Committee |
Date Time |
Place |
Paper Title / Authors |
Abstract |
Paper # |
SITE, ISEC, HWS, EMM, BioX, IPSJ-CSEC, IPSJ-SPT, ICSS [detail] |
2020-07-20 10:00 |
Online |
Online |
Development of the Ethics Assessment for Research & Innovation Guidelines under the SATORI project in Europe(2)
-- The Joint Framework of Ethics Assessment and CEN Workshop Agreement -- Takushi Otani (Kibi International Univ.), Nobutsugu Kanzaki (Nanzan Univ.), Minao Kukita (Nagoya Univ.), Hirotaka Osawa (Tsukuba Univ.), Reina Saijo (Osaka Univ.) ISEC2020-14 SITE2020-11 BioX2020-17 HWS2020-7 ICSS2020-1 EMM2020-11 |
This paper analyzes and summarizes the results of the European Commission’s Stakeholders Acting Together On the Ethical ... [more] |
ISEC2020-14 SITE2020-11 BioX2020-17 HWS2020-7 ICSS2020-1 EMM2020-11 pp.1-8 |
SITE, ISEC, HWS, EMM, BioX, IPSJ-CSEC, IPSJ-SPT, ICSS [detail] |
2020-07-20 10:25 |
Online |
Online |
Report on the International Policy Trends in Data Protection
-- A Study on Facial Recognition Rules in Europe -- Naonori Kato (KDDI Research Inc./RIKEN AIP), Masatomo Suzuki (Niigata Univ./RIKEN AIP), Yosuke Murakami (KDDI Research Inc.) ISEC2020-15 SITE2020-12 BioX2020-18 HWS2020-8 ICSS2020-2 EMM2020-12 |
[more] |
ISEC2020-15 SITE2020-12 BioX2020-18 HWS2020-8 ICSS2020-2 EMM2020-12 pp.9-13 |
SITE, ISEC, HWS, EMM, BioX, IPSJ-CSEC, IPSJ-SPT, ICSS [detail] |
2020-07-20 10:50 |
Online |
Online |
Development of Feature Extractor for Visible Light Iris Recognition Using Deep Learning Tetsuya Honda, Hironobu Takano (Toyama Pref. Univ.) ISEC2020-16 SITE2020-13 BioX2020-19 HWS2020-9 ICSS2020-3 EMM2020-13 |
Biometric authentication is superior to other personal authentication methods in terms of security
against theft and co... [more] |
ISEC2020-16 SITE2020-13 BioX2020-19 HWS2020-9 ICSS2020-3 EMM2020-13 pp.15-19 |
SITE, ISEC, HWS, EMM, BioX, IPSJ-CSEC, IPSJ-SPT, ICSS [detail] |
2020-07-20 11:15 |
Online |
Online |
Biometric Authentication Using Evoked EEG by Invisible Visual Stimulation
-- Improved Verification Perfomance Based on Wavelet Transform and Machine Learning -- Takahiro Miyake, Nozom Kinjo, Isao Nakanishi (Tottori Univ) ISEC2020-17 SITE2020-14 BioX2020-20 HWS2020-10 ICSS2020-4 EMM2020-14 |
[more] |
ISEC2020-17 SITE2020-14 BioX2020-20 HWS2020-10 ICSS2020-4 EMM2020-14 pp.21-26 |
SITE, ISEC, HWS, EMM, BioX, IPSJ-CSEC, IPSJ-SPT, ICSS [detail] |
2020-07-20 13:00 |
Online |
Online |
Privacy Preserving of big data system using distributed machine learning Zhaoheng Chen, Kazumasa omote (University of Tsukuba) ISEC2020-18 SITE2020-15 BioX2020-21 HWS2020-11 ICSS2020-5 EMM2020-15 |
[more] |
ISEC2020-18 SITE2020-15 BioX2020-21 HWS2020-11 ICSS2020-5 EMM2020-15 pp.27-31 |
SITE, ISEC, HWS, EMM, BioX, IPSJ-CSEC, IPSJ-SPT, ICSS [detail] |
2020-07-20 13:25 |
Online |
Online |
Risk analysis of zero downtime mechanism by dispersibility in blockchain technology (2) Wataru Taguchi (Tsukuba Univ.), Kazumasa Omote (Tsukuba Univ./NICT) ISEC2020-19 SITE2020-16 BioX2020-22 HWS2020-12 ICSS2020-6 EMM2020-16 |
