IEICE Technical Committee Submission System
Conference Schedule
Online Proceedings
[Sign in]
Tech. Rep. Archives
    [Japanese] / [English] 
( Committee/Place/Topics  ) --Press->
 
( Paper Keywords:  /  Column:Title Auth. Affi. Abst. Keyword ) --Press->

Technical Committee on Information Security (ISEC)  (Searched in: 2023)

[Go to Official ISEC Homepage (Japanese)] 
Search Results: Conference Papers
 Conference Papers (Available on Advance Programs)  (Sort: by Committee)
 Results 1 - 139 of 139  /   
Committee Date Time Place Paper Title / Authors Abstract Paper #
EMM, BioX, ISEC, SITE, ICSS, HWS, IPSJ-CSEC, IPSJ-SPT [detail] 2023-07-24
10:05
Hokkaido Hokkaido Jichiro Kaikan [Invited Talk] Please fill in this form
Hideyuki Nakashima (SCU)
(To be available after the conference date) [more]
EMM, BioX, ISEC, SITE, ICSS, HWS, IPSJ-CSEC, IPSJ-SPT [detail] 2023-07-24
10:35
Hokkaido Hokkaido Jichiro Kaikan [Invited Talk] Please fill in this form
Mai Sugimoto (Kansai Univ.)
 [more]
EMM, BioX, ISEC, SITE, ICSS, HWS, IPSJ-CSEC, IPSJ-SPT [detail] 2023-07-24
10:50
Hokkaido Hokkaido Jichiro Kaikan [Invited Talk] Please fill in this form
Nobutsugu Kanzaki (Nanzan Univ.)
 [more]
EMM, BioX, ISEC, SITE, ICSS, HWS, IPSJ-CSEC, IPSJ-SPT [detail] 2023-07-24
14:00
Hokkaido Hokkaido Jichiro Kaikan Non-profiled Side-channel Attacks by using Clustering Scores in Deep Learning model (1) -- Attacks by using Auto Encoder against hardware-implemented AES --
Mizuki Nagahisa, Fukuda Yuta, Yoshida Kota, Fujino Takeshi (Ristumei Univ) ISEC2023-14 SITE2023-8 BioX2023-17 HWS2023-14 ICSS2023-11 EMM2023-14
In 2019, Differential Deep Learning Analysis (DDLA) was proposed as a deep-learning based side-channel attack in non-pro... [more] ISEC2023-14 SITE2023-8 BioX2023-17 HWS2023-14 ICSS2023-11 EMM2023-14
pp.1-6
EMM, BioX, ISEC, SITE, ICSS, HWS, IPSJ-CSEC, IPSJ-SPT [detail] 2023-07-24
14:20
Hokkaido Hokkaido Jichiro Kaikan Non-profiled Side-Channel Attacks by using Clustering Scores in Deep Learning model (2) -- Attacks by using Models to Predict Ciphertext against Hardware-implemented AES with Countermeasures --
Yuta Fukuda, Kota Yoshida, Takeshi Fujino (Ritsumeikan Univ.) ISEC2023-15 SITE2023-9 BioX2023-18 HWS2023-15 ICSS2023-12 EMM2023-15
 [more] ISEC2023-15 SITE2023-9 BioX2023-18 HWS2023-15 ICSS2023-12 EMM2023-15
pp.7-12
EMM, BioX, ISEC, SITE, ICSS, HWS, IPSJ-CSEC, IPSJ-SPT [detail] 2023-07-24
14:40
Hokkaido Hokkaido Jichiro Kaikan Improving Non-profiled DL-based Side-Channel Attack Using Multiple Partial Key Difference Estimation
Rikuma Tanaka, Rei Ueno (Tohoku Univ.), Akira Ito (NTT), Naofumi Homma (Tohoku Univ.) ISEC2023-16 SITE2023-10 BioX2023-19 HWS2023-16 ICSS2023-13 EMM2023-16
This paper presents a method of improving Non-profiled Deep-Learning Side-Channel Attack (DL-SCA) of AES. The previous ... [more] ISEC2023-16 SITE2023-10 BioX2023-19 HWS2023-16 ICSS2023-13 EMM2023-16
pp.13-18
EMM, BioX, ISEC, SITE, ICSS, HWS, IPSJ-CSEC, IPSJ-SPT [detail] 2023-07-24
15:00
Hokkaido Hokkaido Jichiro Kaikan Tolerance Evaluation Cost Reduction of Deep-Learning-Based Side-Channel Attack Using Signal-to-Noise Ratio of Leakage Traces
Tatsuya Sakagami, Masaki Himuro, Kengo Iokibe, Yoshitaka Toyota (Okayama Univ.) ISEC2023-17 SITE2023-11 BioX2023-20 HWS2023-17 ICSS2023-14 EMM2023-17
Side-channel attacks (SCA) have been proposed to decrypt modern cryptography by analyzing the physical behavior of crypt... [more] ISEC2023-17 SITE2023-11 BioX2023-20 HWS2023-17 ICSS2023-14 EMM2023-17
pp.19-24
EMM, BioX, ISEC, SITE, ICSS, HWS, IPSJ-CSEC, IPSJ-SPT [detail] 2023-07-24
15:20
Hokkaido Hokkaido Jichiro Kaikan Deep Learning-Based Side-Channel Analysis Considering the Effect of Noise and Transfer Characteristics on the Measurement Process
Yoshiki Kitamura, Taiki Kitazawa, Yuichi Hayashi (NAIST) ISEC2023-18 SITE2023-12 BioX2023-21 HWS2023-18 ICSS2023-15 EMM2023-18
(To be available after the conference date) [more] ISEC2023-18 SITE2023-12 BioX2023-21 HWS2023-18 ICSS2023-15 EMM2023-18
pp.25-29
EMM, BioX, ISEC, SITE, ICSS, HWS, IPSJ-CSEC, IPSJ-SPT [detail] 2023-07-24
16:00
Hokkaido Hokkaido Jichiro Kaikan Analysis of effective attribute values on risk-based authentication with browser fingerprint
Takashi Tsukazaki, Yuichi Futa (TUT), Hiroyuki Okazaki, Hikofumi Suzuki (Shinshu Univ.) ISEC2023-19 SITE2023-13 BioX2023-22 HWS2023-19 ICSS2023-16 EMM2023-19
Browser fingerprinting is to identify website users by collecting information about device. Browser fingerprint is used ... [more] ISEC2023-19 SITE2023-13 BioX2023-22 HWS2023-19 ICSS2023-16 EMM2023-19
pp.30-36
EMM, BioX, ISEC, SITE, ICSS, HWS, IPSJ-CSEC, IPSJ-SPT [detail] 2023-07-24
18:20
Hokkaido Hokkaido Jichiro Kaikan International regulatory trend survey report on AI -- Status of the European Parliament's consideration of the AI Act in the EU --
Naonori Kato (KDDI Research/NFI/RIKEN), Yosuke Murakami, Minoru Kozu (KDDI Research) ISEC2023-20 SITE2023-14 BioX2023-23 HWS2023-20 ICSS2023-17 EMM2023-20
On 11 May 2023, the European Parliament's Committee on the Internal Market and Committee on Civil Liberties adopted by a... [more] ISEC2023-20 SITE2023-14 BioX2023-23 HWS2023-20 ICSS2023-17 EMM2023-20
pp.37-44
EMM, BioX, ISEC, SITE, ICSS, HWS, IPSJ-CSEC, IPSJ-SPT [detail] 2023-07-24
14:00
Hokkaido Hokkaido Jichiro Kaikan Key Generation by Secure Computation of ID-NIKS based on Discrete Logarithm Problem over Composite Modulus
Hayato Inoue, Mizuki Miki, Yasuyuki Murakami (OECU) ISEC2023-21 SITE2023-15 BioX2023-24 HWS2023-21 ICSS2023-18 EMM2023-21
In 1990, Murakami and Kasahara proposed an ID based non-interactive key-sharing scheme (MK scheme) that uses the discret... [more] ISEC2023-21 SITE2023-15 BioX2023-24 HWS2023-21 ICSS2023-18 EMM2023-21
pp.45-51
EMM, BioX, ISEC, SITE, ICSS, HWS, IPSJ-CSEC, IPSJ-SPT [detail] 2023-07-24
14:20
Hokkaido Hokkaido Jichiro Kaikan A Generic Construction of Outsider Anonymous Broadcast Encryption with Keyword Search
Keita Emura (NICT), Kaisei Kajita, Go Ohtake (NHK) ISEC2023-22 SITE2023-16 BioX2023-25 HWS2023-22 ICSS2023-19 EMM2023-22
Broadcast encryption with keyword search (BEKS) has been proposed (Attrapadung et al. at ASIACRYPT 2006/Chatterjee-Mukhe... [more] ISEC2023-22 SITE2023-16 BioX2023-25 HWS2023-22 ICSS2023-19 EMM2023-22
pp.52-59
EMM, BioX, ISEC, SITE, ICSS, HWS, IPSJ-CSEC, IPSJ-SPT [detail] 2023-07-24
14:40
Hokkaido Hokkaido Jichiro Kaikan Hierarchical Identity-based Matchmaking Encryption
Sohto Chiku (YNU), Keisuke Hara (AIST/YNU), Junji Shikata (YNU) ISEC2023-23 SITE2023-17 BioX2023-26 HWS2023-23 ICSS2023-20 EMM2023-23
Identity-based matchmaking encryption (IB-ME) is an advanced encryption system that enables a sender and a receiver to s... [more] ISEC2023-23 SITE2023-17 BioX2023-26 HWS2023-23 ICSS2023-20 EMM2023-23
pp.60-67
EMM, BioX, ISEC, SITE, ICSS, HWS, IPSJ-CSEC, IPSJ-SPT [detail] 2023-07-24
15:00
Hokkaido Hokkaido Jichiro Kaikan Note on the Robustness of Single Sign-On Algorithm Based on Verifiable Encryption
Chihiro Okubo, Satoshi Iriyama, Maki Kihara (TUS) ISEC2023-24 SITE2023-18 BioX2023-27 HWS2023-24 ICSS2023-21 EMM2023-24
 [more] ISEC2023-24 SITE2023-18 BioX2023-27 HWS2023-24 ICSS2023-21 EMM2023-24
pp.68-71
EMM, BioX, ISEC, SITE, ICSS, HWS, IPSJ-CSEC, IPSJ-SPT [detail] 2023-07-24
15:20
Hokkaido Hokkaido Jichiro Kaikan Threshold ring signature based on isogeny
Naho Isogai, Takeshi Nakai, Koutarou Suzuki (TUT) ISEC2023-25 SITE2023-19 BioX2023-28 HWS2023-25 ICSS2023-22 EMM2023-25
