IEICE Technical Committee Submission System
Conference Schedule
Online Proceedings
[Sign in]
Tech. Rep. Archives
    [Japanese] / [English] 
( Committee/Place/Topics  ) --Press->
 
( Paper Keywords:  /  Column:Title Auth. Affi. Abst. Keyword ) --Press->

All Technical Committee Conferences  (Searched in: All Years)

Search Results: Conference Papers
 Conference Papers (Available on Advance Programs)  (Sort by: Date Descending)
 Results 1 - 14 of 14  /   
Committee Date Time Place Paper Title / Authors Abstract Paper #
RCC, ISEC, IT, WBS 2023-03-14
10:30
Yamaguchi
(Primary: On-site, Secondary: Online)
Security Analysis for Ring-LWE Problem over the Maximal Real and Complex Subfields in Cyclotomic Field
Satoshi Uesugi, Shinya Okumura, Miyaji Atsuko (Osaka Univ) IT2022-75 ISEC2022-54 WBS2022-72 RCC2022-72
The Learning With Errors problem (LWE) is a mathematical problem that supports the security of lattice based cryptograph... [more] IT2022-75 ISEC2022-54 WBS2022-72 RCC2022-72
pp.49-53
RCC, ISEC, IT, WBS 2023-03-14
15:20
Yamaguchi
(Primary: On-site, Secondary: Online)
Attribute-based encryption with keyword search
Kotaro Amemiya, Toi Tomita, Junji Shikata (Yokohama National Univ.) IT2022-94 ISEC2022-73 WBS2022-91 RCC2022-91
In this paper, we propose Attribute-Based Searchable Encryption (ABPEKS), which combines the functions of Public key Enc... [more] IT2022-94 ISEC2022-73 WBS2022-91 RCC2022-91
pp.163-170
ICSS, IPSJ-SPT 2023-03-13
17:30
Okinawa Okinawaken Seinenkaikan
(Primary: On-site, Secondary: Online)
Expanding Underlying Number Fields Reducing from Module-LWE to Ring-LWE
Sosuke Funatsu, Atsuko Miyaji, Shinya Okumura (OU) ICSS2022-71
We have researched Learning with Errors(LWE) problem and Ring-LWE problem. Module-LWE problem is a version of RLWE probl... [more] ICSS2022-71
pp.139-144
ISEC, SITE, LOIS 2022-11-18
17:20
Online Online Security Proof and Parameters for a Lattice-based Fuzzy Signature Scheme
Yuichi Hasegawa, Shingo Sato, Junji Shikata (Yokohama National Univ.) ISEC2022-45 SITE2022-49 LOIS2022-29
Recently, password-based authentication is often used for entity authentication of systems. However, because recently cy... [more] ISEC2022-45 SITE2022-49 LOIS2022-29
pp.92-99
IT, ISEC, RCC, WBS 2022-03-10
14:40
Online Online Crypto Analysis for Ring-LWE Problem on Subfield in Cyclotomic Field
Satoshi Uesugi, Shinya Okumura, Atsuko Miyaji (OU) IT2021-106 ISEC2021-71 WBS2021-74 RCC2021-81
Since the proposal of the quantum computer, steady progress has been made toward its practical use. It has been reported... [more] IT2021-106 ISEC2021-71 WBS2021-74 RCC2021-81
pp.138-144
HWS, ICD [detail] 2021-10-19
13:30
Online Online Design of NTT Hardware Based on K-RED for Lattice-Based Cryptography
Yuma Itabashi, Rei Ueno, Naofumi Homma (Tohoku Univ.) HWS2021-46 ICD2021-20
This paper presents an efficient hardware that efficiently performs Number Theoretic Transform(NTT) which is a dominant ... [more] HWS2021-46 ICD2021-20
pp.26-31
BioX, ISEC, SITE, ICSS, EMM, HWS, IPSJ-CSEC, IPSJ-SPT [detail] 2021-07-19
16:55
Online Online Evaluation on Biometric Template Protection System Based on Somewhat Homomorphic Encryption
Hiroto Tamiya, Toshiyuki Isshiki, Kengo Mori (NEC), Satoshi Obana (Hosei Univ.), Tetsushi Ohki (Shizuoka Univ.) ISEC2021-21 SITE2021-15 BioX2021-22 HWS2021-21 ICSS2021-26 EMM2021-26
Many biometric template protection systems have been proposed to perform biometric authentication while keeping the biom... [more] ISEC2021-21 SITE2021-15 BioX2021-22 HWS2021-21 ICSS2021-26 EMM2021-26
pp.68-73
IT, ISEC, WBS 2019-03-08
15:20
Tokyo University of Electro-Communications Key Reocvery Atttack on Ring-LWE Scheme Using Side-Channel Information in Number Theoretic Transform
