Laboratory of Mathematical Design for Advanced Cryptography
Institute of Mathematics for Industry, Kyushu university
Japanese version is
here
.
Menu
Top
Member
IMI Crypto Seminar
Conference
IMI Crypto Seminar
2017/10/27 Tristan Vaccon (Université de Limoges, France)
P-adic precision of the characteristic polynomial
2017/05/26 Takuya Hayashi (Kobe Univ./NICT)
Privacy preserving data mining via homomorphic encryption
2017/04/28 Yacheng Wang (Kyushu University)
Two Polynomial-Time Attacks on CUOV Signature Scheme
2017/02/13 Chitchanok Chuengsatiansup (Technische Universiteit Eindhoven)
Optimizing multiplications with vector instructions
2017/02/03 Huifang Yu (Qinghai Normal University, China)
Low-computation and secure certificateless hybrid signcryption scheme
2016/11/18 Shinya Okumura (ISIT)
An Estimate of the Complexity of the Section Finding Problem on Algebraic Surfaces
2016/11/11 Ye Yuan (Kyushu University)
Efficient implementation of Lattice-based encryption scheme on multiple platforms
2016/10/14 Partha Sarathi Roy (Kyushu University)
Secret Sharing Schemes with Honest Majority
2016/7/5 Tristan Vaccon (Rikkyo University)
p-adic precision and isogenies computation, application to cryptography
2016/6/28 Momonari Kudo (Kyushu University)
Practical Analysis of Key Recovery Attack against Search-LWE Problem
2016/5/17 Yuntao Wang (Kyushu University)
Improved Progressive BKZ Algorithms and their Precise Cost Estimation by Sharp Simulator
2016/4/26 Chi Cheng (Kyushu University)
A Lightweight Authenticated Communication Scheme for Smart Grid
2016/1/7 The 3rd International Workshop on Cybersecurity
http://staff.cs.kyushu-u.ac.jp/ja/event/2015/06/index.html
2015/12/4 Ji Jian Chin (Multimedia University, Malaysia)
Reset-Secure Identity-Based Identification Schemes without Parings
2015/11/6 Dieter Gollmann (Hamburg University of Technology)
Public-Key Cryptography Without Public-Key Infrastructures?
2015/10/23
Albrecht Petzoldt (Kyushu University)
Design Principles for HFEv-based Multivariate Signature Schemes
2015/9/14
Koji Nuida (AIST, JST PRESTO)
(Batch) Fully Homomorphic Encryption over Integers for Non-Binary Message Spaces, and Related Combinatorial Problem on Polynomials
2015/9/14 Tadanori Teruya (AIST)
On Limitations and Alternatives of Privacy-Preserving Cryptographic Protocols for Genomic Data
2015/9/14 Kenji Kashiwabara (University of Tokyo)
An SVP algorithm by improving the RSR algorithm
2015/7/6 Jintai Ding (Cincinnati Univerasity)
The beauty and the Beasts
2015/7/6 Jintai Ding (Cincinnati Univerasity)
(Authenticated) Key Exchange from (Ring) LWE
2015/6/12 Yvo Desmedt (University of Texas at Dallas)
VSS with a Non-Interactive Dealer using Optimal Randomness and Optimal Number of Rounds.
2015/6/5 Binanda Sengupta (Indian Statistical Institute)
An Introduction to Proofs of Retrievability
2015/5/1
Masaya Yasuda (IMI, Kyushu University)
Introduction to homomorphic encryption and its applications
2015/4/17
Shinya Okumura (IMI, Kyushu University)
A Public Key Cryptosystem Based on Diophantine Equations of Degree Increasing Type