Titles of Bachelor, Master and Ph.D Thesis
Current Bachelor's, Master's, and Doctor's Theme
2023.4-2024.3
Po-Chu Hsu Scalable and Public Verifiable M+1st-Price Auction on Smart Contract |
Doctor | 【Abstract】 |
Hideaki Miyaji Secure and efficient post-quantum commitment scheme and its application |
Doctor | 【Abstract】 |
Kai Izumi Improved Key Recovery Attacks on the Stream Cipher ChaCha |
Master | 【Abstract】 |
Satoshi Uesugi The Extension of a Solution for Post-Quantum Secure Ring-LWE Problem |
Master | 【Abstract】 |
Yudai Tagawa Security Analysis of MP-LWE Problem |
Master | 【Abstract】 |
Seishiro Terada Security Analysis of Lattice-Based Cryptography using Ideal Lattices |
Master | 【Abstract】 |
Katsuya Nakashima The efficiency of lattice cryptanalysis by iterative LLL for lattice basis vectors |
Master | 【Abstract】 |
Yuta Maeno Lattice-based Accumulator with constant time list update and constant time verification |
Master | 【Abstract】 |
Shintaro Yamashita Proposal of Methods to Detect Backdoor Attacks Using Signature Embedding Techniques |
Master | 【Abstract】 |
Tatsuta Yamatsuki Data processing methods for high-performance Privacy-Preserving Machine Learning |
Master | 【Abstract】 |
He Bingchang Accuracy-Enhancement Techniques in Privacy-Preserving Machine Learning Models |
Master | 【Abstract】 |
Yurie Okada On Theoretical Analysis of Stream Cipher ChaCha |
Bachelor | 【Abstract】 |
Ryosuke Kido Fast and Secure Scalar Multiplication on Elliptic Curve GLS254 |
Bachelor | 【Abstract】 |
Akira Fujimoto Improved defense against backdoor attacks on machine learning |
Bachelor | 【Abstract】 |
Toshiyuki Mineta Efficient Key-Value Commitments with batch update and verification |
Bachelor | 【Abstract】 |
Ryoto Morizono Performance evaluation of post-quantum dijital signature schemes |
Bachelor | 【Abstract】 |
Tomoshi Yagishita On Privacy Mechanism to Discreat Data fit for Machine Learning |
Bachelor | 【Abstract】 |
Rintaro Yamada Consideration on Diffinition Field for Efficient Ring-LWE Problem |
Bachelor | 【Abstract】 |
2022.4-2023.3
Jin Yaoan |
Doctor | 【Abstract】 |
Hayato Arai Secure against side-channel attack and fast post-quantum crypto system CSIDH |
Master | 【Abstract】 |
Shingo Uehara Proposal of Forward-Secure Ring Signature Scheme with Claimability and Repudiation |
Master | 【Abstract】 |
Yuya Okubo A Proposal of defining fields for Efficient Ring-LWE Based Cryptography |
Master | 【Abstract】 |
Junpei Ozaki Proposal for operation verification framework and debugger for eBPF | Master | 【Abstract】 |
Fumiya Saitou Design and implementation of Trusted shell on TEE | Master | 【Abstract】 |
Tomoka Takahashi Vulnerability of Ring-LWE problem due to error bias | Master | 【Abstract】 |
Yoshitaka Nagao Privacy Preserving Threshold Data Integration Protocol | Master | 【Abstract】 |
Koki Matsubara Proposal for a hash function with keys that reduces the risk of secret key leakage | Master | 【Abstract】 |
Ryo Watanabe Improved differential linear analysis for the symmetric key cipher ChaCha | Master | 【Abstract】 |
Wang Yusen Dealer-less Threshold Signature Schemes based on Isogeny | Master | 【Abstract】 |
