Committee |
Date Time |
Place |
Paper Title / Authors |
Abstract |
Paper # |
RCC, ISEC, IT, WBS |
2024-03-13 14:15 |
Osaka |
Osaka Univ. (Suita Campus) |
Proxy Re-encryption based on LPN Haruki Fujimoto, Shingo Sato, Junji Shikata (YNU) IT2023-88 ISEC2023-87 WBS2023-76 RCC2023-70 |
We propose a proxy re-encryption (PRE) scheme based on the Learning Parity with Noise (LPN) problem using error-correcti... [more] |
IT2023-88 ISEC2023-87 WBS2023-76 RCC2023-70 pp.79-86 |
RCS, SR, SRW (Joint) |
2024-03-13 10:25 |
Tokyo |
The University of Tokyo (Hongo Campus), and online (Primary: On-site, Secondary: Online) |
[Short Paper]
A Study on the use of Advanced Cryptography in Sensor Network Takuya Kurihara, Keiichiro Mori, Kazuto Yano, Toshikazu Sakano (ATR) SR2023-87 |
Post-quantum cryptography (PQC) is a technology necessary to ensure security in the era of quantum computers. However, P... [more] |
SR2023-87 pp.1-3 |
RCC, ISEC, IT, WBS |
2024-03-14 09:30 |
Osaka |
Osaka Univ. (Suita Campus) |
Security Analysis of Backdoored Classic McEliece in a Multi-User Setting Dai Miura, Hyungrok Jo, Shingo Sato, Junji Shikata (Yokohama National Univ.) IT2023-105 ISEC2023-104 WBS2023-93 RCC2023-87 |
Several attacks have been proposed for the Classic McEliece cryptosystem, which is one of the 4th round candidates of th... [more] |
IT2023-105 ISEC2023-104 WBS2023-93 RCC2023-87 pp.197-204 |
VLD, HWS, ICD |
2024-02-29 11:15 |
Okinawa |
(Primary: On-site, Secondary: Online) |
Design of RISC-V SoC with Post-quantum Encryption Algorithm Acceleration Jiyuan Xin, Makoto Ikeda (UTokyo) VLD2023-110 HWS2023-70 ICD2023-99 |
The foundational elements of the Internet of Things (IoT) are increasingly intricate and robust Systems-on-Chips (SoCs) ... [more] |
VLD2023-110 HWS2023-70 ICD2023-99 pp.66-71 |
VLD, HWS, ICD |
2024-03-01 15:30 |
Okinawa |
(Primary: On-site, Secondary: Online) |
A Pipelined NTT Transformer and its Extension Scheme Designed for the Digital Signature Scheme Crystals-Dilithium Pengfei Sun, Makoto Ikeda (Tokyo Univ.) VLD2023-130 HWS2023-90 ICD2023-119 |
As quantum computing advances, it threatens the security of current encryption algorithms, making Post-Quantum Cryptogra... [more] |
VLD2023-130 HWS2023-90 ICD2023-119 pp.161-166 |
VLD, HWS, ICD |
2024-03-01 15:55 |
Okinawa |
(Primary: On-site, Secondary: Online) |
Hardware Design Based on Full Parameter Support and Parallelism Optimization for Key Encapsulation Mechanism FIPS203 Yuto Nakamura, Makoto Ikeda (UTokyo) VLD2023-131 HWS2023-91 ICD2023-120 |
The emergence of quantum computers potentially threatens the security of traditional cryptographic techniques that depen... [more] |
VLD2023-131 HWS2023-91 ICD2023-120 pp.167-172 |
VLD, HWS, ICD |
2024-03-01 16:20 |
Okinawa |
(Primary: On-site, Secondary: Online) |
An Efficient Hardware Approach for High-Speed SPHINCS+ Signature Generation Yuta Takeshima, Makoto Ikeda (The Univ. of Tokyo) VLD2023-132 HWS2023-92 ICD2023-121 |
This study addresses the challenges traditional cryptographic systems face with the advent of quantum computers by focus... [more] |
