IEICE Technical Committee Submission System
Conference Schedule
Online Proceedings
[Sign in]
Tech. Rep. Archives
    [Japanese] / [English] 
( Committee/Place/Topics  ) --Press->
 
( Paper Keywords:  /  Column:Title Auth. Affi. Abst. Keyword ) --Press->

All Technical Committee Conferences  (Searched in: All Years)

Search Results: Conference Papers
 Conference Papers (Available on Advance Programs)  (Sort by: Date Descending)
 Results 1 - 13 of 13  /   
Committee Date Time Place Paper Title / Authors Abstract Paper #
WBS, IT, ISEC 2018-03-09
16:10
Tokyo Katsusika Campas, Tokyo University of Science Attacks on several Multivariate PKCs -- Attack on K(AVII)MVPKC --
Ryuichi Sakai (Osaka Electro-Communication Univ.), Masao Kasahara (Waseda Univ.) IT2017-138 ISEC2017-126 WBS2017-119
One of the anthers, Kasahara, have been proposed several public key cryptosystems based on multivariate polynomials wit... [more] IT2017-138 ISEC2017-126 WBS2017-119
pp.207-212
ISEC 2017-09-04
14:55
Tokyo Kikai-Shinko-Kaikan Bldg. New Public Key Encryption Scheme based on Code and Multivariate Polynomials in Binary Field
Tomoyuki Okubo, Bagus Santoso (UEC) ISEC2017-45
In this paper, we try to combine the code-based public key encryption scheme, McEliece public key encryption scheme, and... [more] ISEC2017-45
pp.29-33
IT, ISEC, WBS 2016-03-10
12:50
Tokyo The University of Electro-Communications Revisiting Isomorphism of Polynomials with Two Secrets
Bagus Santoso (UEC) IT2015-112 ISEC2015-71 WBS2015-95
The isomorphism of polynomials with two secret (IP2S) problem is one candidate of computational assumptions for post-qua... [more] IT2015-112 ISEC2015-71 WBS2015-95
pp.67-74
IPSJ-CSEC, ISEC, SITE, ICSS, EMM, IPSJ-SPT [detail] 2015-07-03
11:05
Aichi NAGOYA TRADE & INDUSTRY CENTER Proposal of Accelerating XL algorithm by Assigning Constants to Variables
Masahito Gotaishi, Shigeo Tsujii (Chuo Univ.) ISEC2015-23 SITE2015-21 ICSS2015-33 EMM2015-31
The Fixing strategy, which has been long used in XL algorithm is improved so that more variables can be fi xed. This imp... [more] ISEC2015-23 SITE2015-21 ICSS2015-33 EMM2015-31
pp.137-142
ISEC, IT, WBS 2015-03-02
10:30
Fukuoka The University of Kitakyushu Accelerating QUAD Stream Cipher using Optimal Extension Field on GPU
Satoshi Tanaka (ISIT/Kyushu Univ.), Chen-Mou Cheng (Kyushu Univ.), Takanori Yasuda (ISIT), Kouichi Sakurai (ISIT/Kyushu Univ.) IT2014-62 ISEC2014-75 WBS2014-54
Evaluating non-linear multivariate polynomial systems over finite
fields is an important subroutine for QUAD stream cip... [more]
IT2014-62 ISEC2014-75 WBS2014-54
pp.1-4
EMM, ISEC, SITE, ICSS, IPSJ-CSEC, IPSJ-SPT [detail] 2013-07-19
11:05
Hokkaido   Cryptanalysis of Rainbow Signature -- Enrico, you should have hacked further --
Masahito Gotaishi, Shigeo Tsujii (Chuo Univ.) ISEC2013-39 SITE2013-34 ICSS2013-44 EMM2013-41
Thomae et al. have proposed cryptanalysis of Rainbow, a multivariate public key signature system.
The methodology of so... [more]
ISEC2013-39 SITE2013-34 ICSS2013-44 EMM2013-41
pp.275-279
EMM, ISEC, SITE, ICSS, IPSJ-CSEC, IPSJ-SPT [detail] 2012-07-20
16:15
Hokkaido   Construction of the Tsujii-Shamir-Kasahara (TSK) Multivariate Public Key Cryptosystem, which relies on the Difficulty of Prime Factorization