Li Jun Ru Security Analysis on Stream Cipher Salsa20 | Master | 【Abstract】 |
Gao Yue Security Anslysis of Scalar multiplication Algorithm on GLS254 | Master | 【Abstract】 |
Kenta Okada Privacy-Preserving Federated Learning via Homomorphic Encryption | Bachelor | 【Abstract】 |
Hajime Kawada Attacks on Module-LWE problem by using χ2 test | Bachelor | 【Abstract】 |
Naoki Kawahara Proposal for a privacy-preserving frequency estimation method | Bachelor | 【Abstract】 |
Katsuhiro Satou Proof of Security in pqe-based cryptosystems | Bachelor | 【Abstract】 |
Kosuke Tamura Safety Analysis for Post-quantum Module-LWE Problem on Subfield in Cyclotomic Field | Bachelor | 【Abstract】 |
Atsuki Nagai Improvement of the linear approximation of the stream cipher ChaCha and its application to differential-linear analysis | Bachelor | 【Abstract】 |
Ryunosuke Higashi On a Threshold Ring Signature Scheme for Generating Efficiently Sized Signatures | Bachelor | 【Abstract】 |
Sosuke Funatsu Expanding Underlying Number Fields Reducing from Module-LWE to Ring-LWE | Bachelor | 【Abstract】 |
Paul Kunal Digital Watermarks in Text-to-Image Generation Models | Bachelor | 【Abstract】 |
2021.4-2022.3
tomoaki Mimoto A study on Utility-aware Privacy-preseving Techniques |
Doctor | |
Hector Bjoljahn Hougaard Study on post-quantum group key exchanges and generalization |
Doctor | |
Takuya Inomoto Threshold Signature Scheme Suitable for a Short Message |
Master | 【Abstract】 |
Kohei Hosoya Implementation and Verification of Network Functions in Rust | Master | 【Abstract】 |
Liu Xiaolong Design and Implementation of Session Types-based Socket Communication Protocols |
Master | 【Abstract】 |
Kai Izumi Analysis of the Stream Cipher ChaCha Using Higher Order Differentials |
Bachelor | 【Abstract】 |
Satoshi Uesugi On Safety Analysis for the Post-quantum Ring-LWE Problem on Subfield in Cyclotomic Field |
Bachelor | 【Abstract】 |
Tetsuhiro Kawaguchi Development of Validation / Synthesis System for Stack Snwinding Information on AArch64 |
Bachelor | 【Abstract】 |
Yuta Maeno Research on quantum-safe accumulator with efficient update function |
Bachelor | 【Abstract】 |
Shintaro Yamashita Research on efficient signature generation |
Bachelor | 【Abstract】 |
Tatsuta Yamatsuki Proposal for Scalable Local Differential Privacy |
Bachelor | 【Abstract】 |
2020.4-2021.3
Yasuhisa Okumura Crypto Analysis for The Post-quantum Ring-LWE Problem |
Master | 【Abstract】 |
Motoki Takenaka A Study of Deceptive Defense System |
Master | 【Abstract】 |
Shotaro Miyashita Analysis of Salsa20 and ChaCha |
Master | 【Abstract】 |
Akifumi Muroi Experimental Analysis for Decision Ring-LWE Problem with Sublattice Attack |
Master | |
Sai Veerya Mahadevan PRSafe: Primitive Recursive Function based Domain Specific Language using LLVM |
Master | 【Abstract】 |
Wang Zhaobo Fast Multiparty Threshold ECDSA With Robustness |
Master | 【Abstract】 |
Hayato Arai Security analysis for the post-quantum cryptography CSIDH |
Bachelor | 【Abstract】 |
Yuya Okubo searching for fields in Ring-LWE |
Bachelor | 【Abstract】 |
Junpei Ozaki A Test Flamework of Dynamic Memory Allocator for Rust |
Bachelor | 【Abstract】 |
Fumiya Saito Design and Implementation of Software Switch using Formal Methods |
