Committee |
Date Time |
Place |
Paper Title / Authors |
Abstract |
Paper # |
ICSS, IPSJ-SPT |
2024-03-22 10:55 |
Okinawa |
OIST (Primary: On-site, Secondary: Online) |
Discovery of a Vulnerable Structure of SIMON Variants Hayato Watanabe (Tokai Univ.), Ryoma Ito (NICT), Toshihiro Ohigashi (Tokai Univ.) ICSS2023-92 |
In SCIS 2024, Watanabe et al. applied a deep learning-based output prediction attack to SIMON variants, which are varian... [more] |
ICSS2023-92 pp.166-173 |
ICSS, IPSJ-SPT |
2024-03-22 11:20 |
Okinawa |
OIST (Primary: On-site, Secondary: Online) |
Development of an Outsourcing Password Evaluation System using Intel SGX Takeki Kitayama, Yuma Nishihira (Tokai Univ.), Akira Kanaoka (Toho Univ.), Yoshio Kakizaki, Toshihiro Ohigashi (Tokai Univ.) ICSS2023-93 |
Users are required to set passwords that are both complex and not included in leaked lists, with the recent increase in ... [more] |
ICSS2023-93 pp.174-179 |
ICSS, IPSJ-SPT |
2024-03-22 14:30 |
Okinawa |
OIST (Primary: On-site, Secondary: Online) |
A Search Method for Fake QR Codes Suitable for Long-Distance Attack Using Laser Irradiation Dai Itakura, Taiga Manabe, Yuki Kamata, Ayana Oku, Hiroshi Yamamoto, Yoshihisa Takayama, Toshihiro Ohigashi (Tokai Univ.) ICSS2023-96 |
In this paper, we propose a search method for fake QR codes suitable for long-distance attack using laser irradiation. W... [more] |
ICSS2023-96 pp.194-200 |
ICSS, IPSJ-SPT |
2024-03-22 14:55 |
Okinawa |
OIST (Primary: On-site, Secondary: Online) |
Adversarial Examples with Missing Perturbation Using Laser Irradiation Daisuke Kosuge, Hayato Watanabe, Taiga Manabe, Yoshihisa Takayama, Toshihiro Ohigashi (Tokai Univ.) ICSS2023-97 |
In recent years, neural networks have made remarkable progress in the field of image processing and other areas, and the... [more] |
ICSS2023-97 pp.201-207 |
ICSS |
2023-11-16 14:30 |
Ishikawa |
IT Business Plaza Musashi and Online (Primary: On-site, Secondary: Online) |
Formal Verification of an Edge Computing Platform based on Modular Architecture using Intel SGX Yuma Nishihira (Tokai Univ.), Hayato Kimura (Univ. of Hyogo), Toshihiro Ohigashi (Tokai Univ.) ICSS2023-54 |
The proliferation of IoT devices requires an edge computing infrastructure that can process large amounts of data in a f... [more] |
ICSS2023-54 pp.22-29 |
ICSS |
2023-11-17 10:00 |
Ishikawa |
IT Business Plaza Musashi and Online (Primary: On-site, Secondary: Online) |
Implementation and Evaluation of Lattice-based IBE with Security against the Key Generation Center Shuntaro Ema (Tokai Univ.), Keita Emura (Kanazawa Univ.), Toshihiro Ohigashi (Tokai Univ.) ICSS2023-60 |
[more] |
ICSS2023-60 pp.64-69 |
ICSS, IPSJ-SPT |
2023-03-13 12:50 |
Okinawa |
Okinawaken Seinenkaikan (Primary: On-site, Secondary: Online) |
Dynamic Fake QR Code using Invisible Laser Irradiation Yuki Kamata, Shuya Kawaguchi, Toshihiro Ohigashi, Yoshihisa Takayama (Tokai Univ.) ICSS2022-49 |
