Information and Systems-Information and Communication System Security(Date:2018/07/25)

Presentation
Chi-Squared Test for Independence Between Single Nucleotide Polymorphisms and Diseases Using Mis-operation Resistant Searchable Homomorphic Encryption

Keita Emura(NICT/JST),  Takuya Hayashi(NICT/JST),  Wenjie Lu(University of Tsukuba/JST CREST),  Shiho Moriai(NICT/JST),  Jun Sakuma(University of Tsukuba/JST CREST/RIKEN),  Yoshiji Yamada(Mie University/JST CREST),  

[Date]2018-07-25
[Paper #]ISEC2018-31,SITE2018-23,HWS2018-28,ICSS2018-34,EMM2018-30
Practice and Evaluation of Penetration Testing Exercises for Raising Cybersecurity Awareness

Daisuke Suzuki(Hokuriku Univ.),  

[Date]2018-07-25
[Paper #]ISEC2018-25,SITE2018-17,HWS2018-22,ICSS2018-28,EMM2018-24
On the integration of SCF-PEKS and PKE

Tatsuya Suzuki(Tokai Univ.),  Keita Emura(NICT),  Ohigashi Toshihiro(Tokai Univ.),  

[Date]2018-07-25
[Paper #]ISEC2018-16,SITE2018-8,HWS2018-13,ICSS2018-19,EMM2018-15
[Invited Talk] Memory Lower Bounds of Reductions Revisited (from EUROCRYPT 2018)

Yuyu Wang(Tokyo Tech/AIST/IOHK),  Takahiro Matsuda(AIST),  Goichiro Hanaoka(AIST),  Keisuke Tanaka(Tokyo Tech),  

[Date]2018-07-25
[Paper #]ISEC2018-24,SITE2018-16,HWS2018-21,ICSS2018-27,EMM2018-23
Extended Partial Key Exposure Attacks on RSA

Kaichi Suzuki(Univ. of Tokyo),  Atsushi Takayasu(Univ. of Tokyo),  Noboru Kunihiro(Univ. of Tokyo),  

[Date]2018-07-25
[Paper #]ISEC2018-29,SITE2018-21,HWS2018-26,ICSS2018-32,EMM2018-28
A Study on Public Wi-Fi Authentication Method with Anonymity and Traceability Using Blockchain

Tomoyuki Sanda(Kyoto Inst. of Tech.),  Hiroyuki Inaba(Kyoto Inst. of Tech.),  

[Date]2018-07-25
[Paper #]ISEC2018-26,SITE2018-18,HWS2018-23,ICSS2018-29,EMM2018-25
Application of the Singular Curve Point Decompression Attack to the Bitcoin Curve

Akira Takahashi(Kyoto Univ.),  Mehdi Tibouchi(NTT),  Masayuki Abe(NTT),  

[Date]2018-07-25
[Paper #]ISEC2018-28,SITE2018-20,HWS2018-25,ICSS2018-31,EMM2018-27
[Invited Talk] Obfustopia Built on Secret-Key Functional Encryption (from EUROCRYPT 2018)

Fuyuki Kitagawa(Tokyo Tech),  Ryo Nishimaki(NTT),  Keisuke Tanaka(Tokyo Tech),  

[Date]2018-07-25
[Paper #]ISEC2018-23,SITE2018-15,HWS2018-20,ICSS2018-26,EMM2018-22
[Invited Talk] Tightly-Secure Key-Encapsulation Mechanism in the Quantum Random Oracle Model (from EUROCRYPT 2018)

Tsunekazu Saito(NTT),  Keita Xagawa(NTT),  Takashi Yamakawa(NTT),  

[Date]2018-07-25
[Paper #]ISEC2018-22,SITE2018-14,HWS2018-19,ICSS2018-25,EMM2018-21
A design of interest-rate recordable cryptocurrency management program

Yusuke Kaneko(SMBC/JRI),  Shigeyuki Osada(JRI),  Shigeyuki Azuchi(HAW),  Hitoshi Okada(NII),  Shigeichiro Yamasaki(KINDAI Univ.),  

[Date]2018-07-25
[Paper #]ISEC2018-27,SITE2018-19,HWS2018-24,ICSS2018-30,EMM2018-26
Construction of Revocable HIBE with Adaptive Security