Bachelor | 【Abstract】 |
Tomoteru Nakamura An Improvement of Linear Algebraic Attack on Post-Quantum Cryptosystem Giophantus+ |
Bachelor | 【Abstract】 |
Yoshitaka Nagao Privacy Preserving Data Integration Protocol |
Bachelor | 【Abstract】 |
Koki Matsubara Proposal for a Hash Function with Revocation for Blockchain |
Bachelor | 【Abstract】 |
Ryo Watanabe Study on a New Linear Bias in the Stream Cipher Salsa20 |
Bachelor | 【Abstract】 |
Hajime Kawata Research on GUI of Private Set Intersection |
Bachelor |
2019.4-2020.3
Ryoma Ito A Study on Statistical Cryptanalysis of Stream Ciphers |
Doctor | 【Abstract】 |
Yuki Sugitani Proposal of safe second-price auction using smart contract |
Master | 【Abstract】 |
Hideaki Miyaji Commitment method with low output locality |
Master | 【Abstract】 |
Tomoya Nishiguchi Design and implementation of database access control system using session type |
Master | 【Abstract】 |
Yaoan Jin Safe and fast elliptic curve scalar multiplication/td> | Master | 【Abstract】 |
Motoi Hayashi Realization method of privacy policy in electronic service and its application/td> | Master | 【Abstract】 |
Yusuke Matsuoka Security analysis of stream cipher Salsa20/ChaCha20 |
Master | 【Abstract】 |
Ou Chenyu 4-High-speed implementation of Curve25519 by parallelization |
Master | 【Abstract】 |
Kohei Hosoya Design and implementation of verifiable network functions |
Bachelor | 【Abstract】 |
Daiki Oka Lisp-based extensions to ZoKrates domain-specific languages and Variant type suggestions |
Bachelor | 【Abstract】 |
Takuya Inomoto Improvement of threshold signature with anonymity |
Bachelor | 【Abstract】 |
Tomoya Ikeda Improvement of fast and constant time inverse element calculation method |
Bachelor | 【Abstract】 |
Takaaki Ishimura Study on extension of Ring-LWE definition |
Bachelor | 【Abstract】 |
2018.4-2019.3
Ki GIE Secure Comparisonl based on Quasi-Cyclic Code |
Master | 【Abstract】 |
Hideto NAKANO An Experimental Analysis using plural Ideals against Decision Ring-LWE over Decomposition Fields |
Master | 【Abstract】 |
Yohei MAEZAWA An algebraic attack against LRPC code-based cryptography |
Master | 【Abstract】 |
Motoki TAKENAKA A Framework for Building Deception Networks |
Bachelor | 【Abstract】 |
Akihumi MUROI A Distinguish Attack Evaluating at t = 1 for Indeterminate Equation Scheme based on IE-LWE |
Bachelor | 【Abstract】 |
Kotaro YAMAGUCHI Proposal of Online Pachinko using smart contract |
Bachelor | 【Abstract】 |
2017.4-2018.3
Karin SUMONGKAYOTHIN Improving bandwidth cost of Oblivious Random Access Machine by using matrix based storage structure |
Doctor | 【Abstract】 |
Rashed MAZUMDER Study on Secure Message Encryption and Authentication |
Doctor | 【Abstract】 |
Shunsuke OTSUKA HIBE based on Universal Sampler |
Master | 【Abstract】 |
Katsunari SHISHIDO Efficient and quasi-Accurate Private Multiset Union |
Master | 【Abstract】 |
Kenta KODERA Complexity analysis of solving elliptic curve discrete logarithm problem |
Master | 【Abstract】 |
Yuki SUGITANI Modeling Worm Propagation using Dynamic Patching |
Bachelor | 【Abstract】 |
Shota TERADA On the Security of Ring-LWE with Homomorphic Encryption |
