IEICE Technical Committee Submission System
Conference Schedule
Online Proceedings
[Sign in]
Tech. Rep. Archives
    [Japanese] / [English] 
( Committee/Place/Topics  ) --Press->
 
( Paper Keywords:  /  Column:Title Auth. Affi. Abst. Keyword ) --Press->

All Technical Committee Conferences  (Searched in: All Years)

Search Results: Conference Papers
 Conference Papers (Available on Advance Programs)  (Sort by: Date Descending)
 Results 1 - 20 of 26  /  [Next]  
Committee Date Time Place Paper Title / Authors Abstract Paper #
RCC, ISEC, IT, WBS 2024-03-13
10:45
Osaka Osaka Univ. (Suita Campus) Note on Impossibility of Tight Reduction on IND-CCA secure IdentityBased Encryption with Multiple Private-Key Generators
Yudai Suzuki, Atsushi Fujioka (Kanagawa Univ.), Akira Nagai (NTT Social Informatics Lab.) IT2023-81 ISEC2023-80 WBS2023-69 RCC2023-63
Identity-Based Encryption with Multiple Private-Key Generators (mPKG-IBE) has been proposed by Fujioka and Yoneyama at P... [more] IT2023-81 ISEC2023-80 WBS2023-69 RCC2023-63
pp.38-43
NS, IN
(Joint)
2024-03-01
13:25
Okinawa Okinawa Convention Center Evaluation and Analysis of Two Types of Attacks CPA and DDoS Targeting CDN caches
Jiaqi Liu, Noriaki Kamiyama (Ritsumeikan Univ) NS2023-221
The amount of Content Delivery traffic on the Internet has been increasing. The use of Internet technology is expanding.... [more] NS2023-221
pp.288-293
ICD, HWS 2023-10-31
15:25
Mie  
(Primary: On-site, Secondary: Online)
CPA ToggleToggle-based Simulation against Multiplier for Pairingairing-based Cryptography
Saito Kikuoka, Ikeda Makoto (Tokyo Univ.) HWS2023-58 ICD2023-37
Pairing-based cryptography is more secure than RSA with a shorter key length, but it is computationally expensive and mo... [more] HWS2023-58 ICD2023-37
pp.20-25
IN, NS
(Joint)
2023-03-03
09:30
Okinawa Okinawa Convention Centre + Online
(Primary: On-site, Secondary: Online)
Name Management Using IOTA in ICN
Teppei Okada, Noriaki Kamiyama (Ritsumeikan Univ.) NS2022-219
Information-centric networking (ICN), which doesn't forward content based on IP addresses as in the conventional Interne... [more] NS2022-219
pp.298-303
HWS, VLD 2023-03-03
14:40
Okinawa
(Primary: On-site, Secondary: Online)
Toggle-based simulation of side-channel attack against multiplier for pairing-based cryptography
Saito Kikuoka, Makoto Ikeda (Tokyo Univ.) VLD2022-109 HWS2022-80
Pairing-based cryptography is more secure than RSA with a shorter key length, but it is computationally expensive and mo... [more] VLD2022-109 HWS2022-80
pp.197-202
HWS, ICD [detail] 2021-10-19
10:00
Online Online Evaluations of tamper resistance by Wave-FF for Power Analysis Attack on AES
Tomoaki Ukezono (Fukuoka Univ.) HWS2021-41 ICD2021-15
Dual-Rail design represented by WDDL can be mentioned as a countermeasure against information leakage from power consump... [more] HWS2021-41 ICD2021-15
pp.1-6
SIP, IT, RCS 2021-01-22
16:45
Online Online Revisiting the IND-CPA Security of LWE Encryption Scheme
Takahiro Arai, Bagus Santoso, Kaoru Takemure (UEC) IT2020-111 SIP2020-89 RCS2020-202
