Engineering Sciences/NOLTA-Hardware Security(Date:2019/07/23)

Presentation
Video Watermarking Using Difference of Persistent Homology in Consecutive Frames

Takaya Kimura(KIT),  Hiroyuki Inaba(KIT),  

[Date]2019-07-23
[Paper #]ISEC2019-33,SITE2019-27,BioX2019-25,HWS2019-28,ICSS2019-31,EMM2019-36
Evaluation of Similarity Calculation Methods for Image Clustering based on PRNU Noise

Mai Uchida(UoA),  Yoichi Tomioka(UoA),  

[Date]2019-07-23
[Paper #]ISEC2019-17,SITE2019-11,BioX2019-9,HWS2019-12,ICSS2019-15,EMM2019-20
Proposal and Implementation of Password Reminder System for Partial Forgetting

Ryota Hosoda(KIT),  Hiroyuki Inaba(KIT),  

[Date]2019-07-23
[Paper #]ISEC2019-31,SITE2019-25,BioX2019-23,HWS2019-26,ICSS2019-29,EMM2019-34
Development of 2,400ppi fingerprint sensor for capturing neonate fingerprint within 24 hours after Birth

Yoshinori Koda(Tohoku Univ.),  Ai Takahashi(Tohoku Univ.),  Koichi Ito(Tohoku Univ.),  Takafumi Aoki(Tohoku Univ.),  

[Date]2019-07-23
[Paper #]ISEC2019-18,SITE2019-12,BioX2019-10,HWS2019-13,ICSS2019-16,EMM2019-21
A simulation of a 3-D visual cryptography using holography

Takumi Takazawa(Kochi Univ.),  Kazuhiro Suzuki(Kochi Univ.),  Naoki Takada(Kochi Univ.),  

[Date]2019-07-23
[Paper #]ISEC2019-34,SITE2019-28,BioX2019-26,HWS2019-29,ICSS2019-32,EMM2019-37
New Quantum Algorithms for Modular Inverse and Their Application on the Elliptic Curve Discrete Logarithm Problem

Ryo Kurama(Univ. of Tokyo),  Noboru Kunihiro(Tsukuba Univ.),  

[Date]2019-07-23
[Paper #]ISEC2019-24,SITE2019-18,BioX2019-16,HWS2019-19,ICSS2019-22,EMM2019-27
Proposal of Spam Filter by Applying Neural Network for Mitigating Catastrophic Forgetting

Shuiti Kawahara(KIT),  Lu Chen(KIT),  Hiroyuki Inaba(KIT),  

[Date]2019-07-23
[Paper #]ISEC2019-32,SITE2019-26,BioX2019-24,HWS2019-27,ICSS2019-30,EMM2019-35
A Formal Approach to Verifying Trojan-freeness of Cryptographic Circuits Based on Galois-Field Arithmetic

Akira Ito(Tohoku Univ.),  Rei Ueno(Tohoku Univ.),  Naofumi Homma(Tohoku Univ.),  

[Date]2019-07-23
[Paper #]ISEC2019-26,SITE2019-20,BioX2019-18,HWS2019-21,ICSS2019-24,EMM2019-29
A Revocable Group Signature Scheme with Strong Anonymity for Crowdsensing

Yuto Nakazawa(Hiroshima Univ.),  Toru Nakanishi(Hiroshima Univ.),  

[Date]2019-07-23
[Paper #]ISEC2019-22,SITE2019-16,BioX2019-14,HWS2019-17,ICSS2019-20,EMM2019-25
An Approach to Attack Scenario Generation for Simulation of Targeted Attacks

Yusuke Takahashi(NEC),  Shigeyoshi Shima(NEC),  Atsunori Naito(NEC),  Rui Tanabe(YNU),  Katsunari Yoshioka(YNU),  

[Date]2019-07-23
[Paper #]ISEC2019-13,SITE2019-7,BioX2019-5,HWS2019-8,ICSS2019-11,EMM2019-16
Implementation of gathering system configuration and design vulnerability assessment for zero-day attack countermeasure using vulnerability information

