IEICE Technical Report

Online edition: ISSN 2432-6380

Volume 123, Number 245

Information Security

Workshop Date : 2023-11-09 - 2023-11-10 / Issue Date : 2023-11-02

[PREV] [NEXT]

[TOP] | [2018] | [2019] | [2020] | [2021] | [2022] | [2023] | [2024] | [Japanese] / [English]

[PROGRAM] [BULK PDF DOWNLOAD]


Table of contents

ISEC2023-54
[Invited Talk] Security Technologies to Improve Content-Distribution and Broadcasting Services
Kazuto Ogawa (NICT)
p. 1

ISEC2023-55
Private-preserving encoding and decoding using variable-length coding schemes
Yuki Seto, Kunihiko Sadakane, Kazunari Tozawa (UTokyo)
pp. 2 - 9

ISEC2023-56
An Optimization Method for Share Reconstruction in (k,n)-Threshold Secret Sharing Scheme Using Exclusive-OR
Shogo Naganuma, Yutaro Taki, Shigeru Fujita (CIT)
pp. 10 - 17

ISEC2023-57
Optimum Median-Sum Fingerprinting for Winternitz One-Time Signature
Motonari Honda, Yuichi Kaji (NU)
pp. 18 - 25

ISEC2023-58
(See Japanese page.)
pp. 26 - 32

ISEC2023-59
Improving Triple Sieve Algorithm on Ideal Lattice
Seishiro Terada, Yuntao Wang, Atsuko Miyaji (Osaka Univ.)
pp. 33 - 40

ISEC2023-60
Report of IEEE ISTAS 2023
Yusuke Kaneko (JRI)
pp. 41 - 48

ISEC2023-61
Harm Caused by Databases
Nobuyuki Yoshinaga ()
pp. 49 - 53

ISEC2023-62
Proof-of-Concept and Discussion of Self-Management and Utilization of Personal Data in Broadcast Media Services
Chigusa Yamamura, Takumi Mouri, Yasuhiro Murasaki, Satoshi Fujitsu, Kinji Matsumura (NHK)
pp. 54 - 59

ISEC2023-63
Transaction Access Control Using ERC7303 and Its Applications
Ko Fujimura (Otsuma Women's Univ.)
pp. 60 - 65

ISEC2023-64
NTP Tunneling Threat Model Verification and Countermeasure
Shinjisangeru Sugasawa, Hisayoshi Kunimune, Shigeaki Tanimoto (CIT)
pp. 66 - 71

ISEC2023-65
Consideration of progressive BKZ by reordering of GramSchmidt vectors
Katsuya Nakashima, Wang Yuntao, Miyaji Atsuko (Osaka Univ.)
pp. 72 - 77

ISEC2023-66
Secure Identity-Based Authenticated Key Exchange with Multiple Private Key Generators against Malicious Generators
Kazuma Wariki, Atsushi Fujioka (Kanagawa Univ.), Akira Nagai, Kan Yasuda (NTT)
pp. 78 - 85

ISEC2023-67
Zero-Knowledge Proofs for ownership of Deep Neural Network
Shungo Sato, Hidema Tanaka (NDA)
pp. 86 - 92

ISEC2023-68
Side-Channel Security Evaluation of ASCON Implementation
Daisuke Iwasa, Rei Ueno (Tohoku University), Kazuhide Fukushima (KDDI Research, Inc.), Naofumi Homma (Tohoku University)
pp. 93 - 97

ISEC2023-69
A Study on Side-Channel Attacks for Unrolled Implementation of Block Ciphers
Teppei Higashi, Rei Ueno, Naofumi Homma (Tohoku Univ)
pp. 98 - 102

ISEC2023-70
A Proposed Link Key Hijacking Attack Using the Power-Saving Mode against Bluetooth BR/EDR
Keiichiro Kimura, Hiroki Kuzuno, Yoshiaki Shiraishi, Masakatu Morii (Kobe Univ.)
pp. 103 - 109

ISEC2023-71
The New Ecodesign Regulation in EU -- Focusing on the Development of “the Right to Repair” --
Yusuke Tachibana (FIT)
pp. 110 - 113

ISEC2023-72
Improvements for Enhancing the Reliability of NFTs -- NFT Challenges and Solutions --
Yasushi Nakayama (SBI FERI)
pp. 114 - 118

ISEC2023-73
A Legally Regulatable Stablecoin on a Public Blockchain -- Four Corners Model for Stablecoin --
Hayato Shimamura, Shigeichiro Yamasaki (Kindai Univ.)
pp. 119 - 126

Note: Each article is a technical report without peer review, and its polished version will be published elsewhere.


The Institute of Electronics, Information and Communication Engineers (IEICE), Japan