IEICE Technical Committee Submission System
Conference Schedule
Online Proceedings
[Sign in]
Tech. Rep. Archives
    [Japanese] / [English] 
( Committee/Place/Topics  ) --Press->
 
( Paper Keywords:  /  Column:Title Auth. Affi. Abst. Keyword ) --Press->

Technical Committee on Hardware Security (HWS)  (Searched in: 2018)

Search Results: Keywords 'from:2018-07-25 to:2018-07-25'

[Go to Official HWS Homepage (Japanese)] 
Search Results: Conference Papers
 Conference Papers (Available on Advance Programs)  (Sort by: Date Ascending)
 Results 1 - 20 of 37  /  [Next]  
Committee Date Time Place Paper Title / Authors Abstract Paper #
HWS, ISEC, SITE, ICSS, EMM, IPSJ-CSEC, IPSJ-SPT [detail] 2018-07-25
09:55
Hokkaido Sapporo Convention Center Truly Efficient Robust Secret Sharing for the Real World
Yohei Watanabe (UEC), Kazuma Ohara (UEC/NEC), Mitsugu Iwamoto, Kazuo Ohta (UEC) ISEC2018-13 SITE2018-5 HWS2018-10 ICSS2018-16 EMM2018-12
Robust secret sharing is secret sharing with the following robustness property: An original message can be recovered eve... [more] ISEC2018-13 SITE2018-5 HWS2018-10 ICSS2018-16 EMM2018-12
pp.1-8
HWS, ISEC, SITE, ICSS, EMM, IPSJ-CSEC, IPSJ-SPT [detail] 2018-07-25
10:20
Hokkaido Sapporo Convention Center Construction of Revocable HIBE with Adaptive Security
Atsushi Takayasu (Univ. Tokyo) ISEC2018-14 SITE2018-6 HWS2018-11 ICSS2018-17 EMM2018-13
Revocable hierarchical identity-based encryption (RHIBE) is an extension of IBE with a key revocation mechanism and a ke... [more] ISEC2018-14 SITE2018-6 HWS2018-11 ICSS2018-17 EMM2018-13
pp.9-16
HWS, ISEC, SITE, ICSS, EMM, IPSJ-CSEC, IPSJ-SPT [detail] 2018-07-25
10:45
Hokkaido Sapporo Convention Center Code-Based Signature Scheme without Trapdoors
Partha Sarathi Roy (KDDI Research), Kirill Morozov (Univ. of North Texas), Kazuhide Fukushima, Shinsaku Kiyomoto (KDDI Research), Tsuyoshi Takagi (Univ. of Tokyo) ISEC2018-15 SITE2018-7 HWS2018-12 ICSS2018-18 EMM2018-14
 [more] ISEC2018-15 SITE2018-7 HWS2018-12 ICSS2018-18 EMM2018-14
pp.17-22
HWS, ISEC, SITE, ICSS, EMM, IPSJ-CSEC, IPSJ-SPT [detail] 2018-07-25
11:10
Hokkaido Sapporo Convention Center On the integration of SCF-PEKS and PKE
Tatsuya Suzuki (Tokai Univ.), Keita Emura (NICT), Ohigashi Toshihiro (Tokai Univ.) ISEC2018-16 SITE2018-8 HWS2018-13 ICSS2018-19 EMM2018-15
 [more] ISEC2018-16 SITE2018-8 HWS2018-13 ICSS2018-19 EMM2018-15
pp.23-30
HWS, ISEC, SITE, ICSS, EMM, IPSJ-CSEC, IPSJ-SPT [detail] 2018-07-25
13:10
Hokkaido Sapporo Convention Center A Study on Amplitude Controlling Using Modulated Wave toward Countermeasure against Spoofing Attack on Ultrasonic Rangefinder
Daisuke Fujimoto, Yu-ichi Hayashi (NAIST) ISEC2018-17 SITE2018-9 HWS2018-14 ICSS2018-20 EMM2018-16
Various sensors are increasing with spread of applications such as automatic operation. Ultrasonic rangefinders have bec... [more] ISEC2018-17 SITE2018-9 HWS2018-14 ICSS2018-20 EMM2018-16
pp.55-59