Motoki Kusume(Kagawa Univ.),  Koji Kida(Kagawa Univ.),  Keizo Saisho(Kagawa Univ.),  

[Date]2019-07-23
[Paper #]ISEC2019-12,SITE2019-6,BioX2019-4,HWS2019-7,ICSS2019-10,EMM2019-15
Generic Even-Mansour Construction Based on Group Actions

Hector Hougaard(Graduate School of Engineering, Osaka Univ.),  Chen-Mou Cheng(Graduate School of Engineering, Osaka Univ.),  Miyaji Atsuko(Graduate School of Engineering, Osaka Univ.),  

[Date]2019-07-23
[Paper #]ISEC2019-37,SITE2019-31,BioX2019-29,HWS2019-32,ICSS2019-35,EMM2019-40
A method of giving trust to users in Bitcoin

Asuka Suzuki(Tsukuba Univ.),  Teppei Sato(Tsukuba Univ.),  Omote Kazumasa(Tsukuba Univ./NICT),  

[Date]2019-07-23
[Paper #]ISEC2019-16,SITE2019-10,BioX2019-8,HWS2019-11,ICSS2019-14,EMM2019-19
Constructing More Efficient Lattice-based Revocable IBE with Adaptive Security

Atsushi Takayasu(Univ. Tokyo),  

[Date]2019-07-23
[Paper #]ISEC2019-21,SITE2019-15,BioX2019-13,HWS2019-16,ICSS2019-19,EMM2019-24
Side-channel leakage evaluation of cryptographic module by IC chip level consumption simulation

Kazuki Yasuda(Kobe Univ.),  Kazuki Monta(Kobe Univ.),  Akihiro Tsukioka(Kobe Univ.),  Noriyuki Miura(Kobe Univ.),  Makoto Nagata(Kobe Univ.),  

[Date]2019-07-23
[Paper #]ISEC2019-27,SITE2019-21,BioX2019-19,HWS2019-22,ICSS2019-25,EMM2019-30
Attribute-Based Group Signatures for Revocable Members

Maharage Nisansala Sevwandi Perera(ATR),  Toru Nakamura(ATR),  Masayuki Hashimoto(ATR),  Hiroyuki Yokoyama(ATR),  

[Date]2019-07-23
[Paper #]ISEC2019-25,SITE2019-19,BioX2019-17,HWS2019-20,ICSS2019-23,EMM2019-28
Side Channel Security of an FPGA Pairing Implementation with Pipelined Modular Multiplier

Mitsufumi Yamazaki(YNU),  Junichi Sakamoto(YNU),  Yuta Okuaki(YNU),  Tsutomu Matsumoto(YNU),  

[Date]2019-07-23
[Paper #]ISEC2019-29,SITE2019-23,BioX2019-21,HWS2019-24,ICSS2019-27,EMM2019-32
An FPGA Implementation of Aggregate Signature Schemes with Pipelined Modular Multiplier

Yota Okuaki(YNU),  Junichi Sakamoto(YNU),  Daisuke Fujimoto(YNU),  Tsutomu Matsumoto(YNU),  

[Date]2019-07-23
[Paper #]ISEC2019-30,SITE2019-24,BioX2019-22,HWS2019-25,ICSS2019-28,EMM2019-33
Profiling of malicious users towards honeypot installation in the blockchain network

Kazuki Hara(Tsukuba Univ.),  Teppei Sato(Tsukuba Univ.),  Mitsuyoshi Imamura(Tsukuba Univ.),  Kazumasa Omote(Tsukuba Univ./NICT),  

[Date]2019-07-23
[Paper #]ISEC2019-14,SITE2019-8,BioX2019-6,HWS2019-9,ICSS2019-12,EMM2019-17
Risk analysis of zero downtime mechanism by dispersibility in blockchain technology

Wataru Taguchi(Tsukuba Univ.),  Mitsuyoshi Imamura(Tsukuba Univ.),  Kazumasa Omote(uba Univ./NICT),  

[Date]2019-07-23
[Paper #]ISEC2019-15,SITE2019-9,BioX2019-7,HWS2019-10,ICSS2019-13,EMM2019-18
123>> 1-20hit(50hit)