Committee |
Date Time |
Place |
Paper Title / Authors |
Abstract |
Paper # |
EMM, BioX, ISEC, SITE, ICSS, HWS, IPSJ-CSEC, IPSJ-SPT [detail] |
2023-07-24 10:05 |
Hokkaido |
Hokkaido Jichiro Kaikan |
[Invited Talk]
Please fill in this form Hideyuki Nakashima (SCU) |
(To be available after the conference date) [more] |
|
EMM, BioX, ISEC, SITE, ICSS, HWS, IPSJ-CSEC, IPSJ-SPT [detail] |
2023-07-24 10:35 |
Hokkaido |
Hokkaido Jichiro Kaikan |
[Invited Talk]
Please fill in this form Mai Sugimoto (Kansai Univ.) |
[more] |
|
EMM, BioX, ISEC, SITE, ICSS, HWS, IPSJ-CSEC, IPSJ-SPT [detail] |
2023-07-24 10:50 |
Hokkaido |
Hokkaido Jichiro Kaikan |
[Invited Talk]
Please fill in this form Nobutsugu Kanzaki (Nanzan Univ.) |
[more] |
|
EMM, BioX, ISEC, SITE, ICSS, HWS, IPSJ-CSEC, IPSJ-SPT [detail] |
2023-07-24 14:00 |
Hokkaido |
Hokkaido Jichiro Kaikan |
Non-profiled Side-channel Attacks by using Clustering Scores in Deep Learning model (1)
-- Attacks by using Auto Encoder against hardware-implemented AES -- Mizuki Nagahisa, Fukuda Yuta, Yoshida Kota, Fujino Takeshi (Ristumei Univ) ISEC2023-14 SITE2023-8 BioX2023-17 HWS2023-14 ICSS2023-11 EMM2023-14 |
In 2019, Differential Deep Learning Analysis (DDLA) was proposed as a deep-learning based side-channel attack in non-pro... [more] |
ISEC2023-14 SITE2023-8 BioX2023-17 HWS2023-14 ICSS2023-11 EMM2023-14 pp.1-6 |
EMM, BioX, ISEC, SITE, ICSS, HWS, IPSJ-CSEC, IPSJ-SPT [detail] |
2023-07-24 14:20 |
Hokkaido |
Hokkaido Jichiro Kaikan |
Non-profiled Side-Channel Attacks by using Clustering Scores in Deep Learning model (2)
-- Attacks by using Models to Predict Ciphertext against Hardware-implemented AES with Countermeasures -- Yuta Fukuda, Kota Yoshida, Takeshi Fujino (Ritsumeikan Univ.) ISEC2023-15 SITE2023-9 BioX2023-18 HWS2023-15 ICSS2023-12 EMM2023-15 |
[more] |
ISEC2023-15 SITE2023-9 BioX2023-18 HWS2023-15 ICSS2023-12 EMM2023-15 pp.7-12 |
EMM, BioX, ISEC, SITE, ICSS, HWS, IPSJ-CSEC, IPSJ-SPT [detail] |
2023-07-24 14:40 |
Hokkaido |
Hokkaido Jichiro Kaikan |
Improving Non-profiled DL-based Side-Channel Attack Using Multiple Partial Key Difference Estimation Rikuma Tanaka, Rei Ueno (Tohoku Univ.), Akira Ito (NTT), Naofumi Homma (Tohoku Univ.) ISEC2023-16 SITE2023-10 BioX2023-19 HWS2023-16 ICSS2023-13 EMM2023-16 |
This paper presents a method of improving Non-profiled Deep-Learning Side-Channel Attack (DL-SCA) of AES. The previous ... [more] |
ISEC2023-16 SITE2023-10 BioX2023-19 HWS2023-16 ICSS2023-13 EMM2023-16 pp.13-18 |
EMM, BioX, ISEC, SITE, ICSS, HWS, IPSJ-CSEC, IPSJ-SPT [detail] |
2023-07-24 15:00 |
Hokkaido |
Hokkaido Jichiro Kaikan |
Tolerance Evaluation Cost Reduction of Deep-Learning-Based Side-Channel Attack Using Signal-to-Noise Ratio of Leakage Traces Tatsuya Sakagami, Masaki Himuro, Kengo Iokibe, Yoshitaka Toyota (Okayama Univ.) ISEC2023-17 SITE2023-11 BioX2023-20 HWS2023-17 ICSS2023-14 EMM2023-17 |
Side-channel attacks (SCA) have been proposed to decrypt modern cryptography by analyzing the physical behavior of crypt... [more] |
ISEC2023-17 SITE2023-11 BioX2023-20 HWS2023-17 ICSS2023-14 EMM2023-17 pp.19-24 |
EMM, BioX, ISEC, SITE, ICSS, HWS, IPSJ-CSEC, IPSJ-SPT [detail] |
2023-07-24 15:20 |
Hokkaido |
Hokkaido Jichiro Kaikan |
Deep Learning-Based Side-Channel Analysis Considering the Effect of Noise and Transfer Characteristics on the Measurement Process Yoshiki Kitamura, Taiki Kitazawa, Yuichi Hayashi (NAIST) ISEC2023-18 SITE2023-12 BioX2023-21 HWS2023-18 ICSS2023-15 EMM2023-18 |
(To be available after the conference date) [more] |
ISEC2023-18 SITE2023-12 BioX2023-21 HWS2023-18 ICSS2023-15 EMM2023-18 pp.25-29 |
EMM, BioX, ISEC, SITE, ICSS, HWS, IPSJ-CSEC, IPSJ-SPT [detail] |
2023-07-24 16:00 |
Hokkaido |
Hokkaido Jichiro Kaikan |
Analysis of effective attribute values on risk-based authentication with browser fingerprint Takashi Tsukazaki, Yuichi Futa (TUT), Hiroyuki Okazaki, Hikofumi Suzuki (Shinshu Univ.) ISEC2023-19 SITE2023-13 BioX2023-22 HWS2023-19 ICSS2023-16 EMM2023-19 |
Browser fingerprinting is to identify website users by collecting information about device. Browser fingerprint is used ... [more] |
ISEC2023-19 SITE2023-13 BioX2023-22 HWS2023-19 ICSS2023-16 EMM2023-19 pp.30-36 |
EMM, BioX, ISEC, SITE, ICSS, HWS, IPSJ-CSEC, IPSJ-SPT [detail] |
2023-07-24 18:20 |
Hokkaido |
Hokkaido Jichiro Kaikan |
International regulatory trend survey report on AI
-- Status of the European Parliament's consideration of the AI Act in the EU -- Naonori Kato (KDDI Research/NFI/RIKEN), Yosuke Murakami, Minoru Kozu (KDDI Research) ISEC2023-20 SITE2023-14 BioX2023-23 HWS2023-20 ICSS2023-17 EMM2023-20 |
On 11 May 2023, the European Parliament's Committee on the Internal Market and Committee on Civil Liberties adopted by a... [more] |
ISEC2023-20 SITE2023-14 BioX2023-23 HWS2023-20 ICSS2023-17 EMM2023-20 pp.37-44 |
EMM, BioX, ISEC, SITE, ICSS, HWS, IPSJ-CSEC, IPSJ-SPT [detail] |
2023-07-24 14:00 |
Hokkaido |
Hokkaido Jichiro Kaikan |
Key Generation by Secure Computation of ID-NIKS based on Discrete Logarithm Problem over Composite Modulus Hayato Inoue, Mizuki Miki, Yasuyuki Murakami (OECU) ISEC2023-21 SITE2023-15 BioX2023-24 HWS2023-21 ICSS2023-18 EMM2023-21 |
In 1990, Murakami and Kasahara proposed an ID based non-interactive key-sharing scheme (MK scheme) that uses the discret... [more] |
ISEC2023-21 SITE2023-15 BioX2023-24 HWS2023-21 ICSS2023-18 EMM2023-21 pp.45-51 |
EMM, BioX, ISEC, SITE, ICSS, HWS, IPSJ-CSEC, IPSJ-SPT [detail] |
2023-07-24 14:20 |
Hokkaido |
Hokkaido Jichiro Kaikan |
A Generic Construction of Outsider Anonymous Broadcast Encryption with Keyword Search Keita Emura (NICT), Kaisei Kajita, Go Ohtake (NHK) ISEC2023-22 SITE2023-16 BioX2023-25 HWS2023-22 ICSS2023-19 EMM2023-22 |
Broadcast encryption with keyword search (BEKS) has been proposed (Attrapadung et al. at ASIACRYPT 2006/Chatterjee-Mukhe... [more] |
ISEC2023-22 SITE2023-16 BioX2023-25 HWS2023-22 ICSS2023-19 EMM2023-22 pp.52-59 |
EMM, BioX, ISEC, SITE, ICSS, HWS, IPSJ-CSEC, IPSJ-SPT [detail] |
2023-07-24 14:40 |
Hokkaido |
Hokkaido Jichiro Kaikan |
Hierarchical Identity-based Matchmaking Encryption Sohto Chiku (YNU), Keisuke Hara (AIST/YNU), Junji Shikata (YNU) ISEC2023-23 SITE2023-17 BioX2023-26 HWS2023-23 ICSS2023-20 EMM2023-23 |
Identity-based matchmaking encryption (IB-ME) is an advanced encryption system that enables a sender and a receiver to s... [more] |
ISEC2023-23 SITE2023-17 BioX2023-26 HWS2023-23 ICSS2023-20 EMM2023-23 pp.60-67 |
EMM, BioX, ISEC, SITE, ICSS, HWS, IPSJ-CSEC, IPSJ-SPT [detail] |
2023-07-24 15:00 |
Hokkaido |
Hokkaido Jichiro Kaikan |
Note on the Robustness of Single Sign-On Algorithm Based on Verifiable Encryption Chihiro Okubo, Satoshi Iriyama, Maki Kihara (TUS) ISEC2023-24 SITE2023-18 BioX2023-27 HWS2023-24 ICSS2023-21 EMM2023-24 |
