Information of Invited Lecture

    Following lectures are arranged. Please feel free to attend the lecture. Send us an e-mail for request.

    ball Coming lectures

    DATE NAME AFF. TITLE


    ball Past lectures

    DATENAMEAFF.TITLE
    2015/9/9 Dr. Alex Kaitai Liang School of Science and Technology, Aalto University, Finland Privacy-preserving genomic relatedness test: a new cryptographic solution
    2015/8/27 Ms. Elena Pagnin Chalmers University of Technology, Sweden Homomorphic authentication in Linear Network Coding; On the Leakage of Information in Biometric Authentication
    2015/8/27 Dr. Katerina Mitrokotsa Associate Professor, Chalmers University of Technology, Sweden Authentication in Constrained Settings:challenges and directions
    2015/5/21 Dr. Naoki Endo Senior Fellow, Industrial ICT Solutions Company, Toshiba Corporation Industrial Control Systems and IoT - Emerging Targets of Information Security Technology
    2015/2/26 Dr. Mitsuru Matsui Mitsubishi Electric Corporation, Information Technology R&D Center, Cheef Engineer, Matsui Cipher Project Leader Recent Topics on Authenticated Encryption Algorithms
    2015/2/13 Dr. Vuillaume Camille ETAS-PSC/ECY Automotive security : an introduction
    2015/1/15 Dr. Chen-Mou Cheng Associate Professor, National Taiwan University A polynomial-time algorithm for solving underdetermined multivariate quadratic equations
    2015/1/15 Dr. Chen-Mou Cheng Associate Professor, National Taiwan University A domain-specific language for efficient cryptographic engineering
    2015/1/6 Dr. Koichiro Hayashi Professor, Institute of Information Security Cybersecurity and Secrecy of Communication
    2014/12/23 Dr. Li Zhen Institute for Infocomm Research, Singapore How to Crack Password of Old Version Windows Systems by Solving Equations
    2013/12/2 Dr.Koji Chida NTT Secure Platform Laboratories Privacy-enhancing technologies for secondary use of personal data safely
    2013/3/20 Dr. Mitsuru Matsui Mitsubishi Electric On differential uniformity and non-linearity of cryptographic S-boxes
    2013/8/12 Dr. Ryuichi Yamamoto The University of Tokyo Privacy vs. Public benefit in using health information
    2012/12/17 Dr. Koji Nakao KDDI labratory Research for Security Management -- Investigating current and future issues on Security Management --
    2012/11/8 Dr. Hidenori Kuwakado Kobe University Methods for Constructing Hash Functions and their Security
    2012/9/10 Dr. Hiroaki Kikuchi Tokai University Trend and principle - privacy-preserving data mining
    2012/8/28 Dr. Hiroaki Takada Nagoya University Dependability Requirements on Embedded Systems and Issues on Information Security
    2012/3/22 Dr. Kwok-Wo WONG Department of Electronic Engineering City University of Hong Kong Joint Source Coding and Encryption using Chaos and Fractals
    2012/3/2 Dr.Kazuo Sakiyama The University of Electro-Communications Fault Sensitivity Analysis and Its Application
    2012/1/6 Dr.Asahiko Yamada Council on Competitiveness-Nippon/TOSHIBA Solution ACBio, the Internet enabler for biometrics: its concept and application
    2011/12/16 Dr.Yoshihumi Manabe NTT Communication Science Laboratories Cake-cutting Algorithms
    2011/11/18 Dr.Tatsuaki Okamoto NTT Information Sharing Platform Laboratories Security Notions of Cryptography, History and Progress
    2011/5/27 Mr. Randall J.Easter Director of the NIST Cryptographic Module Validation Program (CMVP) NIST Cryptographic Validation Programs
    2011/2/4 Dr. Mitsuru MATSUI Mitsubishi Electric Corporation, Information Technology R&D Center, Information Security Department, Deputy Manager Physical Unclonable Function using Glitch