In this paper, we propose a new simpler security notion which is
equivalence to the standard IND-CPA notion,
and base... [more]
IT2020-111 SIP2020-89 RCS2020-202
pp.271-276
NS, ICM, CQ, NV
(Joint)
2019-11-22
09:00
Hyogo Rokkodai 2nd Campus, Kobe Univ. Twilio services analyses and positioning by view of IN services implementation technology.
Yoshihiro Konno (Twilio Japan) NS2019-127
Twilio is Cloud API service (Cloud Communication Platform) which allows adding capabilities like voice, messaging (SMS/C... [more] NS2019-127
pp.39-44
IA, ICSS 2019-06-07
11:45
Miyagi Research Institute for Electrical Communication, Tohoku University A Survey on the Risks of Bypassing Public Captive Portals through Covert Channels
Hidetaka Masuda, Hideya Ochiai, Hiroshi Esaki (UTokyo) IA2019-9 ICSS2019-9
Public Wi-Fi networks have spread to the world and is now an important infrastructure to us. However, there are many hot... [more] IA2019-9 ICSS2019-9
pp.43-48
LQE, LSJ 2017-05-25
15:40
Ishikawa   [Invited Talk] Ultra-high intensity, repetitive J-KAREN-P laser system at QST
Hiromitsu Kiriyama, Mamiko Nishiuchi, Alexander Pirozhkov, Yuji Fukuda, Hironao Sakaki, Akito Sagisaka, Nicholas Dover, Kotaro Kondo, Keita Nishitani, Koichi Ogura, Michiaki Mori, Yasuhiro Miyasaka, Masaki Kando, Kiminori Kondo (QST) LQE2017-5
The OPCPA/Ti:sapphire hybrid laser system (named J-KAREN-P laser system) at QST is an infrastructure aiming to realize e... [more] LQE2017-5
pp.21-23
LQE, LSJ 2017-05-25
16:05
Ishikawa   Development of a high-energy green laser for an optically synchronized OPCPA
Yasuhiro Miyasaka, Hiromitsu Kiriyama, Maki Kishimoto, Michiaki Mori, Masaki Kando, Kiminori Kondo (QST)
We are developing an optically synchronized pump source for stabilization of output parameters in optical parametric chi... [more] LQE2017-6
pp.25-28
EMCJ, IEE-EMC 2014-06-20
11:25
Hyogo Kobe Univ. Investigation on Aes Circuites in Information-Leaking-Behavior by Means of Internal Equivalent Current Source
Nobuhiro Tai, Kengo Iokibe, Hiroto Kagotani, Hiroyuki Onishi, Kazuhiro Maeshima, Yoshitaka Toyota (Okayama Univ.), Tetsushi Watanabe (Industrial Technology Center of Okayama Prefecture) EMCJ2014-12
 [more] EMCJ2014-12
pp.13-18
VLD, DC, IPSJ-SLDM, CPSY, RECONF, ICD, CPM
(Joint) [detail]
2013-11-27
10:20
Kagoshima   Performance Evaluation of Tamper-Resistant AES Cryptographic Circuit utilizing Hybrid Masking Dual-Rail ROM
Shintaro Ukai, Tsunato Nakai, Toshiki Kitamura, Takaya Kubota, Mitsuru Shiozaki, Takeshi Fujino (Ritsumeikan Univ.) CPM2013-111 ICD2013-88
Tamper-resistant devices require to protect cryptographic circuit from side-channel attacks such as power analysis (PA) ... [more] CPM2013-111 ICD2013-88
pp.19-24
VLD, DC, IPSJ-SLDM, CPSY, RECONF, ICD, CPM
(Joint) [detail]
2012-11-28
10:55
Fukuoka Centennial Hall Kyushu University School of Medicine AES Cryptographic Circuit utilizing Dual-Rail RSL Memory Technique
Yuki Hashimoto, Mitsuru Shiozaki, Takaya Kubota, Takeshi Fujino (Ritsumeikan Univ.) CPM2012-120 ICD2012-84
Tamper LSI design methodology has to be applied in order to implement secure cryptographic circuit, which is resistant t... [more] CPM2012-120 ICD2012-84
