Committee |
Date Time |
Place |
Paper Title / Authors |
Abstract |
Paper # |
HWS, VLD |
2023-03-03 14:15 |
Okinawa |
(Primary: On-site, Secondary: Online) |
N/A Yuka Ikegami, Kazuki Yamashita (Waseda Univ.), Kento Hasegawa, Kazuhide Fukushima, Shinsaku Kiyomoto (KDDI Research, Inc.), Nozomu Togawa (Waseda Univ.) VLD2022-108 HWS2022-79 |
N/A [more] |
VLD2022-108 HWS2022-79 pp.191-196 |
ICTSSL, IN, NWS, IEE-SMF |
2022-10-27 14:55 |
Nagano |
Shinshu University (Primary: On-site, Secondary: Online) |
Data Security Verification in Supply Chain Keizo Sugiyama, Yuto Nakano, Yasuaki Kobayashi, Toru Nakamura, Haruki Ota, Takao Kojima, Yutaka Miyake, Shinsaku Kiyomoto (KDDI Research) ICTSSL2022-19 |
Highly sensitive data such as inspection data, design data, program module are often handled in a supply chain. As speci... [more] |
ICTSSL2022-19 pp.12-17 |
IT, ISEC, RCC, WBS |
2022-03-11 14:05 |
Online |
Online |
Rocca: Efficient AES-based Encryption Scheme for Beyond 5G Kosei Sakamoto, Fukang Liu (Univ of Hyogo), Yuto Nakano, Shinsaku Kiyomoto (KDDI Research), Takanori Isobe (Univ of Hyogo/NICT) IT2021-126 ISEC2021-91 WBS2021-94 RCC2021-101 |
In this paper, we present an AES-based authenticated-encryption with associated-data scheme nemed Rocca, with the purpos... [more] |
IT2021-126 ISEC2021-91 WBS2021-94 RCC2021-101 pp.249-255 |
IT, ISEC, RCC, WBS |
2022-03-11 14:30 |
Online |
Online |
Implementation and Performance Evaluation of Rocca Yuto Nakano (KDDI Research), Kosei Sakamoto, Fukang Liu (Univ of Hyogo), Shinsaku Kiyomoto (KDDI Research), Takanori Isobe (Univ of Hyogo/NICT) IT2021-127 ISEC2021-92 WBS2021-95 RCC2021-102 |
In this paper, we implement an AES-based authenticated-encryption with associated-data scheme called name, proposed by S... [more] |
IT2021-127 ISEC2021-92 WBS2021-95 RCC2021-102 pp.256-261 |
SITE, ISEC, LOIS |
2021-11-12 14:50 |
Online |
Online |
A Study of Deep Learning based Side-Channel Analysis on Lightweight Cryptography GIMLI-AEAD Keigo Ito, Akira Ito, Rei Ueno (Tohoku Univ.), Kazuhide Fukushima, Shinsaku Kiyomoto (KDDI Research Inc.), Naofumi Homma (Tohoku Univ.) ISEC2021-45 SITE2021-39 LOIS2021-28 |
In this paper, we describe a side-channel analysis for the lightweight cipher Gimli-AEAD.
In particular, we apply a De... [more] |
ISEC2021-45 SITE2021-39 LOIS2021-28 pp.20-25 |
ICD, HWS [detail] |
2020-10-26 17:15 |
Online |
Online |
N/A Kohei Nozawa (Waseda Univ.), Kento Hasegawa, Seira Hidano, Shinsaku Kiyomoto (KDDI Research, Inc.), Nozomu Togawa (Waseda Univ.) HWS2020-40 ICD2020-29 |
(To be available after the conference date) [more] |
HWS2020-40 ICD2020-29 pp.88-93 |
ISEC, SITE, LOIS |
2019-11-02 10:00 |
Osaka |
Osaka Univ. |
Evolving Secret Sharing: Hierarchical Access Structure with Polynomial Share Size Sabyasachi Dutta (Univ. of Calgary), Partha Sarathi Roy, Kazuhide Fukushima, Shinsaku Kiyomoto (KDDI Research), Kouichi Sakurai (Kyushu Univ.) ISEC2019-76 SITE2019-70 LOIS2019-35 |
Secret sharing allows storing secret information in a distributed manner among several participants.
