IEICE Technical Committee Submission System
Conference Schedule
Online Proceedings
[Sign in]
... (for ESS/CS/ES/ISS)
Tech. Rep. Archives
... (for ES/CS)
    [Japanese] / [English] 
( Committee/Place/Topics  ) --Press->
 
( Paper Keywords:  /  Column:Title Auth. Affi. Abst. Keyword ) --Press->

All Technical Committee Conferences  (All Years)

Search Results: Conference Papers
 Conference Papers (Available on Advance Programs)  (Sort by: Date Descending)
 77件中 1~20件目  /  [Next]  
Committee Date Time Place Paper Title / Authors Abstract Paper #
ISEC, SITE, LOIS 2019-11-02
10:00
Osaka Osaka Univ. Evolving Secret Sharing: Hierarchical Access Structure with Polynomial Share Size
Sabyasachi Dutta (Univ. of Calgary), Partha Sarathi Roy, Kazuhide Fukushima, Shinsaku Kiyomoto (KDDI Research), Kouichi Sakurai (Kyushu Univ.)
Secret sharing allows storing secret information in a distributed manner among several participants.
The original setti... [more]
ISEC2019-76 SITE2019-70 LOIS2019-35
pp.93-98
IT, ISEC, WBS 2019-03-08
12:05
Tokyo University of Electro-Communications Secret Sharing on Evolving Multi-level Access Structure
Partha Sarathi Roy (KDDI Research), Sabyasachi Dutta (Kyushu Univ.), Kazuhide Fukushima, Shinsaku Kiyomoto (KDDI Research), Kouichi Sakurai (Kyushu Univ.)
 [more] IT2018-121 ISEC2018-127 WBS2018-122
pp.281-284
SITE, ISEC, LOIS 2018-11-03
12:00
Fukuoka   Computationally-independent pair of one-way functions in presence of leakage
Sabyasachi Dutta, Kouichi Sakurai (Kyushu Univ.)
 [more] ISEC2018-66 SITE2018-44 LOIS2018-26
pp.13-18
SITE, ISEC, LOIS 2018-11-03
12:30
Fukuoka   Secret sharing of color images: An algebraic approach
Sabyasachi Dutta (Kyushu Univ.), Avishek Adhikari (Univ. Calcutta), Sushmita Ruj (ISI,Kolkata), Kouichi Sakurai (Kyushu Univ.)
 [more] ISEC2018-67 SITE2018-45 LOIS2018-27
pp.19-24
EMM, IT 2017-05-23
11:55
Yamagata Yamagata University(Yonezawa Campus) Investigation on the Effect of Error Correction by RS Code on Pattern Masking of Double Encoded Two-dimensional Code
Nobuyuki Teraura (TCRI), Keiichi Iwamura (TUS), Isao Echizen (NII), Kouichi Sakurai (kyushu Univ.)
The black cell of a two dimensional code is coded in normal black ink (infrared absorption) and special black ink (infra... [more] IT2017-12 EMM2017-12
pp.67-72
ICSS, IPSJ-SPT 2017-03-13
14:50
Nagasaki University of Nagasaki A Brief Review on Anomaly Detection and its Applications to Cybersecurity
Danilo Vasconcellos Vargas, Kouichi Sakurai (Kyudai)
 [more] ICSS2016-50
pp.37-42
ICSS, IPSJ-SPT 2017-03-14
12:20
Nagasaki University of Nagasaki Evaluation of Host Independent and Distributed Detection System of the Network Attack by Using OpenFlow
Ryosuke Miyazaki (ISIT/Kyushu Univ.), Junpei Kawamoto (), Shinichi Matsumoto (Kyushu Univ.), Kouichi Sakurai (ISIT/Kyushu Univ.)
In recent years, cyber attacks are in various ways, and we must detect as many kinds of attacks as possible. Therefore, ... [more] ICSS2016-69
pp.177-182
EMM, ISEC, SITE, ICSS, IPSJ-CSEC, IPSJ-SPT [detail] 2016-07-15
11:10
Yamaguchi   Fully Secure Secret-sharing Schemes Using Indistinguishability Obfuscation
Hui Zhao, Kouichi Sakurai (Kyushu Univ.)
We provide an cryptographic realization of secret-sharing scheme based on obfuscation, and prove that this model is UC s... [more] ISEC2016-31 SITE2016-25 ICSS2016-31 EMM2016-39
pp.137-143
IT, ISEC, WBS 2016-03-11
11:15
Tokyo The University of Electro-Communications Performance Comparison of Multivariate Polynomial Encryption Schemes SRP and ABC
Takanori Yasuda (ISIT), Kouichi Sakurai (Kyushu Univ.)
Multivariate public key cryptsystem (MPKC) is one candidate for post-quantum cryptosystem. For the signature scheme Rain... [more] IT2015-134 ISEC2015-93 WBS2015-117
pp.205-210
ICSS, IPSJ-SPT 2016-03-03
15:30
Kyoto Academic Center for Computing and Media Studies, Kyoto University Current Status and Issues of the Application of AI Technology for Digital Forensics
