Updated on 2025/07/19

写真a

 
KODERA Yuuta
 
Organization
Faculty of Environmental, Life, Natural Science and Technology Associate Professor
Position
Associate Professor
External link

Degree

  • Ph. D. in Engineering ( 2020.3   Okayama University )

  • Ph. D. ( 2020.3   Okayama University )

  • Master (Engineering) ( 2018.3   Okayama University )

  • Master of Engineering ( 2018.3   Okayama University )

  • Bachelor (Engineering) ( 2017.3   Okayama University )

  • Bachelor of Engineering ( 2017.3   Okayama University )

▼display all

Research Areas

  • Informatics / Information security

Education

  • Okayama University   大学院自然科学研究科博士後期課程  

    2018.4 - 2020.3

      More details

    Country: Japan

    researchmap

  • Okayama University   大学院自然科学研究科博士前期課程  

    2017.4 - 2018.3

      More details

    Country: Japan

    researchmap

  • Okayama University   工学部  

    2013.4 - 2017.3

      More details

    Country: Japan

    researchmap

Research History

  • 岡山大学, グリーンイノベーションセンター, 准教授(兼任)

    2025.4

      More details

  • Okayama University   The Graduate School of Environmental, Life, Natural Science and Technology   Associate Professor

    2025.4

      More details

  • Okayama University   Faculty of Natural Science and Technology   Assistant Professor

    2022.4 - 2025.3

      More details

    Country:Japan

    researchmap

  • Okayama University   Green Innovation Center   Assistant Professor (concurrently)

    2022.4 - 2025.3

      More details

    Country:Japan

    researchmap

  • Okayama Prefectural University

    2021.4 - 2022.3

      More details

  • Okayama University   The Graduate School of Natural Science and Technology   Project Assistant Professor

    2020.4 - 2022.3

      More details

    Notes:岡山大学数理・データサイエンス教育タスクフォース

    researchmap

  • International Pacific University

    2020.4 - 2022.3

      More details

  • JSPS Research Fellowship for Young Scientists

    2019.4 - 2020.3

      More details

    Country:Japan

    researchmap

▼display all

Professional Memberships

 

Papers

  • An Efficient MKTFHE Scheme without Redundant Key Switching Reviewed

    Y. Kitadai, Y. Kodera, Y. Nogami

    The 40th International Technical Conference on Circuits/Systems, Computers, and Communications (ITC-CSCC)   1562 - 1567   2025.7

     More details

    Authorship:Last author, Corresponding author   Language:English   Publishing type:Research paper (international conference proceedings)  

    researchmap

  • A Proposal of an Embedded On-the-fly Filter for a Circuit-based Random Number Generator Reviewed

    C. Hide, R. Sato, Y. Nogami, Y. Kodera

    The 40th International Technical Conference on Circuits/Systems, Computers, and Communications (ITC-CSCC)   892 - 895   2025.7

     More details

    Authorship:Last author, Corresponding author   Language:English   Publishing type:Research paper (international conference proceedings)  

    researchmap

  • A Comparison Study on Federated Learning and Centralized Learning-based Intrusion Detection System for Software Defined Network Reviewed

    S. M. Shamim, M. B. Musthafa, S. Huda, Y. Kodera, Y. Nogami

    The 40th International Technical Conference on Circuits/Systems, Computers, and Communications (ITC-CSCC)   1568 - 1572   2025.7

     More details

    Language:English   Publishing type:Research paper (international conference proceedings)  

    researchmap

  • Optimized Ensemble Deep Learning for Real-Time Intrusion Detection on Resource-Constrained Raspberry Pi Devices Reviewed

    M. B. MUSTHAFA, S. HUDA, T. T. NGUYEN, Y. KODERA, AND Y. NOGAMI

    IEEE Access   113544 - 113556   2025.6

     More details

    Language:English   Publishing type:Research paper (scientific journal)  

    researchmap

  • Efficient AES SubBytes Implementation for IoT Devices Using Composite Field Arithmetic and Polynomial Ring Representation Reviewed

    K. Li, S. Huda, Y. Nogami, Y. Kodera

    Proceedings of 2025 IEEE 26th International Conference on High Performance Switching and Routing (HPSR)   1 - 6   2025.5

     More details

    Authorship:Last author, Corresponding author   Language:English   Publishing type:Research paper (international conference proceedings)  

    researchmap

  • A Blockchain-Based Approach for Secure Email Encryption with Variable ECC Key Lengths Selection Reviewed

    Md. Biplob Hossain, Maya Rahayu, Samsul Huda, Md. Arshad Ali, Yuta Kodera, Yasuyuki Nogami

    Proc. of International Conference on Mobile Internet Security (MobiSec 2024)   2024.12

     More details

    Language:English   Publishing type:Research paper (international conference proceedings)  

    researchmap

  • Investigating the Role of D Flip-Flop as a Synchronization Circuit for Enhancing Randomness and Stabilizing Bit Distribution in RO-Based RNG on FPGA Reviewed

    Mitsuki Fujiwara, Ryoichi Sato, Samsul Huda, Yasuyuki Nogami, Yuta Kodera

    Proc. of the International Symposium on Information Theory and Its Applications (ISITA 2024)   2024.11

     More details

    Authorship:Last author, Corresponding author   Language:English   Publishing type:Research paper (international conference proceedings)  

    researchmap

  • Generative Adversarial Networks for Imbalanced Dataset Intrusion Detection in Software-Defined Networking Reviewed

    S. M., Shamim, Muhammad, Bisri Musthafa, Samsul Huda, Yuta Kodera, Yasuyuki Nogami

    Proc. of the International Symposium on Information Theory and Its Applications (ISITA 2024)   2024.11

     More details

    Language:English   Publishing type:Research paper (international conference proceedings)  

    researchmap

  • An Implementation of USB-Enabled Network Isolation for Remote IoT Security Exercises Reviewed

    Nobuya Ishihara, Yuta Kodera, Samsul Huda, Tanoshimaru Isokawa, Yasuyuki Nogami

    Proc. of Eleventh International Symposium on Computing and Networking Workshops (CANDARW)   2024.11

     More details

    Language:English   Publishing type:Research paper (international conference proceedings)  

    researchmap

  • The Design and Implementation of Kerberos-Blockchain Vehicular Ad-Hoc Networks Authentication Across Diverse Network Scenarios

    Maya Rahayu, MD BIPLOB HOSSAIN, Samsul Huda, Yuta Kodera, Md. Arshad Ali, Yasuyuki Nogami

    Sensors   2024.11

     More details

    Publishing type:Research paper (scientific journal)  

    DOI: 10.3390/s24237428

    researchmap

  • NUSS: Non-Interactive Updatable of Secret Sharing Schemes Using Homomorphic Encryption Reviewed

    He Yixuan, Samsul Huda, Yuta Kodera, Yasuyuki Nogami

    Proc. of Eleventh International Symposium on Computing and Networking Workshops (CANDARW)   2024.11

     More details

    Language:English   Publishing type:Research paper (international conference proceedings)  

    researchmap

  • A Study of Layer-2 Consortium Blockchain with zk-SNARKs for Medical Information Management Reviewed

    Yang Jie, Yuta Kodera, Samsul Huda, Yasuyuki Nogami

    Proc. of Eleventh International Symposium on Computing and Networking Workshops (CANDARW)   2024.11

     More details

    Language:English   Publishing type:Research paper (international conference proceedings)  

    researchmap

  • A Deployment of Ensemble-Based IDS on Raspberry Pi Reviewed

    Muhammad Bisri Musthafa, Samsul Huda, S. M. Shamim, Yuta Kodera, Jedidah Mwaura, Shunsuke Araki, Yasuyuki Nogami

    Proc. of the 13th Global Conference on Consumer Electronics (GCCE 2024)   2024.10

     More details

    Language:English   Publishing type:Research paper (international conference proceedings)  

    researchmap

  • An In-depth Analysis of Kerberos and Blockchain Integration on VANETs’ Security and Performance Reviewed

    Maya Rahayu, Md. Biplob Hossain, Samsul Huda, Md. Arshad Ali, Yuta Kodera, Yasuyuki Nogami

    2024 IEEE International Conference on Consumer Electronics - Taiwan (ICCE-TW)   391 - 392   2024.7

     More details

    Language:English   Publishing type:Research paper (international conference proceedings)  

    researchmap

  • Investigating Vulnerabilities in RSA-like Cryptosystems Through Lattice-based Attacks on Small Exponent Keys

    Sou Kumagai, Shota Kanzawa, Samsul Huda, Yuta Kodera, Yasuyuki Nogami

    2024 IEEE International Conference on Consumer Electronics - Taiwan (ICCE-TW)   583 - 584   2024.7

     More details

    Authorship:Corresponding author   Language:English   Publishing type:Research paper (international conference proceedings)  

    researchmap

  • Optimizing CRYSTALS-Dilithium in Rust: Radix-4 NTT and Assembly-level Comparison with Official C Implementation Reviewed

    Shunri Kudo, Yasuyuki Nogami, Samsul Huda, Yuta Kodera

    2024 IEEE International Conference on Consumer Electronics - Taiwan (ICCE-TW)   395 - 396   2024.7

     More details

    Authorship:Last author, Corresponding author   Language:English   Publishing type:Research paper (international conference proceedings)  

    researchmap

  • A Study to Improve Calculation Efficiency of CKKS Encoding with Parallelization Reviewed

    Taichi Saito, He Yixuan, Samsul Huda, Junting Xiao, Yuta Kodera, Yasuyuki Nogami

    2024 IEEE International Conference on Consumer Electronics - Taiwan (ICCE-TW)   397 - 398   2024.7

     More details

    Language:English   Publishing type:Research paper (international conference proceedings)  

    researchmap

  • Optimizing IoT Intrusion Detection Using Balanced Class Distribution, Feature Selection, and Ensemble Machine Learning Techniques Reviewed

    MUHAMMAD BISRI MUSTHAFA, Samsul Huda, Yuta Kodera, Md. Arshad Ali, Shunsuke Araki, Jedidah Mwaura, Yasuyuki Nogami

    Sensors   24 ( 13 )   4293 - 4311   2024.7

     More details

    Language:English   Publishing type:Research paper (scientific journal)  

    DOI: 10.3390/s24134293

    researchmap

  • Reducing Fruitless Cycles in Pollard's Rho Method with SFM for Efficient ECDLP Attacks on BN Curves Reviewed

    Ryuichi Kato, Takuro Manabe, Shota Kanzawa, Samsul Huda, Yuta Kodera, Takuya Kusaka, Yasuyuki Nogami

    The 39th International Technical Conference on Circuits/Systems, Computers and Communications (ITC-CSCC)   1 - 5   2024.7

     More details

    Language:English   Publishing type:Research paper (international conference proceedings)  

    researchmap

  • SnapSafe: Enabling Selective Image Privacy Through YOLO and AES-Protected Facial Encryption with QR Code Reviewed