Shigeo Tsujii, Masahito Gotaishi (Chuo Univ.) ISEC2012-39 SITE2012-35 ICSS2012-41 EMM2012-31
A new multivariate public-key cryptosystem (MPKC) is proposed. Unlike conventional MPKC system,
the polynomials in the ... [more]
ISEC2012-39 SITE2012-35 ICSS2012-41 EMM2012-31
pp.213-216
ISEC 2010-09-10
14:15
Tokyo Kikai-Shinko-Kaikan Bldg. On the Extension of Rank Attacks to MPKC
Masahito Gotaishi, Shigeo Tsujii (Chuo Univ.) ISEC2010-44
A variant of Rank Attack which is applicable to the Complementary STS is discussed. The Complementary
STS is a variant ... [more]
ISEC2010-44
pp.35-40
NLP, CAS 2010-08-02
09:50
Tokushima Naruto University of Education A Calculation of Three Layer Neural Network Structures Approximating Multivariate Polynomials
Yuichi Nakamura (Anan Nat. Coll. of Tech.), Masahiro Nakagawa (Nagaoka Univ. of Tech.) CAS2010-34 NLP2010-50
The function approximation theorem has been proved such that the suitably constructed feedforward neural networks can su... [more] CAS2010-34 NLP2010-50
pp.11-16
ISEC, LOIS 2009-11-13
09:25
Gifu Gifu Univ. Matsumoto-Imai Signature by Dual Perturbation -- Two new Modifiers --
Masahito Gotaishi, Kohtaro Tadaki, Ryo Fujita, Shigeo Tsujii (Chuo Univ.) ISEC2009-60 LOIS2009-49
A new signature scheme of MPKC is proposed.
It is created by perturbing a traditional encryption scheme in two ways.
... [more]
ISEC2009-60 LOIS2009-49
pp.61-68
ISEC 2008-09-12
13:00
Tokyo Kikai-Shinko-Kaikan Bldg. New Classes of Public Key Cryptosystems Constructed on the Basis of Low-Density Multivariate Polynomials -- Along with K(I) Knapsack Scheme --
Masao Kasahara (Osaka Gakuin Univ.) ISEC2008-63
Extensive studies have been made of the public key cryptosystems based on multivariate polynomials over $\mathbb{F}_{2}$... [more] ISEC2008-63
pp.1-7
ISEC 2008-05-16
15:45
Tokyo Kikai-Shinko-Kaikan Bldg. New Classes of Public Key Cryptosystem Constructed on the Basis of Multivariate Polynomials and Error Control Coding
Masao Kasahara (OGU) ISEC2008-13
Extensive studies have been made of the public key cryptosystems based on multivariate polynomials over $\mathbb{F}_{2}$... [more] ISEC2008-13
pp.85-90
ISEC, SITE, IPSJ-CSEC 2007-07-20
13:25
Hokkaido Future University-Hakodate A Construction Method of Nonlinear Piece In Hand Matrix for Universally Enhancing the Security of Various Multivariate Public Key Cryptosystems
Shigeo Tsujii (iisec), Kohtaro Tadaki (Chuo Univ.), Ryou Fujita (iisec) ISEC2007-56
Considering invulnerability for a quantum computer, many multivariate public key cryptosystems have been proposed in Jap... [more] ISEC2007-56
pp.75-80
 Results 1 - 13 of 13  /   
Choose a download format for default settings. [NEW !!]
Text format pLaTeX format CSV format BibTeX format
Copyright and reproduction : All rights are reserved and no part of this publication may be reproduced or transmitted in any form or by any means, electronic or mechanical, including photocopy, recording, or any information storage and retrieval system, without permission in writing from the publisher. Notwithstanding, instructors are permitted to photocopy isolated articles for noncommercial classroom use without fee. (License No.: 10GA0019/12GB0052/13GB0056/17GB0034/18GB0034)


[Return to Top Page]

[Return to IEICE Web Page]


The Institute of Electronics, Information and Communication Engineers (IEICE), Japan