In this paper, we propose a method to generate a fake QR code that can lead to a malicious site at any given time by las... [more] |
ICSS2022-49 pp.7-12 |
ICSS, IPSJ-SPT |
2023-03-14 13:50 |
Okinawa |
Okinawaken Seinenkaikan (Primary: On-site, Secondary: Online) |
An Edge Computing Platform based on Modular Architecture using Intel SGX and its Evaluation Yuma Nishihira, Tomoya Suzuki, Takuya Ishibashi, Yoshio Kakizaki, Toshihiro Ohigashi (Tokai Univ.), Hidenobu Watanabe, Tohru Kondo, Reiji Aibara (Hiroshima Univ.) ICSS2022-79 |
The proliferation of IoT devices, the number of devices connected to the Internet is rapidly expanding. An edge computin... [more] |
ICSS2022-79 pp.187-192 |
NS, ICM, CQ, NV (Joint) |
2020-11-26 15:25 |
Online |
Online |
[Invited Talk]
Development of the Edge Computing Platform with Dynamic Modular Architecture and its Application of Cryptography with Advanced Functionality Hidenobu Watanabe, Tohru Kondo (Hiroshima Univ.), Toshihiro Ohigashi (Tokai Univ.) NS2020-75 CQ2020-47 ICM2020-26 |
We have developed an edge computing platform that can coordinate with each computing resources of device , edge and clou... [more] |
NS2020-75 CQ2020-47 ICM2020-26 pp.4-8(NS), pp.4-8(CQ), pp.38-42(ICM) |
ISEC |
2019-05-17 16:30 |
Tokyo |
Kikai-Shinko-Kaikan Bldg. |
[Invited Talk]
A Generic Construction of Integrated Secure-Channel Free PEKS and PKE (from ISPEC 2018) Tatsuya Suzuki (Tokai Univ./NICT), Keita Emura (NICT), Toshihiro Ohigashi (Tokai Univ./NICT) ISEC2019-10 |
In this talk we explain the content of ``A Generic Construction of Integrated Secure-Channel Free PEKS and PKE'' (Tatsuy... [more] |
ISEC2019-10 p.47 |
SITE, ISEC, LOIS |
2018-11-03 11:00 |
Fukuoka |
|
A Statistical Method for Searching Biases of Stream Ciphers Seiya Tanamoto, Toshihiro Ohigashi (Tokai Univ), Takanori Isobe (Univ. of Hyogo) ISEC2018-64 SITE2018-42 LOIS2018-24 |
Plaintext recovery attacks on stream ciphers based on biases of keystream in the broadcast setting where same plaintext ... [more] |
ISEC2018-64 SITE2018-42 LOIS2018-24 pp.1-6 |
SITE, ISEC, LOIS |
2018-11-03 11:30 |
Fukuoka |
|
A Study on a New Evaluation Tool for Pseudo Random Number Generators based on Neural Network Hayato Kimura (Tokai Univ.), Takanori Isobe (Univ. of Hyogo), Toshihiro Ohigashi (Tokai Univ.) ISEC2018-65 SITE2018-43 LOIS2018-25 |
Security of stream cipher depends on PRNG (Pseudo Random Number Generator) of the stream cipher. There are evaluation me... [more] |
ISEC2018-65 SITE2018-43 LOIS2018-25 pp.7-12 |
IA, SITE, IPSJ-IOT [detail] |
2018-03-05 14:30 |
Tochigi |
Kinugawa Onsen Hotel |
Implementation and Evaluation on Security Modules for the Edge Computing Platform based on Modular Architecture Hiroyuki Yanagi, Hayato Kimura (Tokai Univ.), Tohru Kondo, Hidenobu Watanabe (Hiroshima Univ.), Toshihiro Ohigashi (Tokai Univ.) SITE2017-65 IA2017-76 |
Edge computing platform requires capability of deploy demanded functions appropriately and rapidly. We proposed Edge Com... [more] |