    Andri Santoso, Samsul Huda, Tuy Tan Nguyen, Yuta Kodera, Yasuyuki Nogami

    The 39th International Technical Conference on Circuits/Systems, Computers and Communications (ITC-CSCC)   1 - 5   2024.7

     More details

    Language:English   Publishing type:Research paper (international conference proceedings)  

    researchmap

  • A Blockchain-based Approach with zk-SNARKs for Secure Email Applications Reviewed

    Md. Biplob Hossain, Maya Rahayu, Md. Arshad Ali, Samsul Huda, Yuta Kodera, Yasuyuki Nogami

    International Journal of Networking and Computing   14 ( 2 )   225 - 247   2024.7

     More details

    Language:English   Publishing type:Research paper (scientific journal)  

    researchmap

  • ELiPS-based Ciphertext-Policy Attribute-Based Encryption Reviewed

    Le Hoang Anh, Yuta Kawada, Samsul Huda, Md. Arshad Ali, Yuta Kodera, Yasuyuki Nogami

    International Journal of Networking and Computing   14 ( 2 )   186 - 205   2024.7

     More details

    Language:English   Publishing type:Research paper (scientific journal)  

    researchmap

  • A Minimization Number of Final Exponentiations and Inversions for Reducing the Decryption Process Time in ELiPS-Based CP-ABE Reviewed

    Le Hoang Anh, Yuta Kawada, Samsul Huda, Md. Arshad Ali, Yuta Kodera, Yasuyuki Nogami

    Journal of Advances in Information Technology   15 ( 6 )   748 - 755   2024.6

     More details

    Language:English   Publishing type:Research paper (scientific journal)  

    researchmap

  • Evaluation of IDS model by improving accuracy and reducing overfitting using stacking LSTM Reviewed

    Muhammad Bisri Musthafa, Samsul Huda, Md. Arshad Ali, Yuta Kodera, Yasuyuki Nogami

    IEEE 42nd International Conference on Consumer Electronics (ICCE 2024)   1 - 5   2024.1

     More details

    Language:English   Publishing type:Research paper (international conference proceedings)  

    researchmap

  • Performance Analysis of ELiPS-Based CP-ABE with Optimized Decryption Functions

    Le Hoang Anh, Yuta Kawada, Samsul Huda, Yuta Kodera, Yasuyuki Nogami

    Smart Innovation, Systems and Technologies   404 SIST   345 - 354   2024

     More details

    Publishing type:Research paper (international conference proceedings)  

    DOI: 10.1007/978-981-97-5810-4_30

    Scopus

    researchmap

  • Period and Some Distribution Properties of a Nonlinear Filter Generator with Dynamic Mapping Reviewed

    Y. Kodera

    IEICE Trans. Fundam.   E106-A ( 12 )   1511 - 1515   2023.12

     More details

    Authorship:Lead author, Last author, Corresponding author   Language:English   Publishing type:Research paper (scientific journal)  

    researchmap

  • An implementation of ELiPS-based Ciphertext-Policy Attribute-Based Encryption Reviewed

    Le Hoang Anh, Yuta Kawada, Samsul Huda, Md. Arshad Ali, Yuta Kodera, Yasuyuki Nogami

    2023 Eleventh International Symposium on Computing and Networking Workshops (CANDARW)   220 - 226   2023.11

     More details

    Language:English   Publishing type:Research paper (international conference proceedings)   Publisher:IEEE  

    DOI: 10.1109/candarw60564.2023.00044

    researchmap

  • Existence of Equivalent Keys in a Random Number Generator with Field Trace and a Dynamic Mapping Reviewed

    Itsuki Maebayashi, Yuki Takeuchi, Md. Arshad Ali, Yasuyuki Nogami, Yuta Kodera

    CCIS (MobiSec 2023)   2095   109 - 120   2023.11

     More details

    Authorship:Last author, Corresponding author   Language:English   Publishing type:Research paper (international conference proceedings)  

    researchmap

  • Evaluation of machine learning based optimized feature selection approaches and classification methods for Intrusion Detection System Reviewed

    Muhammad Bisri Musthafa, Md. Arshad Ali, Samsul Huda, Yuta Kodera, Takuya Kusaka, Yasuyuki Nogami

    2023 IEEE International Conference on Consumer Electronics - Taiwan (ICCE-TW)   2023.7

     More details

    Language:English   Publishing type:Research paper (international conference proceedings)  

    researchmap

  • A Consideration of Averaging the Calculation Cost of CVMA for A Secure Session based Data Transmission Reviewed

    Akane Miyoshi, Kazuma Ikesaka, Md. Arshad Ali, Yuta Kodera, Takuya Kusaka, Yasuyuki Nogami

    2023 IEEE International Conference on Consumer Electronics - Taiwan (ICCE-TW)   2023.7

     More details

    Language:English   Publishing type:Research paper (international conference proceedings)  

    researchmap

  • An Attack for a 116bit ECDLP for a Barreto-Naehrig Curve Reviewed

    Takuro Manabe, Ken Ikuta, Sho Joichi, Hiromasa Miura, Shota Kanzawa, Yasuyuki Nogami, Yuta Kodera, Takuya Kusaka

    2023 IEEE International Conference on Consumer Electronics - Taiwan (ICCE-TW)   2023.7

     More details

    Language:English   Publishing type:Research paper (international conference proceedings)  

    researchmap

  • A Proposal for Efficient Multiplication and Inverse Calculation in Streamlined NTRU Prime Reviewed

    Masakazu Awakihara, Jun Miura, Md. Arshad Ali, Takuya Kusaka, Yasuyuki Nogami, Yuta Kodera

    2023 IEEE International Conference on Consumer Electronics - Taiwan (ICCE-TW)   2023.7

     More details

    Authorship:Last author, Corresponding author   Language:English   Publishing type:Research paper (international conference proceedings)  

    researchmap

  • A Consideration of Parameters for a Nonlinear Filter Generator and its Linear Complexity Profile Reviewed

    Yuki Takeuchi, Itsuki Maebayashi, Md. Arshad Ali, Takuya Kusaka, Yasuyuki Nogami, Yuta Kodera

    2023 IEEE International Conference on Consumer Electronics - Taiwan (ICCE-TW)   2023.7

     More details

    Authorship:Last author, Corresponding author   Language:English   Publishing type:Research paper (international conference proceedings)  

    researchmap

  • A modified M-sequence with dynamic mapping and its autocorrelation Reviewed

    Itsuki Maebayashi, Yuki Takeuchi, Md. Arshad Ali, Takuya Kusaka, Yasuyuki Nogami, Yuta Kodera

    2023 IEEE International Conference on Consumer Electronics - Taiwan (ICCE-TW)   2023.7

     More details

    Authorship:Last author, Corresponding author   Language:English   Publishing type:Research paper (international conference proceedings)  

    researchmap

  • Improvement of Miller Loop for a Pairing on FK12 Curve and Evaluation with other STNFS Curves. Reviewed

    Kazuma Ikesaka, Yuki Nanjo, Yuta Kodera, Takuya Kusaka, Yasuyuki Nogami

    International Journal of Networking and Computing   13 ( 2 )   242 - 257   2023.7

     More details

    Language:English   Publishing type:Research paper (scientific journal)  

    researchmap

    Other Link: https://dblp.uni-trier.de/db/journals/ijnc/ijnc13.html#IkesakaNKKN23

  • A Proposal of Eliminating Fruitless Cycle for Efficient Pollard’s Rho Method by Adding a Constant Rational Point Reviewed

    Takuro Manabe, Shota Kanzawa, Md Arshad Ali, Yasuyuki Nogami, Yuta Kodera, Takuya Kusaka

    The 38th International Technical Conference on Circuits/Systems, Computers and Communications (ITC-CSCC)   864 - 869   2023.6

     More details

    Language:English   Publishing type:Research paper (international conference proceedings)  

    researchmap

  • A Proposal of Medical Information Management System Based on Consortium Blockchain Reviewed

    Jie Yang, Md. Arshad Ali, Yuta Kodera, Yasuyuki Nogami

    The 38th International Technical Conference on Circuits/Systems, Computers and Communications (ITC-CSCC)   501 - 506   2023.6

     More details

    Language:English   Publishing type:Research paper (international conference proceedings)  

    researchmap

  • Method to Eliminate Fruitless Cycles for Pollard’s Rho Method with Splitting Table Reviewed

    Shota Kanzawa, Takuro Manabe, Yuta Kodera, Yasuyuki Nogami, Takuya Kusaka

    The 38th International Technical Conference on Circuits/Systems, Computers and Communications (ITC-CSCC)   870 - 874   2023.6

     More details

    Language:English   Publishing type:Research paper (international conference proceedings)  

    researchmap

  • An Improvement of Algorithm for Computing Final Exponentiation for Pairing on KSS36 Curve and its Implementation Reviewed

    Yuta Kawada, Kazuma Ikesaka, Md. Arshad Ali, Yuta Kodera, Yasuyuki Nogami

    The 38th International Technical Conference on Circuits/Systems, Computers and Communications (ITC-CSCC)   858 - 863   2023.6

     More details

    Language:English   Publishing type:Research paper (international conference proceedings)  

    researchmap

  • A Smart Contract Based Blockchain Approach Integrated with Elliptic Curve Cryptography for Secure Email Application.

    Md. Biplob Hossain, Maya Rahayu, Ali Md. Arshad, Samsul Huda, Yuta Kodera, Yasuyuki Nogami

    CANDARW   195 - 201   2023

     More details

    Publishing type:Research paper (international conference proceedings)  

    DOI: 10.1109/CANDARW60564.2023.00040

    researchmap

    Other Link: https://dblp.uni-trier.de/db/conf/candar/candar2023w.html#HossainRAHKN23

  • An integrated secured vehicular ad-hoc network leveraging Kerberos authentication and Blockchain technology.

