Tokyo Institute of Technology
Global Scientific Information and Computing Center (GSIC)
Assistant Professor
A Member of Tokyo Tech Computer Emergency Response Team (T2 CERT)
Collaborate with Tanaka Laboratory
Email: mishii [at] gsic.titech.ac.jp
Born
Aug. 1986: Hiroshima, Japan
Education
Sep. 2016: Graduate School of Information Science, Nara Institute of Science and Technology, Ph.D. in Engineering
Feb. 2014 - Jan. 2015: Visiting Ph.D. student, INRIA (Institut National de Recherche en Informatique et en Automatique) Nancy - Grand Est, LORIA (Laboratoire Lorrain de Recherche en Informatique et ses Applications), CARAMEL Project-team
Mar. 2013: Graduate School of Information Science, Nara Institute of Science and Technology, M.S. in Engineering
Mar. 2011: Graduate School of Mathematics, Nagoya University, M.S. in Mathematical Science
Mar. 2009: Department of Mathematics, Faculty of Science, Hiroshima University, B.S. in Science
Mar. 2005: Hiroshima Prefectural Miyoshi High School
Work Experience
Jan. 2018 - Current: Assistant Professor in Global Scientific Information and Computing Center (GSIC) at Tokyo Institute of Technology
May 2021 - Current: Collaborating Visitor of Cryptography Platform Research Team, Cyber Physical Security Research Center, National Institute of Advanced Industrial Science and Technology (AIST)
Oct. 2016 - Mar. 2022: A member of research project CryptoMathCREST supported by CREST, JST
Oct. 2016 - Dec. 2017: Specially Appointed Assistant Professor in School of Computing at Tokyo Institute of Technology
Apr. 2016 - Jul. 2016: Research assistant in NAIST
Apr. 2015 - Jul. 2015: Research assistant in NAIST
Oct. 2013 - Feb. 2014: Research assistant in NAIST
Jul. 2013 - Mar. 2014: Internship at Cybozu Labs
Apr. 2013 - Jul. 2013: Research assistant in NAIST
Apr. 2012 - Mar. 2013: Teaching assistant for IT-Keys in NAIST
Oct. 2011: Internship at Fujitsu Laboratories
Research Topic
Public-key cryptography, especially (hyper)elliptic curve cryptography, pairing-based cryptography
Efficient software implementation of cryptographic algorithms on CPU and GPU
Post-quantum cryptography
Topics in cyber security (using machine learning algorithms)
M. Ishii, M. Uno, A. Inomata, I. Arai and K. Fujikawa: "A RAT Detection Method by Using Packet Entropy on Early Intrusion Stage",
IEICE Transactions on Communications (Japanese Edition), Vol. J101-B, No. 3, pp. 220-232, 2018.
2017
M. Ishii, J. Detrey, P. Gaudry, A. Inomata and K. Fujikawa: "Fast Modular Arithmetic on the Kalray MPPA-256 Processor for an Energy-Efficient Implementation of ECM",
IEEE Transactions on Computers, Vol. 66, Issue 12, pp. 2019-2030, doi: 10.1109/TC.2017.2704082, 2017. IEEE Xplore
M. Ishii, A. Inomata and K. Fujikawa: "A Weil Pairing on a Family of Genus 2 Hyperelliptic Curves with Efficiently Computable Automorphisms",
IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences, Special Section on Cryptography and Information Security, Vol. E100-A, No. 01, pp. 62-72, 2017.
International Conferences
2022
M. Ishii, K. Mori, R. Kuwana and S. Matsuura: "Multi-label Classification of Cybersecurity Text with Distant Supervision,
In Proceedings of the 17th International Conference on Availability, Reliability and Security (ARES '22), Association for Computing Machinery, New York, NY, USA, Article 93, 1–9, 2022.
2020
M. Ishii, S. Matsuura, K. Mori, M. Tomoishi, Y. Jin and Y. Kitaguch: "A Study of Classification of Texts into Categories of Cybersecurity Incident and Attack with Topic Models",
In Proceedings of the 6th International Conference on Information Systems Security and Privacy (ICISSP 2020), pp. 639-646, 2020.
2016
M. Ishii, A. Inomata and K. Fujikawa: "A Construction of a Twisted Ate Pairing on a Family of Kawazoe-Takahashi Curves at 192-bit Security Level and Its Cost Estimate",
In proceedings of the 2nd International Conference on Information Systems Security and Privacy (ICISSP 2016), pp. 432-439, 2016.
2015
M. Ishii, A. Inomata and K. Fujikawa: "Pairings on genus 2 curves at high security level and fast implementation of the pairings on Haswell processor (poster presentation)",
In IWSEC (International Workshop on Security) 2015 Poster Session.
2014
M. Ishii, A. Inomata and K. Fujikawa: "Parallel GPU Implementation of $\eta_T$ Pairing over Fields of Characteristic Two",
In ICNCS 2014, International Journal of Computer and Communication Engineering, Vol. 3, No. 3, pp. 193-198, 2014.
Technical Reports
2017
M. Ishii: "Pairings on Hyperelliptic Curves with Considering Recent Progress on the NFS Algorithms",
In Mathematical Modelling for Next-Generation Cryptography: CREST Crypto-Math Project, pp. 81-96, doi: 10.1007/978-981-10-5065-7_5, Springer Singapore, 2017.
National (Japanese) Conferences
2024
S. Shibuya, M. Ishii and K. Tanaka: "Mining Detection in Encrypted Traffic",
In Proceedings of Symposium on Cryptography and Information Security (SCIS) 2024, 2024.
