Committee |
Date Time |
Place |
Paper Title / Authors |
Abstract |
Paper # |
WBS, IT, ISEC |
2018-03-09 16:10 |
Tokyo |
Katsusika Campas, Tokyo University of Science |
Attacks on several Multivariate PKCs
-- Attack on K(AVII)MVPKC -- Ryuichi Sakai (Osaka Electro-Communication Univ.), Masao Kasahara (Waseda Univ.) IT2017-138 ISEC2017-126 WBS2017-119 |
One of the anthers, Kasahara, have been proposed several public key cryptosystems based on multivariate polynomials wit... [more] |
IT2017-138 ISEC2017-126 WBS2017-119 pp.207-212 |
ISEC |
2017-09-04 14:55 |
Tokyo |
Kikai-Shinko-Kaikan Bldg. |
New Public Key Encryption Scheme based on Code and Multivariate Polynomials in Binary Field Tomoyuki Okubo, Bagus Santoso (UEC) ISEC2017-45 |
In this paper, we try to combine the code-based public key encryption scheme, McEliece public key encryption scheme, and... [more] |
ISEC2017-45 pp.29-33 |
IT, ISEC, WBS |
2016-03-10 12:50 |
Tokyo |
The University of Electro-Communications |
Revisiting Isomorphism of Polynomials with Two Secrets Bagus Santoso (UEC) IT2015-112 ISEC2015-71 WBS2015-95 |
The isomorphism of polynomials with two secret (IP2S) problem is one candidate of computational assumptions for post-qua... [more] |
IT2015-112 ISEC2015-71 WBS2015-95 pp.67-74 |
IPSJ-CSEC, ISEC, SITE, ICSS, EMM, IPSJ-SPT [detail] |
2015-07-03 11:05 |
Aichi |
NAGOYA TRADE & INDUSTRY CENTER |
Proposal of Accelerating XL algorithm by Assigning Constants to Variables Masahito Gotaishi, Shigeo Tsujii (Chuo Univ.) ISEC2015-23 SITE2015-21 ICSS2015-33 EMM2015-31 |
The Fixing strategy, which has been long used in XL algorithm is improved so that more variables can be fixed. This imp... [more] |
ISEC2015-23 SITE2015-21 ICSS2015-33 EMM2015-31 pp.137-142 |
ISEC, IT, WBS |
2015-03-02 10:30 |
Fukuoka |
The University of Kitakyushu |
Accelerating QUAD Stream Cipher using Optimal Extension Field on GPU Satoshi Tanaka (ISIT/Kyushu Univ.), Chen-Mou Cheng (Kyushu Univ.), Takanori Yasuda (ISIT), Kouichi Sakurai (ISIT/Kyushu Univ.) IT2014-62 ISEC2014-75 WBS2014-54 |
Evaluating non-linear multivariate polynomial systems over finite
fields is an important subroutine for QUAD stream cip... [more] |
IT2014-62 ISEC2014-75 WBS2014-54 pp.1-4 |
EMM, ISEC, SITE, ICSS, IPSJ-CSEC, IPSJ-SPT [detail] |
2013-07-19 11:05 |
Hokkaido |
|
Cryptanalysis of Rainbow Signature
-- Enrico, you should have hacked further -- Masahito Gotaishi, Shigeo Tsujii (Chuo Univ.) ISEC2013-39 SITE2013-34 ICSS2013-44 EMM2013-41 |
Thomae et al. have proposed cryptanalysis of Rainbow, a multivariate public key signature system.
The methodology of so... [more] |
ISEC2013-39 SITE2013-34 ICSS2013-44 EMM2013-41 pp.275-279 |
EMM, ISEC, SITE, ICSS, IPSJ-CSEC, IPSJ-SPT [detail] |
2012-07-20 16:15 |
Hokkaido |
|
Construction of the Tsujii-Shamir-Kasahara (TSK) Multivariate Public Key Cryptosystem, which relies on the Difficulty of Prime Factorization Shigeo Tsujii, Masahito Gotaishi (Chuo Univ.) ISEC2012-39 SITE2012-35 ICSS2012-41 EMM2012-31 |
A new multivariate public-key cryptosystem (MPKC) is proposed. Unlike conventional MPKC system,
the polynomials in the ... [more] |
ISEC2012-39 SITE2012-35 ICSS2012-41 EMM2012-31 pp.213-216 |
ISEC |
2010-09-10 14:15 |
Tokyo |
Kikai-Shinko-Kaikan Bldg. |
On the Extension of Rank Attacks to MPKC Masahito Gotaishi, Shigeo Tsujii (Chuo Univ.) ISEC2010-44 |
A variant of Rank Attack which is applicable to the Complementary STS is discussed. The Complementary
STS is a variant ... [more] |
ISEC2010-44 pp.35-40 |
NLP, CAS |
2010-08-02 09:50 |
Tokushima |
Naruto University of Education |
A Calculation of Three Layer Neural Network Structures Approximating Multivariate Polynomials Yuichi Nakamura (Anan Nat. Coll. of Tech.), Masahiro Nakagawa (Nagaoka Univ. of Tech.) CAS2010-34 NLP2010-50 |
The function approximation theorem has been proved such that the suitably constructed feedforward neural networks can su... [more] |
CAS2010-34 NLP2010-50 pp.11-16 |
ISEC, LOIS |
2009-11-13 09:25 |
Gifu |
Gifu Univ. |
Matsumoto-Imai Signature by Dual Perturbation
-- Two new Modifiers -- Masahito Gotaishi, Kohtaro Tadaki, Ryo Fujita, Shigeo Tsujii (Chuo Univ.) ISEC2009-60 LOIS2009-49 |
A new signature scheme of MPKC is proposed.
It is created by perturbing a traditional encryption scheme in two ways.
... [more] |
ISEC2009-60 LOIS2009-49 pp.61-68 |
ISEC |
2008-09-12 13:00 |
Tokyo |
Kikai-Shinko-Kaikan Bldg. |
New Classes of Public Key Cryptosystems Constructed on the Basis of Low-Density Multivariate Polynomials
-- Along with K(I) Knapsack Scheme -- Masao Kasahara (Osaka Gakuin Univ.) ISEC2008-63 |
Extensive studies have been made of the public key cryptosystems based on multivariate polynomials over $\mathbb{F}_{2}$... [more] |
ISEC2008-63 pp.1-7 |
ISEC |
2008-05-16 15:45 |
Tokyo |
Kikai-Shinko-Kaikan Bldg. |
New Classes of Public Key Cryptosystem Constructed on the Basis of Multivariate Polynomials and Error Control Coding Masao Kasahara (OGU) ISEC2008-13 |
Extensive studies have been made of the public key cryptosystems based on multivariate polynomials over $\mathbb{F}_{2}$... [more] |
ISEC2008-13 pp.85-90 |
ISEC, SITE, IPSJ-CSEC |
2007-07-20 13:25 |
Hokkaido |
Future University-Hakodate |
A Construction Method of Nonlinear Piece In Hand Matrix for Universally Enhancing the Security of Various Multivariate Public Key Cryptosystems Shigeo Tsujii (iisec), Kohtaro Tadaki (Chuo Univ.), Ryou Fujita (iisec) ISEC2007-56 |
Considering invulnerability for a quantum computer, many multivariate public key cryptosystems have been proposed in Jap... [more] |
ISEC2007-56 pp.75-80 |