    Maya Rahayu, Md. Biplob Hossain, Ali Md. Arshad, Samsul Huda, Yuta Kodera, Yasuyuki Nogami

    CANDARW   260 - 266   2023

     More details

    Publishing type:Research paper (international conference proceedings)  

    DOI: 10.1109/CANDARW60564.2023.00050

    researchmap

    Other Link: https://dblp.uni-trier.de/db/conf/candar/candar2023w.html#RahayuHAHKN23

  • A Smart Contract Based Blockchain Approach Integrated with Elliptic Curve Cryptography for Secure Email Application

    Md Biplob Hossain, Maya Rahayu, Md Arshad Ali, Samsul Huda, Yuta Kodera, Yasuyuki Nogami

    Proceedings - 2023 11th International Symposium on Computing and Networking Workshops, CANDARW 2023   195 - 201   2023

     More details

    Publishing type:Research paper (international conference proceedings)  

    DOI: 10.1109/CANDARW60564.2023.00040

    Scopus

    researchmap

  • An integrated secured vehicular ad-hoc network leveraging Kerberos authentication and Blockchain technology

    Maya Rahayu, Md Biplob Hossain, Md Arshad Ali, Samsul Huda, Yuta Kodera, Yasuyuki Nogami

    Proceedings - 2023 11th International Symposium on Computing and Networking Workshops, CANDARW 2023   260 - 266   2023

     More details

    Publishing type:Research paper (international conference proceedings)  

    DOI: 10.1109/CANDARW60564.2023.00050

    Scopus

    researchmap

  • A Method to Eliminate Fruitless Cycles for Pollard’s Rho Method by Splitting a Seed-point Table for a Random Walk Reviewed

    Shota Kanzawa, Hiromasa Miura, Yasuyuki Nogami, Yuta Kodera, Takuya Kusaka

    Tenth International Symposium on Computing and Networking   110 - 116   2022.11

     More details

    Language:English   Publishing type:Research paper (international conference proceedings)  

    researchmap

  • Improvement of Optimal-Ate Pairing on Cocks-Pinch Curve with Embedding Degree 6 in Affine Coordinates Reviewed

    Tomohiro Iida, Kazuma Ikesaka, Yuta Kodera, Takuya Kusaka, Yasuyuki Nogami

    Tenth International Symposium on Computing and Networking Workshops   309 - 315   2022.11

     More details

    Language:English   Publishing type:Research paper (international conference proceedings)  

    researchmap

  • Improvement of Miller Loop for a Pairing on FK12 Curve and its Implementation Reviewed

    Kazuma Ikesaka, Yuki Nanjo, Yuta Kodera, Takuya Kusaka, Yasuyuki Nogami

    Tenth International Symposium on Computing and Networking   104 - 109   2022.11

     More details

    Language:English   Publishing type:Research paper (international conference proceedings)  

    researchmap

  • Design and implementation of a practical control system for an air-conditioner with IoT sensor nodes Reviewed

    Mengfang Duan, Yuta Kodera, Nobuya Ishihara, Yasuyuki Nogami, Takuya Kusaka

    The 37th International Technical Conference on Circuits/Systems, Computers and Communications (ITC-CSCC)   1 - 6   2022.7

     More details

    Language:English   Publishing type:Research paper (international conference proceedings)   Publisher:IEEE  

    DOI: 10.1109/itc-cscc55581.2022.9894933

    researchmap

  • Effectiveness of a Method to Eliminate Fruitless Cycles for Pollard's Rho Method Reviewed

    S. Kanzawa, H. Miura, Y. Kodera, Y. Nogami, T. Kusaka

    The 37th International Technical Conference on Circuits/Systems, Computers and Communications   1 - 4   2022.7

     More details

    Language:English   Publishing type:Research paper (international conference proceedings)  

    researchmap

  • Comparison of Conversion Matrices for a Compact AES-CTR Defined over an Isomorphic Field Reviewed

    Tomoya Hikida, Yasuyuki Nogami, Md. Arshad Ali, Yuta. Kodera

    The 37th International Technical Conference on Circuits/Systems, Computers and Communications   249 - 252   2022.7

     More details

    Authorship:Last author, Corresponding author   Language:English   Publishing type:Research paper (international conference proceedings)  

    researchmap

  • A Consideration on Change the Transition Probability of SHAKE256 with Different Initial Values Reviewed

    T. Ishida, R. Sato, Md. Arshad Ali, T. Kusaka, Y. Nogami, Y. Kodera

    The 37th International Technical Conference on Circuits/Systems, Computers and Communications   219 - 222   2022.7

     More details

    Authorship:Last author, Corresponding author   Language:English   Publishing type:Research paper (international conference proceedings)  

    researchmap

  • Improvement of Final Exponentiation for a Pairing on FK12 Curve and its Implementation Reviewed

    Kazuma Ikesaka, Yuki Nanjo, Yuta Kodera, Takuya Kusaka, Yasuyuki Nogami

    The 37th International Technical Conference on Circuits/Systems, Computers and Communications (ITC-CSCC)   205 - 208   2022.7

     More details

    Language:English   Publishing type:Research paper (international conference proceedings)   Publisher:IEEE  

    DOI: 10.1109/itc-cscc55581.2022.9894996

    researchmap

  • A Business-to-Business Collaboration System That Promotes Data Utilization While Encrypting Information on the Blockchain Reviewed

    Hiroaki Nasu, Yuta Kodera, Yasuyuki Nogami

    Sensors   22 ( 13 )   4909 - 4909   2022.6

     More details

    Language:English   Publishing type:Research paper (scientific journal)   Publisher:MDPI AG  

    Ensuring the reliability of data gathering from every connected device is an essential issue for promoting the advancement of the next paradigm shift, i.e., Industry 4.0. Blockchain technology is becoming recognized as an advanced tool. However, data collaboration using blockchain has not progressed sufficiently among companies in the industrial supply chain (SC) that handle sensitive data, such as those related to product quality, etc. There are two reasons why data utilization is not sufficiently advanced in the industrial SC. The first is that manufacturing information is top secret. Blockchain mechanisms, such as Bitcoin, which uses PKI, require plaintext to be shared between companies to verify the identity of the company that sent the data. Another is that the merits of data collaboration between companies have not been materialized. To solve these problems, this paper proposes a business-to-business collaboration system using homomorphic encryption and blockchain techniques. Using the proposed system, each company can exchange encrypted confidential information and utilize the data for its own business. In a trial, an equipment manufacturer was able to identify the quality change caused by a decrease in equipment performance as a cryptographic value from blockchain and to identify the change one month earlier without knowing the quality value.

    DOI: 10.3390/s22134909

    researchmap

  • Transition Probability Test for an RO-Based Generator and the Relevance between the Randomness and the Number of ROs Reviewed

    Yuta Kodera, Ryoichi Sato, Md. Arshad Ali, Takuya Kusaka, Yasuyuki Nogami

    Entropy   24 ( 6 )   1 - 13   2022.5

     More details

    Authorship:Lead author, Corresponding author   Language:English   Publishing type:Research paper (scientific journal)   Publisher:MDPI AG  

    A ring oscillator is a well-known circuit used for generating random numbers, and interested readers can find many research results concerning the evaluation of the randomness with a packaged test suit. However, the authors think there is room for evaluating the unpredictability of a sequence from another viewpoint. In this paper, the authors focus on Wold’s RO-based generator and propose a statistical test to numerically evaluate the randomness of the RO-based generator. The test adopts the state transition probabilities in a Markov process and is designed to check the uniformity of the probabilities based on hypothesis testing. As a result, it is found that the RO-based generator yields a biased output from the viewpoint of the transition probability if the number of ROs is small. More precisely, the transitions 01→01 and 11→11 happen frequently when the number l of ROs is less than or equal to 10. In this sense, l>10 is recommended for use in any application, though a packaged test suit is passed. Thus, the authors believe that the proposed test contributes to evaluating the unpredictability of a sequence when used together with available statistical test suits, such as NIST SP800-22.

    DOI: 10.3390/e24060780

    researchmap

  • A Business-to-Business Collaboration System That Promotes Data Utilization While Encrypting Information on the Blockchain Reviewed

    H. Nasu, R. Miyamoto, Y. Kodera, Y. Nogami

    World Academy of Science, Engineering and Technology, Open Science Index 183, International Journal of Information and Communication Engineering   16 ( 3 )   77 - 81   2022.3

     More details

    Language:English   Publishing type:Research paper (international conference proceedings)  

    researchmap

  • Efficient Final Exponentiation for Cyclotomic Families of Pairing-Friendly Elliptic Curves with Any Prime Embedding Degrees. Reviewed

    Yuki Nanjo, Masaaki Shirase, Yuta Kodera, Takuya Kusaka, Yasuyuki Nogami

    International Journal of Networking and Computing   12 ( 2 )   317 - 338   2022

     More details

    Publishing type:Research paper (scientific journal)  

    researchmap

    Other Link: https://dblp.uni-trier.de/db/journals/ijnc/ijnc12.html#NanjoSKKN22

  • Consideration of the side-channel attack to SIMON implemented on Arduino Uno. Reviewed

    Harunobu Enami, Yuta Kodera, Takuya Kusaka, Yasuyuki Nogami

    Ninth International Symposium on Computing and Networking   412 - 415   2021.11

     More details

    Language:English   Publishing type:Research paper (international conference proceedings)   Publisher:IEEE  

    DOI: 10.1109/CANDARW53999.2021.00075

    researchmap

    Other Link: https://dblp.uni-trier.de/db/conf/ic-nc/candar2021w.html#EnamiKKN21

  • Efficient Final Exponentiation for Pairings on Several Curves Resistant to Special TNFS. Reviewed

    Yuki Nanjo, Masaaki Shirase, Yuta Kodera, Takuya Kusaka, Yasuyuki Nogami

    Ninth International Symposium on Computing and Networking(CANDAR)   48 - 55   2021.11

     More details

    Language:English   Publishing type:Research paper (international conference proceedings)   Publisher:IEEE  

    DOI: 10.1109/CANDAR53791.2021.00014

    researchmap

    Other Link: https://dblp.uni-trier.de/db/conf/ic-nc/candar2021.html#NanjoSKKN21

  • Consideration of the side-channel attack to SPECK implemented on Arduino Uno. Reviewed

    Masaki Nakanose, Yuta Kodera, Takuya Kusaka, Yasuyuki Nogami

    Ninth International Symposium on Computing and Networking   339 - 345   2021.11

     More details

    Language:English   Publishing type:Research paper (international conference proceedings)   Publisher:IEEE  

    DOI: 10.1109/CANDARW53999.2021.00064

    researchmap

    Other Link: https://dblp.uni-trier.de/db/conf/ic-nc/candar2021w.html#NakanoseKKN21

  • Consideration for Affects of an XOR in a Random Number Generator Using Ring Oscillators. Reviewed

    Ryoichi Sato, Yuta Kodera, Ali Md. Arshad, Takuya Kusaka, Yasuyuki Nogami, Robert H. Morelos-Zaragoza

    Entropy   23 ( 9:1168 )   1 - 10   2021.9

     More details

    Language:English   Publishing type:Research paper (scientific journal)  

    DOI: 10.3390/e23091168

    researchmap

  • A Proposal for Testing Physical Random Numbers Using Stochastic Process Reviewed

    Ryoichi Sato, Yuta Kodera, Takuya Kusaka, Yasuyuki Nogami

    2021 IEEE International Conference on Consumer Electronics – Taiwan   1 - 2   2021.9

     More details

    Authorship:Corresponding author   Language:English   Publishing type:Research paper (international conference proceedings)   Publisher:IEEE  

    DOI: 10.1109/ICCE-TW52618.2021.9603232

    researchmap

    Other Link: https://dblp.uni-trier.de/db/conf/icce-tw/icce-tw2021.html#SatoKKN21

  • A Property Management System Using Image Recognition by YOLO Reviewed

    Taiki Miyamoto, Ryo Fukushima, Kazuaki Harada, Keiji Yoshimoto, Yuta Kodera, Takuya Kusaka, Yasuyuki Nogami