RippleSign is the first $T$-out-of-$N$ threshold ring signature scheme based on isogeny,which has an issue that the sign... [more] ISEC2023-25 SITE2023-19 BioX2023-28 HWS2023-25 ICSS2023-22 EMM2023-25
pp.72-79
EMM, BioX, ISEC, SITE, ICSS, HWS, IPSJ-CSEC, IPSJ-SPT [detail] 2023-07-24
16:00
Hokkaido Hokkaido Jichiro Kaikan Estimation of rotation angle using pilot signal for image watermarking
Rinka Kawano, Masaki Kawamura (Yamaguchi Univ.) ISEC2023-26 SITE2023-20 BioX2023-29 HWS2023-26 ICSS2023-23 EMM2023-26
Robust watermarking methods must be resistant to attacks. In conventional methods, errors have been corrected after extr... [more] ISEC2023-26 SITE2023-20 BioX2023-29 HWS2023-26 ICSS2023-23 EMM2023-26
pp.80-85
EMM, BioX, ISEC, SITE, ICSS, HWS, IPSJ-CSEC, IPSJ-SPT [detail] 2023-07-24
16:20
Hokkaido Hokkaido Jichiro Kaikan A Random Ensemble Method with Encrypted Models for Improving Robustness against Adversarial Examples
Ryota Iijima, Miki Tanaka, Sayaka Shiota, Hitoshi Kiya (Tokyo Metro. Univ.) ISEC2023-27 SITE2023-21 BioX2023-30 HWS2023-27 ICSS2023-24 EMM2023-27
 [more] ISEC2023-27 SITE2023-21 BioX2023-30 HWS2023-27 ICSS2023-24 EMM2023-27
pp.86-90
EMM, BioX, ISEC, SITE, ICSS, HWS, IPSJ-CSEC, IPSJ-SPT [detail] 2023-07-24
16:40
Hokkaido Hokkaido Jichiro Kaikan Novel Image authentication scheme using error correction code and digital signature
Ken-ichi Sakina (QRTechnology) ISEC2023-28 SITE2023-22 BioX2023-31 HWS2023-28 ICSS2023-25 EMM2023-28
We propose a novel image authentication scheme using Reed-Solomon codes and elliptic curve digital signatures. Conventio... [more] ISEC2023-28 SITE2023-22 BioX2023-31 HWS2023-28 ICSS2023-25 EMM2023-28
pp.91-96
EMM, BioX, ISEC, SITE, ICSS, HWS, IPSJ-CSEC, IPSJ-SPT [detail] 2023-07-24
17:20
Hokkaido Hokkaido Jichiro Kaikan An Identity-based Signature Scheme with Tight Security Reduction
Jiawei Chen, Hyungrok Jo, Shingo Sato, Junji Shikata (YNU) ISEC2023-29 SITE2023-23 BioX2023-32 HWS2023-29 ICSS2023-26 EMM2023-29
In this paper, we propose an identity-based signature (IBS) scheme based on the supersingular isogeny problem, with tigh... [more] ISEC2023-29 SITE2023-23 BioX2023-32 HWS2023-29 ICSS2023-26 EMM2023-29
pp.97-104
EMM, BioX, ISEC, SITE, ICSS, HWS, IPSJ-CSEC, IPSJ-SPT [detail] 2023-07-24
17:40
Hokkaido Hokkaido Jichiro Kaikan Statistical Key Recovery Attack Against the Peregrine Lattice-Based Signature Scheme
Moeto Suzuki (Kyoto Univ.), Xiuhan Lin (Shandong Univ.), Shiduo Zhang (Tsinghua Univ.), Thomas Espitau (PQShield), Yang Yu (Tsinghua Univ.), Mehdi Tibouchi, Masayuki Abe (NTT) ISEC2023-30 SITE2023-24 BioX2023-33 HWS2023-30 ICSS2023-27 EMM2023-30
The Peregrine signature scheme, which is a high-speed variant of Falcon, is one of the candidates in the ongoing Korean ... [more] ISEC2023-30 SITE2023-24 BioX2023-33 HWS2023-30 ICSS2023-27 EMM2023-30
pp.105-112
EMM, BioX, ISEC, SITE, ICSS, HWS, IPSJ-CSEC, IPSJ-SPT [detail] 2023-07-24
18:00
Hokkaido Hokkaido Jichiro Kaikan A security analysis on MQ-Sign submitted to Korean Post-Quantum Cryptography standardization
Yasuhiko Ikematsu (Kyushu Univ.), Hyungrok Jo (YNU), Takanori Yasuda (OUS) ISEC2023-31 SITE2023-25 BioX2023-34 HWS2023-31 ICSS2023-28 EMM2023-31
MQ-Sign is a variant of the UOV singature scheme proposed by Shim et al. It has been suggested as a candidate for the st... [more] ISEC2023-31 SITE2023-25 BioX2023-34 HWS2023-31 ICSS2023-28 EMM2023-31
pp.113-118
EMM, BioX, ISEC, SITE, ICSS, HWS, IPSJ-CSEC, IPSJ-SPT [detail] 2023-07-24
18:20
Hokkaido Hokkaido Jichiro Kaikan Implementation of Shor's algorithm for the discrete logarithm problem and experiments using the quantum computer simulator
Kaito Kishi, Junpei Yamaguchi, Tetsuya Izu (Fujitsu Research), Noboru Kunihiro (Univ. of Tsukuba) ISEC2023-32 SITE2023-26 BioX2023-35 HWS2023-32 ICSS2023-29 EMM2023-32
Classical polynomial-time algorithms for solving the discrete logarithm problem (DLP) over a prime field have not been f... [more] ISEC2023-32 SITE2023-26 BioX2023-35 HWS2023-32 ICSS2023-29 EMM2023-32
pp.119-126
EMM, BioX, ISEC, SITE, ICSS, HWS, IPSJ-CSEC, IPSJ-SPT [detail] 2023-07-24
16:20
Hokkaido Hokkaido Jichiro Kaikan Analysis of Snort's impact due to DDoS attacks
Kano Yuki, Yuichi Futa (TUT), Okazaki Hiroyuki, Suzuki Hikofumi (SHINSYU UNIVERSITY) ISEC2023-33 SITE2023-27 BioX2023-36 HWS2023-33 ICSS2023-30 EMM2023-33
In recent years, the number of DDoS attacks has been increasing.Tokuyama et al.[1][2] constructed an environment in whic... [more] ISEC2023-33 SITE2023-27 BioX2023-36 HWS2023-33 ICSS2023-30 EMM2023-33
pp.127-132
EMM, BioX, ISEC, SITE, ICSS, HWS, IPSJ-CSEC, IPSJ-SPT [detail] 2023-07-24
16:40
Hokkaido Hokkaido Jichiro Kaikan A Multiple Vantage Point-based Concept for Open-Source Information Space Awareness
Blumbergs Bernhards (NAIST) ISEC2023-34 SITE2023-28 BioX2023-37 HWS2023-34 ICSS2023-31 EMM2023-34
The proposed concept bolsters visibility and provides context to cyber incident response teams countering malicious acti... [more] ISEC2023-34 SITE2023-28 BioX2023-37 HWS2023-34 ICSS2023-31 EMM2023-34
pp.133-140
EMM, BioX, ISEC, SITE, ICSS, HWS, IPSJ-CSEC, IPSJ-SPT [detail] 2023-07-25
13:20
Hokkaido Hokkaido Jichiro Kaikan ISEC2023-35 SITE2023-29 BioX2023-38 HWS2023-35 ICSS2023-32 EMM2023-35 The Hardware Security Technical Committee invited the author to give a presentation about his recent elevation to IEEE F... [more] ISEC2023-35 SITE2023-29 BioX2023-38 HWS2023-35 ICSS2023-32 EMM2023-35
pp.141-146
EMM, BioX, ISEC, SITE, ICSS, HWS, IPSJ-CSEC, IPSJ-SPT [detail] 2023-07-25
09:00
Hokkaido Hokkaido Jichiro Kaikan CNN-Based Iris Recognition Using Multi-spectral Iris Images
Ryosuke Kuroda, Tetsuya Honda, Hironobu Takano (Toyama Prefectural Univ.) ISEC2023-36 SITE2023-30 BioX2023-39 HWS2023-36 ICSS2023-33 EMM2023-36
Iris recognition using a near-infrared camera is generally known as a biometric authentication method with high accuracy... [more] ISEC2023-36 SITE2023-30 BioX2023-39 HWS2023-36 ICSS2023-33 EMM2023-36
pp.147-151
EMM, BioX, ISEC, SITE, ICSS, HWS, IPSJ-CSEC, IPSJ-SPT [detail] 2023-07-25
09:20
Hokkaido Hokkaido Jichiro Kaikan Automatic Credential Entry EMS: EMS System that reproduces Secret Information without exposing biometric data
Takumi Takaiwa, Nozaki Shinnosuke, Numada Kota, Shibata Tsubasa, Okumura Sana, Takigawa Soichi, Ohki Tetsushi, Nishigaki Masakatsu (Shizuoka Univ.) ISEC2023-37 SITE2023-31 BioX2023-40 HWS2023-37 ICSS2023-34 EMM2023-37
(To be available after the conference date) [more] ISEC2023-37 SITE2023-31 BioX2023-40 HWS2023-37 ICSS2023-34 EMM2023-37
pp.152-158
EMM, BioX, ISEC, SITE, ICSS, HWS, IPSJ-CSEC, IPSJ-SPT [detail] 2023-07-25
09:40
Hokkaido Hokkaido Jichiro Kaikan Implementation and Evaluation of Payload Encryption and Message Authentication Code Using Lightweight Cryptography ASCON in CAN FD Communication
Kotaro Ishikawa, Naoto Kawahara (Okayama Univ.), Takuya Kusaka (Shimane Univ.), Yuta Kodera, Yasuyuki Nogami (Okayama Univ.) ISEC2023-38 SITE2023-32 BioX2023-41 HWS2023-38 ICSS2023-35 EMM2023-38
In recent years, automotive systems have become more advanced with technologies such as autonomous driving and connected... [more] ISEC2023-38 SITE2023-32 BioX2023-41 HWS2023-38 ICSS2023-35 EMM2023-38
pp.159-164
EMM, BioX, ISEC, SITE, ICSS, HWS, IPSJ-CSEC, IPSJ-SPT [detail] 2023-07-25
10:00
Hokkaido Hokkaido Jichiro Kaikan An Implementation and Evaluation of Communication Schemes Using Authenticated Cryptography for MAVLink Communication
Ryuto Kuwada, Nobuya Ishihara, Yuta Kodera, Yasuyuki Nogami (Okayama Univ.) ISEC2023-39 SITE2023-33 BioX2023-42 HWS2023-39 ICSS2023-36 EMM2023-39
