IEICE Technical Report

Online edition: ISSN 2432-6380

Volume 123, Number 134

Enriched MultiMedia

Workshop Date : 2023-07-24 - 2023-07-25 / Issue Date : 2023-07-17

[PREV] [NEXT]

[TOP] | [2018] | [2019] | [2020] | [2021] | [2022] | [2023] | [2024] | [Japanese] / [English]

[PROGRAM] [BULK PDF DOWNLOAD]


Table of contents

EMM2023-14
Non-profiled Side-channel Attacks by using Clustering Scores in Deep Learning model (1) -- Attacks by using Auto Encoder against hardware-implemented AES --
Mizuki Nagahisa, Fukuda Yuta, Yoshida Kota, Fujino Takeshi (Ristumei Univ)
pp. 1 - 6

EMM2023-15
Non-profiled Side-Channel Attacks by using Clustering Scores in Deep Learning model (2) -- Attacks by using Models to Predict Ciphertext against Hardware-implemented AES with Countermeasures --
Yuta Fukuda, Kota Yoshida, Takeshi Fujino (Ritsumeikan Univ.)
pp. 7 - 12

EMM2023-16
Improving Non-profiled DL-based Side-Channel Attack Using Multiple Partial Key Difference Estimation
Rikuma Tanaka, Rei Ueno (Tohoku Univ.), Akira Ito (NTT), Naofumi Homma (Tohoku Univ.)
pp. 13 - 18

EMM2023-17
Tolerance Evaluation Cost Reduction of Deep-Learning-Based Side-Channel Attack Using Signal-to-Noise Ratio of Leakage Traces
Tatsuya Sakagami, Masaki Himuro, Kengo Iokibe, Yoshitaka Toyota (Okayama Univ.)
pp. 19 - 24

EMM2023-18
Deep Learning-Based Side-Channel Analysis Considering the Effect of Noise and Transfer Characteristics on the Measurement Process
Yoshiki Kitamura, Taiki Kitazawa, Yuichi Hayashi (NAIST)
pp. 25 - 29

EMM2023-19
Analysis of effective attribute values on risk-based authentication with browser fingerprint
Takashi Tsukazaki, Yuichi Futa (TUT), Hiroyuki Okazaki, Hikofumi Suzuki (Shinshu Univ.)
pp. 30 - 36

EMM2023-20
International regulatory trend survey report on AI -- Status of the European Parliament's consideration of the AI Act in the EU --
Naonori Kato (KDDI Research/NFI/RIKEN), Yosuke Murakami, Minoru Kozu (KDDI Research)
pp. 37 - 44

EMM2023-21
Key Generation by Secure Computation of ID-NIKS based on Discrete Logarithm Problem over Composite Modulus
Hayato Inoue, Mizuki Miki, Yasuyuki Murakami (OECU)
pp. 45 - 51

EMM2023-22
A Generic Construction of Outsider Anonymous Broadcast Encryption with Keyword Search
Keita Emura (NICT), Kaisei Kajita, Go Ohtake (NHK)
pp. 52 - 59

EMM2023-23
Hierarchical Identity-based Matchmaking Encryption
Sohto Chiku (YNU), Keisuke Hara (AIST/YNU), Junji Shikata (YNU)
pp. 60 - 67

EMM2023-24
Note on the Robustness of Single Sign-On Algorithm Based on Verifiable Encryption
Chihiro Okubo, Satoshi Iriyama, Maki Kihara (TUS)
pp. 68 - 71

EMM2023-25
Threshold ring signature based on isogeny
Naho Isogai, Takeshi Nakai, Koutarou Suzuki (TUT)
pp. 72 - 79

EMM2023-26
Estimation of rotation angle using pilot signal for image watermarking
Rinka Kawano, Masaki Kawamura (Yamaguchi Univ.)
pp. 80 - 85

EMM2023-27
A Random Ensemble Method with Encrypted Models for Improving Robustness against Adversarial Examples
Ryota Iijima, Miki Tanaka, Sayaka Shiota, Hitoshi Kiya (Tokyo Metro. Univ.)
pp. 86 - 90

EMM2023-28
Novel Image authentication scheme using error correction code and digital signature
Ken-ichi Sakina (QRTechnology)
pp. 91 - 96

EMM2023-29
An Identity-based Signature Scheme with Tight Security Reduction
Jiawei Chen, Hyungrok Jo, Shingo Sato, Junji Shikata (YNU)
pp. 97 - 104

EMM2023-30
Statistical Key Recovery Attack Against the Peregrine Lattice-Based Signature Scheme
Moeto Suzuki (Kyoto Univ.), Xiuhan Lin (Shandong Univ.), Shiduo Zhang (Tsinghua Univ.), Thomas Espitau (PQShield), Yang Yu (Tsinghua Univ.), Mehdi Tibouchi, Masayuki Abe (NTT)
pp. 105 - 112

EMM2023-31
A security analysis on MQ-Sign submitted to Korean Post-Quantum Cryptography standardization
Yasuhiko Ikematsu (Kyushu Univ.), Hyungrok Jo (YNU), Takanori Yasuda (OUS)
pp. 113 - 118

EMM2023-32
Implementation of Shor's algorithm for the discrete logarithm problem and experiments using the quantum computer simulator
Kaito Kishi, Junpei Yamaguchi, Tetsuya Izu (Fujitsu Research), Noboru Kunihiro (Univ. of Tsukuba)
pp. 119 - 126

