Pairing Cryptography Yuta Kodera (Okayama Univ.), Sylvain Duquesne (Univ. Rennes 1), Masaaki Shirase (FUN), Yasuyuki Nogami (Okayama Univ.) IT2016-30 |
Recently, pairing based cryptography, which is one of public-key cryptographies, has been paid attention. Mathematically... [more] |
IT2016-30 pp.51-56 |
RCS, IT, SIP |
2016-01-18 13:40 |
Osaka |
Kwansei Gakuin Univ. Osaka Umeda Campus |
Representation of the extension field using the even irreducible polynomial Shigeki Kobayashi (Nagano nct), Hiroyuki Ebato, Tatsuo Sugimura (Shinshu Univ.) IT2015-64 SIP2015-78 RCS2015-296 |
This report discribes an representation of the extension field $mathrm{GF}(q^{2m})$ using the even irreducible polynomia... [more] |
IT2015-64 SIP2015-78 RCS2015-296 pp.97-100 |
ET |
2015-10-31 17:45 |
Oita |
Nippon Bunri Univ. (Yufuin Training Institute) |
Task Extension in Experiential Learning in Field Trip Kasumi Nishio, Akihiro Kashihara (UEC), Ryo Takaoka (YU) ET2015-55 |
In field trip involving experiential learning, learners would often extend tasks necessary for achieving a learning goal... [more] |
ET2015-55 pp.67-72 |
QIT (2nd) |
2015-05-26 15:40 |
Osaka |
Osaka University |
Measurement theory in local quantum physics Kazuya Okamura, Masanao Ozawa (Nagoya Univ.) |
We aim at establishing measurement theory in local quantum physics.For this purpose, we discuss a representation theory ... [more] |
|
ISEC, IT, WBS |
2015-03-02 10:30 |
Fukuoka |
The University of Kitakyushu |
Accelerating QUAD Stream Cipher using Optimal Extension Field on GPU Satoshi Tanaka (ISIT/Kyushu Univ.), Chen-Mou Cheng (Kyushu Univ.), Takanori Yasuda (ISIT), Kouichi Sakurai (ISIT/Kyushu Univ.) IT2014-62 ISEC2014-75 WBS2014-54 |
Evaluating non-linear multivariate polynomial systems over finite
fields is an important subroutine for QUAD stream cip... [more] |
IT2014-62 ISEC2014-75 WBS2014-54 pp.1-4 |
IT, ISEC, WBS |
2013-03-07 15:55 |
Osaka |
Kwansei Gakuin Univ., Osaka-Umeda Campus |
Notes on Efficient Computing over GF(2^16) using Graphics Processing Unit Satoshi Tanaka (Kyushu Univ./ISIT), Takanori Yasuda (ISIT), Kouichi Sakurai (Kyushu Univ./ISIT) IT2012-84 ISEC2012-102 WBS2012-70 |
Multivariate cryptography uses evaluating non-linear multivariate polynomial systems over finite ields for encrypting me... [more] |
IT2012-84 ISEC2012-102 WBS2012-70 pp.143-147 |
ISEC, IPSJ-CSEC, SITE, ICSS, EMM, IPSJ-SPT [detail] |
2011-07-13 13:50 |
Shizuoka |
Shizuoka University |
Memory saving implementation of Cyclic Vector Multiplication Algorithm Ryosuke Takahashi, Kenta Nekado, Yusuke Takai, Yasuyuki Nogami, Hiroto Kagotani (Okayama Univ.), Takashi Narita (TEL) ISEC2011-25 SITE2011-22 ICSS2011-30 EMM2011-24 |
The authors have proposed a cyclic vector multiplication algorithm abbreviated as CVMA
that is flexible to the paramet... [more] |
ISEC2011-25 SITE2011-22 ICSS2011-30 EMM2011-24 pp.145-150 |
IT, ISEC, WBS |
2010-03-05 10:50 |
Nagano |
Nagano-Engineering Campus, Shinshu University |
Existing Probability of Gauss Period Normal Basis Kenta Nekado, Yasuyuki Nogami, Yoshitaka Morikawa (Okayama Univ.) IT2009-134 ISEC2009-142 WBS2009-113 |
Recently, for several pairing-based cryptographic applications, convenient basis which can construct extension field for... [more] |
IT2009-134 ISEC2009-142 WBS2009-113 pp.403-407 |
ISEC |
2009-12-16 15:45 |
Tokyo |
Kikai-Shinko-Kaikan Bldg. |
A Construction Method of Basis Conversion Matrix by Using Small Multiplicative Group for Cryptographic Applications Hidehiro Kato, Yasuyuki Nogami (Okayama Univ.), Satoshi Uehara (The Univ. of Kitakyushu), Yoshitaka Morikawa (Okayama Univ.) ISEC2009-77 |
Several methods for finding a basis conversion matrix between two different bases in extension field F_{p^m}... [more] |
ISEC2009-77 pp.43-50 |
ISEC |
2009-05-22 14:15 |
Tokyo |
Kikai-Shinko-Kaikan Bldg. |
An Improvement of Cyclic Vector Multiplication Algorithm based on Gauss period Normal Basis Erika Yanagi, Kenta Nekado, Yasuyuki Nogami, Yoshitaka Morikawa (Okayama Univ.) ISEC2009-9 |
This paper first introduces cyclic vector multiplication algorithm (CVMA) that is a multiplication algorithm with Gauss ... [more] |
ISEC2009-9 pp.55-60 |
ISEC |
2008-12-17 14:55 |
Tokyo |
Kikai-Shinko-Kaikan Bldg. |
Cryptosystems on Algebraic Tori
-- Some Efficient Algorithms for Squaring -- Tomoko Yonemura, Kenichiro Furuta, Yoshikazu Hanatani, Taichi Isogai, Yuichi Komano, Hirofumi Muratani, Hanae Nozaki, Kenji Ohkuma, Atsushi Shimbo (Toshiba Corp.) ISEC2008-97 |
To construct a efficient algebraic torus-based public key encryption scheme is one of our goals. An efficient scheme is ... [more] |
ISEC2008-97 pp.45-52 |
ISEC |
2008-09-12 14:40 |
Tokyo |
Kikai-Shinko-Kaikan Bldg. |
Cryptosystems on Algebraic Tori
-- Parameter Generation with Security and Efficiency -- Tomoko Yonemura, Kenichiro Furuta, Yoshikazu Hanatani, Taichi Isogai, Yuichi Komano, Hirofumi Muratani, Hanae Nozaki, Kenji Ohkuma, Atsushi Shimbo (TOSHIBA Corp.) ISEC2008-67 |
We study on algebraic tori defined on extension field as cryptographic groups to construct public key encryption schemes... [more] |
ISEC2008-67 pp.25-32 |
ISEC, SITE, IPSJ-CSEC |
2008-07-25 14:40 |
Fukuoka |
Fukuoka Institute of System LSI Design Industry |
A Consideration on Efficient Exponentiation in Extension Field for Pairing-based Cryptography Tomoki Yoshida, Hidehiro Kato, Kenta Nekado, Yasuyuki Nogami, Yoshitaka Morikawa (Okayama Univ.) ISEC2008-49 |
In recent years, pairing-based cryptographies such as ID-base cryptography and group signature have been studied.
These... [more] |
ISEC2008-49 pp.101-108 |