Mar. 2023

Doctor Course

Hideaki Miyaji Secure and efficient post-quantum commitment scheme and its application
Po-Chu Hsu Scalable and Public Verifiable M+1st-Price Auction on Smart Contract

Master Course

Kai Izumi Improved Key Recovery Attacks on the Stream Cipher ChaCha
Satoshi Uesugi The Extension of a Solution for Post-Quantum Secure Ring-LWE Problem
Yudai Tagawa Security Analysis of MP-LWE Problem
Seishiro Terada Security Analysis of Lattice-Based Cryptography using Ideal Lattices
Katsuya Nakashima The efficiency of lattice cryptanalysis by iterative LLL for lattice basis vectors
Yuta Maeno Lattice-based Accumulator with constant time list update and constant time verification
Shintaro Yamashita Proposal of Methods to Detect Backdoor Attacks Using Signature Embedding Techniques
Tatsuta Yamatsuki Data processing methods for high-performance Privacy-Preserving Machine Learning

Bachelor Course

Yurie Okada On Theoretical Analysis of Stream Cipher ChaCha
Ryosuke Kido Fast and Secure Scalar Multiplication on Elliptic Curve GLS254
Akira Fujimoto Improved defense against backdoor attacks on machine learning
Toshiyuki Mineta Efficient Key-Value Commitments with batch update and verification
Ryoto Morizono Performance evaluation of post-quantum dijital signature schemes
Tomoshi Yagishita On Privacy Mechanism to Discreat Data fit for Machine Learning
Rintaro Yamada Consideration on Diffinition Field for Efficient Ring-LWE Problem

Mar. 2022

Doctor Course

Jin Yaoan

Master Course

Hayato Arai Secure against side-channel attack and fast post-quantum crypto system CSIDH
Shingo Uehara Proposal of Forward-Secure Ring Signature Scheme with Claimability and Repudiation
Yuya Okubo A Proposal of defining fields for Efficient Ring-LWE Based Cryptography
Junpei Ozaki Proposal for operation verification framework and debugger for eBPF
Fumiya Saito Design and implementation of Trusted shell on TEE
Tomoka Takahashi Vulnerability of Ring-LWE problem due to error bias
Yoshitaka Nagao Privacy Preserving Threshold Data Integration Protocol
Koki Matsubara Proposal for a hash function with keys that reduces the risk of secret key leakage
Ryo Watanabe Improved differential linear analysis for the symmetric key cipher ChaCha
Wang Yusen Dealer-less Threshold Signature Schemes based on Isogeny
Li Jun Ru Security Analysis on Stream Cipher Salsa20
Gao Yue Security Anslysis of Scalar multiplication Algorithm on GLS254

Bachelor Course

Kenta Okada Privacy-Preserving Federated Learning via Homomorphic Encryption
Hajime Kawada Attacks on Module-LWE problem by using χ2 test
Naoki Kawahara Proposal for a privacy-preserving frequency estimation method
Katsuhiro Sato Proof of Security in pqe-based cryptosystems
Kosuke Tamura Safety Analysis for Post-quantum Module-LWE Problem on Subfield in Cyclotomic Field
Atsuki Nagai Improvement of the linear approximation of the stream cipher ChaCha and its application to differential-linear analysis
Ryunosuke Higashi On a Threshold Ring Signature Scheme for Generating Efficiently Sized Signatures
Sosuke Funatsu Expanding Underlying Number Fields Reducing from Module-LWE to Ring-LWE
Paul Kunal Digital Watermarks in Text-to-Image Generation Models

Mar. 2021

Doctor Course

Hector Bjoljahn Hougaard Study on post-quantum group key exchanges and generalization
Tomoaki Mimoto A study on Utility-aware Privacy-preseving Techniques
Kenta Kodera(Earn credits)

Master Course

Kohei Hosoya Implementation and Verification of Network Functions in Rust
Takuya Inomoto Threshold Signature Scheme Suitable for a Short Message
Liu Xiaolong Design and Implementation of Session Types-based Socket Communication Protocols

