Graduate Students List
Mar. 2023
Doctor Course
Hideaki Miyaji | Secure and efficient post-quantum commitment scheme and its application |
---|---|
Po-Chu Hsu | Scalable and Public Verifiable M+1st-Price Auction on Smart Contract |
Master Course
Kai Izumi | Improved Key Recovery Attacks on the Stream Cipher ChaCha |
---|---|
Satoshi Uesugi | The Extension of a Solution for Post-Quantum Secure Ring-LWE Problem |
Yudai Tagawa | Security Analysis of MP-LWE Problem |
Seishiro Terada | Security Analysis of Lattice-Based Cryptography using Ideal Lattices |
Katsuya Nakashima | The efficiency of lattice cryptanalysis by iterative LLL for lattice basis vectors |
Yuta Maeno | Lattice-based Accumulator with constant time list update and constant time verification |
Shintaro Yamashita | Proposal of Methods to Detect Backdoor Attacks Using Signature Embedding Techniques |
Tatsuta Yamatsuki | Data processing methods for high-performance Privacy-Preserving Machine Learning |
Bachelor Course
Yurie Okada | On Theoretical Analysis of Stream Cipher ChaCha |
---|---|
Ryosuke Kido | Fast and Secure Scalar Multiplication on Elliptic Curve GLS254 |
Akira Fujimoto | Improved defense against backdoor attacks on machine learning |
Toshiyuki Mineta | Efficient Key-Value Commitments with batch update and verification |
Ryoto Morizono | Performance evaluation of post-quantum dijital signature schemes |
Tomoshi Yagishita | On Privacy Mechanism to Discreat Data fit for Machine Learning |
Rintaro Yamada | Consideration on Diffinition Field for Efficient Ring-LWE Problem |
Mar. 2022
Doctor Course
Jin Yaoan |
---|
Master Course
Hayato Arai | Secure against side-channel attack and fast post-quantum crypto system CSIDH |
---|---|
Shingo Uehara | Proposal of Forward-Secure Ring Signature Scheme with Claimability and Repudiation |
Yuya Okubo | A Proposal of defining fields for Efficient Ring-LWE Based Cryptography |
Junpei Ozaki | Proposal for operation verification framework and debugger for eBPF |
Fumiya Saito | Design and implementation of Trusted shell on TEE |
Tomoka Takahashi | Vulnerability of Ring-LWE problem due to error bias |
Yoshitaka Nagao | Privacy Preserving Threshold Data Integration Protocol |
Koki Matsubara | Proposal for a hash function with keys that reduces the risk of secret key leakage |
Ryo Watanabe | Improved differential linear analysis for the symmetric key cipher ChaCha |
Wang Yusen | Dealer-less Threshold Signature Schemes based on Isogeny |
Li Jun Ru | Security Analysis on Stream Cipher Salsa20 |
Gao Yue | Security Anslysis of Scalar multiplication Algorithm on GLS254 |
Bachelor Course
Kenta Okada | Privacy-Preserving Federated Learning via Homomorphic Encryption |
---|---|
Hajime Kawada | Attacks on Module-LWE problem by using χ2 test |
Naoki Kawahara | Proposal for a privacy-preserving frequency estimation method |
Katsuhiro Sato | Proof of Security in pqe-based cryptosystems |
Kosuke Tamura | Safety Analysis for Post-quantum Module-LWE Problem on Subfield in Cyclotomic Field |
Atsuki Nagai | Improvement of the linear approximation of the stream cipher ChaCha and its application to differential-linear analysis |
Ryunosuke Higashi | On a Threshold Ring Signature Scheme for Generating Efficiently Sized Signatures |
Sosuke Funatsu | Expanding Underlying Number Fields Reducing from Module-LWE to Ring-LWE |
Paul Kunal | Digital Watermarks in Text-to-Image Generation Models |
Mar. 2021
Doctor Course
Hector Bjoljahn Hougaard | Study on post-quantum group key exchanges and generalization |
---|---|
Tomoaki Mimoto | A study on Utility-aware Privacy-preseving Techniques |
Kenta Kodera(Earn credits) |
Master Course
Kohei Hosoya | Implementation and Verification of Network Functions in Rust |
---|---|
Takuya Inomoto | Threshold Signature Scheme Suitable for a Short Message |