    2010/1/14 Dr. Isamu TERANISHI NEC Corporation, Internet Systems Research Laboratories Signatures Resilient to Continual Leakage on Memory and Computation
    2010/12/16 Dr. Marc Joye Technicolor, Security & Content Protection Labs, France The arithmetic of Huff curves and its cryptographic applications
    2010/11/5 Keisuke Takemori KDDI Co.,Ltd Reserch Laboratory Computer Security
    2010/9/24 Junji Shikata Associate professor, Graduate School of Environment and Information Sciences, Yokohama National University, Japan Cryptographic Protocols with Information-Theoretic Security
    2010/5/27 Dr. Matt Henricksen Principal Investigator, Symmetric Cryptology, at Institute for Infocomm Research, Singapore Unsolved problems in Stream Cipher research
    2010/3/15 Mr. Yuji Suga IIJ Ltd. Security requirements on cloud computing and vulnerabilities of internet protocols
    2010/2/26 Dr. Mitsuru Matsui Mitsubishi Electric Ltd. Secure Biometric Authentication Using 2-DNF Homomorphic Encryption
    2009/12/4 Dr. Xuejia Lai Dept. of Computer Science and Engineeringr Shanghai Jiao Tong University FO Relation of MISTY1 and key-dependent attack
    2009/11/20 Dr. Katsuyuki OKEYA Hitachi, Ltd., Systems Development Laboratory, SeniorResearcher Addition Chains in Elliptic Curve Cryptosystems
    2009/03/05 Dr. Goichiro HANAOKA AIST, RCIS, Researcher Methodologies for Constructing CCA-Secure PKE schemes
    2009/01/16 Mr. Masato Terada Chief Coordination Designer , Hitachi Incident Response Team, Hitachi Ltd. History of unauthorized activities in the Internet
    2009/01/09 Dr. Mitsuru MATSUI Mitsubishi Electric Corporation, Information Technology R&D Center, Information Security Department, Deputy Manager Key Collisions of the RC4 Stream Cipher
    2008/09/19 Mr. Toshiaki Tanaka KDDI R & D Laboratories Inc., Information Security Laboratory, Senior Manager. Trends in Information Security for Telecom Operators
    2008/04/21 Dr. Erik Zenner Department of Mathematics, Technical University of Denmark (TUD). Cache Timing Attacks in Symmetric Cryptography
    2008/3/20 Yvo Desmedt The BT Chair of Information Security at University College London, UK. He is also a courtesy professor at Florida State University. Revisiting pairing based group key exchange
    2008/03/11 Akira Otsuka National Institute of Advanced Industrial Science and Technology (AIST). Biometrics Secuity - Wolf Attack Probability -
    2008/02/21 Hidehiko Tanaka Dean Institute of Information Security The Role of Information Technology
    2007/12/21 Tetsu Iwata Associate Professor, Nagoya University. Recent Research Trend on Blockcipher Modes of Operations
    2007/11/16 Yvo Desmedt The BT Chair of Information Security at University College London, UK and courtesy professor at Florida State University, USA. Appliying Recreational Mathematics to Secure Multiparty Computation
    2007/10/26 Hiromitsu TAKAGI National Institute of Advanced Industrial science and technology (AIST), Senior Researcher Web Application Security
    2007/09/21 Mitsuru MATSUI Mitsubishi Electric Corporation, Information Technology R&D Center, Information Security Department, Deputy Manager On the Power of Bitslice Implementation on Intel Core2 Processor
    2007/02/23 Shiho Moriai Sony Corporation/Information Technologies Laboratories/Senior Researcher State-of-the-art Technologies embedded in PLAYSTATION 3
    2006/10/16 Marc JOYE Thomson R&D, France Fault Attacks: An Algorithmic Perspective
    2006/9/22 Shigeo TSUJII Institute of Information Security, president Information security comprehensive science and encryption theory
    2006/2/17 Mitsuru MATUSI Mitsubishi Electric Corporation, Information Technology R&D Center, Information Security Department, Deputy Manager Linear Cryptanalysis of Block Ciphers