Bachelor Course

Kai Izumi Analysis of the Stream Cipher ChaCha Using Higher Order Differentials
Satoshi Uesugi On Safety Analysis for the Post-quantum Ring-LWE Problem on Subfield in Cyclotomic Field
Tetsuhiro Kawaguchi Development of Validation / Synthesis System for Stack Snwinding Information on AArch64
Yuta Maeno Research on quantum-safe accumulator with efficient update function
Shintaro Yamashita Research on efficient signature generation
Tatuta Yamatsuki Proposal for Scalable Local Differential Privacy

Mar. 2020

Master Course

Motoki Takenaka A Study of Deceptive Defense System
Akifumi Muroi Experimental Analysis for Decision Ring-LWE Problem with Sublattice Attack
Yasuhisa Okumura Crypto Analysis for The Post-quantum Ring-LWE Problem
Shotaro Miyashita Analysis of Salsa20 and ChaCha
Wang Zhaobo Fast Multiparty Threshold ECDSA With Robustness

Bachelor Course

Hayato Arai Security analysis for the post-quantum cryptography CSIDH
Yuya Okubo searching for fields in Ring-LWE
Fumiya Saito Design and Implementation of Software Switch using Formal Methods
Koki Matsubara Proposal for a Hash Function with Revocation for Blockchain
Ryo Watanabe Study on a New Linear Bias in the Stream Cipher Salsa20
Junpei Ozaki A Test Flamework of Dynamic Memory Allocator for Rust

Mar. 2019

Doctor Course

Ryoma Ito A Study on Statistical Cryptanalysis of Stream Ciphers

Master Course

Hideto Nakano An Experimental Analysis using plural Ideals against Decision Ring-LWE over Decomposition Fields
Ki Gie Secure Comparisonl based on Quasi-Cyclic Code
Yohei Maezawa An algebraic attack against LRPC code-based cryptography

Bachelor Course

Motoki Takenaka A Framework for Building Deception Networks
Akifumi Muroi A Distinguish Attack Evaluating at t = 1 for Indeterminate Equation Scheme based on IE-LWE
Kotaro Yamaguchi Proposal of Online Pachinko using smart contract

Mar. 2018

Doctor Course

Karin SUMONGKAYOTHIN Improving bandwidth cost of Oblivious Random Access Machine by using matrix based storage structure
Rashed MAZUMDER Study on Secure Message Encryption and Authentication

Master Course

Shunsuke OTSUKA HIBE based on Universal Sampler
Katsunari SHISHIDO Efficient and quasi-Accurate Private Multiset Union
Kenta KODERA Complexity analysis of solving elliptic curve discrete logarithm problem

Bachelor Course

Motoi Hayashi Improvement of Multi-party Private Set Intersection
Yuki Sugitani Modeling Worm Propagation using Dynamic Patching
Tomoya Nishiguchi solving polynomial system with set algorithm
Yusuke Matsuoka Safety evaluation of stream cipher, Salsa20/ChaCha20 by redesign of diffusion

Sep. 2017

Doctor Course

KarinSUMONGKAYOTHIN Improving bandwidth cost of Oblivious Random Access Machine by using matrix based storage structure
Rashed MAZUMDER Study on Secure Message Encryption and Authentication

Mar. 2017

Master Course

Hiroshi Nomaguchi On Secure Pseudo-Random Number Generator for IoT devices
Gavin Lynn STEWART Study on obfuscation of symmetric key cipher
Takatoshi Yoshida On Privacy-preserving Statistic Computation for Multiple Database

Bachelor

Takano Satoru Anonymous Oblivious RAM for Multi-user Environment
Tatsuhiko Kono secure and efficient elliptic curve cryptography for side channel attack
Kenta Kodera Security evaluation of elliptic curve cryptosystems with special addition formula
Ryohei Morishima Security evaluation of elliptic curve cryptosystems with special addition formula (2)

Mar. 2016

Master Course

Keisuke Kito
Daiki Michihiro Security Evaluation of Stream Cipher RC4
Sumiyo Ishige A Study of Secure Network Coding

