Engineering Sciences/NOLTA-Biometrics(Date:2023/07/24)

Presentation
A Random Ensemble Method with Encrypted Models for Improving Robustness against Adversarial Examples

Ryota Iijima(Tokyo Metro. Univ.),  Miki Tanaka(Tokyo Metro. Univ.),  Sayaka Shiota(Tokyo Metro. Univ.),  Hitoshi Kiya(Tokyo Metro. Univ.),  

[Date]2023-07-24
[Paper #]ISEC2023-27,SITE2023-21,BioX2023-30,HWS2023-27,ICSS2023-24,EMM2023-27
A Generic Construction of Outsider Anonymous Broadcast Encryption with Keyword Search

Keita Emura(NICT),  Kaisei Kajita(NHK),  Go Ohtake(NHK),  

[Date]2023-07-24
[Paper #]ISEC2023-22,SITE2023-16,BioX2023-25,HWS2023-22,ICSS2023-19,EMM2023-22
Statistical Secret Key Recovery Attack Against the Peregrine Lattice-Based Signature Scheme

Moeto Suzuki(Kyoto Univ.),  Xiuhan Lin(Shandong Univ.),  Shiduo Zhang(Tsinghua Univ.),  Thomas Espitau(PQShield),  Yang Yu(Tsinghua Univ.),  Mehdi Tibouchi(NTT),  Masayuki Abe(NTT),  

[Date]2023-07-24
[Paper #]ISEC2023-30,SITE2023-24,BioX2023-33,HWS2023-30,ICSS2023-27,EMM2023-30
Hierarchical Identity-based Matchmaking Encryption

Sohto Chiku(YNU),  Keisuke Hara(AIST/YNU),  Junji Shikata(YNU),  

[Date]2023-07-24
[Paper #]ISEC2023-23,SITE2023-17,BioX2023-26,HWS2023-23,ICSS2023-20,EMM2023-23
Implementation of Shor's algorithm for the discrete logarithm problem and experiments using the quantum computer simulator

Kaito Kishi(Fujitsu Research),  Junpei Yamaguchi(Fujitsu Research),  Tetsuya Izu(Fujitsu Research),  Noboru Kunihiro(Univ. of Tsukuba),  

[Date]2023-07-24
[Paper #]ISEC2023-32,SITE2023-26,BioX2023-35,HWS2023-32,ICSS2023-29,EMM2023-32
Note on the Robustness of Single Sign-On Algorithm Based on Verifiable Encryption

Chihiro Okubo(TUS),  Satoshi Iriyama(TUS),  Maki Kihara(TUS),  

[Date]2023-07-24
[Paper #]ISEC2023-24,SITE2023-18,BioX2023-27,HWS2023-24,ICSS2023-21,EMM2023-24
A Multiple Vantage Point-based Concept for Open-Source Information Space Awareness

Blumbergs Bernhards(NAIST),  

[Date]2023-07-24
[Paper #]ISEC2023-34,SITE2023-28,BioX2023-37,HWS2023-34,ICSS2023-31,EMM2023-34
Tolerance Evaluation Cost Reduction of Deep-Learning-Based Side-Channel Attack Using Signal-to-Noise Ratio of Leakage Traces

Tatsuya Sakagami(Okayama Univ.),  Masaki Himuro(Okayama Univ.),  Kengo Iokibe(Okayama Univ.),  Yoshitaka Toyota(Okayama Univ.),  

[Date]2023-07-24
[Paper #]ISEC2023-17,SITE2023-11,BioX2023-20,HWS2023-17,ICSS2023-14,EMM2023-17
Analysis of Snort's impact due to DDoS attacks

Kano Yuki(TUT),  Yuichi Futa(TUT),  Okazaki Hiroyuki(SHINSYU UNIVERSITY),  Suzuki Hikofumi(SHINSYU UNIVERSITY),  

[Date]2023-07-24
[Paper #]ISEC2023-33,SITE2023-27,BioX2023-36,HWS2023-33,ICSS2023-30,EMM2023-33
Improving Non-profiled DL-based Side-Channel Attack Using Multiple Partial Key Difference Estimation