Blockchain technology has been used as the basis of crypto assets since the advent of Bitcoin, and new operation methods... [more] |
ISEC2020-19 SITE2020-16 BioX2020-22 HWS2020-12 ICSS2020-6 EMM2020-16 pp.33-38 |
SITE, ISEC, HWS, EMM, BioX, IPSJ-CSEC, IPSJ-SPT, ICSS [detail] |
2020-07-20 13:50 |
Online |
Online |
Side Channel Attack on CRT-RSA Using Sliding Window with Exponent Blinding Soki Osawa, Rei Ueno, Naofumi Homma (Tohoku Univ.) ISEC2020-20 SITE2020-17 BioX2020-23 HWS2020-13 ICSS2020-7 EMM2020-17 |
This paper presents a side-channel attack on CRT-RSA. Some open-source cryptographic libraries (e.g.,
Libgcrypt) employ... [more] |
ISEC2020-20 SITE2020-17 BioX2020-23 HWS2020-13 ICSS2020-7 EMM2020-17 pp.39-45 |
SITE, ISEC, HWS, EMM, BioX, IPSJ-CSEC, IPSJ-SPT, ICSS [detail] |
2020-07-20 15:45 |
Online |
Online |
Quantum Attacks on the Sum of Even-Mansour Pseudorandom Function Kazuo Shinagawa, Tetsu Iwata (Nagoya Univ.) ISEC2020-21 SITE2020-18 BioX2020-24 HWS2020-14 ICSS2020-8 EMM2020-18 |
At CRYPTO~2019, a method to construct a pseudorandom function from public random permutations was presented. In this pap... [more] |
ISEC2020-21 SITE2020-18 BioX2020-24 HWS2020-14 ICSS2020-8 EMM2020-18 pp.47-51 |
SITE, ISEC, HWS, EMM, BioX, IPSJ-CSEC, IPSJ-SPT, ICSS [detail] |
2020-07-20 16:10 |
Online |
Online |
Short Lattice Signatures in the Standard Model with Efficient Tag Generation and Its Implementation Kaisei Kajita, Go Ohtake, Kazuto Ogawa (NHK), Koji Nuida, Tsuyoshi Takagi (Univ. of Tokyo) ISEC2020-22 SITE2020-19 BioX2020-25 HWS2020-15 ICSS2020-9 EMM2020-19 |
We propose new short signature schemes under the Ring-SIS assumption in the standard model by revisiting an existing con... [more] |
ISEC2020-22 SITE2020-19 BioX2020-25 HWS2020-15 ICSS2020-9 EMM2020-19 pp.53-60 |
SITE, ISEC, HWS, EMM, BioX, IPSJ-CSEC, IPSJ-SPT, ICSS [detail] |
2020-07-20 16:35 |
Online |
Online |
A Study on Construction of Probablistic Homomorphic Encryption Using Stochastic Computing. Ryusuke Koseki, Rei Ueno, Naofumi Homma (Tohoku Univ.) ISEC2020-23 SITE2020-20 BioX2020-26 HWS2020-16 ICSS2020-10 EMM2020-20 |
In this paper, we describe a construct and evaluation of probabilistic homomorphic encryption (PHE)scheme. PHE is const... [more] |
ISEC2020-23 SITE2020-20 BioX2020-26 HWS2020-16 ICSS2020-10 EMM2020-20 pp.61-67 |
SITE, ISEC, HWS, EMM, BioX, IPSJ-CSEC, IPSJ-SPT, ICSS [detail] |
2020-07-21 10:00 |
Online |
Online |
Performance Evaluation of True Random Number Generator Using Latches Naoya Torii, Hideaki Kevin Omae (Soka Univ.) ISEC2020-24 SITE2020-21 BioX2020-27 HWS2020-17 ICSS2020-11 EMM2020-21 |
The use of a physical random number generator (TRNG) is suitable for secure key generation of IoT devices and secure non... [more] |
ISEC2020-24 SITE2020-21 BioX2020-27 HWS2020-17 ICSS2020-11 EMM2020-21 pp.69-74 |
SITE, ISEC, HWS, EMM, BioX, IPSJ-CSEC, IPSJ-SPT, ICSS [detail] |
2020-07-21 10:25 |
Online |
Online |