The original setti... [more] |
ISEC2019-76 SITE2019-70 LOIS2019-35 pp.93-98 |
HWS, ICD [detail] |
2019-11-01 16:25 |
Osaka |
DNP Namba SS Bld. |
Demonstration of Adversarial Examples for Hardware Trojan Detection Kohei Nozawa, Kento Hasegawa (Waseda Univ.), Seira Hidano, Shinsaku Kiyomoto (KDDI Research), Kazuo Hashimoto, Nozomu Togawa (Waseda Univ.) HWS2019-64 ICD2019-25 |
(To be available after the conference date) [more] |
HWS2019-64 ICD2019-25 pp.41-46 |
ISEC, SITE, ICSS, EMM, HWS, BioX, IPSJ-CSEC, IPSJ-SPT [detail] |
2019-07-24 10:20 |
Kochi |
Kochi University of Technology |
Privacy for Documents and Prototype of Risk Evaluation Tool Tomoaki Mimoto, Shinsaku Kiyomoto (KDDI Research), Koji Kitamura (AIST), Atsuko Miyaji (Osaka Univ.) ISEC2019-23 SITE2019-17 BioX2019-15 HWS2019-18 ICSS2019-21 EMM2019-26 |
[more] |
ISEC2019-23 SITE2019-17 BioX2019-15 HWS2019-18 ICSS2019-21 EMM2019-26 pp.113-118 |
IT, ISEC, WBS |
2019-03-07 10:20 |
Tokyo |
University of Electro-Communications |
Coherence-based Spoken Machine Translation Recognition: Towards an Efficient Gateway to Detect Untrusted Information Nguyen Son Hoang Quoc, Tran Phuong Thao, Seira Hidano, Shinsaku Kiyomoto (KDDI Research) IT2018-77 ISEC2018-83 WBS2018-78 |
The machine-translated text is playing an important role in modern life which establishes wide communication among vario... [more] |
IT2018-77 ISEC2018-83 WBS2018-78 pp.13-19 |
IT, ISEC, WBS |
2019-03-08 12:05 |
Tokyo |
University of Electro-Communications |
Secret Sharing on Evolving Multi-level Access Structure Partha Sarathi Roy (KDDI Research), Sabyasachi Dutta (Kyushu Univ.), Kazuhide Fukushima, Shinsaku Kiyomoto (KDDI Research), Kouichi Sakurai (Kyushu Univ.) IT2018-121 ISEC2018-127 WBS2018-122 |
[more] |
IT2018-121 ISEC2018-127 WBS2018-122 pp.281-284 |
SITE, ISEC, LOIS |
2018-11-04 14:10 |
Fukuoka |
|
Time Complexity of Syndrome Decoding Problem and Security Analysis of Code-based Signature Scheme Partha Sarathi Roy (KDDI Research), Kirill Morozov (Univ. of North Texas), Kazuhide Fukushima, Shinsaku Kiyomoto (KDDI Research), Tsuyoshi Takagi (Univ. of Tokyo) ISEC2018-77 SITE2018-55 LOIS2018-37 |
[more] |
ISEC2018-77 SITE2018-55 LOIS2018-37 pp.73-78 |
HWS, ISEC, SITE, ICSS, EMM, IPSJ-CSEC, IPSJ-SPT [detail] |
2018-07-25 10:45 |
Hokkaido |
Sapporo Convention Center |
Code-Based Signature Scheme without Trapdoors Partha Sarathi Roy (KDDI Research), Kirill Morozov (Univ. of North Texas), Kazuhide Fukushima, Shinsaku Kiyomoto (KDDI Research), Tsuyoshi Takagi (Univ. of Tokyo) ISEC2018-15 SITE2018-7 HWS2018-12 ICSS2018-18 EMM2018-14 |
[more] |
ISEC2018-15 SITE2018-7 HWS2018-12 ICSS2018-18 EMM2018-14 pp.17-22 |
BioX, ITE-ME, ITE-IST [detail] |
