IEICE Technical Committee Submission System
Conference Schedule
Online Proceedings
[Sign in]
Tech. Rep. Archives
    [Japanese] / [English] 
( Committee/Place/Topics  ) --Press->
 
( Paper Keywords:  /  Column:Title Auth. Affi. Abst. Keyword ) --Press->

All Technical Committee Conferences  (Searched in: All Years)

Search Results: Conference Papers
 Conference Papers (Available on Advance Programs)  (Sort by: Date Descending)
 Results 1 - 20 of 40  /  [Next]  
Committee Date Time Place Paper Title / Authors Abstract Paper #
RCC, ISEC, IT, WBS 2024-03-13
14:15
Osaka Osaka Univ. (Suita Campus) Proxy Re-encryption based on LPN
Haruki Fujimoto, Shingo Sato, Junji Shikata (YNU) IT2023-88 ISEC2023-87 WBS2023-76 RCC2023-70
We propose a proxy re-encryption (PRE) scheme based on the Learning Parity with Noise (LPN) problem using error-correcti... [more] IT2023-88 ISEC2023-87 WBS2023-76 RCC2023-70
pp.79-86
RCS, SR, SRW
(Joint)
2024-03-13
10:25
Tokyo The University of Tokyo (Hongo Campus), and online
(Primary: On-site, Secondary: Online)
[Short Paper] A Study on the use of Advanced Cryptography in Sensor Network
Takuya Kurihara, Keiichiro Mori, Kazuto Yano, Toshikazu Sakano (ATR) SR2023-87
Post-quantum cryptography (PQC) is a technology necessary to ensure security in the era of quantum computers. However, P... [more] SR2023-87
pp.1-3
RCC, ISEC, IT, WBS 2024-03-14
09:30
Osaka Osaka Univ. (Suita Campus) Security Analysis of Backdoored Classic McEliece in a Multi-User Setting
Dai Miura, Hyungrok Jo, Shingo Sato, Junji Shikata (Yokohama National Univ.) IT2023-105 ISEC2023-104 WBS2023-93 RCC2023-87
Several attacks have been proposed for the Classic McEliece cryptosystem, which is one of the 4th round candidates of th... [more] IT2023-105 ISEC2023-104 WBS2023-93 RCC2023-87
pp.197-204
VLD, HWS, ICD 2024-02-29
11:15
Okinawa
(Primary: On-site, Secondary: Online)
Design of RISC-V SoC with Post-quantum Encryption Algorithm Acceleration
Jiyuan Xin, Makoto Ikeda (UTokyo) VLD2023-110 HWS2023-70 ICD2023-99
The foundational elements of the Internet of Things (IoT) are increasingly intricate and robust Systems-on-Chips (SoCs) ... [more] VLD2023-110 HWS2023-70 ICD2023-99
pp.66-71
VLD, HWS, ICD 2024-03-01
15:30
Okinawa
(Primary: On-site, Secondary: Online)
A Pipelined NTT Transformer and its Extension Scheme Designed for the Digital Signature Scheme Crystals-Dilithium
Pengfei Sun, Makoto Ikeda (Tokyo Univ.) VLD2023-130 HWS2023-90 ICD2023-119
As quantum computing advances, it threatens the security of current encryption algorithms, making Post-Quantum Cryptogra... [more] VLD2023-130 HWS2023-90 ICD2023-119
pp.161-166
VLD, HWS, ICD 2024-03-01
15:55
Okinawa
(Primary: On-site, Secondary: Online)
Hardware Design Based on Full Parameter Support and Parallelism Optimization for Key Encapsulation Mechanism FIPS203
Yuto Nakamura, Makoto Ikeda (UTokyo) VLD2023-131 HWS2023-91 ICD2023-120
The emergence of quantum computers potentially threatens the security of traditional cryptographic techniques that depen... [more] VLD2023-131 HWS2023-91 ICD2023-120
pp.167-172
VLD, HWS, ICD 2024-03-01
16:20
Okinawa
(Primary: On-site, Secondary: Online)
An Efficient Hardware Approach for High-Speed SPHINCS+ Signature Generation