Atsushi Takayasu(Univ. Tokyo),  

[Date]2018-07-25
[Paper #]ISEC2018-14,SITE2018-6,HWS2018-11,ICSS2018-17,EMM2018-13
Code-Based Signature Scheme without Trapdoors

Partha Sarathi Roy(KDDI Research),  Kirill Morozov(Univ. of North Texas),  Kazuhide Fukushima(KDDI Research),  Shinsaku Kiyomoto(KDDI Research),  Tsuyoshi Takagi(Univ. of Tokyo),  

[Date]2018-07-25
[Paper #]ISEC2018-15,SITE2018-7,HWS2018-12,ICSS2018-18,EMM2018-14
Secure Multiparty Computation of Ranking Using a Deck of Cards

Ken Takashima(Tohoku Univ.),  Yuta Abe(Tohoku Univ.),  Tatsuya Sasaki(Tohoku Univ.),  Daiki Miyahara(Tohoku Univ.),  Kazumasa Shinagawa(Tokyo Inst. of Tech./AIST),  Takaaki Mizuki(Tohoku Univ.),  Hideaki Sone(Tohoku Univ.),  

[Date]2018-07-25
[Paper #]ISEC2018-30,SITE2018-22,HWS2018-27,ICSS2018-33,EMM2018-29
A Study on Amplitude Controlling Using Modulated Wave toward Countermeasure against Spoofing Attack on Ultrasonic Rangefinder

Daisuke Fujimoto(NAIST),  Yu-ichi Hayashi(NAIST),  

[Date]2018-07-25
[Paper #]ISEC2018-17,SITE2018-9,HWS2018-14,ICSS2018-20,EMM2018-16
A System for Evaluating Instrumentation Security of ToF Depth-Image Cameras against Pulse-light Spoofing

Satoru Sakurazawa(YNU),  Daisuke Fujimoto(YNU),  Tsutomu Matsumoto(YNU),  

[Date]2018-07-25
[Paper #]ISEC2018-18,SITE2018-10,HWS2018-15,ICSS2018-21,EMM2018-17
Immunity Evaluation of Cryptographic Devices using Gaussian Noise against IEMI Fault Injection

Takumi Okamoto(NAIST),  Daisuke Fujimoto(NAIST),  Yuichi Hayashi(NAIST),  Naofumi Homma(Tohoku Univ.),  Arthur Beckers(KU Leuven),  Josep Balasch(KU Leuven),  Benedikt Gierlichs(KU Leuven),  Ingrid Verbauwhede(KU Leuven),  

[Date]2018-07-25
[Paper #]ISEC2018-20,SITE2018-12,HWS2018-17,ICSS2018-23,EMM2018-19
How to Evaluate Instrumentation Security of Stereo Vision Cameras against DoS and Illusion Attacks

Naoki Yoshida(YNU),  Hiroki Nohira(YNU),  Yasushi Iwata(YNU),  Tsutomu Matsumoto(YNU),  

[Date]2018-07-25
[Paper #]ISEC2018-19,SITE2018-11,HWS2018-16,ICSS2018-22,EMM2018-18
Fundamental Study on Identification of EM Leakage Source of Audio Information from a Smart Device

Izumi Nishina(NAIST),  Daisuke Fujimoto(NAIST),  Masahiro Kinugawa(NIT),  Yu-ichi Hayashi(NAIST),  

[Date]2018-07-25
[Paper #]ISEC2018-21,SITE2018-13,HWS2018-18,ICSS2018-24,EMM2018-20
Truly Efficient Robust Secret Sharing for the Real World

Yohei Watanabe(UEC),  Kazuma Ohara(UEC/NEC),  Mitsugu Iwamoto(UEC),  Kazuo Ohta(UEC),  

[Date]2018-07-25
[Paper #]ISEC2018-13,SITE2018-5,HWS2018-10,ICSS2018-16,EMM2018-12
A New Embedding Method for Generalized LWE

Weiyao Wang(Univ. Tokyo),  Yuntao Wang(Univ. Tokyo),  Atsushi Takayasu(Univ. Tokyo),  Tsuyoshi Takagi(Univ. Tokyo),  

[Date]2018-07-26
[Paper #]ISEC2018-46,SITE2018-38,HWS2018-43,ICSS2018-49,EMM2018-45
12>> 1-20hit(37hit)