Rikuma Tanaka(Tohoku Univ.),  Rei Ueno(Tohoku Univ.),  Akira Ito(NTT),  Naofumi Homma(Tohoku Univ.),  

[Date]2023-07-24
[Paper #]ISEC2023-16,SITE2023-10,BioX2023-19,HWS2023-16,ICSS2023-13,EMM2023-16
Estimation of rotation angle using pilot signal for image watermarking

Rinka Kawano(Yamaguchi Univ.),  Masaki Kawamura(Yamaguchi Univ.),  

[Date]2023-07-24
[Paper #]ISEC2023-26,SITE2023-20,BioX2023-29,HWS2023-26,ICSS2023-23,EMM2023-26
Analysis of effective attribute values on risk-based authentication with browser fingerprint

Takashi Tsukazaki(TUT),  Yuichi Futa(TUT),  Hiroyuki Okazaki(Shinshu Univ.),  Hikofumi Suzuki(Shinshu Univ.),  

[Date]2023-07-24
[Paper #]ISEC2023-19,SITE2023-13,BioX2023-22,HWS2023-19,ICSS2023-16,EMM2023-19
An Identity-based Signature Scheme with Tight Security Reduction

Jiawei Chen(YNU),  Hyungrok Jo(YNU),  Shingo Sato(YNU),  Junji Shikata(YNU),  

[Date]2023-07-24
[Paper #]ISEC2023-29,SITE2023-23,BioX2023-32,HWS2023-29,ICSS2023-26,EMM2023-29
Novel Image authentication scheme using error correction code and digital signature

Ken-ichi Sakina(QRTechnology),  

[Date]2023-07-24
[Paper #]ISEC2023-28,SITE2023-22,BioX2023-31,HWS2023-28,ICSS2023-25,EMM2023-28
A security analysis on MQ-Sign submitted to Korean Post-Quantum Cryptography standardization

Yasuhiko Ikematsu(Kyushu Univ.),  Hyungrok Jo(YNU),  Takanori Yasuda(OUS),  

[Date]2023-07-24
[Paper #]ISEC2023-31,SITE2023-25,BioX2023-34,HWS2023-31,ICSS2023-28,EMM2023-31
Non-profiled Side-channel Attacks by using Clustering Scores in Deep Learning model (1)

Mizuki Nagahisa(Ristumei Univ),  Fukuda Yuta(Ristumei Univ),  Yoshida Kota(Ristumei Univ),  Fujino Takeshi(Ristumei Univ),  

[Date]2023-07-24
[Paper #]ISEC2023-14,SITE2023-8,BioX2023-17,HWS2023-14,ICSS2023-11,EMM2023-14
Non-profiled Side-Channel Attacks by using Clustering Scores in Deep Learning model (2)

Yuta Fukuda(Ritsumeikan Univ.),  Kota Yoshida(Ritsumeikan Univ.),  Takeshi Fujino(Ritsumeikan Univ.),  

[Date]2023-07-24
[Paper #]ISEC2023-15,SITE2023-9,BioX2023-18,HWS2023-15,ICSS2023-12,EMM2023-15
International regulatory trend survey report on AI

Naonori Kato(KDDI Research/NFI/RIKEN),  Yosuke Murakami(KDDI Research),  Minoru Kozu(KDDI Research),  

[Date]2023-07-24
[Paper #]ISEC2023-20,SITE2023-14,BioX2023-23,HWS2023-20,ICSS2023-17,EMM2023-20
Key Generation by Secure Computation of ID-NIKS based on Discrete Logarithm Problem over Composite Modulus

Hayato Inoue(OECU),  Mizuki Miki(OECU),  Yasuyuki Murakami(OECU),  

[Date]2023-07-24
[Paper #]ISEC2023-21,SITE2023-15,BioX2023-24,HWS2023-21,ICSS2023-18,EMM2023-21
Threshold ring signature based on isogeny

Naho Isogai(TUT),  Takeshi Nakai(TUT),  Koutarou Suzuki(TUT),  

[Date]2023-07-24
[Paper #]ISEC2023-25,SITE2023-19,BioX2023-28,HWS2023-25,ICSS2023-22,EMM2023-25
123>> 1-20hit(43hit)