MAVLink is a lightweight communication protocol used between drones and ground stations to transmit drone status and con... [more] ISEC2023-39 SITE2023-33 BioX2023-42 HWS2023-39 ICSS2023-36 EMM2023-39
pp.165-170
EMM, BioX, ISEC, SITE, ICSS, HWS, IPSJ-CSEC, IPSJ-SPT [detail] 2023-07-25
10:20
Hokkaido Hokkaido Jichiro Kaikan
Takayuki Kondo, Taiki Kitazawa, Shugo Kaji, Daisuke Fujimoto, Yuichi Hayashi (NAIST) ISEC2023-40 SITE2023-34 BioX2023-43 HWS2023-40 ICSS2023-37 EMM2023-40
(To be available after the conference date) [more] ISEC2023-40 SITE2023-34 BioX2023-43 HWS2023-40 ICSS2023-37 EMM2023-40
pp.171-175
EMM, BioX, ISEC, SITE, ICSS, HWS, IPSJ-CSEC, IPSJ-SPT [detail] 2023-07-25
11:00
Hokkaido Hokkaido Jichiro Kaikan An Approach to Authorization Protocol Using PUF-based Access Token
Risa Yashiro, Kohei Isobe, Hiroki Kunii (SECOM) ISEC2023-41 SITE2023-35 BioX2023-44 HWS2023-41 ICSS2023-38 EMM2023-41
OAuth is one of the protocols that enable to authorize resource access for a client through API. The authorization by OA... [more] ISEC2023-41 SITE2023-35 BioX2023-44 HWS2023-41 ICSS2023-38 EMM2023-41
pp.176-181
EMM, BioX, ISEC, SITE, ICSS, HWS, IPSJ-CSEC, IPSJ-SPT [detail] 2023-07-25
11:20
Hokkaido Hokkaido Jichiro Kaikan Secure Cryptographic Unit with built-in Signature Generation Hardware for Aggregate Signature Schemes and its FPGA Implementation
Toshihiro Sato, Shohei Kawasaki (SCU), Kaoru Masada (Tokyo Univ.), Riku Anzai, Junichi Sakamoto, Naoki Yoshida (YNU), Yasuyoshi Uemura (SCU), Makoto Ikeda (Tokyo Univ.), Tsutomu Matsumoto (YNU) ISEC2023-42 SITE2023-36 BioX2023-45 HWS2023-42 ICSS2023-39 EMM2023-42
Secure Cryptographic Unit (SCU) consists of a hardware cryptographic engine and an access control mechanism for the engi... [more] ISEC2023-42 SITE2023-36 BioX2023-45 HWS2023-42 ICSS2023-39 EMM2023-42
pp.182-187
EMM, BioX, ISEC, SITE, ICSS, HWS, IPSJ-CSEC, IPSJ-SPT [detail] 2023-07-25
11:40
Hokkaido Hokkaido Jichiro Kaikan Clone Resistance of Artifact Metrics: Spatial Frequency Filtering
Akira Iwahashi, Iwaki Miyamoto, Naoki Yoshida, Tsutomu Matsumoto (YNU) ISEC2023-43 SITE2023-37 BioX2023-46 HWS2023-43 ICSS2023-40 EMM2023-43
Artifact metrics is a technology that uses features unique to an artifact to authenticate the artifact in question. Unli... [more] ISEC2023-43 SITE2023-37 BioX2023-46 HWS2023-43 ICSS2023-40 EMM2023-43
pp.188-193
EMM, BioX, ISEC, SITE, ICSS, HWS, IPSJ-CSEC, IPSJ-SPT [detail] 2023-07-25
09:00
Hokkaido Hokkaido Jichiro Kaikan Side-Channel Attacks on Unrolled Implementation of Trivium
Soichiro Kobayashi, Rei Ueno (Tohoku Univ.), Yosuke Todo (NTT), Naofumi Homma (Tohoku Univ.) ISEC2023-44 SITE2023-38 BioX2023-47 HWS2023-44 ICSS2023-41 EMM2023-44
This paper describes a side-channel attack (SCA) on unrolled implementation of Trivium. Previous SCAs on Trivium, such a... [more] ISEC2023-44 SITE2023-38 BioX2023-47 HWS2023-44 ICSS2023-41 EMM2023-44
pp.194-201
EMM, BioX, ISEC, SITE, ICSS, HWS, IPSJ-CSEC, IPSJ-SPT [detail] 2023-07-25
09:20
Hokkaido Hokkaido Jichiro Kaikan SAT-based Differential analysis of AEGIS Family
Takuro Shiraya (UOH), Kosei Sakamoto (Mitsubishi Electric), Takanori Isobe (UOH) ISEC2023-45 SITE2023-39 BioX2023-48 HWS2023-45 ICSS2023-42 EMM2023-45
We evaluate the security of the AEGIS family which is authenticated encryption with an associated data scheme to achieve... [more] ISEC2023-45 SITE2023-39 BioX2023-48 HWS2023-45 ICSS2023-42 EMM2023-45
pp.202-207
EMM, BioX, ISEC, SITE, ICSS, HWS, IPSJ-CSEC, IPSJ-SPT [detail] 2023-07-25
09:40
Hokkaido Hokkaido Jichiro Kaikan SAT-based Search of Related-key Impossible Distinguisher for Piccolo, TWINE, LBlock
Shion Utsumi (Univ. of Hyogo), Kosei Sakamoto (MELCO), Takanori Isobe (Univ. of Hyogo) ISEC2023-46 SITE2023-40 BioX2023-49 HWS2023-46 ICSS2023-43 EMM2023-46
In this paper, we evaluate security of Piccolo, TWINE, T-TWINE and LBlcok angainst on impossilbe related-key differentia... [more] ISEC2023-46 SITE2023-40 BioX2023-49 HWS2023-46 ICSS2023-43 EMM2023-46
pp.208-213
EMM, BioX, ISEC, SITE, ICSS, HWS, IPSJ-CSEC, IPSJ-SPT [detail] 2023-07-25
10:00
Hokkaido Hokkaido Jichiro Kaikan Higher Order Differential Property of Block Cipher LBC-3
Naoki Shibayama, Yasutaka Igarashi (Tokyo Univ. of Science) ISEC2023-47 SITE2023-41 BioX2023-50 HWS2023-47 ICSS2023-44 EMM2023-47
LBC-3 is a block cipher proposed by Nyssanbayeva et al. in 2022. The block size is 64-bit, the secret key size is 80-bit... [more] ISEC2023-47 SITE2023-41 BioX2023-50 HWS2023-47 ICSS2023-44 EMM2023-47
pp.214-220
EMM, BioX, ISEC, SITE, ICSS, HWS, IPSJ-CSEC, IPSJ-SPT [detail] 2023-07-25
10:20
Hokkaido Hokkaido Jichiro Kaikan On the Maximum Differential Characteristic Probabilities for Multi-Branch Structures
Kazuma Taka (Hyogo Univ.), Kosei Sakamoto (Mitsubishi Electric), Takanori Isobe (Hyogo Univ.) ISEC2023-48 SITE2023-42 BioX2023-51 HWS2023-48 ICSS2023-45 EMM2023-48
The design of multiple-branch-based designs, such as the low-latency pseudo-random function Orthros, holds the potential... [more] ISEC2023-48 SITE2023-42 BioX2023-51 HWS2023-48 ICSS2023-45 EMM2023-48
pp.221-228
EMM, BioX, ISEC, SITE, ICSS, HWS, IPSJ-CSEC, IPSJ-SPT [detail] 2023-07-25
11:00
Hokkaido Hokkaido Jichiro Kaikan Is Copying for Information Security Research ‘Fair Use’? -- Apple Inc. v. Corellium, Inc., No. 21-12835 (11th Cir. 2023) --
Yusuke Tachibana (FIT) ISEC2023-49 SITE2023-43 BioX2023-52 HWS2023-49 ICSS2023-46 EMM2023-49
The replication of third-party software in the realm of information security research has the potential to encroach upon... [more] ISEC2023-49 SITE2023-43 BioX2023-52 HWS2023-49 ICSS2023-46 EMM2023-49
pp.229-231
EMM, BioX, ISEC, SITE, ICSS, HWS, IPSJ-CSEC, IPSJ-SPT [detail] 2023-07-25
11:20
Hokkaido Hokkaido Jichiro Kaikan A Study on the Application of Nudge to Improve Cybersecurity
Hideyuki Fujii (NRI Secure) ISEC2023-50 SITE2023-44 BioX2023-53 HWS2023-50 ICSS2023-47 EMM2023-50
One possible measure to improve cybersecurity is the use of "Nudge". Nudge is designed (choice architectures) that chang... [more] ISEC2023-50 SITE2023-44 BioX2023-53 HWS2023-50 ICSS2023-47 EMM2023-50
pp.232-238
EMM, BioX, ISEC, SITE, ICSS, HWS, IPSJ-CSEC, IPSJ-SPT [detail] 2023-07-25
14:30
Hokkaido Hokkaido Jichiro Kaikan Security Analysis on Nostr protocol for decentralized SNS
Hayato Kimura, Takanori Isobe (Univ. Hyogo) ISEC2023-51 SITE2023-45 BioX2023-54 HWS2023-51 ICSS2023-48 EMM2023-51
Nostr is a protocol for distributed social networking services (SNS) characterized by being Simple, Resilient, and Verif... [more] ISEC2023-51 SITE2023-45 BioX2023-54 HWS2023-51 ICSS2023-48 EMM2023-51
pp.239-246
EMM, BioX, ISEC, SITE, ICSS, HWS, IPSJ-CSEC, IPSJ-SPT [detail] 2023-07-25
14:50
Hokkaido Hokkaido Jichiro Kaikan Anomaly detection with dataset including replay-attack communication
Koushi Nishi, Futa Yuichi (TUT), Okazaki Hiroyuki (Shinshu University) ISEC2023-52 SITE2023-46 BioX2023-55 HWS2023-52 ICSS2023-49 EMM2023-52
General-purpose devices and communications are increasingly introduced to control systems in factories and power plants ... [more] ISEC2023-52 SITE2023-46 BioX2023-55 HWS2023-52 ICSS2023-49 EMM2023-52
pp.247-254
EMM, BioX, ISEC, SITE, ICSS, HWS, IPSJ-CSEC, IPSJ-SPT [detail] 2023-07-25
15:10
Hokkaido Hokkaido Jichiro Kaikan Extended $k^m$-anonymity for randomization
Masaya Kobayashi, Atsushi Fujioka (Kanagawa Univ.), Koji Chida (Gunma Univ.) ISEC2023-53 SITE2023-47 BioX2023-56 HWS2023-53 ICSS2023-50 EMM2023-53