    2021 IEEE International Conference on Consumer Electronics – Taiwan   1 - 2   2021.9

     More details

    Authorship:Corresponding author   Language:English   Publishing type:Research paper (international conference proceedings)   Publisher:IEEE  

    DOI: 10.1109/ICCE-TW52618.2021.9603146

    researchmap

    Other Link: https://dblp.uni-trier.de/db/conf/icce-tw/icce-tw2021.html#MiyamotoFHYKKN21

  • Secure Comparison Protocol for Promoting Business to Business Collaboration on the Blockchain Reviewed

    Hiroaki Nasu, Yuta Kodera, Yasuyuki. Nogami

    2021 IEEE International Conference on Consumer Electronics – Taiwan   1 - 2   2021.9

     More details

    Language:English   Publishing type:Research paper (international conference proceedings)   Publisher:IEEE  

    DOI: 10.1109/ICCE-TW52618.2021.9603017

    researchmap

    Other Link: https://dblp.uni-trier.de/db/conf/icce-tw/icce-tw2021.html#NasuKN21

  • Consideration of Generating Suitable Parameters for Constructing type (h, m) Gauss Period Normal Basis Reviewed

    Keiji Yoshimoto, Yuta Kodera, Takuya Kusaka, Yasuyuki Nogami

    2021 IEEE International Conference on Consumer Electronics – Taiwan   1 - 2   2021.9

     More details

    Authorship:Corresponding author   Language:English   Publishing type:Research paper (international conference proceedings)   Publisher:IEEE  

    DOI: 10.1109/ICCE-TW52618.2021.9603240

    researchmap

    Other Link: https://dblp.uni-trier.de/db/conf/icce-tw/icce-tw2021.html#YoshimotoKKN21

  • Sophisticated analysis of a method to eliminate fruitless cycles for Pollard's rho method with skew Frobenius mapping over a Barreto-Naehrig curve Reviewed

    Miura Hiromasa, Kanzawa Syota, Matsumura Rikuya, Kodera Yuta, Kusaka Takuya, Nogami Yasuyuki

    International Journal of Networking and Computing   11 ( 2 )   231 - 250   2021.7

     More details

    Language:English   Publishing type:Research paper (scientific journal)   Publisher:IJNC Editorial Committee  

    In this paper, the authors focus on and propose an approach to attack a kind of pairing-friendly curves, the Barreto-Naehring (BN) curve, to accelerate the evaluation of the security level concerning the elliptic curve discrete logarithm problem (ECDLP). More precisely, this paper targets the BN curve, which is known to be a pairing-friendly curve, and Pollard's rho method based on the random-walk is adopted to attack the curve.Though Pollard's rho method with skew Frobenius mapping is known to solve the ECDLP efficiently, this approach sometimes induces the unsolvable cycle, called the fruitless cycle, and such trials must restart with a different starting point. However, any effective method to eliminate such fruitless cycles has not been proposed. Therefore, the authors focus and give the sophisticated analysis to propose an effective approach to eliminate such cycles to optimize Pollard's rho method furthermore. In addition, we confirm the effectiveness of the method by applying it to a BN curve with 12, 17, and 33-bit parameters.

    DOI: 10.15803/ijnc.11.2_231

    CiNii Article

    researchmap

  • Efficient Implementation of ECDH for Sigfox Communication Reviewed

    Ryo Fukushima, Daichi Hattori, Wataru Takehisa, Ryoichi Sato, Yuta Kodera, Takuya Kusaka, Yasuyuki Nogami

    The 36th International Technical Conference on Circuits/Systems, Computers and Communications   116 - 119   2021.6

     More details

    Language:English   Publishing type:Research paper (international conference proceedings)  

    researchmap

  • Calculation Costs Estimations of Final Exponentiation for Pairing-Friendly Elliptic Curves Resistant to Special TNFS Reviewed

    Yuki Nanjo, Masaaki Shirase, Yuta Kodera, Takuya Kusaka, Yusyuki Nogami

    The 36th International Technical Conference on Circuits/Systems, Computers and Communications   229 - 232   2021.6

     More details

    Language:English   Publishing type:Research paper (international conference proceedings)  

    researchmap

  • Proposal of Piccolo-CMAC for Sigfox network Reviewed

    Wataru Takehisa, Ryo Fukushima, Ryoichi Sato, Daichi Hattori, Yuta Kodera, Takuya Kusaka, Yasuyuki Nogami

    The 36th International Technical Conference on Circuits/Systems, Computers and Communications   120 - 123   2021.6

     More details

    Language:English   Publishing type:Research paper (international conference proceedings)  

    researchmap

  • A Discussion of Statistical Affect of Rotation and XOR on Non-linear Filters for Sequences Reviewed

    Tugumi Takatani, Yuta Kodera, Takuya Kusaka, Yasuyuki Nogami

    The 36th International Technical Conference on Circuits/Systems, Computers and Communications   316 - 319   2021.6

     More details

    Language:English   Publishing type:Research paper (international conference proceedings)  

    researchmap

  • A Construction Method of Final Exponentiation for a Specific Cyclotomic Family of Pairing-Friendly Elliptic Curves with Prime Embedding Degrees. Reviewed

    Yuki Nanjo, Masaaki Shirase, Yuta Kodera, Takuya Kusaka, Yasuyuki Nogami

    Ninth International Symposium on Computing and Networking(CANDAR)   148 - 154   2021

     More details

    Language:English   Publishing type:Research paper (international conference proceedings)   Publisher:IEEE  

    DOI: 10.1109/CANDAR53791.2021.00028

    researchmap

    Other Link: https://dblp.uni-trier.de/db/conf/ic-nc/candar2021.html#NanjoSKKN21a

  • Path Authentication Protocol: Based on a Lightweight MAC and a Nonlinear Filter Generator Reviewed

    Yuki Taketa, Yuta Kodera, Takuya Kusaka, Yasuyuki Nogami

    Silicon Valley Cybersecurity Conference 2020   CCIS 1383   38 - 48   2020.12

     More details

    Language:English   Publishing type:Research paper (international conference proceedings)   Publisher:Springer  

    DOI: 10.1007/978-3-030-72725-3_3

    researchmap

    Other Link: https://dblp.uni-trier.de/db/conf/svcc/svcc2020.html#TaketaKKN20

  • Multiplication and squaring in cubic and quartic extensions for pairing based cryptography Reviewed

    Yuta Kodera, Sylvain Duquesne, Yasuyuki Nogami

    Finite Fields and their Applications   71 - 86   2020.10

     More details

    Authorship:Lead author   Language:English   Publishing type:Part of collection (book)   Publisher:De Gruyter  

    DOI: 10.1515/9783110621730-006

    researchmap

    Other Link: https://www.degruyter.com/document/doi/10.1515/9783110621730-006/xml

  • A Parallel Blum-Micali Generator Based on the Gauss Periods Reviewed

    Yuta Kodera, Tomoya Tatara, Takuya Kusaka, Yasuyuki Nogami, Satoshi Uehara

    The International Symposium on Information Theory and Its Applications 2020   447 - 450   2020.10

     More details

    Authorship:Lead author   Language:English   Publishing type:Research paper (international conference proceedings)   Publisher:The Institute of Electronics, Information and Communication Engineers  

    DOI: 10.34385/proc.65.C04-1

    CiNii Article

    researchmap

  • Equivalent Keys of a Nonlinear Filter Generator Using a Power Residue Symbol Reviewed

    Yuta Kodera, Yuki Taketa, Takuya Kusaka, Yasuyuki Nogami, Satoshi Uehara

    Advances in Information and Computer Security   LNCS 12231   23 - 36   2020.9

     More details

    Authorship:Lead author   Language:English   Publishing type:Part of collection (book)   Publisher:Springer International Publishing  

    DOI: 10.1007/978-3-030-58208-1_2

    researchmap

  • Electrical Falsification of CAN Data by Magnetic Coupling Reviewed

    Hiroto Ogura, Ryunosuke Isshiki, Kengo Iokibe, Yuta Kodera, Takuya Kusaka, Yasuyuki Nogami

    The 35th International Technical Conference on Circuits/Systems, Computers and Communications   348 - 353   2020.7

     More details

    Language:English   Publishing type:Research paper (international conference proceedings)  

    Web of Science

    researchmap

  • Evaluating Side-Channel Resistance Using Low Order Rational Points Against Curve25519 and an Associated Quadratic Twist. Reviewed

    Keiji Yoshimoto, Yoshinori Uetake, Yuta Kodera, Takuya Kusaka, Yasuyuki Nogami

    International Journal of Networking and Computing   10 ( 2 )   144 - 158   2020.7

     More details

    Language:English   Publishing type:Research paper (scientific journal)  

    researchmap

    Other Link: https://dblp.uni-trier.de/db/journals/ijnc/ijnc10.html#YoshimotoUKKN20

  • Algebraic Group Structure of the Random Number Generator: Theoretical Analysis of NTU Sequence(s) Reviewed

    Yuta Kodera, Md. Arshad Ali, Takeru Miyazaki, Takuya Kusaka, Yasuyuki Nogami, Satoshi Uehara, Robert H. Morelos-Zaragoza

    IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences   E102-A ( 12 )   1659 - 1667   2019.12

     More details

    Authorship:Lead author   Language:English   Publishing type:Research paper (scientific journal)   Publisher:Institute of Electronics, Information and Communications Engineers (IEICE)  

    <p>An algebraic group is an essential mathematical structure for current communication systems and information security technologies. Further, as a widely used technology underlying such systems, pseudorandom number generators have become an indispensable part of their construction. This paper focuses on a theoretical analysis for a series of pseudorandom sequences generated by a trace function and the Legendre symbol over an odd characteristic field. As a consequence, the authors give a theoretical proof that ensures a set of subsequences forms a group with a specific binary operation.</p>

    DOI: 10.1587/transfun.e102.a.1659

    CiNii Article

    researchmap

  • Evaluating a Side-Channel Resistance against Order 4 Rational Points in Arduino Cryptography Library Reviewed

    Keiji Yoshimoto, Yoshinori Uetake, Yuta Kodera, Takuya Kusaka, Yasuyuki Nogami

    2019 Seventh International Symposium on Computing and Networking (CANDAR)   245 - 250   2019.11

     More details

    Language:English   Publishing type:Research paper (international conference proceedings)   Publisher:IEEE  

    DOI: 10.1109/candar.2019.00040

    researchmap

  • Decomposing the Inverse of a Masked Vector in an Isomorphic Galois Field for Perfectly Masked S-Box Reviewed

    Yuta Kodera, Yuki Taketa, Takuya Kusaka, Yasuyuki Nogami

    The Seventh International Symposium on Computing and Networking   157 - 163   2019.11

     More details

    Language:English   Publishing type:Research paper (international conference proceedings)   Publisher:IEEE  

    DOI: 10.1109/candar.2019.00027

    researchmap

  • A Side-Channel Attack Using Order 8 Rational Points against Curve25519 on an 8-Bit Microcontroller Reviewed

