Following lectures are arranged. Please feel free to attend the lecture. Send us an e-mail for request.

Past lectures

DATENAMEAFF.TITLE
2024/5/9 Khaled N. Khasawneh George Mason University (GMU) Trustworthy ML: A Computer Architecture Perspective
2023/9/20 Hui Cui the Monash University Enhancing Key Security in Public-Key Cryptography
2023/3/10 Yvo Desmedt the University of Texas at Dallas Framing and Realistic Secret Sharing
2022/5/24 Leizhang Wang Xidian University Introduction to the simulator of Pump and Jump BKZ and a better reducing strategy
2020/1/31 Kwangjo Kim Korea Advanced Institute of Science and Technology Key Re-usable Dynamic Group Key Exchange from Lattice against Neighbor Attacks
2019/9/18 Yan Wan University of Texas at Arlington Networked Unmanned Aerial Vehicle Systems: Challenges and Opportunities
2019/2/4 Serge Vaudenay ÉCOLE POLYTECHNIQUE FÉDÉRALE DE LAUSANNE Secure Communication by Ratcheting
2019/1/21 Kwangjo Kim Korea Advanced Institute of Science and Technology How modern cryptography has been developed and to be.
2017/12/5 Jiageng Chen Central China Normal University Improved Differential Characteristic Searching Methods
2017/8/1 Jon Fuchs The Free University of Brussels Application of new trail bound techniques to linear and differential trails in Noekeon.
2017/7/14 Daniel Dinu The University of Luxembourg Side-Channel Attacks meet Secure Network Protocols
2017/7/3 Eiichiro Fujisaki Japan Advanced Institute of Science and Technology All-But-Many Encryption, Journal of Cryptography
2017/6/1 Yvo Desmedt the University of Texas at Dallas Parity Check based Redistribution of Secret Shares
2015/9/9 Dr. Alex Kaitai Liang School of Science and Technology, Aalto University, Finland Privacy-preserving genomic relatedness test: a new cryptographic solution
2015/8/27 Ms. Elena Pagnin Chalmers University of Technology, Sweden Homomorphic authentication in Linear Network Coding; On the Leakage of Information in Biometric Authentication
2015/8/27 Dr. Katerina Mitrokotsa Associate Professor, Chalmers University of Technology, Sweden Authentication in Constrained Settings:challenges and directions
2015/5/21 Dr. Naoki Endo Senior Fellow, Industrial ICT Solutions Company, Toshiba Corporation Industrial Control Systems and IoT - Emerging Targets of Information Security Technology
2015/2/26 Dr. Mitsuru Matsui Mitsubishi Electric Corporation, Information Technology R&D Center, Cheef Engineer, Matsui Cipher Project Leader Recent Topics on Authenticated Encryption Algorithms
2015/2/13 Dr. Vuillaume Camille ETAS-PSC/ECY Automotive security : an introduction
2015/1/15 Dr. Chen-Mou Cheng Associate Professor, National Taiwan University A polynomial-time algorithm for solving underdetermined multivariate quadratic equations
2015/1/15 Dr. Chen-Mou Cheng Associate Professor, National Taiwan University A domain-specific language for efficient cryptographic engineering
2015/1/6 Dr. Koichiro Hayashi Professor, Institute of Information Security Cybersecurity and Secrecy of Communication
2014/12/23 Dr. Li Zhen Institute for Infocomm Research, Singapore How to Crack Password of Old Version Windows Systems by Solving Equations
2013/12/2 Dr.Koji Chida NTT Secure Platform Laboratories Privacy-enhancing technologies for secondary use of personal data safely
2013/3/20 Dr. Mitsuru Matsui Mitsubishi Electric On differential uniformity and non-linearity of cryptographic S-boxes
2013/8/12 Dr. Ryuichi Yamamoto The University of Tokyo Privacy vs. Public benefit in using health information
2012/12/17 Dr. Koji Nakao KDDI labratory Research for Security Management -- Investigating current and future issues on Security Management --
2012/11/8 Dr. Hidenori Kuwakado Kobe University Methods for Constructing Hash Functions and their Security
2012/9/10 Dr. Hiroaki Kikuchi Tokai University Trend and principle - privacy-preserving data mining
2012/8/28 Dr. Hiroaki Takada Nagoya University Dependability Requirements on Embedded Systems and Issues on Information Security
2012/3/22 Dr. Kwok-Wo WONG Department of Electronic Engineering City University of Hong Kong Joint Source Coding and Encryption using Chaos and Fractals
2012/3/2 Dr.Kazuo Sakiyama The University of Electro-Communications Fault Sensitivity Analysis and Its Application
2012/1/6 Dr.Asahiko Yamada Council on Competitiveness-Nippon/TOSHIBA Solution ACBio, the Internet enabler for biometrics: its concept and application
