IEICE Technical Committee Submission System
Conference Schedule
Online Proceedings
[Sign in]
Tech. Rep. Archives
    [Japanese] / [English] 
( Committee/Place/Topics  ) --Press->
 
( Paper Keywords:  /  Column:Title Auth. Affi. Abst. Keyword ) --Press->

All Technical Committee Conferences  (All Years)

Search Results: Conference Papers
 Conference Papers (Available on Advance Programs)  (Sort by: Date Descending)
 Results 1 - 20 of 154  /  [Next]  
Committee Date Time Place Paper Title / Authors Abstract Paper #
LOIS, ISEC, SITE 2020-11-06
11:45
Online Online Encodings and Numbers of Ciphertexts in Garbled Circuits on Three-valued Logic
Shunsuke Hayashi, Taroh Sasaki, Atsushi Fujioka (Kanagawa Univ.) ISEC2020-35 SITE2020-32 LOIS2020-15
Reducing the number of ciphertexts in a garbled circuit, a realization
method of secure computation, has been researche... [more]
ISEC2020-35 SITE2020-32 LOIS2020-15
pp.19-25
ICD, HWS [detail] 2020-10-26
15:45
Online Online Low-Latency Countermeasure Circuit Oriented Hardware Trojan and its Evaluation
Shu Takemoto, Yoshiya Ikezaki, Yusuke Nozaki, Masaya Yoshikawa (Meijo Univ.) HWS2020-37 ICD2020-26
Outsourcing and the use of IP are the mainstream in the design and manufacturing of system LSIs. On the other hand, the ... [more] HWS2020-37 ICD2020-26
pp.71-76
ISEC, IT, WBS 2020-03-11
09:30
Hyogo University of Hyogo
(Cancelled but technical report was issued)
Security Evaluation of Differential Attacks against KCipher-2
Jin Hoki, Kosei Sakamoto (Hyogo Univ.), Kazuhiko Minematsu (NEC), Takanori Isobe (Hyogo Univ./NICT) IT2019-108 ISEC2019-104 WBS2019-57
This paper will investigate the resistance of KCipger-2 against differential attacks, which is the unique official strea... [more] IT2019-108 ISEC2019-104 WBS2019-57
pp.121-126
ISEC, IT, WBS 2020-03-11
10:20
Hyogo University of Hyogo
(Cancelled but technical report was issued)
Security Proof of Cryptographic Permutation Based on Ideal Ciphers
Ryota Nakamichi, Tetsu Iwata (Nagoya Univ.) IT2019-110 ISEC2019-106 WBS2019-59
Coron et al. proved the security of an iterative construction of a $2n$-bit cryptographic permutation that uses $3$ idea... [more] IT2019-110 ISEC2019-106 WBS2019-59
pp.135-141
NS, IN
(Joint)
2020-03-06
11:00
Okinawa Royal Hotel Okinawa Zanpa-Misaki
(Cancelled but technical report was issued)
IOTA-Based Access Control Framework for the Internet of Things
Ruka Nakanishi, Yuanyu Zhang, Masahiro Sasabe, Shoji Kasahara (NAIST) NS2019-230
With the rapid dissemination of the Internet of Things (IoT), the number of resources deployed in IoT systems such as d... [more] NS2019-230
pp.295-300
DC 2020-02-26
12:25
Tokyo   Glitch PUF utilizing Unrolled Architecture and its Evaluation
Yusuke Nozaki, Masaya Yoshikawa (Meijo Univ.) DC2019-91
The physically unclonable functions (PUFs) have attracted attention as technologies for authentication of large scale in... [more] DC2019-91
pp.31-36
ISEC, SITE, ICSS, EMM, HWS, BioX, IPSJ-CSEC, IPSJ-SPT [detail] 2019-07-24
15:25
Kochi Kochi University of Technology Garbled Circuit by three valued logics by Bochvar
Shunsuke Hayashi, Taroh Sasaki, Athushi Fujioka (Kanagawa Univ.) ISEC2019-56 SITE2019-50 BioX2019-48 HWS2019-51 ICSS2019-54 EMM2019-59
