Current Bachelor's, Master's, and Doctor's Theme

2023.4-2024.3

Po-Chu Hsu
Scalable and Public Verifiable M+1st-Price Auction on Smart Contract
Doctor Abstract
Hideaki Miyaji
Secure and efficient post-quantum commitment scheme and its application
Doctor Abstract
Kai Izumi
Improved Key Recovery Attacks on the Stream Cipher ChaCha
Master Abstract
Satoshi Uesugi
The Extension of a Solution for Post-Quantum Secure Ring-LWE Problem
Master Abstract
Yudai Tagawa
Security Analysis of MP-LWE Problem
Master Abstract
Seishiro Terada
Security Analysis of Lattice-Based Cryptography using Ideal Lattices
Master Abstract
Katsuya Nakashima
The efficiency of lattice cryptanalysis by iterative LLL for lattice basis vectors
Master Abstract
Yuta Maeno
Lattice-based Accumulator with constant time list update and constant time verification
Master Abstract
Shintaro Yamashita
Proposal of Methods to Detect Backdoor Attacks Using Signature Embedding Techniques
Master Abstract
Tatsuta Yamatsuki
Data processing methods for high-performance Privacy-Preserving Machine Learning
Master Abstract
He Bingchang
Accuracy-Enhancement Techniques in Privacy-Preserving Machine Learning Models
Master Abstract
Yurie Okada
On Theoretical Analysis of Stream Cipher ChaCha
Bachelor Abstract
Ryosuke Kido
Fast and Secure Scalar Multiplication on Elliptic Curve GLS254
Bachelor Abstract
Akira Fujimoto
Improved defense against backdoor attacks on machine learning
Bachelor Abstract
Toshiyuki Mineta
Efficient Key-Value Commitments with batch update and verification
Bachelor Abstract
Ryoto Morizono
Performance evaluation of post-quantum dijital signature schemes
Bachelor Abstract
Tomoshi Yagishita
On Privacy Mechanism to Discreat Data fit for Machine Learning
Bachelor Abstract
Rintaro Yamada
Consideration on Diffinition Field for Efficient Ring-LWE Problem
Bachelor Abstract

2022.4-2023.3

Jin Yaoan
Doctor Abstract
Hayato Arai
Secure against side-channel attack and fast post-quantum crypto system CSIDH
Master Abstract
Shingo Uehara
Proposal of Forward-Secure Ring Signature Scheme with Claimability and Repudiation
Master Abstract
Yuya Okubo
A Proposal of defining fields for Efficient Ring-LWE Based Cryptography
Master Abstract
Junpei Ozaki
Proposal for operation verification framework and debugger for eBPF
Master Abstract
Fumiya Saitou
Design and implementation of Trusted shell on TEE
Master Abstract
Tomoka Takahashi
Vulnerability of Ring-LWE problem due to error bias
Master Abstract
Yoshitaka Nagao
Privacy Preserving Threshold Data Integration Protocol
Master Abstract
Koki Matsubara
Proposal for a hash function with keys that reduces the risk of secret key leakage
Master Abstract
Ryo Watanabe
Improved differential linear analysis for the symmetric key cipher ChaCha
Master Abstract
Wang Yusen
Dealer-less Threshold Signature Schemes based on Isogeny
Master Abstract
Li Jun Ru
Security Analysis on Stream Cipher Salsa20
Master Abstract
Gao Yue
Security Anslysis of Scalar multiplication Algorithm on GLS254
Master Abstract
Kenta Okada
Privacy-Preserving Federated Learning via Homomorphic Encryption
Bachelor Abstract
Hajime Kawada
Attacks on Module-LWE problem by using χ2 test
Bachelor Abstract
Naoki Kawahara
Proposal for a privacy-preserving frequency estimation method
Bachelor Abstract
Katsuhiro Satou
Proof of Security in pqe-based cryptosystems
Bachelor Abstract
Kosuke Tamura
Safety Analysis for Post-quantum Module-LWE Problem on Subfield in Cyclotomic Field
Bachelor Abstract
Atsuki Nagai
Improvement of the linear approximation of the stream cipher ChaCha and its application to differential-linear analysis
Bachelor Abstract
Ryunosuke Higashi
On a Threshold Ring Signature Scheme for Generating Efficiently Sized Signatures
Bachelor Abstract
Sosuke Funatsu
Expanding Underlying Number Fields Reducing from Module-LWE to Ring-LWE
Bachelor Abstract
Paul Kunal
Digital Watermarks in Text-to-Image Generation Models
Bachelor Abstract

