Engineering Sciences/NOLTA-Information Security(Date:2017/09/04)

[Invited Talk] New Impossible Differential Search Tool from Design and Cryptanalysis Aspects

Yu Sasaki(NTT),  

[Paper #]ISEC2017-41
[Invited Talk] Cube Attacks on Non-Blackbox Polynomials based on Division Property (from CRYPTO 2017)

Yosuke Todo(NTT),  Takanori Isobe(Univ. of Hyogo),  

[Paper #]ISEC2017-48
[Invited Talk] Random Sampling Revisited: Lattice Enumeration with Discrete Pruning

Yoshinori Aono(NICT),  Phong Q. Nguyen(INRIA/CNRS/Tokyo Univ.),  

[Paper #]ISEC2017-40
Provably Secure Code-Based Signature Schemes via Fiat-Shamir Transform with Theoretical and Practical Analysis on Hash Encodings

Taiyo Yamaguchi(UEC),  Bagus Santoso(UEC),  

[Paper #]ISEC2017-46
[Invited Talk] Small CRT-exponent RSA Revisited from Eurocrypt 2017

Atsushi Takayasu(Univ. Tokyo),  

[Paper #]ISEC2017-39
[Invited Talk] ZMAC: A Fast Tweakable Block Cipher Mode for Highly Secure Message Authentication

Tetsu Iwata(Nagoya Univ.),  Kazuhiko Minematsu(NEC),  Thomas Peyrin(NTU),  Yannick Seurin(ANSSI),  

[Paper #]ISEC2017-47
New Public Key Encryption Scheme based on Code and Multivariate Polynomials in Binary Field

Tomoyuki Okubo(UEC),  Bagus Santoso(UEC),  

[Paper #]ISEC2017-45
Stabilizer Based Quantum Secret Sharing Constructed from Algebraic Curves

Cheng Wang(Saitama Univ.),  Takeshi Koshiba(Waseda Univ.),  

[Paper #]ISEC2017-44
Card-based Cryptographic Protocols Using Private Operations

Hibiki Ono(Kogakuin Univ.),  Yoshifumi Manabe(Kogakuin Univ.),  

[Paper #]ISEC2017-42
A Lower Bound on the Number of Shuffles for Commited-Format AND Protocols

Daiki Miyahara(Tohoku Univ.),  Yu-ichi Hayashi(NAIST),  Takaaki Mizuki(Tohoku Univ.),  Hideaki Sone(Tohoku Univ.),  

[Paper #]ISEC2017-43