IEICE Technical Committee Submission System
Conference Schedule
Online Proceedings
[Sign in]
Tech. Rep. Archives
    [Japanese] / [English] 
( Committee/Place/Topics  ) --Press->
( Paper Keywords:  /  Column:Title Auth. Affi. Abst. Keyword ) --Press->

All Technical Committee Conferences  (All Years)

Search Results: Conference Papers
 Conference Papers (Available on Advance Programs)  (Sort by: Date Descending)
 Results 1 - 20 of 24  /  [Next]  
Committee Date Time Place Paper Title / Authors Abstract Paper #
IT 2020-09-04
Online Online A Secure Computation Protocal of Inner Product Using HQC Cryptosystem
Taiga Nakayama, Masanori Hirotomo (Saga Univ.), Youji Fukuta (Kindai Univ.), Masami Mohri (Gifu Univ.), Yoshiaki Shiraishi (Kobe Univ.) IT2020-23
In big data analysis and data mining, confidential data such as personal information is included in the data to be handl... [more] IT2020-23
ISEC 2020-05-20
Online Online Isogeny based ring signature from CSIDH
Taisei Kiyama, Koutarou Suzuki (TUT) ISEC2020-1
CSIDH (Castryck, Lange, Martindale, Panny and Renes, ASIACRYPT ’18) is proposed as a post-quan- tum cryptography using i... [more] ISEC2020-1
ISEC 2020-05-20
Online Online [Invited Talk] An Efficient F4-style Based Algorithm to Solve MQ Problems (from IWSEC 2019)
Takuma Ito, Naoyuki shinohara (NICT), Shigenori Uchiyama (TMU) ISEC2020-5
We introduce “An Efficient F4-style Based Algorithm to Solve MQ Problems”we presented in IWSEC 2019. [more] ISEC2020-5
ISEC 2020-05-20
Online Online [Invited Talk] How to Construct CSIDH on Edwards Curves (from CT-RSA 2020)
Tomoki Moriya, Hiroshi Onuki, Tsuyoshi Takagi (UTokyo) ISEC2020-8
CSIDH is an isogeny-based key-exchange protocol, that is one of the candidates for post-quantum cryptography. It is base... [more] ISEC2020-8
HWS, ICD [detail] 2019-11-01
Osaka DNP Namba SS Bld. A Design of Isogeny-Based Cryptographic Hardware Architecture Using Residue Number System
Shuto Funakoshi, Rei Ueno, Naofumi Homma (Tohoku Univ.) HWS2019-60 ICD2019-21
In this paper, we will propose an efficient hardware architecture of isogeny-based cryptography. The proposed architectu... [more] HWS2019-60 ICD2019-21
ISEC, SITE, ICSS, EMM, HWS, BioX, IPSJ-CSEC, IPSJ-SPT [detail] 2019-07-23
Kochi Kochi University of Technology Generic Even-Mansour Construction Based on Group Actions
Hector Hougaard, Chen-Mou Cheng, Miyaji Atsuko (Graduate School of Engineering, Osaka Univ.) ISEC2019-37 SITE2019-31 BioX2019-29 HWS2019-32 ICSS2019-35 EMM2019-40
The Even-Mansour cipher over bit-strings can be broken using quantum computers as shown by Kuwakado and Morii, but Alagi... [more] ISEC2019-37 SITE2019-31 BioX2019-29 HWS2019-32 ICSS2019-35 EMM2019-40
ISEC 2018-09-07
Tokyo Kikai-Shinko-Kaikan Bldg. On AND/OR Composition of the ZKBoo Protocols
Hiroaki Anada (U. Nagasaki) ISEC2018-53
The ZKBoo protocol, which was presented at USENIX Security '16, is a kind of sigma-protocol. Since the presentation it i... [more] ISEC2018-53
HWS, ISEC, SITE, ICSS, EMM, IPSJ-CSEC, IPSJ-SPT [detail] 2018-07-26
Hokkaido Sapporo Convention Center A New Embedding Method for Generalized LWE
Weiyao Wang, Yuntao Wang, Atsushi Takayasu, Tsuyoshi Takagi (Univ. Tokyo) ISEC2018-46 SITE2018-38 HWS2018-43 ICSS2018-49 EMM2018-45
Estimating the computational cost for solving learning with errors (LWE) problem is an indispensable research topic to u... [more] ISEC2018-46 SITE2018-38 HWS2018-43 ICSS2018-49 EMM2018-45
ISEC 2018-05-16
Tokyo Ookayama Campus, Tokyo Institute of Technology [Invited Talk] Quantum Multicollision Finding Algorithm -- from ASIACRYPT 2017 --
Akinori Hosoyamada, Yu Sasaki, Keita Xagawa (NTT) ISEC2018-10
We introduce the paper ``Quantum Multicollision Finding Algorithm'' by Akinori Hosoyamada, Yu Sasaki, Keita Xagawa, whic... [more] ISEC2018-10
ICSS, IPSJ-SPT 2018-03-07
Hokkaido Okinawa Hokubu Koyou Nouryoku Kaihatsu Sougou Center An analysis of the Guo-Johansson-Stankovski attack against QC-MDPC codes
Yohei Maezawa, Tung Chou, Atsuko Miyaji (Osaka Univ,) ICSS2017-57
In ASIACRYPT 2016, the Guo-Johansson-Stankovski (GJS) attack appears as a key-recovery attack against code--based encryp... [more] ICSS2017-57
ISEC 2017-09-04
Tokyo Kikai-Shinko-Kaikan Bldg. New Public Key Encryption Scheme based on Code and Multivariate Polynomials in Binary Field
Tomoyuki Okubo, Bagus Santoso (UEC) ISEC2017-45