Liu Xiaolong | Design and Implementation of Session Types-based Socket Communication Protocols |
Bachelor Course
Kai Izumi | Analysis of the Stream Cipher ChaCha Using Higher Order Differentials |
---|---|
Satoshi Uesugi | On Safety Analysis for the Post-quantum Ring-LWE Problem on Subfield in Cyclotomic Field |
Tetsuhiro Kawaguchi | Development of Validation / Synthesis System for Stack Snwinding Information on AArch64 |
Yuta Maeno | Research on quantum-safe accumulator with efficient update function |
Shintaro Yamashita | Research on efficient signature generation |
Tatuta Yamatsuki | Proposal for Scalable Local Differential Privacy |
Mar. 2020
Master Course
Motoki Takenaka | A Study of Deceptive Defense System |
---|---|
Akifumi Muroi | Experimental Analysis for Decision Ring-LWE Problem with Sublattice Attack |
Yasuhisa Okumura | Crypto Analysis for The Post-quantum Ring-LWE Problem |
Shotaro Miyashita | Analysis of Salsa20 and ChaCha |
Wang Zhaobo | Fast Multiparty Threshold ECDSA With Robustness |
Bachelor Course
Hayato Arai | Security analysis for the post-quantum cryptography CSIDH |
---|---|
Yuya Okubo | searching for fields in Ring-LWE |
Fumiya Saito | Design and Implementation of Software Switch using Formal Methods |
Koki Matsubara | Proposal for a Hash Function with Revocation for Blockchain |
Ryo Watanabe | Study on a New Linear Bias in the Stream Cipher Salsa20 |
Junpei Ozaki | A Test Flamework of Dynamic Memory Allocator for Rust |
Mar. 2019
Doctor Course
Ryoma Ito | A Study on Statistical Cryptanalysis of Stream Ciphers |
---|
Master Course
Hideto Nakano | An Experimental Analysis using plural Ideals against Decision Ring-LWE over Decomposition Fields |
---|---|
Ki Gie | Secure Comparisonl based on Quasi-Cyclic Code |
Yohei Maezawa | An algebraic attack against LRPC code-based cryptography |
Bachelor Course
Motoki Takenaka | A Framework for Building Deception Networks |
---|---|
Akifumi Muroi | A Distinguish Attack Evaluating at t = 1 for Indeterminate Equation Scheme based on IE-LWE |
Kotaro Yamaguchi | Proposal of Online Pachinko using smart contract |
Mar. 2018
Doctor Course
Karin SUMONGKAYOTHIN | Improving bandwidth cost of Oblivious Random Access Machine by using matrix based storage structure |
---|---|
Rashed MAZUMDER | Study on Secure Message Encryption and Authentication |
Master Course
Shunsuke OTSUKA | HIBE based on Universal Sampler |
---|---|
Katsunari SHISHIDO | Efficient and quasi-Accurate Private Multiset Union |
Kenta KODERA | Complexity analysis of solving elliptic curve discrete logarithm problem |
Bachelor Course
Motoi Hayashi | Improvement of Multi-party Private Set Intersection |
---|---|
Yuki Sugitani | Modeling Worm Propagation using Dynamic Patching |
Tomoya Nishiguchi | solving polynomial system with set algorithm |
Yusuke Matsuoka | Safety evaluation of stream cipher, Salsa20/ChaCha20 by redesign of diffusion |
Sep. 2017
Doctor Course
KarinSUMONGKAYOTHIN | Improving bandwidth cost of Oblivious Random Access Machine by using matrix based storage structure |
---|---|
Rashed MAZUMDER | Study on Secure Message Encryption and Authentication |
Mar. 2017
Master Course
Hiroshi Nomaguchi | On Secure Pseudo-Random Number Generator for IoT devices |
---|---|
Gavin Lynn STEWART | Study on obfuscation of symmetric key cipher |
Takatoshi Yoshida | On Privacy-preserving Statistic Computation for Multiple Database |
Bachelor
Takano Satoru | Anonymous Oblivious RAM for Multi-user Environment |
---|---|
Tatsuhiko Kono | secure and efficient elliptic curve cryptography for side channel attack |
Kenta Kodera | Security evaluation of elliptic curve cryptosystems with special addition formula |
Ryohei Morishima | Security evaluation of elliptic curve cryptosystems with special addition formula (2) |
Mar. 2016
Master Course
Keisuke Kito | |
---|---|
Daiki Michihiro | Security Evaluation of Stream Cipher RC4 |