[more] |
ISEC2023-24 SITE2023-18 BioX2023-27 HWS2023-24 ICSS2023-21 EMM2023-24 pp.68-71 |
EMM, BioX, ISEC, SITE, ICSS, HWS, IPSJ-CSEC, IPSJ-SPT [detail] |
2023-07-24 15:20 |
Hokkaido |
Hokkaido Jichiro Kaikan |
Threshold ring signature based on isogeny Naho Isogai, Takeshi Nakai, Koutarou Suzuki (TUT) ISEC2023-25 SITE2023-19 BioX2023-28 HWS2023-25 ICSS2023-22 EMM2023-25 |
RippleSign is the first $T$-out-of-$N$ threshold ring signature scheme based on isogeny,which has an issue that the sign... [more] |
ISEC2023-25 SITE2023-19 BioX2023-28 HWS2023-25 ICSS2023-22 EMM2023-25 pp.72-79 |
EMM, BioX, ISEC, SITE, ICSS, HWS, IPSJ-CSEC, IPSJ-SPT [detail] |
2023-07-24 16:00 |
Hokkaido |
Hokkaido Jichiro Kaikan |
Estimation of rotation angle using pilot signal for image watermarking Rinka Kawano, Masaki Kawamura (Yamaguchi Univ.) ISEC2023-26 SITE2023-20 BioX2023-29 HWS2023-26 ICSS2023-23 EMM2023-26 |
Robust watermarking methods must be resistant to attacks. In conventional methods, errors have been corrected after extr... [more] |
ISEC2023-26 SITE2023-20 BioX2023-29 HWS2023-26 ICSS2023-23 EMM2023-26 pp.80-85 |
EMM, BioX, ISEC, SITE, ICSS, HWS, IPSJ-CSEC, IPSJ-SPT [detail] |
2023-07-24 16:20 |
Hokkaido |
Hokkaido Jichiro Kaikan |
A Random Ensemble Method with Encrypted Models for Improving Robustness against Adversarial Examples Ryota Iijima, Miki Tanaka, Sayaka Shiota, Hitoshi Kiya (Tokyo Metro. Univ.) ISEC2023-27 SITE2023-21 BioX2023-30 HWS2023-27 ICSS2023-24 EMM2023-27 |
[more] |
ISEC2023-27 SITE2023-21 BioX2023-30 HWS2023-27 ICSS2023-24 EMM2023-27 pp.86-90 |
EMM, BioX, ISEC, SITE, ICSS, HWS, IPSJ-CSEC, IPSJ-SPT [detail] |
2023-07-24 16:40 |
Hokkaido |
Hokkaido Jichiro Kaikan |
Novel Image authentication scheme using error correction code and digital signature Ken-ichi Sakina (QRTechnology) ISEC2023-28 SITE2023-22 BioX2023-31 HWS2023-28 ICSS2023-25 EMM2023-28 |
We propose a novel image authentication scheme using Reed-Solomon codes and elliptic curve digital signatures. Conventio... [more] |
ISEC2023-28 SITE2023-22 BioX2023-31 HWS2023-28 ICSS2023-25 EMM2023-28 pp.91-96 |
EMM, BioX, ISEC, SITE, ICSS, HWS, IPSJ-CSEC, IPSJ-SPT [detail] |
2023-07-24 17:20 |
Hokkaido |
Hokkaido Jichiro Kaikan |
An Identity-based Signature Scheme with Tight Security Reduction Jiawei Chen, Hyungrok Jo, Shingo Sato, Junji Shikata (YNU) ISEC2023-29 SITE2023-23 BioX2023-32 HWS2023-29 ICSS2023-26 EMM2023-29 |
In this paper, we propose an identity-based signature (IBS) scheme based on the supersingular isogeny problem, with tigh... [more] |
ISEC2023-29 SITE2023-23 BioX2023-32 HWS2023-29 ICSS2023-26 EMM2023-29 pp.97-104 |
EMM, BioX, ISEC, SITE, ICSS, HWS, IPSJ-CSEC, IPSJ-SPT [detail] |
2023-07-24 17:40 |
Hokkaido |
Hokkaido Jichiro Kaikan |
Statistical Key Recovery Attack Against the Peregrine Lattice-Based Signature Scheme Moeto Suzuki (Kyoto Univ.), Xiuhan Lin (Shandong Univ.), Shiduo Zhang (Tsinghua Univ.), Thomas Espitau (PQShield), Yang Yu (Tsinghua Univ.), Mehdi Tibouchi, Masayuki Abe (NTT) ISEC2023-30 SITE2023-24 BioX2023-33 HWS2023-30 ICSS2023-27 EMM2023-30 |
The Peregrine signature scheme, which is a high-speed variant of Falcon, is one of the candidates in the ongoing Korean ... [more] |
ISEC2023-30 SITE2023-24 BioX2023-33 HWS2023-30 ICSS2023-27 EMM2023-30 pp.105-112 |
EMM, BioX, ISEC, SITE, ICSS, HWS, IPSJ-CSEC, IPSJ-SPT [detail] |
2023-07-24 18:00 |
Hokkaido |
Hokkaido Jichiro Kaikan |
A security analysis on MQ-Sign submitted to Korean Post-Quantum Cryptography standardization Yasuhiko Ikematsu (Kyushu Univ.), Hyungrok Jo (YNU), Takanori Yasuda (OUS) ISEC2023-31 SITE2023-25 BioX2023-34 HWS2023-31 ICSS2023-28 EMM2023-31 |
MQ-Sign is a variant of the UOV singature scheme proposed by Shim et al. It has been suggested as a candidate for the st... [more] |
ISEC2023-31 SITE2023-25 BioX2023-34 HWS2023-31 ICSS2023-28 EMM2023-31 pp.113-118 |
EMM, BioX, ISEC, SITE, ICSS, HWS, IPSJ-CSEC, IPSJ-SPT [detail] |
2023-07-24 18:20 |
Hokkaido |
Hokkaido Jichiro Kaikan |
Implementation of Shor's algorithm for the discrete logarithm problem and experiments using the quantum computer simulator Kaito Kishi, Junpei Yamaguchi, Tetsuya Izu (Fujitsu Research), Noboru Kunihiro (Univ. of Tsukuba) ISEC2023-32 SITE2023-26 BioX2023-35 HWS2023-32 ICSS2023-29 EMM2023-32 |
Classical polynomial-time algorithms for solving the discrete logarithm problem (DLP) over a prime field have not been f... [more] |
ISEC2023-32 SITE2023-26 BioX2023-35 HWS2023-32 ICSS2023-29 EMM2023-32 pp.119-126 |
EMM, BioX, ISEC, SITE, ICSS, HWS, IPSJ-CSEC, IPSJ-SPT [detail] |
2023-07-24 16:20 |
Hokkaido |
Hokkaido Jichiro Kaikan |
Analysis of Snort's impact due to DDoS attacks Kano Yuki, Yuichi Futa (TUT), Okazaki Hiroyuki, Suzuki Hikofumi (SHINSYU UNIVERSITY) ISEC2023-33 SITE2023-27 BioX2023-36 HWS2023-33 ICSS2023-30 EMM2023-33 |
In recent years, the number of DDoS attacks has been increasing.Tokuyama et al.[1][2] constructed an environment in whic... [more] |
ISEC2023-33 SITE2023-27 BioX2023-36 HWS2023-33 ICSS2023-30 EMM2023-33 pp.127-132 |
EMM, BioX, ISEC, SITE, ICSS, HWS, IPSJ-CSEC, IPSJ-SPT [detail] |
2023-07-24 16:40 |
Hokkaido |
Hokkaido Jichiro Kaikan |
A Multiple Vantage Point-based Concept for Open-Source Information Space Awareness Blumbergs Bernhards (NAIST) ISEC2023-34 SITE2023-28 BioX2023-37 HWS2023-34 ICSS2023-31 EMM2023-34 |
The proposed concept bolsters visibility and provides context to cyber incident response teams countering malicious acti... [more] |
ISEC2023-34 SITE2023-28 BioX2023-37 HWS2023-34 ICSS2023-31 EMM2023-34 pp.133-140 |
EMM, BioX, ISEC, SITE, ICSS, HWS, IPSJ-CSEC, IPSJ-SPT [detail] |
2023-07-25 13:20 |
Hokkaido |
Hokkaido Jichiro Kaikan |
ISEC2023-35 SITE2023-29 BioX2023-38 HWS2023-35 ICSS2023-32 EMM2023-35 |
The Hardware Security Technical Committee invited the author to give a presentation about his recent elevation to IEEE F... [more] |
ISEC2023-35 SITE2023-29 BioX2023-38 HWS2023-35 ICSS2023-32 EMM2023-35 pp.141-146 |
EMM, BioX, ISEC, SITE, ICSS, HWS, IPSJ-CSEC, IPSJ-SPT [detail] |
2023-07-25 09:00 |
Hokkaido |
Hokkaido Jichiro Kaikan |
CNN-Based Iris Recognition Using Multi-spectral Iris Images Ryosuke Kuroda, Tetsuya Honda, Hironobu Takano (Toyama Prefectural Univ.) ISEC2023-36 SITE2023-30 BioX2023-39 HWS2023-36 ICSS2023-33 EMM2023-36 |
Iris recognition using a near-infrared camera is generally known as a biometric authentication method with high accuracy... [more] |
ISEC2023-36 SITE2023-30 BioX2023-39 HWS2023-36 ICSS2023-33 EMM2023-36 pp.147-151 |
EMM, BioX, ISEC, SITE, ICSS, HWS, IPSJ-CSEC, IPSJ-SPT [detail] |
2023-07-25 09:20 |
Hokkaido |
Hokkaido Jichiro Kaikan |