VLD2023-132 HWS2023-92 ICD2023-121 pp.173-177 |
VLD, DC, RECONF, ICD, IPSJ-SLDM [detail] |
2023-11-17 10:25 |
Kumamoto |
Civic Auditorium Sears Home Yume Hall (Primary: On-site, Secondary: Online) |
Low-Latency Hardware Implementation for SPHINCS+ signature generation Yuta Takeshima, Makoto Ikeda (The Univ. of Tokyo) VLD2023-69 ICD2023-77 DC2023-76 RECONF2023-72 |
In recent years, research and standardization of post-quantum cryptography have been actively pursued. In 2022, the digi... [more] |
VLD2023-69 ICD2023-77 DC2023-76 RECONF2023-72 pp.200-204 |
EMM, BioX, ISEC, SITE, ICSS, HWS, IPSJ-CSEC, IPSJ-SPT [detail] |
2023-07-24 17:20 |
Hokkaido |
Hokkaido Jichiro Kaikan |
An Identity-based Signature Scheme with Tight Security Reduction Jiawei Chen, Hyungrok Jo, Shingo Sato, Junji Shikata (YNU) ISEC2023-29 SITE2023-23 BioX2023-32 HWS2023-29 ICSS2023-26 EMM2023-29 |
In this paper, we propose an identity-based signature (IBS) scheme based on the supersingular isogeny problem, with tigh... [more] |
ISEC2023-29 SITE2023-23 BioX2023-32 HWS2023-29 ICSS2023-26 EMM2023-29 pp.97-104 |
EMM, BioX, ISEC, SITE, ICSS, HWS, IPSJ-CSEC, IPSJ-SPT [detail] |
2023-07-24 18:00 |
Hokkaido |
Hokkaido Jichiro Kaikan |
A security analysis on MQ-Sign submitted to Korean Post-Quantum Cryptography standardization Yasuhiko Ikematsu (Kyushu Univ.), Hyungrok Jo (YNU), Takanori Yasuda (OUS) ISEC2023-31 SITE2023-25 BioX2023-34 HWS2023-31 ICSS2023-28 EMM2023-31 |
MQ-Sign is a variant of the UOV singature scheme proposed by Shim et al. It has been suggested as a candidate for the st... [more] |
ISEC2023-31 SITE2023-25 BioX2023-34 HWS2023-31 ICSS2023-28 EMM2023-31 pp.113-118 |
RCC, ISEC, IT, WBS |
2023-03-14 10:30 |
Yamaguchi |
(Primary: On-site, Secondary: Online) |
Security Analysis for Ring-LWE Problem over the Maximal Real and Complex Subfields in Cyclotomic Field Satoshi Uesugi, Shinya Okumura, Miyaji Atsuko (Osaka Univ) IT2022-75 ISEC2022-54 WBS2022-72 RCC2022-72 |
The Learning With Errors problem (LWE) is a mathematical problem that supports the security of lattice based cryptograph... [more] |
IT2022-75 ISEC2022-54 WBS2022-72 RCC2022-72 pp.49-53 |
RCC, ISEC, IT, WBS |
2023-03-14 11:45 |
Yamaguchi |
(Primary: On-site, Secondary: Online) |
Analysis of (U,U+V)-code Problems with Gramians over Binary and Ternary Fields Ichiro Iwata, Yusuke Yoshida, Keisuke Tanaka (Tokyo Tech) IT2022-78 ISEC2022-57 WBS2022-75 RCC2022-75 |
Debris-Alazard, Sendrier, and Tillich proposed SURF in 2017, which is an efficient code-based signature scheme. However,... [more] |
IT2022-78 ISEC2022-57 WBS2022-75 RCC2022-75 pp.68-73 |
RCC, ISEC, IT, WBS |
2023-03-14 13:50 |
Yamaguchi |
(Primary: On-site, Secondary: Online) |
A Proposal of Defining Fields for Efficient Ring-LWE Based Cryptography Yuya Okubo, Shinya Okumura (Osaka Univ.), Atsuko Miyaji (Osaka Univ./JAIST) IT2022-91 ISEC2022-70 WBS2022-88 RCC2022-88 |
Currently, as a post-quantum computer cryptography, cryptography based on the difficulty of solving a mathematical probl... [more] |
