Committee |
Date Time |
Place |
Paper Title / Authors |
Abstract |
Paper # |
RCC, ISEC, IT, WBS |
2024-03-14 15:05 |
Osaka |
Osaka Univ. (Suita Campus) |
Improvement of non-interactive privacy-preserving document classification Yuhei Kitahara (Tokyo Tech), Hibiki Oka, Akira Nakahashi (iric), Wakaha Ogata (Tokyo Tech) IT2023-120 ISEC2023-119 WBS2023-108 RCC2023-102 |
In the Machine Learning as a Service model, where clients delegate inference to servers, leakage of client inputs or mac... [more] |
IT2023-120 ISEC2023-119 WBS2023-108 RCC2023-102 pp.279-286 |
RCC, ISEC, IT, WBS |
2024-03-14 16:35 |
Osaka |
Osaka Univ. (Suita Campus) |
Integral Attack with Bit-Based Division Property on Block Cipher LBC Naoki Shibayama, Yasutaka Igarashi (Tokyo Univ. of Science) IT2023-131 ISEC2023-130 WBS2023-119 RCC2023-113 |
LBC is a block cipher proposed by Kapalova et al. in 2023. The block size is 64-bit, the secret key size is 80-bit, and ... [more] |
IT2023-131 ISEC2023-130 WBS2023-119 RCC2023-113 pp.350-357 |
RCC, ISEC, IT, WBS |
2024-03-14 17:00 |
Osaka |
Osaka Univ. (Suita Campus) |
Reconstruction of Boyer quantum algorithm and its application to hash puzzles Chris Idota, Yuichi Kaji (Nagoya Univ.) IT2023-132 ISEC2023-131 WBS2023-120 RCC2023-114 |
This study investigates the computational complexity of solving hash puzzles using quantum algorithms. A hash puzzle is ... [more] |
IT2023-132 ISEC2023-131 WBS2023-120 RCC2023-114 pp.358-365 |
NS, IN (Joint) |
2024-02-29 11:35 |
Okinawa |
Okinawa Convention Center |
High-speed Anonymous Communication on Programmable Switches Defeating Active De-anonymization Attacks Yutaro Yoshinaka, Mio Kochiyama, Yuki Koizumi, Junji Takemasa, Toru Hasegawa (Osaka Univ.) NS2023-183 |
Lightweight anonymity protocol is a class of infrastructure-based anonymous communication providing the finest performan... [more] |
NS2023-183 pp.68-73 |
VLD, HWS, ICD |
2024-03-01 12:05 |
Okinawa |
(Primary: On-site, Secondary: Online) |
Security Evaluation of Fault Analysis for SuperSonic Shu Takemoto, Yusuke Nozaki, Masaya Yoshikawa (Meijo Univ.) VLD2023-126 HWS2023-86 ICD2023-115 |
SuperSonic, a low-latency lightweight block cipher, is suitable for securing edge devices with high real-time performanc... [more] |
VLD2023-126 HWS2023-86 ICD2023-115 pp.141-144 |
VLD, HWS, ICD |
2024-03-01 15:55 |
Okinawa |
(Primary: On-site, Secondary: Online) |
Hardware Design Based on Full Parameter Support and Parallelism Optimization for Key Encapsulation Mechanism FIPS203 Yuto Nakamura, Makoto Ikeda (UTokyo) VLD2023-131 HWS2023-91 ICD2023-120 |
The emergence of quantum computers potentially threatens the security of traditional cryptographic techniques that depen... [more] |
VLD2023-131 HWS2023-91 ICD2023-120 pp.167-172 |
VLD, HWS, ICD |
2024-03-01 16:20 |
Okinawa |
(Primary: On-site, Secondary: Online) |
An Efficient Hardware Approach for High-Speed SPHINCS+ Signature Generation Yuta Takeshima, Makoto Ikeda (The Univ. of Tokyo) VLD2023-132 HWS2023-92 ICD2023-121 |
This study addresses the challenges traditional cryptographic systems face with the advent of quantum computers by focus... [more] |
VLD2023-132 HWS2023-92 ICD2023-121 pp.173-177 |
VLD, HWS, ICD |
2024-03-02 10:50 |
Okinawa |
(Primary: On-site, Secondary: Online) |
Design of General Hardware for Optimal Strategy in Isogeny-Based Post-Quantum Cryptography Kosei Nakamura, Makoto Ikeda (UT) VLD2023-137 HWS2023-97 ICD2023-126 |
The computation in isogeny-based post-quantum cryptography primarily consists of two operations: scalar multiplication o... [more] |
VLD2023-137 HWS2023-97 ICD2023-126 pp.198-203 |
VLD, HWS, ICD |
2024-03-02 12:05 |
Okinawa |
(Primary: On-site, Secondary: Online) |
A Study on formal verification of GF(2^m) arithmetic circuits including states Kazuho Sakoda (SCU/Kobe Univ.), Yasuyoshi Uemura (SCU), Naofumi Homma (Tohoku Univ.) VLD2023-140 HWS2023-100 ICD2023-129 |
This paper describes a formal verification method for arithmetic circuits based on computer algebra. Conventional method... [more] |
VLD2023-140 HWS2023-100 ICD2023-129 pp.215-220 |
LOIS, ICM |
2024-01-26 11:25 |
Nagasaki |
Nagasaki Prefectural Art Museum (Primary: On-site, Secondary: Online) |
A VPN Method for Security Usage of Public Wireless LANs Hinata Tanoue, Akihiro Shimizu (Kochi Univ. of Tech.) ICM2023-37 LOIS2023-41 |