Various models have been proposed to evaluate anonymity. Among them, $k$-anonymity is widely known as a representative a... [more] ISEC2023-53 SITE2023-47 BioX2023-56 HWS2023-53 ICSS2023-50 EMM2023-53
pp.255-260
ISEC 2023-05-17
09:30
Tokyo Kikai-Shinko-Kaikan Bldg. Toward VMI configuration with smart contracts for demand forecasting
Kenta Hagiwara (Tsukuba Univ.), Kazumasa Omote (Tsukuba Univ./NICT) ISEC2023-1
 [more] ISEC2023-1
pp.1-8
ISEC 2023-05-17
09:55
Tokyo Kikai-Shinko-Kaikan Bldg. Toward a System for Estimating Firm Popularity Using Educational Credentials NFT
Keigo Yanai, Taisei Takahashi, Kazumasa Omote (Tsukuba Univ.) ISEC2023-2
Currently, there is no objective way to measure how popular a company is among students in the job hunting process. This... [more] ISEC2023-2
pp.9-16
ISEC 2023-05-17
10:20
Tokyo Kikai-Shinko-Kaikan Bldg. Toward A Secure Contact Tracing Method Using Blockchain
Mizuki Tsuchida (Tsukuba Univ.), Omote Kazumasa (Tsukuba Univ., NICT) ISEC2023-3
 [more] ISEC2023-3
pp.17-24
ISEC 2023-05-17
10:45
Tokyo Kikai-Shinko-Kaikan Bldg. On the Risk Assessment Method against ML-specific Attacks for ML system developers -- A Damage Assessment Method for ML system developers --
Jun Yajima, Maki Inui, Kentarou Tsuji (Fujitsu Ltd.), Nobukazu Yoshioka (Waseda Univ.) ISEC2023-4
To develop machine learning (ML) systems that are secure againstML-specific attacks, to conduct threat assessment to fin... [more] ISEC2023-4
pp.25-32
ISEC 2023-05-17
11:25
Tokyo Kikai-Shinko-Kaikan Bldg. [Invited Talk] Towards Verifying Physical Assumption in Card-Based Cryptography (from SecITC 2022)
Masahisa Shimano, Kazuo Sakiyama (UEC), Daiki Miyahara (UEC/AIST) ISEC2023-5
 [more] ISEC2023-5
p.33
ISEC 2023-05-17
11:55
Tokyo Kikai-Shinko-Kaikan Bldg. [Invited Talk] Card-Based Single-Shuffle Protocols for Secure Multiple-Input AND and XOR Computations (from APKC 2022)
Tomoki Kuzuma, Raimu Isuzugawa, Kodai Toyoda (Tohoku Univ), Daiki Miyahara (UEC), Takaaki Mizuki (Tohoku Univ) ISEC2023-6
In this invited talk, we introduce the paper ``Card-based Single-shuffle Protocols for Secure Multiple-input AND and XOR... [more] ISEC2023-6
p.34
ISEC 2023-05-17
13:30
Tokyo Kikai-Shinko-Kaikan Bldg. Reducing the Number of Shuffles for Secure Multi-input AND Computation with Two Additional Cards
Takuto Yoshida (NITIC), Keisuke Nakabayashi, Kodai Tanaka (Tohoku Univ), Eikoh Chida (NITIC), Takaaki Mizuki (Tohoku Univ) ISEC2023-7
(To be available after the conference date) [more] ISEC2023-7
pp.35-42
ISEC 2023-05-17
13:55
Tokyo Kikai-Shinko-Kaikan Bldg. A Physical Zero-knowledge Proof for a Puzzle Generated by ChatGPT
Kyosuke Hatsugai, Kyoichi Asano (UEC), Yoshiki Abe (UEC/AIST) ISEC2023-8
 [more] ISEC2023-8
pp.43-48
ISEC 2023-05-17
14:20
Tokyo Kikai-Shinko-Kaikan Bldg. Equivalent Secret Key-Recovery Attack on Knapsack Public Key Cryptosystem
Ryuichi Sakai, Yasuyuki Murakami (OECU) ISEC2023-9
Shamir proposed an attack on Merkle-Hellman’s knapsack public key cryptosystem. This attack uses integer programming to ... [more] ISEC2023-9
pp.49-53
ISEC 2023-05-17
14:45
Tokyo Kikai-Shinko-Kaikan Bldg. BDD enumeration for Module-LWE using lattice rotation structure
Togo Sakurai, Atsushi Takayasu (The Univ. of Tokyo) ISEC2023-10
Module-LWE is the analog of LWE that includes algebraic structures. In July 2022, two cryptographic schemes based on Mod... [more] ISEC2023-10
pp.54-61
ISEC 2023-05-17
15:25
Tokyo Kikai-Shinko-Kaikan Bldg. [Invited Talk] An Empirical Study of Impact of Solidity Compiler Updates on Vulnerabilities (from BRAIN 2023)
Chihiro Kado, Naoto Yanai, Jason Paul Cruz (Osaka Univ.), Shingo Okamura (NIT, Nara College) ISEC2023-11
Vulnerabilities are an important issue in Ethereum smart contracts. Although various vulnerability analysis tools have b... [more] ISEC2023-11
pp.62-64
ISEC 2023-05-17
15:55
Tokyo Kikai-Shinko-Kaikan Bldg. [Invited Talk] An Efficient Strategy to Construct a Better Differential on Multiple-Branch-Based Designs: Application to Orthros (from CT-RSA 2023)
Kazuma Taka, Kosei Sakamoto (Hyogo Univ.), Tatsuya Ishikawa (WDB KOUGAKU Co.,Ltd.), Takanori Isobe (Hyogo Univ.) ISEC2023-12
As low-latency designs tend to have a small number of rounds to decrease latency, the differential-type cryptanalysis ca... [more] ISEC2023-12
p.65
ISEC 2023-05-17
16:25
Tokyo Kikai-Shinko-Kaikan Bldg. [Invited Talk] Concrete Quantum Cryptanalysis of Binary Elliptic Curves via Addition Chain (from CT-RSA 2023)
Ren Taguchi, Atsushi Takayasu (The Univ. of Tokyo) ISEC2023-13
(To be available after the conference date) [more] ISEC2023-13
p.66
LOIS, SITE, ISEC 2023-11-09
10:50
Hiroshima Satellite Campus Hiroshima
(Primary: On-site, Secondary: Online)
[Invited Talk] Security Technologies to Improve Content-Distribution and Broadcasting Services
Kazuto Ogawa (NICT) ISEC2023-54 SITE2023-48 LOIS2023-12
Nowadays, technologies for information security have become essential in the world cyber-space.
PC users know their val... [more]
ISEC2023-54 SITE2023-48 LOIS2023-12
p.1
LOIS, SITE, ISEC 2023-11-09
12:40
Hiroshima Satellite Campus Hiroshima
(Primary: On-site, Secondary: Online)
Private-preserving encoding and decoding using variable-length coding schemes
Yuki Seto, Kunihiko Sadakane, Kazunari Tozawa (UTokyo) ISEC2023-55 SITE2023-49 LOIS2023-13
Variable-length segmented bit-vectors are commonly used in variable-length coding schemes and the construction of succin... [more] ISEC2023-55 SITE2023-49 LOIS2023-13
pp.2-9
LOIS, SITE, ISEC 2023-11-09
13:05
Hiroshima Satellite Campus Hiroshima
(Primary: On-site, Secondary: Online)
An Optimization Method for Share Reconstruction in (k,n)-Threshold Secret Sharing Scheme Using Exclusive-OR
Shogo Naganuma, Yutaro Taki, Shigeru Fujita (CIT) ISEC2023-56 SITE2023-50 LOIS2023-14
We propose a method to reduce the computational complexity of generating extended shares and regenerating lost shares in... [more] ISEC2023-56 SITE2023-50 LOIS2023-14
pp.10-17
LOIS, SITE, ISEC 2023-11-09
13:30
Hiroshima Satellite Campus Hiroshima
(Primary: On-site, Secondary: Online)
Optimum Median-Sum Fingerprinting for Winternitz One-Time Signature
Motonari Honda, Yuichi Kaji (NU) ISEC2023-57 SITE2023-51 LOIS2023-15
Winternitz one-time signature (OTS) plays a core role in practical quantum-secure hash-based digital signature schemes. ... [more] ISEC2023-57 SITE2023-51 LOIS2023-15
pp.18-25
LOIS, SITE, ISEC 2023-11-09
13:55
Hiroshima Satellite Campus Hiroshima
(Primary: On-site, Secondary: Online)
ISEC2023-58 SITE2023-52 LOIS2023-16 With the spread of work style reforms such as remote work, communication about information security risks tends to be in... [more] ISEC2023-58 SITE2023-52 LOIS2023-16
pp.26-32
LOIS, SITE, ISEC 2023-11-09
14:20
Hiroshima Satellite Campus Hiroshima
(Primary: On-site, Secondary: Online)
Improving Triple Sieve Algorithm on Ideal Lattice
Seishiro Terada, Yuntao Wang, Atsuko Miyaji (Osaka Univ.) ISEC2023-59 SITE2023-53 LOIS2023-17
 [more] ISEC2023-59 SITE2023-53 LOIS2023-17
pp.33-40
LOIS, SITE, ISEC 2023-11-09
15:05
Hiroshima Satellite Campus Hiroshima
(Primary: On-site, Secondary: Online)
[Invited Talk] What Relationship can "Ethics of Conversations and Social Interactions" Have with "Information Ethics"?
Masahiko Mizutani (Kyoto Univ.)
 [more]
LOIS, SITE, ISEC 2023-11-09
15:50
Hiroshima Satellite Campus Hiroshima
(Primary: On-site, Secondary: Online)
[Invited Talk] Comment to the invited lecture"Being Together: Ethics of Conversations and Social Interactions"
Yusuke Nagato (Osaka Univ.)