2023
D. Hayashida and M. Ishii: "An analysis of the cost to find an isomorphism between hyperelliptic curves in isogeny-based cryptography",
IEICE Tech. Rep., vol. 122, no. 428, ISEC2022-56, pp. 61-67, 2023.
2022
D. Hayashida and M. Ishii: "A study of explicit formulae of the isogenies between abelian surfaces",
IEICE Tech. Rep., vol. 121, no. 429, ISEC2021-69, pp. 122-129, 2022.
T. Yasuda, M. Ishii and T. Teruya："A Note on Group Membership Check in Elliptic Curves for Pairings",
In Proceedings of Symposium on Cryptography and Information Security (SCIS) 2022, 2022.
Y. Koyanagi, M. Ishii and K. Tanaka: "Concurrent Group Operations on TreeKEM",
In Proceedings of Symposium on Cryptography and Information Security (SCIS) 2022, 2022.
M. Ishii, K. Mori, R. Kuwana and S. Matsuura: "Multi-label Classification of Cybersecurity Text with Distant Supervision",
In Proceedings of Symposium on Cryptography and Information Security (SCIS) 2022, 2022.
2020
M. Ishii, T. Teruya and T. Yasuda: "Efficient Pairing Algorithms Using Twists of Degree 3",
In Proceedings of Computer Security Symposium (CSS) 2020, pp. 1080-1087, 2020.
T. Oozu, M. Ishii and K. Tanaka: "Dropout-Tolerant Mental Poker Protocol with Small Deposit and Optimal Upper Bound on Number of Dropouts",
In Proceedings of Symposium on Cryptography and Information Security (SCIS) 2020, 2020.
S. Endo, M. Ishii and K. Tanaka: "Classifying Cryptocurrency Mining Communications with Deep Learning",
In Proceedings of Symposium on Cryptography and Information Security (SCIS) 2020, 2020.
2018
M. Ishii, Z. Inomata, C. Oyunbileg, T. Kyouyama, K. Kuroda, A. Sato, M. Sugaya, K. Tanaka, R. Chiba, T. Nishiwaki, Y. Hashimoto, S. Hirono, S. Matsuura, K. Mori: "Evaluation of Anomaly Detection Algorithms on Cluster Sequence of Proxy Server Logs",
In Proceedings of Symposium on Cryptography and Information Security (SCIS) 2018, 2018.
T. Ohzu, K. Yamada, M. Ishii, K. Tanaka: "Complexity of k-Anonymity with Large k",
In Proceedings of Symposium on Cryptography and Information Security (SCIS) 2018, 2018.
K. Yamada, T. Ohzu, M. Ishii, K. Tanaka: "Approximation Algorithms for k-Anonymity with Large k",
In Proceedings of Symposium on Cryptography and Information Security (SCIS) 2018, 2018.
2017
M. Uno, M. Ishii, A. Inomata, I. Arai and K. Fujikawa: "Network based detection of Remote Access Trojan communication by using packet entropy on early instruction stage",
IEICE Tech. Rep., vol. 116, no. 491, IA2016-98, pp. 41-46, 2017. (In Japanese)
2016
M. Uno, M. Ishii, A. Inomata, I. Arai and K. Fujikawa: "A RAT detection method by using packet entropy on early intrusion stage",
In Proceedings of 75th Conference of Computer Security Group (CSEC) of IPSJ, Vol.2016-CSEC-75, No.6 pp. 1-6, 2016. (In Japanese)
2015
M. Ishii, A. Inomata and K. Fujikawa: "A construction of an optimal pairing on a family of Kawazoe-Takahashi curves and its cost estimate",
In Proceedings of Computer Security Symposium (CSS) 2015, pp. 258-265, 2015.
2013
M. Ishii, M. Shirase, A. Inomata and K. Fujikawa: "A Change of Basis of a Pairing-friendly Field",
In Proceedings of Symposium on Cryptography and Information Security (SCIS) 2013, 2013.
M. Ishii, A. Inomata and K. Fujikawa: "An Efficient Implementation of $\eta_T$ Pairing on Genus 2 Hyperelliptic Curve and Discrete Logarithms in Finite Fields of Characteristic 2",
In Proceedings of Computer Security Symposium (CSS) 2013, pp. 673-679, 2013. (In Japanese)
M. Ishii, A. Inomata and K. Fujikawa: "An Efficient Basis Conversion Algorithm Using Normal Basis",
In Proceedings of Forum on Information Technology 2013, Vol. 1, pp. 41-48, 2013. (In Japanese, Peer-reviewed)
2012
M. Ishii, A. Inomata and K. Fujikawa: "A Study of Parallel Computation of Pairings on Hyperelliptic Curves with Pairing-friendly Fields",
In Proceedings of Computer Security Symposium (CSS) 2012, No. 3, pp. 843-848, 2012.
M. Ishii, A. Inomata and K. Fujikawa: "Study of Implementation Strategies for Pairing on Hyperelliptic Curves on GPUs",
In Proceedings of Symposium on Multimedia, Distributed, Cooperative and Mobile Systems (DICOMO2012), 2012, pp. 1958-1966, 2012. (In Japanese)
Affiliated Academic Societies and Communities
Institute of Electronics, Information and Communication Engineers (IEICE)
Information Processing Society of Japan (IPSJ)
Activities
Jul. 2013 - Mar. 2014: Internship at Cybozu Labs
Mar. 2012: Completed IT Keys (Japanese) program
Oct. 2011 - Mar. 2012: Program committee member, WIDE Camp Spring 2012 (Wide Project)
Oct. 2011: Internship at Fujitsu Laboratories