2021.4-2022.3

tomoaki Mimoto
A study on Utility-aware Privacy-preseving Techniques
Doctor
Hector Bjoljahn Hougaard
Study on post-quantum group key exchanges and generalization
Doctor
Takuya Inomoto
Threshold Signature Scheme Suitable for a Short Message
Master Abstract
Kohei Hosoya
Implementation and Verification of Network Functions in Rust
Master Abstract
Liu Xiaolong
Design and Implementation of Session Types-based Socket Communication Protocols
Master Abstract
Kai Izumi
Analysis of the Stream Cipher ChaCha Using Higher Order Differentials
Bachelor Abstract
Satoshi Uesugi
On Safety Analysis for the Post-quantum Ring-LWE Problem on Subfield in Cyclotomic Field
Bachelor Abstract
Tetsuhiro Kawaguchi
Development of Validation / Synthesis System for Stack Snwinding Information on AArch64
Bachelor Abstract
Yuta Maeno
Research on quantum-safe accumulator with efficient update function
Bachelor Abstract
Shintaro Yamashita
Research on efficient signature generation
Bachelor Abstract
Tatsuta Yamatsuki
Proposal for Scalable Local Differential Privacy
Bachelor Abstract

2020.4-2021.3

Yasuhisa Okumura
Crypto Analysis for The Post-quantum Ring-LWE Problem
Master Abstract
Motoki Takenaka
A Study of Deceptive Defense System
Master Abstract
Shotaro Miyashita
Analysis of Salsa20 and ChaCha
Master Abstract
Akifumi Muroi
Experimental Analysis for Decision Ring-LWE Problem with Sublattice Attack
Master
Sai Veerya Mahadevan
PRSafe: Primitive Recursive Function based Domain Specific Language using LLVM
Master Abstract
Wang Zhaobo
Fast Multiparty Threshold ECDSA With Robustness
Master Abstract
Hayato Arai
Security analysis for the post-quantum cryptography CSIDH
Bachelor Abstract
Yuya Okubo
searching for fields in Ring-LWE
Bachelor Abstract
Junpei Ozaki
A Test Flamework of Dynamic Memory Allocator for Rust
Bachelor Abstract
Fumiya Saito
Design and Implementation of Software Switch using Formal Methods
Bachelor Abstract
Tomoteru Nakamura
An Improvement of Linear Algebraic Attack on Post-Quantum Cryptosystem Giophantus+
Bachelor Abstract
Yoshitaka Nagao
Privacy Preserving Data Integration Protocol
Bachelor Abstract
Koki Matsubara
Proposal for a Hash Function with Revocation for Blockchain
Bachelor Abstract
Ryo Watanabe
Study on a New Linear Bias in the Stream Cipher Salsa20
Bachelor Abstract
Hajime Kawata
Research on GUI of Private Set Intersection
Bachelor

2019.4-2020.3

Ryoma Ito
A Study on Statistical Cryptanalysis of Stream Ciphers
Doctor Abstract
Yuki Sugitani
Proposal of safe second-price auction using smart contract
Master Abstract
Hideaki Miyaji
Commitment method with low output locality
Master Abstract
Tomoya Nishiguchi
Design and implementation of database access control system using session type
Master Abstract
Yaoan Jin
Safe and fast elliptic curve scalar multiplication/td>
Master Abstract
Motoi Hayashi
Realization method of privacy policy in electronic service and its application/td>
Master Abstract
Yusuke Matsuoka
Security analysis of stream cipher Salsa20/ChaCha20
Master Abstract
Ou Chenyu
4-High-speed implementation of Curve25519 by parallelization
Master Abstract
Kohei Hosoya
Design and implementation of verifiable network functions
Bachelor Abstract
Daiki Oka
Lisp-based extensions to ZoKrates domain-specific languages and Variant type suggestions
Bachelor Abstract
Takuya Inomoto
Improvement of threshold signature with anonymity
Bachelor Abstract
Tomoya Ikeda
Improvement of fast and constant time inverse element calculation method
Bachelor Abstract
Takaaki Ishimura
Study on extension of Ring-LWE definition
Bachelor Abstract