Automatic Credential Entry EMS: EMS System that reproduces Secret Information without exposing biometric data Takumi Takaiwa, Nozaki Shinnosuke, Numada Kota, Shibata Tsubasa, Okumura Sana, Takigawa Soichi, Ohki Tetsushi, Nishigaki Masakatsu (Shizuoka Univ.) ISEC2023-37 SITE2023-31 BioX2023-40 HWS2023-37 ICSS2023-34 EMM2023-37 |
(To be available after the conference date) [more] |
ISEC2023-37 SITE2023-31 BioX2023-40 HWS2023-37 ICSS2023-34 EMM2023-37 pp.152-158 |
EMM, BioX, ISEC, SITE, ICSS, HWS, IPSJ-CSEC, IPSJ-SPT [detail] |
2023-07-25 09:40 |
Hokkaido |
Hokkaido Jichiro Kaikan |
Implementation and Evaluation of Payload Encryption and Message Authentication Code Using Lightweight Cryptography ASCON in CAN FD Communication Kotaro Ishikawa, Naoto Kawahara (Okayama Univ.), Takuya Kusaka (Shimane Univ.), Yuta Kodera, Yasuyuki Nogami (Okayama Univ.) ISEC2023-38 SITE2023-32 BioX2023-41 HWS2023-38 ICSS2023-35 EMM2023-38 |
In recent years, automotive systems have become more advanced with technologies such as autonomous driving and connected... [more] |
ISEC2023-38 SITE2023-32 BioX2023-41 HWS2023-38 ICSS2023-35 EMM2023-38 pp.159-164 |
EMM, BioX, ISEC, SITE, ICSS, HWS, IPSJ-CSEC, IPSJ-SPT [detail] |
2023-07-25 10:00 |
Hokkaido |
Hokkaido Jichiro Kaikan |
An Implementation and Evaluation of Communication Schemes Using Authenticated Cryptography for MAVLink Communication Ryuto Kuwada, Nobuya Ishihara, Yuta Kodera, Yasuyuki Nogami (Okayama Univ.) ISEC2023-39 SITE2023-33 BioX2023-42 HWS2023-39 ICSS2023-36 EMM2023-39 |
MAVLink is a lightweight communication protocol used between drones and ground stations to transmit drone status and con... [more] |
ISEC2023-39 SITE2023-33 BioX2023-42 HWS2023-39 ICSS2023-36 EMM2023-39 pp.165-170 |
EMM, BioX, ISEC, SITE, ICSS, HWS, IPSJ-CSEC, IPSJ-SPT [detail] |
2023-07-25 10:20 |
Hokkaido |
Hokkaido Jichiro Kaikan |
Takayuki Kondo, Taiki Kitazawa, Shugo Kaji, Daisuke Fujimoto, Yuichi Hayashi (NAIST) ISEC2023-40 SITE2023-34 BioX2023-43 HWS2023-40 ICSS2023-37 EMM2023-40 |
(To be available after the conference date) [more] |
ISEC2023-40 SITE2023-34 BioX2023-43 HWS2023-40 ICSS2023-37 EMM2023-40 pp.171-175 |
EMM, BioX, ISEC, SITE, ICSS, HWS, IPSJ-CSEC, IPSJ-SPT [detail] |
2023-07-25 11:00 |
Hokkaido |
Hokkaido Jichiro Kaikan |
An Approach to Authorization Protocol Using PUF-based Access Token Risa Yashiro, Kohei Isobe, Hiroki Kunii (SECOM) ISEC2023-41 SITE2023-35 BioX2023-44 HWS2023-41 ICSS2023-38 EMM2023-41 |
OAuth is one of the protocols that enable to authorize resource access for a client through API. The authorization by OA... [more] |
ISEC2023-41 SITE2023-35 BioX2023-44 HWS2023-41 ICSS2023-38 EMM2023-41 pp.176-181 |
EMM, BioX, ISEC, SITE, ICSS, HWS, IPSJ-CSEC, IPSJ-SPT [detail] |
2023-07-25 11:20 |
Hokkaido |
Hokkaido Jichiro Kaikan |
Secure Cryptographic Unit with built-in Signature Generation Hardware for Aggregate Signature Schemes and its FPGA Implementation Toshihiro Sato, Shohei Kawasaki (SCU), Kaoru Masada (Tokyo Univ.), Riku Anzai, Junichi Sakamoto, Naoki Yoshida (YNU), Yasuyoshi Uemura (SCU), Makoto Ikeda (Tokyo Univ.), Tsutomu Matsumoto (YNU) ISEC2023-42 SITE2023-36 BioX2023-45 HWS2023-42 ICSS2023-39 EMM2023-42 |
Secure Cryptographic Unit (SCU) consists of a hardware cryptographic engine and an access control mechanism for the engi... [more] |
ISEC2023-42 SITE2023-36 BioX2023-45 HWS2023-42 ICSS2023-39 EMM2023-42 pp.182-187 |
EMM, BioX, ISEC, SITE, ICSS, HWS, IPSJ-CSEC, IPSJ-SPT [detail] |
2023-07-25 11:40 |
Hokkaido |
Hokkaido Jichiro Kaikan |
Clone Resistance of Artifact Metrics: Spatial Frequency Filtering Akira Iwahashi, Iwaki Miyamoto, Naoki Yoshida, Tsutomu Matsumoto (YNU) ISEC2023-43 SITE2023-37 BioX2023-46 HWS2023-43 ICSS2023-40 EMM2023-43 |
Artifact metrics is a technology that uses features unique to an artifact to authenticate the artifact in question. Unli... [more] |
ISEC2023-43 SITE2023-37 BioX2023-46 HWS2023-43 ICSS2023-40 EMM2023-43 pp.188-193 |
EMM, BioX, ISEC, SITE, ICSS, HWS, IPSJ-CSEC, IPSJ-SPT [detail] |
2023-07-25 09:00 |
Hokkaido |
Hokkaido Jichiro Kaikan |
Side-Channel Attacks on Unrolled Implementation of Trivium Soichiro Kobayashi, Rei Ueno (Tohoku Univ.), Yosuke Todo (NTT), Naofumi Homma (Tohoku Univ.) ISEC2023-44 SITE2023-38 BioX2023-47 HWS2023-44 ICSS2023-41 EMM2023-44 |
This paper describes a side-channel attack (SCA) on unrolled implementation of Trivium. Previous SCAs on Trivium, such a... [more] |
ISEC2023-44 SITE2023-38 BioX2023-47 HWS2023-44 ICSS2023-41 EMM2023-44 pp.194-201 |
EMM, BioX, ISEC, SITE, ICSS, HWS, IPSJ-CSEC, IPSJ-SPT [detail] |
2023-07-25 09:20 |
Hokkaido |
Hokkaido Jichiro Kaikan |
SAT-based Differential analysis of AEGIS Family Takuro Shiraya (UOH), Kosei Sakamoto (Mitsubishi Electric), Takanori Isobe (UOH) ISEC2023-45 SITE2023-39 BioX2023-48 HWS2023-45 ICSS2023-42 EMM2023-45 |
We evaluate the security of the AEGIS family which is authenticated encryption with an associated data scheme to achieve... [more] |
ISEC2023-45 SITE2023-39 BioX2023-48 HWS2023-45 ICSS2023-42 EMM2023-45 pp.202-207 |
EMM, BioX, ISEC, SITE, ICSS, HWS, IPSJ-CSEC, IPSJ-SPT [detail] |
2023-07-25 09:40 |
Hokkaido |
Hokkaido Jichiro Kaikan |
SAT-based Search of Related-key Impossible Distinguisher for Piccolo, TWINE, LBlock Shion Utsumi (Univ. of Hyogo), Kosei Sakamoto (MELCO), Takanori Isobe (Univ. of Hyogo) ISEC2023-46 SITE2023-40 BioX2023-49 HWS2023-46 ICSS2023-43 EMM2023-46 |
In this paper, we evaluate security of Piccolo, TWINE, T-TWINE and LBlcok angainst on impossilbe related-key differentia... [more] |
ISEC2023-46 SITE2023-40 BioX2023-49 HWS2023-46 ICSS2023-43 EMM2023-46 pp.208-213 |
EMM, BioX, ISEC, SITE, ICSS, HWS, IPSJ-CSEC, IPSJ-SPT [detail] |
2023-07-25 10:00 |
Hokkaido |
Hokkaido Jichiro Kaikan |
Higher Order Differential Property of Block Cipher LBC-3 Naoki Shibayama, Yasutaka Igarashi (Tokyo Univ. of Science) ISEC2023-47 SITE2023-41 BioX2023-50 HWS2023-47 ICSS2023-44 EMM2023-47 |
LBC-3 is a block cipher proposed by Nyssanbayeva et al. in 2022. The block size is 64-bit, the secret key size is 80-bit... [more] |
ISEC2023-47 SITE2023-41 BioX2023-50 HWS2023-47 ICSS2023-44 EMM2023-47 pp.214-220 |
EMM, BioX, ISEC, SITE, ICSS, HWS, IPSJ-CSEC, IPSJ-SPT [detail] |
2023-07-25 10:20 |
Hokkaido |
Hokkaido Jichiro Kaikan |
On the Maximum Differential Characteristic Probabilities for Multi-Branch Structures Kazuma Taka (Hyogo Univ.), Kosei Sakamoto (Mitsubishi Electric), Takanori Isobe (Hyogo Univ.) ISEC2023-48 SITE2023-42 BioX2023-51 HWS2023-48 ICSS2023-45 EMM2023-48 |
The design of multiple-branch-based designs, such as the low-latency pseudo-random function Orthros, holds the potential... [more] |
ISEC2023-48 SITE2023-42 BioX2023-51 HWS2023-48 ICSS2023-45 EMM2023-48 pp.221-228 |
EMM, BioX, ISEC, SITE, ICSS, HWS, IPSJ-CSEC, IPSJ-SPT [detail] |
2023-07-25 11:00 |
Hokkaido |
Hokkaido Jichiro Kaikan |
Is Copying for Information Security Research ‘Fair Use’?