 [more]
LOIS, SITE, ISEC 2023-11-09
16:40
Hiroshima Satellite Campus Hiroshima
(Primary: On-site, Secondary: Online)
Report of IEEE ISTAS 2023
Yusuke Kaneko (JRI) ISEC2023-60 SITE2023-54 LOIS2023-18
This paper documents the participation in IEEE ISTAS 2023. ISTAS is an annual conference organized by IEEE SSIT that del... [more] ISEC2023-60 SITE2023-54 LOIS2023-18
pp.41-48
LOIS, SITE, ISEC 2023-11-09
17:05
Hiroshima Satellite Campus Hiroshima
(Primary: On-site, Secondary: Online)
Harm Caused by Databases
Nobuyuki Yoshinaga () ISEC2023-61 SITE2023-55 LOIS2023-19
This paper argues that the harm caused by databases and algorithms is due to a failure of not being distributed fairly. ... [more] ISEC2023-61 SITE2023-55 LOIS2023-19
pp.49-53
LOIS, SITE, ISEC 2023-11-10
09:55
Hiroshima Satellite Campus Hiroshima
(Primary: On-site, Secondary: Online)
Proof-of-Concept and Discussion of Self-Management and Utilization of Personal Data in Broadcast Media Services
Chigusa Yamamura, Takumi Mouri, Yasuhiro Murasaki, Satoshi Fujitsu, Kinji Matsumura (NHK) ISEC2023-62 SITE2023-56 LOIS2023-20
Providing high-quality services that utilize personal data is an effective approach to providing new awareness and expan... [more] ISEC2023-62 SITE2023-56 LOIS2023-20
pp.54-59
LOIS, SITE, ISEC 2023-11-10
10:20
Hiroshima Satellite Campus Hiroshima
(Primary: On-site, Secondary: Online)
Transaction Access Control Using ERC7303 and Its Applications
Ko Fujimura (Otsuma Women's Univ.) ISEC2023-63 SITE2023-57 LOIS2023-21
On the blockchain, applications such as cryptocurrencies, NFTs, and DeFi have become prevalent, and from around 2022, th... [more] ISEC2023-63 SITE2023-57 LOIS2023-21
pp.60-65
LOIS, SITE, ISEC 2023-11-10
10:45
Hiroshima Satellite Campus Hiroshima
(Primary: On-site, Secondary: Online)
NTP Tunneling Threat Model Verification and Countermeasure
Shinjisangeru Sugasawa, Hisayoshi Kunimune, Shigeaki Tanimoto (CIT) ISEC2023-64 SITE2023-58 LOIS2023-22
Fraudulent covert communication methods are techniques used by attackers to avoid detection of malicious communication b... [more] ISEC2023-64 SITE2023-58 LOIS2023-22
pp.66-71
LOIS, SITE, ISEC 2023-11-10
11:20
Hiroshima Satellite Campus Hiroshima
(Primary: On-site, Secondary: Online)
Consideration of progressive BKZ by reordering of GramSchmidt vectors
Katsuya Nakashima, Wang Yuntao, Miyaji Atsuko (Osaka Univ.) ISEC2023-65 SITE2023-59 LOIS2023-23
(To be available after the conference date) [more] ISEC2023-65 SITE2023-59 LOIS2023-23
pp.72-77
LOIS, SITE, ISEC 2023-11-10
11:45
Hiroshima Satellite Campus Hiroshima
(Primary: On-site, Secondary: Online)
Secure Identity-Based Authenticated Key Exchange with Multiple Private Key Generators against Malicious Generators
Kazuma Wariki, Atsushi Fujioka (Kanagawa Univ.), Akira Nagai, Kan Yasuda (NTT) ISEC2023-66 SITE2023-60 LOIS2023-24
We propose a new security model, id(m)-aneCK model, for identity-based authenticated key exchange with multiple private ... [more] ISEC2023-66 SITE2023-60 LOIS2023-24
pp.78-85
LOIS, SITE, ISEC 2023-11-10
12:10
Hiroshima Satellite Campus Hiroshima
(Primary: On-site, Secondary: Online)
Zero-Knowledge Proofs for ownership of Deep Neural Network
Shungo Sato, Hidema Tanaka (NDA) ISEC2023-67 SITE2023-61 LOIS2023-25
Because AI technologies have rapidly spread and developed in our society, Neural Networks, which are one of Machine Lear... [more] ISEC2023-67 SITE2023-61 LOIS2023-25
pp.86-92
LOIS, SITE, ISEC 2023-11-10
13:35
Hiroshima Satellite Campus Hiroshima
(Primary: On-site, Secondary: Online)
Side-Channel Security Evaluation of ASCON Implementation
Daisuke Iwasa, Rei Ueno (Tohoku University), Kazuhide Fukushima (KDDI Research, Inc.), Naofumi Homma (Tohoku University) ISEC2023-68 SITE2023-62 LOIS2023-26
(To be available after the conference date) [more] ISEC2023-68 SITE2023-62 LOIS2023-26
pp.93-97
LOIS, SITE, ISEC 2023-11-10
14:00
Hiroshima Satellite Campus Hiroshima
(Primary: On-site, Secondary: Online)
A Study on Side-Channel Attacks for Unrolled Implementation of Block Ciphers
Teppei Higashi, Rei Ueno, Naofumi Homma (Tohoku Univ) ISEC2023-69 SITE2023-63 LOIS2023-27
(To be available after the conference date) [more] ISEC2023-69 SITE2023-63 LOIS2023-27
pp.98-102
LOIS, SITE, ISEC 2023-11-10
14:25
Hiroshima Satellite Campus Hiroshima
(Primary: On-site, Secondary: Online)
A Proposed Link Key Hijacking Attack Using the Power-Saving Mode against Bluetooth BR/EDR
Keiichiro Kimura, Hiroki Kuzuno, Yoshiaki Shiraishi, Masakatu Morii (Kobe Univ.) ISEC2023-70 SITE2023-64 LOIS2023-28
With the growing demand for Bluetooth devices, the power-saving mode of Bluetooth, which reduces the power consumption o... [more] ISEC2023-70 SITE2023-64 LOIS2023-28
pp.103-109
LOIS, SITE, ISEC 2023-11-10
15:00
Hiroshima Satellite Campus Hiroshima
(Primary: On-site, Secondary: Online)
The New Ecodesign Regulation in EU -- Focusing on the Development of “the Right to Repair” --
Yusuke Tachibana (FIT) ISEC2023-71 SITE2023-65 LOIS2023-29
The European Commission has proposed an eco-design regulation that will establish minimum requirements for cell phones, ... [more] ISEC2023-71 SITE2023-65 LOIS2023-29
pp.110-113
LOIS, SITE, ISEC 2023-11-10
15:25
Hiroshima Satellite Campus Hiroshima
(Primary: On-site, Secondary: Online)
Improvements for Enhancing the Reliability of NFTs -- NFT Challenges and Solutions --
Yasushi Nakayama (SBI FERI) ISEC2023-72 SITE2023-66 LOIS2023-30
Non-Fungible Token (NFT) is a technology that enables the "one and only" nature of the target digital data, as well as p... [more] ISEC2023-72 SITE2023-66 LOIS2023-30
pp.114-118
LOIS, SITE, ISEC 2023-11-10
15:50
Hiroshima Satellite Campus Hiroshima
(Primary: On-site, Secondary: Online)
A Legally Regulatable Stablecoin on a Public Blockchain -- Four Corners Model for Stablecoin --
Hayato Shimamura, Shigeichiro Yamasaki (Kindai Univ.) ISEC2023-73 SITE2023-67 LOIS2023-31
The purpose of this research is to propose a legally regulatable stablecoin system on a public blockchain. In June 2022,... [more] ISEC2023-73 SITE2023-67 LOIS2023-31
pp.119-126
RCC, ISEC, IT, WBS 2024-03-13
09:15
Osaka Osaka Univ. (Suita Campus) Research on safety verification of Japanese stamp
Uehara Asato (NTT-Me), Matsuzawa Yuito, Sugita Makoto (SUS) IT2023-75 ISEC2023-74 WBS2023-63 RCC2023-57
In recent years, machine learning has been used with high accuracy in the security field for handwriting appraisal and f... [more] IT2023-75 ISEC2023-74 WBS2023-63 RCC2023-57
pp.1-4
RCC, ISEC, IT, WBS 2024-03-13
09:40
Osaka Osaka Univ. (Suita Campus) An improvement method and security evaluation for the method of protecting ownership using digital watermark
Dung Ta Anh, Hidema Tanaka (NDA) IT2023-76 ISEC2023-75 WBS2023-64 RCC2023-58
Since developing high-performance AI models requires significant time and cost, it is common to customize publicly avail... [more] IT2023-76 ISEC2023-75 WBS2023-64 RCC2023-58
pp.5-11
RCC, ISEC, IT, WBS 2024-03-13
10:05
Osaka Osaka Univ. (Suita Campus) A Study of Feature Point Extraction Methods Suitable for Non-Referenced Local Watermarking in Still Images
Kota Sasaki, Siyi Shang, Masazumi Kurihara, Kazuhiko Yamaguchi (UEC) IT2023-77 ISEC2023-76 WBS2023-65 RCC2023-59
The watermarking based on detection without original data is advantageous in practical use because it does not require a... [more] IT2023-77 ISEC2023-76 WBS2023-65 RCC2023-59
pp.12-19
RCC, ISEC, IT, WBS 2024-03-13
09:15
Osaka Osaka Univ. (Suita Campus) Performance Evaluation of Visible Light Communication System Using Imaginary Images based Image Classifier
Masataka Naito, Tadahiro Wada, Kaiji Mukumoto (Shizuoka Univ.), Hiraku Okada (Nagoya Univ.) IT2023-78 ISEC2023-77 WBS2023-66 RCC2023-60