pp.43-48
ISEC 2012-09-21
16:15
Tokyo Kikai-Shinko-Kaikan Bldg. Pilot Lamps can Serve as Side Channels
Shohei Saito, Tsutomu Matsumoto (Yokohama Nat'l Univ.) ISEC2012-54
Measuring microscopic variation of physical quantity such as power consumption or electromagnetic emanation of cryptogra... [more] ISEC2012-54
pp.51-58
RECONF 2012-09-18
13:20
Shiga Epock Ritsumei 21, Ritsumeikan Univ. [Invited Talk] The LSI Design Methodology of Tamper Resistant Cryptographic Circuit
Takeshi Fujino, Mitsuru Shiozaki, Takaya Kubota (Ritsumeikan Univ.), Masaya Yoshikawa (Meijyo Uiv.) RECONF2012-29
Tamper LSI Design Methodology have to be applied in order to implement secure cryptographic circuit which is resistant t... [more] RECONF2012-29
pp.31-36
EMCJ 2011-04-22
14:35
Hyogo University of Hyogo Decoupling of Power Distribution Network to Improve Tolerance of Side-Channel Attacks in Cryptographic FPGA
Tetsuo Amano, Kengo Iokibe, Yoshitaka Toyota (Okayama Univ.) EMCJ2011-4
Side-channel attack is a cryptanalytic attack by means of radio frequency (RF) power current from cryptographic IC. On-b... [more] EMCJ2011-4
pp.19-24
DC, CPSY 2011-04-12
14:30
Tokyo   [Invited Talk] Tamper LSI Design Methodology Resistant to Malicious Attack
Takeshi Fujino, Mitsuru Shiozaki (Ritsumeikan Univ.), Masaya Yoshikawa (Meijyo Univ.) CPSY2011-4 DC2011-4
Tamper LSI Design Methodology have to be applied in order to implement secure cryptographic circuit which is resistant t... [more] CPSY2011-4 DC2011-4
pp.17-22
VLD 2011-03-03
10:20
Okinawa Okinawaken-Danjo-Kyodo-Sankaku Center Implementation and Security Evaluation of DPA-Resistant DES Circuit utilizing Domino-RSL technique
Katsuhiko Iwai, Kenji Kojima, Mitsuru Shiozaki, Syunsuke Asagawa, Takeshi Fujino (Ritsumeikan Univ.) VLD2010-126
Some secure DPA-resistant techniques to protect from Side-Channel Attack such as Differential Power Analysis (DPA) have ... [more] VLD2010-126
pp.57-62
ISEC 2010-12-15
13:50
Tokyo Kikai-Shinko-Kaikan Bldg. The Mutual Information Analysis using a classification technique of combination
Kuniji Wakabayashi, Keisuke Iwai, Takakazu Kurokawa (NDA) ISEC2010-67
Against Side channel Attack Standard Evaluation BOard(SASEBO) implemented the AES encryption as hardware circuit, carr... [more] ISEC2010-67
pp.13-18
 Results 1 - 20 of 26  /  [Next]  
Choose a download format for default settings. [NEW !!]
Text format pLaTeX format CSV format BibTeX format
Copyright and reproduction : All rights are reserved and no part of this publication may be reproduced or transmitted in any form or by any means, electronic or mechanical, including photocopy, recording, or any information storage and retrieval system, without permission in writing from the publisher. Notwithstanding, instructors are permitted to photocopy isolated articles for noncommercial classroom use without fee. (License No.: 10GA0019/12GB0052/13GB0056/17GB0034/18GB0034)


[Return to Top Page]

[Return to IEICE Web Page]


The Institute of Electronics, Information and Communication Engineers (IEICE), Japan