Committee |
Date Time |
Place |
Paper Title / Authors |
Abstract |
Paper # |
HWS, ICD [detail] |
2021-10-19 13:30 |
Online |
Online |
Design of NTT Hardware Based on K-RED for Lattice-Based Cryptography Yuma Itabashi, Rei Ueno, Naofumi Homma (Tohoku Univ.) HWS2021-46 ICD2021-20 |
This paper presents an efficient hardware that efficiently performs Number Theoretic Transform(NTT) which is a dominant ... [more] |
HWS2021-46 ICD2021-20 pp.26-31 |
IA, ICSS |
2021-06-21 13:30 |
Online |
Online |
secure isogeny-based cryptosystem CSIDH for side-channel attacks Hayato Arai, Atusko Miyaji (Osaka Univ.) IA2021-2 ICSS2021-2 |
CSIDH (Commutative Supersingular Isogeny Diffie Hellman) is a kind of post-quantum cryptography that uses isogenies to e... [more] |
IA2021-2 ICSS2021-2 pp.8-13 |
QIT (2nd) |
2021-05-24 10:10 |
Online |
Online |
Quantum-Classical Hybrid Algorithm for LWE Problems Yasuhito Kawano (Chubu Univ.) |
This paper introduces a quantum-inspired algorithm, called interpolation, that reduces an LWE problem to another problem... [more] |
|
WBS, IT, ISEC |
2021-03-04 11:45 |
Online |
Online |
Security analysis for the isogeny-based cryptography CSIDH Hayato Arai, Atsuko Miyaji, Kenta Kodera (Osaka Univ.) IT2020-123 ISEC2020-53 WBS2020-42 |
CSIDH (Commutative Supersingular Isogeny Diffie Hellman) is a kind of post-quantum cryptography that uses isogenies to e... [more] |
IT2020-123 ISEC2020-53 WBS2020-42 pp.73-80 |
SIP, IT, RCS |
2021-01-22 16:45 |
Online |
Online |
Revisiting the IND-CPA Security of LWE Encryption Scheme Takahiro Arai, Bagus Santoso, Kaoru Takemure (UEC) IT2020-111 SIP2020-89 RCS2020-202 |
In this paper, we propose a new simpler security notion which is
equivalence to the standard IND-CPA notion,
and base... [more] |
IT2020-111 SIP2020-89 RCS2020-202 pp.271-276 |
QIT (2nd) |
2020-12-10 09:00 |
Online |
Online |
[Invited Talk]
An Introduction to Provable Secure Post-Quantum Cryptography Bagus Santoso (UEC) |
Public key cryptographic schemes are essential to guarantee the security of network communication over an untrusted comm... [more] |
|
IT |
2020-09-04 11:35 |
Online |
Online |
A Secure Computation Protocal of Inner Product Using HQC Cryptosystem Taiga Nakayama, Masanori Hirotomo (Saga Univ.), Youji Fukuta (Kindai Univ.), Masami Mohri (Gifu Univ.), Yoshiaki Shiraishi (Kobe Univ.) IT2020-23 |
In big data analysis and data mining, confidential data such as personal information is included in the data to be handl... [more] |
IT2020-23 pp.31-36 |
ISEC |
2020-05-20 09:45 |
Online |
Online |
Isogeny based ring signature from CSIDH Taisei Kiyama, Koutarou Suzuki (TUT) ISEC2020-1 |
CSIDH (Castryck, Lange, Martindale, Panny and Renes, ASIACRYPT ’18) is proposed as a post-quan- tum cryptography using i... [more] |
ISEC2020-1 pp.1-6 |
ISEC |
2020-05-20 13:10 |
Online |
Online |
[Invited Talk]
An Efficient F4-style Based Algorithm to Solve MQ Problems (from IWSEC 2019) Takuma Ito, Naoyuki shinohara (NICT), Shigenori Uchiyama (TMU) ISEC2020-5 |
We introduce “An Efficient F4-style Based Algorithm to Solve MQ Problems”we presented in IWSEC 2019. [more] |
ISEC2020-5 p.25 |
ISEC |
2020-05-20 14:10 |
Online |
Online |
[Invited Talk]
How to Construct CSIDH on Edwards Curves (from CT-RSA 2020) Tomoki Moriya, Hiroshi Onuki, Tsuyoshi Takagi (UTokyo) ISEC2020-8 |
CSIDH is an isogeny-based key-exchange protocol, that is one of the candidates for post-quantum cryptography. It is base... [more] |
ISEC2020-8 p.31 |
HWS, ICD [detail] |
2019-11-01 14:15 |
Osaka |
DNP Namba SS Bld. |
A Design of Isogeny-Based Cryptographic Hardware Architecture Using Residue Number System Shuto Funakoshi, Rei Ueno, Naofumi Homma (Tohoku Univ.) HWS2019-60 ICD2019-21 |
In this paper, we will propose an efficient hardware architecture of isogeny-based cryptography. The proposed architectu... [more] |
HWS2019-60 ICD2019-21 pp.19-24 |
ISEC, SITE, ICSS, EMM, HWS, BioX, IPSJ-CSEC, IPSJ-SPT [detail] |
2019-07-23 14:00 |
Kochi |
Kochi University of Technology |
