IEICE Technical Committee Submission System
Conference Schedule
Online Proceedings
[Sign in]
Tech. Rep. Archives
    [Japanese] / [English] 
( Committee/Place/Topics  ) --Press->
 
( Paper Keywords:  /  Column:Title Auth. Affi. Abst. Keyword ) --Press->

All Technical Committee Conferences  (Searched in: All Years)

Search Results: Conference Papers
 Conference Papers (Available on Advance Programs)  (Sort by: Date Descending)
 Results 21 - 40 of 47 [Previous]  /  [Next]  
Committee Date Time Place Paper Title / Authors Abstract Paper #
HWS, ICD [detail] 2021-10-19
13:30
Online Online Design of NTT Hardware Based on K-RED for Lattice-Based Cryptography
Yuma Itabashi, Rei Ueno, Naofumi Homma (Tohoku Univ.) HWS2021-46 ICD2021-20
This paper presents an efficient hardware that efficiently performs Number Theoretic Transform(NTT) which is a dominant ... [more] HWS2021-46 ICD2021-20
pp.26-31
IA, ICSS 2021-06-21
13:30
Online Online secure isogeny-based cryptosystem CSIDH for side-channel attacks
Hayato Arai, Atusko Miyaji (Osaka Univ.) IA2021-2 ICSS2021-2
CSIDH (Commutative Supersingular Isogeny Diffie Hellman) is a kind of post-quantum cryptography that uses isogenies to e... [more] IA2021-2 ICSS2021-2
pp.8-13
QIT
(2nd)
2021-05-24
10:10
Online Online Quantum-Classical Hybrid Algorithm for LWE Problems
Yasuhito Kawano (Chubu Univ.)
This paper introduces a quantum-inspired algorithm, called interpolation, that reduces an LWE problem to another problem... [more]
WBS, IT, ISEC 2021-03-04
11:45
Online Online Security analysis for the isogeny-based cryptography CSIDH
Hayato Arai, Atsuko Miyaji, Kenta Kodera (Osaka Univ.) IT2020-123 ISEC2020-53 WBS2020-42
CSIDH (Commutative Supersingular Isogeny Diffie Hellman) is a kind of post-quantum cryptography that uses isogenies to e... [more] IT2020-123 ISEC2020-53 WBS2020-42
pp.73-80
SIP, IT, RCS 2021-01-22
16:45
Online Online Revisiting the IND-CPA Security of LWE Encryption Scheme
Takahiro Arai, Bagus Santoso, Kaoru Takemure (UEC) IT2020-111 SIP2020-89 RCS2020-202
In this paper, we propose a new simpler security notion which is
equivalence to the standard IND-CPA notion,
and base... [more]
IT2020-111 SIP2020-89 RCS2020-202
pp.271-276
QIT
(2nd)
2020-12-10
09:00
Online Online [Invited Talk] An Introduction to Provable Secure Post-Quantum Cryptography
Bagus Santoso (UEC)
Public key cryptographic schemes are essential to guarantee the security of network communication over an untrusted comm... [more]
IT 2020-09-04
11:35
Online Online A Secure Computation Protocal of Inner Product Using HQC Cryptosystem
Taiga Nakayama, Masanori Hirotomo (Saga Univ.), Youji Fukuta (Kindai Univ.), Masami Mohri (Gifu Univ.), Yoshiaki Shiraishi (Kobe Univ.) IT2020-23
In big data analysis and data mining, confidential data such as personal information is included in the data to be handl... [more] IT2020-23
pp.31-36
ISEC 2020-05-20
09:45
Online Online Isogeny based ring signature from CSIDH
Taisei Kiyama, Koutarou Suzuki (TUT) ISEC2020-1