Bachelor | 【Abstract】 |
Tomoya NISHIGUCHI solving polynomial system with set algorithm |
Bachelor | 【Abstract】 |
Taichi NISHINO The spread and the containment of virus in random network model |
Bachelor | 【Abstract】 |
Motoki HAYASHI Improvement of Multi-party Private Set Intersection |
Bachelor | 【Abstract】 |
Yusuke MATSUOKA Safety evaluation of stream cipher, Salsa20/ChaCha20 by redesign of diffusion |
Bachelor | 【Abstract】 |
2016.4-2017.3
Hiroshi Nomaguchi On Secure Pseudo-Random Number Generator for IoT devices |
Master | 【Abstract】 |
Takatoshi Yoshida On Privacy-preserving Statistic Computation for Multiple Database |
Master | 【Abstract】 |
STEWART, Gavin Lynn Study on obfuscation of symmetric key cipher |
Master | 【Abstract】 |
Tatsuhiko Kono secure and efficient elliptic curve cryptography for side channel attack |
Bachelor | 【Abstract】 |
Kenta Kodera Security evaluation of elliptic curve cryptosystems with special addition formula |
Bachelor | 【Abstract】 |
Satoru Takano Anonymous Oblivious RAM for Multi-user Environment |
Bachelor | 【Abstract】 |
Ryohei Morishima Security evaluation of elliptic curve cryptosystems with special addition formula (2) |
Bachelor | 【Abstract】 |
2015.4-2016.3
SUMONGKAYOTHIN Karin The Oblivious Random Access Memory (ORAM) |
【Abstract】 |
MAZUMDER Rashed Provable Security of Cryptographic Hash |
【Abstract】 |
Sumiyo Ishige A Study on Network Coding |
【Abstract】 |
Keisuke Kito Optimization of Elliptic Curve Cryptography for Embedded Systems |
【Abstract】 |
Daiki Michihiro A Study on Symmetric Cipher |
【Abstract】 |
Takatoshi Yoshida Research on Private Set Intersection Protocol |
【Abstract】 |
2014.4-2015.3
Hiroyuki Sato Studies on the safety of the pseudo-random number |
【Abstract】 |
Ryota Takahashi A study on Efficient Elliptic Curve Scalar Multiplication |
【Abstract】 |
Takaya Asano A study on network coding for detecting pollution attack |
【Abstract】 |
MAZUMDER Rashed A Study of Cryptographic Hash Function |
【Abstract】 |
Mohammad S.I. MAMUN Studies on cryptographic solutions to secure applications |
【Abstract】 |
2013.4-2014.3
Tomoaki Mimoto A Study on Multi-Party Private Set Intersection Protocol |
【Abstract】 |
2012.4-2013.3
YU Ichimaru A Study on Safety of Symmetric Cipher |
【Abstract】 |
Tsuyoshi Sawada A Study on Safety of hash function |
【Abstract】 |
SHI, Xiaonan A study on the relation between trace,definition field,embedding degree and class number |
|
YANG, Cuinan A Study on Efficient Scalar Multiplications for Elliptic Curve Cryptosystems |
【Abstract】 |
Yoshio KAWAMO A Study on Efficient Scalar Multiplications for Elliptic Curve Cryptosystems |
【Abstract】 |
TRAN PHUONG VIET XUAN On the Construction of Constant Ciphertext Length in Attribute Based Encryption |
【Abstract】 |
RATEMO, Alice Harriet Mwango On the Construction of Constant Ciphertext Length in Attribute Based Encryption |
【Abstract】 |
2011.4-2012.3
Jiageng Chen Cryptoanalysis of Stream Cipher |
【Abstract】 |
Mohammad Shahriar Rahman A Study on Privacy-preserving Technologies |
【Abstract】 |
Kazuya Izawa A Study on Efficient Data Agreegation in Wireless Sensor Networks |
【Abstract】 |