IT2022-91 ISEC2022-70 WBS2022-88 RCC2022-88 pp.142-148 |
RCC, ISEC, IT, WBS |
2023-03-15 13:50 |
Yamaguchi |
(Primary: On-site, Secondary: Online) |
A Study on Hybrid Key Agreement with Post Quantum Cryptography and Quantum Key Distribution Sakae Chikara, Tsunekazu Saito (NTT) IT2022-129 ISEC2022-108 WBS2022-126 RCC2022-126 |
This paper discusses the issues involved in combining key-sharing schemes with different security rationales, such as qu... [more] |
IT2022-129 ISEC2022-108 WBS2022-126 RCC2022-126 pp.386-392 |
ISEC, SITE, LOIS |
2022-11-18 09:00 |
Online |
Online |
Construction of Quantum-Resistant Crypotsystems combining CSIDH with Y-00 quantum stream cipher Shigeo Tsuii, Osamu Hirota (Chuo Univ.) ISEC2022-31 SITE2022-35 LOIS2022-15 |
This paper describes total constructive structure of PQC (Post-quantum cryptography) including mathematical public key c... [more] |
ISEC2022-31 SITE2022-35 LOIS2022-15 pp.9-15 |
ISEC, SITE, LOIS |
2022-11-18 09:25 |
Online |
Online |
International Trend of Development on Y-00 Quantum Cryptography
-- Cryptologic Perspective -- Shigeo Tsujii (Chuo Univ.), Kentaro Kato (Tamagawa Univ.), Osamu Hirota (Chuo Univ.) ISEC2022-30 SITE2022-34 LOIS2022-14 |
Cryptography has developed based on mathematics and has now become an indispensable technology in society. In order to c... [more] |
ISEC2022-30 SITE2022-34 LOIS2022-14 pp.1-8 |
EMM, BioX, ISEC, SITE, ICSS, HWS, IPSJ-CSEC, IPSJ-SPT [detail] |
2022-07-19 13:00 |
Online |
Online |
Side-Channel Attacks on Post-Quantum KEMs Using Multi-class Classification Neural Network Yutaro Tanaka, Rei Ueno (Tohoku Univ.), Keita Xagawa, Akitra Ito, Junko Takahashi (NTT), Naofumi Homma (Tohoku Univ.) ISEC2022-7 SITE2022-11 BioX2022-32 HWS2022-7 ICSS2022-15 EMM2022-15 |
(To be available after the conference date) [more] |
ISEC2022-7 SITE2022-11 BioX2022-32 HWS2022-7 ICSS2022-15 EMM2022-15 pp.1-6 |
IT, ISEC, RCC, WBS |
2022-03-10 14:15 |
Online |
Online |
Reconsideration of Attacks on the Search Ring-LWE Problem by Trace Map on Finite Field Tomoka Takahashi, Shinya Okumura, Atsuko Miyaji (Osaka Univ.) IT2021-105 ISEC2021-70 WBS2021-73 RCC2021-80 |
Lattice-based cryptography has attracted a great deal of attention due to the standardization of Post-Quantum Cryptograp... [more] |
IT2021-105 ISEC2021-70 WBS2021-73 RCC2021-80 pp.130-137 |
VLD, HWS [detail] |
2022-03-07 11:25 |
Online |
Online |
Design and Measurement of Crypto Processor for Post Quantum Cryptography CRYSTALS-Kyber Taishin Shimada, Makoto Ikeda (Univ. of Tokyo) VLD2021-81 HWS2021-58 |
CRYSTALS-Kyber is one of the public key cryptosystems being considered as a public key cryptosystem after the advent of ... [more] |
VLD2021-81 HWS2021-58 pp.31-36 |
QIT (2nd) |
2021-11-30 16:20 |
Online |
Online |
Certified Deletion for Public Key Encryption and Classical Communication Taiga Hiroka, Tomoyuki Morimae (Kyoto Univ.), Ryo Nishimaki, Takashi Yamakawa (NTT) |
Broadbent and Islam (TCC’20) proposed a quantum cryptographic primitive called quantum encryption with certified deletio... [more] |
|