Sumiyo Ishige | A Study of Secure Network Coding |
Mar. 2015
Master Course
Ryoma Ito | Theoretical analysis of stream cipher RC4 |
---|---|
Satoshi Kamekawa | A study on vulnerability and countermeasure of SSL/TLS |
Hiroyuki Sato | A Study on the safety of pseudo-random number |
Ryota Takahashi | A study on Efficient Elliptic Curve Scalar Multiplication |
Shohei Nishida | A Study on Efficient Multi-Party Private Set Intersection Protocol |
Rashed MAZUMDER | A Study of Cryptographic Hash Function |
Takaya Asano | A study on network coding for detecting pollution attack |
Doctor Course
Mohammad S.I. MAMUN | Studies on cryptographic solutions to secure applications |
---|
Mar. 2014
Master Course
Tomoaki Mimoto | "A Study on Efficient Multi-Party Private Set Intersection Protocol" |
---|
Mar. 2013
Master Course
Yu Ichimaru | "A Study on Safety of Symmetric Cipher" |
---|---|
Tsuyoshi Sawada | "A Study on Safety of hash function" |
SHI, Xiaonan | "A Study on the relation between trace, definition field, embedding degree and class number" |
YANG, Cuinan | "A Study on Efficient Scalar Multiplications for Elliptic Curve Cryptosystems" |
Yoshio KAWAMO | "A Study on Efficient Scalar Multiplications for Elliptic Curve Cryptosystems" |
TRAN PHUONG VIET XUAN | "On the Construction of Constant Ciphertext Length in Attribute Based Encryption" |
RATEMO, Alice Harriet Mwango | "SECURE DYNAMIC HOURGLASS PROTOCOL WITH APPLICATIONS TO STORAGE DATA" |
Doctor Course
Jiageng CHEN | "Cryptoanalysis of Stream Cipher" |
---|---|
Mohammad S. RAHMAN | "A Study on Privacy-preserving Technologies" |
Mar. 2012
Master Course
Kazuya Izawa | "Efficient Data aggregation for Wireless Sensor Networks" |
---|---|
Yiren MO | "A Study on Privacy-preserving Technologies" |
Doctor Course
Jiageng CHEN | "Cryptoanalysis of Stream Cipher" |
---|---|
Mohammad S. RAHMAN | "A Study on Privacy-preserving Technologies" |
Mar. 2011
Master Course
Tatsuro Iida | "Proactive co-Operative Link Self-Healing for Wireless Sensor Networks" |
---|---|
Kazuho Kakiwaki | "A Study on Safety of Symmetric Cipher" |
Taiki Sasahara | "A study on a fast method of scalar multiplication over elliptic curves" |
Takashi Sato | "Research on Group Key Agreement" |
Tomoyoshi Nagata | "A Study on Efficient Implementation of Elliptic Curve Cryptosystem" |
Mar. 2010
Master Course
Mitsuki Ajiro | "Theoretical analysis of RC4 PRGA by Using Nonzero Bit Differences with pseudo colliding key pair" |
---|---|
Hisashige Ito | "A Research on Key Management in Wireless Sensor Network" |
Tetsuya Hatano | "A study on Efficient Tree based Group Key Agreement" |
Hiroyuki Yokogawa | "A study on Elliptic Curve Scalar Multiplication" |
Doctor Course
Keita Emura | "A Research on Anonymous Attribute-based Cryptosystems" |
---|
Mar. 2009
Master Course
Shoujiro hirasawa | "Constructing Paring-Friendly Elliptic Curve with Embedding Degree k<20" |
---|---|
Masahiro sukegawa | "Statical Cryptanalysis against Symmetric-key Ciphers" |
Mohammad Shahriar RAHMAN | "An Efficient RFID Privacy Scheme" |
Katsuhiko Yoshida | "On a Tree-Based Group Key Management" |
Mar. 2008
Master Course
Takeshi Suzuki | "Constructing Elliptic Curve Suitable for Elliptic Curve Cryptography " |
---|---|
Imaya Yuta | "Statical Cryptanalysis against Symmetric-key Ciphers" |
Yasuharu Sugano | "A Study on Security and Efficiency of Digital Signature" |
Tomoyuki Karasawa | "Research for Distributed Denial of Service Attacks" |
Toshiaki Kamei | "Efficient and Secure Elliptic Curve Scalar Multiplication" |
Mar. 2007
Master Course
Takayuki Takagi | "A Study on Quantum Secret Sharing" |
---|---|
Hideki Takemoto | "A study about an anti-denial of service attack method" |
Chen jiageng | "Efficient ID-Based Signature Scheme" |
Nao Nomura | "A Study on Efficient Group Signature Scheme" |