This pepar considers the number of ciphertexts in garbled circuits on the three-valued logics. Lindell et al. proposed f... [more] ISEC2019-56 SITE2019-50 BioX2019-48 HWS2019-51 ICSS2019-54 EMM2019-59
pp.363-368
EMM, IT 2019-05-24
13:30
Hokkaido Asahikawa International Conference Hall Higher Order Differential Property of BIG Block Cipher
Naoki Shibayama (Japan Air Self-Defense Force), Yasutaka Igarashi, Toshinobu Kaneko (Tokyo Univ. of Science) IT2019-12 EMM2019-12
BIG is a block cipher with 128-bit block length and 128-bit key length proposed by Demeri et.al in 2019. The number of r... [more] IT2019-12 EMM2019-12
pp.61-66
IT, ISEC, WBS 2019-03-08
16:45
Tokyo University of Electro-Communications [Invited Talk] Exceptional Experiences of my Research Activities on Modern Cryptography
Kazuo Ohta (UEC) IT2018-115 ISEC2018-121 WBS2018-116
As a fellow receiving a prize commemorative lecture, I look back on 36-year research and education experiences on modern... [more] IT2018-115 ISEC2018-121 WBS2018-116
p.249
HWS, VLD 2019-03-01
16:20
Okinawa Okinawa Ken Seinen Kaikan Low-Cost Power Analysis Countermeasures for Unrolled Architecture Implementation PRINCE
Shu Takemoto, Yusuke Nozaki, Masaya Yoshikawa (Meijo Univ.) VLD2018-134 HWS2018-97
Lightweight block ciphers, which can be implemented with low cost, are suitable for improving the safety of small device... [more] VLD2018-134 HWS2018-97
pp.243-248
HWS, VLD 2019-03-02
10:00
Okinawa Okinawa Ken Seinen Kaikan An ultra-light weight implementation of PRINCE-family cryptographic processor
Kohei Matsuda, Makoto Nagata, Noriyuki Miura (Kobe Univ.) VLD2018-137 HWS2018-100
An ultra-light-weight PRINCE cryptographic processor was proposed by Miura, et al. in 2017.
In this paper, based on thi... [more]
VLD2018-137 HWS2018-100
pp.261-265
NLP, NC
(Joint)
2019-01-24
09:50
Hokkaido The Centennial Hall, Hokkaido Univ. Messsage transcription using partial synchronization of intermittently coupled chaotic oscillators
Kenichiro Cho, Masashi Onishi, Takaya Miyano (Ritsumeikan Univ.) NLP2018-110
We have developed a method for the secure communication of a short message via the partial synchronization of intermitte... [more] NLP2018-110
pp.77-82
SITE, ISEC, LOIS 2018-11-03
11:00
Fukuoka   A Statistical Method for Searching Biases of Stream Ciphers
Seiya Tanamoto, Toshihiro Ohigashi (Tokai Univ), Takanori Isobe (Univ. of Hyogo) ISEC2018-64 SITE2018-42 LOIS2018-24
Plaintext recovery attacks on stream ciphers based on biases of keystream in the broadcast setting where same plaintext ... [more] ISEC2018-64 SITE2018-42 LOIS2018-24
pp.1-6
SITE, ISEC, LOIS 2018-11-03
11:30
Fukuoka   A Study on a New Evaluation Tool for Pseudo Random Number Generators based on Neural Network
Hayato Kimura (Tokai Univ.), Takanori Isobe (Univ. of Hyogo), Toshihiro Ohigashi (Tokai Univ.) ISEC2018-65 SITE2018-43 LOIS2018-25
Security of stream cipher depends on PRNG (Pseudo Random Number Generator) of the stream cipher. There are evaluation me... [more] ISEC2018-65 SITE2018-43 LOIS2018-25
pp.7-12
ISEC 2018-09-07
11:30
