|
|
All Technical Committee Conferences (Searched in: All Years)
|
|
Search Results: Conference Papers |
Conference Papers (Available on Advance Programs) (Sort by: Date Descending) |
|
Committee |
Date Time |
Place |
Paper Title / Authors |
Abstract |
Paper # |
ISEC, LOIS, SITE |
2016-11-07 14:55 |
Fukui |
Community Hall & AOSSA Mall, Fukui |
Factorization of Composite Numbers having a Prime of Special Form with Elliptic Curve Method Masaaki Shirase (FUN) ISEC2016-54 SITE2016-44 LOIS2016-32 |
A previous work cite{Shirase16}
considered when the elliptic curve method (ECM) successes with a scalar value $N$
fo... [more] |
ISEC2016-54 SITE2016-44 LOIS2016-32 pp.19-26 |
ISEC |
2015-09-04 14:05 |
Tokyo |
Kikai-Shinko-Kaikan Bldg. |
Proposal of Multivariate Public Key Cryptosystem based on numerous prime numbers and Chinese Remainder Theorem
-- For quantum proof MPKC -- Shigeo Tsujii, Ryo Fujita, Masahito Gotaishi (Chuo Univ.) ISEC2015-30 |
The studies of Multivariate Public Key Cryptosystem (MPKC) have been originated in Matsumoto-Imai cryptosystem and Tsuji... [more] |
ISEC2015-30 pp.35-41 |
RCS, NS (Joint) |
2014-12-19 15:45 |
Mie |
Iseshi-Kanko-Bunka-Kaikan (Mie) |
Impact of Signal Intensity Differences on the BER Performance of Asynchronous Wireless Optical CDMA Systems Yusuke Yamamoto, Kentaro Kobayashi, Hiraku Okada, Masaaki Katayama (Nagoya Univ.) RCS2014-267 |
For asynchronous multiple access in optical wireless systems, we introduce optical CDMA technology.In wireless communica... [more] |
RCS2014-267 pp.277-281 |
ISEC |
2006-12-13 14:35 |
Tokyo |
Kikai-Shinko-Kaikan Bldg. |
A Proposal of a Group Siganture Scheme with Membership Revocation Using Prime Numbers and its Implementation Naoto Hamada, Takuya Nakayama, Toru Nakanishi, Nobuo Funabiki (Okayama Univ.) |
Group signature schemes with membership revocation have been intensively researched. In this paper, we propose a new gro... [more] |
ISEC2006-109 pp.47-54 |
ISEC, SITE, IPSJ-CSEC |
2006-07-20 14:15 |
Okayama |
Okayama Univ. |
Fast Generation of Safe Primes using Deterministic Primality Tests based on Maurer Method Hidehiro Kumakyu, Akito Niwa (Toshiba Solusions Corp.) |
A prime number of the form 2p + 1, where p is also a prime is often used in cryptography.The prime of this form is calle... [more] |
ISEC2006-23 SITE2006-20 pp.103-110 |
|
|
|
Copyright and reproduction :
All rights are reserved and no part of this publication may be reproduced or transmitted in any form or by any means, electronic or mechanical, including photocopy, recording, or any information storage and retrieval system, without permission in writing from the publisher. Notwithstanding, instructors are permitted to photocopy isolated articles for noncommercial classroom use without fee. (License No.: 10GA0019/12GB0052/13GB0056/17GB0034/18GB0034)
|
[Return to Top Page]
[Return to IEICE Web Page]
|