CSIDH (Castryck, Lange, Martindale, Panny and Renes, ASIACRYPT ’18) is proposed as a post-quan- tum cryptography using i... [more] ISEC2020-1
pp.1-6
ISEC 2020-05-20
13:10
Online Online [Invited Talk] An Efficient F4-style Based Algorithm to Solve MQ Problems (from IWSEC 2019)
Takuma Ito, Naoyuki shinohara (NICT), Shigenori Uchiyama (TMU) ISEC2020-5
We introduce “An Efficient F4-style Based Algorithm to Solve MQ Problems”we presented in IWSEC 2019. [more] ISEC2020-5
p.25
ISEC 2020-05-20
14:10
Online Online [Invited Talk] How to Construct CSIDH on Edwards Curves (from CT-RSA 2020)
Tomoki Moriya, Hiroshi Onuki, Tsuyoshi Takagi (UTokyo) ISEC2020-8
CSIDH is an isogeny-based key-exchange protocol, that is one of the candidates for post-quantum cryptography. It is base... [more] ISEC2020-8
p.31
HWS, ICD [detail] 2019-11-01
14:15
Osaka DNP Namba SS Bld. A Design of Isogeny-Based Cryptographic Hardware Architecture Using Residue Number System
Shuto Funakoshi, Rei Ueno, Naofumi Homma (Tohoku Univ.) HWS2019-60 ICD2019-21
In this paper, we will propose an efficient hardware architecture of isogeny-based cryptography. The proposed architectu... [more] HWS2019-60 ICD2019-21
pp.19-24
ISEC, SITE, ICSS, EMM, HWS, BioX, IPSJ-CSEC, IPSJ-SPT [detail] 2019-07-23
14:00
Kochi Kochi University of Technology Generic Even-Mansour Construction Based on Group Actions
Hector Hougaard, Chen-Mou Cheng, Miyaji Atsuko (Graduate School of Engineering, Osaka Univ.) ISEC2019-37 SITE2019-31 BioX2019-29 HWS2019-32 ICSS2019-35 EMM2019-40
The Even-Mansour cipher over bit-strings can be broken using quantum computers as shown by Kuwakado and Morii, but Alagi... [more] ISEC2019-37 SITE2019-31 BioX2019-29 HWS2019-32 ICSS2019-35 EMM2019-40
pp.215-220
ISEC, SITE, ICSS, EMM, HWS, BioX, IPSJ-CSEC, IPSJ-SPT [detail] 2019-07-24
09:55
Kochi Kochi University of Technology A Performance Analysis of Supersingular Isogeny Diffie-Hellman with Several Classes of the Quadratic Extension Fields
Yuki Nanjo (Okayama Univ.), Masaaki Shirase (Future Univ. Hakodate), Takuya Kusaka, Yasuyuki Nogami (Okayama Univ.) ISEC2019-36 SITE2019-30 BioX2019-28 HWS2019-31 ICSS2019-34 EMM2019-39
It is well-known that the class of binomial extension field (BEF) is widely used to construct a quadratic extension fiel... [more] ISEC2019-36 SITE2019-30 BioX2019-28 HWS2019-31 ICSS2019-34 EMM2019-39
pp.207-214
HWS, ICD 2018-10-29
15:20
Osaka Kobe Univ. Umeda Intelligent Laboratory A Design and Implementation of Ring-LWE Cryptography Hardware Based on Number Theoretic Transform
Sora Endo, Rei Ueno, Takafumi Aoki, Naofumi Homma (Tohoku Univ.) HWS2018-52 ICD2018-44
This paper presents an efficient Ring-LWE cryptographic hardware architecture based on number theoretic transformation. ... [more] HWS2018-52 ICD2018-44
pp.31-34
HWS, ISEC, SITE, ICSS, EMM, IPSJ-CSEC, IPSJ-SPT [detail] 2018-07-26
14:10
Hokkaido Sapporo Convention Center A New Embedding Method for Generalized LWE
Weiyao Wang, Yuntao Wang, Atsushi Takayasu, Tsuyoshi Takagi (Univ. Tokyo) ISEC2018-46 SITE2018-38 HWS2018-43 ICSS2018-49 EMM2018-45