Tokyo Kikai-Shinko-Kaikan Bldg. [Invited Talk] Encrypt or Decrypt? To Make a Single-Key Beyond Birthday Secure Nonce-Based MAC (from CRYPTO 2018)
Kan Yasuda (NTT) ISEC2018-55
In this talk we explain the content of “Encrypt or Decrypt? To Make a Single-Key Beyond Birthday Secure Nonce-Based MAC... [more] ISEC2018-55
p.27
HWS, ISEC, SITE, ICSS, EMM, IPSJ-CSEC, IPSJ-SPT [detail] 2018-07-25
13:10
Hokkaido Sapporo Convention Center [Invited Talk] Tightly-Secure Key-Encapsulation Mechanism in the Quantum Random Oracle Model (from EUROCRYPT 2018)
Tsunekazu Saito, Keita Xagawa, Takashi Yamakawa (NTT) ISEC2018-22 SITE2018-14 HWS2018-19 ICSS2018-25 EMM2018-21
We introduce the paper ``Tightly-Secure Key-Encapsulation Mechanism in the Quantum Random Oracle Model'' by Tsunekazu Sa... [more] ISEC2018-22 SITE2018-14 HWS2018-19 ICSS2018-25 EMM2018-21
p.89
ISEC 2018-05-16
16:30
Tokyo Ookayama Campus, Tokyo Institute of Technology [Invited Talk] New Key Recovery Attacks on Minimal Two-Round Even-Mansour Ciphers
Takanori Isobe (Univ. of Hyogo), Kyoji Shibutani (Nagoya Univ.) ISEC2018-11
In this invited talk, we introduce our paper presented in international cryptographic conference ASIACRYPT 2017 held on ... [more] ISEC2018-11
p.61
NLP 2018-04-26
14:10
Kumamoto Kumaoto Univ. A Study on Security Enhancement of 64-Bit Block Cipher Systems with Ring Structure
Toshihiro Ichiki, Akio Tsuneda (Kumamoto Univ.) NLP2018-7
In a modern society, safety is required when exchanging information. In order to secure its safety, we are taking measur... [more] NLP2018-7
pp.31-34
WBS, IT, ISEC 2018-03-09
09:25
Tokyo Katsusika Campas, Tokyo University of Science On Confirming Ciphertext Update in Key-Updatable Public-key Encryption with Keyword Search
Yuka Sakoda, Honomu Ohtomo, Naoki Matsunaga, Taroh Sasaki, Atsushi Fujioka (Kanagawa Univ.) IT2017-140 ISEC2017-128 WBS2017-121
A public-key encryption with keyword search (PEKS) scheme is applicable to safe cloud services as a user can search a ke... [more] IT2017-140 ISEC2017-128 WBS2017-121
pp.219-223
ICSS, IPSJ-SPT 2018-03-07
14:50
Hokkaido Okinawa Hokubu Koyou Nouryoku Kaihatsu Sougou Center Safety evaluation of stream cipher, Salsa20/ChaCha20 by redesign of diffusion
Yusuke Matsuoka, Atsuko Miyaji (Osaka Univ.) ICSS2017-62
As of April 2016, in newly proposed TLS1.3, as encryption methods of symmetric key encryption scheme, AES in the block e... [more] ICSS2017-62
pp.67-72
 Results 1 - 20 of 154  /  [Next]  
Choose a download format for default settings. [NEW !!]
Text format pLaTeX format CSV format BibTeX format
Copyright and reproduction : All rights are reserved and no part of this publication may be reproduced or transmitted in any form or by any means, electronic or mechanical, including photocopy, recording, or any information storage and retrieval system, without permission in writing from the publisher. Notwithstanding, instructors are permitted to photocopy isolated articles for noncommercial classroom use without fee. (License No.: 10GA0019/12GB0052/13GB0056/17GB0034/18GB0034)


[Return to Top Page]

[Return to IEICE Web Page]


The Institute of Electronics, Information and Communication Engineers (IEICE), Japan