Committee |
Date Time |
Place |
Paper Title / Authors |
Abstract |
Paper # |
ISEC |
2019-05-17 10:00 |
Tokyo |
Kikai-Shinko-Kaikan Bldg. |
[Invited Talk]
Simulation-based Receiver Selective Opening CCA Secure PKE from Standard Computational Assumptions(from SCN 2018) Keisuke Hara, Fuyuki Kitagawa (TokyoTech), Takahiro Matsuda, Goichiro Hanaoka (AIST), Keisuke Tanaka (TokyoTech) ISEC2019-1 |
[more] |
ISEC2019-1 p.1 |
ISEC |
2019-05-17 10:30 |
Tokyo |
Kikai-Shinko-Kaikan Bldg. |
[Invited Talk]
Attacking Noisy Secret CRT-RSA Exponents in Binary Method (from ICISC 2018) Kento Oonishi, Noboru Kunihiro (UTokyo) ISEC2019-2 |
In this presentation, we give a security evaluation on the RSA encryption scheme with the Chinese remainder theorem (CRT... [more] |
ISEC2019-2 p.3 |
ISEC |
2019-05-17 11:00 |
Tokyo |
Kikai-Shinko-Kaikan Bldg. |
[Invited Talk]
Analysis of Mixed PUF-TRNG Circuit Based on SR-Latches in FD-SOI Technology (from DSD 2018) Jean-Luc Danger (Telecom ParisTech), Risa Yashiro (UEC), Tarik Graba, Yves Mathieu, Abdelmalek Si-Merabet (Telecom ParisTech), Kazuo Sakiyama (UEC), Noriyuki Miura, Makoto Nagata (Kobe University), Sylvain Guilley (Secure-IC) ISEC2019-3 |
In this talk, we introduce the paper “Analysis of Mixed PUF-TRNG Circuit Based on SR-Latches in FD-SOI Technology” by Je... [more] |
ISEC2019-3 p.5 |
ISEC |
2019-05-17 11:45 |
Tokyo |
Kikai-Shinko-Kaikan Bldg. |
Examination of quantitative evaluation of attack method to restore the anonymized data Takaya Yamazoe, Kazumasa Omote (Tsukuba Univ.) ISEC2019-4 |
With the increasing scale of data, integrated analysis of data distributed to multiple institutions is required. On the ... [more] |
ISEC2019-4 pp.7-13 |
ISEC |
2019-05-17 12:10 |
Tokyo |
Kikai-Shinko-Kaikan Bldg. |
How to Decode Erros in Information Theoretic PIR Kaoru Kurosawa, Keito Shibata, Kazuki Ishinari, Ippei Kakurai (Ibaraki Univ.) ISEC2019-5 |
[more] |
ISEC2019-5 pp.15-20 |
ISEC |
2019-05-17 14:30 |
Tokyo |
Kikai-Shinko-Kaikan Bldg. |
K(I)Sch-CBPKC Based on Message-Dependent Transformation Masao Kasahara (Waseda Univ.) ISEC2019-6 |
In this paper we present a message-dependent transformation scheme, K(I)Scheme. Based on K(I)Scheme, we present a new cl... [more] |
ISEC2019-6 pp.21-27 |
ISEC |
2019-05-17 14:55 |
Tokyo |
Kikai-Shinko-Kaikan Bldg. |
The amount of information leakage of decryption keys through timing attacks on RSA decryption system Tomonori Hirata, Yuichi Kaji (Nagoya Univ.) ISEC2019-7 |
[more] |
ISEC2019-7 pp.29-36 |
ISEC |
2019-05-17 15:20 |
Tokyo |
Kikai-Shinko-Kaikan Bldg. |
A secure method of provisioning IoT devices with few operations Dai Yamamoto, Hirotaka Kokubo, Takanori Machida, Ikuya Morikawa (FUJITSU LABORATORIES LTD.), Akira Kanaoka (Toho Univ.) ISEC2019-8 |
Recently, most IoT devices have been connected to cloud servers, which provide users with useful services such as remote... [more] |
ISEC2019-8 pp.37-44 |
ISEC |
2019-05-17 16:00 |
Tokyo |
Kikai-Shinko-Kaikan Bldg. |
[Invited Talk]
Risk of Re-identification from Payment Card Histories in Multiple Domains (from AINA 2018) Satoshi Ito, Reo Harada, Hiroaki Kikuchi (Meiji Univ.) ISEC2019-9 |
De-identification is the process of modifying a data set to prevent the identification of individual people from the dat... [more] |
ISEC2019-9 pp.45-46 |
ISEC |
2019-05-17 16:30 |
Tokyo |
Kikai-Shinko-Kaikan Bldg. |
[Invited Talk]
A Generic Construction of Integrated Secure-Channel Free PEKS and PKE (from ISPEC 2018) Tatsuya Suzuki (Tokai Univ./NICT), Keita Emura (NICT), Toshihiro Ohigashi (Tokai Univ./NICT) ISEC2019-10 |
In this talk we explain the content of ``A Generic Construction of Integrated Secure-Channel Free PEKS and PKE'' (Tatsuy... [more] |
ISEC2019-10 p.47 |
ISEC |
2019-05-17 17:00 |
Tokyo |
Kikai-Shinko-Kaikan Bldg. |
[Invited Talk]
Five-Card AND Protocol in Committed Format Using Only Practical Shuffles (from APKC 2018) Yuta Abe (Tohoku Univ.), Yu-ichi Hayashi (NAIST), Takaaki Mizuki, Hideaki Sone (Tohoku Univ.) ISEC2019-11 |
In this invited talk, we introduce the paper ``Five-Card AND Protocol in Committed Format Using Only Practical Shuffles'... [more] |
ISEC2019-11 p.49 |