-- Apple Inc. v. Corellium, Inc., No. 21-12835 (11th Cir. 2023) -- Yusuke Tachibana (FIT) ISEC2023-49 SITE2023-43 BioX2023-52 HWS2023-49 ICSS2023-46 EMM2023-49 |
The replication of third-party software in the realm of information security research has the potential to encroach upon... [more] |
ISEC2023-49 SITE2023-43 BioX2023-52 HWS2023-49 ICSS2023-46 EMM2023-49 pp.229-231 |
EMM, BioX, ISEC, SITE, ICSS, HWS, IPSJ-CSEC, IPSJ-SPT [detail] |
2023-07-25 11:20 |
Hokkaido |
Hokkaido Jichiro Kaikan |
A Study on the Application of Nudge to Improve Cybersecurity Hideyuki Fujii (NRI Secure) ISEC2023-50 SITE2023-44 BioX2023-53 HWS2023-50 ICSS2023-47 EMM2023-50 |
One possible measure to improve cybersecurity is the use of "Nudge". Nudge is designed (choice architectures) that chang... [more] |
ISEC2023-50 SITE2023-44 BioX2023-53 HWS2023-50 ICSS2023-47 EMM2023-50 pp.232-238 |
EMM, BioX, ISEC, SITE, ICSS, HWS, IPSJ-CSEC, IPSJ-SPT [detail] |
2023-07-25 14:30 |
Hokkaido |
Hokkaido Jichiro Kaikan |
Security Analysis on Nostr protocol for decentralized SNS Hayato Kimura, Takanori Isobe (Univ. Hyogo) ISEC2023-51 SITE2023-45 BioX2023-54 HWS2023-51 ICSS2023-48 EMM2023-51 |
Nostr is a protocol for distributed social networking services (SNS) characterized by being Simple, Resilient, and Verif... [more] |
ISEC2023-51 SITE2023-45 BioX2023-54 HWS2023-51 ICSS2023-48 EMM2023-51 pp.239-246 |
EMM, BioX, ISEC, SITE, ICSS, HWS, IPSJ-CSEC, IPSJ-SPT [detail] |
2023-07-25 14:50 |
Hokkaido |
Hokkaido Jichiro Kaikan |
Anomaly detection with dataset including replay-attack communication Koushi Nishi, Futa Yuichi (TUT), Okazaki Hiroyuki (Shinshu University) ISEC2023-52 SITE2023-46 BioX2023-55 HWS2023-52 ICSS2023-49 EMM2023-52 |
General-purpose devices and communications are increasingly introduced to control systems in factories and power plants ... [more] |
ISEC2023-52 SITE2023-46 BioX2023-55 HWS2023-52 ICSS2023-49 EMM2023-52 pp.247-254 |
EMM, BioX, ISEC, SITE, ICSS, HWS, IPSJ-CSEC, IPSJ-SPT [detail] |
2023-07-25 15:10 |
Hokkaido |
Hokkaido Jichiro Kaikan |
Extended $k^m$-anonymity for randomization Masaya Kobayashi, Atsushi Fujioka (Kanagawa Univ.), Koji Chida (Gunma Univ.) ISEC2023-53 SITE2023-47 BioX2023-56 HWS2023-53 ICSS2023-50 EMM2023-53 |
Various models have been proposed to evaluate anonymity. Among them, $k$-anonymity is widely known as a representative a... [more] |
ISEC2023-53 SITE2023-47 BioX2023-56 HWS2023-53 ICSS2023-50 EMM2023-53 pp.255-260 |
ISEC |
2023-05-17 09:30 |
Tokyo |
Kikai-Shinko-Kaikan Bldg. |
Toward VMI configuration with smart contracts for demand forecasting Kenta Hagiwara (Tsukuba Univ.), Kazumasa Omote (Tsukuba Univ./NICT) ISEC2023-1 |
[more] |
ISEC2023-1 pp.1-8 |
ISEC |
2023-05-17 09:55 |
Tokyo |
Kikai-Shinko-Kaikan Bldg. |
Toward a System for Estimating Firm Popularity Using Educational Credentials NFT Keigo Yanai, Taisei Takahashi, Kazumasa Omote (Tsukuba Univ.) ISEC2023-2 |
Currently, there is no objective way to measure how popular a company is among students in the job hunting process. This... [more] |
ISEC2023-2 pp.9-16 |
ISEC |
2023-05-17 10:20 |
Tokyo |
Kikai-Shinko-Kaikan Bldg. |
Toward A Secure Contact Tracing Method Using Blockchain Mizuki Tsuchida (Tsukuba Univ.), Omote Kazumasa (Tsukuba Univ., NICT) ISEC2023-3 |
[more] |
ISEC2023-3 pp.17-24 |
ISEC |
2023-05-17 10:45 |
Tokyo |
Kikai-Shinko-Kaikan Bldg. |
On the Risk Assessment Method against ML-specific Attacks for ML system developers
-- A Damage Assessment Method for ML system developers -- Jun Yajima, Maki Inui, Kentarou Tsuji (Fujitsu Ltd.), Nobukazu Yoshioka (Waseda Univ.) ISEC2023-4 |
To develop machine learning (ML) systems that are secure againstML-specific attacks, to conduct threat assessment to fin... [more] |
ISEC2023-4 pp.25-32 |
ISEC |
2023-05-17 11:25 |
Tokyo |
Kikai-Shinko-Kaikan Bldg. |
[Invited Talk]
Towards Verifying Physical Assumption in Card-Based Cryptography (from SecITC 2022) Masahisa Shimano, Kazuo Sakiyama (UEC), Daiki Miyahara (UEC/AIST) ISEC2023-5 |
[more] |
ISEC2023-5 p.33 |
ISEC |
2023-05-17 11:55 |
Tokyo |
Kikai-Shinko-Kaikan Bldg. |
[Invited Talk]
Card-Based Single-Shuffle Protocols for Secure Multiple-Input AND and XOR Computations (from APKC 2022) Tomoki Kuzuma, Raimu Isuzugawa, Kodai Toyoda (Tohoku Univ), Daiki Miyahara (UEC), Takaaki Mizuki (Tohoku Univ) ISEC2023-6 |
In this invited talk, we introduce the paper ``Card-based Single-shuffle Protocols for Secure Multiple-input AND and XOR... [more] |
ISEC2023-6 p.34 |
ISEC |
2023-05-17 13:30 |
Tokyo |
Kikai-Shinko-Kaikan Bldg. |
Reducing the Number of Shuffles for Secure Multi-input AND Computation with Two Additional Cards Takuto Yoshida (NITIC), Keisuke Nakabayashi, Kodai Tanaka (Tohoku Univ), Eikoh Chida (NITIC), Takaaki Mizuki (Tohoku Univ) ISEC2023-7 |
(To be available after the conference date) [more] |
ISEC2023-7 pp.35-42 |
ISEC |
2023-05-17 13:55 |
Tokyo |
Kikai-Shinko-Kaikan Bldg. |
A Physical Zero-knowledge Proof for a Puzzle Generated by ChatGPT Kyosuke Hatsugai, Kyoichi Asano (UEC), Yoshiki Abe (UEC/AIST) ISEC2023-8 |
[more] |
ISEC2023-8 pp.43-48 |
ISEC |
2023-05-17 14:20 |
Tokyo |
Kikai-Shinko-Kaikan Bldg. |
Equivalent Secret Key-Recovery Attack on Knapsack Public Key Cryptosystem Ryuichi Sakai, Yasuyuki Murakami (OECU) ISEC2023-9 |
Shamir proposed an attack on Merkle-Hellman’s knapsack public key cryptosystem. This attack uses integer programming to ... [more] |
ISEC2023-9 pp.49-53 |
ISEC |
2023-05-17 14:45 |
Tokyo |
Kikai-Shinko-Kaikan Bldg. |
BDD enumeration for Module-LWE using lattice rotation structure Togo Sakurai, Atsushi Takayasu (The Univ. of Tokyo) ISEC2023-10 |
Module-LWE is the analog of LWE that includes algebraic structures. In July 2022, two cryptographic schemes based on Mod... [more] |
ISEC2023-10 pp.54-61 |
ISEC |
2023-05-17 15:25 |
Tokyo |
Kikai-Shinko-Kaikan Bldg. |
[Invited Talk]
An Empirical Study of Impact of Solidity Compiler Updates on Vulnerabilities (from BRAIN 2023) Chihiro Kado, Naoto Yanai, Jason Paul Cruz (Osaka Univ.), Shingo Okamura (NIT, Nara College) ISEC2023-11 |
Vulnerabilities are an important issue in Ethereum smart contracts. Although various vulnerability analysis tools have b... [more] |
ISEC2023-11 pp.62-64 |
ISEC |
2023-05-17 15:55 |
Tokyo |
Kikai-Shinko-Kaikan Bldg. |
[Invited Talk]
An Efficient Strategy to Construct a Better Differential on Multiple-Branch-Based Designs: Application to Orthros (from CT-RSA 2023) Kazuma Taka, Kosei Sakamoto (Hyogo Univ.), Tatsuya Ishikawa (WDB KOUGAKU Co.,Ltd.), Takanori Isobe (Hyogo Univ.) ISEC2023-12 |
As low-latency designs tend to have a small number of rounds to decrease latency, the differential-type cryptanalysis ca... [more] |
ISEC2023-12 p.65 |
ISEC |
2023-05-17 16:25 |
Tokyo |
Kikai-Shinko-Kaikan Bldg. |
[Invited Talk]
Concrete Quantum Cryptanalysis of Binary Elliptic Curves via Addition Chain (from CT-RSA 2023) Ren Taguchi, Atsushi Takayasu (The Univ. of Tokyo) ISEC2023-13 |
(To be available after the conference date) [more] |
ISEC2023-13 p.66 |
LOIS, SITE, ISEC |
2023-11-09 10:50 |
Hiroshima |
Satellite Campus Hiroshima (Primary: On-site, Secondary: Online) |
[Invited Talk]
Security Technologies to Improve Content-Distribution and Broadcasting Services Kazuto Ogawa (NICT) ISEC2023-54 SITE2023-48 LOIS2023-12 |
Nowadays, technologies for information security have become essential in the world cyber-space.
PC users know their val... [more] |
ISEC2023-54 SITE2023-48 LOIS2023-12 p.1 |
LOIS, SITE, ISEC |
2023-11-09 12:40 |
Hiroshima |
Satellite Campus Hiroshima (Primary: On-site, Secondary: Online) |
Private-preserving encoding and decoding using variable-length coding schemes Yuki Seto, Kunihiko Sadakane, Kazunari Tozawa (UTokyo) ISEC2023-55 SITE2023-49 LOIS2023-13 |
Variable-length segmented bit-vectors are commonly used in variable-length coding schemes and the construction of succin... [more] |
ISEC2023-55 SITE2023-49 LOIS2023-13 pp.2-9 |
LOIS, SITE, ISEC |
2023-11-09 13:05 |
Hiroshima |
Satellite Campus Hiroshima (Primary: On-site, Secondary: Online) |
An Optimization Method for Share Reconstruction in (k,n)-Threshold Secret Sharing Scheme Using Exclusive-OR Shogo Naganuma, Yutaro Taki, Shigeru Fujita (CIT) ISEC2023-56 SITE2023-50 LOIS2023-14 |
We propose a method to reduce the computational complexity of generating extended shares and regenerating lost shares in... [more] |
ISEC2023-56 SITE2023-50 LOIS2023-14 pp.10-17 |
LOIS, SITE, ISEC |
2023-11-09 13:30 |
Hiroshima |
Satellite Campus Hiroshima (Primary: On-site, Secondary: Online) |
