Committee |
Date Time |
Place |
Paper Title / Authors |
Abstract |
Paper # |
ICSS |
2023-11-16 13:00 |
Ishikawa |
IT Business Plaza Musashi and Online (Primary: On-site, Secondary: Online) |
Implementation of Dynamic Secure Network for Traffic and Logistics with Supermassive and Supervarious Mobilities, and A Study on Its Large-scale Demonstration Masaru Takeuchi, Toshiaki Saisho, Junji Shikata (JDC), Toshio Sato, Kazue Sako, Jiro Katto, Takuro Sato (WU) ICSS2023-51 |
In the era of Beyond 5G/6G, effective use of space-time is expected by cooperative operation of a large number and varie... [more] |
ICSS2023-51 pp.1-6 |
HWS, ICD |
2022-10-25 16:15 |
Shiga |
(Primary: On-site, Secondary: Online) |
Design and Implementation of Payload Encryption and MAC for CAN Communication Using Lightweight Encryption SIMON Tomoya Tsuboi, Yuta Kodera, Yasuyuki Nogami, Takuya Kusaka (Okayama Univ) HWS2022-41 ICD2022-33 |
CAN, which is widely used for in-vehicle networks, is a low-cost and efficient connection between electronic control uni... [more] |
HWS2022-41 ICD2022-33 pp.64-69 |
ISEC |
2022-05-18 15:35 |
Online |
Online |
[Invited Talk]
Forward Secure Message Franking (from ICISC 2021) Hiroki Yamamuro (Tokyo Tech), Keisuke Hara (AIST/YNU), Masayuki Tezuka (NIT, Tsuruoka College), Yusuke Yoshida, Keisuke Tanaka (Tokyo Tech) ISEC2022-5 |
Message franking is introduced by Facebook in end-to-end encrypted messaging services.
It allows to produce verifiable... [more] |
ISEC2022-5 p.20 |
IT, ISEC, RCC, WBS |
2022-03-11 11:10 |
Online |
Online |
Corruption-Correctable Message Authentication Code Isamu Furuya, Akiko Inoue, Kazuhiko Minematsu (NEC) IT2021-114 ISEC2021-79 WBS2021-82 RCC2021-89 |
We propose correction correctable MAC, which enables to verify data integrity and to correct corruptions of the data.
A... [more] |
IT2021-114 ISEC2021-79 WBS2021-82 RCC2021-89 pp.180-187 |
ISEC, IT, WBS |
2020-03-11 10:45 |
Hyogo |
University of Hyogo (Cancelled but technical report was issued) |
A Remark on Improving Aggregate Message Authentication Codes with Detecting Functionality Lu Cao, Shingo Sato, Junji Shikata (Yokohama National Univ.) IT2019-111 ISEC2019-107 WBS2019-60 |
An aggregate message authentication code (AMAC) can compress multiple MAC tags into a short aggregate tag. An aggregate ... [more] |
IT2019-111 ISEC2019-107 WBS2019-60 pp.143-150 |
HWS |
2019-04-12 14:20 |
Miyagi |
Tohoku University |
Design of Unified Hardware Architecture for GF-Arithmetic Authenticated Encryption Schemes Shotaro Sawataishi, Rei Ueno, Naofumi Homma (Tohoku Univ.) HWS2019-3 |
This paper presents an efficient unified hardware for several authenticated encryption schemes based on Galois-field (GF... [more] |
HWS2019-3 pp.13-18 |
ISEC |
2018-09-07 11:30 |
Tokyo |
Kikai-Shinko-Kaikan Bldg. |
[Invited Talk]
Encrypt or Decrypt? To Make a Single-Key Beyond Birthday Secure Nonce-Based MAC (from CRYPTO 2018) Kan Yasuda (NTT) ISEC2018-55 |
In this talk we explain the content of “Encrypt or Decrypt? To Make a Single-Key Beyond Birthday Secure Nonce-Based MAC... [more] |
ISEC2018-55 p.27 |
ISEC |
2018-05-16 15:15 |
Tokyo |
Ookayama Campus, Tokyo Institute of Technology |
Consideration of Dynamic Operation in Secure Cloud Storage based on Network Coding Shun Watanabe (Univ. of Tsukuba), Tran Phon Thao (KDDI Labs), Kazumasa Omote (Univ. of Tsukuba) ISEC2018-9 |
In ISEC(July, 2017), we presented a method of lightweight data auditing and data repairing based POR(Proof of Retrievabi... [more] |
ISEC2018-9 pp.51-57 |
SITE, EMM, ISEC, ICSS, IPSJ-CSEC, IPSJ-SPT [detail] |
2017-07-15 14:40 |
Tokyo |
|
Proof Of Retrievability for Lightweight Secure Cloud Storage Tran Phon Thao (KDDI Labs), Kazumasa Omote (Univ. of Tsukuba) ISEC2017-38 SITE2017-30 ICSS2017-37 EMM2017-41 |
Cloud storage has been gaining in popularity as an on-line service for archiving or backup. However, due to the data out... [more] |
ISEC2017-38 SITE2017-30 ICSS2017-37 EMM2017-41 pp.281-288 |
USN, IPSJ-UBI |
2008-07-17 09:30 |
Tokyo |
Tokyo Denki University (Tokyo) |
A Scalable Server Data Authentication Scheme for Sensor Networks Jun Noda (NEC), Yuichi Kaji (NAIST), Toshiyasu Nakao (NEC) USN2008-11 |
We propose a new server data authentication scheme for sensor networks. Data authentication is a basic technology to det... [more] |
USN2008-11 pp.1-6 |