IEICE Technical Committee Submission System
Conference Schedule
Online Proceedings
[Sign in]
Tech. Rep. Archives
    [Japanese] / [English] 
( Committee/Place/Topics  ) --Press->
 
( Paper Keywords:  /  Column:Title Auth. Affi. Abst. Keyword ) --Press->

All Technical Committee Conferences  (Searched in: All Years)

Search Results: Conference Papers
 Conference Papers (Available on Advance Programs)  (Sort by: Date Descending)
 Results 1 - 20 of 34  /  [Next]  
Committee Date Time Place Paper Title / Authors Abstract Paper #
HWS, VLD 2023-03-03
14:15
Okinawa
(Primary: On-site, Secondary: Online)
N/A
Yuka Ikegami, Kazuki Yamashita (Waseda Univ.), Kento Hasegawa, Kazuhide Fukushima, Shinsaku Kiyomoto (KDDI Research, Inc.), Nozomu Togawa (Waseda Univ.) VLD2022-108 HWS2022-79
N/A [more] VLD2022-108 HWS2022-79
pp.191-196
ICTSSL, IN, NWS, IEE-SMF 2022-10-27
14:55
Nagano Shinshu University
(Primary: On-site, Secondary: Online)
Data Security Verification in Supply Chain
Keizo Sugiyama, Yuto Nakano, Yasuaki Kobayashi, Toru Nakamura, Haruki Ota, Takao Kojima, Yutaka Miyake, Shinsaku Kiyomoto (KDDI Research) ICTSSL2022-19
Highly sensitive data such as inspection data, design data, program module are often handled in a supply chain. As speci... [more] ICTSSL2022-19
pp.12-17
IT, ISEC, RCC, WBS 2022-03-11
14:05
Online Online Rocca: Efficient AES-based Encryption Scheme for Beyond 5G
Kosei Sakamoto, Fukang Liu (Univ of Hyogo), Yuto Nakano, Shinsaku Kiyomoto (KDDI Research), Takanori Isobe (Univ of Hyogo/NICT) IT2021-126 ISEC2021-91 WBS2021-94 RCC2021-101
In this paper, we present an AES-based authenticated-encryption with associated-data scheme nemed Rocca, with the purpos... [more] IT2021-126 ISEC2021-91 WBS2021-94 RCC2021-101
pp.249-255
IT, ISEC, RCC, WBS 2022-03-11
14:30
Online Online Implementation and Performance Evaluation of Rocca
Yuto Nakano (KDDI Research), Kosei Sakamoto, Fukang Liu (Univ of Hyogo), Shinsaku Kiyomoto (KDDI Research), Takanori Isobe (Univ of Hyogo/NICT) IT2021-127 ISEC2021-92 WBS2021-95 RCC2021-102
In this paper, we implement an AES-based authenticated-encryption with associated-data scheme called name, proposed by S... [more] IT2021-127 ISEC2021-92 WBS2021-95 RCC2021-102
pp.256-261
SITE, ISEC, LOIS 2021-11-12
14:50
Online Online A Study of Deep Learning based Side-Channel Analysis on Lightweight Cryptography GIMLI-AEAD
Keigo Ito, Akira Ito, Rei Ueno (Tohoku Univ.), Kazuhide Fukushima, Shinsaku Kiyomoto (KDDI Research Inc.), Naofumi Homma (Tohoku Univ.) ISEC2021-45 SITE2021-39 LOIS2021-28
In this paper, we describe a side-channel analysis for the lightweight cipher Gimli-AEAD.
In particular, we apply a De... [more]
ISEC2021-45 SITE2021-39 LOIS2021-28
pp.20-25
ICD, HWS [detail] 2020-10-26
17:15
Online Online N/A
Kohei Nozawa (Waseda Univ.), Kento Hasegawa, Seira Hidano, Shinsaku Kiyomoto (KDDI Research, Inc.), Nozomu Togawa (Waseda Univ.) HWS2020-40 ICD2020-29
(To be available after the conference date) [more] HWS2020-40 ICD2020-29
pp.88-93
ISEC, SITE, LOIS 2019-11-02
10:00
Osaka Osaka Univ. Evolving Secret Sharing: Hierarchical Access Structure with Polynomial Share Size