Optimum Median-Sum Fingerprinting for Winternitz One-Time Signature Motonari Honda, Yuichi Kaji (NU) ISEC2023-57 SITE2023-51 LOIS2023-15 |
Winternitz one-time signature (OTS) plays a core role in practical quantum-secure hash-based digital signature schemes. ... [more] |
ISEC2023-57 SITE2023-51 LOIS2023-15 pp.18-25 |
LOIS, SITE, ISEC |
2023-11-09 13:55 |
Hiroshima |
Satellite Campus Hiroshima (Primary: On-site, Secondary: Online) |
ISEC2023-58 SITE2023-52 LOIS2023-16 |
With the spread of work style reforms such as remote work, communication about information security risks tends to be in... [more] |
ISEC2023-58 SITE2023-52 LOIS2023-16 pp.26-32 |
LOIS, SITE, ISEC |
2023-11-09 14:20 |
Hiroshima |
Satellite Campus Hiroshima (Primary: On-site, Secondary: Online) |
Improving Triple Sieve Algorithm on Ideal Lattice Seishiro Terada, Yuntao Wang, Atsuko Miyaji (Osaka Univ.) ISEC2023-59 SITE2023-53 LOIS2023-17 |
[more] |
ISEC2023-59 SITE2023-53 LOIS2023-17 pp.33-40 |
LOIS, SITE, ISEC |
2023-11-09 15:05 |
Hiroshima |
Satellite Campus Hiroshima (Primary: On-site, Secondary: Online) |
[Invited Talk]
What Relationship can "Ethics of Conversations and Social Interactions" Have with "Information Ethics"? Masahiko Mizutani (Kyoto Univ.) |
[more] |
|
LOIS, SITE, ISEC |
2023-11-09 15:50 |
Hiroshima |
Satellite Campus Hiroshima (Primary: On-site, Secondary: Online) |
[Invited Talk]
Comment to the invited lecture"Being Together: Ethics of Conversations and Social Interactions" Yusuke Nagato (Osaka Univ.) |
[more] |
|
LOIS, SITE, ISEC |
2023-11-09 16:40 |
Hiroshima |
Satellite Campus Hiroshima (Primary: On-site, Secondary: Online) |
Report of IEEE ISTAS 2023 Yusuke Kaneko (JRI) ISEC2023-60 SITE2023-54 LOIS2023-18 |
This paper documents the participation in IEEE ISTAS 2023. ISTAS is an annual conference organized by IEEE SSIT that del... [more] |
ISEC2023-60 SITE2023-54 LOIS2023-18 pp.41-48 |
LOIS, SITE, ISEC |
2023-11-09 17:05 |
Hiroshima |
Satellite Campus Hiroshima (Primary: On-site, Secondary: Online) |
Harm Caused by Databases Nobuyuki Yoshinaga () ISEC2023-61 SITE2023-55 LOIS2023-19 |
This paper argues that the harm caused by databases and algorithms is due to a failure of not being distributed fairly. ... [more] |
ISEC2023-61 SITE2023-55 LOIS2023-19 pp.49-53 |
LOIS, SITE, ISEC |
2023-11-10 09:55 |
Hiroshima |
Satellite Campus Hiroshima (Primary: On-site, Secondary: Online) |
Proof-of-Concept and Discussion of Self-Management and Utilization of Personal Data in Broadcast Media Services Chigusa Yamamura, Takumi Mouri, Yasuhiro Murasaki, Satoshi Fujitsu, Kinji Matsumura (NHK) ISEC2023-62 SITE2023-56 LOIS2023-20 |
Providing high-quality services that utilize personal data is an effective approach to providing new awareness and expan... [more] |
ISEC2023-62 SITE2023-56 LOIS2023-20 pp.54-59 |
LOIS, SITE, ISEC |
2023-11-10 10:20 |
Hiroshima |
Satellite Campus Hiroshima (Primary: On-site, Secondary: Online) |
Transaction Access Control Using ERC7303 and Its Applications Ko Fujimura (Otsuma Women's Univ.) ISEC2023-63 SITE2023-57 LOIS2023-21 |
On the blockchain, applications such as cryptocurrencies, NFTs, and DeFi have become prevalent, and from around 2022, th... [more] |
ISEC2023-63 SITE2023-57 LOIS2023-21 pp.60-65 |
LOIS, SITE, ISEC |
2023-11-10 10:45 |
Hiroshima |
Satellite Campus Hiroshima (Primary: On-site, Secondary: Online) |
NTP Tunneling Threat Model Verification and Countermeasure Shinjisangeru Sugasawa, Hisayoshi Kunimune, Shigeaki Tanimoto (CIT) ISEC2023-64 SITE2023-58 LOIS2023-22 |
Fraudulent covert communication methods are techniques used by attackers to avoid detection of malicious communication b... [more] |
ISEC2023-64 SITE2023-58 LOIS2023-22 pp.66-71 |
LOIS, SITE, ISEC |
2023-11-10 11:20 |
Hiroshima |
Satellite Campus Hiroshima (Primary: On-site, Secondary: Online) |
Consideration of progressive BKZ by reordering of GramSchmidt vectors Katsuya Nakashima, Wang Yuntao, Miyaji Atsuko (Osaka Univ.) ISEC2023-65 SITE2023-59 LOIS2023-23 |
(To be available after the conference date) [more] |
ISEC2023-65 SITE2023-59 LOIS2023-23 pp.72-77 |
LOIS, SITE, ISEC |
2023-11-10 11:45 |
Hiroshima |
Satellite Campus Hiroshima (Primary: On-site, Secondary: Online) |
Secure Identity-Based Authenticated Key Exchange with Multiple Private Key Generators against Malicious Generators Kazuma Wariki, Atsushi Fujioka (Kanagawa Univ.), Akira Nagai, Kan Yasuda (NTT) ISEC2023-66 SITE2023-60 LOIS2023-24 |
We propose a new security model, id(m)-aneCK model, for identity-based authenticated key exchange with multiple private ... [more] |
ISEC2023-66 SITE2023-60 LOIS2023-24 pp.78-85 |
LOIS, SITE, ISEC |
2023-11-10 12:10 |
Hiroshima |
Satellite Campus Hiroshima (Primary: On-site, Secondary: Online) |
Zero-Knowledge Proofs for ownership of Deep Neural Network Shungo Sato, Hidema Tanaka (NDA) ISEC2023-67 SITE2023-61 LOIS2023-25 |
Because AI technologies have rapidly spread and developed in our society, Neural Networks, which are one of Machine Lear... [more] |
ISEC2023-67 SITE2023-61 LOIS2023-25 pp.86-92 |
LOIS, SITE, ISEC |
2023-11-10 13:35 |
Hiroshima |
Satellite Campus Hiroshima (Primary: On-site, Secondary: Online) |
Side-Channel Security Evaluation of ASCON Implementation Daisuke Iwasa, Rei Ueno (Tohoku University), Kazuhide Fukushima (KDDI Research, Inc.), Naofumi Homma (Tohoku University) ISEC2023-68 SITE2023-62 LOIS2023-26 |
(To be available after the conference date) [more] |
ISEC2023-68 SITE2023-62 LOIS2023-26 pp.93-97 |
LOIS, SITE, ISEC |
2023-11-10 14:00 |
Hiroshima |
Satellite Campus Hiroshima (Primary: On-site, Secondary: Online) |
A Study on Side-Channel Attacks for Unrolled Implementation of Block Ciphers Teppei Higashi, Rei Ueno, Naofumi Homma (Tohoku Univ) ISEC2023-69 SITE2023-63 LOIS2023-27 |
(To be available after the conference date) [more] |
ISEC2023-69 SITE2023-63 LOIS2023-27 pp.98-102 |
LOIS, SITE, ISEC |
2023-11-10 14:25 |
Hiroshima |
Satellite Campus Hiroshima (Primary: On-site, Secondary: Online) |
A Proposed Link Key Hijacking Attack Using the Power-Saving Mode against Bluetooth BR/EDR Keiichiro Kimura, Hiroki Kuzuno, Yoshiaki Shiraishi, Masakatu Morii (Kobe Univ.) ISEC2023-70 SITE2023-64 LOIS2023-28 |
With the growing demand for Bluetooth devices, the power-saving mode of Bluetooth, which reduces the power consumption o... [more] |
ISEC2023-70 SITE2023-64 LOIS2023-28 pp.103-109 |
LOIS, SITE, ISEC |
2023-11-10 15:00 |
Hiroshima |
Satellite Campus Hiroshima (Primary: On-site, Secondary: Online) |
The New Ecodesign Regulation in EU
-- Focusing on the Development of “the Right to Repair” -- Yusuke Tachibana (FIT) ISEC2023-71 SITE2023-65 LOIS2023-29 |
The European Commission has proposed an eco-design regulation that will establish minimum requirements for cell phones, ... [more] |
ISEC2023-71 SITE2023-65 LOIS2023-29 pp.110-113 |
LOIS, SITE, ISEC |
2023-11-10 15:25 |
Hiroshima |
Satellite Campus Hiroshima (Primary: On-site, Secondary: Online) |
Improvements for Enhancing the Reliability of NFTs
-- NFT Challenges and Solutions -- Yasushi Nakayama (SBI FERI) ISEC2023-72 SITE2023-66 LOIS2023-30 |
Non-Fungible Token (NFT) is a technology that enables the "one and only" nature of the target digital data, as well as p... [more] |
ISEC2023-72 SITE2023-66 LOIS2023-30 pp.114-118 |
LOIS, SITE, ISEC |
2023-11-10 15:50 |
Hiroshima |
Satellite Campus Hiroshima (Primary: On-site, Secondary: Online) |
A Legally Regulatable Stablecoin on a Public Blockchain
-- Four Corners Model for Stablecoin -- Hayato Shimamura, Shigeichiro Yamasaki (Kindai Univ.) ISEC2023-73 SITE2023-67 LOIS2023-31 |
The purpose of this research is to propose a legally regulatable stablecoin system on a public blockchain. In June 2022,... [more] |
ISEC2023-73 SITE2023-67 LOIS2023-31 pp.119-126 |
RCC, ISEC, IT, WBS |
2024-03-13 09:15 |
Osaka |
Osaka Univ. (Suita Campus) |
Research on safety verification of Japanese stamp Uehara Asato (NTT-Me), Matsuzawa Yuito, Sugita Makoto (SUS) IT2023-75 ISEC2023-74 WBS2023-63 RCC2023-57 |
In recent years, machine learning has been used with high accuracy in the security field for handwriting appraisal and f... [more] |
IT2023-75 ISEC2023-74 WBS2023-63 RCC2023-57 pp.1-4 |
RCC, ISEC, IT, WBS |
2024-03-13 09:40 |
Osaka |
Osaka Univ. (Suita Campus) |
An improvement method and security evaluation for the method of protecting ownership using digital watermark Dung Ta Anh, Hidema Tanaka (NDA) IT2023-76 ISEC2023-75 WBS2023-64 RCC2023-58 |
Since developing high-performance AI models requires significant time and cost, it is common to customize publicly avail... [more] |