Yuta Takeshima, Makoto Ikeda (The Univ. of Tokyo) VLD2023-132 HWS2023-92 ICD2023-121
This study addresses the challenges traditional cryptographic systems face with the advent of quantum computers by focus... [more] VLD2023-132 HWS2023-92 ICD2023-121
pp.173-177
VLD, DC, RECONF, ICD, IPSJ-SLDM [detail] 2023-11-17
10:25
Kumamoto Civic Auditorium Sears Home Yume Hall
(Primary: On-site, Secondary: Online)
Low-Latency Hardware Implementation for SPHINCS+ signature generation
Yuta Takeshima, Makoto Ikeda (The Univ. of Tokyo) VLD2023-69 ICD2023-77 DC2023-76 RECONF2023-72
In recent years, research and standardization of post-quantum cryptography have been actively pursued. In 2022, the digi... [more] VLD2023-69 ICD2023-77 DC2023-76 RECONF2023-72
pp.200-204
EMM, BioX, ISEC, SITE, ICSS, HWS, IPSJ-CSEC, IPSJ-SPT [detail] 2023-07-24
17:20
Hokkaido Hokkaido Jichiro Kaikan An Identity-based Signature Scheme with Tight Security Reduction
Jiawei Chen, Hyungrok Jo, Shingo Sato, Junji Shikata (YNU) ISEC2023-29 SITE2023-23 BioX2023-32 HWS2023-29 ICSS2023-26 EMM2023-29
In this paper, we propose an identity-based signature (IBS) scheme based on the supersingular isogeny problem, with tigh... [more] ISEC2023-29 SITE2023-23 BioX2023-32 HWS2023-29 ICSS2023-26 EMM2023-29
pp.97-104
EMM, BioX, ISEC, SITE, ICSS, HWS, IPSJ-CSEC, IPSJ-SPT [detail] 2023-07-24
18:00
Hokkaido Hokkaido Jichiro Kaikan A security analysis on MQ-Sign submitted to Korean Post-Quantum Cryptography standardization
Yasuhiko Ikematsu (Kyushu Univ.), Hyungrok Jo (YNU), Takanori Yasuda (OUS) ISEC2023-31 SITE2023-25 BioX2023-34 HWS2023-31 ICSS2023-28 EMM2023-31
MQ-Sign is a variant of the UOV singature scheme proposed by Shim et al. It has been suggested as a candidate for the st... [more] ISEC2023-31 SITE2023-25 BioX2023-34 HWS2023-31 ICSS2023-28 EMM2023-31
pp.113-118
RCC, ISEC, IT, WBS 2023-03-14
13:50
Yamaguchi
(Primary: On-site, Secondary: Online)
A Proposal of Defining Fields for Efficient Ring-LWE Based Cryptography
Yuya Okubo, Shinya Okumura (Osaka Univ.), Atsuko Miyaji (Osaka Univ./JAIST) IT2022-91 ISEC2022-70 WBS2022-88 RCC2022-88
Currently, as a post-quantum computer cryptography, cryptography based on the difficulty of solving a mathematical probl... [more] IT2022-91 ISEC2022-70 WBS2022-88 RCC2022-88
pp.142-148
ISEC, SITE, LOIS 2022-11-18
09:00
Online Online Construction of Quantum-Resistant Crypotsystems combining CSIDH with Y-00 quantum stream cipher
Shigeo Tsuii, Osamu Hirota (Chuo Univ.) ISEC2022-31 SITE2022-35 LOIS2022-15
This paper describes total constructive structure of PQC (Post-quantum cryptography) including mathematical public key c... [more] ISEC2022-31 SITE2022-35 LOIS2022-15
pp.9-15
EMM, BioX, ISEC, SITE, ICSS, HWS, IPSJ-CSEC, IPSJ-SPT [detail] 2022-07-19
13:00
Online Online Side-Channel Attacks on Post-Quantum KEMs Using Multi-class Classification Neural Network
Yutaro Tanaka, Rei Ueno (Tohoku Univ.), Keita Xagawa, Akitra Ito, Junko Takahashi (NTT), Naofumi Homma (Tohoku Univ.) ISEC2022-7 SITE2022-11 BioX2022-32 HWS2022-7 ICSS2022-15 EMM2022-15
(To be available after the conference date) [more] ISEC2022-7 SITE2022-11 BioX2022-32 HWS2022-7 ICSS2022-15 EMM2022-15