For visible light communication systems that utilizes machine learning-based image classifiers for information embedding... [more] IT2023-78 ISEC2023-77 WBS2023-66 RCC2023-60
pp.20-25
RCC, ISEC, IT, WBS 2024-03-13
09:40
Osaka Osaka Univ. (Suita Campus) A Study of Parameter Optimization for Underwater Visible Light Communication using Angle Diversity Transceiver
Keigo Matsunaga, Yusuke Kozawa, Hiromasa Habuchi (Ibaraki Univ) IT2023-79 ISEC2023-78 WBS2023-67 RCC2023-61
In recent years, underwater visible light communication (UVLC) is expected to play an important role in constructing fle... [more] IT2023-79 ISEC2023-78 WBS2023-67 RCC2023-61
pp.26-31
RCC, ISEC, IT, WBS 2024-03-13
10:05
Osaka Osaka Univ. (Suita Campus) A study of transmitter optical color selection for Underwater SLIPT system using Power Splitting receiver
Honoka Yoshinaga, Yusuke Kozawa, Hiromasa Habuchi (Ibaraki Univ.) IT2023-80 ISEC2023-79 WBS2023-68 RCC2023-62
In recent years, underwater simultaneous light wave information and power transfer (USLIPT) system has attracted attenti... [more] IT2023-80 ISEC2023-79 WBS2023-68 RCC2023-62
pp.32-37
RCC, ISEC, IT, WBS 2024-03-13
10:45
Osaka Osaka Univ. (Suita Campus) Note on Impossibility of Tight Reduction on IND-CCA secure IdentityBased Encryption with Multiple Private-Key Generators
Yudai Suzuki, Atsushi Fujioka (Kanagawa Univ.), Akira Nagai (NTT Social Informatics Lab.) IT2023-81 ISEC2023-80 WBS2023-69 RCC2023-63
Identity-Based Encryption with Multiple Private-Key Generators (mPKG-IBE) has been proposed by Fujioka and Yoneyama at P... [more] IT2023-81 ISEC2023-80 WBS2023-69 RCC2023-63
pp.38-43
RCC, ISEC, IT, WBS 2024-03-13
11:10
Osaka Osaka Univ. (Suita Campus) Revisiting the Soundness of 5-Pass Identification Scheme
Daigo Kuroki, Kaoru Takemure, Bagus Santoso (UEC) IT2023-82 ISEC2023-81 WBS2023-70 RCC2023-64
We observe that mostly, the security of 5-pass identification schemes
have only been analyzed in a emph{rough} way as f... [more]
IT2023-82 ISEC2023-81 WBS2023-70 RCC2023-64
pp.44-51
RCC, ISEC, IT, WBS 2024-03-13
11:35
Osaka Osaka Univ. (Suita Campus) Proxy Re-Authentication Capable of Key and Data Compression
Yoshiro Matsuoka, Sohto Chiku (YNU), Keisuke Hara (AIST/YNU), Junji Shikata (YNU) IT2023-83 ISEC2023-82 WBS2023-71 RCC2023-65
In this paper, we propose a new cryptographic protocol called proxy re-authentication capable of key and data compressio... [more] IT2023-83 ISEC2023-82 WBS2023-71 RCC2023-65
pp.52-59
RCC, ISEC, IT, WBS 2024-03-13
10:45
Osaka Osaka Univ. (Suita Campus) Neural Network-based Compensation of Wideband Nonlinear Distortion for MIMO Transmission with Virtualized Terminal
Taishi Watanabe, Takeo Ohseki, Issei Kanno (KDDI Research) IT2023-84 ISEC2023-83 WBS2023-72 RCC2023-66
(To be available after the conference date) [more] IT2023-84 ISEC2023-83 WBS2023-72 RCC2023-66
pp.60-65
RCC, ISEC, IT, WBS 2024-03-13
11:10
Osaka Osaka Univ. (Suita Campus) Position Estimation Accuracy of Mobile User based on Multiple Observation of Doppler-shifts in Positioning System using Unmanned Aerial Vehicle
Hideaki Ito, Hiroyasu Ishikawa (Nihon Uniuv.) IT2023-85 ISEC2023-84 WBS2023-73 RCC2023-67
In the typical unmanned aircraft system (UAS) which provides temporal communication services under emergency and rescue ... [more] IT2023-85 ISEC2023-84 WBS2023-73 RCC2023-67
pp.66-71
RCC, ISEC, IT, WBS 2024-03-13
11:35
Osaka Osaka Univ. (Suita Campus) A Study on a Link Design Method based on the Meteor Burst Communication Channel Model
Hiroto Iwasaki, Kaishi Mukumoto, Tadahiro Wada (Shizuoka Univ.) IT2023-86 ISEC2023-85 WBS2023-74 RCC2023-68
Meteor bursts are roughly classified into underdense and overdense bursts according to their line electron density. As f... [more] IT2023-86 ISEC2023-85 WBS2023-74 RCC2023-68
pp.72-77
RCC, ISEC, IT, WBS 2024-03-13
13:00
Osaka Osaka Univ. (Suita Campus) [Invited Talk] Recent Developments in Quantum Statistics
Akio Fujiwara (Osaka Univ.) IT2023-87 ISEC2023-86 WBS2023-75 RCC2023-69
Suppose that one has $n$ copies of a quantum system each in the same state depending on an unknown parameter $¥theta$, a... [more] IT2023-87 ISEC2023-86 WBS2023-75 RCC2023-69
p.78
RCC, ISEC, IT, WBS 2024-03-13
14:15
Osaka Osaka Univ. (Suita Campus) Proxy Re-encryption based on LPN
Haruki Fujimoto, Shingo Sato, Junji Shikata (YNU) IT2023-88 ISEC2023-87 WBS2023-76 RCC2023-70
We propose a proxy re-encryption (PRE) scheme based on the Learning Parity with Noise (LPN) problem using error-correcti... [more] IT2023-88 ISEC2023-87 WBS2023-76 RCC2023-70
pp.79-86
RCC, ISEC, IT, WBS 2024-03-13
14:40
Osaka Osaka Univ. (Suita Campus) Performance Evaluation of Post-Quantum Digital Signature Schemes
Ryoto Morizono, Yuntao Wang, Atsuko Miyaji (Osaka Univ.) IT2023-89 ISEC2023-88 WBS2023-77 RCC2023-71
It is believed that RSA and elliptic curve cryptography, which are currently widely used, may be broken by quantum compu... [more] IT2023-89 ISEC2023-88 WBS2023-77 RCC2023-71
pp.87-93
RCC, ISEC, IT, WBS 2024-03-13
15:05
Osaka Osaka Univ. (Suita Campus) Public-Key Identification Scheme Based on a New NP-Hard Tensor Problem
Akitaka Yokota, Bagus Santoso (UEC) IT2023-90 ISEC2023-89 WBS2023-78 RCC2023-72
No general quantum algorithm is known to efficiently solve computational problems based on
Multivariate Quadratic Poly... [more]
IT2023-90 ISEC2023-89 WBS2023-78 RCC2023-72
pp.94-101
RCC, ISEC, IT, WBS 2024-03-13
14:15
Osaka Osaka Univ. (Suita Campus) Quantum Insertion Correcting Algorithm for Quantum Deletion Correcting Codes Based on Quantum Reed-Solomon Codes
Koki Sasaki, Takayuki Nozaki (Yamaguchi Univ.) IT2023-91 ISEC2023-90 WBS2023-79 RCC2023-73
Research on quantum insertion or deletion error correcting codes has become active in recent years.In 2023, Hagiwara con... [more] IT2023-91 ISEC2023-90 WBS2023-79 RCC2023-73
pp.102-107
RCC, ISEC, IT, WBS 2024-03-13
14:40
Osaka Osaka Univ. (Suita Campus) Sparse Superposition Codes Using Second Order Reed-Muller: Orthogonal Encoding
Tsukasa Osaka (Doshisha Univ.), Guanghui Song (Xidian Univ.), Tomotaka Kimura, Jun Cheng (Doshisha Univ.) IT2023-92 ISEC2023-91 WBS2023-80 RCC2023-74
A family of block orthogonal sparse superposition codes is proposed. The dictionary matrix consists of
all the second o... [more]
IT2023-92 ISEC2023-91 WBS2023-80 RCC2023-74
pp.108-113
RCC, ISEC, IT, WBS 2024-03-13
15:05
Osaka Osaka Univ. (Suita Campus) A solution of degree solving problem of the commutative fourth order recurrecne relation with two varibales over Z_2k
Daisaburo Yoshioka, Takuma Nishizaka (Sojo Univ.) IT2023-93 ISEC2023-92 WBS2023-81 RCC2023-75
 [more] IT2023-93 ISEC2023-92 WBS2023-81 RCC2023-75
pp.114-117
RCC, ISEC, IT, WBS 2024-03-13
14:15
Osaka Osaka Univ. (Suita Campus) Data processing methods for high-performance Privacy-Preserving Machine Learning
Tatsuhiro Yamatsuki (Osaka Univ.), Atsuko Miyaji (Osaka Univ./JAIST) IT2023-94 ISEC2023-93 WBS2023-82 RCC2023-76
Currently, attempts are being made in various fields to solve problems by utilizing big data. However, privacy protectio... [more] IT2023-94 ISEC2023-93 WBS2023-82 RCC2023-76
pp.118-126
RCC, ISEC, IT, WBS 2024-03-13
14:40
Osaka Osaka Univ. (Suita Campus) On Privacy Mechanism to Discreat Data fit for Machine Learning
Tomoshi Yagishita, Atsuko Miyaji (OU) IT2023-95 ISEC2023-94 WBS2023-83 RCC2023-77
In recent years, while the use of personal data has become increasingly active, the importance of privacy protection has... [more] IT2023-95 ISEC2023-94 WBS2023-83 RCC2023-77
pp.127-134
RCC, ISEC, IT, WBS 2024-03-13
15:05
Osaka Osaka Univ. (Suita Campus) Efficient Replay Data Selection in Continual Federated Learning Model
Yuto Kitano (Kobe Univ), Lihua Wang (NICT), Seiichi Ozawa (Kobe Univ) IT2023-96 ISEC2023-95 WBS2023-84 RCC2023-78
In this study, we propose a continual federated learning that can continuously learn distributed data generated daily by... [more] IT2023-96 ISEC2023-95 WBS2023-84 RCC2023-78
