|
Publication List - Masahiro Ishii (23 entries)
Journal Paper
-
M. Ishii,
M. Uno,
A. Inomata,
I. Arai,
K. Fujikawa.
A RAT Detection Method by Using Packet Entropy on Early Intrusion Stage,
IEICE Transactions on Communications (Japanese Edition),
Vol. J101-B,
No. 3,
pp. 220-232,
Mar. 2018.
-
M. Ishii.
Pairings on Hyperelliptic Curves with Considering Recent Progress on the NFS Algorithms,
In Mathematical Modelling for Next-Generation Cryptography: CREST Crypto-Math Project,
pp. 81-96,
July 2017.
-
M. Ishii,
J. Detrey,
P. Gaudry,
A. Inomata,
K. Fujikawa.
Fast Modular Arithmetic on the Kalray MPPA-256 Processor for an Energy-Efficient Implementation of ECM,
IEEE Transactions on Computers,
Vol. PP,
No. 99,
May 2017.
-
M. Ishii,
A. Inomata,
K. Fujikawa.
A Weil Pairing on a Family of Genus 2 Hyperelliptic Curves with Efficiently Computable Automorphisms,
IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences, Special Section on Cryptography and Information Security,
Vol. E100-A,
No. 01,
pp. 62-72,
Jan. 2017.
International Conference (Reviewed)
-
Masahiro Ishii,
Kento Mori,
Ryoichi Kuwana,
Satoshi Matsuura.
Multi-label Classification of Cybersecurity Text with Distant Supervision,
Proceedings of the 17th International Conference on Availability, Reliability and Security,
Aug. 2022.
Official location
-
Masahiro Ishii,
Satoshi Matsuura,
Kento Mori,
Masahiko Tomoishi,
Yong Jin,
Yoshiaki Kitaguchi.
A Study of Classification of Texts into Categories of Cybersecurity Incident and Attack with Topic Models,
Proceedings of the 6th International Conference on Information Systems Security and Privacy (ICISSP 2020),
pp. 639-646,
Feb. 2020.
Official location
-
M. Ishii,
A. Inomata,
K. Fujikawa.
A Construction of a Twisted Ate Pairing on a Family of Kawazoe-Takahashi Curves at 192-bit Security Level and Its Cost Estimate,
2nd International Conference on Information Systems Security and Privacy (ICISSP 2016),
pp. 432-439,
Feb. 2016.
Domestic Conference (Not reviewed / Unknown)
-
Satoshi Shibuya,
Masahiro Ishii,
KEISUKE TANAKA.
暗号化通信におけるマイニング検知,
2024年暗号と情報セキュリティシンポジウム (SCIS2024),
Jan. 2024.
-
Daiki Hayashida,
Masahiro Ishii.
An analysis of the cost to find an isomorphism between hyperelliptic curves in isogeny-based cryptography,
IEICE Tech. Rep.,
vol. 122,
no. 428,
pp. 61-67,
Mar. 2023.
-
Daiki Hayashida,
Masahiro Ishii.
A study of explicit formulae of the isogenies between abelian surfaces,
信学技報,
vol. 121,
no. 429,
pp. 122-129,
Mar. 2022.
-
Takanori Yasuda,
Masahiro Ishii,
Tadanori Teruya.
A Note on Group Membership Check in Elliptic Curves for Pairings,
2022年暗号と情報セキュリティシンポジウム (SCIS2022),
Jan. 2022.
-
Masahiro Ishii,
Kento Mori,
Ryoichi Kuwana,
Satoshi Matsuura.
Multi-label Classification of Cybersecurity Text with Distant Supervision,
2022年暗号と情報セキュリティシンポジウム (SCIS2022),
Jan. 2022.
-
Yugo Koyanagi,
Masahiro Ishii,
KEISUKE TANAKA.
Concurrent Group Operations on TreeKEM,
2022年暗号と情報セキュリティシンポジウム (SCIS2022),
2022年暗号と情報セキュリティシンポジウム (SCIS2022),
Jan. 2022.
-
Masahiro Ishii,
Tadanori Teruya,
Takanori Yasuda.
Efficient Pairing Algorithms Using Twists of Degree 3,
Proceedings of Computer Security Symposium (CSS) 2020,
pp. 1080-1087,
Oct. 2020.
-
Saya Endo,
Masahiro Ishii,
KEISUKE TANAKA.
暗号通貨マイニング通信の深層学習による分類,
2020年暗号と情報セキュリティシンポジウム (SCIS2020),
Jan. 2020.
-
Takeshi Oozu,
Masahiro Ishii,
KEISUKE TANAKA.
Dropout-Tolerant Mental Poker Protocol with Small Deposit and Optimal Upper Bound on Number of Dropouts,
2020年暗号と情報セキュリティシンポジウム (SCIS2020),
Jan. 2020.
-
Kento Mori,
Masahiro Ishii,
Satoshi Matsuura,
Yong Jin,
Yoshiaki Kitaguchi,
Masahiko Tomoishi.
セキュリティ事案における知見の蓄積・活用を可能とする対応フローの提案と実装,
第46回 インターネットと運用技術 (IOT) 研究会,
研究報告インターネットと運用技術(IOT),
Information Processing Society of Japan,
Vol. 2019-IOT-46,
No. 2,
pp. 1-8,
June 2019.
Official location
-
Masahiro Ishii,
Kento Mori,
Satoshi Matsuura,
Yong Jin,
Yoshiaki Kitaguchi,
MASAHIKO TOMOISHI.
東工大CERTにおけるインシデント対応の分析とその自動化に関する考察,
第43回 インターネットと運用技術 (IOT) 研究会,
研究報告インターネットと運用技術(IOT),
Information Processing Society of Japan,
Vol. 2018-IOT-43,
No. 2,
pp. 1-8,
Sept. 2018.
Official location
-
KEISUKE TANAKA,
Takeshi Oozu,
Kotoko Yamada,
Masahiro Ishii.
k匿名化の複雑さについて,
冬のLAシンポジウム2017,
Feb. 2018.
-
KEISUKE TANAKA,
Kotoko Yamada,
Takeshi Oozu,
Masahiro Ishii.
k匿名化の近似アルゴリズムについて,
冬のLAシンポジウム2017,
Feb. 2018.
-
KEISUKE TANAKA,
Takeshi Oozu,
Kotoko Yamada,
Masahiro Ishii.
大きいkに対するk匿名化の複雑さ,
2018年暗号と情報セキュリティシンポジウム (SCIS2018),
Jan. 2018.
-
KEISUKE TANAKA,
Kotoko Yamada,
Takeshi Oozu,
Masahiro Ishii.
大きいkに対するk匿名化近似アルゴリズム,
2018年暗号と情報セキュリティシンポジウム (SCIS2018),
Jan. 2018.
-
KEISUKE TANAKA,
Masahiro Ishii,
Zen Inomata,
Chingun Oyunbileg,
京山剛大,
Keisuke Kuroda,
Takumi Satou,
Mitsuyoshi Sugaya,
Ryuichiro Chiba,
Tosikazu Nisiwaki,
橋本幸典,
廣野壮志,
Satoshi Matsuura,
森健人.
プロキシログのクラスタ間遷移に着目した異常検知手法の評価,
2018年暗号と情報セキュリティシンポジウム (SCIS2018),
Jan. 2018.
[ Save as BibTeX ]
[ Paper, Presentations, Books, Others, Degrees: Save as CSV
]
[ Patents: Save as CSV
]
|