Yiren Mo A Study on Efficient Scalar Multiplication on Elliptic Curves 【Abstract】 |
【Abstract】 |
2010.4-2011.3
Tatsuro Iida Proactive co-Operative Link Self-Healing for Wireless Sensor Networks |
【Abstract】 |
Kazuho Kakiwaki A Study on Safety of Symmetric Cipher |
【Abstract】 |
Taiki Sasahara A study on a fast method of scalar multiplication over elliptic curves |
【Abstract】 |
Takashi Sato Research on Group Key Agreement |
【Abstract】 |
2009.4-2010.3
Keita Emura A Research on Anonymous Attribute-based Cryptosystems |
【Abstract】 |
Mitsuki Ajiro Theoretical analysis of RC4 PRGA by Using Nonzero Bit Differences with pseudo colliding key pair |
【Abstract】 |
Hisashige Ito A Research on Key Management in Wireless Sensor Network |
【Abstract】 |
Tetsuya Hatano A study on Efficient Tree based Group Key Agreement |
【Abstract】 |
Hiroyuki Yokogawa A study on Elliptic Curve Scalar Multiplication |
【Abstract】 |
Tomoyoshi NAGATA Efficient Elliptic Curve Scalar Multiplication |
【Abstract】 |
2008.4-2009.3
Shojiro HIRASAWA Constructing Paring-Friendly Elliptic Curve with Embedding Degree k<20 td=""> |
【Abstract】 |
Masahiro SUKEGAWA Statical Cryptanalysis against Symmetric-key Ciphers |
【Abstract】 |
Mohammad Shahriar RAHMAN An Efficient RFID Privacy Scheme |
【Abstract】 |
Katsuhiko Yoshida A Study on Efficient Broadcast Encryption Scheme |
【Abstract】 |
2007.4-2008.3
Takeshi Suzuki Constructing Elliptic Curve Suitable for Elliptic Curve Cryptography |
【Abstract】 |
Yuta Imaya Statical Cryptanalysis against Symmetric-key Ciphers |
【Abstract】 |
Yasuharu Sugano A Study on Security and Efficiency of Digital Signature |
【Abstract】 |
Tomoyuki Karasawa Research for Distributed Denial of Service Attacks |
【Abstract】 |
Toshiaki Kamei Efficient and Secure Elliptic Curve Scalar Multiplication |
【Abstract】 |
2006.4-2007.3
Atsushi Waseda A Study on Quantum Secret Sharing |
【Abstract】 |
Takayuki Takagi A Study on Quantum Secret Sharing |
【Abstract】 |
Hideki Takemoto A study about an anti-denial of service attack method |
【Abstract】 |
Chen jiageng Efficient ID-Based Signature Scheme |
【Abstract】 |
Nao Nomura A Study on Efficient Group Signature Scheme |
【Abstract】 |
Wataru Hasegawa A Study on Mobile Agent Security |
【Abstract】 |
Kenji Mizosoe Research on efficient Elliptic Curve Cryptosystems |
【Abstract】 |
Takaomi Wada Statical Cryptanalysis against Symmetric-key Ciphers |
【Abstract】 |
2005.4-2006.3
Kozue Umeda Privacy-Enhanced Group signature Scheme with CRL-based Revocation |
【Abstract】 |
Takeaki Terada Reserch for Denial of Service attacks |
【Abstract】 |
Takeshi Kiyomiya Reserch for Countermeasure of Side Channel Analysis on Elliptic Curve Cryptography |
【Abstract】 |
Jun Jikeya Research on Application of Digital Signatures |
【Abstract】 |
Daiji Tanaka Reserch for Group Signature suitable for Application |
【Abstract】 |
Hikoichiro Nakamura A Study on Broadcast Encryption Scheme |
【Abstract】 |
Taro Hattori A Study on the Obfuscation Technique for Tamper-resistant to Dynamic Analysis |
【Abstract】 |
Tomohiko Hinoue A study on the security of symmetric key cipher |
【Abstract】 |
2004.4-2005.3
Fumiaki Kanazawa A Study on Broadcast Encryption Scheme |
【Abstract】 |