pp.135-141
RCC, ISEC, IT, WBS 2024-03-13
15:30
Osaka Osaka Univ. (Suita Campus) Implementation and Application of a Library for Differential Privacy Broadly Applicable in the Python Ecosystem
Takumi Hiraoka, Shouhei Hanaoka, Kenjiro Taura (The University of Tokyo) IT2023-97 ISEC2023-96 WBS2023-85 RCC2023-79
 [more] IT2023-97 ISEC2023-96 WBS2023-85 RCC2023-79
pp.142-149
RCC, ISEC, IT, WBS 2024-03-13
16:10
Osaka Osaka Univ. (Suita Campus) A consideration on the generation of algebraic surfaces that can evaluate the computational complexity of section-finding problem
Kosuke Sakata (UTokyo), Koichiro Akiyama (Toshiba) IT2023-98 ISEC2023-97 WBS2023-86 RCC2023-80
We report that a method for generating algebraic surfaces, theoretically evaluable for the computational complexity of t... [more] IT2023-98 ISEC2023-97 WBS2023-86 RCC2023-80
pp.150-157
RCC, ISEC, IT, WBS 2024-03-13
16:35
Osaka Osaka Univ. (Suita Campus) Consideration on Definition Field for Efficient Ring-LWE Problem
Rintaro Yamada, Shinya Okumura, Atsuko Miyaji (OU) IT2023-99 ISEC2023-98 WBS2023-87 RCC2023-81
Currently, as one of the candidates for the post-quantum cryptography, there are cryptosystems based on the difficulty o... [more] IT2023-99 ISEC2023-98 WBS2023-87 RCC2023-81
pp.158-165
RCC, ISEC, IT, WBS 2024-03-13
17:00
Osaka Osaka Univ. (Suita Campus) Study on the computatinal cost of Triple Sieve algorithm by applying in ideal property
Seishiro Terada, Yuntao Wang, Atsuko Miyaji (Osaka Univ.) IT2023-100 ISEC2023-99 WBS2023-88 RCC2023-82
 [more] IT2023-100 ISEC2023-99 WBS2023-88 RCC2023-82
pp.166-173
RCC, ISEC, IT, WBS 2024-03-13
16:10
Osaka Osaka Univ. (Suita Campus) Variable-Lowpass-Filter Stability Guarantee Utilizing an Even-Symmetric Unity-Bounded Function
Tian-Bo Deng (Toho Univ.) IT2023-101 ISEC2023-100 WBS2023-89 RCC2023-83
A variable digital filter (VDF) can tune its frequency response instantly without necessitating redesigning a new filter... [more] IT2023-101 ISEC2023-100 WBS2023-89 RCC2023-83
pp.174-178
RCC, ISEC, IT, WBS 2024-03-13
16:35
Osaka Osaka Univ. (Suita Campus) A Study on Polar Codes Design with Robustness against Channel SNR Fluctuation
Hidetake Matsui, Hideki Ochiai (YNU) IT2023-102 ISEC2023-101 WBS2023-90 RCC2023-84
Polar codes are known to achieve high reliability with low decoding complexity. The design of polar codes requires the s... [more] IT2023-102 ISEC2023-101 WBS2023-90 RCC2023-84
pp.179-184
RCC, ISEC, IT, WBS 2024-03-13
17:00
Osaka Osaka Univ. (Suita Campus) Data-Driven Design of Sensor Networks Using Distributed Event-Triggered Communication
Ryosuke Adachi, Yuji Wakasa (Yamaguchi Univ.) IT2023-103 ISEC2023-102 WBS2023-91 RCC2023-85
 [more] IT2023-103 ISEC2023-102 WBS2023-91 RCC2023-85
pp.185-188
RCC, ISEC, IT, WBS 2024-03-14
09:05
Osaka Osaka Univ. (Suita Campus) Partial Key Exposure Attacks on UOV-like Signatures
Yuki Seto, Hiroki Furue, Atsushi Takayasu (UTokyo) IT2023-104 ISEC2023-103 WBS2023-92 RCC2023-86
NIST is currently working on the standardization of post-quantum cryptography (PQC). Forty signature schemes were submit... [more] IT2023-104 ISEC2023-103 WBS2023-92 RCC2023-86
pp.189-196
RCC, ISEC, IT, WBS 2024-03-14
09:30
Osaka Osaka Univ. (Suita Campus) Security Analysis of Backdoored Classic McEliece in a Multi-User Setting
Dai Miura, Hyungrok Jo, Shingo Sato, Junji Shikata (Yokohama National Univ.) IT2023-105 ISEC2023-104 WBS2023-93 RCC2023-87
Several attacks have been proposed for the Classic McEliece cryptosystem, which is one of the 4th round candidates of th... [more] IT2023-105 ISEC2023-104 WBS2023-93 RCC2023-87
pp.197-204
RCC, ISEC, IT, WBS 2024-03-14
09:55
Osaka Osaka Univ. (Suita Campus) A generalization of ISD algorithm for Syndrome Decoding Problem
Asuka Wakasugi (EAGLYS), Tada Mitsuru (Chiba Univ.) IT2023-106 ISEC2023-105 WBS2023-94 RCC2023-88
The Information Set Decoding (ISD) algorithm is the best-known decoding algorithm for the syndrome decoding problem, whi... [more] IT2023-106 ISEC2023-105 WBS2023-94 RCC2023-88
pp.205-211
RCC, ISEC, IT, WBS 2024-03-14
10:20
Osaka Osaka Univ. (Suita Campus) Consideration of BKZ by reordering lattice basis vectors
Katsuya Katsuya, Yuntao Wang, Atsuko Miyaji (Osaka Univ.) IT2023-107 ISEC2023-106 WBS2023-95 RCC2023-89
 [more] IT2023-107 ISEC2023-106 WBS2023-95 RCC2023-89
pp.212-219
RCC, ISEC, IT, WBS 2024-03-14
09:05
Osaka Osaka Univ. (Suita Campus) IT2023-108 ISEC2023-107 WBS2023-96 RCC2023-90 In a secret sharing, a dealer generates n shares from a secret and random numbers and distributes the shares to each of ... [more] IT2023-108 ISEC2023-107 WBS2023-96 RCC2023-90
pp.220-225
RCC, ISEC, IT, WBS 2024-03-14
09:30
Osaka Osaka Univ. (Suita Campus) Achievable Rate of Coded Caching Scheme with Cache Memories of Different Sizes
Akihito Nagaya, Hiroki Koga (Univ. of Tsukuba) IT2023-109 ISEC2023-108 WBS2023-97 RCC2023-91
In the coded caching scheme proposed by Maddah-Ali and Niesen,
we usually consider the setup where $K$ users have resp... [more]
IT2023-109 ISEC2023-108 WBS2023-97 RCC2023-91
pp.226-231
RCC, ISEC, IT, WBS 2024-03-14
09:55
Osaka Osaka Univ. (Suita Campus) New Algorithms for Computing a Correct Decoding Probability Exponent and an Error Decoding Probability Exponent with Cost Constraints and their Equivalency
Koki Kazama (Waseda Univ.), Akira Kamatsuka (Shonan Institute of Technology), Takahiro Yoshida (Nihon Univ.) IT2023-110 ISEC2023-109 WBS2023-98 RCC2023-92
In channel coding, there are two representative previous algorithms for computing cost-constrained correct decoding prob... [more] IT2023-110 ISEC2023-109 WBS2023-98 RCC2023-92
pp.232-237
RCC, ISEC, IT, WBS 2024-03-14
10:20
Osaka Osaka Univ. (Suita Campus) IT2023-111 ISEC2023-110 WBS2023-99 RCC2023-93 This paper deals with variable-length lossy source coding in which the criteria are a cumulant generating function of co... [more] IT2023-111 ISEC2023-110 WBS2023-99 RCC2023-93
pp.238-240
RCC, ISEC, IT, WBS 2024-03-14
09:05
Osaka Osaka Univ. (Suita Campus) Efficient Key-Value Commitments with batch update and verification
Toshiyuki Mineta, Atsuko Miyaji (OU) IT2023-112 ISEC2023-111 WBS2023-100 RCC2023-94
As Blockchain grows in size, the resources to validate that a transaction is true increase linearly. Key-value commitme... [more] IT2023-112 ISEC2023-111 WBS2023-100 RCC2023-94
pp.241-248
RCC, ISEC, IT, WBS 2024-03-14
09:30
Osaka Osaka Univ. (Suita Campus) A Study on Malicious Communication Detection Using Attack Characteristics of Malware on an Internal Network.
Ken Aono, Yuki Ishida, Atsushi Waseda, Masaki Hanada (Tokyo Univ. of information Sciences) IT2023-113 ISEC2023-112 WBS2023-101 RCC2023-95
Recently, targeted attacks have been increasing.
Malicious attackers use malware to gain access to the organization's ... [more]
IT2023-113 ISEC2023-112 WBS2023-101 RCC2023-95
pp.249-253
RCC, ISEC, IT, WBS 2024-03-14
09:55
Osaka Osaka Univ. (Suita Campus) Comparison of accuracy of classification methods using machine learning for imaged malware
Kenta Usui, Hiroki Tanioka, Masahiko Sano, Kenji Matsuura, Tetsushi Ueta (Tokushima Univ.) IT2023-114 ISEC2023-113 WBS2023-102 RCC2023-96
In recent years, the damage caused by malware has become more serious, and the increase in the number of variants of exi... [more] IT2023-114 ISEC2023-113 WBS2023-102 RCC2023-96
pp.254-258
RCC, ISEC, IT, WBS 2024-03-14
10:20
Osaka Osaka Univ. (Suita Campus) Improving classification accuracy of imaged malware through data expansion
Kaoru Yokobori, Hiroki Tanioka, Masahiko Sano, Kenji Matsuura, Tetsushi Ueta (Tokushima Univ.) IT2023-115 ISEC2023-114 WBS2023-103 RCC2023-97
Although malware-based attacks have existed for years,
malware infections increased in 2019 and 2020.