    Yoshinori Uetake, Keiji Yoshimoto, Yuta Kodera, Leo Weissbart, Takuya Kusaka, Yasuyuki Nogami

    The Seventh International Symposium on Computing and Networking   225 - 231   2019.11

     More details

    Language:English   Publishing type:Research paper (international conference proceedings)  

    DOI: 10.1109/candar.2019.00037

    Web of Science

    researchmap

  • An Analysis of Computational Complexity of Low Level Quantizers for Block Turbo Decoding for Product Codes of Binary Linear Code Reviewed

    Shinichi Kageyama, Ken Ikuta, Yuki Nanjo, Yuta Kodera, Takuya Kusaka, Yasuyuki Nogami

    The Seventh International Symposium on Computing and Networking Workshops   425 - 429   2019.11

     More details

    Language:English   Publishing type:Research paper (international conference proceedings)   Publisher:IEEE  

    DOI: 10.1109/candarw.2019.00080

    researchmap

  • Mutual Relationship between the Neural Network Model and Linear Complexity for Pseudorandom Binary Number Sequence Reviewed

    Yuki Taketa, Yuta Kodera, Shogo Tanida, Takuya Kusaka, Yasuyuki Nogami, Norikazu Takahashi, Satoshi Uehara

    The Seventh International Symposium on Computing and Networking Workshops   394 - 400   2019.11

     More details

    Language:English   Publishing type:Research paper (international conference proceedings)  

    DOI: 10.1109/candarw.2019.00074

    Web of Science

    researchmap

  • Advanced Searchable Encryption: An Adaptively Secure Keyword Search for Matrix-type Storages Reviewed

    Yuta Kodera, Minoru Kuribayashi, Takuya Kusaka, Yasuyuki Nogami

    International Journal of Networking and Computing   9 ( 2 )   171 - 187   2019.9

     More details

    Authorship:Lead author   Language:English   Publishing type:Research paper (scientific journal)   Publisher:IJNC Editorial Committee  

    DOI: 10.15803/ijnc.9.2_171

    researchmap

  • A Construction of a Keyword Search to Allow Partial Matching with a Block Cipher Reviewed

    Yuta Kodera, Minoru Kuribayashi, Takuya Kusaka, Yasuyuki Nogami

    Information Security Applications   LNCS 11402   241 - 252   2019.8

     More details

    Authorship:Lead author   Language:English   Publishing type:Part of collection (book)   Publisher:Springer International Publishing  

    DOI: 10.1007/978-3-030-17982-3_19

    researchmap

  • Multi-Value Sequence Generated over Sub Extension Field and Its Properties Reviewed

    Md. Arshad Ali, Yuta Kodera, Takuya Kusaka, Satoshi Uehara, Yasuyuki Nogami, Robert H. Morelos-Zaragoza

    Journal of Information Security   10 ( 03 )   130 - 154   2019.7

     More details

    Language:English   Publishing type:Research paper (scientific journal)   Publisher:Scientific Research Publishing, Inc.  

    DOI: 10.4236/jis.2019.103008

    researchmap

  • Well Balanced Multi-value Sequence and its Properties Over Odd Characteristic Field Reviewed

    Md. Arshad Ali, Yuta Kodera, Md. Fazle Rabbi, Takuya Kusaka, Yasuyuki Nogami, Satoshi Uehara, Robert H. Morelos-Zaragoza

    Advances in Science, Technology and Engineering Systems Journal   4 ( 4 )   188 - 196   2019.7

     More details

    Language:English   Publishing type:Research paper (scientific journal)   Publisher:ASTES Journal  

    DOI: 10.25046/aj040423

    Scopus

    researchmap

  • Updating A Secret Key for MAC Implemented on CAN Using Broadcast Encryption Scheme Reviewed

    Tomoya Tatara, Hiroto Ogura, Yuta Kodera, Takuya Kusaka, Yasuyuki Nogami

    The 34th International Technical Conference on Circuits/Systems, Computers and Communications (ITC-CSCC)   166 - 169   2019.6

     More details

    Language:English   Publishing type:Research paper (international conference proceedings)   Publisher:IEEE  

    DOI: 10.1109/itc-cscc.2019.8793298

    researchmap

  • A Comparison of Relic-toolkit and ELiPS Libraries for a Pairing-based Homomorphic Encryption Reviewed

    Tadaki Kanenari, Yuto Takahashi, Yuta Hashimoto, Yuta Kodera, Takuya Kusaka, Yasuyuki Nogami, Toru Nakanishi

    The 34th International Technical Conference on Circuits/Systems, Computers and Communications (ITC-CSCC)   158 - 161   2019.6

     More details

    Language:English   Publishing type:Research paper (international conference proceedings)   Publisher:IEEE  

    DOI: 10.1109/itc-cscc.2019.8793446

    researchmap

  • NIST Statistical Test for Random Sequence Generated by Möbius Function Reviewed

    Fatema Akhter, Yuta Kodera, Yasuyuki Nogami, Takuya Kusaka

    2019 IEEE International Conference on Consumer Electronics - Taiwan (ICCE-TW)   2019.5

     More details

    Language:English   Publishing type:Research paper (international conference proceedings)   Publisher:IEEE  

    DOI: 10.1109/icce-tw46550.2019.8992033

    researchmap

  • A Consideration on Generating Uniform Binary Sequence with High Linear Complexity Reviewed

    Tomoya Tatara, Yuta Kodera, Takuya Kusaka, Yasuyuki Nogami

    2019 IEEE International Conference on Consumer Electronics - Taiwan   2019.5

     More details

    Language:English   Publishing type:Research paper (international conference proceedings)   Publisher:IEEE  

    DOI: 10.1109/icce-tw46550.2019.8991711

    researchmap

  • Boundary for the Linear Complexity of Well Balanced NTU Reviewed

    Yuta Kodera, Takuya Kusaka, Yasuyuki Nogami

    2019 IEEE International Conference on Consumer Electronics - Taiwan (ICCE-TW)   2019.5

     More details

    Authorship:Lead author   Language:English   Publishing type:Research paper (international conference proceedings)   Publisher:IEEE  

    DOI: 10.1109/icce-tw46550.2019.8992029

    researchmap

  • Distribution of Bit Patterns in Binary Sequence Generated Over Sub Extension Field Reviewed

    Md. Arshad Ali, Yuta Kodera, Takuya Kusaka, Yasuyuki Nogami, Satoshi Uehara, Robert H. Morelos-Zaragoza

    Advances in Science, Technology and Engineering Systems Journal   4 ( 2 )   370 - 379   2019.4

     More details

    Language:English   Publishing type:Research paper (scientific journal)   Publisher:ASTES Journal  

    DOI: 10.25046/aj040246

    Scopus

    researchmap

  • Bit Distribution of Binary Sequence Generated by Trace Function and Legendre Symbol Over Sub Extension Field Reviewed

    Md. Arshad Ali, Yuta Kodera, Shoji Heguri, Takuya Kusaka, Satoshi Uehara, Robert H. Morelos-Zaragoza

    The 6th International Conference on Information Technology: IoT and Smart City   92 - 96   2018.12

     More details

    Language:English   Publishing type:Research paper (international conference proceedings)   Publisher:ACM Press  

    DOI: 10.1145/3301551.3301562

    Scopus

    researchmap

  • Advanced Searchable Encryption: Keyword Search for Matrix-Type Storage Reviewed

    Yuta Kodera, Minoru Kuribayashi, Takuya Kusaka, Yasuyuki Nogami

    The Sixth International Symposium on Computing and Networking Workshops (CANDARW)   292 - 297   2018.11

     More details

    Authorship:Lead author   Language:English   Publishing type:Research paper (international conference proceedings)  

    DOI: 10.1109/candarw.2018.00061

    Web of Science

    researchmap

  • Distribution of Digit Patterns in Multi-Value Sequence over the Odd Characteristic Field Reviewed

    Yuta Kodera, Takeru Miyazaki, Md. Al-Amin Khandaker, Md. Arshad Ali, Takuya Kusaka, Yasuyuki Nogami, Satoshi Uehara

    IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences   E101-A ( 9 )   1525 - 1536   2018.9

     More details

    Authorship:Lead author   Language:English   Publishing type:Research paper (scientific journal)  

    DOI: 10.1587/transfun.e101.a.1525

    Web of Science

    researchmap

  • An Implementation of ECC with Twisted Montgomery Curve over 32nd Degree Tower Field on Arduino Uno. Reviewed

    Yuta Hashimoto, Md. Al-Amin Khandaker, Yuta Kodera, Taehwan Park, Takuya Kusaka, Howon Kim, Yasuyuki Nogami

    International Journal of Networking and Computing   8 ( 2 )   341 - 350   2018.7

     More details

    Language:English   Publishing type:Research paper (scientific journal)  

    researchmap

  • Linear Complexity of Pseudo-random Binary Sequence Generated Over Proper Sub Extension Field Reviewed

    Md. Arshad Ali, Yuta Kodera, Takuya Kusaka, Takeru Miyazaki, Yasuyuki Nogami, Satoshi Uehara, Robert H. Morelos-Zaragoza

    The 33th International Technical Conference on Circuits/Systems, Computers and Communications (ITC-CSCC)   448 - 451   2018.7

     More details

    Language:English   Publishing type:Research paper (international conference proceedings)  

    researchmap

  • Relation between the Irreducible Polynomials that Generates the Same Binary Sequence Over Odd Characteristic Field Reviewed

    Md. Arshad Ali, Yuta Kodera, Taehwan Park, Takuya Kusaka, Yasuyuki Nogmi, Howon Kim

    Journal of information and communication convergence engineering   16 ( 3 )   166 - 172   2018.6

     More details

    Language:English   Publishing type:Research paper (scientific journal)  

    DOI: 10.6109/jicce.2018.16.3.166

    Scopus

    researchmap

  • Evaluating the Maximum Order Complexity of a Uniformly distributed Sequence over Odd Characteristic Reviewed

    Yuta Kodera, Takuya Kusaka, Takeru Miyazaki, Yasuyuki Nogamit, Satoshi Uehara, Robert H. Morelos-Zaragoza

    2018 IEEE International Conference on Consumer Electronics – Taiwan   2018.5

     More details

    Authorship:Lead author   Language:English   Publishing type:Research paper (international conference proceedings)  

    researchmap

  • A Consideration of an Efficient Arithmetic over the Extension Field of Degree 3 for Elliptic Curve Pairing Cryptography Reviewed

    Xin Li, Yuta Kodera, Yoshinori Uetake, Takuya Kusaka, Yasuyuki Nogami

    2018 IEEE International Conference on Consumer Electronics – Taiwan   2018.5

     More details

    Language:English   Publishing type:Research paper (international conference proceedings)  

    researchmap

  • Uniform Binary Sequence Generated over Odd Characteristic Field Reviewed

    Yuta Kodera, Takuya Kusaka, Ali Md. Arshad, Yasuyuki Nogami, Takeru Miyazak, Satoshi Uehara

