FullText URL fulltext.pdf
Author He, Yixuan| Kodera, Yuta| Nogami, Yasuyuki| Huda, Samsul|
Keywords proactive secret sharing user revocation threshold homomorphic encryption non-interactive
Published Date 2025-12-11
Publication Title Cryptography
Volume volume9
Issue issue4
Publisher MDPI AG
Start Page 80
ISSN 2410-387X
Content Type Journal Article
language English
OAI-PMH Set 岡山大学
Copyright Holders © 2025 by the authors.
File Version publisher
DOI 10.3390/cryptography9040080
Web of Science KeyUT 001646191700001
Related Url isVersionOf https://doi.org/10.3390/cryptography9040080
FullText URL fulltext.pdf
Author Rahayu, Maya| Hossain, Md. Biplob| Huda, Samsul| Nogami, Yasuyuki|
Keywords VANET security blockchain integrated authentication server Kerberos authentication Vehicular Ad Hoc Network
Published Date 2025-10-30
Publication Title Sensors
Volume volume25
Issue issue21
Publisher MDPI AG
Start Page 6651
ISSN 1424-8220
Content Type Journal Article
language English
OAI-PMH Set 岡山大学
Copyright Holders © 2025 by the authors.
File Version publisher
PubMed ID 41228874
DOI 10.3390/s25216651
Web of Science KeyUT 001613035900001
Related Url isVersionOf https://doi.org/10.3390/s25216651
FullText URL fulltext.pdf
Author Huda, Samsul| Musthafa, Muhammad Bisri| Shamim, S. M.| Nogami, Yasuyuki|
Keywords agricultural IoT Zeek IDS intrusion detection systems open-source security tools Agriculture 4.0 cybersecurity Raspberry Pi
Published Date 2025-10-16
Publication Title Journal of Computational and Cognitive Engineering
Volume volume5
Issue issue1
Publisher BON VIEW PUBLISHING PTE
Start Page 133
End Page 142
ISSN 2810-9503
Content Type Journal Article
language English
OAI-PMH Set 岡山大学
Copyright Holders © The Author(s) 2025.
File Version publisher
DOI 10.47852/bonviewjcce52026303
Related Url isVersionOf https://doi.org/10.47852/bonviewjcce52026303
FullText URL fulltext.pdf
Author Musthafa, Muhammad Bisri| Huda, Samsul| Nguyen, Tuy Tan| Kodera, Yuta| Nogami, Yasuyuki|
Keywords Internet of things intrusion detection system stacked lstm pruning model optimizing model quantization model raspberry pi real-time detection apache kafka
Published Date 2025-06-30
Publication Title IEEE Access
Volume volume13
Publisher Institute of Electrical and Electronics Engineers (IEEE)
Start Page 113544
End Page 113556
ISSN 2169-3536
Content Type Journal Article
language English
OAI-PMH Set 岡山大学
Copyright Holders © 2025 The Authors.
File Version publisher
DOI 10.1109/access.2025.3584373
Web of Science KeyUT 001522917600018
Related Url isVersionOf https://doi.org/10.1109/access.2025.3584373
FullText URL fulltext.pdf
Author Nguyen, Hien| Huda, Samsul| Nogami, Yasuyuki| Nguyen, Tuy Tan|
Keywords Post-quantum cryptography lattice-based cryptography number theoretic transform hardware and software implementation
Published Date 2025-05-19
Publication Title IEEE Access
Volume volume13
Publisher Institute of Electrical and Electronics Engineers (IEEE)
Start Page 89003
End Page 89024
ISSN 2169-3536
Content Type Journal Article
language English
OAI-PMH Set 岡山大学
Copyright Holders © 2025 The Authors.
File Version publisher
DOI 10.1109/access.2025.3571307
Web of Science KeyUT 001498285200014
Related Url isVersionOf https://doi.org/10.1109/access.2025.3571307
FullText URL fulltext.pdf
Author Santoso, Andri| Huda, Samsul| Kodera, Yuta| Nogami, Yasuyuki|
Keywords facial privacy protection selective facial encryption multi-user access control deep-learning applications online photo platform
Published Date 2025-03-11
Publication Title Future Internet
Volume volume17
Issue issue3
Publisher MDPI
Start Page 124
ISSN 1999-5903
Content Type Journal Article
language English
OAI-PMH Set 岡山大学
Copyright Holders © 2025 by the authors.