Kento Oonishi, Noboru Kunihiro (Tokyo Univ.) IT2018-112 ISEC2018-118 WBS2018-113
Recently, the researches of post-quantum cryptography are conducted because of the realization of quantum computers in t... [more] IT2018-112 ISEC2018-118 WBS2018-113
pp.229-234
HWS, ICD 2018-10-29
13:50
Osaka Kobe Univ. Umeda Intelligent Laboratory Hardware Design of High Precision Discrete Gaussian Sampler for Lattice-based Cryptography
Keitaro Koga (UTokyo), Awano Hiromitsu (VDEC), Ikeda Makoto (UTokyo) HWS2018-49 ICD2018-41
Since quantum computer is developed to be more practical, Post-Quantum Cryptography (PQC) that is not solved with quantu... [more] HWS2018-49 ICD2018-41
pp.13-18
HWS, ICD 2018-10-29
15:20
Osaka Kobe Univ. Umeda Intelligent Laboratory A Design and Implementation of Ring-LWE Cryptography Hardware Based on Number Theoretic Transform
Sora Endo, Rei Ueno, Takafumi Aoki, Naofumi Homma (Tohoku Univ.) HWS2018-52 ICD2018-44
This paper presents an efficient Ring-LWE cryptographic hardware architecture based on number theoretic transformation. ... [more] HWS2018-52 ICD2018-44
pp.31-34
HWS, ISEC, SITE, ICSS, EMM, IPSJ-CSEC, IPSJ-SPT [detail] 2018-07-26
14:10
Hokkaido Sapporo Convention Center A New Embedding Method for Generalized LWE
Weiyao Wang, Yuntao Wang, Atsushi Takayasu, Tsuyoshi Takagi (Univ. Tokyo) ISEC2018-46 SITE2018-38 HWS2018-43 ICSS2018-49 EMM2018-45
Estimating the computational cost for solving learning with errors (LWE) problem is an indispensable research topic to u... [more] ISEC2018-46 SITE2018-38 HWS2018-43 ICSS2018-49 EMM2018-45
pp.363-370
LOIS, ISEC, SITE 2017-11-10
16:10
Kyoto   Revocable Hierarchical Identity-Based Encryption based on LWE Assumption
Atsushi Takayasu, Shuichi Katsumata (Univ. Tokyo), Takahiro Matsuda (AIST) ISEC2017-71 SITE2017-53 LOIS2017-48
Revocable hierarchical identity-based encryption~(RHIBE) is an advanced form of standard identity-based encryption. RHIB... [more] ISEC2017-71 SITE2017-53 LOIS2017-48
pp.129-136
EMM, ISEC, SITE, ICSS, IPSJ-CSEC, IPSJ-SPT [detail] 2016-07-15
13:00
Yamaguchi   Efficient Discrete Gaussian Sampling on Constrained Devices
Yuki Tanaka, Isamu Teranishi, Kazuhiko Minematsu (NEC), Yoshinori Aono (NICT) ISEC2016-32 SITE2016-26 ICSS2016-32 EMM2016-40
Lattice-based cryptography has been attracted by features of simple-implementation, quantum-resilient, and high-level fu... [more] ISEC2016-32 SITE2016-26 ICSS2016-32 EMM2016-40
pp.169-175
ICSS, ISEC, SITE, EMM, IPSJ-CSEC, IPSJ-SPT [detail] 2014-07-04
10:40
Hokkaido San-Refure Hakodate Cryptanalysis of a matrix variant of NTRU
Takanori Yasuda (ISIT), Yuya Yamaguchi (Kyushu Univ.), Xavier Dahan, Kouichi Sakurai (ISIT) ISEC2014-33 SITE2014-28 ICSS2014-37 EMM2014-33
Since its introduction in 1996, the cryptosystem NTRU has become a well-established candidate for the next generation pu... [more] ISEC2014-33 SITE2014-28 ICSS2014-37 EMM2014-33
pp.239-246
 Results 1 - 14 of 14  /   
Choose a download format for default settings. [NEW !!]
Text format pLaTeX format CSV format BibTeX format
Copyright and reproduction : All rights are reserved and no part of this publication may be reproduced or transmitted in any form or by any means, electronic or mechanical, including photocopy, recording, or any information storage and retrieval system, without permission in writing from the publisher. Notwithstanding, instructors are permitted to photocopy isolated articles for noncommercial classroom use without fee. (License No.: 10GA0019/12GB0052/13GB0056/17GB0034/18GB0034)


[Return to Top Page]

[Return to IEICE Web Page]


The Institute of Electronics, Information and Communication Engineers (IEICE), Japan