Committee |
Date Time |
Place |
Paper Title / Authors |
Abstract |
Paper # |
HWS, ICD |
2018-10-29 16:00 |
Osaka |
Kobe Univ. Umeda Intelligent Laboratory |
Evaluation of Availability on Cache Leakage from OSS-RSA Hayato Mori, Rei Ueno (Tohoku Univ.), Junko Takahashi (NTT), Yuichi Hayashi (naist), Naohumi Honma (Tohoku Univ.) HWS2018-53 ICD2018-45 |
In recent years, a new cache attack against RSA encryption using the time difference of operations, named SWL (SWL: Slid... [more] |
HWS2018-53 ICD2018-45 pp.35-40 |
HWS, ICD |
2018-10-29 16:50 |
Osaka |
Kobe Univ. Umeda Intelligent Laboratory |
Security Evaluations of Automotive Attacks on FlexRay Junko Takahashi, Masashi Tanaka (NTT) HWS2018-55 ICD2018-47 |
This paper investigates a difficulty and a threat of previous attacks on FlexRay and reports that abnormal vehicle behav... [more] |
HWS2018-55 ICD2018-47 pp.47-52 |
HWS, ISEC, SITE, ICSS, EMM, IPSJ-CSEC, IPSJ-SPT [detail] |
2018-07-25 13:10 |
Hokkaido |
Sapporo Convention Center |
[Invited Talk]
Tightly-Secure Key-Encapsulation Mechanism in the Quantum Random Oracle Model (from EUROCRYPT 2018) Tsunekazu Saito, Keita Xagawa, Takashi Yamakawa (NTT) ISEC2018-22 SITE2018-14 HWS2018-19 ICSS2018-25 EMM2018-21 |
We introduce the paper ``Tightly-Secure Key-Encapsulation Mechanism in the Quantum Random Oracle Model'' by Tsunekazu Sa... [more] |
ISEC2018-22 SITE2018-14 HWS2018-19 ICSS2018-25 EMM2018-21 p.89 |
HWS, ISEC, SITE, ICSS, EMM, IPSJ-CSEC, IPSJ-SPT [detail] |
2018-07-25 13:40 |
Hokkaido |
Sapporo Convention Center |
[Invited Talk]
Obfustopia Built on Secret-Key Functional Encryption (from EUROCRYPT 2018) Fuyuki Kitagawa (Tokyo Tech), Ryo Nishimaki (NTT), Keisuke Tanaka (Tokyo Tech) ISEC2018-23 SITE2018-15 HWS2018-20 ICSS2018-26 EMM2018-22 |
We show that indistinguishability obfuscation (IO) for all circuits can be constructed solely from secret-key functional... [more] |
ISEC2018-23 SITE2018-15 HWS2018-20 ICSS2018-26 EMM2018-22 p.91 |
HWS, ISEC, SITE, ICSS, EMM, IPSJ-CSEC, IPSJ-SPT [detail] |
2018-07-25 15:25 |
Hokkaido |
Sapporo Convention Center |
Application of the Singular Curve Point Decompression Attack to the Bitcoin Curve Akira Takahashi (Kyoto Univ.), Mehdi Tibouchi, Masayuki Abe (NTT) ISEC2018-28 SITE2018-20 HWS2018-25 ICSS2018-31 EMM2018-27 |
In this talk, we report that the singular curve point decompression attack of Blömer and Günther, which was originally p... [more] |
ISEC2018-28 SITE2018-20 HWS2018-25 ICSS2018-31 EMM2018-27 pp.149-153 |
ICSS, IPSJ-SPT |
2018-03-08 09:45 |
Hokkaido |
Okinawa Hokubu Koyou Nouryoku Kaihatsu Sougou Center |
Automatically Collecting User-initiated Web-based Attacks Takashi Koide, Daiki Chiba, Yuta Takata, Mitsuaki Akiyama, Takeshi Yagi, Kunio Hato (NTT) ICSS2017-66 |
Recently, web content uses social engineering techniques to lure victims into clicking on them, originating malware down... [more] |
ICSS2017-66 pp.91-96 |
ICSS, IPSJ-SPT |
2018-03-08 11:35 |
Hokkaido |
Okinawa Hokubu Koyou Nouryoku Kaihatsu Sougou Center |
Predicting Website Abuse Using Update Histories Yuta Takata, Mitsuaki Akiyama, Takeshi Yagi, Kunio Hato (NTT), Shigeki Goto (Waseda Univ.) ICSS2017-73 |
Threats of abusing websites that webmasters abandoned updates has increased.
In this paper, we propose a method of pred... [more] |
ICSS2017-73 pp.133-138 |
ICSS, IPSJ-SPT |
2018-03-08 14:15 |
Hokkaido |
Okinawa Hokubu Koyou Nouryoku Kaihatsu Sougou Center |
A Survey of Factors Influencing Progress of HTTPS Adoption Tetsuya Okuda, Naoko Chiba, Mitsuaki Akiyama, Yuki Okano (NTT) ICSS2017-80 |
(To be available after the conference date) [more] |
ICSS2017-80 pp.187-192 |
ISEC, COMP |
2017-12-22 10:15 |
Kochi |
Eikokuji Campus, Kochi University of Technology |
Optimizing Bleichenbacher's Attack on Schnorr-Type Signatures with Barely Biased Nonces Akira Takahashi (Kyoto Univ.), Mehdi Tibouchi, Masayuki Abe, Tatsuaki Okamoto (NTT) ISEC2017-84 COMP2017-38 |
Bleichenbacher's attack is a key recovery attack technique exploiting biased nonces in Schnorr-type signatures.