Mar. 2015

Master Course

Ryoma Ito Theoretical analysis of stream cipher RC4
Satoshi Kamekawa A study on vulnerability and countermeasure of SSL/TLS
Hiroyuki Sato A Study on the safety of pseudo-random number
Ryota Takahashi A study on Efficient Elliptic Curve Scalar Multiplication
Shohei Nishida A Study on Efficient Multi-Party Private Set Intersection Protocol
Rashed MAZUMDER A Study of Cryptographic Hash Function
Takaya Asano A study on network coding for detecting pollution attack

Doctor Course

Mohammad S.I. MAMUN Studies on cryptographic solutions to secure applications

Mar. 2014

Master Course

Tomoaki Mimoto "A Study on Efficient Multi-Party Private Set Intersection Protocol"

Mar. 2013

Master Course

Yu Ichimaru "A Study on Safety of Symmetric Cipher"
Tsuyoshi Sawada "A Study on Safety of hash function"
SHI, Xiaonan "A Study on the relation between trace, definition field, embedding degree and class number"
YANG, Cuinan "A Study on Efficient Scalar Multiplications for Elliptic Curve Cryptosystems"
Yoshio KAWAMO "A Study on Efficient Scalar Multiplications for Elliptic Curve Cryptosystems"
TRAN PHUONG VIET XUAN "On the Construction of Constant Ciphertext Length in Attribute Based Encryption"
RATEMO, Alice Harriet Mwango "SECURE DYNAMIC HOURGLASS PROTOCOL WITH APPLICATIONS TO STORAGE DATA"

Doctor Course

Jiageng CHEN "Cryptoanalysis of Stream Cipher"
Mohammad S. RAHMAN "A Study on Privacy-preserving Technologies"

Mar. 2012

Master Course

Kazuya Izawa "Efficient Data aggregation for Wireless Sensor Networks"
Yiren MO "A Study on Privacy-preserving Technologies"

Doctor Course

Jiageng CHEN "Cryptoanalysis of Stream Cipher"
Mohammad S. RAHMAN "A Study on Privacy-preserving Technologies"

Mar. 2011

Master Course

Tatsuro Iida "Proactive co-Operative Link Self-Healing for Wireless Sensor Networks"
Kazuho Kakiwaki "A Study on Safety of Symmetric Cipher"
Taiki Sasahara "A study on a fast method of scalar multiplication over elliptic curves"
Takashi Sato "Research on Group Key Agreement"
Tomoyoshi Nagata "A Study on Efficient Implementation of Elliptic Curve Cryptosystem"

Mar. 2010

Master Course

Mitsuki Ajiro "Theoretical analysis of RC4 PRGA by Using Nonzero Bit Differences with pseudo colliding key pair"
Hisashige Ito "A Research on Key Management in Wireless Sensor Network"
Tetsuya Hatano "A study on Efficient Tree based Group Key Agreement"
Hiroyuki Yokogawa "A study on Elliptic Curve Scalar Multiplication"

Doctor Course

Keita Emura "A Research on Anonymous Attribute-based Cryptosystems"

Mar. 2009

Master Course

Shoujiro hirasawa "Constructing Paring-Friendly Elliptic Curve with Embedding Degree k<20"
Masahiro sukegawa "Statical Cryptanalysis against Symmetric-key Ciphers"
Mohammad Shahriar RAHMAN "An Efficient RFID Privacy Scheme"
Katsuhiko Yoshida "On a Tree-Based Group Key Management"

Mar. 2008

Master Course

Takeshi Suzuki "Constructing Elliptic Curve Suitable for Elliptic Curve Cryptography "
Imaya Yuta "Statical Cryptanalysis against Symmetric-key Ciphers"
Yasuharu Sugano "A Study on Security and Efficiency of Digital Signature"
Tomoyuki Karasawa "Research for Distributed Denial of Service Attacks"
Toshiaki Kamei "Efficient and Secure Elliptic Curve Scalar Multiplication"

Mar. 2007

Master Course

Takayuki Takagi "A Study on Quantum Secret Sharing"
Hideki Takemoto "A study about an anti-denial of service attack method"
Chen jiageng "Efficient ID-Based Signature Scheme"
Nao Nomura "A Study on Efficient Group Signature Scheme"
Wataru Hasegawa "A Study on Mobile Agent Security"
Kenji Mizosoe "Research on efficient Elliptic Curve Cryptosystems"
Takaomi Wada "Statical Cryptanalysis against Symmetric-key Ciphers"