One of the reaso... [more]
IT2023-115 ISEC2023-114 WBS2023-103 RCC2023-97
pp.259-264
RCC, ISEC, IT, WBS 2024-03-14
11:00
Osaka Osaka Univ. (Suita Campus) [Invited Talk] Cryptographic Research Based on Algebraic Curve Computation
Katsuyuki Takashima (Waseda Univ.) IT2023-116 ISEC2023-115 WBS2023-104 RCC2023-98
We have a wide range of cryptographic primitives based on elliptic curves, i.e., widely deployed public key cryptosystem... [more] IT2023-116 ISEC2023-115 WBS2023-104 RCC2023-98
p.265
RCC, ISEC, IT, WBS 2024-03-14
13:00
Osaka Osaka Univ. (Suita Campus) [Special Invited Talk] Smart Radio and Reliable Communication & Control -- A Journey Through Research and Emerging Challenges --
Masaaki Katayama (Nagoya Univ.) RCS2023-276 SR2023-99 SRW2023-63 IT2023-117 ISEC2023-116 WBS2023-105 RCC2023-99
In Smart Radio, traditional hard-fixed circuits are realized using flexible devices and computers, marking the integrati... [more] RCS2023-276 SR2023-99 SRW2023-63 IT2023-117 ISEC2023-116 WBS2023-105 RCC2023-99
p.125(RCS), p.57(SR), p.90(SRW), p.266(ISEC), p.266(WBS), p.266(RCC)
RCC, ISEC, IT, WBS 2024-03-14
14:15
Osaka Osaka Univ. (Suita Campus) An Identity Management System using Group Signatures with Message-Dependent Opening
Yuto Imura, Keita Emura (Kanazawa Univ.) IT2023-118 ISEC2023-117 WBS2023-106 RCC2023-100
Isshiki et al. (ACM DRM 2006) proposed a privacy-preserving ID management system using group signatures (Isshiki system)... [more] IT2023-118 ISEC2023-117 WBS2023-106 RCC2023-100
pp.267-272
RCC, ISEC, IT, WBS 2024-03-14
14:40
Osaka Osaka Univ. (Suita Campus) Encrypted data sharing system based on IBE secure against the KGC
Hinata Nishino, Emura keita (Kanazawa Univ) IT2023-119 ISEC2023-118 WBS2023-107 RCC2023-101
Encryption technology to send and share data is popularized. However, these tools can protect communication route, but t... [more] IT2023-119 ISEC2023-118 WBS2023-107 RCC2023-101
pp.273-278
RCC, ISEC, IT, WBS 2024-03-14
15:05
Osaka Osaka Univ. (Suita Campus) Improvement of non-interactive privacy-preserving document classification
Yuhei Kitahara (Tokyo Tech), Hibiki Oka, Akira Nakahashi (iric), Wakaha Ogata (Tokyo Tech) IT2023-120 ISEC2023-119 WBS2023-108 RCC2023-102
In the Machine Learning as a Service model, where clients delegate inference to servers, leakage of client inputs or mac... [more] IT2023-120 ISEC2023-119 WBS2023-108 RCC2023-102
pp.279-286
RCC, ISEC, IT, WBS 2024-03-14
15:30
Osaka Osaka Univ. (Suita Campus) Research Directions in Formal Verification of Transport Layer Security Protocols
Hideki Sakurada (NTT/Kyushu Univ.), Kouichi Sakurai (Kyushu Univ./ATR) IT2023-121 ISEC2023-120 WBS2023-109 RCC2023-103
The TLS protocol is used to secure communications between web servers and clients, and is essential for security: it all... [more] IT2023-121 ISEC2023-120 WBS2023-109 RCC2023-103
pp.287-293
RCC, ISEC, IT, WBS 2024-03-14
14:15
Osaka Osaka Univ. (Suita Campus) Performance evaluation of throughput increase method in Optical wireless OFDM system in multipath channel.
Yutaka Munakata, Kouji Ohuchi (Shizuoka Univ.) IT2023-125 ISEC2023-124 WBS2023-113 RCC2023-107
To ease the shortage of radio frequency resources, optical wireless communications (OWC) are attracting much attention. ... [more] IT2023-125 ISEC2023-124 WBS2023-113 RCC2023-107
pp.312-316
RCC, ISEC, IT, WBS 2024-03-14
14:40
Osaka Osaka Univ. (Suita Campus) Performance Evaluation of OFDM Systems with Clipping and Partial Filtering
Wataru Hatano, Hideki Ochiai (YNU) IT2023-123 ISEC2023-122 WBS2023-111 RCC2023-105
 [more] IT2023-123 ISEC2023-122 WBS2023-111 RCC2023-105
pp.300-305
RCC, ISEC, IT, WBS 2024-03-14
15:05
Osaka Osaka Univ. (Suita Campus) Secrity Oriented Design of Polar-Coded OFDM on Selective Fading Channels
Yuki Kuraya, Hideki Ochiai (YNU) IT2023-124 ISEC2023-123 WBS2023-112 RCC2023-106
We introduce a physical layer security scheme based on a polar-coded OFDM system in wireless communication. Our approach... [more] IT2023-124 ISEC2023-123 WBS2023-112 RCC2023-106
pp.306-311
RCC, ISEC, IT, WBS 2024-03-14
15:30
Osaka Osaka Univ. (Suita Campus) A selection method of candidate constellation for the superimposed QAM signal method to reduce PAPR in OFDM system
Takashi Aoki, Tsuyoshi Arai, Hiroshi Inai, Hideaki Wakabayashi (Okayama Prefectural Univ.) IT2023-122 ISEC2023-121 WBS2023-110 RCC2023-104
Modulated signal of Orthogonal Frequency Division Multiplexing (OFDM) systems tend to have a large peak-to-average power... [more] IT2023-122 ISEC2023-121 WBS2023-110 RCC2023-104
pp.294-299
RCC, ISEC, IT, WBS 2024-03-14
14:15
Osaka Osaka Univ. (Suita Campus) Proposal of Methods to Detect Backdoor Attacks Using Signature Embedding Techniques
Shintaro Yamashita, Wang Yuntao, Atsuko Miyaji (OU) IT2023-126 ISEC2023-125 WBS2023-114 RCC2023-108
 [more] IT2023-126 ISEC2023-125 WBS2023-114 RCC2023-108
pp.317-323
RCC, ISEC, IT, WBS 2024-03-14
14:40
Osaka Osaka Univ. (Suita Campus) Proposing the privacy-preserving cross-chain communication
Hideaki Miyaji, Noriaki Kamiyama (RU) IT2023-127 ISEC2023-126 WBS2023-115 RCC2023-109
Cross-chain communication is a cryptographic technique for sending and receiving tokens and data among different blockch... [more] IT2023-127 ISEC2023-126 WBS2023-115 RCC2023-109
pp.324-331
RCC, ISEC, IT, WBS 2024-03-14
15:05
Osaka Osaka Univ. (Suita Campus) Phishing Detection Method Based on Content-Similarity in DNS Graph
WenBo Zhou, Yuki Ishida, Atsushi Waseda, Masaki Hanada (Tokyo Univ. of information Sciences) IT2023-128 ISEC2023-127 WBS2023-116 RCC2023-110
Phishing attacks, known as a prevalent form of social engineering attacks, have become one of the most significant cyber... [more] IT2023-128 ISEC2023-127 WBS2023-116 RCC2023-110
pp.332-336
RCC, ISEC, IT, WBS 2024-03-14
15:30
Osaka Osaka Univ. (Suita Campus) Phishing Detection Method Based on Machine Learning Using DNS Graph
Yuki Ishida, Syota Nihei, Junko Sato, Atsushi Waseda, Masaki Hanada (Tokyo Univ. of Information Sciences) IT2023-129 ISEC2023-128 WBS2023-117 RCC2023-111
Recently, phishing scams have been on the rise, the need for effective defense methods against this phishing scams.
A b... [more]
IT2023-129 ISEC2023-128 WBS2023-117 RCC2023-111
pp.337-342
RCC, ISEC, IT, WBS 2024-03-14
16:10
Osaka Osaka Univ. (Suita Campus) An Efficient Differential Attack Resistance Evaluation Method for Block Ciphers
Haruka Sugai, Yasutaka Igarashi (TUS) IT2023-130 ISEC2023-129 WBS2023-118 RCC2023-112
 [more] IT2023-130 ISEC2023-129 WBS2023-118 RCC2023-112
pp.343-349
RCC, ISEC, IT, WBS 2024-03-14
16:35
Osaka Osaka Univ. (Suita Campus) Integral Attack with Bit-Based Division Property on Block Cipher LBC
Naoki Shibayama, Yasutaka Igarashi (Tokyo Univ. of Science) IT2023-131 ISEC2023-130 WBS2023-119 RCC2023-113
LBC is a block cipher proposed by Kapalova et al. in 2023. The block size is 64-bit, the secret key size is 80-bit, and ... [more] IT2023-131 ISEC2023-130 WBS2023-119 RCC2023-113
pp.350-357
RCC, ISEC, IT, WBS 2024-03-14
17:00
Osaka Osaka Univ. (Suita Campus) Reconstruction of Boyer quantum algorithm and its application to hash puzzles
Chris Idota, Yuichi Kaji (Nagoya Univ.) IT2023-132 ISEC2023-131 WBS2023-120 RCC2023-114
This study investigates the computational complexity of solving hash puzzles using quantum algorithms. A hash puzzle is ... [more] IT2023-132 ISEC2023-131 WBS2023-120 RCC2023-114
pp.358-365
RCC, ISEC, IT, WBS 2024-03-14
16:10
Osaka Osaka Univ. (Suita Campus) Tradeoff relations between entropic quantities and their application in quantum information theory
Michele Dall'Arno (Toyohashi U. of Technology) IT2023-133 ISEC2023-132 WBS2023-121 RCC2023-115
In this presentation we introduce tradeoff relations between entropic quantities such as Renyi entropies, the subentropy... [more] IT2023-133 ISEC2023-132 WBS2023-121 RCC2023-115
pp.366-367
RCC, ISEC, IT, WBS 2024-03-14
16:35
Osaka Osaka Univ. (Suita Campus) Construction of an MDL Estimator with Tight Risk Bound in Simple ReLU Networks
Yoshinari Takeishi, Jun'ichi Takeuchi (Kyushu Univ.) IT2023-134 ISEC2023-133 WBS2023-122 RCC2023-116
We consider the problem of estimating the parameters of the final layer in two-layer neural networks with ReLU activatio... [more] IT2023-134 ISEC2023-133 WBS2023-122 RCC2023-116
pp.368-373
RCC, ISEC, IT, WBS 2024-03-14
17:00
Osaka Osaka Univ. (Suita Campus) Comparison of Scale Parameter Dependence of Estimation Performance in Sparse Bayesian Linear Regression Model with Variance Gamma Prior Distribution and t-Prior Distribution
Kazuaki Murayama (UEC) IT2023-135 ISEC2023-134 WBS2023-123 RCC2023-117
In the sparse estimation with linear regression model, the variance gamma distribution and t-distribution can be used as... [more] IT2023-135 ISEC2023-134 WBS2023-123 RCC2023-117
pp.374-379
 Results 1 - 139 of 139  /   
Choose a download format for default settings. [NEW !!]
Text format pLaTeX format CSV format BibTeX format
Copyright and reproduction : All rights are reserved and no part of this publication may be reproduced or transmitted in any form or by any means, electronic or mechanical, including photocopy, recording, or any information storage and retrieval system, without permission in writing from the publisher. Notwithstanding, instructors are permitted to photocopy isolated articles for noncommercial classroom use without fee. (License No.: 10GA0019/12GB0052/13GB0056/17GB0034/18GB0034)


[Return to Top Page]

[Return to IEICE Web Page]


The Institute of Electronics, Information and Communication Engineers (IEICE), Japan