IT2023-76 ISEC2023-75 WBS2023-64 RCC2023-58 pp.5-11 |
RCC, ISEC, IT, WBS |
2024-03-13 10:05 |
Osaka |
Osaka Univ. (Suita Campus) |
A Study of Feature Point Extraction Methods Suitable for Non-Referenced Local Watermarking in Still Images Kota Sasaki, Siyi Shang, Masazumi Kurihara, Kazuhiko Yamaguchi (UEC) IT2023-77 ISEC2023-76 WBS2023-65 RCC2023-59 |
The watermarking based on detection without original data is advantageous in practical use because it does not require a... [more] |
IT2023-77 ISEC2023-76 WBS2023-65 RCC2023-59 pp.12-19 |
RCC, ISEC, IT, WBS |
2024-03-13 09:15 |
Osaka |
Osaka Univ. (Suita Campus) |
Performance Evaluation of Visible Light Communication System Using Imaginary Images based Image Classifier Masataka Naito, Tadahiro Wada, Kaiji Mukumoto (Shizuoka Univ.), Hiraku Okada (Nagoya Univ.) IT2023-78 ISEC2023-77 WBS2023-66 RCC2023-60 |
For visible light communication systems that utilizes machine learning-based image classifiers for information embedding... [more] |
IT2023-78 ISEC2023-77 WBS2023-66 RCC2023-60 pp.20-25 |
RCC, ISEC, IT, WBS |
2024-03-13 09:40 |
Osaka |
Osaka Univ. (Suita Campus) |
A Study of Parameter Optimization for Underwater Visible Light Communication using Angle Diversity Transceiver Keigo Matsunaga, Yusuke Kozawa, Hiromasa Habuchi (Ibaraki Univ) IT2023-79 ISEC2023-78 WBS2023-67 RCC2023-61 |
In recent years, underwater visible light communication (UVLC) is expected to play an important role in constructing fle... [more] |
IT2023-79 ISEC2023-78 WBS2023-67 RCC2023-61 pp.26-31 |
RCC, ISEC, IT, WBS |
2024-03-13 10:05 |
Osaka |
Osaka Univ. (Suita Campus) |
A study of transmitter optical color selection for Underwater SLIPT system using Power Splitting receiver Honoka Yoshinaga, Yusuke Kozawa, Hiromasa Habuchi (Ibaraki Univ.) IT2023-80 ISEC2023-79 WBS2023-68 RCC2023-62 |
In recent years, underwater simultaneous light wave information and power transfer (USLIPT) system has attracted attenti... [more] |
IT2023-80 ISEC2023-79 WBS2023-68 RCC2023-62 pp.32-37 |
RCC, ISEC, IT, WBS |
2024-03-13 10:45 |
Osaka |
Osaka Univ. (Suita Campus) |
Note on Impossibility of Tight Reduction on IND-CCA secure IdentityBased Encryption with Multiple Private-Key Generators Yudai Suzuki, Atsushi Fujioka (Kanagawa Univ.), Akira Nagai (NTT Social Informatics Lab.) IT2023-81 ISEC2023-80 WBS2023-69 RCC2023-63 |
Identity-Based Encryption with Multiple Private-Key Generators (mPKG-IBE) has been proposed by Fujioka and Yoneyama at P... [more] |
IT2023-81 ISEC2023-80 WBS2023-69 RCC2023-63 pp.38-43 |
RCC, ISEC, IT, WBS |
2024-03-13 11:10 |
Osaka |
Osaka Univ. (Suita Campus) |
Revisiting the Soundness of 5-Pass Identification Scheme Daigo Kuroki, Kaoru Takemure, Bagus Santoso (UEC) IT2023-82 ISEC2023-81 WBS2023-70 RCC2023-64 |
We observe that mostly, the security of 5-pass identification schemes
have only been analyzed in a emph{rough} way as f... [more] |
IT2023-82 ISEC2023-81 WBS2023-70 RCC2023-64 pp.44-51 |
RCC, ISEC, IT, WBS |
2024-03-13 11:35 |
Osaka |
Osaka Univ. (Suita Campus) |
Proxy Re-Authentication Capable of Key and Data Compression Yoshiro Matsuoka, Sohto Chiku (YNU), Keisuke Hara (AIST/YNU), Junji Shikata (YNU) IT2023-83 ISEC2023-82 WBS2023-71 RCC2023-65 |
In this paper, we propose a new cryptographic protocol called proxy re-authentication capable of key and data compressio... [more] |
IT2023-83 ISEC2023-82 WBS2023-71 RCC2023-65 pp.52-59 |
RCC, ISEC, IT, WBS |
2024-03-13 10:45 |
Osaka |
Osaka Univ. (Suita Campus) |
Neural Network-based Compensation of Wideband Nonlinear Distortion for MIMO Transmission with Virtualized Terminal Taishi Watanabe, Takeo Ohseki, Issei Kanno (KDDI Research) IT2023-84 ISEC2023-83 WBS2023-72 RCC2023-66 |
(To be available after the conference date) [more] |
IT2023-84 ISEC2023-83 WBS2023-72 RCC2023-66 pp.60-65 |
RCC, ISEC, IT, WBS |
2024-03-13 11:10 |
Osaka |
Osaka Univ. (Suita Campus) |
Position Estimation Accuracy of Mobile User based on Multiple Observation of Doppler-shifts in Positioning System using Unmanned Aerial Vehicle Hideaki Ito, Hiroyasu Ishikawa (Nihon Uniuv.) IT2023-85 ISEC2023-84 WBS2023-73 RCC2023-67 |
In the typical unmanned aircraft system (UAS) which provides temporal communication services under emergency and rescue ... [more] |
IT2023-85 ISEC2023-84 WBS2023-73 RCC2023-67 pp.66-71 |
RCC, ISEC, IT, WBS |
2024-03-13 11:35 |
Osaka |
Osaka Univ. (Suita Campus) |
A Study on a Link Design Method based on the Meteor Burst Communication Channel Model Hiroto Iwasaki, Kaishi Mukumoto, Tadahiro Wada (Shizuoka Univ.) IT2023-86 ISEC2023-85 WBS2023-74 RCC2023-68 |
Meteor bursts are roughly classified into underdense and overdense bursts according to their line electron density. As f... [more] |
IT2023-86 ISEC2023-85 WBS2023-74 RCC2023-68 pp.72-77 |
RCC, ISEC, IT, WBS |
2024-03-13 13:00 |
Osaka |
Osaka Univ. (Suita Campus) |
[Invited Talk]
Recent Developments in Quantum Statistics Akio Fujiwara (Osaka Univ.) IT2023-87 ISEC2023-86 WBS2023-75 RCC2023-69 |
Suppose that one has $n$ copies of a quantum system each in the same state depending on an unknown parameter $¥theta$, a... [more] |
IT2023-87 ISEC2023-86 WBS2023-75 RCC2023-69 p.78 |
RCC, ISEC, IT, WBS |
2024-03-13 14:15 |
Osaka |
Osaka Univ. (Suita Campus) |
Proxy Re-encryption based on LPN Haruki Fujimoto, Shingo Sato, Junji Shikata (YNU) IT2023-88 ISEC2023-87 WBS2023-76 RCC2023-70 |
We propose a proxy re-encryption (PRE) scheme based on the Learning Parity with Noise (LPN) problem using error-correcti... [more] |
IT2023-88 ISEC2023-87 WBS2023-76 RCC2023-70 pp.79-86 |
RCC, ISEC, IT, WBS |
2024-03-13 14:40 |
Osaka |
Osaka Univ. (Suita Campus) |
Performance Evaluation of Post-Quantum Digital Signature Schemes Ryoto Morizono, Yuntao Wang, Atsuko Miyaji (Osaka Univ.) IT2023-89 ISEC2023-88 WBS2023-77 RCC2023-71 |
It is believed that RSA and elliptic curve cryptography, which are currently widely used, may be broken by quantum compu... [more] |
IT2023-89 ISEC2023-88 WBS2023-77 RCC2023-71 pp.87-93 |
RCC, ISEC, IT, WBS |
2024-03-13 15:05 |
Osaka |
Osaka Univ. (Suita Campus) |
Public-Key Identification Scheme Based on a New NP-Hard Tensor Problem Akitaka Yokota, Bagus Santoso (UEC) IT2023-90 ISEC2023-89 WBS2023-78 RCC2023-72 |
No general quantum algorithm is known to efficiently solve computational problems based on
Multivariate Quadratic Poly... [more] |
IT2023-90 ISEC2023-89 WBS2023-78 RCC2023-72 pp.94-101 |
RCC, ISEC, IT, WBS |
2024-03-13 14:15 |
Osaka |
Osaka Univ. (Suita Campus) |
Quantum Insertion Correcting Algorithm for Quantum Deletion Correcting Codes Based on Quantum Reed-Solomon Codes Koki Sasaki, Takayuki Nozaki (Yamaguchi Univ.) IT2023-91 ISEC2023-90 WBS2023-79 RCC2023-73 |
Research on quantum insertion or deletion error correcting codes has become active in recent years.In 2023, Hagiwara con... [more] |
IT2023-91 ISEC2023-90 WBS2023-79 RCC2023-73 pp.102-107 |
RCC, ISEC, IT, WBS |
2024-03-13 14:40 |
Osaka |
Osaka Univ. (Suita Campus) |
Sparse Superposition Codes Using Second Order Reed-Muller: Orthogonal Encoding Tsukasa Osaka (Doshisha Univ.), Guanghui Song (Xidian Univ.), Tomotaka Kimura, Jun Cheng (Doshisha Univ.) IT2023-92 ISEC2023-91 WBS2023-80 RCC2023-74 |
A family of block orthogonal sparse superposition codes is proposed. The dictionary matrix consists of
all the second o... [more] |
IT2023-92 ISEC2023-91 WBS2023-80 RCC2023-74 pp.108-113 |
RCC, ISEC, IT, WBS |
2024-03-13 15:05 |
Osaka |
Osaka Univ. (Suita Campus) |
A solution of degree solving problem of the commutative fourth order recurrecne relation with two varibales over Z_2k Daisaburo Yoshioka, Takuma Nishizaka (Sojo Univ.) IT2023-93 ISEC2023-92 WBS2023-81 RCC2023-75 |
[more] |
IT2023-93 ISEC2023-92 WBS2023-81 RCC2023-75 pp.114-117 |
RCC, ISEC, IT, WBS |
2024-03-13 14:15 |
Osaka |
Osaka Univ. (Suita Campus) |
Data processing methods for high-performance Privacy-Preserving Machine Learning Tatsuhiro Yamatsuki (Osaka Univ.), Atsuko Miyaji (Osaka Univ./JAIST) IT2023-94 ISEC2023-93 WBS2023-82 RCC2023-76 |
Currently, attempts are being made in various fields to solve problems by utilizing big data. However, privacy protectio... [more] |
IT2023-94 ISEC2023-93 WBS2023-82 RCC2023-76 pp.118-126 |
RCC, ISEC, IT, WBS |
2024-03-13 14:40 |
Osaka |
Osaka Univ. (Suita Campus) |
On Privacy Mechanism to Discreat Data fit for Machine Learning Tomoshi Yagishita, Atsuko Miyaji (OU) IT2023-95 ISEC2023-94 WBS2023-83 RCC2023-77 |