Wataru Hasegawa | "A Study on Mobile Agent Security" |
Kenji Mizosoe | "Research on efficient Elliptic Curve Cryptosystems" |
Takaomi Wada | "Statical Cryptanalysis against Symmetric-key Ciphers" |
Doctor Course
Atsushi Waseda | "A Study on Quantum Secret Sharing" |
---|
Mar. 2006
Master Course
Takeshi Kiyomiya | "Reserch for Countermeasure of Side Channel Analysis on Elliptic Curve Cryptography" |
---|---|
Jun Jikeya | "Research on Application of Digital Signatures" |
Daiji Tanaka | "Reserch for Group Signature suitable for Application" |
Hikoichiro Nakamura | "A Study on Broadcast Encryption Schemey" |
Taro Hattori | "A Study on the Obfuscation Technique for Tamper-resistant to Dynamic Analysis" |
Tomohiko Hinoue | "A study on the security of symmetric key cipher" |
Doctor Course
Takeaki Terada | "Reserch for Denial of Service attacks" |
---|
Sep. 2006
Doctor Course
Kozue Umeda | "Privacy-Enhanced Group signature Scheme with CRL-based Revocation" |
---|
Mar. 2005
Master Course
Fumiaki Kanazawa | "A Study on Broadcast Encryption Scheme" |
---|---|
Ken Sasaki | "A Study on Quantum Secret Sharing" |
Yuki Takano | "A Study on Cryptanalysis against Symmetric Ciphers" |
Hideyo Mamiya | "Reserch for Optimaization of Hyperelliptic Curve Cryptography" |
Masayuki Mori | "A Study on Mobile Agent Security " |
Mar. 2004
Master Course
Takashi Matsunaka | "A study on the security of a symmetric cipher" |
---|---|
Hiroaki Morimoto | "Study on Electronic Commerce with High Security" |
Doctor Course
Yuko Tamura | "Design and Analysis of Practical Digital Signature Scheme" |
---|
Mar. 2003
Master Course
Norihisa Isogai | "A study on Cryptanalysis Regarding Block Ciphers" |
---|---|
Yuusuke Sakabe | "A study on the Java Obfuscation" |
Tooru Shiotsuki | "A study on Electronic Auction" |
Naoyuki Takahashi | "A study on Hyperefficient Elliptic Curve Exponentiation" |
Taro Hirai | "A study on Constructing Elliptic Curves with arbitrary Embedding Degrees" |
Sayaka Fukuda | "A study on Security of Quantum Cryptography" |
Mar. 2002
Master Course
Kozue Umeda | "Efficient Gropu Signature Scheme with Revocation" |
---|---|
Toshio Ogiso | "A study on Tamper-Resistant Software" |
Kei Kawauchi | "A study on provably secure multi-signature schemes with signers' intentions" |
Takeaki Terada | "Visual Secret Sharing Scheme with Optional Access Structure at Efficient Number of Subpixels" |
Masao Nonaka | "A study on the Security of Block Chipers RC5 and RC6" |
Hideyuki Miyake | "A study on Efficient Elliptic Curve Exponentiation" |
Atsushi Waseda | "A study on Modeling of the Collusion Problem and its Evaluation" |
Doctor Course
Takeshi Okamoto | "Design and Analysis of Practical Digital Signature Scheme" |
---|---|
Kazumasa Omote | "A study on An Electronic Auction" |
Mar. 2001
Master Course
Ryo Otomura | "The Digital Signature Schemes for Mobile Agents Delegated by Multiple Users" |
---|---|
Yoshinori Takii | "Improved Correlation Attack on RC5" |
Norio Terauchi | "How to construct more secure ciphers by the original cipher" |
Ayako Maeda | "Unconditionally secure threshold scheme with verifiability and threshold changeability" |
Hiroshi Minato | "Multi-signature Schemes with Singers' Intentions" |
Doctor Course
Shigeki Kitazawa | "Study on Anonymous Communication with Agent Technology" |
---|
Mar. 2000
Master Course
Masaki Inamura | "Study on provision of flexible service over Mobile IP" |
---|---|
Atsushi Koide | "Linkable Off-line Anonymous E-cash" |
Syunzou Takano | "Analysis for the security of elliptic curve cryptosystem" |
Emi Tominaga | "Algebraic examination for e-voting " |
Satoru Nagano | "Protecting Anonymity and Location Privacy with Cyclic Routes" |
Shirou Mitomi | "A multisignature with flexibility for message and order" |
Tatsuya Yamada | "Study on an effective renewal of public key cryptosystem modules" |