While a... [more] |
ISEC2017-84 COMP2017-38 pp.83-88 |
ICSS |
2017-11-21 11:45 |
Oita |
Beppu International Convention Center |
A Study of Detecting Infected Hosts by Graph Analysis of DNS Server Logs Kazunori Kamiya, Ayako Hasegawa (SC-Lab.), Yuji Sekiya, Kazuya Okada (Univ. of Tokyo) ICSS2017-47 |
[more] |
ICSS2017-47 pp.53-58 |
QIT (2nd) |
2017-11-16 13:50 |
Saitama |
Saitama University |
[Poster Presentation]
On Quantum Multicollision-Finding Algorithm for Cryptographic Hash Functions Akinori Hosoyamada, Yu Sasaki, Keita Xagawa (NTT) |
[more] |
|
ICTSSL, IN (Joint) |
2017-10-10 15:50 |
Shizuoka |
|
[Invited Talk]
Towards Joint Emergency Management Support System Tomohiro Kokogawa (NTT) IN2017-38 |
Recently many kind of risks including natural disasters and cyber-attacks are increasing. When incident occurs, quick an... [more] |
IN2017-38 pp.19-24 |
ICTSSL |
2017-07-13 14:50 |
Kagawa |
Kagawa Univ. |
Establishment of incident response system and operation of information sharing system for large scale international sports events
-- Efforts of Joint Experiment on incident response in SAPPORO Asian Winter Games -- Akira Koyama, Naoko Kosaka, Tsuneko Kura, Yoshihiro Yoshida, Koji Kishi (NTT), Tadayoshi Maruyama, Koichi Takamatsu (SAWGOC) ICTSSL2017-21 |
Ahead of the 2020Tokyo Olympic Games&Paralympics, various crises such as terrorism, cyber attacks and natural disasters ... [more] |
ICTSSL2017-21 pp.21-26 |
MoNA, LOIS, IPSJ-DC |
2017-07-06 14:30 |
Tokyo |
|
Information sharing and interorganizational collaboration on management of large-scale international sports tournaments and incident response Naoko Kosaka, Akira Koyama, Tsuneko Kura, Koji Kishi (NTT), Tadayoshi Maruyama, Koichi Takamatsu (Organising Committee) MoNA2017-11 LOIS2017-9 |
Various risks are assumed at large international sporting events depending on the environment of the venue. The main tas... [more] |
MoNA2017-11 LOIS2017-9 pp.21-26 |
HWS (2nd) |
2017-06-13 10:50 |
Aomori |
Hirosaki University |
Automotive Attacks on Time-Trigger In-Vehicle Network Junko Takahashi (NTT) |
(Advance abstract in Japanese is available) [more] |
|
ICSS, IPSJ-SPT |
2017-03-13 15:40 |
Nagasaki |
University of Nagasaki |
Deep Learning Approach for Detecting Malware Infected Host and Detection Performance Evaluation with HTTP Traffic Taishi Nishiyama, Atsutoshi Kumagai, Yasushi Okano, Kazunori Kamiya, Masaki Tanikawa (NTT), Kazuya Okada, Yuji Sekiya (University of Tokyo) ICSS2016-52 |
Preventive measures are generally important to stop the occurrence of a security incident caused by malware. However, it... [more] |
ICSS2016-52 pp.49-54 |
QIT (2nd) |
2013-05-27 09:50 |
Hokkaido |
Hokkaido Univ. |
Performance of a long distance quantum key distribution in the field environment of 90-km optical links installed in Tokyo metropolitan area Kaoru Shimizu (NTT BRL), Toshimori Honjo (NTT SCL), Mikio Fujiwara, Toshiyuki Ito (NICT), Kiyoshi Tamaki (NTT BRL), Shigehito Miki, Taro Yamashita, Hirotaka Terai, Zhen Wang, Masahide Sasaki (NICT) |
[more] |
|
LOIS |
2013-03-08 15:30 |
Okinawa |
|
An Implementation of Situation-Sensitive Function Controller for Smartphones and its Evaluation. Ryota Sato, Sakae Chikara, Tetsuya Okuda, Shigeru Kayaguchi (NTT) LOIS2012-104 |
According to the rapid spread of smartphones, their usage pattern is becoming diversified. The situation in which smartp... [more] |
LOIS2012-104 pp.203-208 |
IN |
2013-01-25 15:25 |
Kagoshima |
Kagoshima-Ken-Sangyo-Kaikan |
Performance Measurement of Cloud Resources for Inter-cloud Computing Yuichi Sudo, Kunio Hato, Hidetsugu Kobayashi, Eiji Kuwana (NTT) IN2012-153 |
Inter-cloud technology connects a number of cloud providers and let them exchange computational resources dynamically, t... [more] |
IN2012-153 pp.87-92 |
ISEC |
2012-09-21 13:50 |
Tokyo |
Kikai-Shinko-Kaikan Bldg. |
[Invited Talk]
Public Key Compression and Modulus Switching for Fully Homomorphic Encryption over the Integers Jean-Sebastien Coron (Univ. of Luxembourg), David Naccache (ENS), Mehdi Tibouchi (NTT) ISEC2012-50 |
We describe a compression technique that reduces the public key size of van Dijk, Gentry, Halevi and Vaikuntanathan's (D... [more] |
ISEC2012-50 p.37 |