    International Journal of Information and Electronics Engineering   8 ( 1 )   5 - 9   2018.3

     More details

    Authorship:Lead author   Language:English   Publishing type:Research paper (scientific journal)   Publisher:EJournal Publishing  

    DOI: 10.18178/ijiee.2018.8.1.685

    researchmap

  • Efficient Optimal Ate Pairing at 128-Bit Security Level Reviewed

    Md. Al-Amin Khandaker, Yuki Nanjo, Loubna Ghammam, Sylvain Duquesne, Yasuyuki Nogami, Yuta Kodera

    INDOCRYPT 2017   LNCS 10698   186 - 205   2017.12

     More details

    Language:English   Publishing type:Part of collection (book)  

    DOI: 10.1007/978-3-319-71667-1_10

    Web of Science

    researchmap

  • An ECC Implementation with a Twisted Montgomery Curve over Fq32 on an 8-Bit Microcontroller Reviewed

    Yuta Hashimoto, Md. Al-Amin Khandaker, Yuta Kodera, Taehwan Park, Takuya Kusaka, Howon Kim, Yasuyuki Nogami

    The Fifth International Symposium on Computing and Networking   283 - 294   2017.11

     More details

    Language:English   Publishing type:Research paper (international conference proceedings)   Publisher:IEEE  

    DOI: 10.1109/candar.2017.90

    Scopus

    researchmap

  • An Efficient Implementation of Trace Calculation over Finite Field for a Pseudorandom Sequence Reviewed

    Yuta Kodera, Takuya Kusaka, Takeru Miyazaki, Md. Al-Amin Khandaker, Yasuyuki Nogami, Satoshi Uehara

    The Fifth International Symposium on Computing and Networking   451 - 455   2017.11

     More details

    Authorship:Lead author   Language:English   Publishing type:Research paper (international conference proceedings)   Publisher:IEEE  

    DOI: 10.1109/candar.2017.86

    Scopus

    researchmap

  • Distribution of bit patterns on multi-value sequence over odd characteristics field Reviewed

    Yuta Kodera, Takeru Miyazaki, Md. Al-Amin Khandaker, Ali Md. Arshad, Yasuyuki Nogami, Satoshi Uehara

    2017 IEEE International Conference on Consumer Electronics - Taiwan   2017.6

     More details

    Authorship:Lead author   Language:English   Publishing type:Research paper (international conference proceedings)   Publisher:IEEE  

    DOI: 10.1109/icce-china.2017.7991033

    Scopus

    researchmap

  • Efficient Optimal Ate Pairing at 128-Bit Security Level.

    Md. Al-Amin Khandaker, Yuki Nanjo, Loubna Ghammam, Sylvain Duquesne, Yasuyuki Nogami, Yuta Kodera

    Progress in Cryptology - INDOCRYPT 2017 - 18th International Conference on Cryptology in India(INDOCRYPT)   186 - 205   2017

     More details

    Publishing type:Research paper (international conference proceedings)   Publisher:Springer  

    DOI: 10.1007/978-3-319-71667-1_10

    researchmap

    Other Link: https://dblp.uni-trier.de/db/conf/indocrypt/indocrypt2017.html#KhandakerNGDNK17

  • A Consideration of an Efficient Calculation over the Extension Field of Degree 3 and 4 for Elliptic Curve Pairing Cryptography Reviewed

    Akihiro Sanada, Yuta Kodera, Yasuyuki Nogami, Sylvain Duquesne, Masaaki Shirase

    The International Symposium on Information Theory and Its Applications 2016   2016.10

     More details

    Language:English   Publishing type:Research paper (other academic)  

    researchmap

▼display all

MISC

  • 円周等分多項式の根を用いたGNBと𝑛 次トレースの関係の考察

    三好 茜音, 池坂 和真, 小寺 雄太, 野上 保之

    信学技報 IT2024-120   290 - 295   2025.3

     More details

    Language:Japanese   Publishing type:Research paper, summary (national, other academic conference)  

    researchmap

  • 混ぜるな危険準同型暗号のELiPSによる実装

    時末 海生, 齋藤 直弥, 小寺 雄太, 野上 保之

    信学技報 IT2024-120   296 ( 301 )   2025.3

     More details

    Language:Japanese   Publishing type:Research paper, summary (national, other academic conference)  

    researchmap

  • ペアリング暗号と格子暗号を組み合わせた実数対応型準同型計算の実装 性能の評価

    齋藤 直弥, 時末 海生, 小寺 雄太, 野上 保之

    信学技報 IT2024-120   302 - 307   2025.3

     More details

    Language:Japanese   Publishing type:Research paper, summary (national, other academic conference)  

    researchmap

  • 準同型暗号CKKS方式の行列積実装の高速化

    眞鍋拓朗, 若杉飛鳥, 服部大地, 小寺雄太, 野上保之

    SCIS予稿集   1 - 8   2025.1

     More details

    Language:Japanese   Publishing type:Research paper, summary (national, other academic conference)  

    researchmap

  • 準同型暗号CKKS方式を用いたガウス過程回帰の構成

    河原直翔, 若杉飛鳥, 服部大地, 小寺雄太, 野上保之

    SCIS予稿集   2025.1

     More details

    Language:Japanese   Publishing type:Research paper, summary (national, other academic conference)  

    researchmap

  • 準同型暗号CKKS方式における暗号文のランダム逆行列の考察

    礒川楽丸, 若杉飛鳥, 服部大地, 小寺雄太, 野上保之

    SCIS予稿集   1 - 8   2025.1

     More details

    Language:Japanese   Publishing type:Research paper, summary (national, other academic conference)  

    researchmap

  • FALCONにおける鍵サンプリングに関する考察

    粟木原正和, 神澤昇大, 中川直樹, 野上保之, 小寺雄太

    SCIS予稿集   1 - 7   2025.1

     More details

    Authorship:Last author, Corresponding author   Language:Japanese   Publishing type:Research paper, summary (national, other academic conference)  

    researchmap

  • An Implementation of AES Algorithm using Composite Field on FPGA

    KEXIN LI, Samsul Huda, Yasuyuki Nogami, Yuta Kodera

    有限体理論とその擬似乱数系列生成への応用ワークショップ予稿集   2024.9

     More details

    Authorship:Last author, Corresponding author   Language:English   Publishing type:Research paper, summary (national, other academic conference)  

    researchmap

  • Grostl の概念を基にした可変長ハッシュの提案

    武内友希, 三好茜音, 野上保之, 小寺雄太

    有限体理論とその擬似乱数系列生成への応用ワークショップ予稿集   2024.9

     More details

    Authorship:Last author, Corresponding author   Language:Japanese   Publishing type:Research paper, summary (national, other academic conference)  

    researchmap

  • A Hardware Implementation of AES Algorithm using a Composite Field

    LI KEXIN, Samsul Huda, Md.Arshad Ali‡, Yasuyuki Nogami, Yuta Kodera

    Proc. of SCIS   2024.1

     More details

    Authorship:Last author, Corresponding author   Language:English   Publishing type:Research paper, summary (national, other academic conference)  

    researchmap

  • FALCON における Splitfft の効率的な実装の提案と評価

    粟木原 正和, 吉本 慶次, 神澤 昇大, 三好 茜音, 野上 保之, 小寺 雄太

    SCIS予稿集   2024.1

     More details

    Authorship:Last author, Corresponding author   Language:Japanese   Publishing type:Research paper, summary (national, other academic conference)  

    researchmap

  • 行列演算によるNTRU方程式の解法に関する考察

    石田哲郎, 池坂和真, 野上保之, 小寺雄太

    有限体理論とその擬似乱数生成への 応用ワークショップ予稿集   30 - 34   2023.9

     More details

    Authorship:Last author, Corresponding author   Language:Japanese   Publishing type:Research paper, summary (national, other academic conference)  

    researchmap

  • Wold 型RO-Based RNGにおけるD-FF のクロック同期の乱数列への影響とXORゲートへの不定値入力での挙動の検証

    藤原光樹, 佐藤陵一, 野上保之, 小寺雄太

    有限体理論とその擬似乱数生成への 応用ワークショップ予稿集   19 - 23   2023.9

     More details

    Authorship:Last author, Corresponding author   Language:Japanese   Publishing type:Research paper, summary (national, other academic conference)  

    researchmap

  • トレースと平方剰余判定を用いた擬似乱数生成器に一様分布を保障するためのパラメータ に関する考察

    武内友希, 野上保之, 小寺雄太

    有限体理論とその擬似乱数生成への 応用ワークショップ予稿集   8 - 15   2023.9

     More details

    Authorship:Last author, Corresponding author   Language:Japanese   Publishing type:Research paper, summary (national, other academic conference)  

    researchmap

  • MAVLink通信における認証付き暗号を用いた通信方式の実装と評価

    桒田龍門, 石原信也, 小寺雄太, 野上保之

    信学技報   123 ( 132 HWS2023-39 )   165 - 170   2023.7

     More details

    Language:Japanese   Publishing type:Research paper, summary (national, other academic conference)  

    researchmap

  • CAN FD通信における軽量暗号ASCONを用いたペイロード暗号化とメッセージ認証コードの実装と評価

    石川晃太郎, 河原直翔, 日下卓也, 小寺雄太, 野上保之

    信学技報   123 ( 132 HWS2023-38 )   159 - 164   2023.7

     More details

    Language:Japanese   Publishing type:Research paper, summary (national, other academic conference)  

    researchmap

  • Radix-4 NTTを適用したCRYSTALS-DilithiumのTLS通信における性能評価

    畑山海羽斗, 杉本博英, 高橋裕人, 吉本慶次, 長田繁幸, 中川直樹, 野上保之, 小寺雄太

    SCIS 2023 予稿集   1 - 7   2023.1

     More details

    Authorship:Last author, Corresponding author   Language:Japanese   Publishing type:Research paper, summary (national, other academic conference)  

    researchmap

  • KSS36 曲線上のペアリングにおける最終べきアルゴリズムの改良

    川田優太, 池坂和真, 小寺雄太, 日下卓也, 野上保之

    SCIS 2023 予稿集   1 - 8   2023.1

     More details

    Language:Japanese   Publishing type:Research paper, summary (national, other academic conference)  

    researchmap

  • Type-II ONBを根にもつ既約多項式の導出と逐次拡大体上の元の原始性の検証

    三好茜音, 小寺雄太, 疋田智矢, 日下卓也, 池坂和真, 野上保之

    SCIS 2023 予稿集   1 - 8   2023.1

     More details

    Language:Japanese   Publishing type:Research paper, summary (national, other academic conference)  

    researchmap

  • Implementation and evaluation of secure platform to CAN FD communication system using Raspberry Pi

    545 - 549   2022.11

     More details

    Language:Japanese   Publishing type:Research paper, summary (national, other academic conference)  

    researchmap

  • Proposal of Authentication Method for USB Device Using a One-Time Password

    453 - 458   2022.11

     More details

    Language:Japanese   Publishing type:Research paper, summary (national, other academic conference)  

    researchmap

  • A Consideration on Verifying Indistinguishability for Physical Random Numbers Using Markov Processes

    325 - 329   2022.11

     More details

    Authorship:Last author, Corresponding author   Language:Japanese   Publishing type:Research paper, summary (national, other academic conference)  

    researchmap

  • Design and Implementation of Payload Encryption and MAC for CAN Communication Using Lightweight Encryption SIMON

    122 ( 227 (HWS2022-41) )   64 - 69   2022.10

     More details

    Language:Japanese   Publishing type:Research paper, summary (national, other academic conference)  

    researchmap

  • Evaluation of RO-type Random Number Generator Circuits by Markov Processes and Hypothesis Testing

    Ryoichi Sato, Takuya Kusaka, Yasuyuki Nogami, Yuta Kodera

    7 - 12   2022.9

     More details

    Authorship:Last author, Corresponding author   Language:Japanese   Publishing type:Research paper, summary (national, other academic conference)  

    researchmap

  • Consideration of an authentication using protocol CVMA parameters

    Akane Miyoshi, Kazuma Ikesaka, Yuta Kodera, Takuya Kusaka, Yasuyuki Nogami

    電子情報通信学会技術研究報告(Web)   122 ( 128(IT2022 15-28) )   2022.7

     More details

    Language:Japanese   Publishing type:Internal/External technical report, pre-print, etc.  

