Committee |
Date Time |
Place |
Paper Title / Authors |
Abstract |
Paper # |
ISEC |
2024-05-15 14:15 |
Tokyo |
Kikai-Shinko-Kaikan Bldg. |
Single-Shuffle Physical Zero-Knowledge Proof for Sudoku using Interactive Inputs Tomoki Ono, Suthee Ruangwises (UEC), Yoshiki Abe (UEC/AIST), Kyosuke Hatsugai, Mitsugu Iwamoto (UEC) |
[more] |
|
ICSS, IPSJ-SPT |
2024-03-22 10:55 |
Okinawa |
OIST (Primary: On-site, Secondary: Online) |
Discovery of a Vulnerable Structure of SIMON Variants Hayato Watanabe (Tokai Univ.), Ryoma Ito (NICT), Toshihiro Ohigashi (Tokai Univ.) ICSS2023-92 |
In SCIS 2024, Watanabe et al. applied a deep learning-based output prediction attack to SIMON variants, which are varian... [more] |
ICSS2023-92 pp.166-173 |
RCC, ISEC, IT, WBS |
2024-03-13 14:15 |
Osaka |
Osaka Univ. (Suita Campus) |
Proxy Re-encryption based on LPN Haruki Fujimoto, Shingo Sato, Junji Shikata (YNU) IT2023-88 ISEC2023-87 WBS2023-76 RCC2023-70 |
We propose a proxy re-encryption (PRE) scheme based on the Learning Parity with Noise (LPN) problem using error-correcti... [more] |
IT2023-88 ISEC2023-87 WBS2023-76 RCC2023-70 pp.79-86 |
RCS, SR, SRW (Joint) |
2024-03-13 10:25 |
Tokyo |
The University of Tokyo (Hongo Campus), and online (Primary: On-site, Secondary: Online) |
[Short Paper]
A Study on the use of Advanced Cryptography in Sensor Network Takuya Kurihara, Keiichiro Mori, Kazuto Yano, Toshikazu Sakano (ATR) SR2023-87 |
Post-quantum cryptography (PQC) is a technology necessary to ensure security in the era of quantum computers. However, P... [more] |
SR2023-87 pp.1-3 |
RCC, ISEC, IT, WBS |
2024-03-14 09:30 |
Osaka |
Osaka Univ. (Suita Campus) |
Security Analysis of Backdoored Classic McEliece in a Multi-User Setting Dai Miura, Hyungrok Jo, Shingo Sato, Junji Shikata (Yokohama National Univ.) IT2023-105 ISEC2023-104 WBS2023-93 RCC2023-87 |
Several attacks have been proposed for the Classic McEliece cryptosystem, which is one of the 4th round candidates of th... [more] |
IT2023-105 ISEC2023-104 WBS2023-93 RCC2023-87 pp.197-204 |
RCC, ISEC, IT, WBS |
2024-03-14 09:55 |
Osaka |
Osaka Univ. (Suita Campus) |
A generalization of ISD algorithm for Syndrome Decoding Problem Asuka Wakasugi (EAGLYS), Tada Mitsuru (Chiba Univ.) IT2023-106 ISEC2023-105 WBS2023-94 RCC2023-88 |
The Information Set Decoding (ISD) algorithm is the best-known decoding algorithm for the syndrome decoding problem, whi... [more] |
IT2023-106 ISEC2023-105 WBS2023-94 RCC2023-88 pp.205-211 |
RCC, ISEC, IT, WBS |
2024-03-14 11:00 |
Osaka |
Osaka Univ. (Suita Campus) |
[Invited Talk]
Cryptographic Research Based on Algebraic Curve Computation Katsuyuki Takashima (Waseda Univ.) IT2023-116 ISEC2023-115 WBS2023-104 RCC2023-98 |
We have a wide range of cryptographic primitives based on elliptic curves, i.e., widely deployed public key cryptosystem... [more] |
IT2023-116 ISEC2023-115 WBS2023-104 RCC2023-98 p.265 |
VLD, HWS, ICD |
2024-03-01 15:30 |
Okinawa |
(Primary: On-site, Secondary: Online) |
A Pipelined NTT Transformer and its Extension Scheme Designed for the Digital Signature Scheme Crystals-Dilithium Pengfei Sun, Makoto Ikeda (Tokyo Univ.) VLD2023-130 HWS2023-90 ICD2023-119 |
As quantum computing advances, it threatens the security of current encryption algorithms, making Post-Quantum Cryptogra... [more] |
VLD2023-130 HWS2023-90 ICD2023-119 pp.161-166 |
VLD, HWS, ICD |
2024-03-01 15:55 |
Okinawa |
(Primary: On-site, Secondary: Online) |
Hardware Design Based on Full Parameter Support and Parallelism Optimization for Key Encapsulation Mechanism FIPS203 Yuto Nakamura, Makoto Ikeda (UTokyo) VLD2023-131 HWS2023-91 ICD2023-120 |
The emergence of quantum computers potentially threatens the security of traditional cryptographic techniques that depen... [more] |
VLD2023-131 HWS2023-91 ICD2023-120 pp.167-172 |
VLD, HWS, ICD |
2024-03-01 16:20 |
Okinawa |
(Primary: On-site, Secondary: Online) |
An Efficient Hardware Approach for High-Speed SPHINCS+ Signature Generation Yuta Takeshima, Makoto Ikeda (The Univ. of Tokyo) VLD2023-132 HWS2023-92 ICD2023-121 |
This study addresses the challenges traditional cryptographic systems face with the advent of quantum computers by focus... [more] |
VLD2023-132 HWS2023-92 ICD2023-121 pp.173-177 |