File Version publisher
DOI 10.3390/fi17030124
Web of Science KeyUT 001452302000001
Related Url isVersionOf https://doi.org/10.3390/fi17030124
FullText URL fulltext.pdf
Author Rahayu, Maya| Hossain, Md. Biplob| Huda, Samsul| Kodera, Yuta| Ali, Md. Arshad| Nogami, Yasuyuki|
Keywords Vehicular Ad-Hoc Network Kerberos authentication blockchain
Published Date 2024-11-21
Publication Title Sensors
Volume volume24
Issue issue23
Publisher MDPI
Start Page 7428
ISSN 1424-8220
Content Type Journal Article
language English
OAI-PMH Set 岡山大学
Copyright Holders © 2024 by the authors.
File Version publisher
PubMed ID 39685965
DOI 10.3390/s24237428
Web of Science KeyUT 001378182500001
Related Url isVersionOf https://doi.org/10.3390/s24237428
FullText URL fulltext.pdf
Author Nasu, Hiroaki| Kodera, Yuta| Nogami, Yasuyuki|
Keywords business-to-business data collaboration industrial supply chain blockchain homomorphic encryption
Published Date 2022-06-29
Publication Title Sensors
Volume volume22
Issue issue13
Publisher MDPI
Start Page 4909
ISSN 1424-8220
Content Type Journal Article
language English
OAI-PMH Set 岡山大学
Copyright Holders © 2022 by the authors.
File Version publisher
PubMed ID 35808403
DOI 10.3390/s22134909
Web of Science KeyUT 000825497700001
Related Url isVersionOf https://doi.org/10.3390/s22134909
FullText URL fulltext.pdf
Author Kodera, Yuta| Sato, Ryoichi| Ali, Md Arshad| Kusaka, Takuya| Nogami, Yasuyuki|
Keywords true random number generator ring oscillator Markov process hypothesis testing
Published Date 2022-05-31
Publication Title Entropy
Volume volume24
Issue issue6
Publisher MDPI
Start Page 780
ISSN 1099-4300
Content Type Journal Article
language English
OAI-PMH Set 岡山大学
Copyright Holders © 2022 by the authors.
File Version publisher
PubMed ID 35741501
DOI 10.3390/e24060780
Web of Science KeyUT 000816552500001
Related Url isVersionOf https://doi.org/10.3390/e24060780
FullText URL fulltext.pdf
Author Sato, Ryoichi| Kodera, Yuta| Ali, Md. Arshad| Kusaka, Takuya| Nogami, Yasuyuki| Morelos-Zaragoza, Robert H.|
Keywords entropy field programmable gate array true random number generator period ring oscillator stomatic process state transition XOR gate
Published Date 2021-09-05
Publication Title Entropy
Volume volume23
Issue issue9
Publisher MDPI
Start Page 1168
ISSN 1099-4300
Content Type Journal Article
language English
OAI-PMH Set 岡山大学
Copyright Holders © 2021 by the authors.
File Version publisher
PubMed ID 34573793
DOI 10.3390/e23091168
Web of Science KeyUT 000699789000001
Related Url isVersionOf https://doi.org/10.3390/e23091168
JaLCDOI 10.18926/49322
FullText URL mfe_047_025_032.pdf
Author Nekado, Kenta| Takai, Yusuke| Nogami, Yasuyuki|
Abstract Pairing–based cryptosystems are well implemented with Ate–type pairing over Barreto–Naehrig (BN) curve. Then, for instance, their securities depend on the difficulty of Discrete Logarithm Problem (DLP) on the so–denoted G3 over BN curve. This paper, in order to faster solve the DLP, first proposes to utilize Gauss period Normal Basis (GNB) for Pollard’s rho method, and then considers to accelerate the solving by an adoption of lazy random walk, namely tag tracing technique proposed by Cheon et al.
Publication Title Memoirs of the Faculty of Engineering, Okayama University
Published Date 2013-01
Volume volume47
Start Page 25
End Page 32
ISSN 1349-6115
language English
Copyright Holders Copyright © by the authors
File Version publisher
NAID 120005232374
JaLCDOI 10.18926/49321
FullText URL mfe_047_019_024.pdf
Author Nogami, Yasuyuki| Sumo, Taichi|
Abstract Recent efficient pairings such as Ate pairing use two efficient rational point subgroups such that π(P) = P and π(Q) = [p]Q, where π, p, P, and Q are the Frobenius map for rational point, the characteristic of definition field, and torsion points for pairing, respectively. This relation accelerates not only pairing but also pairing–related operations such as scalar multiplications. It holds in the case that the embedding degree k divides r − 1, where r is the order of torsion rational points. Thus, such a case has been well studied. Alternatively, this paper focuses on the case that the degree divides r + 1 but does not divide r − 1. Then, this paper shows a multiplicative representation for r–torsion points based on the fact that the characteristic polynomial f(π) becomes irreducible over Fr for which π also plays a role of variable.