pp.1-6
IT, ISEC, RCC, WBS 2022-03-10
14:15
Online Online Reconsideration of Attacks on the Search Ring-LWE Problem by Trace Map on Finite Field
Tomoka Takahashi, Shinya Okumura, Atsuko Miyaji (Osaka Univ.) IT2021-105 ISEC2021-70 WBS2021-73 RCC2021-80
Lattice-based cryptography has attracted a great deal of attention due to the standardization of Post-Quantum Cryptograp... [more] IT2021-105 ISEC2021-70 WBS2021-73 RCC2021-80
pp.130-137
VLD, HWS [detail] 2022-03-07
11:25
Online Online Design and Measurement of Crypto Processor for Post Quantum Cryptography CRYSTALS-Kyber
Taishin Shimada, Makoto Ikeda (Univ. of Tokyo) VLD2021-81 HWS2021-58
CRYSTALS-Kyber is one of the public key cryptosystems being considered as a public key cryptosystem after the advent of ... [more] VLD2021-81 HWS2021-58
pp.31-36
QIT
(2nd)
2021-11-30
16:20
Online Online Certified Deletion for Public Key Encryption and Classical Communication
Taiga Hiroka, Tomoyuki Morimae (Kyoto Univ.), Ryo Nishimaki, Takashi Yamakawa (NTT)
Broadbent and Islam (TCC’20) proposed a quantum cryptographic primitive called quantum encryption with certified deletio... [more]
HWS, ICD [detail] 2021-10-19
13:30
Online Online Design of NTT Hardware Based on K-RED for Lattice-Based Cryptography
Yuma Itabashi, Rei Ueno, Naofumi Homma (Tohoku Univ.) HWS2021-46 ICD2021-20
This paper presents an efficient hardware that efficiently performs Number Theoretic Transform(NTT) which is a dominant ... [more] HWS2021-46 ICD2021-20
pp.26-31
IA, ICSS 2021-06-21
13:30
Online Online secure isogeny-based cryptosystem CSIDH for side-channel attacks
Hayato Arai, Atusko Miyaji (Osaka Univ.) IA2021-2 ICSS2021-2
CSIDH (Commutative Supersingular Isogeny Diffie Hellman) is a kind of post-quantum cryptography that uses isogenies to e... [more] IA2021-2 ICSS2021-2
pp.8-13
QIT
(2nd)
2021-05-24
10:10
Online Online Quantum-Classical Hybrid Algorithm for LWE Problems
Yasuhito Kawano (Chubu Univ.)
This paper introduces a quantum-inspired algorithm, called interpolation, that reduces an LWE problem to another problem... [more]
WBS, IT, ISEC 2021-03-04
11:45
Online Online Security analysis for the isogeny-based cryptography CSIDH
Hayato Arai, Atsuko Miyaji, Kenta Kodera (Osaka Univ.) IT2020-123 ISEC2020-53 WBS2020-42
CSIDH (Commutative Supersingular Isogeny Diffie Hellman) is a kind of post-quantum cryptography that uses isogenies to e... [more] IT2020-123 ISEC2020-53 WBS2020-42
pp.73-80
 Results 1 - 20 of 40  /  [Next]  
Choose a download format for default settings. [NEW !!]
Text format pLaTeX format CSV format BibTeX format
Copyright and reproduction : All rights are reserved and no part of this publication may be reproduced or transmitted in any form or by any means, electronic or mechanical, including photocopy, recording, or any information storage and retrieval system, without permission in writing from the publisher. Notwithstanding, instructors are permitted to photocopy isolated articles for noncommercial classroom use without fee. (License No.: 10GA0019/12GB0052/13GB0056/17GB0034/18GB0034)


[Return to Top Page]

[Return to IEICE Web Page]


The Institute of Electronics, Information and Communication Engineers (IEICE), Japan