IEICE Technical Committee Submission System
Conference Schedule
Online Proceedings
[Sign in]
Tech. Rep. Archives
    [Japanese] / [English] 
( Committee/Place/Topics  ) --Press->
 
( Paper Keywords:  /  Column:Title Auth. Affi. Abst. Keyword ) --Press->

All Technical Committee Conferences  (Searched in: All Years)

Search Results: Conference Papers
 Conference Papers (Available on Advance Programs)  (Sort by: Date Descending)
 Results 1 - 20 of 142  /  [Next]  
Committee Date Time Place Paper Title / Authors Abstract Paper #
ICSS, IPSJ-SPT 2024-03-21
16:10
Okinawa OIST
(Primary: On-site, Secondary: Online)
Considerations on Differential Privacy Mechanisms in MNIST
Naoki Kawahara, Pengxuan Wei, Ryunosuke Higashi, Kenta Okada, Tatsuhiro Yamatsuki, Atsuko Miyaji (Osaka Univ.) ICSS2023-79
In recent years, data utilization technologies, including machine learning, have been steadily advancing. One means of p... [more] ICSS2023-79
pp.71-78
ICSS, IPSJ-SPT 2024-03-22
10:55
Okinawa OIST
(Primary: On-site, Secondary: Online)
Improved signature-embedding techniques against backdoor attacks on DNN models
Akira Fujimoto, Yuntao Wang, Atsuko Miyaji (OU) ICSS2023-87
In recent years, machine learning, particularly deep learning, has made remarkable strides, and has great impact on our ... [more] ICSS2023-87
pp.129-136
ICSS, IPSJ-SPT 2024-03-22
11:45
Okinawa OIST
(Primary: On-site, Secondary: Online)
Fast and Secure Scalar Multiplication for the GLS254 Binary Elliptic Curve
Ryosuke Kido, Atsuko Miyaji (OU) ICSS2023-94
Elliptic curve cryptosystems (ECCs) are cryptographic schemes based on the discrete logarithm problem on an elliptic cur... [more] ICSS2023-94
pp.180-187
ICSS, IPSJ-SPT 2024-03-22
12:10
Okinawa OIST
(Primary: On-site, Secondary: Online)
Extension of the linear approximation for stream cipher ChaCha
Yurie Okada, Atsuko Miyaji (OU) ICSS2023-95
(To be available after the conference date) [more] ICSS2023-95
pp.188-193
RCC, ISEC, IT, WBS 2024-03-13
14:40
Osaka Osaka Univ. (Suita Campus) Performance Evaluation of Post-Quantum Digital Signature Schemes
Ryoto Morizono, Yuntao Wang, Atsuko Miyaji (Osaka Univ.) IT2023-89 ISEC2023-88 WBS2023-77 RCC2023-71
It is believed that RSA and elliptic curve cryptography, which are currently widely used, may be broken by quantum compu... [more] IT2023-89 ISEC2023-88 WBS2023-77 RCC2023-71
pp.87-93
RCC, ISEC, IT, WBS 2024-03-13
14:15
Osaka Osaka Univ. (Suita Campus) Data processing methods for high-performance Privacy-Preserving Machine Learning
Tatsuhiro Yamatsuki (Osaka Univ.), Atsuko Miyaji (Osaka Univ./JAIST) IT2023-94 ISEC2023-93 WBS2023-82 RCC2023-76
Currently, attempts are being made in various fields to solve problems by utilizing big data. However, privacy protectio... [more] IT2023-94 ISEC2023-93 WBS2023-82 RCC2023-76
pp.118-126
RCC, ISEC, IT, WBS 2024-03-13
14:40
Osaka Osaka Univ. (Suita Campus) On Privacy Mechanism to Discreat Data fit for Machine Learning
Tomoshi Yagishita, Atsuko Miyaji (OU) IT2023-95 ISEC2023-94 WBS2023-83 RCC2023-77
In recent years, while the use of personal data has become increasingly active, the importance of privacy protection has... [more] IT2023-95 ISEC2023-94 WBS2023-83 RCC2023-77
pp.127-134
RCC, ISEC, IT, WBS 2024-03-13
16:35
Osaka Osaka Univ. (Suita Campus) Consideration on Definition Field for Efficient Ring-LWE Problem
Rintaro Yamada, Shinya Okumura, Atsuko Miyaji (OU) IT2023-99 ISEC2023-98 WBS2023-87 RCC2023-81
Currently, as one of the candidates for the post-quantum cryptography, there are cryptosystems based on the difficulty o... [more] IT2023-99 ISEC2023-98 WBS2023-87 RCC2023-81
pp.158-165
RCC, ISEC, IT, WBS 2024-03-13
17:00
Osaka Osaka Univ. (Suita Campus) Study on the computatinal cost of Triple Sieve algorithm by applying in ideal property
Seishiro Terada, Yuntao Wang, Atsuko Miyaji (Osaka Univ.) IT2023-100 ISEC2023-99 WBS2023-88 RCC2023-82
 [more] IT2023-100 ISEC2023-99 WBS2023-88 RCC2023-82
pp.166-173
RCC, ISEC, IT, WBS 2024-03-14
10:20
Osaka Osaka Univ. (Suita Campus) Consideration of BKZ by reordering lattice basis vectors
Katsuya Katsuya, Yuntao Wang, Atsuko Miyaji (Osaka Univ.) IT2023-107 ISEC2023-106 WBS2023-95 RCC2023-89
 [more] IT2023-107 ISEC2023-106 WBS2023-95 RCC2023-89
pp.212-219
RCC, ISEC, IT, WBS 2024-03-14
09:05
Osaka Osaka Univ. (Suita Campus) Efficient Key-Value Commitments with batch update and verification