    J-GLOBAL

    researchmap

  • Improvement of Algorithm for Computing Final Exponentiation for Pairing on FK12

    2022.1

     More details

    Language:Japanese   Publishing type:Research paper, summary (national, other academic conference)  

    researchmap

  • Fast Generating Rational Points on G2 for Pairing on BLS12

    2022.1

     More details

    Language:Japanese   Publishing type:Research paper, summary (national, other academic conference)  

    researchmap

  • Proposal of Countermeasures for Malicious USB Devices using OTP Authentication

    6 - 9   2021.9

     More details

    Language:Japanese   Publishing type:Research paper, summary (national, other academic conference)  

    researchmap

  • Proposal of Optimal Curve Parameters for Pairing Computation on BLS12 Curve and Its Evaluation of Implementation

    Daichi Hattori, Yuto Takahashi, Tomoya Tatara, Yuki Nanjo, Yuta Kodera, Takuya Kusaka, Yasuyuki Nogami

    IEICE Technical Report   120 ( 224(ISEC2020-32) )   1 - 6   2020.11

     More details

    Language:Japanese   Publishing type:Internal/External technical report, pre-print, etc.  

    J-GLOBAL

    researchmap

  • Thermal Image Human Thermometer and Its Privacy Protection with Raspberry Pi

    Yuan Yang, Yuta Kodera, Takuya Kusaka, Yasuyuki Nogami

    Proceedings of Computer Security Symposium   384 - 388   2020.10

     More details

    Language:English   Publishing type:Research paper, summary (national, other academic conference)  

    CiNii Article

    researchmap

  • A Consideration for the Linear Complexity of Cascaded NTU Sequence

    Tomoya Tatara, Yuta Kodera, Yasuyuki Nogami

    Proceedings of the 6th Workshop on Finite Field Theory and its Application for Pseud-Random Sequence   12 - 17   2020.9

     More details

    Language:Japanese   Publishing type:Research paper, summary (national, other academic conference)  

    researchmap

  • Consideration of the Design of Nonlinear Filters for a Cryptographic Generator

    Tugumi Takatani, Yuta Kodera, Yasuyuki Nogami

    Proceedings of the 6th Workshop on Finite Field Theory and its Application for Pseud-Random Sequence   19 - 23   2020.9

     More details

    Language:Japanese   Publishing type:Research paper, summary (national, other academic conference)  

    researchmap

  • リングオシレータを用いた小規模な物理乱数生成回路の設計および乱数性評価

    Ryoichi Sato, Yuta Kodera, Yasuyuki Nogami

    Proceedings of the 6th Workshop on Finite Field Theory and its Application for Pseud-Random Sequence   32 - 35   2020.9

     More details

    Language:Japanese   Publishing type:Research paper, summary (national, other academic conference)  

    researchmap

  • Evaluation of Pairing on Elliptic Curves with Embedding Degree 15 with Type-II All-one Polynomial Extension Field of Degree 5

    Yuki Nanjo, Yuta Kodera, Rikuya Matsumura, Masaaki Shirase, Takuya Kusaka, Yasuyuki Nogami

    Proceedings of 2020 Symposium on Cryptography and Information Security   2020.1

     More details

    Language:English   Publishing type:Research paper, summary (national, other academic conference)  

    researchmap

  • A Consideration for the Indistinguishability of a Geometric Sequence

    Tomoya Tatara, Yuta Kodera, Takuya Kusaka, Yasuyuki Nogami

    Proceedings of the 5th Workshop on Finite Field Theory and its Application for Pseud-Random Sequence   7 - 10   2019.9

     More details

    Language:Japanese   Publishing type:Research paper, summary (national, other academic conference)  

    researchmap

  • Classifying a Random Number Generators Based on a Statistical Feature of the Distribution of Bits

    Yuta Kodera, Takuya Kusaka, Yasuyuki Nogami

    Proceedings of the 5th Workshop on Finite Field Theory and its Application for Pseud-Random Sequence   33 - 40   2019.9

     More details

    Authorship:Lead author   Language:English   Publishing type:Research paper, summary (national, other academic conference)  

    researchmap

  • A New Method to Generate Binary Pseudorandom Number Sequences with the Group Structure by a Nonlinear Filter

    Yuki Taketa, Yuta Kodera, Takuya Kusaka, Yasuyuki Nogami

    Proceedings of the 5th Workshop on Finite Field Theory and its Application for Pseud-Random Sequence   1 - 6   2019.9

     More details

    Language:Japanese   Publishing type:Research paper, summary (national, other academic conference)  

    researchmap

  • A Comparison of Relic-toolkit and ELiPS Libraries for Some Pairing-based Homomorphic Encryption

    Tadaki Kanenari, Yuto Takahashi, Yuta Hashimoto, Yuta Kodera, Takuya Kusaka, Yasuyuki Nogami, Toru Nakanishi

    Proceedings of 2019 Symposium on Cryptography and Information Security   2019.1

     More details

    Language:Japanese   Publishing type:Research paper, summary (national, other academic conference)  

    researchmap

  • A Consideration of the Parameter Selection for a Uniformized Binary Geometric Sequence Generated by Using the Legendre Symbol

    Tomoya Tatara, Yuta Kodera, Takuya Kusaka, Yasuyuki Nogami, Robert H. Morelos-Zaragoza

    Proceedings of 2019 Symposium on Cryptography and Information Security   2019.1

     More details

    Language:Japanese   Publishing type:Research paper, summary (national, other academic conference)  

    researchmap

  • 物理乱数生成器の偏り抑制の一方法

    渡邊翔, 小寺雄太, 籠谷裕人, 野上保之

    情報理論とその応用シンポジウム予稿集(CD-ROM)   42nd   2019

  • Evaluation of Partial Randomness of a Certain Pseudorandom Sequences with Flexible Linear Complexity

    Yuki Taketa, Yuta Kodera, Takuya Kusaka, Yasuyuki Nogami

    Proceedings of the 41th Symposium on Information Theory and its Applications   41st   315 - 320   2018.12

     More details

    Language:Japanese   Publishing type:Research paper, summary (national, other academic conference)  

    J-GLOBAL

    researchmap

  • An Improvement of NTU Sequence Generation Using Sub Extension Field by CVMA

    Toshifumi Matsumoto, Yuta Kodera, Ali Md. Arshad, Takuya Kusaka, Yasuyuki Nogami

    Proceedings of the 41th Symposium on Information Theory and its Applications   41st   327 - 331   2018.12

     More details

    Language:Japanese   Publishing type:Research paper, summary (national, other academic conference)  

    J-GLOBAL

    researchmap

  • A Consideration for an Efficient Implementation of a Pseudorandom Sequence Generated by Trace function and Legendre symbol and Its Randomness Properties

    Yuta Kodera, Takuya Kusaka, Yasuyuki Nogami

    Proceedings of the 41th Symposium on Information Theory and Its Application   321 - 326   2018.12

     More details

    Authorship:Lead author   Language:English   Publishing type:Research paper, summary (national, other academic conference)  

    researchmap

  • Autocorrelation of a Geometric Sequence Binarized over an Odd Characteristic Field

    Yuta Kodera, Takuya Kusaka, Yasuyuki Nogami

    Proceedings of Computer Security Symposium 2018   420 - 424   2018.10

     More details

    Authorship:Lead author   Language:English   Publishing type:Research paper, summary (national, other academic conference)  

    researchmap

  • A Consideration for Utilizing a CSPRNG for a Searchable Symmetric Encryption

    Yuta Kodera, Takuya Kusaka, Yasuyuki Nogami

    Proceedings of the 4th Workshop on Finite Field Theory and its Application for Pseud-Random Sequence   8 - 13   2018.8

     More details

    Authorship:Lead author   Language:English   Publishing type:Research paper, summary (national, other academic conference)  

    researchmap

  • A Pseudorandom Sequence Possessing a Flexibility on the Linear Complexity

    Yuki Taketa, Yuta Kodera, Takuya Kusaka, Yasuyuki Nogami

    Proceedings of the 4th Workshop on Finite Field Theory and its Application for Pseud-Random Sequence   14 - 18   2018.8

     More details

    Language:Japanese   Publishing type:Research paper, summary (national, other academic conference)  

    researchmap

  • Implementation method of the pairing over BN curve using two type of extension fields

    Yuki Nanjo, Md. Al-Amin Khandaker, Yuta Kodera, Yasuyuki Nogami

    Proceedings of 2018 Symposium on Cryptography and Information Security   2018.1

     More details

    Language:Japanese   Publishing type:Research paper, summary (national, other academic conference)  

    researchmap

  • Observation of Distribution on Multi-value Pseudo Random Sequence Generated by Primitive Polynomial over Odd Characteristic Field

    Chiaki Ogawa, Yuta Kodera, Takeru Miyazaki, Satoshi Uehara, Takuya Kusaka, Yasuyuki Nogami

    40th   2017.12

     More details

    Language:Japanese   Publishing type:Research paper, summary (national, other academic conference)  

    J-GLOBAL

    researchmap

  • A Consideration of an Efficient Trace Calculation for a Pseudorandom Generator

    Yuta Kodera, Chiaki Ogawa, Hideaki Muraoka, Shunsuke Araki, Takeru Miyazaki, Satoshi Uehara, Takuya Kusaka, Yasuyuki Nogami

    40th   588 - 592   2017.12

     More details

    Authorship:Lead author   Language:Japanese   Publishing type:Research paper, summary (national, other academic conference)  

    J-GLOBAL

    researchmap

  • A Consideration of an Efficient Calculation over the Extension Field of Degree 3 for Elliptic Curve Pairing Cryptography

    Yuta Kodera, Sylvain Duquesne, Masaaki Shirase, Yasuyuki Nogami

    IEICE Technical Report   116 ( 163(IT2016-30) )   51 - 56   2016.7

     More details

    Authorship:Lead author   Language:Japanese   Publishing type:Internal/External technical report, pre-print, etc.  