Doctor Course

Atsushi Waseda "A Study on Quantum Secret Sharing"

Mar. 2006

Master Course

Takeshi Kiyomiya "Reserch for Countermeasure of Side Channel Analysis on Elliptic Curve Cryptography"
Jun Jikeya "Research on Application of Digital Signatures"
Daiji Tanaka "Reserch for Group Signature suitable for Application"
Hikoichiro Nakamura "A Study on Broadcast Encryption Schemey"
Taro Hattori "A Study on the Obfuscation Technique for Tamper-resistant to Dynamic Analysis"
Tomohiko Hinoue "A study on the security of symmetric key cipher"

Doctor Course

Takeaki Terada "Reserch for Denial of Service attacks"

Sep. 2006

Doctor Course

Kozue Umeda "Privacy-Enhanced Group signature Scheme with CRL-based Revocation"

Mar. 2005

Master Course

Fumiaki Kanazawa "A Study on Broadcast Encryption Scheme"
Ken Sasaki "A Study on Quantum Secret Sharing"
Yuki Takano "A Study on Cryptanalysis against Symmetric Ciphers"
Hideyo Mamiya "Reserch for Optimaization of Hyperelliptic Curve Cryptography"
Masayuki Mori "A Study on Mobile Agent Security "

Mar. 2004

Master Course

Takashi Matsunaka "A study on the security of a symmetric cipher"
Hiroaki Morimoto "Study on Electronic Commerce with High Security"

Doctor Course

Yuko Tamura "Design and Analysis of Practical Digital Signature Scheme"

Mar. 2003

Master Course

Norihisa Isogai "A study on Cryptanalysis Regarding Block Ciphers"
Yuusuke Sakabe "A study on the Java Obfuscation"
Tooru Shiotsuki "A study on Electronic Auction"
Naoyuki Takahashi "A study on Hyperefficient Elliptic Curve Exponentiation"
Taro Hirai "A study on Constructing Elliptic Curves with arbitrary Embedding Degrees"
Sayaka Fukuda "A study on Security of Quantum Cryptography"

Mar. 2002

Master Course

Kozue Umeda "Efficient Gropu Signature Scheme with Revocation"
Toshio Ogiso "A study on Tamper-Resistant Software"
Kei Kawauchi "A study on provably secure multi-signature schemes with signers' intentions"
Takeaki Terada "Visual Secret Sharing Scheme with Optional Access Structure at Efficient Number of Subpixels"
Masao Nonaka "A study on the Security of Block Chipers RC5 and RC6"
Hideyuki Miyake "A study on Efficient Elliptic Curve Exponentiation"
Atsushi Waseda "A study on Modeling of the Collusion Problem and its Evaluation"

Doctor Course

Takeshi Okamoto "Design and Analysis of Practical Digital Signature Scheme"
Kazumasa Omote "A study on An Electronic Auction"

Mar. 2001

Master Course

Ryo Otomura "The Digital Signature Schemes for Mobile Agents Delegated by Multiple Users"
Yoshinori Takii "Improved Correlation Attack on RC5"
Norio Terauchi "How to construct more secure ciphers by the original cipher"
Ayako Maeda "Unconditionally secure threshold scheme with verifiability and threshold changeability"
Hiroshi Minato "Multi-signature Schemes with Singers' Intentions"

Doctor Course

Shigeki Kitazawa "Study on Anonymous Communication with Agent Technology"

Mar. 2000

Master Course

Masaki Inamura "Study on provision of flexible service over Mobile IP"
Atsushi Koide "Linkable Off-line Anonymous E-cash"
Syunzou Takano "Analysis for the security of elliptic curve cryptosystem"
Emi Tominaga "Algebraic examination for e-voting "
Satoru Nagano "Protecting Anonymity and Location Privacy with Cyclic Routes"
Shirou Mitomi "A multisignature with flexibility for message and order"
Tatsuya Yamada "Study on an effective renewal of public key cryptosystem modules"
Top