In recent years, while the use of personal data has become increasingly active, the importance of privacy protection has... [more] |
IT2023-95 ISEC2023-94 WBS2023-83 RCC2023-77 pp.127-134 |
RCC, ISEC, IT, WBS |
2024-03-13 15:05 |
Osaka |
Osaka Univ. (Suita Campus) |
Efficient Replay Data Selection in Continual Federated Learning Model Yuto Kitano (Kobe Univ), Lihua Wang (NICT), Seiichi Ozawa (Kobe Univ) IT2023-96 ISEC2023-95 WBS2023-84 RCC2023-78 |
In this study, we propose a continual federated learning that can continuously learn distributed data generated daily by... [more] |
IT2023-96 ISEC2023-95 WBS2023-84 RCC2023-78 pp.135-141 |
RCC, ISEC, IT, WBS |
2024-03-13 15:30 |
Osaka |
Osaka Univ. (Suita Campus) |
Implementation and Application of a Library for Differential Privacy Broadly Applicable in the Python Ecosystem Takumi Hiraoka, Shouhei Hanaoka, Kenjiro Taura (The University of Tokyo) IT2023-97 ISEC2023-96 WBS2023-85 RCC2023-79 |
[more] |
IT2023-97 ISEC2023-96 WBS2023-85 RCC2023-79 pp.142-149 |
RCC, ISEC, IT, WBS |
2024-03-13 16:10 |
Osaka |
Osaka Univ. (Suita Campus) |
A consideration on the generation of algebraic surfaces that can evaluate the computational complexity of section-finding problem Kosuke Sakata (UTokyo), Koichiro Akiyama (Toshiba) IT2023-98 ISEC2023-97 WBS2023-86 RCC2023-80 |
We report that a method for generating algebraic surfaces, theoretically evaluable for the computational complexity of t... [more] |
IT2023-98 ISEC2023-97 WBS2023-86 RCC2023-80 pp.150-157 |
RCC, ISEC, IT, WBS |
2024-03-13 16:35 |
Osaka |
Osaka Univ. (Suita Campus) |
Consideration on Definition Field for Efficient Ring-LWE Problem Rintaro Yamada, Shinya Okumura, Atsuko Miyaji (OU) IT2023-99 ISEC2023-98 WBS2023-87 RCC2023-81 |
Currently, as one of the candidates for the post-quantum cryptography, there are cryptosystems based on the difficulty o... [more] |
IT2023-99 ISEC2023-98 WBS2023-87 RCC2023-81 pp.158-165 |
RCC, ISEC, IT, WBS |
2024-03-13 17:00 |
Osaka |
Osaka Univ. (Suita Campus) |
Study on the computatinal cost of Triple Sieve algorithm by applying in ideal property Seishiro Terada, Yuntao Wang, Atsuko Miyaji (Osaka Univ.) IT2023-100 ISEC2023-99 WBS2023-88 RCC2023-82 |
[more] |
IT2023-100 ISEC2023-99 WBS2023-88 RCC2023-82 pp.166-173 |
RCC, ISEC, IT, WBS |
2024-03-13 16:10 |
Osaka |
Osaka Univ. (Suita Campus) |
Variable-Lowpass-Filter Stability Guarantee Utilizing an Even-Symmetric Unity-Bounded Function Tian-Bo Deng (Toho Univ.) IT2023-101 ISEC2023-100 WBS2023-89 RCC2023-83 |
A variable digital filter (VDF) can tune its frequency response instantly without necessitating redesigning a new filter... [more] |
IT2023-101 ISEC2023-100 WBS2023-89 RCC2023-83 pp.174-178 |
RCC, ISEC, IT, WBS |
2024-03-13 16:35 |
Osaka |
Osaka Univ. (Suita Campus) |
A Study on Polar Codes Design with Robustness against Channel SNR Fluctuation Hidetake Matsui, Hideki Ochiai (YNU) IT2023-102 ISEC2023-101 WBS2023-90 RCC2023-84 |
Polar codes are known to achieve high reliability with low decoding complexity. The design of polar codes requires the s... [more] |
IT2023-102 ISEC2023-101 WBS2023-90 RCC2023-84 pp.179-184 |
RCC, ISEC, IT, WBS |
2024-03-13 17:00 |
Osaka |
Osaka Univ. (Suita Campus) |
Data-Driven Design of Sensor Networks Using Distributed Event-Triggered Communication Ryosuke Adachi, Yuji Wakasa (Yamaguchi Univ.) IT2023-103 ISEC2023-102 WBS2023-91 RCC2023-85 |
[more] |
IT2023-103 ISEC2023-102 WBS2023-91 RCC2023-85 pp.185-188 |
RCC, ISEC, IT, WBS |
2024-03-14 09:05 |
Osaka |
Osaka Univ. (Suita Campus) |
Partial Key Exposure Attacks on UOV-like Signatures Yuki Seto, Hiroki Furue, Atsushi Takayasu (UTokyo) IT2023-104 ISEC2023-103 WBS2023-92 RCC2023-86 |
NIST is currently working on the standardization of post-quantum cryptography (PQC). Forty signature schemes were submit... [more] |
IT2023-104 ISEC2023-103 WBS2023-92 RCC2023-86 pp.189-196 |
RCC, ISEC, IT, WBS |
2024-03-14 09:30 |
Osaka |
Osaka Univ. (Suita Campus) |
Security Analysis of Backdoored Classic McEliece in a Multi-User Setting Dai Miura, Hyungrok Jo, Shingo Sato, Junji Shikata (Yokohama National Univ.) IT2023-105 ISEC2023-104 WBS2023-93 RCC2023-87 |
Several attacks have been proposed for the Classic McEliece cryptosystem, which is one of the 4th round candidates of th... [more] |
IT2023-105 ISEC2023-104 WBS2023-93 RCC2023-87 pp.197-204 |
RCC, ISEC, IT, WBS |
2024-03-14 09:55 |
Osaka |
Osaka Univ. (Suita Campus) |
A generalization of ISD algorithm for Syndrome Decoding Problem Asuka Wakasugi (EAGLYS), Tada Mitsuru (Chiba Univ.) IT2023-106 ISEC2023-105 WBS2023-94 RCC2023-88 |
The Information Set Decoding (ISD) algorithm is the best-known decoding algorithm for the syndrome decoding problem, whi... [more] |
IT2023-106 ISEC2023-105 WBS2023-94 RCC2023-88 pp.205-211 |
RCC, ISEC, IT, WBS |
2024-03-14 10:20 |
Osaka |
Osaka Univ. (Suita Campus) |
Consideration of BKZ by reordering lattice basis vectors Katsuya Katsuya, Yuntao Wang, Atsuko Miyaji (Osaka Univ.) IT2023-107 ISEC2023-106 WBS2023-95 RCC2023-89 |
[more] |
IT2023-107 ISEC2023-106 WBS2023-95 RCC2023-89 pp.212-219 |
RCC, ISEC, IT, WBS |
2024-03-14 09:05 |
Osaka |
Osaka Univ. (Suita Campus) |
IT2023-108 ISEC2023-107 WBS2023-96 RCC2023-90 |
In a secret sharing, a dealer generates n shares from a secret and random numbers and distributes the shares to each of ... [more] |
IT2023-108 ISEC2023-107 WBS2023-96 RCC2023-90 pp.220-225 |
RCC, ISEC, IT, WBS |
2024-03-14 09:30 |
Osaka |
Osaka Univ. (Suita Campus) |
Achievable Rate of Coded Caching Scheme with Cache Memories of Different Sizes Akihito Nagaya, Hiroki Koga (Univ. of Tsukuba) IT2023-109 ISEC2023-108 WBS2023-97 RCC2023-91 |
In the coded caching scheme proposed by Maddah-Ali and Niesen,
we usually consider the setup where $K$ users have resp... [more] |
IT2023-109 ISEC2023-108 WBS2023-97 RCC2023-91 pp.226-231 |
RCC, ISEC, IT, WBS |
2024-03-14 09:55 |
Osaka |
Osaka Univ. (Suita Campus) |
New Algorithms for Computing a Correct Decoding Probability Exponent and an Error Decoding Probability Exponent with Cost Constraints and their Equivalency Koki Kazama (Waseda Univ.), Akira Kamatsuka (Shonan Institute of Technology), Takahiro Yoshida (Nihon Univ.) IT2023-110 ISEC2023-109 WBS2023-98 RCC2023-92 |
In channel coding, there are two representative previous algorithms for computing cost-constrained correct decoding prob... [more] |
IT2023-110 ISEC2023-109 WBS2023-98 RCC2023-92 pp.232-237 |
RCC, ISEC, IT, WBS |
2024-03-14 10:20 |
Osaka |
Osaka Univ. (Suita Campus) |
IT2023-111 ISEC2023-110 WBS2023-99 RCC2023-93 |
This paper deals with variable-length lossy source coding in which the criteria are a cumulant generating function of co... [more] |
IT2023-111 ISEC2023-110 WBS2023-99 RCC2023-93 pp.238-240 |
RCC, ISEC, IT, WBS |
2024-03-14 09:05 |
Osaka |
Osaka Univ. (Suita Campus) |
Efficient Key-Value Commitments with batch update and verification Toshiyuki Mineta, Atsuko Miyaji (OU) IT2023-112 ISEC2023-111 WBS2023-100 RCC2023-94 |
As Blockchain grows in size, the resources to validate that a transaction is true increase linearly. Key-value commitme... [more] |
IT2023-112 ISEC2023-111 WBS2023-100 RCC2023-94 pp.241-248 |
RCC, ISEC, IT, WBS |
2024-03-14 09:30 |
Osaka |
Osaka Univ. (Suita Campus) |
A Study on Malicious Communication Detection Using Attack Characteristics of Malware on an Internal Network. Ken Aono, Yuki Ishida, Atsushi Waseda, Masaki Hanada (Tokyo Univ. of information Sciences) IT2023-113 ISEC2023-112 WBS2023-101 RCC2023-95 |
Recently, targeted attacks have been increasing.
Malicious attackers use malware to gain access to the organization's ... [more] |
IT2023-113 ISEC2023-112 WBS2023-101 RCC2023-95 pp.249-253 |
RCC, ISEC, IT, WBS |
2024-03-14 09:55 |
Osaka |
Osaka Univ. (Suita Campus) |
Comparison of accuracy of classification methods using machine learning for imaged malware Kenta Usui, Hiroki Tanioka, Masahiko Sano, Kenji Matsuura, Tetsushi Ueta (Tokushima Univ.) IT2023-114 ISEC2023-113 WBS2023-102 RCC2023-96 |
In recent years, the damage caused by malware has become more serious, and the increase in the number of variants of exi... [more] |
IT2023-114 ISEC2023-113 WBS2023-102 RCC2023-96 pp.254-258 |
RCC, ISEC, IT, WBS |
2024-03-14 10:20 |
Osaka |
Osaka Univ. (Suita Campus) |
Improving classification accuracy of imaged malware through data expansion Kaoru Yokobori, Hiroki Tanioka, Masahiko Sano, Kenji Matsuura, Tetsushi Ueta (Tokushima Univ.) IT2023-115 ISEC2023-114 WBS2023-103 RCC2023-97 |
Although malware-based attacks have existed for years,
malware infections increased in 2019 and 2020.