2016-06-20 16:20 |
Ishikawa |
Ishikawa-Shiko-Kinen-Bunka-Koryukan |
[Invited Talk]
Physically Unclonable Function for IoT Devices Kazuhide Fukushima, Seira Hidano, Shinsaku Kiyomoto (KDDI Labs) BioX2016-4 |
[more] |
BioX2016-4 p.29 |
ICSS, IPSJ-SPT |
2014-03-28 09:25 |
Okinawa |
Meio Univiersity |
Comparison of Privacy Policies in Different Domains Toru Nakamura (KDDI Lab.), Milena Tasic (Univ. of Belgrade), Shinsaku Kiyomoto, Yutaka Miyake (KDDI Lab.) ICSS2013-87 |
Improvement of description of privacy policy is required for effective
utilization of personal data. The goal of this ... [more] |
ICSS2013-87 pp.173-178 |
ISEC, IT, WBS |
2014-03-10 11:00 |
Aichi |
Nagoya Univ., Higashiyama Campus |
A Study on Correlation ElectroMagnetic Analysis against KCipher-2 implemented on a Microcontroller for ZigBee Devices Hajime Uno, Sho Endo, Naofumi Homma, Takafumi Aoki (Tohoku Univ.), Yuto Nakano, Shinsaku Kiyomoto, Yutaka Miyake (KDDI Lab.) IT2013-59 ISEC2013-88 WBS2013-48 |
This paper presents a correlation electromagnetic analysis against the stream cipher KCipher-2 software. Side-channel at... [more] |
IT2013-59 ISEC2013-88 WBS2013-48 pp.35-40 |
ISEC, LOIS |
2012-11-22 15:35 |
Shizuoka |
Shizuoka City Industry-University Exchange Center |
Parallelized Gauss sieve algorithm for solving the shortest vector problem in lattices Tsukasa Ishiguro, Shinsaku Kiyomoto, Yutaka Miyake (KDDI R&D Labs), Tsuyoshi Takagi (Kyushu Univ) ISEC2012-71 LOIS2012-46 |
Security of lattice-based cryptosystems is based on the hardness of the Shortest Vector Problem (SVP) in lattices.
Micc... [more] |
ISEC2012-71 LOIS2012-46 pp.93-99 |
EMM, ISEC, SITE, ICSS, IPSJ-CSEC, IPSJ-SPT [detail] |
2012-07-19 15:00 |
Hokkaido |
|
A Fast Privacy-Preserving Collaborative Filtering Scheme with Transferring Statistical Value Toru Nakamura, Shinsaku Kiyomoto, Ryu Watanabe, Yutaka Miyake (KDDI R&D Labs) ISEC2012-23 SITE2012-19 ICSS2012-25 EMM2012-15 |
The goal of this study is to provide more accurate recommendation to
users with sharing user information among service ... [more] |
ISEC2012-23 SITE2012-19 ICSS2012-25 EMM2012-15 pp.97-102 |
ICSS |
2011-03-25 10:20 |
Tokyo |
Suspended |
On a Data Sensitivity Diagnosis Shinsaku Kiyomoto, Toshiaki Tanaka (KDDI Labs.) ICSS2010-56 |
[more] |
ICSS2010-56 pp.1-4 |
ISEC, IT, WBS |
2011-03-04 10:50 |
Osaka |
Osaka University |
Verification Points of Security Against a Passive Attack for Key Exchange Protocols Haruki Ota, Shinsaku Kiyomoto, Yutaka Miyake (KDDI Labs.) IT2010-96 ISEC2010-100 WBS2010-75 |
It is preferable for authentication and key exchange protocols to be verified automatically and rapidly in accordance wi... [more] |
IT2010-96 ISEC2010-100 WBS2010-75 pp.177-184 |