Information and Systems-Enriched Multimedia(Date:2022/07/19)

Presentation
Side-Channel Attacks on Post-Quantum KEMs Using Multi-class Classification Neural Network

Yutaro Tanaka(Tohoku Univ.),  Rei Ueno(Tohoku Univ.),  Keita Xagawa(NTT),  Akitra Ito(NTT),  Junko Takahashi(NTT),  Naofumi Homma(Tohoku Univ.),  

[Date]2022-07-19
[Paper #]ISEC2022-7,SITE2022-11,BioX2022-32,HWS2022-7,ICSS2022-15,EMM2022-15
Issues and Considerations for Improvement of Verification in ECDSA Attestation of Intel SGX

Yagawa Takashi(Tsukuba Univ.),  Suzaki Kuniyasu(AIST),  Teruya Tadanori(AIST),  Ohara Kazuma(AIST),  Abe Hirotake(Tsukuba Univ.),  

[Date]2022-07-19
[Paper #]ISEC2022-11,SITE2022-15,BioX2022-36,HWS2022-11,ICSS2022-19,EMM2022-19
Revisit of Non Profiled Side Channel Analysis via Deep Learning

Kentaro Imafuku(AIST),  Shinichi Kawamura(AIST),  Hanae Nozaki(AIST),  Junichi Sakamoto(AIST),  Saki Osuka(AIST),  

[Date]2022-07-19
[Paper #]ISEC2022-8,SITE2022-12,BioX2022-33,HWS2022-8,ICSS2022-16,EMM2022-16
Revealing PUF Responses by Differential Power Analysis against Reed-Muller-Code-based Fuzzy Extractor

Soma Watanabe(Ritsumeikan Univ),  Yuta Fukuda(Ritsumeikan Univ),  Tatsuya Oyama(Ritsumeikan Univ),  Kota Yoshida(Ritsumeikan Univ),  Takeshi Fujino(Ritsumeikan Univ),  

[Date]2022-07-19
[Paper #]ISEC2022-12,SITE2022-16,BioX2022-37,HWS2022-12,ICSS2022-20,EMM2022-20
Randomness evaluation of TERO-based TRNG with a side-channel attack countermeasure

Saki Osuka(AIST),  Daisuke Fujimoto(NAIST),  Yuichi Hayashi(NAIST),  Shinichi Kawamura(AIST),  

[Date]2022-07-19
[Paper #]ISEC2022-9,SITE2022-13,BioX2022-34,HWS2022-9,ICSS2022-17,EMM2022-17
Security Assessment and Countermeasures for Magnetic Malfunction of Electromagnetic Relays

Takumi Owada(YNU),  Kazuki Tachibana(YNU),  Tsutomu Matsumoto(YNU),  

[Date]2022-07-19
[Paper #]ISEC2022-14,SITE2022-18,BioX2022-39,HWS2022-14,ICSS2022-22,EMM2022-22
Security of Systems that Automatically Authenticate a User's Credentials and Location using Wireless Technology

Kazuki Tachibana(YNU),  Junichi Sakamoto(YNU),  Tsutomu Matsumoto(YNU),  

[Date]2022-07-19
[Paper #]ISEC2022-13,SITE2022-17,BioX2022-38,HWS2022-13,ICSS2022-21,EMM2022-21
Distance Spoofing Detection by LiDAR and Stereo Camera

Ataru Kubo(YNU),  Yuki Fukatsu(YNU),  Naoki Yoshida(YNU),  Tsutomu Matsumoto(YNU),  

[Date]2022-07-19
[Paper #]ISEC2022-15,SITE2022-19,BioX2022-40,HWS2022-15,ICSS2022-23,EMM2022-23
Security Evaluation of Cryptographic Circuits with Laser Sensors by Double-Spot Laser Irradiation

Masaki Chikano(YNU),  Naoki Yoshida(YNU),  Junichi Sakamoto(YNU),  Syungo Hayashi(YNU),  Tsutomu Matsumoto(YNU),  

[Date]2022-07-19
[Paper #]ISEC2022-16,SITE2022-20,BioX2022-41,HWS2022-16,ICSS2022-24,EMM2022-24
A Study for Predicting Correlation Power Analysis Results by Using High-SNR Plaintexts Selected Based on Linear Leakage Model