Sabyasachi Dutta (Univ. of Calgary), Partha Sarathi Roy, Kazuhide Fukushima, Shinsaku Kiyomoto (KDDI Research), Kouichi Sakurai (Kyushu Univ.) ISEC2019-76 SITE2019-70 LOIS2019-35
Secret sharing allows storing secret information in a distributed manner among several participants.
The original setti... [more]
ISEC2019-76 SITE2019-70 LOIS2019-35
pp.93-98
HWS, ICD [detail] 2019-11-01
16:25
Osaka DNP Namba SS Bld. Demonstration of Adversarial Examples for Hardware Trojan Detection
Kohei Nozawa, Kento Hasegawa (Waseda Univ.), Seira Hidano, Shinsaku Kiyomoto (KDDI Research), Kazuo Hashimoto, Nozomu Togawa (Waseda Univ.) HWS2019-64 ICD2019-25
(To be available after the conference date) [more] HWS2019-64 ICD2019-25
pp.41-46
ISEC, SITE, ICSS, EMM, HWS, BioX, IPSJ-CSEC, IPSJ-SPT [detail] 2019-07-24
10:20
Kochi Kochi University of Technology Privacy for Documents and Prototype of Risk Evaluation Tool
Tomoaki Mimoto, Shinsaku Kiyomoto (KDDI Research), Koji Kitamura (AIST), Atsuko Miyaji (Osaka Univ.) ISEC2019-23 SITE2019-17 BioX2019-15 HWS2019-18 ICSS2019-21 EMM2019-26
 [more] ISEC2019-23 SITE2019-17 BioX2019-15 HWS2019-18 ICSS2019-21 EMM2019-26
pp.113-118
IT, ISEC, WBS 2019-03-07
10:20
Tokyo University of Electro-Communications Coherence-based Spoken Machine Translation Recognition: Towards an Efficient Gateway to Detect Untrusted Information
Nguyen Son Hoang Quoc, Tran Phuong Thao, Seira Hidano, Shinsaku Kiyomoto (KDDI Research) IT2018-77 ISEC2018-83 WBS2018-78
The machine-translated text is playing an important role in modern life which establishes wide communication among vario... [more] IT2018-77 ISEC2018-83 WBS2018-78
pp.13-19
IT, ISEC, WBS 2019-03-08
12:05
Tokyo University of Electro-Communications Secret Sharing on Evolving Multi-level Access Structure
Partha Sarathi Roy (KDDI Research), Sabyasachi Dutta (Kyushu Univ.), Kazuhide Fukushima, Shinsaku Kiyomoto (KDDI Research), Kouichi Sakurai (Kyushu Univ.) IT2018-121 ISEC2018-127 WBS2018-122
 [more] IT2018-121 ISEC2018-127 WBS2018-122
pp.281-284
SITE, ISEC, LOIS 2018-11-04
14:10
Fukuoka   Time Complexity of Syndrome Decoding Problem and Security Analysis of Code-based Signature Scheme
Partha Sarathi Roy (KDDI Research), Kirill Morozov (Univ. of North Texas), Kazuhide Fukushima, Shinsaku Kiyomoto (KDDI Research), Tsuyoshi Takagi (Univ. of Tokyo) ISEC2018-77 SITE2018-55 LOIS2018-37
 [more] ISEC2018-77 SITE2018-55 LOIS2018-37
pp.73-78
HWS, ISEC, SITE, ICSS, EMM, IPSJ-CSEC, IPSJ-SPT [detail] 2018-07-25
10:45
Hokkaido Sapporo Convention Center Code-Based Signature Scheme without Trapdoors
Partha Sarathi Roy (KDDI Research), Kirill Morozov (Univ. of North Texas), Kazuhide Fukushima, Shinsaku Kiyomoto (KDDI Research), Tsuyoshi Takagi (Univ. of Tokyo) ISEC2018-15 SITE2018-7 HWS2018-12 ICSS2018-18 EMM2018-14
 [more] ISEC2018-15 SITE2018-7 HWS2018-12 ICSS2018-18 EMM2018-14
pp.17-22
BioX, ITE-ME, ITE-IST [detail] 2016-06-20
16:20
Ishikawa Ishikawa-Shiko-Kinen-Bunka-Koryukan [Invited Talk] Physically Unclonable Function for IoT Devices
Kazuhide Fukushima, Seira Hidano, Shinsaku Kiyomoto (KDDI Labs) BioX2016-4
 [more] BioX2016-4
p.29
ICSS, IPSJ-SPT 2014-03-28