Keywords pairing–friendly curve torsion point group structure rank
Publication Title Memoirs of the Faculty of Engineering, Okayama University
Published Date 2013-01
Volume volume47
Start Page 19
End Page 24
ISSN 1349-6115
language English
Copyright Holders Copyright © by the authors
File Version publisher
NAID 120005232373
JaLCDOI 10.18926/46982
FullText URL mfe_37_2_073_087.pdf
Author Nogami, Yasuyuki| Morikawa, Yoshitaka|
Abstract Public key cryptosystem has many uses, such as to sign digitally, to realize electronic commerce. Especially, RSA public key cryptosystem has been the most widely used, but its key for ensuring sufficient security reaches about 2000 bits long. On the other hand, elliptic curve cryptosystem(ECC) has the same security level with about 7-fold smaller length key. Accordingly, ECC has been received much attention and implemented on various processors even with scarce computation resources. In this paper, we deal with an elliptic curve which is defined over extension field F(p2c) and has a prime order, where p is the characteristic and c is a non negative integer. In order to realize a fast software implementation of ECC adopting such an elliptic curve, a fast implementation method of definition field F(p2c) especially F(p8) is proposed by using a technique called successive extension. First, five fast implementation methods of base field F(p2) are introduced. In each base field implementation, calculation costs of F(p2)-arithmetic operations are evaluated by counting the numbers of F(p)-arithmetic operations. Next, a successive extension method which adopts a polynomial basis and a binomial as the modular polynomial is proposed with comparing to a conventional method. Finally, we choose two prime numbers as the characteristic, and consider several implementations for definition field F(p8) by using five base fields and two successive extension methods. Then, one of these implementations is especially selected and implemented on Toshiba 32-bit micro controller TMP94C251(20MHz) by using C language. By evaluating calculation times with comparing to previous works, we conclude that proposed method can achieve a fast implementation of ECC with a prime order.
Publication Title Memoirs of the Faculty of Engineering, Okayama University
Published Date 2003-03
Volume volume37
Issue issue2
Start Page 73
End Page 87
ISSN 0475-0071
language English
File Version publisher
NAID 80015999992
JaLCDOI 10.18926/44500
FullText URL mfe_045_054_059.pdf
Author Nekado, Kenta| Takai, Yusuke| Nogami, Yasuyuki| Morikawa, Yoshitaka|
Abstract Recently, pairing–based cryptographies have attracted much attention. For fast pairing calculation, not only pairing algorithms but also arithmetic operations in extension field should be efficient. Especially for final exponentiation included in pairing calculation, squaring is more important than multiplication. This paper considers squaring algorithms efficient for cubic extension field which is often used for pairing implementaions.
Publication Title Memoirs of the Faculty of Engineering, Okayama University
Published Date 2011-01
Volume volume45
Start Page 54
End Page 59
ISSN 1349-6115
language English
Copyright Holders Copyright © by the authors
File Version publisher
NAID 80021759252
JaLCDOI 10.18926/44499
FullText URL mfe_045_046_053.pdf
Author Nogami, Yasuyuki| Yanagi, Erika| Izuta, Tetsuya| Morikawa, Yoshitaka|
Abstract Recently, composite order pairing–based cryptographies have received much attention. The composite order needs to be as large as the RSA modulus. Thus, they require a certain pairing–friendly elliptic curve that has such a large composite order. This paper proposes an efficient algorithm for generating an ordinary pairing–friendly elliptic curve of the embedding degree 1 whose order has two large prime factors as the RSA modulus. In addition, the generated pairing–friendly curve has an efficient structure for the Gallant–Lambert–Vanstone (GLV) method.
Publication Title Memoirs of the Faculty of Engineering, Okayama University
Published Date 2011-01
Volume volume45
Start Page 46
End Page 53
ISSN 1349-6115
language English
Copyright Holders Copyright © by the authors
File Version publisher
NAID 120002905955
JaLCDOI 10.18926/19961
FullText URL Mem_Fac_Eng_OU_44_69.pdf
Author Nekado, Kenta| Kato, Hidehiro| Nogami, Yasuyuki| Morikawa, Yoshitaka|
Abstract Recently, pairing–based cryptographies have attracted much attention. For fast pairing calculation, not only pairing algorithms but also arithmetic operations in extension field should be efficient. Especially for final exponentiation included in pairing calculation, squaring is more important than multiplication. This paper proposes an efficient squaring algorithm in extension field for Freeman curve.