Masaki Himuro(Okayama Univ.),  Kengo Iokibe(Okayama Univ.),  Yoshitaka Toyota(Okayama Univ.),  

[Date]2022-07-19
[Paper #]ISEC2022-10,SITE2022-14,BioX2022-35,HWS2022-10,ICSS2022-18,EMM2022-18
Person Verification Using Evoked EEG by Ultrasound

Yuta Ishikawa(Tottori Univ.),  Kotaro Mukai(Tottori Univ.),  Isao Nakanishi(Tottori Univ.),  

[Date]2022-07-20
[Paper #]ISEC2022-18,SITE2022-22,BioX2022-43,HWS2022-18,ICSS2022-26,EMM2022-26
Person Verification Using EEG Evoked by Ultrasound

Kotaro Mukai(Tottori Univ.),  Isao Nakanishi(Tottori Univ.),  

[Date]2022-07-20
[Paper #]ISEC2022-19,SITE2022-23,BioX2022-44,HWS2022-19,ICSS2022-27,EMM2022-27
Investigation of credit card fraud model and deterrence method on SNS

Zhixian Zhao(JRI),  Shigeyuki Osada(JRI),  

[Date]2022-07-20
[Paper #]ISEC2022-22,SITE2022-26,BioX2022-47,HWS2022-22,ICSS2022-30,EMM2022-30
An Efficient Sparse Multiplication Algorithm For Pairing-Friendly Elliptic Curves With Cubic Twist

Daiki Hayashida(Mitsubishi Electric Corp.),  Kenichiro Hayasaka(Mitsubishi Electric Corp.),  Tadanori Teruya(AIST),  

[Date]2022-07-20
[Paper #]ISEC2022-26,SITE2022-30,BioX2022-51,HWS2022-26,ICSS2022-34,EMM2022-34
A Study on Biometric Modality for Continuous Authentication of Smart Devices

Yuka Watanabe(Kitakyushu Univ.),  Yasushi Yamazaki(Kitakyushu Univ.),  

[Date]2022-07-20
[Paper #]ISEC2022-20,SITE2022-24,BioX2022-45,HWS2022-20,ICSS2022-28,EMM2022-28
Person verification using evoked EEG from imperceptible vibratory stimulation

Hiroki Kobayashi(Tottori Univ.),  Hirotomo Nakashima(Tottori Univ.),  Isao Nakanishi(Tottori Univ.),  

[Date]2022-07-20
[Paper #]ISEC2022-21,SITE2022-25,BioX2022-46,HWS2022-21,ICSS2022-29,EMM2022-29
Cryptocurrency Analysis System for Investigating Cyber Crime Economy

Hiroshi Mori(DTCY),  Hiroshi Kumagai(DTCY),  Yin Minn Pa Pa(DTCY),  Yuta Takata(DTCY),  Ryoya Furukawa(DTCY),  Yuji Sakurai(DTCY),  Masaki Kamizono(DTCY),  

[Date]2022-07-20
[Paper #]ISEC2022-24,SITE2022-28,BioX2022-49,HWS2022-24,ICSS2022-32,EMM2022-32
Revocable Identity-Based Encryption With Multiple Private-Key Generators secure against Chosen Ciphertext Attacks and Decryption Key Exposure

Yudai Suzuki(Kanagawa Univ.),  Atsushi Fujioka(Kanagawa Univ.),  Taroh Sasaki(Kanagawa Univ.),  Akira Nagai(NTT),  

[Date]2022-07-20
[Paper #]ISEC2022-27,SITE2022-31,BioX2022-52,HWS2022-27,ICSS2022-35,EMM2022-35
Distributed Random Number Generation Method on Smart Contracts

Kentaro Sako(Waseda Univ),  Shin'ichiro Matsuo(Georgetown Univ),  Tatsuya Mori(Waseda Univ),  

[Date]2022-07-20
[Paper #]ISEC2022-25,SITE2022-29,BioX2022-50,HWS2022-25,ICSS2022-33,EMM2022-33
What type of document is CWA (CEN Workshop Agreement) in European Committee for Standardization

Takushi Otani(Kibi International Univ.),  

[Date]2022-07-20
[Paper #]
12>> 1-20hit(24hit)