HWS, ISEC, SITE, ICSS, EMM, IPSJ-CSEC, IPSJ-SPT [detail] 2018-07-25
13:35
Hokkaido Sapporo Convention Center A System for Evaluating Instrumentation Security of ToF Depth-Image Cameras against Pulse-light Spoofing
Satoru Sakurazawa, Daisuke Fujimoto, Tsutomu Matsumoto (YNU) ISEC2018-18 SITE2018-10 HWS2018-15 ICSS2018-21 EMM2018-17
The ToF depth-image camera is a device capable of simultaneously measuring distances within a certain range and it is be... [more] ISEC2018-18 SITE2018-10 HWS2018-15 ICSS2018-21 EMM2018-17
pp.61-68
HWS, ISEC, SITE, ICSS, EMM, IPSJ-CSEC, IPSJ-SPT [detail] 2018-07-25
14:00
Hokkaido Sapporo Convention Center How to Evaluate Instrumentation Security of Stereo Vision Cameras against DoS and Illusion Attacks
Naoki Yoshida, Hiroki Nohira, Yasushi Iwata, Tsutomu Matsumoto (YNU) ISEC2018-19 SITE2018-11 HWS2018-16 ICSS2018-22 EMM2018-18
Stereo vision cameras that instrument distances by the principle of triangulation are used in various fields. Instrument... [more] ISEC2018-19 SITE2018-11 HWS2018-16 ICSS2018-22 EMM2018-18
pp.69-75
HWS, ISEC, SITE, ICSS, EMM, IPSJ-CSEC, IPSJ-SPT [detail] 2018-07-25
14:25
Hokkaido Sapporo Convention Center Immunity Evaluation of Cryptographic Devices using Gaussian Noise against IEMI Fault Injection
Takumi Okamoto, Daisuke Fujimoto, Yuichi Hayashi (NAIST), Naofumi Homma (Tohoku Univ.), Arthur Beckers, Josep Balasch, Benedikt Gierlichs, Ingrid Verbauwhede (KU Leuven) ISEC2018-20 SITE2018-12 HWS2018-17 ICSS2018-23 EMM2018-19
Fault injection attacks using intentional electromagnetic interference against cryptographic devices have been reported.... [more] ISEC2018-20 SITE2018-12 HWS2018-17 ICSS2018-23 EMM2018-19
pp.77-81
HWS, ISEC, SITE, ICSS, EMM, IPSJ-CSEC, IPSJ-SPT [detail] 2018-07-25
14:50
Hokkaido Sapporo Convention Center Fundamental Study on Identification of EM Leakage Source of Audio Information from a Smart Device
Izumi Nishina, Daisuke Fujimoto (NAIST), Masahiro Kinugawa (NIT), Yu-ichi Hayashi (NAIST) ISEC2018-21 SITE2018-13 HWS2018-18 ICSS2018-24 EMM2018-20
A threat of leakage of sound information via electromagnetic field from a smart device having an audio output function h... [more] ISEC2018-21 SITE2018-13 HWS2018-18 ICSS2018-24 EMM2018-20
pp.83-88
HWS, ISEC, SITE, ICSS, EMM, IPSJ-CSEC, IPSJ-SPT [detail] 2018-07-25
13:10
Hokkaido Sapporo Convention Center [Invited Talk] Tightly-Secure Key-Encapsulation Mechanism in the Quantum Random Oracle Model (from EUROCRYPT 2018)
Tsunekazu Saito, Keita Xagawa, Takashi Yamakawa (NTT) ISEC2018-22 SITE2018-14 HWS2018-19 ICSS2018-25 EMM2018-21
We introduce the paper ``Tightly-Secure Key-Encapsulation Mechanism in the Quantum Random Oracle Model'' by Tsunekazu Sa... [more] ISEC2018-22 SITE2018-14 HWS2018-19 ICSS2018-25 EMM2018-21
p.89
HWS, ISEC, SITE, ICSS, EMM, IPSJ-CSEC, IPSJ-SPT [detail] 2018-07-25
13:40
Hokkaido Sapporo Convention Center [Invited Talk] Obfustopia Built on Secret-Key Functional Encryption (from EUROCRYPT 2018)