VLD, HWS, ICD |
2024-03-02 12:05 |
Okinawa |
(Primary: On-site, Secondary: Online) |
A Study on formal verification of GF(2^m) arithmetic circuits including states Kazuho Sakoda (SCU/Kobe Univ.), Yasuyoshi Uemura (SCU), Naofumi Homma (Tohoku Univ.) VLD2023-140 HWS2023-100 ICD2023-129 |
This paper describes a formal verification method for arithmetic circuits based on computer algebra. Conventional method... [more] |
VLD2023-140 HWS2023-100 ICD2023-129 pp.215-220 |
QIT (2nd) |
2023-12-17 17:30 |
Okinawa |
OIST (Primary: On-site, Secondary: Online) |
[Poster Presentation]
Certified Deletion for Mult-bit Message Using Pseudorandom Functions Duo XU (NU) |
With the aid of quantum communication, one can delete messages from receiver’s memory. This is what so called Certified ... [more] |
|
QIT (2nd) |
2023-12-17 17:30 |
Okinawa |
OIST (Primary: On-site, Secondary: Online) |
[Poster Presentation]
Verification of identifiability of quantum states in quantum key delivery Shunya Tajima, Atsushi Okamoto, Akihisa Tomita (hokudai) |
In quantum key distribution, it is required that when creating the transmission state, the state is identical in all deg... [more] |
|
ICSS |
2023-11-16 16:00 |
Ishikawa |
IT Business Plaza Musashi and Online (Primary: On-site, Secondary: Online) |
Security Analysis of MP-LWE using Weighted Lattice Reduction Yudai Tagawa, Shinya Okumura, Atsuko Miyaji (Osaka Univ.) ICSS2023-57 |
In 2017, Roşca et al. proposed the Middle-Product LWE (MP-LWE) problem, a new LWE problem variant. The MP-LWE problem mi... [more] |
ICSS2023-57 pp.42-48 |
ICSS |
2023-11-16 16:50 |
Ishikawa |
IT Business Plaza Musashi and Online (Primary: On-site, Secondary: Online) |
Improved Secret Key Transport mechanism using CSIDH Kodai Hayashida, Atsuko Miyaji (Osaka Univ.) ICSS2023-59 |
In order to achieve secure communication over public networks,it is common practice to share keys and communicate
confi... [more] |
ICSS2023-59 pp.57-63 |
VLD, DC, RECONF, ICD, IPSJ-SLDM [detail] |
2023-11-17 10:25 |
Kumamoto |
Civic Auditorium Sears Home Yume Hall (Primary: On-site, Secondary: Online) |
Low-Latency Hardware Implementation for SPHINCS+ signature generation Yuta Takeshima, Makoto Ikeda (The Univ. of Tokyo) VLD2023-69 ICD2023-77 DC2023-76 RECONF2023-72 |
In recent years, research and standardization of post-quantum cryptography have been actively pursued. In 2022, the digi... [more] |
VLD2023-69 ICD2023-77 DC2023-76 RECONF2023-72 pp.200-204 |
LOIS, SITE, ISEC |
2023-11-09 10:50 |
Hiroshima |
Satellite Campus Hiroshima (Primary: On-site, Secondary: Online) |
[Invited Talk]
Security Technologies to Improve Content-Distribution and Broadcasting Services Kazuto Ogawa (NICT) ISEC2023-54 SITE2023-48 LOIS2023-12 |
Nowadays, technologies for information security have become essential in the world cyber-space.
PC users know their val... [more] |
ISEC2023-54 SITE2023-48 LOIS2023-12 p.1 |
ICD, HWS |
2023-10-31 15:25 |
Mie |
(Primary: On-site, Secondary: Online) |
CPA ToggleToggle-based Simulation against Multiplier for Pairingairing-based Cryptography Saito Kikuoka, Ikeda Makoto (Tokyo Univ.) HWS2023-58 ICD2023-37 |
Pairing-based cryptography is more secure than RSA with a shorter key length, but it is computationally expensive and mo... [more] |
HWS2023-58 ICD2023-37 pp.20-25 |
RCS, SAT (Joint) |
2023-09-01 15:35 |
Nagano |
Naganoken Nokyo Building, and online (Primary: On-site, Secondary: Online) |
Feasibility Study of Physical-Layer Cryptography and Line-of-Sight Quantum Key Distribution over GEO-Ground Links based on Link Budget Calculation Hiroyuki Endo, Masahide Sasaki, Mikio Fujiwara (NICT) SAT2023-47 |
Since the channel is highly directional and line-of-sight, it is reasonable to assume that an eavesdropper is hard to fu... [more] |
SAT2023-47 pp.60-65 |
IT |
2023-08-04 11:25 |
Kanagawa |
Shonan Institute of Technology (Primary: On-site, Secondary: Online) |
Constructing Visual Cryptography Schemes for Multiple Images Using SAT Technology Tako Hiroaki (Univ. Yamanashi), Xiao-Nan Lu (Gifu Univ.), Nabeshima Hidetomo (Univ. Yamanashi) IT2023-25 |
The visual cryptography scheme (VCS) is a type of secret sharing scheme for images.The VCS uses matrices called basis ma... [more] |
IT2023-25 pp.62-67 |