SITE2017-65 IA2017-76 pp.91-96 |
ISEC, COMP |
2017-12-21 15:25 |
Kochi |
Eikokuji Campus, Kochi University of Technology |
Implementation Results of Privacy-Preserving and Public-Verifiable Data Aggregation Protocols Tatsuya Suzuki (Tokai Univ.), Keita Emura (NICT), Hayato Kimura, Toshihiro Ohigashi (Tokai Univ.) ISEC2017-79 COMP2017-33 |
Aggregator Oblivious Encryption (AOE) was proposed by Shi et al. in NDSS 2011. AOE with public verifiability was also pr... [more] |
ISEC2017-79 COMP2017-33 pp.43-50 |
ISEC, WBS, IT |
2017-03-09 10:25 |
Tokyo |
TOKAI University |
A Note on Key Dependency of Stream Cipher Grain v1 Satoshi Kidokoro (Tokai Univ.), Takanori Isobe (Kobe Univ.), Toshihiro Ohigashi (Tokai Univ.) IT2016-99 ISEC2016-89 WBS2016-75 |
Meet-in-the-middle (MITM) attack is a powerful cryptanalytic method for block ciphers. Several attacks for block ciphers... [more] |
IT2016-99 ISEC2016-89 WBS2016-75 pp.1-6 |
ICSS, IA |
2014-06-06 11:20 |
Hyogo |
Takikawa Memorial Hall, Kobe University |
Ransomware: Threat Analysis and Countermeasures Akira Kanaoka (Toho Univ.), Toshihiro Ohigashi (Hiroshima Univ.) IA2014-7 ICSS2014-7 |
Ransomware which disables data or functions in victim's computer and demand money from victim, uses cryptographic techno... [more] |
IA2014-7 ICSS2014-7 pp.33-38 |
ICSS, IPSJ-SPT |
2014-03-27 13:30 |
Okinawa |
Meio Univiersity |
An Active Attack on RC4 in SSL/TLS Toshihiro Ohigashi (Hiroshima Univ.), Takanori Isobe (Sony), Yuhei Watanabe (Kobe Univ.), Ryo Nojima (NICT), Masakatu Morii (Kobe Univ.) ICSS2013-63 |
In 2013, Isobe et al. and AlFardan et al. proposed practical plaintext recovery attacks on RC4 in SSL/TLS in the broadca... [more] |
ICSS2013-63 pp.7-12 |
IA, ICSS |
2013-06-20 15:00 |
Niigata |
Ao-re Nagaoka |
Vulnerability of RC4 in SSL/TLS Yuhei Watanabe, Takanori Isobe (Kobe Univ.), Toshihiro Ohigashi (Hiroshima Univ.), Masakatu Morii (Kobe Univ.) IA2013-4 ICSS2013-4 |
In FSE2013, we showed that the first 257 bytes and 1000T bytes of the plaintext could be easily recovered with high prob... [more] |
IA2013-4 ICSS2013-4 pp.19-24 |
ICSS |
2012-11-22 15:35 |
Hiroshima |
Miyajima Mori-no-Yado |
Implementation and Evaluation of a File Sharing Service with File Name Encryption using CP-ABE Megumi Goto, Toshihiro Ohigashi, Kouji Nishimura, Reiji Aibara (Hiroshima Univ.) ICSS2012-53 |
Online storage services, e.g. Dropbox, have a weakness, which the storage administrator can obtain contents of user's fi... [more] |
ICSS2012-53 pp.49-54 |
IT, ISEC, WBS |
2010-03-05 10:50 |
Nagano |
Nagano-Engineering Campus, Shinshu University |
A Forgery Attack for WPA-TKIP by Modifying Any Packet to the QoS Packet
-- Almost All Implementations of WPA-TKIP Can Be Attacked -- Yosuke Todo, Yuki Ozawa (Kobe Univ.), Toshihiro Ohigashi (Hiroshima Univ.), Masakatu Morii (Kobe Univ.) IT2009-106 ISEC2009-114 WBS2009-85 |
[more] |
IT2009-106 ISEC2009-114 WBS2009-85 pp.225-232 |