2018.4-2019.3

Ki GIE
Secure Comparisonl based on Quasi-Cyclic Code
Master Abstract
Hideto NAKANO
An Experimental Analysis using plural Ideals against Decision Ring-LWE over Decomposition Fields
Master Abstract
Yohei MAEZAWA
An algebraic attack against LRPC code-based cryptography
Master Abstract
Motoki TAKENAKA
A Framework for Building Deception Networks
Bachelor Abstract
Akihumi MUROI
A Distinguish Attack Evaluating at t = 1 for Indeterminate Equation Scheme based on IE-LWE
Bachelor Abstract
Kotaro YAMAGUCHI
Proposal of Online Pachinko using smart contract
Bachelor Abstract

2017.4-2018.3

Karin SUMONGKAYOTHIN
Improving bandwidth cost of Oblivious Random Access Machine by using matrix based storage structure
Doctor Abstract
Rashed MAZUMDER
Study on Secure Message Encryption and Authentication
Doctor Abstract
Shunsuke OTSUKA
HIBE based on Universal Sampler
Master Abstract
Katsunari SHISHIDO
Efficient and quasi-Accurate Private Multiset Union
Master Abstract
Kenta KODERA
Complexity analysis of solving elliptic curve discrete logarithm problem
Master Abstract
Yuki SUGITANI
Modeling Worm Propagation using Dynamic Patching
Bachelor Abstract
Shota TERADA
On the Security of Ring-LWE with Homomorphic Encryption
Bachelor Abstract】
Tomoya NISHIGUCHI
solving polynomial system with set algorithm
Bachelor Abstract】
Taichi NISHINO
The spread and the containment of virus in random network model
Bachelor Abstract】
Motoki HAYASHI
Improvement of Multi-party Private Set Intersection
Bachelor Abstract】
Yusuke MATSUOKA
Safety evaluation of stream cipher, Salsa20/ChaCha20 by redesign of diffusion
Bachelor Abstract】

2016.4-2017.3

Hiroshi Nomaguchi
On Secure Pseudo-Random Number Generator for IoT devices
Master Abstract
Takatoshi Yoshida
On Privacy-preserving Statistic Computation for Multiple Database
Master 【Abstract】
STEWART, Gavin Lynn
Study on obfuscation of symmetric key cipher
Master 【Abstract】
Tatsuhiko Kono
secure and efficient elliptic curve cryptography for side channel attack
Bachelor Abstract
Kenta Kodera
Security evaluation of elliptic curve cryptosystems with special addition formula
Bachelor Abstract
Satoru Takano
Anonymous Oblivious RAM for Multi-user Environment
Bachelor Abstract
Ryohei Morishima
Security evaluation of elliptic curve cryptosystems with special addition formula (2)
Bachelor Abstract

2015.4-2016.3

SUMONGKAYOTHIN Karin
The Oblivious Random Access Memory (ORAM)
Abstract
MAZUMDER Rashed
Provable Security of Cryptographic Hash
Abstract
Sumiyo Ishige
A Study on Network Coding
Abstract
Keisuke Kito
Optimization of Elliptic Curve Cryptography for Embedded Systems
Abstract
Daiki Michihiro
A Study on Symmetric Cipher
Abstract
Takatoshi Yoshida
Research on Private Set Intersection Protocol
Abstract

2014.4-2015.3

Hiroyuki Sato
Studies on the safety of the pseudo-random number
Abstract
Ryota Takahashi
A study on Efficient Elliptic Curve Scalar Multiplication
Abstract
Takaya Asano
A study on network coding for detecting pollution attack
Abstract
MAZUMDER Rashed
A Study of Cryptographic Hash Function
Abstract
Mohammad S.I. MAMUN
Studies on cryptographic solutions to secure applications
Abstract