09:25
Okinawa Meio Univiersity Comparison of Privacy Policies in Different Domains
Toru Nakamura (KDDI Lab.), Milena Tasic (Univ. of Belgrade), Shinsaku Kiyomoto, Yutaka Miyake (KDDI Lab.) ICSS2013-87
Improvement of description of privacy policy is required for effective
utilization of personal data. The goal of this ... [more]
ICSS2013-87
pp.173-178
ISEC, IT, WBS 2014-03-10
11:00
Aichi Nagoya Univ., Higashiyama Campus A Study on Correlation ElectroMagnetic Analysis against KCipher-2 implemented on a Microcontroller for ZigBee Devices
Hajime Uno, Sho Endo, Naofumi Homma, Takafumi Aoki (Tohoku Univ.), Yuto Nakano, Shinsaku Kiyomoto, Yutaka Miyake (KDDI Lab.) IT2013-59 ISEC2013-88 WBS2013-48
This paper presents a correlation electromagnetic analysis against the stream cipher KCipher-2 software. Side-channel at... [more] IT2013-59 ISEC2013-88 WBS2013-48
pp.35-40
ISEC, LOIS 2012-11-22
15:35
Shizuoka Shizuoka City Industry-University Exchange Center Parallelized Gauss sieve algorithm for solving the shortest vector problem in lattices
Tsukasa Ishiguro, Shinsaku Kiyomoto, Yutaka Miyake (KDDI R&D Labs), Tsuyoshi Takagi (Kyushu Univ) ISEC2012-71 LOIS2012-46
Security of lattice-based cryptosystems is based on the hardness of the Shortest Vector Problem (SVP) in lattices.
Micc... [more]
ISEC2012-71 LOIS2012-46
pp.93-99
EMM, ISEC, SITE, ICSS, IPSJ-CSEC, IPSJ-SPT [detail] 2012-07-19
15:00
Hokkaido   A Fast Privacy-Preserving Collaborative Filtering Scheme with Transferring Statistical Value
Toru Nakamura, Shinsaku Kiyomoto, Ryu Watanabe, Yutaka Miyake (KDDI R&D Labs) ISEC2012-23 SITE2012-19 ICSS2012-25 EMM2012-15
The goal of this study is to provide more accurate recommendation to
users with sharing user information among service ... [more]
ISEC2012-23 SITE2012-19 ICSS2012-25 EMM2012-15
pp.97-102
ICSS 2011-03-25
10:20
Tokyo Suspended On a Data Sensitivity Diagnosis
Shinsaku Kiyomoto, Toshiaki Tanaka (KDDI Labs.) ICSS2010-56
 [more] ICSS2010-56
pp.1-4
ISEC, IT, WBS 2011-03-04
10:50
Osaka Osaka University Verification Points of Security Against a Passive Attack for Key Exchange Protocols
Haruki Ota, Shinsaku Kiyomoto, Yutaka Miyake (KDDI Labs.) IT2010-96 ISEC2010-100 WBS2010-75
It is preferable for authentication and key exchange protocols to be verified automatically and rapidly in accordance wi... [more] IT2010-96 ISEC2010-100 WBS2010-75
pp.177-184
 Results 1 - 20 of 34  /  [Next]  
Choose a download format for default settings. [NEW !!]
Text format pLaTeX format CSV format BibTeX format
Copyright and reproduction : All rights are reserved and no part of this publication may be reproduced or transmitted in any form or by any means, electronic or mechanical, including photocopy, recording, or any information storage and retrieval system, without permission in writing from the publisher. Notwithstanding, instructors are permitted to photocopy isolated articles for noncommercial classroom use without fee. (License No.: 10GA0019/12GB0052/13GB0056/17GB0034/18GB0034)


[Return to Top Page]

[Return to IEICE Web Page]


The Institute of Electronics, Information and Communication Engineers (IEICE), Japan