Engineering Sciences/NOLTA-Information Security(Date:2021/07/19)

Presentation
Evaluation on Biometric Template Protection System Based on Somewhat Homomorphic Encryption

Hiroto Tamiya(NEC),  Toshiyuki Isshiki(NEC),  Kengo Mori(NEC),  Satoshi Obana(Hosei Univ.),  Tetsushi Ohki(Shizuoka Univ.),  

[Date]2021-07-19
[Paper #]ISEC2021-21,SITE2021-15,BioX2021-22,HWS2021-21,ICSS2021-26,EMM2021-26
Fundamental Study on Acceleration of Inversion using Binary Extended Euclidean Algorithm for Pairing Computation in RNS Representation

Kota Morimoto(NAIST),  Daisuke Fujimoto(NAIST),  Saki Osuka(NAIST),  Shinichi Kawamura(AIST),  Tadanori Teruya(AIST),  Yuichi hayashi(NAIST),  

[Date]2021-07-19
[Paper #]ISEC2021-10,SITE2021-4,BioX2021-11,HWS2021-10,ICSS2021-15,EMM2021-15
A Website Fingerprinting Attack Based on the Virtual Memory of the Process on Android Devices

Tatsuya Okazaki(Keio Univ.),  Hiroya Kato(Keio Univ.),  Shuichiro Haruta(Keio Univ.),  Iwao Sasase(Keio Univ.),  

[Date]2021-07-19
[Paper #]ISEC2021-13,SITE2021-7,BioX2021-14,HWS2021-13,ICSS2021-18,EMM2021-18
Rogue Access Point Detection by Using ARP Failure under the MAC Address Duplication

Kosuke Igarashi(Keio Univ.),  Hiroya Kato(Keio Univ.),  Iwao Sasase(Keio Univ.),  

[Date]2021-07-19
[Paper #]ISEC2021-14,SITE2021-8,BioX2021-15,HWS2021-14,ICSS2021-19,EMM2021-19
Memory-saving implementation of BLS12-381 Pairing-based cryptography

Riku Anzai(YNU),  Junichi Sakamoto(YNU),  Zihao Song(YNU),  Naoki Yoshida(YNU),  Tsutomu Matsumoto(YNU),  

[Date]2021-07-19
[Paper #]ISEC2021-11,SITE2021-5,BioX2021-12,HWS2021-11,ICSS2021-16,EMM2021-16
[Invited Talk] Cyber security of the Open University of Japan's courses of literacy in mathematical aspects, data science, and AI

Takeo Tatsumi(Open Univ. Japan),  

[Date]2021-07-19
[Paper #]ISEC2021-17,SITE2021-11,BioX2021-18,HWS2021-17,ICSS2021-22,EMM2021-22
[Invited Talk] Ethics of AI and Its Education

Minao Kukita(Nagoya Univ.),  

[Date]2021-07-19
[Paper #]ISEC2021-18,SITE2021-12,BioX2021-19,HWS2021-18,ICSS2021-23,EMM2021-23
[Invited Talk] ELSI in Data Science

Yuko Murakami(Rikkyo U),  

[Date]2021-07-19
[Paper #]ISEC2021-16,SITE2021-10,BioX2021-17,HWS2021-16,ICSS2021-21,EMM2021-21
[Invited Talk] Law and Ethics on data science

Naonori Kato(KDDI Research/RIKEN),  

[Date]2021-07-19
[Paper #]
Fake Command Attack Detection of industrial Control System with SVM

Yuki Harada(TUT),  Yuichi Futa(TUT),  Hiroyuki Okazaki(Shinshu Univ.),  

[Date]2021-07-19
[Paper #]ISEC2021-15,SITE2021-9,BioX2021-16,HWS2021-15,ICSS2021-20,EMM2021-20
Design of Fp2 Multiplier Datapath Based on Parallelized QP Montgomery Multiplication for Application to Isogeny-based Cryptography