Ken Sasaki A Study on Quantum Secret Sharing |
【Abstract】 |
Yuki Takano A Study on Cryptanalysis against Symmetric Ciphers |
【Abstract】 |
Hideyo Mamiya Reserch for Optimaization of Hyperelliptic Curve Cryptography |
【Abstract】 |
Masayuki Mori A Study on Mobile Agent Security |
【Abstract】 |
2003.4-2004.3
Takashi Matsunaka A study on the security of a symmetric cipher |
【Abstract】 |
Hiroaki Morimoto A study on hyperelliptic curve cryptosystems |
【Abstract】 |
Yuko Tamura Study on Electronic Commerce with High Security |
【Abstract】 |
2002.4-2003.3
Norihisa Isogai A study on Cryptanalysis Regarding Block Ciphers |
【Abstract】 |
Yuusuke Sakabe A study on the Java Obfuscation |
【Abstract】 |
Tooru Shiotsuki A study on Electronic Auction |
【Abstract】 |
Naoyuki Takahashi A study on Hyperefficient Elliptic Curve Exponentiation |
【Abstract】 |
Taro Hirai A study on Constructing Elliptic Curves with arbitrary Embedding Degrees |
【Abstract】 |
Sayaka Fukuda A study on Security of Quantum Cryptography |
【Abstract】 |
2001.4-2002.3
Kozue Umeda Efficient Group Signature Scheme with Revocation |
【Abstract】 |
Toshio Ogiso A study on Tamper-Resistant Software |
【Abstract】 |
Kei Kawauchi A study on provably secure multi-signature schemes with signers' intentions |
【Abstract】 |
Takeaki Terada Visual Secret Sharing Scheme with Optional Access Structure at Efficient Number of Subpixels |
【Abstract】 |
Masao Nonaka A study on the Security of Block Chipers RC5 and RC6 |
【Abstract】 |
Hideyuki Miyake A study on Efficient Elliptic Curve Exponentiation |
【Abstract】 |
Atsushi Waseda A study on Modeling of the Collusion Problem and its Evaluation |
【Abstract】 |
Kazumasa Omote A study on An Electronic Auction |
【Abstract】 |
Takeshi Okamoto Design and Analysis of Practical Digital Signature Scheme |
【Abstract】 |
Yuko Tamura A study on A Signature Scheme with a Guarantee |
【Abstract】 |
2000.4-2001.3
Ayako Maeda Unconditionally secure threshold scheme with verifiability and threshold changeability |
【Abstract】 |
Norio Terauchi How to construct more secure ciphers by the original cipher |
【Abstract】 |
Yuko Tamura Interactive Signature Scheme between Confirmer and Signer |
【Abstract】 |
Yoshinori Takii Improved Correlation Attack on RC5 |
【Abstract】 |
Ryo Otomura The Digital Signature Schemes for Mobile Agents Delegated by Multiple Users |
【Abstract】 |
Takeshi Okamoto Studies for fast signature schemes |
【Abstract】 |
Hiroshi Minato Multi-signature Schemes with Singers' Intentions |
【Abstract】 |
Shigeki Kitazawa Study on Anonymous Communication with Agent Technology |
【Abstract】 |
1999.4-2000.3
Masaki Inamura Study on provision of flexible service over Mobile IP |
【Abstract】 |
Atsushi Koide Linkable Off-line Anonymous E-cash |
【Abstract】 |
Syunzou Takano Analysis for the security of elliptic curve cryptosystem |
【Abstract】 |
Emi Tominaga Algebraic examination for e-voting |
【Abstract】 |
Satoru Nagano, Shigeki Kitazawa Protecting Anonymity and Location Privacy with Cyclic Routes |
【Abstract】 |
Shirou Mitomi A multisignature with flexibility for message and order |
【Abstract】 |
Tatsuya Yamada Study on an effective renewal of public key cryptosystem modules |
【Abstract】 |