In this paper, we try to combine the code-based public key encryption scheme, McEliece public key encryption scheme, and... [more] ISEC2017-45
ISEC, WBS, IT 2017-03-10
Tokyo TOKAI University Provable Secure Signature Scheme against Quantum Adversaries based on Decisional Isomorphism of Polynomials with Two Secrets
Bagus Santoso (UEC) IT2016-122 ISEC2016-112 WBS2016-98
Recent research has shown that signature schemes created using Fiat-Shamir transformation might be insecure against quan... [more] IT2016-122 ISEC2016-112 WBS2016-98
ISEC 2016-09-02
Tokyo Kikai-Shinko-Kaikan Bldg. An Homomorphic Encryption based on some kind of Indeterminate Equations
Koichiro Akiyama (Toshiba), Yasuhiro Goto (HUE), Shinya Okumura (ISIT), Tsuyoshi Takagi (Kyushu Univ.), Koji Nuida, Goichiro Hanaoka (AIST) ISEC2016-43
Authors propose a homomorphic public-key encryption whose security is based on a LWE-like problem related to indetermina... [more] ISEC2016-43
IT, ISEC, WBS 2016-03-11
Tokyo The University of Electro-Communications Performance Comparison of Multivariate Polynomial Encryption Schemes SRP and ABC
Takanori Yasuda (ISIT), Kouichi Sakurai (Kyushu Univ.) IT2015-134 ISEC2015-93 WBS2015-117
Multivariate public key cryptsystem (MPKC) is one candidate for post-quantum cryptosystem. For the signature scheme Rain... [more] IT2015-134 ISEC2015-93 WBS2015-117
ICSS, ISEC, SITE, EMM, IPSJ-CSEC, IPSJ-SPT [detail] 2014-07-04
Hokkaido San-Refure Hakodate Cryptanalysis of a matrix variant of NTRU
Takanori Yasuda (ISIT), Yuya Yamaguchi (Kyushu Univ.), Xavier Dahan, Kouichi Sakurai (ISIT) ISEC2014-33 SITE2014-28 ICSS2014-37 EMM2014-33
Since its introduction in 1996, the cryptosystem NTRU has become a well-established candidate for the next generation pu... [more] ISEC2014-33 SITE2014-28 ICSS2014-37 EMM2014-33
EMM, ISEC, SITE, ICSS, IPSJ-CSEC, IPSJ-SPT [detail] 2012-07-20
Hokkaido   Construction of the Tsujii-Shamir-Kasahara (TSK) Multivariate Public Key Cryptosystem, which relies on the Difficulty of Prime Factorization
Shigeo Tsujii, Masahito Gotaishi (Chuo Univ.) ISEC2012-39 SITE2012-35 ICSS2012-41 EMM2012-31
A new multivariate public-key cryptosystem (MPKC) is proposed. Unlike conventional MPKC system,
the polynomials in the ... [more]
ISEC2012-39 SITE2012-35 ICSS2012-41 EMM2012-31
ISEC 2011-12-14
Tokyo Kikai-Shinko-Kaikan Bldg. [Invited Talk] Public-Key Identification Schemes based on Multivariate Quadratic Polynomials
Koichi Sakumoto, Taizo Shirai, Harunaga Hiwatari (Sony) ISEC2011-72
A problem of solving a system of multivariate quadratic polynomials over a finite field, which is called an MQ problem, ... [more] ISEC2011-72
ISEC, IPSJ-CSEC, SITE, ICSS [detail] 2010-07-02
Aomori Hirosaki University Proposal on MPKC Signature Scheme with Check Equations
Shigeo Tsujii, Masahito Gotaishi (Chuo University) ISEC2010-23 SITE2010-19 ICSS2010-29
A new signature system of multivariate public key cryptosystem (MPKC), which uses separate check equations in order to p... [more] ISEC2010-23 SITE2010-19 ICSS2010-29
ISEC, IPSJ-CSEC, SITE, ICSS [detail] 2010-07-02
Aomori Hirosaki University Improvement of Rainbow MPKC Signature system
Masahito Gotaishi (Chuo Univ.) ISEC2010-24 SITE2010-20 ICSS2010-30
Rainbow signature system is making effective use of the advantage of
multivariate public key cryptosystem (MPKC) and o... [more]
ISEC2010-24 SITE2010-20 ICSS2010-30
ISEC 2009-12-16
Tokyo Kikai-Shinko-Kaikan Bldg. Improvement of the Internal Perturbation Modifier -- An example of Perturbed Matsumoto-Imai --
Masahito Gotaishi, Shigeo Tsujii (Chuo Univ.) ISEC2009-78
Internal Perturbation is among the modifiers of Multivariate Public Key Cryptosystems designed to reinforce the existing... [more] ISEC2009-78
 Results 1 - 20 of 24  /  [Next]  
Choose a download format for default settings. [NEW !!]
Text format pLaTeX format CSV format BibTeX format
Copyright and reproduction : All rights are reserved and no part of this publication may be reproduced or transmitted in any form or by any means, electronic or mechanical, including photocopy, recording, or any information storage and retrieval system, without permission in writing from the publisher. Notwithstanding, instructors are permitted to photocopy isolated articles for noncommercial classroom use without fee. (License No.: 10GA0019/12GB0052/13GB0056/17GB0034/18GB0034)

[Return to Top Page]

[Return to IEICE Web Page]

The Institute of Electronics, Information and Communication Engineers (IEICE), Japan