Invited Lecture
Following lectures are arranged. Please feel free to attend the lecture. Send us an e-mail for request.
Past lectures
DATE | NAME | AFF. | TITLE | 2024/5/9 | Khaled N. Khasawneh | George Mason University (GMU) | Trustworthy ML: A Computer Architecture Perspective |
---|---|---|---|
2023/9/20 | Hui Cui | the Monash University | Enhancing Key Security in Public-Key Cryptography |
2023/3/10 | Yvo Desmedt | the University of Texas at Dallas | Framing and Realistic Secret Sharing |
2022/5/24 | Leizhang Wang | Xidian University | Introduction to the simulator of Pump and Jump BKZ and a better reducing strategy |
2020/1/31 | Kwangjo Kim | Korea Advanced Institute of Science and Technology | Key Re-usable Dynamic Group Key Exchange from Lattice against Neighbor Attacks |
2019/9/18 | Yan Wan | University of Texas at Arlington | Networked Unmanned Aerial Vehicle Systems: Challenges and Opportunities |
2019/2/4 | Serge Vaudenay | ÉCOLE POLYTECHNIQUE FÉDÉRALE DE LAUSANNE | Secure Communication by Ratcheting |
2019/1/21 | Kwangjo Kim | Korea Advanced Institute of Science and Technology | How modern cryptography has been developed and to be. |
2017/12/5 | Jiageng Chen | Central China Normal University | Improved Differential Characteristic Searching Methods |
2017/8/1 | Jon Fuchs | The Free University of Brussels | Application of new trail bound techniques to linear and differential trails in Noekeon. |
2017/7/14 | Daniel Dinu | The University of Luxembourg | Side-Channel Attacks meet Secure Network Protocols |
2017/7/3 | Eiichiro Fujisaki | Japan Advanced Institute of Science and Technology | All-But-Many Encryption, Journal of Cryptography |
2017/6/1 | Yvo Desmedt | the University of Texas at Dallas | Parity Check based Redistribution of Secret Shares |
2015/9/9 | Dr. Alex Kaitai Liang | School of Science and Technology, Aalto University, Finland | Privacy-preserving genomic relatedness test: a new cryptographic solution |
2015/8/27 | Ms. Elena Pagnin | Chalmers University of Technology, Sweden | Homomorphic authentication in Linear Network Coding; On the Leakage of Information in Biometric Authentication |
2015/8/27 | Dr. Katerina Mitrokotsa | Associate Professor, Chalmers University of Technology, Sweden | Authentication in Constrained Settings:challenges and directions |
2015/5/21 | Dr. Naoki Endo | Senior Fellow, Industrial ICT Solutions Company, Toshiba Corporation | Industrial Control Systems and IoT - Emerging Targets of Information Security Technology |
2015/2/26 | Dr. Mitsuru Matsui | Mitsubishi Electric Corporation, Information Technology R&D Center, Cheef Engineer, Matsui Cipher Project Leader | Recent Topics on Authenticated Encryption Algorithms |
2015/2/13 | Dr. Vuillaume Camille | ETAS-PSC/ECY | Automotive security : an introduction |
2015/1/15 | Dr. Chen-Mou Cheng | Associate Professor, National Taiwan University | A polynomial-time algorithm for solving underdetermined multivariate quadratic equations |
2015/1/15 | Dr. Chen-Mou Cheng | Associate Professor, National Taiwan University | A domain-specific language for efficient cryptographic engineering |
2015/1/6 | Dr. Koichiro Hayashi | Professor, Institute of Information Security | Cybersecurity and Secrecy of Communication |
2014/12/23 | Dr. Li Zhen | Institute for Infocomm Research, Singapore | How to Crack Password of Old Version Windows Systems by Solving Equations |
2013/12/2 | Dr.Koji Chida | NTT Secure Platform Laboratories | Privacy-enhancing technologies for secondary use of personal data safely |
2013/3/20 | Dr. Mitsuru Matsui | Mitsubishi Electric | On differential uniformity and non-linearity of cryptographic S-boxes |
2013/8/12 | Dr. Ryuichi Yamamoto | The University of Tokyo | Privacy vs. Public benefit in using health information |
2012/12/17 | Dr. Koji Nakao | KDDI labratory | Research for Security Management -- Investigating current and future issues on Security Management -- |
2012/11/8 | Dr. Hidenori Kuwakado | Kobe University | Methods for Constructing Hash Functions and their Security |
2012/9/10 | Dr. Hiroaki Kikuchi | Tokai University | Trend and principle - privacy-preserving data mining |
2012/8/28 | Dr. Hiroaki Takada | Nagoya University | Dependability Requirements on Embedded Systems and Issues on Information Security |