Generic Even-Mansour Construction Based on Group Actions Hector Hougaard, Chen-Mou Cheng, Miyaji Atsuko (Graduate School of Engineering, Osaka Univ.) ISEC2019-37 SITE2019-31 BioX2019-29 HWS2019-32 ICSS2019-35 EMM2019-40 |
The Even-Mansour cipher over bit-strings can be broken using quantum computers as shown by Kuwakado and Morii, but Alagi... [more] |
ISEC2019-37 SITE2019-31 BioX2019-29 HWS2019-32 ICSS2019-35 EMM2019-40 pp.215-220 |
ISEC, SITE, ICSS, EMM, HWS, BioX, IPSJ-CSEC, IPSJ-SPT [detail] |
2019-07-24 09:55 |
Kochi |
Kochi University of Technology |
A Performance Analysis of Supersingular Isogeny Diffie-Hellman with Several Classes of the Quadratic Extension Fields Yuki Nanjo (Okayama Univ.), Masaaki Shirase (Future Univ. Hakodate), Takuya Kusaka, Yasuyuki Nogami (Okayama Univ.) ISEC2019-36 SITE2019-30 BioX2019-28 HWS2019-31 ICSS2019-34 EMM2019-39 |
It is well-known that the class of binomial extension field (BEF) is widely used to construct a quadratic extension fiel... [more] |
ISEC2019-36 SITE2019-30 BioX2019-28 HWS2019-31 ICSS2019-34 EMM2019-39 pp.207-214 |
HWS, ICD |
2018-10-29 15:20 |
Osaka |
Kobe Univ. Umeda Intelligent Laboratory |
A Design and Implementation of Ring-LWE Cryptography Hardware Based on Number Theoretic Transform Sora Endo, Rei Ueno, Takafumi Aoki, Naofumi Homma (Tohoku Univ.) HWS2018-52 ICD2018-44 |
This paper presents an efficient Ring-LWE cryptographic hardware architecture based on number theoretic transformation. ... [more] |
HWS2018-52 ICD2018-44 pp.31-34 |
HWS, ISEC, SITE, ICSS, EMM, IPSJ-CSEC, IPSJ-SPT [detail] |
2018-07-26 14:10 |
Hokkaido |
Sapporo Convention Center |
A New Embedding Method for Generalized LWE Weiyao Wang, Yuntao Wang, Atsushi Takayasu, Tsuyoshi Takagi (Univ. Tokyo) ISEC2018-46 SITE2018-38 HWS2018-43 ICSS2018-49 EMM2018-45 |
Estimating the computational cost for solving learning with errors (LWE) problem is an indispensable research topic to u... [more] |
ISEC2018-46 SITE2018-38 HWS2018-43 ICSS2018-49 EMM2018-45 pp.363-370 |
ISEC |
2018-05-16 16:00 |
Tokyo |
Ookayama Campus, Tokyo Institute of Technology |
[Invited Talk]
Quantum Multicollision Finding Algorithm
-- from ASIACRYPT 2017 -- Akinori Hosoyamada, Yu Sasaki, Keita Xagawa (NTT) ISEC2018-10 |
We introduce the paper ``Quantum Multicollision Finding Algorithm'' by Akinori Hosoyamada, Yu Sasaki, Keita Xagawa, whic... [more] |
ISEC2018-10 p.59 |
ICSS, IPSJ-SPT |
2018-03-07 13:50 |
Hokkaido |
Okinawa Hokubu Koyou Nouryoku Kaihatsu Sougou Center |
An analysis of the Guo-Johansson-Stankovski attack against QC-MDPC codes Yohei Maezawa, Tung Chou, Atsuko Miyaji (Osaka Univ,) ICSS2017-57 |
In ASIACRYPT 2016, the Guo-Johansson-Stankovski (GJS) attack appears as a key-recovery attack against code--based encryp... [more] |
ICSS2017-57 pp.37-42 |
ISEC, WBS, IT |
2017-03-10 12:10 |
Tokyo |
TOKAI University |
Provable Secure Signature Scheme against Quantum Adversaries based on Decisional Isomorphism of Polynomials with Two Secrets Bagus Santoso (UEC) IT2016-122 ISEC2016-112 WBS2016-98 |
Recent research has shown that signature schemes created using Fiat-Shamir transformation might be insecure against quan... [more] |
IT2016-122 ISEC2016-112 WBS2016-98 pp.149-154 |
ISEC |
2016-09-02 13:25 |
Tokyo |
Kikai-Shinko-Kaikan Bldg. |
An Homomorphic Encryption based on some kind of Indeterminate Equations Koichiro Akiyama (Toshiba), Yasuhiro Goto (HUE), Shinya Okumura (ISIT), Tsuyoshi Takagi (Kyushu Univ.), Koji Nuida, Goichiro Hanaoka (AIST) ISEC2016-43 |
Authors propose a homomorphic public-key encryption whose security is based on a LWE-like problem related to indetermina... [more] |
ISEC2016-43 pp.27-34 |
EMM, ISEC, SITE, ICSS, IPSJ-CSEC, IPSJ-SPT [detail] |
2016-07-15 14:30 |
Yamaguchi |
|
Algebraic Surface Cryptosystems using Polynomial Approximate GCD Yuichi Komano, Koichiro Akiyama (Toshiba), Yasuhiro Goto (Hokkaido Univ. of Education), Koji Nuida, Goichiro Hanaoka (AIST) ISEC2016-35 SITE2016-29 ICSS2016-35 EMM2016-43 |
Since the original proposal in 2004, several attacks have been reported against algebraic surface cryptosystems. This re... [more] |
ISEC2016-35 SITE2016-29 ICSS2016-35 EMM2016-43 pp.217-222 |