Rei Ueno(Tohoku Univ./JST PRESTO),  Naofumi Homma(Tohoku Univ.),  

[Date]2021-07-19
[Paper #]ISEC2021-12,SITE2021-6,BioX2021-13,HWS2021-12,ICSS2021-17,EMM2021-17
[Invited Talk] Data science practice from a legal and ethical perspective

Soichiro Morishita(CA),  

[Date]2021-07-19
[Paper #]ISEC2021-19,SITE2021-13,BioX2021-20,HWS2021-19,ICSS2021-24,EMM2021-24
Consideration on hybrid security of authenticated key exchange FSXY

Takeru Kawaguchi(Kanagawa Univ.),  Seijuro Suzuki(Kanagawa Univ.),  Atushi Fujioka(Kanagawa Univ.),  Taro Sasaki(Kanagawa Univ.),  

[Date]2021-07-19
[Paper #]ISEC2021-20,SITE2021-14,BioX2021-21,HWS2021-20,ICSS2021-25,EMM2021-25
Computer experiment evaluation for time variance of virtual currency mining using cryptographic hash function

Kei Ikebe(Kyushu Univ.),  Kouichi Sakurai(Kyushu Univ.),  

[Date]2021-07-20
[Paper #]ISEC2021-36,SITE2021-30,BioX2021-37,HWS2021-36,ICSS2021-41,EMM2021-41
Twitterで収集されたAndroidアプリのアクセシビリティサービスの利用率とAPI Levelの分析

,  ,  ,  ,  

[Date]2021-07-20
[Paper #]ISEC2021-33,SITE2021-27,BioX2021-34,HWS2021-33,ICSS2021-38,EMM2021-38
Implimentation of RISC-V TEE using PUF as Root of Trust

Kota Yoshida(Ritsumeikan Univ.),  Kuniyasu Suzaki(AIST),  Takeshi Fujino(Ritsumeikan Univ.),  

[Date]2021-07-20
[Paper #]ISEC2021-25,SITE2021-19,BioX2021-26,HWS2021-25,ICSS2021-30,EMM2021-30
Security Risk Considerations in NFT Reliability

Keigo Kimura(Tsukuba Univ.),  Mitsuyoshi Imamura(Nomura Asset Management),  Kazumasa Omote(Tsukuba Univ.),  

[Date]2021-07-20
[Paper #]ISEC2021-30,SITE2021-24,BioX2021-31,HWS2021-30,ICSS2021-35,EMM2021-35
Evaluation of TRNG Using CMOS Image Sensor

Hayato Tatsuno(Ritsumeikan Univ.),  Tatsuya Oyama(Ritsumeikan Univ.),  Masayoshi Shirahata(Ritsumeikan Univ.),  Shunsuke Okura(Ritsumeikan Univ.),  Takeshi Fujino(Ritsumeikan Univ.),  

[Date]2021-07-20
[Paper #]ISEC2021-26,SITE2021-20,BioX2021-27,HWS2021-26,ICSS2021-31,EMM2021-31
A Study Toward Practical Use of "Emergency Button" Which Enables Crypto Asset Evacuation When Key Loss

Natsume Matsuzaki(Univ. of Nagasaki),  Yoshihiro Kita(Univ. of Nagasaki),  

[Date]2021-07-20
[Paper #]ISEC2021-28,SITE2021-22,BioX2021-29,HWS2021-28,ICSS2021-33,EMM2021-33
International regulatory trend survey report on AI

Naonori Kato(KDDI Research/RIKEN),  Masato Suzuki(Niigata Univ./RIKEN),  Yoichiro Itakura(Hikari Sogoh Law Offices/RIKEN),  Yosuke Murakami(KDDI Research),  Katsutoshi Hanahara(KDDI Research),  

[Date]2021-07-20
[Paper #]ISEC2021-40,SITE2021-34,BioX2021-41,HWS2021-40,ICSS2021-45,EMM2021-45
12>> 1-20hit(32hit)