EMM2023-33
Analysis of Snort's impact due to DDoS attacks
Kano Yuki, Yuichi Futa (TUT), Okazaki Hiroyuki, Suzuki Hikofumi (SHINSYU UNIVERSITY)
pp. 127 - 132

EMM2023-34
A Multiple Vantage Point-based Concept for Open-Source Information Space Awareness
Blumbergs Bernhards (NAIST)
pp. 133 - 140

EMM2023-35
(See Japanese page.)
pp. 141 - 146

EMM2023-36
CNN-Based Iris Recognition Using Multi-spectral Iris Images
Ryosuke Kuroda, Tetsuya Honda, Hironobu Takano (Toyama Prefectural Univ.)
pp. 147 - 151

EMM2023-37
Automatic Credential Entry EMS: EMS System that reproduces Secret Information without exposing biometric data
Takumi Takaiwa, Nozaki Shinnosuke, Numada Kota, Shibata Tsubasa, Okumura Sana, Takigawa Soichi, Ohki Tetsushi, Nishigaki Masakatsu (Shizuoka Univ.)
pp. 152 - 158

EMM2023-38
Implementation and Evaluation of Payload Encryption and Message Authentication Code Using Lightweight Cryptography ASCON in CAN FD Communication
Kotaro Ishikawa, Naoto Kawahara (Okayama Univ.), Takuya Kusaka (Shimane Univ.), Yuta Kodera, Yasuyuki Nogami (Okayama Univ.)
pp. 159 - 164

EMM2023-39
An Implementation and Evaluation of Communication Schemes Using Authenticated Cryptography for MAVLink Communication
Ryuto Kuwada, Nobuya Ishihara, Yuta Kodera, Yasuyuki Nogami (Okayama Univ.)
pp. 165 - 170

EMM2023-40

Takayuki Kondo, Taiki Kitazawa, Shugo Kaji, Daisuke Fujimoto, Yuichi Hayashi (NAIST)
pp. 171 - 175

EMM2023-41
An Approach to Authorization Protocol Using PUF-based Access Token
Risa Yashiro, Kohei Isobe, Hiroki Kunii (SECOM)
pp. 176 - 181

EMM2023-42
Secure Cryptographic Unit with built-in Signature Generation Hardware for Aggregate Signature Schemes and its FPGA Implementation
Toshihiro Sato, Shohei Kawasaki (SCU), Kaoru Masada (Tokyo Univ.), Riku Anzai, Junichi Sakamoto, Naoki Yoshida (YNU), Yasuyoshi Uemura (SCU), Makoto Ikeda (Tokyo Univ.), Tsutomu Matsumoto (YNU)
pp. 182 - 187

EMM2023-43
Clone Resistance of Artifact Metrics: Spatial Frequency Filtering
Akira Iwahashi, Iwaki Miyamoto, Naoki Yoshida, Tsutomu Matsumoto (YNU)
pp. 188 - 193

EMM2023-44
Side-Channel Attacks on Unrolled Implementation of Trivium
Soichiro Kobayashi, Rei Ueno (Tohoku Univ.), Yosuke Todo (NTT), Naofumi Homma (Tohoku Univ.)
pp. 194 - 201

EMM2023-45
SAT-based Differential analysis of AEGIS Family
Takuro Shiraya (UOH), Kosei Sakamoto (Mitsubishi Electric), Takanori Isobe (UOH)
pp. 202 - 207

EMM2023-46
SAT-based Search of Related-key Impossible Distinguisher for Piccolo, TWINE, LBlock
Shion Utsumi (Univ. of Hyogo), Kosei Sakamoto (MELCO), Takanori Isobe (Univ. of Hyogo)
pp. 208 - 213

EMM2023-47
Higher Order Differential Property of Block Cipher LBC-3
Naoki Shibayama, Yasutaka Igarashi (Tokyo Univ. of Science)
pp. 214 - 220

EMM2023-48
On the Maximum Differential Characteristic Probabilities for Multi-Branch Structures
Kazuma Taka (Hyogo Univ.), Kosei Sakamoto (Mitsubishi Electric), Takanori Isobe (Hyogo Univ.)
pp. 221 - 228

EMM2023-49
Is Copying for Information Security Research ‘Fair Use’? -- Apple Inc. v. Corellium, Inc., No. 21-12835 (11th Cir. 2023) --
Yusuke Tachibana (FIT)
pp. 229 - 231

EMM2023-50
A Study on the Application of Nudge to Improve Cybersecurity
Hideyuki Fujii (NRI Secure)
pp. 232 - 238

EMM2023-51
Security Analysis on Nostr protocol for decentralized SNS
Hayato Kimura, Takanori Isobe (Univ. Hyogo)
pp. 239 - 246

EMM2023-52
Anomaly detection with dataset including replay-attack communication
Koushi Nishi, Futa Yuichi (TUT), Okazaki Hiroyuki (Shinshu University)
pp. 247 - 254

EMM2023-53
Extended $k^m$-anonymity for randomization
Masaya Kobayashi, Atsushi Fujioka (Kanagawa Univ.), Koji Chida (Gunma Univ.)
pp. 255 - 260

Note: Each article is a technical report without peer review, and its polished version will be published elsewhere.


The Institute of Electronics, Information and Communication Engineers (IEICE), Japan