2013.4-2014.3

Tomoaki Mimoto
A Study on Multi-Party Private Set Intersection Protocol
Abstract

2012.4-2013.3

YU Ichimaru
A Study on Safety of Symmetric Cipher
Abstract
Tsuyoshi Sawada
A Study on Safety of hash function
Abstract
SHI, Xiaonan
A study on the relation between trace,definition field,embedding degree and class number
YANG, Cuinan
A Study on Efficient Scalar Multiplications for Elliptic Curve Cryptosystems
Abstract
Yoshio KAWAMO
A Study on Efficient Scalar Multiplications for Elliptic Curve Cryptosystems
Abstract
TRAN PHUONG VIET XUAN
On the Construction of Constant Ciphertext Length in Attribute Based Encryption
Abstract
RATEMO, Alice Harriet Mwango
On the Construction of Constant Ciphertext Length in Attribute Based Encryption
Abstract

2011.4-2012.3

Jiageng Chen
Cryptoanalysis of Stream Cipher
Abstract
Mohammad Shahriar Rahman
A Study on Privacy-preserving Technologies
Abstract
Kazuya Izawa
A Study on Efficient Data Agreegation in Wireless Sensor Networks
Abstract
Yiren Mo
A Study on Efficient Scalar Multiplication on Elliptic Curves 【Abstract】
Abstract

2010.4-2011.3

Tatsuro Iida
Proactive co-Operative Link Self-Healing for Wireless Sensor Networks
Abstract
Kazuho Kakiwaki
A Study on Safety of Symmetric Cipher
Abstract
Taiki Sasahara
A study on a fast method of scalar multiplication over elliptic curves
Abstract
Takashi Sato
Research on Group Key Agreement
Abstract

2009.4-2010.3

Keita Emura
A Research on Anonymous Attribute-based Cryptosystems
Abstract
Mitsuki Ajiro
Theoretical analysis of RC4 PRGA by Using Nonzero Bit Differences with pseudo colliding key pair
Abstract
Hisashige Ito
A Research on Key Management in Wireless Sensor Network
Abstract
Tetsuya Hatano
A study on Efficient Tree based Group Key Agreement
Abstract
Hiroyuki Yokogawa
A study on Elliptic Curve Scalar Multiplication
Abstract
Tomoyoshi NAGATA
Efficient Elliptic Curve Scalar Multiplication
Abstract

2008.4-2009.3

Shojiro HIRASAWA
Constructing Paring-Friendly Elliptic Curve with Embedding Degree k<20 td="">
Abstract
Masahiro SUKEGAWA
Statical Cryptanalysis against Symmetric-key Ciphers
Abstract
Mohammad Shahriar RAHMAN
An Efficient RFID Privacy Scheme
Abstract
Katsuhiko Yoshida
A Study on Efficient Broadcast Encryption Scheme
Abstract

2007.4-2008.3

Takeshi Suzuki
Constructing Elliptic Curve Suitable for Elliptic Curve Cryptography
Abstract
Yuta Imaya
Statical Cryptanalysis against Symmetric-key Ciphers
Abstract
Yasuharu Sugano
A Study on Security and Efficiency of Digital Signature
Abstract
Tomoyuki Karasawa
Research for Distributed Denial of Service Attacks
Abstract
Toshiaki Kamei
Efficient and Secure Elliptic Curve Scalar Multiplication
Abstract

2006.4-2007.3

Atsushi Waseda
A Study on Quantum Secret Sharing
Abstract
Takayuki Takagi
A Study on Quantum Secret Sharing
Abstract
Hideki Takemoto
A study about an anti-denial of service attack method
Abstract
Chen jiageng
Efficient ID-Based Signature Scheme
Abstract
Nao Nomura
A Study on Efficient Group Signature Scheme
Abstract
Wataru Hasegawa
A Study on Mobile Agent Security
Abstract
Kenji Mizosoe
Research on efficient Elliptic Curve Cryptosystems
Abstract
Takaomi Wada
Statical Cryptanalysis against Symmetric-key Ciphers
Abstract