In public wireless LAN environments, ensuring security is an important issue. An effective method for secure communicati... [more] |
ICM2023-37 LOIS2023-41 pp.51-56 |
EMM |
2024-01-16 15:25 |
Miyagi |
Tohoku Univ. (Primary: On-site, Secondary: Online) |
[Invited Talk]
Federated Learning with Enhanced Privacy Protection in AI Lihua Wang (NICT) EMM2023-83 |
Federated learning is a crucial methodology in artificial intelligence where multiple organizations collaborate to perfo... [more] |
EMM2023-83 p.19 |
QIT (2nd) |
2023-12-17 17:30 |
Okinawa |
OIST (Primary: On-site, Secondary: Online) |
[Poster Presentation]
Certified Deletion for Mult-bit Message Using Pseudorandom Functions Duo XU (NU) |
With the aid of quantum communication, one can delete messages from receiver’s memory. This is what so called Certified ... [more] |
|
QIT (2nd) |
2023-12-17 17:30 |
Okinawa |
OIST (Primary: On-site, Secondary: Online) |
[Poster Presentation]
Verification of identifiability of quantum states in quantum key delivery Shunya Tajima, Atsushi Okamoto, Akihisa Tomita (hokudai) |
In quantum key distribution, it is required that when creating the transmission state, the state is identical in all deg... [more] |
|
ICM, NS, CQ, NV (Joint) |
2023-11-21 13:15 |
Ehime |
Ehime Prefecture Gender Equality Center (Primary: On-site, Secondary: Online) |
[Encouragement Talk]
Security Evaluation of Low-latency Cipher based on Improved Simon against Deep Learning Analysis using Profiled Power Consumption Shu Takemoto, Yusuke Nozaki, Masaya Yoshikawa (Meijo Univ.) NS2023-114 |
Society 5.0 aims to solve problems in social systems through the intercommunication of small devices. On the other hand,... [more] |
NS2023-114 pp.20-25 |
ICM, NS, CQ, NV (Joint) |
2023-11-22 10:30 |
Ehime |
Ehime Prefecture Gender Equality Center (Primary: On-site, Secondary: Online) |
[Invited Talk]
Highly confidential and high-density data transmission technology in underwater optical wireless communication Takahiro Kodama (Kagawa Univ.) NS2023-120 |
In the context of underwater optical communication, there is a demand for the design and development of transceivers tai... [more] |
NS2023-120 pp.56-61 |
ICSS |
2023-11-16 14:30 |
Ishikawa |
IT Business Plaza Musashi and Online (Primary: On-site, Secondary: Online) |
Formal Verification of an Edge Computing Platform based on Modular Architecture using Intel SGX Yuma Nishihira (Tokai Univ.), Hayato Kimura (Univ. of Hyogo), Toshihiro Ohigashi (Tokai Univ.) ICSS2023-54 |
The proliferation of IoT devices requires an edge computing infrastructure that can process large amounts of data in a f... [more] |
ICSS2023-54 pp.22-29 |
ICSS |
2023-11-16 16:00 |
Ishikawa |
IT Business Plaza Musashi and Online (Primary: On-site, Secondary: Online) |
Security Analysis of MP-LWE using Weighted Lattice Reduction Yudai Tagawa, Shinya Okumura, Atsuko Miyaji (Osaka Univ.) ICSS2023-57 |
In 2017, Roşca et al. proposed the Middle-Product LWE (MP-LWE) problem, a new LWE problem variant. The MP-LWE problem mi... [more] |
ICSS2023-57 pp.42-48 |
ICSS |
2023-11-16 16:25 |
Ishikawa |
IT Business Plaza Musashi and Online (Primary: On-site, Secondary: Online) |
Redefinition of pair-PNB and application to ChaCha differential linear analysis Kai Izumi, Atsuko Miyaji (Osaka Univ.) ICSS2023-58 |
ChaCha is the stream cipher adopted in TLS1.3 and analyzing its security is important given its wide deployment. Differe... [more] |
ICSS2023-58 pp.49-56 |
ICSS |
2023-11-16 16:50 |
Ishikawa |
IT Business Plaza Musashi and Online (Primary: On-site, Secondary: Online) |
Improved Secret Key Transport mechanism using CSIDH Kodai Hayashida, Atsuko Miyaji (Osaka Univ.) ICSS2023-59 |
In order to achieve secure communication over public networks,it is common practice to share keys and communicate
confi... [more] |
ICSS2023-59 pp.57-63 |
VLD, DC, RECONF, ICD, IPSJ-SLDM [detail] |
2023-11-16 13:20 |
Kumamoto |
Civic Auditorium Sears Home Yume Hall (Primary: On-site, Secondary: Online) |
Tamper Resistance Evaluation on FPGA for Low-Latency Cipher Sonic Shu Takemoto, Yusuke Nozaki, Masaya Yoshikawa (Meijo Univ.) VLD2023-49 ICD2023-57 DC2023-56 RECONF2023-52 |
Industry 5.0 promotes smart factories for system optimization by utilizing IoT and AI in the industrial field. The smart... [more] |
VLD2023-49 ICD2023-57 DC2023-56 RECONF2023-52 pp.101-105 |