Engineering Sciences/NOLTA-Information Security(Date:2023/11/09)

Presentation
Private-preserving encoding and decoding using variable-length coding schemes

Yuki Seto(UTokyo),  Kunihiko Sadakane(UTokyo),  Kazunari Tozawa(UTokyo),  

[Date]2023-11-09
[Paper #]ISEC2023-55,SITE2023-49,LOIS2023-13
Improving Triple Sieve Algorithm on Ideal Lattice

Seishiro Terada(Osaka Univ.),  Yuntao Wang(Osaka Univ.),  Atsuko Miyaji(Osaka Univ.),  

[Date]2023-11-09
[Paper #]ISEC2023-59,SITE2023-53,LOIS2023-17
An Optimization Method for Share Reconstruction in (k,n)-Threshold Secret Sharing Scheme Using Exclusive-OR

Shogo Naganuma(CIT),  Yutaro Taki(CIT),  Shigeru Fujita(CIT),  

[Date]2023-11-09
[Paper #]ISEC2023-56,SITE2023-50,LOIS2023-14
Report of IEEE ISTAS 2023

Yusuke Kaneko(JRI),  

[Date]2023-11-09
[Paper #]ISEC2023-60,SITE2023-54,LOIS2023-18
[Invited Talk] Security Technologies to Improve Content-Distribution and Broadcasting Services

Kazuto Ogawa(NICT),  

[Date]2023-11-09
[Paper #]ISEC2023-54,SITE2023-48,LOIS2023-12
Study on Characteristic Words in Phishing Scam Emails through Text Mining

Yukio Shimamoto(IISEC),  Atsuhiro Goto(IISEC),  

[Date]2023-11-09
[Paper #]ISEC2023-58,SITE2023-52,LOIS2023-16
[Invited Talk] What Relationship can "Ethics of Conversations and Social Interactions" Have with "Information Ethics"?

Masahiko Mizutani(Kyoto Univ.),  

[Date]2023-11-09
[Paper #]
[Invited Talk] Comment to the invited lecture"Being Together: Ethics of Conversations and Social Interactions"

Yusuke Nagato(Osaka Univ.),  

[Date]2023-11-09
[Paper #]
Harm Caused by Databases

Nobuyuki Yoshinaga,  

[Date]2023-11-09
[Paper #]ISEC2023-61,SITE2023-55,LOIS2023-19
Optimum Median-Sum Fingerprinting for Winternitz One-Time Signature

Motonari Honda(NU),  Yuichi Kaji(NU),  

[Date]2023-11-09
[Paper #]ISEC2023-57,SITE2023-51,LOIS2023-15
Improvements for Enhancing the Reliability of NFTs

Yasushi Nakayama(SBI FERI),  

[Date]2023-11-10
[Paper #]ISEC2023-72,SITE2023-66,LOIS2023-30
Zero-Knowledge Proofs for ownership of Deep Neural Network

Shungo Sato(NDA),  Hidema Tanaka(NDA),  

[Date]2023-11-10
[Paper #]ISEC2023-67,SITE2023-61,LOIS2023-25
A Study on Side-Channel Attacks for Unrolled Implementation of Block Ciphers

Teppei Higashi(Tohoku Univ),  Rei Ueno(Tohoku Univ),  Naofumi Homma(Tohoku Univ),  

[Date]2023-11-10
[Paper #]ISEC2023-69,SITE2023-63,LOIS2023-27
Proof-of-Concept and Discussion of Self-Management and Utilization of Personal Data in Broadcast Media Services

Chigusa Yamamura(NHK),  Takumi Mouri(NHK),  Yasuhiro Murasaki(NHK),  Satoshi Fujitsu(NHK),  Kinji Matsumura(NHK),  

[Date]2023-11-10
[Paper #]ISEC2023-62,SITE2023-56,LOIS2023-20
Side-Channel Security Evaluation of ASCON Implementation

Daisuke Iwasa(Tohoku University),  Rei Ueno(Tohoku University),  Kazuhide Fukushima(KDDI Research, Inc.),  Naofumi Homma(Tohoku University),  

[Date]2023-11-10
[Paper #]ISEC2023-68,SITE2023-62,LOIS2023-26
NTP Tunneling Threat Model Verification and Countermeasure

Shinjisangeru Sugasawa(CIT),  Hisayoshi Kunimune(CIT),  Shigeaki Tanimoto(CIT),  

[Date]2023-11-10
[Paper #]ISEC2023-64,SITE2023-58,LOIS2023-22
Transaction Access Control Using ERC7303 and Its Applications

Ko Fujimura(Otsuma Women's Univ.),  

[Date]2023-11-10
[Paper #]ISEC2023-63,SITE2023-57,LOIS2023-21
A Proposed Link Key Hijacking Attack Using the Power-Saving Mode against Bluetooth BR/EDR

Keiichiro Kimura(Kobe Univ.),  Hiroki Kuzuno(Kobe Univ.),  Yoshiaki Shiraishi(Kobe Univ.),  Masakatu Morii(Kobe Univ.),  

[Date]2023-11-10
[Paper #]ISEC2023-70,SITE2023-64,LOIS2023-28
A Legally Regulatable Stablecoin on a Public Blockchain

Hayato Shimamura(Kindai Univ.),  Shigeichiro Yamasaki(Kindai Univ.),  

[Date]2023-11-10
[Paper #]ISEC2023-73,SITE2023-67,LOIS2023-31
Secure Identity-Based Authenticated Key Exchange with Multiple Private Key Generators against Malicious Generators

Kazuma Wariki(Kanagawa Univ.),  Atsushi Fujioka(Kanagawa Univ.),  Akira Nagai(NTT),  Kan Yasuda(NTT),  

[Date]2023-11-10
[Paper #]ISEC2023-66,SITE2023-60,LOIS2023-24
12>> 1-20hit(22hit)