Committee |
Date Time |
Place |
Paper Title / Authors |
Abstract |
Paper # |
ICSS, IPSJ-SPT |
2024-03-21 11:45 |
Okinawa |
OIST (Primary: On-site, Secondary: Online) |
Security Analysis on End-to-End Encryption of Zoom Mail Shogo Shiraki, Takanori Isobe (Univ.Hyogo) ICSS2023-71 |
Zoom Mail, an email service offered by Zoom Video Communications, incorporates an end-to-end encryption (E2EE) scheme, t... [more] |
ICSS2023-71 pp.17-24 |
DC, CPSY, IPSJ-SLDM, IPSJ-EMB, IPSJ-ARC [detail] |
2024-03-23 10:15 |
Nagasaki |
Ikinoshima Hall (Primary: On-site, Secondary: Online) |
Itsuki Nakai (TUT), Takaaki Fukai, Takahiro Hirofuchi (AIST), Yukinori Sato (TUT) CPSY2023-50 DC2023-116 |
(To be available after the conference date) [more] |
CPSY2023-50 DC2023-116 pp.71-76 |
RCC, ISEC, IT, WBS |
2024-03-13 14:15 |
Osaka |
Osaka Univ. (Suita Campus) |
Proxy Re-encryption based on LPN Haruki Fujimoto, Shingo Sato, Junji Shikata (YNU) IT2023-88 ISEC2023-87 WBS2023-76 RCC2023-70 |
We propose a proxy re-encryption (PRE) scheme based on the Learning Parity with Noise (LPN) problem using error-correcti... [more] |
IT2023-88 ISEC2023-87 WBS2023-76 RCC2023-70 pp.79-86 |
RCC, ISEC, IT, WBS |
2024-03-14 14:40 |
Osaka |
Osaka Univ. (Suita Campus) |
Encrypted data sharing system based on IBE secure against the KGC Hinata Nishino, Emura keita (Kanazawa Univ) IT2023-119 ISEC2023-118 WBS2023-107 RCC2023-101 |
Encryption technology to send and share data is popularized. However, these tools can protect communication route, but t... [more] |
IT2023-119 ISEC2023-118 WBS2023-107 RCC2023-101 pp.273-278 |
LOIS, ICM |
2024-01-26 11:25 |
Nagasaki |
Nagasaki Prefectural Art Museum (Primary: On-site, Secondary: Online) |
A VPN Method for Security Usage of Public Wireless LANs Hinata Tanoue, Akihiro Shimizu (Kochi Univ. of Tech.) ICM2023-37 LOIS2023-41 |
In public wireless LAN environments, ensuring security is an important issue. An effective method for secure communicati... [more] |
ICM2023-37 LOIS2023-41 pp.51-56 |
SIP |
2023-08-07 12:50 |
Osaka |
Osaka Univ. (Suita) Convention Center (Primary: On-site, Secondary: Online) |
An Extension of Image Encryption for Vision Transformer Considering Privacy Protection Haiwei Lin, Shoko Imaizumi (Chiba Univ.), Kiya Hitoshi (Tokyo Metropolitan Univ) SIP2023-46 |
In this paper, we propose an extended framework of access control for Vision Transformer (ViT).
The previous study acc... [more] |
SIP2023-46 pp.1-6 |
EMM |
2023-03-02 13:00 |
Nagasaki |
Fukue culture hall (Primary: On-site, Secondary: Online) |
[Poster Presentation]
An extension of reversible data hiding in encrypted images with high compression performance and flexible processing order Eichi Arai, Shoko Imaizumi (Chiba Univ.) EMM2022-67 |
In this paper, we propose a reversible data hiding in encrypted images (RDH-EI) method that achieves both a high compres... [more] |
EMM2022-67 pp.1-6 |
IN, NS (Joint) |
2023-03-03 09:30 |
Okinawa |
Okinawa Convention Centre + Online (Primary: On-site, Secondary: Online) |
Detection Method of DoH Communications from Non-Encrypted Information at a Middlebox Yuya Takanashi, Shigetomo Kimura (Univ. of Tsukuba) IN2022-99 |
DNS over HTTPS (DoH) enhances users' privacy by encripting DNS
communications over HTTPS instead of plaintext. However... [more] |
IN2022-99 pp.199-204 |
IN, NS (Joint) |
2023-03-03 10:10 |
Okinawa |
Okinawa Convention Centre + Online (Primary: On-site, Secondary: Online) |
Access Control Method with Privacy Preservation in NDN Yuma Fukagawa, Noriaki Kamiyama (Ritsumeikan Univ.) NS2022-221 |
Information-Centric Networking (ICN), which transfers Interest by the name of content without using name resolution and ... [more] |
NS2022-221 pp.310-315 |
EMM |
2023-03-02 16:00 |
Nagasaki |
Fukue culture hall (Primary: On-site, Secondary: Online) |
[Invited Talk]
Image transformation with random numbers for reliable AI Hitoshi Kiya (TMU) EMM2022-87 |
The combined use of deep neural networks (DNNs) and images transformed with random sequences has given a new insight for... [more] |
EMM2022-87 pp.107-109 |
HWS, VLD |
2023-03-02 15:20 |
Okinawa |
(Primary: On-site, Secondary: Online) |
Secure Cache System against On-Chip Threats Keisuke Kamahori, Shinya Takamaeda (UTokyo) VLD2022-95 HWS2022-66 |
In this paper, we propose a new threat model for secure processor design that considers on-chip threats.