Fuyuki Kitagawa (Tokyo Tech), Ryo Nishimaki (NTT), Keisuke Tanaka (Tokyo Tech) ISEC2018-23 SITE2018-15 HWS2018-20 ICSS2018-26 EMM2018-22
We show that indistinguishability obfuscation (IO) for all circuits can be constructed solely from secret-key functional... [more] ISEC2018-23 SITE2018-15 HWS2018-20 ICSS2018-26 EMM2018-22
p.91
HWS, ISEC, SITE, ICSS, EMM, IPSJ-CSEC, IPSJ-SPT [detail] 2018-07-25
14:10
Hokkaido Sapporo Convention Center [Invited Talk] Memory Lower Bounds of Reductions Revisited (from EUROCRYPT 2018)
Yuyu Wang (Tokyo Tech/AIST/IOHK), Takahiro Matsuda, Goichiro Hanaoka (AIST), Keisuke Tanaka (Tokyo Tech) ISEC2018-24 SITE2018-16 HWS2018-21 ICSS2018-27 EMM2018-23
In this invited talk, we introduce the paper, “ Memory Lower Bounds of Reductions Revisited ” by Y. Wang, T. Matsuda, G.... [more] ISEC2018-24 SITE2018-16 HWS2018-21 ICSS2018-27 EMM2018-23
p.93
HWS, ISEC, SITE, ICSS, EMM, IPSJ-CSEC, IPSJ-SPT [detail] 2018-07-25
15:25
Hokkaido Sapporo Convention Center Practice and Evaluation of Penetration Testing Exercises for Raising Cybersecurity Awareness
Daisuke Suzuki (Hokuriku Univ.) ISEC2018-25 SITE2018-17 HWS2018-22 ICSS2018-28 EMM2018-24
The aim of this study is to clarify the educational effect of a penetration testing exercise aimed at raising cybersecur... [more] ISEC2018-25 SITE2018-17 HWS2018-22 ICSS2018-28 EMM2018-24
pp.131-136
HWS, ISEC, SITE, ICSS, EMM, IPSJ-CSEC, IPSJ-SPT [detail] 2018-07-25
15:50
Hokkaido Sapporo Convention Center A Study on Public Wi-Fi Authentication Method with Anonymity and Traceability Using Blockchain
Tomoyuki Sanda, Hiroyuki Inaba (Kyoto Inst. of Tech.) ISEC2018-26 SITE2018-18 HWS2018-23 ICSS2018-29 EMM2018-25
Recently, Wi-Fi access points have been installed in public places, with increasing demand for Internet access by mobile... [more] ISEC2018-26 SITE2018-18 HWS2018-23 ICSS2018-29 EMM2018-25
pp.137-142
HWS, ISEC, SITE, ICSS, EMM, IPSJ-CSEC, IPSJ-SPT [detail] 2018-07-25
16:15
Hokkaido Sapporo Convention Center A design of interest-rate recordable cryptocurrency management program
Yusuke Kaneko (SMBC/JRI), Shigeyuki Osada (JRI), Shigeyuki Azuchi (HAW), Hitoshi Okada (NII), Shigeichiro Yamasaki (KINDAI Univ.) ISEC2018-27 SITE2018-19 HWS2018-24 ICSS2018-30 EMM2018-26
Cryptocurrencies based on blockchain technology keep the deposit’s total amount to meet withdraws’ one for preventing do... [more] ISEC2018-27 SITE2018-19 HWS2018-24 ICSS2018-30 EMM2018-26
pp.143-148
HWS, ISEC, SITE, ICSS, EMM, IPSJ-CSEC, IPSJ-SPT [detail] 2018-07-25
15:25
Hokkaido Sapporo Convention Center Application of the Singular Curve Point Decompression Attack to the Bitcoin Curve
Akira Takahashi (Kyoto Univ.), Mehdi Tibouchi, Masayuki Abe (NTT) ISEC2018-28 SITE2018-20 HWS2018-25 ICSS2018-31 EMM2018-27
In this talk, we report that the singular curve point decompression attack of Blömer and Günther, which was originally p... [more] ISEC2018-28 SITE2018-20 HWS2018-25 ICSS2018-31 EMM2018-27