Toshiyuki Mineta, Atsuko Miyaji (OU) IT2023-112 ISEC2023-111 WBS2023-100 RCC2023-94
As Blockchain grows in size, the resources to validate that a transaction is true increase linearly. Key-value commitme... [more] IT2023-112 ISEC2023-111 WBS2023-100 RCC2023-94
pp.241-248
RCC, ISEC, IT, WBS 2024-03-14
14:15
Osaka Osaka Univ. (Suita Campus) Proposal of Methods to Detect Backdoor Attacks Using Signature Embedding Techniques
Shintaro Yamashita, Wang Yuntao, Atsuko Miyaji (OU) IT2023-126 ISEC2023-125 WBS2023-114 RCC2023-108
 [more] IT2023-126 ISEC2023-125 WBS2023-114 RCC2023-108
pp.317-323
ICSS 2023-11-16
16:00
Ishikawa IT Business Plaza Musashi and Online
(Primary: On-site, Secondary: Online)
Security Analysis of MP-LWE using Weighted Lattice Reduction
Yudai Tagawa, Shinya Okumura, Atsuko Miyaji (Osaka Univ.) ICSS2023-57
In 2017, Roşca et al. proposed the Middle-Product LWE (MP-LWE) problem, a new LWE problem variant. The MP-LWE problem mi... [more] ICSS2023-57
pp.42-48
ICSS 2023-11-16
16:25
Ishikawa IT Business Plaza Musashi and Online
(Primary: On-site, Secondary: Online)
Redefinition of pair-PNB and application to ChaCha differential linear analysis
Kai Izumi, Atsuko Miyaji (Osaka Univ.) ICSS2023-58
ChaCha is the stream cipher adopted in TLS1.3 and analyzing its security is important given its wide deployment. Differe... [more] ICSS2023-58
pp.49-56
ICSS 2023-11-16
16:50
Ishikawa IT Business Plaza Musashi and Online
(Primary: On-site, Secondary: Online)
Improved Secret Key Transport mechanism using CSIDH
Kodai Hayashida, Atsuko Miyaji (Osaka Univ.) ICSS2023-59
In order to achieve secure communication over public networks,it is common practice to share keys and communicate
confi... [more]
ICSS2023-59
pp.57-63
ICSS 2023-11-17
10:25
Ishikawa IT Business Plaza Musashi and Online
(Primary: On-site, Secondary: Online)
Chameleon Hash Function with Forward-Security
Pengxuan Wei, Atsuko Miyaji (Osaka Univ.), Yangguang Tian (University Of Surrey) ICSS2023-61
Chameleon Hash Function (CH) is a hash function with a public and secret key pair. CH is collision-resistant for users w... [more] ICSS2023-61
pp.70-76
LOIS, SITE, ISEC 2023-11-09
14:20
Hiroshima Satellite Campus Hiroshima
(Primary: On-site, Secondary: Online)
Improving Triple Sieve Algorithm on Ideal Lattice
Seishiro Terada, Yuntao Wang, Atsuko Miyaji (Osaka Univ.) ISEC2023-59 SITE2023-53 LOIS2023-17
 [more] ISEC2023-59 SITE2023-53 LOIS2023-17
pp.33-40
RCC, ISEC, IT, WBS 2023-03-14
09:25
Yamaguchi
(Primary: On-site, Secondary: Online)
Security Anslysis of binary elliptic curve GLS254
Yue Gao (Osaka Univ.), ShuFan Wu (Taiwan Univ.), Atsuko Miyaji (Osaka Univ.) IT2022-73 ISEC2022-52 WBS2022-70 RCC2022-70
In now days, light weight system like Iot(Internet of Things) and FPGA have attracted many researchers and have applied... [more] IT2022-73 ISEC2022-52 WBS2022-70 RCC2022-70
pp.33-40
RCC, ISEC, IT, WBS 2023-03-14
10:55
Yamaguchi
(Primary: On-site, Secondary: Online)
Safety Analysis for The Post-quantum Module-LWE Problem on Subfield in Cyclotomic Field
Kosuke Tamura, Shinya Okumura, Atsuko Miyaji (OU) IT2022-76 ISEC2022-55 WBS2022-73 RCC2022-73
 [more] IT2022-76 ISEC2022-55 WBS2022-73 RCC2022-73
pp.54-60
RCC, ISEC, IT, WBS 2023-03-14
13:50
Yamaguchi
(Primary: On-site, Secondary: Online)
A Proposal of Defining Fields for Efficient Ring-LWE Based Cryptography
Yuya Okubo, Shinya Okumura (Osaka Univ.), Atsuko Miyaji (Osaka Univ./JAIST) IT2022-91 ISEC2022-70 WBS2022-88 RCC2022-88
Currently, as a post-quantum computer cryptography, cryptography based on the difficulty of solving a mathematical probl... [more] IT2022-91 ISEC2022-70 WBS2022-88 RCC2022-88
pp.142-148
 Results 1 - 20 of 142  /  [Next]  
Choose a download format for default settings. [NEW !!]
Text format pLaTeX format CSV format BibTeX format
Copyright and reproduction : All rights are reserved and no part of this publication may be reproduced or transmitted in any form or by any means, electronic or mechanical, including photocopy, recording, or any information storage and retrieval system, without permission in writing from the publisher. Notwithstanding, instructors are permitted to photocopy isolated articles for noncommercial classroom use without fee. (License No.: 10GA0019/12GB0052/13GB0056/17GB0034/18GB0034)


[Return to Top Page]

[Return to IEICE Web Page]


The Institute of Electronics, Information and Communication Engineers (IEICE), Japan