Publication Title Memoirs of the Faculty of Engineering, Okayama University
Published Date 2010-01
Volume volume44
Start Page 69
End Page 72
ISSN 1349-6115
language English
File Version publisher
NAID 120002309070
JaLCDOI 10.18926/19960
FullText URL Mem_Fac_Eng_OU_44_60.pdf
Author Nogami, Yasuyuki| Morikawa, Yoshitaka|
Abstract This paper proposes a method for generating a certain composite order ordinary pairing–friendly elliptic curve of embedding degree 3. In detail, the order has two large prime factors such as the modulus of RSA cryptography. The method is based on the property that the order of the target pairing–friendly curve is given by a polynomial as r(X) of degree 2 with respect to the integer variable X. When the bit size of the prime factors is about 500 bits, the proposed method averagely takes about 15 minutes on Core 2 Quad (2.66Hz) for generating one.
Publication Title Memoirs of the Faculty of Engineering, Okayama University
Published Date 2010-01
Volume volume44
Start Page 60
End Page 68
ISSN 1349-6115
language English
File Version publisher
NAID 120002309063
JaLCDOI 10.18926/17853
FullText URL Mem_Fac_Eng_OU_43_113.pdf
Author Sakemi, Yumi| Kato, hidehiro| Nogami, Yasuyuki| Morikawa, Yoshikawa|
Abstract Barreto–Naehrig (BN) curve has been introduced as an efficient pairing-friendly elliptic curve over prime field F(p) whose embedding degree is 12. The characteristic and Frobenius trace are given as polynomials of integer variable X. The authors proposed an improvement of Miller's algorithm of twisted Ate pairing with BN curve by applying X of small hamming weight in ITC–CSCC2008; however, its cost evaluation has not been explicitly shown. This paper shows the detail of the cost evaluation.
Publication Title Memoirs of the Faculty of Engineering, Okayama University
Published Date 2009-01
Volume volume43
Start Page 113
End Page 116
ISSN 1349-6115
language English
File Version publisher
NAID 120002308945
JaLCDOI 10.18926/17851
FullText URL Mem_Fac_Eng_OU_43_108.pdf
Author Nekado, Kenta| Kato, Hidehiro| Nogami, Yasuyuki| Morikawa, Yoshitaka|
Abstract Recently, pairing-based cryptographies such as ID-based cryptography and group signature have been studied. For fast pairing calculation, not only pairing algorithms but also arithmetic operations in extension field must be efficiently carried out. The authors show efficient arithmetic operations of extension field for Xate pairing especially with Freeman curve.
Publication Title Memoirs of the Faculty of Engineering, Okayama University
Published Date 2009-01
Volume volume43
Start Page 108
End Page 112
ISSN 1349-6115
language English
File Version publisher
NAID 120002308904
JaLCDOI 10.18926/17849
FullText URL Mem_Fac_Eng_OU_43_99.pdf
Author Kato, Hidehiro| Nogami, Yasuyuki| Morikawa, Yoshitaka|
Abstract A square root (SQRT) algorithm in extension field F(p(m))(m = r(0)r(1)・・・r(n−1)・2(d), r(i) : odd prime, d : positive integer) is proposed in this paper. First, a conventional SQRT algorithm, the Tonelli-Shanks algorithm, is modified to compute the inverse SQRT in F(p(2d)), where most of the computations are performed in the corresponding subfields F(p(2i)) for 0 ≤ i ≤ d-1. Then the Frobenius mappings with addition chain are adopted for the proposed SQRT algorithm, in which a lot of computations in a given extension field F(p(m)) are also reduced to those in a proper subfield by the norm computations. Those reductions of the field degree increase efficiency in the SQRT implementation. The Tonelli-Shanks algorithm and the proposed algorithm in F(p(6)) and F(p(10)) were implemented on a Core2 (2.66 GHz) using the C++ programming language. The computer simulations showed that, on average, the proposed algorithm accelerated the SQRT computation by 6 times in F(p(6)), and by 10 times in F(p(10)), compared to the Tonelli-Shanks algorithm.
Publication Title Memoirs of the Faculty of Engineering, Okayama University
Published Date 2009-01
Volume volume43
Start Page 99
End Page 107
ISSN 1349-6115
language English
File Version publisher
NAID 120002308980