Committee |
Date Time |
Place |
Paper Title / Authors |
Abstract |
Paper # |
ISEC |
2021-05-19 10:00 |
Online |
Online |
Card-based Cryptographic Protocols with a Standard Deck of Cards Using Private Operations Yoshifumi Manabe, Hibiki Ono (Kogakuin Univ) ISEC2021-1 |
This paper shows card-based cryptographic protocols that use a standard deck of cards. They are multi-party secure comp... [more] |
ISEC2021-1 pp.1-8 |
IT |
2018-12-18 15:50 |
Fukushima |
Spa Resort Hawaiians |
[Invited Talk]
Secure Delegated Quantum Computation Takeshi Koshiba (Waseda Univ.) IT2018-33 |
In this manuscript, we take secure delegated quantum computation (SDQC).
First, we explain the basics of measurement-ba... [more] |
IT2018-33 pp.13-18 |
WBS, IT, ISEC |
2018-03-08 13:00 |
Tokyo |
Katsusika Campas, Tokyo University of Science |
On the Number of Rounds by Card-based Cryptographic Protocols Using Private Operations Hibiki Ono, Yoshifumi Manabe (Kogakuin Univ.) IT2017-124 ISEC2017-112 WBS2017-105 |
This paper discusses the number of rounds by card-based cryptographic protocols using private operations. Operations tha... [more] |
IT2017-124 ISEC2017-112 WBS2017-105 pp.121-128 |
WBS, IT, ISEC |
2018-03-08 13:25 |
Tokyo |
Katsusika Campas, Tokyo University of Science |
Card-Based Cryptographic Protocols with Private Operations which can Prevent Malicious Behaviors Youhei Shimizu, Yuki Kishi, Taroh Sasaki, Atsushi Fujioka (Kanagawa Univ) IT2017-125 ISEC2017-113 WBS2017-106 |
This paper considers malicious behaviors in card-based cryptographic protocols with private operations.
Most of card-ba... [more] |
IT2017-125 ISEC2017-113 WBS2017-106 pp.129-135 |
ISEC |
2017-09-04 11:45 |
Tokyo |
Kikai-Shinko-Kaikan Bldg. |
Card-based Cryptographic Protocols Using Private Operations Hibiki Ono, Yoshifumi Manabe (Kogakuin Univ.) ISEC2017-42 |
This paper proposes new card-based cryptographic protocols using private operations. Randomization is the key operation... [more] |
ISEC2017-42 pp.7-14 |
ICSS |
2012-11-22 16:50 |
Hiroshima |
Miyajima Mori-no-Yado |
Are measures against SSL/TLS sites dependent on the category which that site belongs?
-- obtained by crawling of renegotiation functions and RSA key lengths -- Yuji Suga (IIJ) ICSS2012-56 |
Are measures against SSL/TLS sites dependent on the category which that site belongs?
It has been recognized man-in-t... [more] |
ICSS2012-56 p.67 |
ICSS |
2011-03-25 11:35 |
Tokyo |
Suspended |
On Security Model of Cryptographic Protocols for Mobile Devices Shin'ichiro Matsuo (NICT) ICSS2010-59 |
Recently, information devices, with lower computational power than general personal computers such as smartphone, are ge... [more] |
ICSS2010-59 pp.17-21 |
IA, SITE, IPSJ-IOT [detail] |
2011-02-28 13:55 |
Kochi |
Kochi City Culture-Plaza CUL-PORT (Kochi prefecture) |
Realization of both Protection and Utilization of the Personal Information in the Medical/Care Network Hiroshi Yamaguchi, Kohtaro Tadaki, Shigeo Tsujii, Norihisa Doi (Chuo Univ.) SITE2010-52 IA2010-88 |
On consignment from the Ministry of Economy, Trade and Industry, our research group at Chuo University develops the tech... [more] |
SITE2010-52 IA2010-88 pp.33-38 |
ISEC, LOIS |
2004-11-09 09:50 |
Osaka |
Osaka Univ. |
A Formal Method for finding the Lowest Cost Attack on Cryptographic Protocols Takane Umayama, Maki Yoshida, Toru Fujiwara (Osaka Univ.) |
Various cryptographic protocols are proposed for providing secure services on computer network. Some cryptographic proto... [more] |
ISEC2004-87 OIS2004-54 pp.15-22 |