IEICE Technical Committee Submission System
Conference Schedule
Online Proceedings
[Sign in]
Tech. Rep. Archives
    [Japanese] / [English] 
( Committee/Place/Topics  ) --Press->
 
( Paper Keywords:  /  Column:Title Auth. Affi. Abst. Keyword ) --Press->

All Technical Committee Conferences  (Searched in: All Years)

Search Results: Conference Papers
 Conference Papers (Available on Advance Programs)  (Sort by: Date Descending)
 Results 1 - 20 of 261  /  [Next]  
Committee Date Time Place Paper Title / Authors Abstract Paper #
ISEC 2024-05-15
14:15
Tokyo Kikai-Shinko-Kaikan Bldg. Single-Shuffle Physical Zero-Knowledge Proof for Sudoku using Interactive Inputs
Tomoki Ono, Suthee Ruangwises (UEC), Yoshiki Abe (UEC/AIST), Kyosuke Hatsugai, Mitsugu Iwamoto (UEC)
 [more]
ICSS, IPSJ-SPT 2024-03-22
10:55
Okinawa OIST
(Primary: On-site, Secondary: Online)
Discovery of a Vulnerable Structure of SIMON Variants
Hayato Watanabe (Tokai Univ.), Ryoma Ito (NICT), Toshihiro Ohigashi (Tokai Univ.) ICSS2023-92
In SCIS 2024, Watanabe et al. applied a deep learning-based output prediction attack to SIMON variants, which are varian... [more] ICSS2023-92
pp.166-173
RCC, ISEC, IT, WBS 2024-03-13
14:15
Osaka Osaka Univ. (Suita Campus) Proxy Re-encryption based on LPN
Haruki Fujimoto, Shingo Sato, Junji Shikata (YNU) IT2023-88 ISEC2023-87 WBS2023-76 RCC2023-70
We propose a proxy re-encryption (PRE) scheme based on the Learning Parity with Noise (LPN) problem using error-correcti... [more] IT2023-88 ISEC2023-87 WBS2023-76 RCC2023-70
pp.79-86
RCS, SR, SRW
(Joint)
2024-03-13
10:25
Tokyo The University of Tokyo (Hongo Campus), and online
(Primary: On-site, Secondary: Online)
[Short Paper] A Study on the use of Advanced Cryptography in Sensor Network
Takuya Kurihara, Keiichiro Mori, Kazuto Yano, Toshikazu Sakano (ATR) SR2023-87
Post-quantum cryptography (PQC) is a technology necessary to ensure security in the era of quantum computers. However, P... [more] SR2023-87
pp.1-3
RCC, ISEC, IT, WBS 2024-03-14
09:30
Osaka Osaka Univ. (Suita Campus) Security Analysis of Backdoored Classic McEliece in a Multi-User Setting
Dai Miura, Hyungrok Jo, Shingo Sato, Junji Shikata (Yokohama National Univ.) IT2023-105 ISEC2023-104 WBS2023-93 RCC2023-87
Several attacks have been proposed for the Classic McEliece cryptosystem, which is one of the 4th round candidates of th... [more] IT2023-105 ISEC2023-104 WBS2023-93 RCC2023-87
pp.197-204
RCC, ISEC, IT, WBS 2024-03-14
09:55
Osaka Osaka Univ. (Suita Campus) A generalization of ISD algorithm for Syndrome Decoding Problem
Asuka Wakasugi (EAGLYS), Tada Mitsuru (Chiba Univ.) IT2023-106 ISEC2023-105 WBS2023-94 RCC2023-88
The Information Set Decoding (ISD) algorithm is the best-known decoding algorithm for the syndrome decoding problem, whi... [more] IT2023-106 ISEC2023-105 WBS2023-94 RCC2023-88
pp.205-211
RCC, ISEC, IT, WBS 2024-03-14
11:00
Osaka Osaka Univ. (Suita Campus) [Invited Talk] Cryptographic Research Based on Algebraic Curve Computation
Katsuyuki Takashima (Waseda Univ.) IT2023-116 ISEC2023-115 WBS2023-104 RCC2023-98
We have a wide range of cryptographic primitives based on elliptic curves, i.e., widely deployed public key cryptosystem... [more] IT2023-116 ISEC2023-115 WBS2023-104 RCC2023-98
p.265
VLD, HWS, ICD 2024-03-01
15:30
Okinawa
(Primary: On-site, Secondary: Online)
A Pipelined NTT Transformer and its Extension Scheme Designed for the Digital Signature Scheme Crystals-Dilithium
Pengfei Sun, Makoto Ikeda (Tokyo Univ.) VLD2023-130 HWS2023-90 ICD2023-119
As quantum computing advances, it threatens the security of current encryption algorithms, making Post-Quantum Cryptogra... [more] VLD2023-130 HWS2023-90 ICD2023-119
pp.161-166
VLD, HWS, ICD 2024-03-01
15:55
Okinawa
(Primary: On-site, Secondary: Online)
Hardware Design Based on Full Parameter Support and Parallelism Optimization for Key Encapsulation Mechanism FIPS203
Yuto Nakamura, Makoto Ikeda (UTokyo) VLD2023-131 HWS2023-91 ICD2023-120
The emergence of quantum computers potentially threatens the security of traditional cryptographic techniques that depen... [more] VLD2023-131 HWS2023-91 ICD2023-120
pp.167-172
VLD, HWS, ICD 2024-03-01
16:20
Okinawa
(Primary: On-site, Secondary: Online)
An Efficient Hardware Approach for High-Speed SPHINCS+ Signature Generation
Yuta Takeshima, Makoto Ikeda (The Univ. of Tokyo) VLD2023-132 HWS2023-92 ICD2023-121
This study addresses the challenges traditional cryptographic systems face with the advent of quantum computers by focus... [more] VLD2023-132 HWS2023-92 ICD2023-121
pp.173-177
VLD, HWS, ICD 2024-03-02
12:05
Okinawa
(Primary: On-site, Secondary: Online)
A Study on formal verification of GF(2^m) arithmetic circuits including states