2012/3/22 | Dr. Kwok-Wo WONG | Department of Electronic Engineering City University of Hong Kong | Joint Source Coding and Encryption using Chaos and Fractals |
2012/3/2 | Dr.Kazuo Sakiyama | The University of Electro-Communications | Fault Sensitivity Analysis and Its Application |
2012/1/6 | Dr.Asahiko Yamada | Council on Competitiveness-Nippon/TOSHIBA Solution | ACBio, the Internet enabler for biometrics: its concept and application |
2011/12/16 | Dr.Yoshihumi Manabe | NTT Communication Science Laboratories | Cake-cutting Algorithms |
2011/11/18 | Dr.Tatsuaki Okamoto | NTT Information Sharing Platform Laboratories | Security Notions of Cryptography, History and Progress |
2011/5/27 | Mr. Randall J.Easter | Director of the NIST Cryptographic Module Validation Program (CMVP) | NIST Cryptographic Validation Programs |
2011/2/4 | Dr. Mitsuru MATSUI | Mitsubishi Electric Corporation, Information Technology R&D Center, Information Security Department, Deputy Manager | Physical Unclonable Function using Glitch |
2010/1/14 | Dr. Isamu TERANISHI | NEC Corporation, Internet Systems Research Laboratories | Signatures Resilient to Continual Leakage on Memory and Computation |
2010/12/16 | Dr. Marc Joye | Technicolor, Security & Content Protection Labs, France | The arithmetic of Huff curves and its cryptographic applications |
2010/11/5 | Keisuke Takemori | KDDI Co.,Ltd Reserch Laboratory | Computer Security |
2010/9/24 | Junji Shikata | Associate professor, Graduate School of Environment and Information Sciences, Yokohama National University, Japan | Cryptographic Protocols with Information-Theoretic Security |
2010/5/27 | Dr. Matt Henricksen | Principal Investigator, Symmetric Cryptology, at Institute for Infocomm Research, Singapore | Unsolved problems in Stream Cipher research |
2010/3/15 | Mr. Yuji Suga | IIJ Ltd. | Security requirements on cloud computing and vulnerabilities of internet protocols |
2010/2/26 | Dr. Mitsuru Matsui | Mitsubishi Electric Ltd. | Secure Biometric Authentication Using 2-DNF Homomorphic Encryption |
2009/12/4 | Dr. Xuejia Lai | Dept. of Computer Science and Engineeringr Shanghai Jiao Tong University | FO Relation of MISTY1 and key-dependent attack |
2009/11/20 | Dr. Katsuyuki OKEYA | Hitachi, Ltd., Systems Development Laboratory, SeniorResearcher | Addition Chains in Elliptic Curve Cryptosystems |
2009/03/05 | Dr. Goichiro HANAOKA | AIST, RCIS, Researcher | Methodologies for Constructing CCA-Secure PKE schemes |
2009/01/16 | Mr. Masato Terada | Chief Coordination Designer , Hitachi Incident Response Team, Hitachi Ltd. | History of unauthorized activities in the Internet |
2009/01/09 | Dr. Mitsuru MATSUI | Mitsubishi Electric Corporation, Information Technology R&D Center, Information Security Department, Deputy Manager | Key Collisions of the RC4 Stream Cipher |
2008/09/19 | Mr. Toshiaki Tanaka | KDDI R & D Laboratories Inc., Information Security Laboratory, Senior Manager. | Trends in Information Security for Telecom Operators |
2008/04/21 | Dr. Erik Zenner | Department of Mathematics, Technical University of Denmark (TUD). | Cache Timing Attacks in Symmetric Cryptography |
2008/3/20 | Yvo Desmedt | The BT Chair of Information Security at University College London, UK. He is also a courtesy professor at Florida State University. | Revisiting pairing based group key exchange |
2008/03/11 | Akira Otsuka | National Institute of Advanced Industrial Science and Technology (AIST). | Biometrics Secuity - Wolf Attack Probability - |
2008/02/21 | Hidehiko Tanaka | Dean Institute of Information Securityツ | The Role of Information Technology |
2007/12/21 | Tetsu Iwata | Associate Professor, Nagoya University. | Recent Research Trend on Blockcipher Modes of Operations |
2007/11/16 | Yvo Desmedt | The BT Chair of Information Security at University College London, UK and courtesy professor at Florida State University, USA. | Appliying Recreational Mathematics to Secure Multiparty Computation |
2007/10/26 | Hiromitsu TAKAGI | National Institute of Advanced Industrial science and technology (AIST), Senior Researcher | Web Application Security |
2007/09/21 | Mitsuru MATSUI | Mitsubishi Electric Corporation, Information Technology R&D Center, Information Security Department, Deputy Manager | On the Power of Bitslice Implementation on Intel Core2 Processor |