Shinichi Matsumoto (ISIT), Kouichi Sakurai (Kyushu Univ.)
 [more]
LOIS, ISEC, SITE 2015-11-07
10:55
Kanagawa Kanagawa Univ. Extension of NTRU Using Group Ring and Its Application
Takanori Yasuda, Hiroaki Anada (ISIT), Kouichi Sakurai (Kyushu Univ.)
 [more] ISEC2015-52 SITE2015-39 LOIS2015-46
pp.103-109
IPSJ-CSEC, ISEC, SITE, ICSS, EMM, IPSJ-SPT [detail] 2015-07-02
10:15
Aichi NAGOYA TRADE & INDUSTRY CENTER Attribute-Based Two-Tier Signatures
Hiroaki Anada (ISIT), Seiko Arita (IISEC), Kouichi Sakurai (Kyushu University)
An attribute-based signature scheme is a digital signature scheme proposed in 2008 by Maji et al.,
in which a message i... [more]
ISEC2015-9 SITE2015-7 ICSS2015-19 EMM2015-17
pp.1-8
QIT
(2nd)
2015-05-25
17:00
Osaka Osaka University MQ Challenge: Solving Problems for Post-Quantum Cryptography and Their Hardness Evaluation
Takanori Yasuda (ISIT), Xavier Dahan (Ochanomizu Univ.), Yun-Ju Huang (ISIT), Tsuyoshi Takagi (Kyushu Univ.), Kouichi Sakurai (ISIT)
 [more]
ISEC, IT, WBS 2015-03-02
10:30
Fukuoka The University of Kitakyushu Accelerating QUAD Stream Cipher using Optimal Extension Field on GPU
Satoshi Tanaka (ISIT/Kyushu Univ.), Chen-Mou Cheng (Kyushu Univ.), Takanori Yasuda (ISIT), Kouichi Sakurai (ISIT/Kyushu Univ.)
Evaluating non-linear multivariate polynomial systems over finite
fields is an important subroutine for QUAD stream cip... [more]
IT2014-62 ISEC2014-75 WBS2014-54
pp.1-4
ISEC, LOIS, SITE 2014-11-21
13:25
Hyogo   Accelerating QUAD Stream Cipher using Multi-Stream Method on Graphics Processing Unit
Satoshi Tanaka (ISIT/Kyushu Univ.), Chen-Mou Cheng (Kyushu Univ.), Takanori Yasuda (ISIT), Kouichi Sakurai (ISIT/Kyushu Univ.)
QUAD is a stream cipher with a provable security based on the theory of multivariate public-key cryptography. However, Q... [more] ISEC2014-56 SITE2014-47 LOIS2014-26
pp.1-6
ISEC, LOIS, SITE 2014-11-21
13:50
Hyogo   Extension of NTRU scheme using non-commutative groups II
Takanori Yasuda, Xavier Dahan, Kouichi Sakurai (ISIT)
 [more] ISEC2014-57 SITE2014-48 LOIS2014-27
pp.7-11
ICSS, ISEC, SITE, EMM, IPSJ-CSEC, IPSJ-SPT [detail] 2014-07-04
10:40
Hokkaido San-Refure Hakodate Cryptanalysis of a matrix variant of NTRU
Takanori Yasuda (ISIT), Yuya Yamaguchi (Kyushu Univ.), Xavier Dahan, Kouichi Sakurai (ISIT)
Since its introduction in 1996, the cryptosystem NTRU has become a well-established candidate for the next generation pu... [more] ISEC2014-33 SITE2014-28 ICSS2014-37 EMM2014-33
pp.239-246
EMM, ISEC, SITE, ICSS, IPSJ-CSEC, IPSJ-SPT [detail] 2013-07-19
15:15
Hokkaido   Application of Efficient Forms of Elliptic Curves to Ate-like Pairings
Takanori Yasuda (ISIT), Tsuyoshi Takagi (Kyushu Univ.), Kouichi Sakurai (ISIT)
 [more] ISEC2013-44 SITE2013-39 ICSS2013-49 EMM2013-46
pp.323-330
IT, ISEC, WBS 2013-03-07
11:45
Osaka Kwansei Gakuin Univ., Osaka-Umeda Campus A report on Indocrypt2012
Takanori Yasuda (ISIT), Yu Sasaki (NTT), Kouichi Sakurai (Kyushu Univ.)
This paper reports on the 13th International Conference on Cryptology
in India (Indocrypt2012), held on December 9 to ... [more]
IT2012-69 ISEC2012-87 WBS2012-55
pp.45-51
IT, ISEC, WBS 2013-03-07
15:55
Osaka Kwansei Gakuin Univ., Osaka-Umeda Campus Notes on Efficient Computing over GF(2^16) using Graphics Processing Unit
Satoshi Tanaka (Kyushu Univ./ISIT), Takanori Yasuda (ISIT), Kouichi Sakurai (Kyushu Univ./ISIT)
Multivariate cryptography uses evaluating non-linear multivariate polynomial systems over finite ields for encrypting me... [more] IT2012-84 ISEC2012-102 WBS2012-70
pp.143-147
 77件中 1~20件目  /  [Next]  
Choose a download format for default settings. [NEW !!]
Text format pLaTeX format CSV format BibTeX format


[Return to Top Page]

[Return to IEICE Web Page]


The Institute of Electronics, Information and Communication Engineers (IEICE), Japan