    2006/1/6 Jun KOGURE Senior Researcher, Secure Computing Lab. IT Core Laboratories
    FUJITSU LABORATORIES LTD.
    Cryptography and Lattice
    2005/9/9 Tsuyoshi TAKAGI Future University-HAKODATE department of media architecture Radix-r Non-Adjacent Form and its Application to Pairing-Based Cryptosystems
    2005/5/6 Moti Yung Columbia University Computer Science Department Research Professor Kleptography: The Outsider Inside Your Crypto Devices (and its trust implications)
    2005/3/3 Kazue SAKO NEC Internet Systems Research Laboratories Research Fellow Electronic voting: protocols and systems
    2005/1/14 Sadayuki HONGO Senior Manager, Network Management Development Department, NTT DoCoMo Inc. Security Systems, Management, Applications and Research for Mobile Communication
    2004/11/12 Mitsuru MATSUI Mitsubishi Electric Corporation, Information Technology R&D Center, Information Security Department, Deputy Manager Recent trends on secret-key ciphers and their software implementation
    2004/02/02 Kwangjo KIM Prof. of ICU (Information and Communications Univ.)
    and Director of IRIS
    An Efficient Tree-based Group Key Agreement using Bilinear Map,
    Practical Solution for Location Privacy in Mobile IPv6
    2003/12/22 Kazuo TAKARAGI Systems Development Laboratory,
    Hitachi Ltd.
    Network Security Technology
    2003/11/7 Motoji OHMORI Manager, Content Security Group,
    AV Core Technology Development Center,
    Matsushita Electric Industrial Co., Ltd.
    Security technology and its application in an electrical equipment manufacturer
    2003/9/25 Kaoru Kurosawa Department of Computer and Information Sciences,
    Ibaraki University
    New provably secure PKC and MAC schemes
    2003/2/26 Kouji Nakao KDDI R&D Labs. Computer Security Group Trends of Network Security Technology
    2002/6/3 Yoshikatsu Ito Matsushita Electric Industrial Co., Ltd.
    Multimedia Development Center Senior Engineer
    Contents distribution and protection of copyrights
    2002/4/11 Ken Umeno Communications Research Laboratory Basic and Advanced Research Division, Senior Researcher Design of Scalable Gbit/s Security Processor
    2002/3/1 Mitsuru MATSUI Mitsubishi Electric Co. Recent Trends on Cyptanalysis of Block Ciphers
    2002/1/28 Kwangjo Kim Associate Prof. of ICU (Information and Communications Univ.) and Director of IRIS Korean Standard Cryptographic Primitives and Recent research of IRIS
    2001/10/5 SHINICHI KAWAMURA Toshiba Corporation,Research and Development Center,Senior Research Scientist Information Society and Security
    2001/6/8 Kazuo OHTA The University of Electro-Communications, Department of Information and Communication Engineering, Professor On the security of Multi-Signature Schemes
    2001/2/14 Masanobu KANEKO Kyushu University, Faculty of Mathematics, Associate Professor Bernoulli numbers and values of zeta functions
    2000/11/17 Hiroki SHIZUYA Professor, Education Center for Information Processing, Tohoku University On the Complexity of Computing Functions
    2000/5/8 Tatsuaki OKAMOTO Fellow, NTT Laboratories A Provably Secure and Practical Public Key Encryption Scheme
    1999/12/6 Yoshihiko YAMAMOTO Osaka University Experimental Mathematics with Mathematica
    1999/10/29 Mitsuru MATSUI Mitsubishi Electric Co. Some Recent Topics on Symmetric Ciphers
    1999/9/21 Edward Dawson Queensland University of Technology, Associate Professor Cryptographic algorithms in mobile communications
    1999/7/28 Rene Peralta Yale University, Professor Special elliptic curve methods for factoring Okamoto Numbers.
    1999/7/21 Motoji OOMORI Matsushita Electric Industrial Co. On Applications of Cryptographic Technology