One of the reaso... [more] |
IT2023-115 ISEC2023-114 WBS2023-103 RCC2023-97 pp.259-264 |
RCC, ISEC, IT, WBS |
2024-03-14 11:00 |
Osaka |
Osaka Univ. (Suita Campus) |
[Invited Talk]
Cryptographic Research Based on Algebraic Curve Computation Katsuyuki Takashima (Waseda Univ.) IT2023-116 ISEC2023-115 WBS2023-104 RCC2023-98 |
We have a wide range of cryptographic primitives based on elliptic curves, i.e., widely deployed public key cryptosystem... [more] |
IT2023-116 ISEC2023-115 WBS2023-104 RCC2023-98 p.265 |
RCC, ISEC, IT, WBS |
2024-03-14 13:00 |
Osaka |
Osaka Univ. (Suita Campus) |
[Special Invited Talk]
Smart Radio and Reliable Communication & Control
-- A Journey Through Research and Emerging Challenges -- Masaaki Katayama (Nagoya Univ.) RCS2023-276 SR2023-99 SRW2023-63 IT2023-117 ISEC2023-116 WBS2023-105 RCC2023-99 |
In Smart Radio, traditional hard-fixed circuits are realized using flexible devices and computers, marking the integrati... [more] |
RCS2023-276 SR2023-99 SRW2023-63 IT2023-117 ISEC2023-116 WBS2023-105 RCC2023-99 p.125(RCS), p.57(SR), p.90(SRW), p.266(ISEC), p.266(WBS), p.266(RCC) |
RCC, ISEC, IT, WBS |
2024-03-14 14:15 |
Osaka |
Osaka Univ. (Suita Campus) |
An Identity Management System using Group Signatures with Message-Dependent Opening Yuto Imura, Keita Emura (Kanazawa Univ.) IT2023-118 ISEC2023-117 WBS2023-106 RCC2023-100 |
Isshiki et al. (ACM DRM 2006) proposed a privacy-preserving ID management system using group signatures (Isshiki system)... [more] |
IT2023-118 ISEC2023-117 WBS2023-106 RCC2023-100 pp.267-272 |
RCC, ISEC, IT, WBS |
2024-03-14 14:40 |
Osaka |
Osaka Univ. (Suita Campus) |
Encrypted data sharing system based on IBE secure against the KGC Hinata Nishino, Emura keita (Kanazawa Univ) IT2023-119 ISEC2023-118 WBS2023-107 RCC2023-101 |
Encryption technology to send and share data is popularized. However, these tools can protect communication route, but t... [more] |
IT2023-119 ISEC2023-118 WBS2023-107 RCC2023-101 pp.273-278 |
RCC, ISEC, IT, WBS |
2024-03-14 15:05 |
Osaka |
Osaka Univ. (Suita Campus) |
Improvement of non-interactive privacy-preserving document classification Yuhei Kitahara (Tokyo Tech), Hibiki Oka, Akira Nakahashi (iric), Wakaha Ogata (Tokyo Tech) IT2023-120 ISEC2023-119 WBS2023-108 RCC2023-102 |
In the Machine Learning as a Service model, where clients delegate inference to servers, leakage of client inputs or mac... [more] |
IT2023-120 ISEC2023-119 WBS2023-108 RCC2023-102 pp.279-286 |
RCC, ISEC, IT, WBS |
2024-03-14 15:30 |
Osaka |
Osaka Univ. (Suita Campus) |
Research Directions in Formal Verification of Transport Layer Security Protocols Hideki Sakurada (NTT/Kyushu Univ.), Kouichi Sakurai (Kyushu Univ./ATR) IT2023-121 ISEC2023-120 WBS2023-109 RCC2023-103 |
The TLS protocol is used to secure communications between web servers and clients, and is essential for security: it all... [more] |
IT2023-121 ISEC2023-120 WBS2023-109 RCC2023-103 pp.287-293 |
RCC, ISEC, IT, WBS |
2024-03-14 14:15 |
Osaka |
Osaka Univ. (Suita Campus) |
Performance evaluation of throughput increase method in Optical wireless OFDM system in multipath channel. Yutaka Munakata, Kouji Ohuchi (Shizuoka Univ.) IT2023-125 ISEC2023-124 WBS2023-113 RCC2023-107 |
To ease the shortage of radio frequency resources, optical wireless communications (OWC) are attracting much attention. ... [more] |
IT2023-125 ISEC2023-124 WBS2023-113 RCC2023-107 pp.312-316 |
RCC, ISEC, IT, WBS |
2024-03-14 14:40 |
Osaka |
Osaka Univ. (Suita Campus) |
Performance Evaluation of OFDM Systems with Clipping and Partial Filtering Wataru Hatano, Hideki Ochiai (YNU) IT2023-123 ISEC2023-122 WBS2023-111 RCC2023-105 |
[more] |
IT2023-123 ISEC2023-122 WBS2023-111 RCC2023-105 pp.300-305 |
RCC, ISEC, IT, WBS |
2024-03-14 15:05 |
Osaka |
Osaka Univ. (Suita Campus) |
Secrity Oriented Design of Polar-Coded OFDM on Selective Fading Channels Yuki Kuraya, Hideki Ochiai (YNU) IT2023-124 ISEC2023-123 WBS2023-112 RCC2023-106 |
We introduce a physical layer security scheme based on a polar-coded OFDM system in wireless communication. Our approach... [more] |
IT2023-124 ISEC2023-123 WBS2023-112 RCC2023-106 pp.306-311 |
RCC, ISEC, IT, WBS |
2024-03-14 15:30 |
Osaka |
Osaka Univ. (Suita Campus) |
A selection method of candidate constellation for the superimposed QAM signal method to reduce PAPR in OFDM system Takashi Aoki, Tsuyoshi Arai, Hiroshi Inai, Hideaki Wakabayashi (Okayama Prefectural Univ.) IT2023-122 ISEC2023-121 WBS2023-110 RCC2023-104 |
Modulated signal of Orthogonal Frequency Division Multiplexing (OFDM) systems tend to have a large peak-to-average power... [more] |
IT2023-122 ISEC2023-121 WBS2023-110 RCC2023-104 pp.294-299 |
RCC, ISEC, IT, WBS |
2024-03-14 14:15 |
Osaka |
Osaka Univ. (Suita Campus) |
Proposal of Methods to Detect Backdoor Attacks Using Signature Embedding Techniques Shintaro Yamashita, Wang Yuntao, Atsuko Miyaji (OU) IT2023-126 ISEC2023-125 WBS2023-114 RCC2023-108 |
[more] |
IT2023-126 ISEC2023-125 WBS2023-114 RCC2023-108 pp.317-323 |
RCC, ISEC, IT, WBS |
2024-03-14 14:40 |
Osaka |
Osaka Univ. (Suita Campus) |
Proposing the privacy-preserving cross-chain communication Hideaki Miyaji, Noriaki Kamiyama (RU) IT2023-127 ISEC2023-126 WBS2023-115 RCC2023-109 |
Cross-chain communication is a cryptographic technique for sending and receiving tokens and data among different blockch... [more] |
IT2023-127 ISEC2023-126 WBS2023-115 RCC2023-109 pp.324-331 |
RCC, ISEC, IT, WBS |
2024-03-14 15:05 |
Osaka |
Osaka Univ. (Suita Campus) |
Phishing Detection Method Based on Content-Similarity in DNS Graph WenBo Zhou, Yuki Ishida, Atsushi Waseda, Masaki Hanada (Tokyo Univ. of information Sciences) IT2023-128 ISEC2023-127 WBS2023-116 RCC2023-110 |
Phishing attacks, known as a prevalent form of social engineering attacks, have become one of the most significant cyber... [more] |
IT2023-128 ISEC2023-127 WBS2023-116 RCC2023-110 pp.332-336 |
RCC, ISEC, IT, WBS |
2024-03-14 15:30 |
Osaka |
Osaka Univ. (Suita Campus) |
Phishing Detection Method Based on Machine Learning Using DNS Graph Yuki Ishida, Syota Nihei, Junko Sato, Atsushi Waseda, Masaki Hanada (Tokyo Univ. of Information Sciences) IT2023-129 ISEC2023-128 WBS2023-117 RCC2023-111 |
Recently, phishing scams have been on the rise, the need for effective defense methods against this phishing scams.
A b... [more] |
IT2023-129 ISEC2023-128 WBS2023-117 RCC2023-111 pp.337-342 |
RCC, ISEC, IT, WBS |
2024-03-14 16:10 |
Osaka |
Osaka Univ. (Suita Campus) |
An Efficient Differential Attack Resistance Evaluation Method for Block Ciphers Haruka Sugai, Yasutaka Igarashi (TUS) IT2023-130 ISEC2023-129 WBS2023-118 RCC2023-112 |
[more] |
IT2023-130 ISEC2023-129 WBS2023-118 RCC2023-112 pp.343-349 |
RCC, ISEC, IT, WBS |
2024-03-14 16:35 |
Osaka |
Osaka Univ. (Suita Campus) |
Integral Attack with Bit-Based Division Property on Block Cipher LBC Naoki Shibayama, Yasutaka Igarashi (Tokyo Univ. of Science) IT2023-131 ISEC2023-130 WBS2023-119 RCC2023-113 |
LBC is a block cipher proposed by Kapalova et al. in 2023. The block size is 64-bit, the secret key size is 80-bit, and ... [more] |
IT2023-131 ISEC2023-130 WBS2023-119 RCC2023-113 pp.350-357 |
RCC, ISEC, IT, WBS |
2024-03-14 17:00 |
Osaka |
Osaka Univ. (Suita Campus) |
Reconstruction of Boyer quantum algorithm and its application to hash puzzles Chris Idota, Yuichi Kaji (Nagoya Univ.) IT2023-132 ISEC2023-131 WBS2023-120 RCC2023-114 |
This study investigates the computational complexity of solving hash puzzles using quantum algorithms. A hash puzzle is ... [more] |
IT2023-132 ISEC2023-131 WBS2023-120 RCC2023-114 pp.358-365 |
RCC, ISEC, IT, WBS |
2024-03-14 16:10 |
Osaka |
Osaka Univ. (Suita Campus) |
Tradeoff relations between entropic quantities and their application in quantum information theory Michele Dall'Arno (Toyohashi U. of Technology) IT2023-133 ISEC2023-132 WBS2023-121 RCC2023-115 |
In this presentation we introduce tradeoff relations between entropic quantities such as Renyi entropies, the subentropy... [more] |
IT2023-133 ISEC2023-132 WBS2023-121 RCC2023-115 pp.366-367 |
RCC, ISEC, IT, WBS |
2024-03-14 16:35 |
Osaka |
Osaka Univ. (Suita Campus) |
Construction of an MDL Estimator with Tight Risk Bound in Simple ReLU Networks Yoshinari Takeishi, Jun'ichi Takeuchi (Kyushu Univ.) IT2023-134 ISEC2023-133 WBS2023-122 RCC2023-116 |
We consider the problem of estimating the parameters of the final layer in two-layer neural networks with ReLU activatio... [more] |
IT2023-134 ISEC2023-133 WBS2023-122 RCC2023-116 pp.368-373 |
RCC, ISEC, IT, WBS |
2024-03-14 17:00 |
Osaka |
Osaka Univ. (Suita Campus) |
Comparison of Scale Parameter Dependence of Estimation Performance in Sparse Bayesian Linear Regression Model with Variance Gamma Prior Distribution and t-Prior Distribution Kazuaki Murayama (UEC) IT2023-135 ISEC2023-134 WBS2023-123 RCC2023-117 |
In the sparse estimation with linear regression model, the variance gamma distribution and t-distribution can be used as... [more] |
IT2023-135 ISEC2023-134 WBS2023-123 RCC2023-117 pp.374-379 |