pp.149-153
HWS, ISEC, SITE, ICSS, EMM, IPSJ-CSEC, IPSJ-SPT [detail] 2018-07-25
15:50
Hokkaido Sapporo Convention Center Extended Partial Key Exposure Attacks on RSA
Kaichi Suzuki, Atsushi Takayasu, Noboru Kunihiro (Univ. of Tokyo) ISEC2018-29 SITE2018-21 HWS2018-26 ICSS2018-32 EMM2018-28
Thus far, emph{partial key exposure attacks} on RSA, i.e., attackers are given the most significant bits (MSBs) emph{or}... [more] ISEC2018-29 SITE2018-21 HWS2018-26 ICSS2018-32 EMM2018-28
pp.155-162
HWS, ISEC, SITE, ICSS, EMM, IPSJ-CSEC, IPSJ-SPT [detail] 2018-07-25
16:15
Hokkaido Sapporo Convention Center Secure Multiparty Computation of Ranking Using a Deck of Cards
Ken Takashima, Yuta Abe, Tatsuya Sasaki, Daiki Miyahara (Tohoku Univ.), Kazumasa Shinagawa (Tokyo Inst. of Tech./AIST), Takaaki Mizuki, Hideaki Sone (Tohoku Univ.) ISEC2018-30 SITE2018-22 HWS2018-27 ICSS2018-33 EMM2018-29
(To be available after the conference date) [more] ISEC2018-30 SITE2018-22 HWS2018-27 ICSS2018-33 EMM2018-29
pp.163-169
HWS, ISEC, SITE, ICSS, EMM, IPSJ-CSEC, IPSJ-SPT [detail] 2018-07-25
16:40
Hokkaido Sapporo Convention Center Chi-Squared Test for Independence Between Single Nucleotide Polymorphisms and Diseases Using Mis-operation Resistant Searchable Homomorphic Encryption
Keita Emura, Takuya Hayashi (NICT/JST), Wenjie Lu (University of Tsukuba/JST CREST), Shiho Moriai (NICT/JST), Jun Sakuma (University of Tsukuba/JST CREST/RIKEN), Yoshiji Yamada (Mie University/JST CREST) ISEC2018-31 SITE2018-23 HWS2018-28 ICSS2018-34 EMM2018-30
 [more] ISEC2018-31 SITE2018-23 HWS2018-28 ICSS2018-34 EMM2018-30
pp.171-176
HWS, ISEC, SITE, ICSS, EMM, IPSJ-CSEC, IPSJ-SPT [detail] 2018-07-26
09:30
Hokkaido Sapporo Convention Center Some tips for information hiding from the viewpoint of magic trick
Naofumi Aoki (Hokkaido Univ.) ISEC2018-32 SITE2018-24 HWS2018-29 ICSS2018-35 EMM2018-31
Besides some industrial applications such as steganography and digital watermarking, the concept of information hiding i... [more] ISEC2018-32 SITE2018-24 HWS2018-29 ICSS2018-35 EMM2018-31
pp.225-227
 Results 1 - 20 of 37  /  [Next]  
Choose a download format for default settings. [NEW !!]
Text format pLaTeX format CSV format BibTeX format
Copyright and reproduction : All rights are reserved and no part of this publication may be reproduced or transmitted in any form or by any means, electronic or mechanical, including photocopy, recording, or any information storage and retrieval system, without permission in writing from the publisher. Notwithstanding, instructors are permitted to photocopy isolated articles for noncommercial classroom use without fee. (License No.: 10GA0019/12GB0052/13GB0056/17GB0034/18GB0034)


[Return to Top Page]

[Return to IEICE Web Page]


The Institute of Electronics, Information and Communication Engineers (IEICE), Japan