2011/12/16 Dr.Yoshihumi Manabe NTT Communication Science Laboratories Cake-cutting Algorithms
2011/11/18 Dr.Tatsuaki Okamoto NTT Information Sharing Platform Laboratories Security Notions of Cryptography, History and Progress
2011/5/27 Mr. Randall J.Easter Director of the NIST Cryptographic Module Validation Program (CMVP) NIST Cryptographic Validation Programs
2011/2/4 Dr. Mitsuru MATSUI Mitsubishi Electric Corporation, Information Technology R&D Center, Information Security Department, Deputy Manager Physical Unclonable Function using Glitch
2010/1/14 Dr. Isamu TERANISHI NEC Corporation, Internet Systems Research Laboratories Signatures Resilient to Continual Leakage on Memory and Computation
2010/12/16 Dr. Marc Joye Technicolor, Security & Content Protection Labs, France The arithmetic of Huff curves and its cryptographic applications
2010/11/5 Keisuke Takemori KDDI Co.,Ltd Reserch Laboratory Computer Security
2010/9/24 Junji Shikata Associate professor, Graduate School of Environment and Information Sciences, Yokohama National University, Japan Cryptographic Protocols with Information-Theoretic Security
2010/5/27 Dr. Matt Henricksen Principal Investigator, Symmetric Cryptology, at Institute for Infocomm Research, Singapore Unsolved problems in Stream Cipher research
2010/3/15 Mr. Yuji Suga IIJ Ltd. Security requirements on cloud computing and vulnerabilities of internet protocols
2010/2/26 Dr. Mitsuru Matsui Mitsubishi Electric Ltd. Secure Biometric Authentication Using 2-DNF Homomorphic Encryption
2009/12/4 Dr. Xuejia Lai Dept. of Computer Science and Engineeringr Shanghai Jiao Tong University FO Relation of MISTY1 and key-dependent attack
2009/11/20 Dr. Katsuyuki OKEYA Hitachi, Ltd., Systems Development Laboratory, SeniorResearcher Addition Chains in Elliptic Curve Cryptosystems
2009/03/05 Dr. Goichiro HANAOKA AIST, RCIS, Researcher Methodologies for Constructing CCA-Secure PKE schemes
2009/01/16 Mr. Masato Terada Chief Coordination Designer , Hitachi Incident Response Team, Hitachi Ltd. History of unauthorized activities in the Internet
2009/01/09 Dr. Mitsuru MATSUI Mitsubishi Electric Corporation, Information Technology R&D Center, Information Security Department, Deputy Manager Key Collisions of the RC4 Stream Cipher
2008/09/19 Mr. Toshiaki Tanaka KDDI R & D Laboratories Inc., Information Security Laboratory, Senior Manager. Trends in Information Security for Telecom Operators
2008/04/21 Dr. Erik Zenner Department of Mathematics, Technical University of Denmark (TUD). Cache Timing Attacks in Symmetric Cryptography
2008/3/20 Yvo Desmedt The BT Chair of Information Security at University College London, UK. He is also a courtesy professor at Florida State University. Revisiting pairing based group key exchange
2008/03/11 Akira Otsuka National Institute of Advanced Industrial Science and Technology (AIST). Biometrics Secuity - Wolf Attack Probability -
2008/02/21 Hidehiko Tanaka Dean Institute of Information Securityツ The Role of Information Technology
2007/12/21 Tetsu Iwata Associate Professor, Nagoya University. Recent Research Trend on Blockcipher Modes of Operations
2007/11/16 Yvo Desmedt The BT Chair of Information Security at University College London, UK and courtesy professor at Florida State University, USA. Appliying Recreational Mathematics to Secure Multiparty Computation
2007/10/26 Hiromitsu TAKAGI National Institute of Advanced Industrial science and technology (AIST), Senior Researcher Web Application Security
2007/09/21 Mitsuru MATSUI Mitsubishi Electric Corporation, Information Technology R&D Center, Information Security Department, Deputy Manager On the Power of Bitslice Implementation on Intel Core2 Processor
2007/02/23 Shiho Moriai Sony Corporation/Information Technologies Laboratories/Senior Researcher State-of-the-art Technologies embedded in PLAYSTATION 3
2006/10/16 Marc JOYE Thomson R&D, France Fault Attacks: An Algorithmic Perspective
2006/9/22 Shigeo TSUJII Institute of Information Security, president Information security comprehensive science and encryption theory
2006/2/17 Mitsuru MATUSI Mitsubishi Electric Corporation, Information Technology R&D Center, Information Security Department, Deputy Manager Linear Cryptanalysis of Block Ciphers
2006/1/6 Jun KOGURE Senior Researcher, Secure Computing Lab. IT Core Laboratories
FUJITSU LABORATORIES LTD.