Also, we desi... [more] |
VLD2022-95 HWS2022-66 pp.113-118 |
EMM |
2023-01-26 09:30 |
Miyagi |
Tohoku Univ. (Primary: On-site, Secondary: Online) |
Influence of Data Hiding in EtC-Image Classification with Vision Transformer Kosuke Abe, Shoko Imaizumi (Chiba Univ.), Hitoshi Kiya (Tokyo Metropolitan Univ.) EMM2022-61 |
A privacy-preserving image classification method with the vision transformer (ViT) was proposed in which the accuracy of... [more] |
EMM2022-61 pp.1-6 |
ICSS |
2022-11-07 13:30 |
Hokkaido |
Hokkaido Jichiro Kaikan (Primary: On-site, Secondary: Online) |
A scalable and asyncronus group end-to-end encryption protocol Taigen Takeshita, Kousei Akama (Keio Univ.), Masaaki Sato (Tokai Univ.), Keisuke Uehara (Keio Univ.) ICSS2022-38 |
E2E encryption is useful as a method of maintaining message confidentiality in chat, a modern and easy means of communic... [more] |
ICSS2022-38 pp.1-6 |
HWS, ICD |
2022-10-25 10:50 |
Shiga |
(Primary: On-site, Secondary: Online) |
Power current simulation and side channel leakage evaluation of cryptographic IC chips Rikuu Hasegawa, Takuya Wadatsumi, Kazuki Monta, Takuji Miki, Makoto Nagata (Kobe Univ.) HWS2022-32 ICD2022-24 |
Cryptographic modules are threatened by side-channel attacks that use side-channel information to decrypt internal confi... [more] |
HWS2022-32 ICD2022-24 pp.12-16 |
CAS, SIP, VLD, MSS |
2022-06-16 15:05 |
Aomori |
Hachinohe Institute of Technology (Primary: On-site, Secondary: Online) |
Image Classification Using Vision Transformer for Compressible Encrypted Images Genki Hamano, Shoko Imaizumi (Chiba Univ.), Hitoshi Kiya (Tokyo Metropolitan Univ.) CAS2022-8 VLD2022-8 SIP2022-39 MSS2022-8 |
In this paper, we propose an image classification method for compressible encrypted images without losing classification... [more] |
CAS2022-8 VLD2022-8 SIP2022-39 MSS2022-8 pp.40-45 |
IT, ISEC, RCC, WBS |
2022-03-11 09:40 |
Online |
Online |
[Invited Talk]
Fundamentals and Security of Encrypted Control Systems Kiminao Kogiso, Kaoru Teranishi (UEC) IT2021-110 ISEC2021-75 WBS2021-78 RCC2021-85 |
Networked control systems are constantly exposed to the threat of cyberattacks by malicious third parties. Cyberattacks ... [more] |
IT2021-110 ISEC2021-75 WBS2021-78 RCC2021-85 p.161 |
EMM |
2022-03-08 11:15 |
Online |
(Primary: Online, Secondary: On-site) (Primary: Online, Secondary: On-site) |
An Extension of High-Capacity Reversible Data Hiding in Encrypted Images by Bit Plane Partition Eichi Arai, Shoko Imaizumi (Chiba Univ.) EMM2021-114 |
In this paper, we extend a previous reversible data hiding method in encrypted images of high-capacity that uses bit-pla... [more] |
EMM2021-114 pp.118-123 |
DC |
2022-03-01 13:45 |
Tokyo |
Kikai-Shinko-Kaikan Bldg. (Primary: On-site, Secondary: Online) |
A Logic Locking Method based on SFLL-hd at Register Transfer Level Yohei Noguchi, Masayoshi Yoshimura (Kyoto Sangyo Univ.), Atsuya Tsujikawa, Toshinori Hosokawa (Nihon Univ.) DC2021-72 |
In recent years, with the increase of VLSI integration, LSI design companies utilize circuit design information, called ... [more] |
DC2021-72 pp.45-50 |
RCS, NS (Joint) |
2021-12-16 10:35 |
Nara |
Nara-ken Bunka Kaikan and Online (Primary: On-site, Secondary: Online) |
Highly efficient multi-hop transmission using encryption-then-compression based on CRC-aided Polar code Ryota Yatsu, Koji Ishibashi (UEC), Hideki Endo, Sota Tsuchiya (Tokyo Gas) RCS2021-175 |
Packet aggregation with compression has been proposed as one of the methods in order to reduce the transmission time, wh... [more] |
RCS2021-175 pp.1-6 |
DC |
2021-12-10 14:00 |
Kagawa |
(Primary: On-site, Secondary: Online) |
A SAT and FALL Attacks Resistant Logic Locking Method at Register Transfer Level Atsuya Tsujikawa, Toshinori Hosokawa (Nihon Univ.), Masayoshi Yoshimura (Kyoto Sangyo Univ.) DC2021-57 |
In recent years, to meet strict time-to-market constraints, it has become difficult for only one semiconductor design co... [more] |
DC2021-57 pp.13-18 |