Information and Systems-Image Engineering(Date:2020/05/20)

Presentation
Isogeny based ring signature from CSIDH

Taisei Kiyama(TUT),  Koutarou Suzuki(TUT),  

[Date]2020-05-20
[Paper #]ISEC2020-1
Distinguishing, Forgery, and Plaintext Recovery Attacks against Google Adiantum

Makoto Habu(Nagoya Univ.),  Tetsu Iwata(Nagoya Univ.),  

[Date]2020-05-20
[Paper #]ISEC2020-2
A Study on robustness of PE malware detection models

Wanjia Zheng(U. Tsukuba),  Kazumasa Omote(U. Tsukuba/NICT),  

[Date]2020-05-20
[Paper #]ISEC2020-13
Making Variance of Mining Time Smaller for Computational Problems Based on Hash Functions

Hiroaki Anada(Univ. Nagasaki),  Kouichi Sakurai(Kyushu Univ.),  

[Date]2020-05-20
[Paper #]ISEC2020-9
Improved Quantum Information Set Decoding Algorithm with Low Memory

Naoto Kimura(Univ. Tokyo),  Atsushi Takayasu(NICT),  Tsuyoshi Takagi(Univ. Tokyo),  

[Date]2020-05-20
[Paper #]ISEC2020-3
Identity-based Authenticated Key Exchange for IoT Devices and its Security against Malicious Private Key Generator

Kazuma Wariki(Kanagawa Univ.),  Taroh Sasaki(Kanagawa Univ.),  Atsushi Fujioka(Kanagawa Univ.),  Koutarou Suzuki(Toyohashi Univ. of Tech.),  Junichi Tomida(NTT),  

[Date]2020-05-20
[Paper #]ISEC2020-12
Evaluation of re-centralization by inequality and convergence on blockchain networks

Mitsuyoshi Imamura(Tsukuba Univ.),  Kazumasa Omote(Tsukuba Univ./NICT),  

[Date]2020-05-20
[Paper #]ISEC2020-10
An Anonymous Trust-Marking Scheme on NEM Blockchain Systems

Tomoki Fujitani(Univ.Tsukuba/NICT),  Keita Emura(NICT),  Kazumasa Omote(Univ.Tsukuba/NICT),  

[Date]2020-05-20
[Paper #]ISEC2020-11
[Invited Talk] Efficient Private PEZ Protocols for Symmetric Functions (from TCC 2019)

Yoshiki Abe(UEC),  Mitsugu Iwamoto(UEC),  Kazuo Ohta(UEC/AIST),  

[Date]2020-05-20
[Paper #]ISEC2020-4
[Invited Talk] How to Construct CSIDH on Edwards Curves (from CT-RSA 2020)

Tomoki Moriya(UTokyo),  Hiroshi Onuki(UTokyo),  Tsuyoshi Takagi(UTokyo),  

[Date]2020-05-20
[Paper #]ISEC2020-8
[Invited Talk] Almost Optimal Cheating-Detectable (2,2,n) Ramp Secret Sharing Scheme (from CANDAR 2019)

Tomoki Agematsu(NEC),  Satoshi Obana(Hosei univ),  

[Date]2020-05-20
[Paper #]ISEC2020-6
[Invited Talk] Tweakable TWINE: Building a Tweakable Block Cipher on Generalized Feistel Structure (from IWSEC 2019)

Kosei Sakamoto(University of Hyogo),  Kazuhiko Minematsu(NEC),  Nao Shibata(NES),  Maki Shigeri(NES),  Hiroyasu Kubo(NES),  Yuki Funabiki(Kobe Univ.),  Andrey Bogdanov(DTU),  Sumio Morioka(Interstellar),  Takanori Isobe(University of Hyogo/NICT),  

[Date]2020-05-20
[Paper #]ISEC2020-7
[Invited Talk] An Efficient F4-style Based Algorithm to Solve MQ Problems (from IWSEC 2019)

Takuma Ito(NICT),  Naoyuki shinohara(NICT),  Shigenori Uchiyama(TMU),  

[Date]2020-05-20
[Paper #]ISEC2020-5