Cryptography and Lattice
2005/9/9 Tsuyoshi TAKAGI Future University-HAKODATE department of media architecture Radix-r Non-Adjacent Form and its Application to Pairing-Based Cryptosystems
2005/5/6 Moti Yung Columbia University Computer Science Department Research Professor Kleptography: The Outsider Inside Your Crypto Devices (and its trust implications)
2005/3/3 Kazue SAKO NEC Internet Systems Research Laboratories Research Fellow Electronic voting: protocols and systems
2005/1/14 Sadayuki HONGO Senior Manager, Network Management Development Department, NTT DoCoMo Inc. Security Systems, Management, Applications and Research for Mobile Communication
2004/11/12 Mitsuru MATSUI Mitsubishi Electric Corporation, Information Technology R&D Center, Information Security Department, Deputy Manager Recent trends on secret-key ciphers and their software implementation
2004/02/02 Kwangjo KIM Prof. of ICU (Information and Communications Univ.)
and Director of IRIS
An Efficient Tree-based Group Key Agreement using Bilinear Map,
Practical Solution for Location Privacy in Mobile IPv6
2003/12/22 Kazuo TAKARAGI Systems Development Laboratory,
Hitachi Ltd.
Network Security Technology
2003/11/7 Motoji OHMORI Manager, Content Security Group,
AV Core Technology Development Center,
Matsushita Electric Industrial Co., Ltd.
Security technology and its application in an electrical equipment manufacturer
2003/9/25 Kaoru Kurosawa Department of Computer and Information Sciences,
Ibaraki University
New provably secure PKC and MAC schemes
2003/2/26 Kouji Nakao KDDI R&D Labs. Computer Security Group Trends of Network Security Technology
2002/6/3 Yoshikatsu Ito Matsushita Electric Industrial Co., Ltd.
Multimedia Development Center Senior Engineer
Contents distribution and protection of copyrights
2002/4/11 Ken Umeno Communications Research Laboratory Basic and Advanced Research Division, Senior Researcher Design of Scalable Gbit/s Security Processor
2002/3/1 Mitsuru MATSUI Mitsubishi Electric Co. Recent Trends on Cyptanalysis of Block Ciphers
2002/1/28 Kwangjo Kim Associate Prof. of ICU (Information and Communications Univ.) and Director of IRIS Korean Standard Cryptographic Primitives and Recent research of IRIS
2001/10/5 SHINICHI KAWAMURA Toshiba Corporation,Research and Development Center,Senior Research Scientist Information Society and Security
2001/6/8 Kazuo OHTA The University of Electro-Communications, Department of Information and Communication Engineering, Professor On the security of Multi-Signature Schemes
2001/2/14 Masanobu KANEKO Kyushu University, Faculty of Mathematics, Associate Professor Bernoulli numbers and values of zeta functions
2000/11/17 Hiroki SHIZUYA Professor, Education Center for Information Processing, Tohoku University On the Complexity of Computing Functions
2000/5/8 Tatsuaki OKAMOTO Fellow, NTT Laboratories A Provably Secure and Practical Public Key Encryption Scheme
1999/12/6 Yoshihiko YAMAMOTO Osaka University Experimental Mathematics with Mathematica
1999/10/29 Mitsuru MATSUI Mitsubishi Electric Co. Some Recent Topics on Symmetric Ciphers
1999/9/21 Edward Dawson Queensland University of Technology, Associate Professor Cryptographic algorithms in mobile communications
1999/7/28 Rene Peralta Yale University, Professor Special elliptic curve methods for factoring Okamoto Numbers.
1999/7/21 Motoji OOMORI Matsushita Electric Industrial Co. On Applications of Cryptographic Technology
Top