The Optimal Arrangement of Detectors and ECUs for Detection of Unauthorized Devices on the linear CAN Bus Kunito Fukuda, Takahito Yasunaga, Yoshikazu Isoyama, Takumi Asaina, Yoichi Hata (Sumitomo Electric) ISEC2020-25 SITE2020-22 BioX2020-28 HWS2020-18 ICSS2020-12 EMM2020-22 |
(To be available after the conference date) [more] |
ISEC2020-25 SITE2020-22 BioX2020-28 HWS2020-18 ICSS2020-12 EMM2020-22 pp.75-80 |
SITE, ISEC, HWS, EMM, BioX, IPSJ-CSEC, IPSJ-SPT, ICSS [detail] |
2020-07-21 10:50 |
Online |
Online |
Adversarial scan attack against ICP algorithm for pose estimation on LiDAR-based SLAM Kota Yoshida, Takeshi Fujino (Ritsumeikan Univ.) ISEC2020-26 SITE2020-23 BioX2020-29 HWS2020-19 ICSS2020-13 EMM2020-23 |
An autonomous robot is controlled on physical information acquired by various sensors. Some physical attacks are propose... [more] |
ISEC2020-26 SITE2020-23 BioX2020-29 HWS2020-19 ICSS2020-13 EMM2020-23 pp.81-86 |
SITE, ISEC, HWS, EMM, BioX, IPSJ-CSEC, IPSJ-SPT, ICSS [detail] |
2020-07-21 11:15 |
Online |
Online |
Side-channel Analysis on Message Authentication Code for Controller Area Network Kensei Nagato, Ville Yli-Mayry, Rei Ueno (Tohoku Univ.), Tsuyoshi Toyama, Hisashi Oguma (TOYOTA), Naohumi Homma (Tohoku Univ.) ISEC2020-27 SITE2020-24 BioX2020-30 HWS2020-20 ICSS2020-14 EMM2020-24 |
[more] |
ISEC2020-27 SITE2020-24 BioX2020-30 HWS2020-20 ICSS2020-14 EMM2020-24 pp.87-92 |
SITE, ISEC, HWS, EMM, BioX, IPSJ-CSEC, IPSJ-SPT, ICSS [detail] |
2020-07-21 13:50 |
Online |
Online |
Homomorphic commitment schemes with constant output locality Hideaki Miyaji, Atsuko Miyaji (OU) ISEC2020-28 SITE2020-25 BioX2020-31 HWS2020-21 ICSS2020-15 EMM2020-25 |
[more] |
ISEC2020-28 SITE2020-25 BioX2020-31 HWS2020-21 ICSS2020-15 EMM2020-25 pp.93-98 |
SITE, ISEC, HWS, EMM, BioX, IPSJ-CSEC, IPSJ-SPT, ICSS [detail] |
2020-07-21 15:45 |
Online |
Online |
Key Holding System Without Exchanging Common Key between Users
-- TS Key Holding System -- Nobuharu Suzuki, Kouji Sasaki (Adin), Takahiro Yoshimura, Ken-ya Yoshimura (Monolith), Toshio Tsuji (Vega), Masao Yamasawa, Masahito Gotaishi, Shigeo Tsujii (Chuo Univ.) ISEC2020-29 SITE2020-26 BioX2020-32 HWS2020-22 ICSS2020-16 EMM2020-26 |
[more] |
ISEC2020-29 SITE2020-26 BioX2020-32 HWS2020-22 ICSS2020-16 EMM2020-26 pp.99-103 |
SITE, ISEC, HWS, EMM, BioX, IPSJ-CSEC, IPSJ-SPT, ICSS [detail] |
2020-07-21 16:10 |
Online |
Online |
Generalization of the hard part computation of final exponentiation for arbitrary BLS curves Masaaki Shirase (FUN), Yuki Nanjo (Okayama Univ.) ISEC2020-30 SITE2020-27 BioX2020-33 HWS2020-23 ICSS2020-17 EMM2020-27 |
[more] |
ISEC2020-30 SITE2020-27 BioX2020-33 HWS2020-23 ICSS2020-17 EMM2020-27 pp.105-110 |
SITE, ISEC, HWS, EMM, BioX, IPSJ-CSEC, IPSJ-SPT, ICSS [detail] |
2020-07-21 16:35 |
Online |
Online |
Secure and Compact Elliptic Curve LR Scalar Multiplication Yaoan Jin, Atsuko Miyaji (Osaka Univ) ISEC2020-31 SITE2020-28 BioX2020-34 HWS2020-24 ICSS2020-18 EMM2020-28 |
Elliptic curve cryptography (ECC) can ensure an equivalent security with much smaller key sizes. Elliptic curve scalar m... [more] |
ISEC2020-31 SITE2020-28 BioX2020-34 HWS2020-24 ICSS2020-18 EMM2020-28 pp.111-118 |