2005.4-2006.3

Kozue Umeda
Privacy-Enhanced Group signature Scheme with CRL-based Revocation
Abstract
Takeaki Terada
Reserch for Denial of Service attacks
Abstract
Takeshi Kiyomiya
Reserch for Countermeasure of Side Channel Analysis on Elliptic Curve Cryptography
Abstract
Jun Jikeya
Research on Application of Digital Signatures
Abstract
Daiji Tanaka
Reserch for Group Signature suitable for Application
Abstract
Hikoichiro Nakamura
A Study on Broadcast Encryption Scheme
Abstract】
Taro Hattori
A Study on the Obfuscation Technique for Tamper-resistant to Dynamic Analysis
Abstract
Tomohiko Hinoue
A study on the security of symmetric key cipher
Abstract

2004.4-2005.3

Fumiaki Kanazawa
A Study on Broadcast Encryption Scheme
Abstract
Ken Sasaki
A Study on Quantum Secret Sharing
Abstract
Yuki Takano
A Study on Cryptanalysis against Symmetric Ciphers
Abstract
Hideyo Mamiya
Reserch for Optimaization of Hyperelliptic Curve Cryptography
Abstract
Masayuki Mori
A Study on Mobile Agent Security
Abstract

2003.4-2004.3

Takashi Matsunaka
A study on the security of a symmetric cipher
Abstract
Hiroaki Morimoto
A study on hyperelliptic curve cryptosystems
Abstract
Yuko Tamura
Study on Electronic Commerce with High Security
Abstract

2002.4-2003.3

Norihisa Isogai
A study on Cryptanalysis Regarding Block Ciphers
Abstract
Yuusuke Sakabe
A study on the Java Obfuscation
Abstract
Tooru Shiotsuki
A study on Electronic Auction
Abstract
Naoyuki Takahashi
A study on Hyperefficient Elliptic Curve Exponentiation
Abstract
Taro Hirai
A study on Constructing Elliptic Curves with arbitrary Embedding Degrees
Abstract
Sayaka Fukuda
A study on Security of Quantum Cryptography
Abstract

2001.4-2002.3

Kozue Umeda
Efficient Group Signature Scheme with Revocation
Abstract
Toshio Ogiso
A study on Tamper-Resistant Software
Abstract
Kei Kawauchi
A study on provably secure multi-signature schemes with signers' intentions
Abstract
Takeaki Terada
Visual Secret Sharing Scheme with Optional Access Structure at Efficient Number of Subpixels
Abstract
Masao Nonaka
A study on the Security of Block Chipers RC5 and RC6
Abstract
Hideyuki Miyake
A study on Efficient Elliptic Curve Exponentiation
Abstract
Atsushi Waseda
A study on Modeling of the Collusion Problem and its Evaluation
Abstract
Kazumasa Omote
A study on An Electronic Auction
Abstract
Takeshi Okamoto
Design and Analysis of Practical Digital Signature Scheme
Abstract
Yuko Tamura
A study on A Signature Scheme with a Guarantee
Abstract

2000.4-2001.3

Ayako Maeda
Unconditionally secure threshold scheme with verifiability and threshold changeability
Abstract
Norio Terauchi
How to construct more secure ciphers by the original cipher
Abstract
Yuko Tamura
Interactive Signature Scheme between Confirmer and Signer
Abstract
Yoshinori Takii
Improved Correlation Attack on RC5
Abstract
Ryo Otomura
The Digital Signature Schemes for Mobile Agents Delegated by Multiple Users
Abstract
Takeshi Okamoto
Studies for fast signature schemes
Abstract
Hiroshi Minato
Multi-signature Schemes with Singers' Intentions
Abstract
Shigeki Kitazawa
Study on Anonymous Communication with Agent Technology
Abstract

1999.4-2000.3

Masaki Inamura
Study on provision of flexible service over Mobile IP
Abstract
Atsushi Koide
Linkable Off-line Anonymous E-cash
Abstract
Syunzou Takano
Analysis for the security of elliptic curve cryptosystem
Abstract
Emi Tominaga
Algebraic examination for e-voting
Abstract
Satoru Nagano, Shigeki Kitazawa
Protecting Anonymity and Location Privacy with Cyclic Routes
Abstract
Shirou Mitomi
A multisignature with flexibility for message and order
Abstract
Tatsuya Yamada
Study on an effective renewal of public key cryptosystem modules
Abstract
Top