(Titles with (*)
: translated by organizers)
2024/11/20 Kohei Nakagawa (NTT Social Informatics Laboratories)
(*) Digital Signature Scheme Based on 2-dimensional Isogenies
2024/10/30 Tomoki Uchiyama (Waseda University)
(*) Function Secret Sharing and Its Application to String Search
2024/10/10 Vishnupriya Anupindi (Austrian Academy of Sciences, RICAM)
Properties of pseudorandom numbers from genus 2 curves
2024/10/02 Kazumasa Shinagawa (Ibaraki University)
(*) Uniform Cyclic Group Factorizations of Finite Groups
2024/08/27 Hiroshi Onuki (The University of Tokyo)
(*) Isogeny-based signature scheme SQIsign and algorithm for Deuring correspondence
2024/08/27 Yuji Hashimoto (Tokyo Denki University)
(*) Supersingularity testing algorithm for elliptic curves
2024/07/03 Hiraku Morita (Aarhus University, University of Copenhagen)
(*) MAESTRO: A new MPC protocol for AES evaluation based on look-up tables
2023/09/19 Kazumasa Shinagawa (Ibaraki University)
(*) Generic conversion from card-based protocols to PSM protocols
2023/09/11 Tomoko Adachi (Shizuoka Institute of Science and Technology)
(*) Secret sharing schemes with perfect concealment from Latin squares
2022/09/06 Kazumasa Shinagawa (Ibaraki University)
(*) Private Simultaneous Messages based on quadratic residues
2022/07/22 Yasuhiko Ikematsu (Kyushu University)
(*) On Hilbert series associated to UOV signature scheme
2022/05/18 Reo Eriguchi (The University of Tokyo)
How to detect and correct errors in multi-server PIR
2021/07/14 Yusuke Aikawa (Mitsubishi Electric Corporaition / JST ACT-X)
(*) Mathematics for Isogeny-based Cryptography
2021/06/02 Mriganka Mandal (Kyushu University)
Applications of Algebra in Secure One-to-Many Data Transmissions
2019/08/08 Quoc Huy Le (Kyushu University)
A Blind Ring Signature Based on SIS Problem
2019/08/08 Yasuhiko Ikematsu (Kyushu University)
Public Key Cryptosystems using Multivariate Polynomials
2019/08/05 Soonhak Kwon (Sungkyunkwan University)
Survey on the links between Kloosterman sums, Walsh transforms and elliptic curves over finite fields
2019/07/23 Yuntao Wang (The University of Tokyo)
An introduction to a lattice-based key exchange protocol and its cryptanalysis
2019/07/04 Momonari Kudo (Kobe City College of Technology)
(*) Analysis and Complexity Evaluation of Algebraic Method for Isogeny Problem
2019/07/04 Kosuke Sakata (YOKOHAMA National University)
(*) On Signature-based Algorithms
2017/10/27 Tristan Vaccon (Universite de Limoges, France)
P-adic precision of the characteristic polynomial
2017/05/26 Takuya Hayashi (Kobe Univ./NICT)
Privacy preserving data mining via homomorphic encryption
2017/04/28 Yacheng Wang (Kyushu University)
Two Polynomial-Time Attacks on CUOV Signature Scheme
2017/02/13 Chitchanok Chuengsatiansup (Technische Universiteit Eindhoven)
Optimizing multiplications with vector instructions
2017/02/03 Huifang Yu (Qinghai Normal University, China)
Low-computation and secure certificateless hybrid signcryption scheme
2016/11/18 Shinya Okumura (ISIT)
An Estimate of the Complexity of the Section Finding Problem on Algebraic Surfaces
2016/11/11 Ye Yuan (Kyushu University)
Efficient implementation of Lattice-based encryption scheme on multiple platforms
2016/10/14 Partha Sarathi Roy (Kyushu University)
Secret Sharing Schemes with Honest Majority
2016/7/5 Tristan Vaccon (Rikkyo University)
p-adic precision and isogenies computation, application to cryptography
2016/6/28 Momonari Kudo (Kyushu University)
Practical Analysis of Key Recovery Attack against Search-LWE Problem
2016/5/17 Yuntao Wang (Kyushu University)
Improved Progressive BKZ Algorithms and their Precise Cost Estimation by Sharp Simulator
2016/4/26 Chi Cheng (Kyushu University)
A Lightweight Authenticated Communication Scheme for Smart Grid
2016/1/7
The 3rd International Workshop on Cybersecurity http://staff.cs.kyushu-u.ac.jp/ja/event/2015/06/index.html
2015/12/4 Ji Jian Chin (Multimedia University, Malaysia)
Reset-Secure Identity-Based Identification Schemes without Parings
2015/11/6 Dieter Gollmann (Hamburg University of Technology)
Public-Key Cryptography Without Public-Key Infrastructures?
2015/10/23
Albrecht Petzoldt (Kyushu University)
Design Principles for HFEv-based Multivariate Signature Schemes
2015/9/14
Koji Nuida (AIST, JST PRESTO)
(Batch) Fully Homomorphic Encryption over Integers for Non-Binary Message Spaces, and Related Combinatorial Problem on Polynomials
2015/9/14 Tadanori Teruya (AIST)
On Limitations and Alternatives of Privacy-Preserving Cryptographic Protocols for Genomic Data
2015/9/14 Kenji Kashiwabara (University of Tokyo)
An SVP algorithm by improving the RSR algorithm
2015/7/6 Jintai Ding (Cincinnati Univerasity)
The beauty and the Beasts
2015/7/6 Jintai Ding (Cincinnati Univerasity)
(Authenticated) Key Exchange from (Ring) LWE
2015/6/12 Yvo Desmedt (University of Texas at Dallas)
VSS with a Non-Interactive Dealer using Optimal Randomness and Optimal Number of Rounds.
2015/6/5 Binanda Sengupta (Indian Statistical Institute) An Introduction to Proofs of Retrievability
2015/5/1
Masaya Yasuda (IMI, Kyushu University)
Introduction to homomorphic encryption and its applications
2015/4/17
Shinya Okumura (IMI, Kyushu University)
A Public Key Cryptosystem Based on Diophantine Equations of Degree Increasing Type