    J-GLOBAL

    researchmap

▼display all

Awards

  • SITA貢献賞(会議運営)

    2024.12   情報理論とその応用サブソサイエティ(SITAサブソ)  

     More details

  • 仁科賞

    2020.3   仁科顕彰会  

     More details

  • 第2回金光賞

    2019.3   岡山大学  

     More details

  • Best Paper Award

    2017.6   2017 IEEE ICCE-TW  

     More details

Research Projects

  • A Study of Parallel Pseudorandom Number Generator for Cryptographic Applications

    Grant number:20K23327  2020.09 - 2022.03

    Japan Society for the Promotion of Science  Grants-in-Aid for Scientific Research Grant-in-Aid for Research Activity Start-up  Grant-in-Aid for Research Activity Start-up

    Kodera Yuta

      More details

    Grant amount:\2600000 ( Direct expense: \2000000 、 Indirect expense:\600000 )

    This research focused on a kind of pseudorandom number generator that is especially used for some cryptographic purposes. The target generator, called the Blum-Micali generator, is well-known to be secure based on the discrete logarithm problem, however, it often deals as an inefficient generator due to the large security parameter. To overcome the drawback, this research developed a Blum-Micali-like algorithm that allows generating sequences in parallel. It was evaluated by the NIST test suit and found to be random adequately.
    In addition, the statistical property of other related generators was found. In detail, it was found that a certain generator may have biases on the transition probability between bit patterns though the generator is widely considered to be random enough.

    researchmap

  • 情報セキュリティ応用のための暗号プリミティブに関する研究

    Grant number:19J11794  2019.04 - 2021.03

    日本学術振興会  科学研究費助成事業 特別研究員奨励費  特別研究員奨励費

    小寺 雄太

      More details

    Grant amount:\1900000 ( Direct expense: \1900000 )

    本研究では社会的に広く利活用される代表的な共通鍵暗号方式であるAES暗号へ焦点を当て,AIによる攻撃を想定した脅威評価・対策立案を目的としていた.目標達成に向け,初年度では確定的な計算により乱数を生成する手法(以下,擬似乱数生成器と呼称)を導入し,AES暗号に対するマスキング(処理の秘匿化)を検討している.さらに,使用する乱数の選定を目的として,暗号用途では不可欠な高い非線形性を有する擬似乱数生成器に着目して評価を行った.
    擬似乱数生成器に関する実績として,報告者はまず脆弱性評価を行った.具体的には,NTU系列と呼ばれる極めて高い非線形性を達成する生成器に対して,生成に使用される加法的なパラメータが脆弱性となりえることを群論と紐づけることで理論的に示した.これにより脆弱性を回避するための推奨パラメータを示したことになる.
    さらに,AI攻撃に対する乱数の有効性を確認するため,ニューラルネットワークを用いた識別実験および乱数値の出力予測を実施した.それぞれの結果として,統計的性質に特徴的な違いがあると識別可能であり,非線形性が低いと出力予測ができることが実験的に判明した.裏を返せば従来の乱数特性を適切に満たすことでAIに対しても有効である可能性が高いといえる.
    上記を踏まえ,AES暗号内の処理をマスキングしたまま実施する手法を提案した.この手法は世界最小ハードウェア実装を実現する構成法をベースとしており,本構成では従来困難であった全処理の秘匿化を達成した.さらに,応用先として検索可能暗号と呼ばれる次世代の暗号方式に着目し,新規の手法を提案した.この手法ではCSVなどの行列形式で表現可能なデータを対象として,キーワードの位置を加味することにより,あるキーワードが重複して存在している場合でも区別して秘匿検索を行うことができる.
    初年度目における業績の概要は以上の通りである.

    researchmap

 

Class subject in charge

  • Security Implementation Exercise A (2024academic year) Summer concentration  - その他

  • Security Implementation Exercise B (2024academic year) Third semester  - その他

  • Introduction to Security (2024academic year) 3rd and 4th semester  - 月7~8

  • Introduction to Information Security (2024academic year) 3rd and 4th semester  - 月7~8

  • Network Programming Experiments (2024academic year) 1st and 2nd semester  - [第1学期]水5~8,その他, [第2学期]水5~8

  • Hardware Security Experiments (2024academic year) Summer concentration  - その他

  • Hardware Security Experiments (2024academic year) Third semester  - その他

  • Distributed Date Management Training (2024academic year) Summer concentration  - その他

  • Technical English B2 (2024academic year) Fourth semester  - 水7~8

  • Laboratory Work and Practice on Basic Engineering (2024academic year) 1st and 2nd semester  - 火5~8

  • Laboratory Work and Practice on Basic Engineering (2024academic year) 1st and 2nd semester  - その他

  • Engineering English (2024academic year) Late  - その他

  • Engineering English(Communication Network Engineering) (2024academic year) Late  - 木3~4

  • Mathematical Cryptography (2024academic year) Prophase  - 木1~2

  • Mathematical Cryptography (2024academic year) Prophase  - 木1~2

  • Advanced Study (2024academic year) Other  - その他

  • Collision-based Cryptanalysis Exercise (2024academic year) Summer concentration  - その他

  • Technical Writing (2024academic year) Prophase  - その他

  • Technical Writing(Communication Network Engineering) (2024academic year) Prophase  - 水6~8

  • Technical Presentation (2024academic year) Late  - その他

  • Technical Presentation(Communication Network Engineering) (2024academic year) Late  - 水6~8

  • Specific Research of Electronics and Information Systems Engineering (2024academic year) Year-round  - その他

  • Electrical and Communication Engineering Lab C (2024academic year) 3rd and 4th semester  - その他

  • Security Implementation Exercise A (2023academic year) Summer concentration  - その他

  • Introduction to Security (2023academic year) 3rd and 4th semester  - 月7~8

  • Introduction to Information Security (2023academic year) 3rd and 4th semester  - 月7~8

  • Network Programming Experiments (2023academic year) 1st and 2nd semester  - 水5~8

  • Hardware Security Experiments (2023academic year) Summer concentration  - その他

  • Hardware Security Experiments (2023academic year) Third semester  - その他

  • Programming (2023academic year) 3rd and 4th semester  - 水1~2

  • Programming (2023academic year) 3rd and 4th semester  - 水1~2

  • Programming 1 (2023academic year) Third semester  - 水1~2

  • Programming 2 (2023academic year) Fourth semester  - 水1~2

  • Distributed Date Management Training (2023academic year) Summer concentration  - その他

  • Technical English B2 (2023academic year) Fourth semester  - その他

  • Laboratory Work and Practice on Basic Engineering (2023academic year) 1st and 2nd semester  - 火5~8

  • Laboratory Work and Practice on Basic Engineering (2023academic year) 1st and 2nd semester  - 火5~8

  • Laboratory Work and Practice on Basic Engineering (2023academic year) 1st and 2nd semester  - その他

  • Engineering English (2023academic year) Late  - その他

  • Engineering English(Communication Network Engineering) (2023academic year) Late  - 木3~4

  • Mathematical Cryptography (2023academic year) Prophase  - 木1~2

  • Mathematical Cryptography (2023academic year) Prophase  - 木1~2

  • Advanced Study (2023academic year) Other  - その他

  • Collision-based Cryptanalysis Exercise (2023academic year) Summer concentration  - その他

  • Technical Writing (2023academic year) Prophase  - その他

  • Technical Writing(Communication Network Engineering) (2023academic year) Prophase  - 水6~8

  • Technical Presentation (2023academic year) Late  - その他

  • Technical Presentation(Communication Network Engineering) (2023academic year) Late  - 水6~8

  • Specific Research of Electronics and Information Systems Engineering (2023academic year) Year-round  - その他

  • Electrical and Communication Engineering Lab C (2023academic year) 3rd and 4th semester  - その他

  • Security Implementation Exercise A (2022academic year) Summer concentration  - その他

  • Security Implementation Exercise B (2022academic year) Third semester  - その他

  • Introduction to Security (2022academic year) 3rd and 4th semester  - 水7~8

  • Distributed Date Management Training (2022academic year) Summer concentration  - その他

  • Laboratory Work and Practice on Basic Engineering (2022academic year) 1st and 2nd semester  - 火5~8

  • Laboratory Work and Practice on Basic Engineering (2022academic year) 1st and 2nd semester  - 火5~8

  • Laboratory Work and Practice on Basic Engineering (2022academic year) 1st and 2nd semester  - その他

  • Mathematical Cryptography (2022academic year) Prophase  - 木1,木2

  • Specific Research of Electronics and Information Systems Engineering (2022academic year) Year-round  - その他

  • Electrical and Communication Engineering Lab C (2022academic year) 3rd and 4th semester  - 火3~7

  • Security Implementation Exercise A (2021academic year) Summer concentration  - その他

  • Distributed Date Management Training (2021academic year) Summer concentration  - その他

  • Laboratory Work and Practice on Basic Engineering (2021academic year) 1st and 2nd semester  - その他

  • Laboratory Work and Practice on Basic Engineering (2021academic year) 1st and 2nd semester  - 火5,火6,火7,火8

  • Electrical and Communication Engineering Lab C (2021academic year) 3rd and 4th semester  - 火3,火4,火5,火6,火7

  • Exercises on Cross-site Scripting Prevention (2020academic year) Summer concentration  - その他

  • Basic of information security E (2020academic year) 3rd and 4th semester  - 水7,水8

  • Collision-based Attack on Cryptography for Security Evaluation (2020academic year) Summer concentration  - その他

  • Laboratory Work and Practice on Basic Engineering (2020academic year) 1st and 2nd semester  - 火4,火5,火6,火7

  • Laboratory Work and Practice on Basic Engineering (2020academic year) 1st and 2nd semester  - 火4,火5,火6,火7

  • Cryptographic Hardware Security (2020academic year) Fourth semester  - その他

  • Communication Network Engineering Lab II (2020academic year) 3rd and 4th semester  - 火3,火4,火5,火6,火7

  • Electrical and Communication Engineering Lab C (2020academic year) 3rd and 4th semester  - 火3,火4,火5,火6,火7

  • Electrical and Communication Engineering Lab III (2020academic year) 3rd and 4th semester  - 火3,火4,火5,火6,火7

▼display all

 

Social Activities

▼display all

Media Coverage

  • 顧客の行動分析、フードロス削減へ Newspaper, magazine

    株式会社 日本経済新聞社  日本経済新聞社  2022.6.29

     More details

    Author:Other 

    researchmap