Kazuho Sakoda (SCU/Kobe Univ.), Yasuyoshi Uemura (SCU), Naofumi Homma (Tohoku Univ.) VLD2023-140 HWS2023-100 ICD2023-129
This paper describes a formal verification method for arithmetic circuits based on computer algebra. Conventional method... [more] VLD2023-140 HWS2023-100 ICD2023-129
pp.215-220
QIT
(2nd)
2023-12-17
17:30
Okinawa OIST
(Primary: On-site, Secondary: Online)
[Poster Presentation] Certified Deletion for Mult-bit Message Using Pseudorandom Functions
Duo XU (NU)
With the aid of quantum communication, one can delete messages from receiver’s memory. This is what so called Certified ... [more]
QIT
(2nd)
2023-12-17
17:30
Okinawa OIST
(Primary: On-site, Secondary: Online)
[Poster Presentation] Verification of identifiability of quantum states in quantum key delivery
Shunya Tajima, Atsushi Okamoto, Akihisa Tomita (hokudai)
In quantum key distribution, it is required that when creating the transmission state, the state is identical in all deg... [more]
ICSS 2023-11-16
16:00
Ishikawa IT Business Plaza Musashi and Online
(Primary: On-site, Secondary: Online)
Security Analysis of MP-LWE using Weighted Lattice Reduction
Yudai Tagawa, Shinya Okumura, Atsuko Miyaji (Osaka Univ.) ICSS2023-57
In 2017, Roşca et al. proposed the Middle-Product LWE (MP-LWE) problem, a new LWE problem variant. The MP-LWE problem mi... [more] ICSS2023-57
pp.42-48
ICSS 2023-11-16
16:50
Ishikawa IT Business Plaza Musashi and Online
(Primary: On-site, Secondary: Online)
Improved Secret Key Transport mechanism using CSIDH
Kodai Hayashida, Atsuko Miyaji (Osaka Univ.) ICSS2023-59
In order to achieve secure communication over public networks,it is common practice to share keys and communicate
confi... [more]
ICSS2023-59
pp.57-63
VLD, DC, RECONF, ICD, IPSJ-SLDM [detail] 2023-11-17
10:25
Kumamoto Civic Auditorium Sears Home Yume Hall
(Primary: On-site, Secondary: Online)
Low-Latency Hardware Implementation for SPHINCS+ signature generation
Yuta Takeshima, Makoto Ikeda (The Univ. of Tokyo) VLD2023-69 ICD2023-77 DC2023-76 RECONF2023-72
In recent years, research and standardization of post-quantum cryptography have been actively pursued. In 2022, the digi... [more] VLD2023-69 ICD2023-77 DC2023-76 RECONF2023-72
pp.200-204
LOIS, SITE, ISEC 2023-11-09
10:50
Hiroshima Satellite Campus Hiroshima
(Primary: On-site, Secondary: Online)
[Invited Talk] Security Technologies to Improve Content-Distribution and Broadcasting Services
Kazuto Ogawa (NICT) ISEC2023-54 SITE2023-48 LOIS2023-12
Nowadays, technologies for information security have become essential in the world cyber-space.
PC users know their val... [more]
ISEC2023-54 SITE2023-48 LOIS2023-12
p.1
ICD, HWS 2023-10-31
15:25
Mie  
(Primary: On-site, Secondary: Online)
CPA ToggleToggle-based Simulation against Multiplier for Pairingairing-based Cryptography
Saito Kikuoka, Ikeda Makoto (Tokyo Univ.) HWS2023-58 ICD2023-37
Pairing-based cryptography is more secure than RSA with a shorter key length, but it is computationally expensive and mo... [more] HWS2023-58 ICD2023-37
pp.20-25
RCS, SAT
(Joint)
2023-09-01
15:35
Nagano Naganoken Nokyo Building, and online
(Primary: On-site, Secondary: Online)
Feasibility Study of Physical-Layer Cryptography and Line-of-Sight Quantum Key Distribution over GEO-Ground Links based on Link Budget Calculation
Hiroyuki Endo, Masahide Sasaki, Mikio Fujiwara (NICT) SAT2023-47
Since the channel is highly directional and line-of-sight, it is reasonable to assume that an eavesdropper is hard to fu... [more] SAT2023-47
pp.60-65
IT 2023-08-04
11:25
Kanagawa Shonan Institute of Technology
(Primary: On-site, Secondary: Online)
Constructing Visual Cryptography Schemes for Multiple Images Using SAT Technology
Tako Hiroaki (Univ. Yamanashi), Xiao-Nan Lu (Gifu Univ.), Nabeshima Hidetomo (Univ. Yamanashi) IT2023-25
The visual cryptography scheme (VCS) is a type of secret sharing scheme for images.The VCS uses matrices called basis ma... [more] IT2023-25
pp.62-67
 Results 1 - 20 of 261  /  [Next]  
Choose a download format for default settings. [NEW !!]
Text format pLaTeX format CSV format BibTeX format
Copyright and reproduction : All rights are reserved and no part of this publication may be reproduced or transmitted in any form or by any means, electronic or mechanical, including photocopy, recording, or any information storage and retrieval system, without permission in writing from the publisher. Notwithstanding, instructors are permitted to photocopy isolated articles for noncommercial classroom use without fee. (License No.: 10GA0019/12GB0052/13GB0056/17GB0034/18GB0034)


[Return to Top Page]

[Return to IEICE Web Page]


The Institute of Electronics, Information and Communication Engineers (IEICE), Japan