Japanese version is here.

IMI Crypto Seminar

(Titles with (*): translated by organizers)
2023/09/19 Kazumasa Shinagawa (Ibaraki University)
(*) Generic conversion from card-based protocols to PSM protocols

2023/09/11 Tomoko Adachi (Shizuoka Institute of Science and Technology)
(*) Secret sharing schemes with perfect concealment from Latin squares

2022/09/06 Kazumasa Shinagawa (Ibaraki University)
(*) Private Simultaneous Messages based on quadratic residues

2022/07/22 Yasuhiko Ikematsu (Kyushu University)
(*) On Hilbert series associated to UOV signature scheme

2022/05/18 Reo Eriguchi (The University of Tokyo)
How to detect and correct errors in multi-server PIR

2021/07/14 Yusuke Aikawa (Mitsubishi Electric Corporaition / JST ACT-X)
(*) Mathematics for Isogeny-based Cryptography

2021/06/02 Mriganka Mandal (Kyushu University)
Applications of Algebra in Secure One-to-Many Data Transmissions

2019/08/08 Quoc Huy Le (Kyushu University)
A Blind Ring Signature Based on SIS Problem

2019/08/08 Yasuhiko Ikematsu (Kyushu University)
Public Key Cryptosystems using Multivariate Polynomials

2019/08/05 Soonhak Kwon (Sungkyunkwan University)
Survey on the links between Kloosterman sums, Walsh transforms and elliptic curves over finite fields

2019/07/23 Yuntao Wang (The University of Tokyo)
An introduction to a lattice-based key exchange protocol and its cryptanalysis

2019/07/04 Momonari Kudo (Kobe City College of Technology)
(*) Analysis and Complexity Evaluation of Algebraic Method for Isogeny Problem

2019/07/04 Kosuke Sakata (YOKOHAMA National University)
(*) On Signature-based Algorithms

2017/10/27 Tristan Vaccon (Universite de Limoges, France)
P-adic precision of the characteristic polynomial

2017/05/26 Takuya Hayashi (Kobe Univ./NICT)
Privacy preserving data mining via homomorphic encryption

2017/04/28 Yacheng Wang (Kyushu University)
Two Polynomial-Time Attacks on CUOV Signature Scheme

2017/02/13 Chitchanok Chuengsatiansup (Technische Universiteit Eindhoven)
Optimizing multiplications with vector instructions

2017/02/03 Huifang Yu (Qinghai Normal University, China)
Low-computation and secure certificateless hybrid signcryption scheme

2016/11/18 Shinya Okumura (ISIT)
An Estimate of the Complexity of the Section Finding Problem on Algebraic Surfaces

2016/11/11 Ye Yuan (Kyushu University)
Efficient implementation of Lattice-based encryption scheme on multiple platforms

2016/10/14 Partha Sarathi Roy (Kyushu University)
Secret Sharing Schemes with Honest Majority

2016/7/5 Tristan Vaccon (Rikkyo University)
p-adic precision and isogenies computation, application to cryptography

2016/6/28 Momonari Kudo (Kyushu University)
Practical Analysis of Key Recovery Attack against Search-LWE Problem

2016/5/17 Yuntao Wang (Kyushu University)
Improved Progressive BKZ Algorithms and their Precise Cost Estimation by Sharp Simulator

2016/4/26 Chi Cheng (Kyushu University)
A Lightweight Authenticated Communication Scheme for Smart Grid

2016/1/7 The 3rd International Workshop on Cybersecurity
http://staff.cs.kyushu-u.ac.jp/ja/event/2015/06/index.html

2015/12/4 Ji Jian Chin (Multimedia University, Malaysia)
Reset-Secure Identity-Based Identification Schemes without Parings

2015/11/6 Dieter Gollmann (Hamburg University of Technology)
Public-Key Cryptography Without Public-Key Infrastructures?

2015/10/23
Albrecht Petzoldt (Kyushu University)
Design Principles for HFEv-based Multivariate Signature Schemes
2015/9/14
Koji Nuida (AIST, JST PRESTO)
(Batch) Fully Homomorphic Encryption over Integers for Non-Binary Message Spaces, and Related Combinatorial Problem on Polynomials
2015/9/14 Tadanori Teruya (AIST)
On Limitations and Alternatives of Privacy-Preserving Cryptographic Protocols for Genomic Data

2015/9/14 Kenji Kashiwabara (University of Tokyo)
An SVP algorithm by improving the RSR algorithm

2015/7/6 Jintai Ding (Cincinnati Univerasity)
The beauty and the Beasts

2015/7/6 Jintai Ding (Cincinnati Univerasity)
(Authenticated) Key Exchange from (Ring) LWE

2015/6/12 Yvo Desmedt (University of Texas at Dallas)
VSS with a Non-Interactive Dealer using Optimal Randomness and Optimal Number of Rounds.

2015/6/5 Binanda Sengupta (Indian Statistical Institute)
An Introduction to Proofs of Retrievability

2015/5/1
Masaya Yasuda (IMI, Kyushu University)
Introduction to homomorphic encryption and its applications
2015/4/17
Shinya Okumura (IMI, Kyushu University)
A Public Key Cryptosystem Based on Diophantine Equations of Degree Increasing Type