Estimating the computational cost for solving learning with errors (LWE) problem is an indispensable research topic to u... [more] ISEC2018-46 SITE2018-38 HWS2018-43 ICSS2018-49 EMM2018-45
pp.363-370
ISEC 2018-05-16
16:00
Tokyo Ookayama Campus, Tokyo Institute of Technology [Invited Talk] Quantum Multicollision Finding Algorithm -- from ASIACRYPT 2017 --
Akinori Hosoyamada, Yu Sasaki, Keita Xagawa (NTT) ISEC2018-10
We introduce the paper ``Quantum Multicollision Finding Algorithm'' by Akinori Hosoyamada, Yu Sasaki, Keita Xagawa, whic... [more] ISEC2018-10
p.59
ICSS, IPSJ-SPT 2018-03-07
13:50
Hokkaido Okinawa Hokubu Koyou Nouryoku Kaihatsu Sougou Center An analysis of the Guo-Johansson-Stankovski attack against QC-MDPC codes
Yohei Maezawa, Tung Chou, Atsuko Miyaji (Osaka Univ,) ICSS2017-57
In ASIACRYPT 2016, the Guo-Johansson-Stankovski (GJS) attack appears as a key-recovery attack against code--based encryp... [more] ICSS2017-57
pp.37-42
ISEC, WBS, IT 2017-03-10
12:10
Tokyo TOKAI University Provable Secure Signature Scheme against Quantum Adversaries based on Decisional Isomorphism of Polynomials with Two Secrets
Bagus Santoso (UEC) IT2016-122 ISEC2016-112 WBS2016-98
Recent research has shown that signature schemes created using Fiat-Shamir transformation might be insecure against quan... [more] IT2016-122 ISEC2016-112 WBS2016-98
pp.149-154
ISEC 2016-09-02
13:25
Tokyo Kikai-Shinko-Kaikan Bldg. An Homomorphic Encryption based on some kind of Indeterminate Equations
Koichiro Akiyama (Toshiba), Yasuhiro Goto (HUE), Shinya Okumura (ISIT), Tsuyoshi Takagi (Kyushu Univ.), Koji Nuida, Goichiro Hanaoka (AIST) ISEC2016-43
Authors propose a homomorphic public-key encryption whose security is based on a LWE-like problem related to indetermina... [more] ISEC2016-43
pp.27-34
EMM, ISEC, SITE, ICSS, IPSJ-CSEC, IPSJ-SPT [detail] 2016-07-15
14:30
Yamaguchi   Algebraic Surface Cryptosystems using Polynomial Approximate GCD
Yuichi Komano, Koichiro Akiyama (Toshiba), Yasuhiro Goto (Hokkaido Univ. of Education), Koji Nuida, Goichiro Hanaoka (AIST) ISEC2016-35 SITE2016-29 ICSS2016-35 EMM2016-43
Since the original proposal in 2004, several attacks have been reported against algebraic surface cryptosystems. This re... [more] ISEC2016-35 SITE2016-29 ICSS2016-35 EMM2016-43
pp.217-222
 Results 21 - 40 of 47 [Previous]  /  [Next]  
Choose a download format for default settings. [NEW !!]
Text format pLaTeX format CSV format BibTeX format
Copyright and reproduction : All rights are reserved and no part of this publication may be reproduced or transmitted in any form or by any means, electronic or mechanical, including photocopy, recording, or any information storage and retrieval system, without permission in writing from the publisher. Notwithstanding, instructors are permitted to photocopy isolated articles for noncommercial classroom use without fee. (License No.: 10GA0019/12GB0052/13GB0056/17GB0034/18GB0034)


[Return to Top Page]

[Return to IEICE Web Page]


The Institute of Electronics, Information and Communication Engineers (IEICE), Japan