2007/02/23 | Shiho Moriai | Sony Corporation/Information Technologies Laboratories/Senior Researcher | State-of-the-art Technologies embedded in PLAYSTATION 3 |
2006/10/16 | Marc JOYE | Thomson R&D, France | Fault Attacks: An Algorithmic Perspective |
2006/9/22 | Shigeo TSUJII | Institute of Information Security, president | Information security comprehensive science and encryption theory |
2006/2/17 | Mitsuru MATUSI | Mitsubishi Electric Corporation, Information Technology R&D Center, Information Security Department, Deputy Manager | Linear Cryptanalysis of Block Ciphers |
2006/1/6 | Jun KOGURE | Senior Researcher, Secure Computing Lab. IT Core Laboratories FUJITSU LABORATORIES LTD. |
Cryptography and Lattice |
2005/9/9 | Tsuyoshi TAKAGI | Future University-HAKODATE department of media architecture | Radix-r Non-Adjacent Form and its Application to Pairing-Based Cryptosystems |
2005/5/6 | Moti Yung | Columbia University Computer Science Department Research Professor | Kleptography: The Outsider Inside Your Crypto Devices (and its trust implications) |
2005/3/3 | Kazue SAKO | NEC Internet Systems Research Laboratories Research Fellow | Electronic voting: protocols and systems |
2005/1/14 | Sadayuki HONGO | Senior Manager, Network Management Development Department, NTT DoCoMo Inc. | Security Systems, Management, Applications and Research for Mobile Communication |
2004/11/12 | Mitsuru MATSUI | Mitsubishi Electric Corporation, Information Technology R&D Center, Information Security Department, Deputy Manager | Recent trends on secret-key ciphers and their software implementation |
2004/02/02 | Kwangjo KIM | Prof. of ICU (Information and Communications Univ.) and Director of IRIS |
An Efficient Tree-based Group Key Agreement using Bilinear Map, Practical Solution for Location Privacy in Mobile IPv6 |
2003/12/22 | Kazuo TAKARAGI | Systems Development Laboratory, Hitachi Ltd. |
Network Security Technology |
2003/11/7 | Motoji OHMORI | Manager, Content Security Group, AV Core Technology Development Center, Matsushita Electric Industrial Co., Ltd. |
Security technology and its application in an electrical equipment manufacturer |
2003/9/25 | Kaoru Kurosawa | Department of Computer and Information Sciences, Ibaraki University |
New provably secure PKC and MAC schemes |
2003/2/26 | Kouji Nakao | KDDI R&D Labs. Computer Security Group | Trends of Network Security Technology |
2002/6/3 | Yoshikatsu Ito | Matsushita Electric Industrial Co., Ltd. Multimedia Development Center Senior Engineer |
Contents distribution and protection of copyrights |
2002/4/11 | Ken Umeno | Communications Research Laboratory Basic and Advanced Research Division, Senior Researcher | Design of Scalable Gbit/s Security Processor |
2002/3/1 | Mitsuru MATSUI | Mitsubishi Electric Co. | Recent Trends on Cyptanalysis of Block Ciphers |
2002/1/28 | Kwangjo Kim | Associate Prof. of ICU (Information and Communications Univ.) and Director of IRIS | Korean Standard Cryptographic Primitives and Recent research of IRIS |
2001/10/5 | SHINICHI KAWAMURA | Toshiba Corporation,Research and Development Center,Senior Research Scientist | Information Society and Security |
2001/6/8 | Kazuo OHTA | The University of Electro-Communications, Department of Information and Communication Engineering, Professor | On the security of Multi-Signature Schemes |
2001/2/14 | Masanobu KANEKO | Kyushu University, Faculty of Mathematics, Associate Professor | Bernoulli numbers and values of zeta functions |
2000/11/17 | Hiroki SHIZUYA | Professor, Education Center for Information Processing, Tohoku University | On the Complexity of Computing Functions |
2000/5/8 | Tatsuaki OKAMOTO | Fellow, NTT Laboratories | A Provably Secure and Practical Public Key Encryption Scheme |
1999/12/6 | Yoshihiko YAMAMOTO | Osaka University | Experimental Mathematics with Mathematica |
1999/10/29 | Mitsuru MATSUI | Mitsubishi Electric Co. | Some Recent Topics on Symmetric Ciphers |
1999/9/21 | Edward Dawson | Queensland University of Technology, Associate Professor | Cryptographic algorithms in mobile communications |
1999/7/28 | Rene Peralta | Yale University, Professor | Special elliptic curve methods for factoring Okamoto Numbers. |
1999/7/21 | Motoji OOMORI | Matsushita Electric Industrial Co. | On Applications of Cryptographic Technology |