IWSEC Best Paper Award/IWSEC Best Student Paper Award/IWSEC Best Poster Award
IWSEC (International Workshop on Security) is organized by ISEC of IEICE and CSEC of IPSJ. The details have been shown in IWSEC Web Pages.IWSEC Best Paper Award
詳細を表示
Year | Authors | Title |
---|---|---|
2023 | Miguel Ambrona, Marc Beunardeau, Anne-Laure Schmitt and Raphael Toledo | aPlonK : Aggregated PlonK from Multi-Polynomial Commitment Schemes |
2022 | Hanno Becker, Vincent Hwang, Matthias J. Kannwischer, Lorenz Panny and Bo-Yin Yang | Efficient Multiplication of Somewhat Small Integers using Number-Theoretic Transforms |
2021 | Yasufumi Hashimoto | Solving the Problem of Blockwise Isomorphism of Polynomials with Circulant Matrices |
Hiroki Kuzuno and Toshihiro Yamauchi | KPRM: Kernel Page Restriction Mechanism to Prevent Kernel Memory Corruption | |
2020 | Kota Sasaki and Koji Nuida | Efficiency and Accuracy Improvements of Secure Floating-Point Addition over Secret Sharing |
Yuichiro Dan, Toshiki Shibahara, and Junko Takahashi | Timing Attack on Random Forests for Generating Adversarial Examples | |
2019 | Takuma Ito, Naoyuki Shinohara, and Shigenori Uchiyama | An Efficient F4-style Based Algorithm to Solve MQ Problems |
Mamoru Mimura and Taro Ohminami | Towards Efficient Detection of Malicious VBA Macros with LSI | |
2018 | Yasufumi Hashimoto, Yasuhiko Ikematsu, and Tsuyoshi Takagi | Chosen Message Attack on Multivariate Signature ELSA at Asiacrypt 2017 |
2017 | Akinori Hosoyamada and Kazumaro Aoki | On Quantum Related-Key Attacks on Iterated Even-Mansour Ciphers |
2016 | Zimin Lin, Rui Wang, Xiaoqi Jia, Shengzhi Zhang, and Chuankun Wu | Analyzing Android Repackaged Malware by Decoupling Their Event Behaviors |
Wenbin Zhang and Chik How Tan | On the Security and Key Generation of the ZHFE Encryption Scheme | |
2015 | Jingnan He, Bao Li, Xianhui Lu, Dingding Jia, Haiyang Xue and Xiaochao Sun | Identity-based Lossy Encryption from Learning with Errors |
2014 | N/A | N/A |
2013 | Shotaro Sano, Takuma Otsuka, and Hiroshi G. Okuno | Solving Google's Continuous Audio CAPTCHA with HMM-based Automatic Speech Recognition |
2012 | Yu Sasaki, Lei Wang, Yasuhiro Takasaki, Kazuo Sakiyama, and Kazuo Ohta | Boomerang Distinguishers for Full HAS-160 Compression Function |
2011 | Georgios Portokalidis and Angelos D. Keromytis | REASSURE: A Self-contained Mechanism for Healing Software Using Rescue Points |
2010 | Margus Niitsoo | Optimal Adversary Behavior for the Serial Model of Financial Attack Trees |
2009 | Lei Wang, Yu Sasaki, Kazuo Sakiyama, and Kazuo Ohta | Bit-Free Collision: Application to APOP Attack |
2008 | Ieng-Fat Lam, Kuan-Ta Chen, and Ling-Jyh Chen | Involuntary Information Leakage in Social Network Services |
2007 | Kazumaro Aoki, Takeshi Shimoyama, and Hiroki Ueda | Experiments on the Linear Algebra Step in the Number Field Sieve |
2006 | Hiroshi Sakaki, Kazuo Yanoo, and Ryuichi Ogawa | A Model-Based Method for Security Configuration Verification |
IWSEC Best Student Paper Award
詳細を表示
Year | Authors | Title |
---|---|---|
2023 | Hiroki Furue and Yasuhiko Ikematsu | A New Security Analysis Against MAYO and QR-UOV Using Rectangular MinRank Attack |
2022 | Hirotomo Shinoki and Koji Nuida | On Extension of Evaluation Algorithms in Keyed-Homomorphic Encryption |
2021 | Kittiphop Phalakarn, Vorapong Suppakitpaisarn, Nuttapong Attrapadung, and Kanta Matsuura | Evolving Homomorphic Secret Sharing for Hierarchical Access Structures |
2020 | Kota Sasaki and Koji Nuida | Efficiency and Accuracy Improvements of Secure Floating-Point Addition over Secret Sharing |
Yui Tajiri and Mamoru Mimura | Detection of Malicious PowerShell Using World-Level Language Models | |
2019 | Toi Tomita, Wakaha Ogata, and Kaoru Kurosawa | CCA-Secure Leakage-Resilient Identity-Based Key-Encapsulation from Simple (not q-type) Assumptions |
2018 | Weiyao Wang, Yuntao Wang, Atsushi Takayasu, and Tsuyoshi Takagi | Estimated Cost for Solving Generalized Learning with Errors Problem via Embedding Techniques |
2017 | Nasser Mohammed Al-Fannah and Wanpeng Li | Not All Browsers Are Created Equal: Comparing Web Browser Fingerprintability |
2016 | Francois-Xavier Aguessy, Olivier Bettan, Gregory Blanc, Vania Conan, and Herve Debar | Hybrid Risk Assessment Model based on Bayesian Networks |
2015 | Bingke Ma, Bao Li, Ronglin Hao, and Xiaoqian Li | Improved (Pseudo) Preimage Attacks on Reduced-Round GOST and Groestl-256 and Studies on Several Truncation Patterns for AES-like Compression Functions |
2014 | Rui Xu, Kirill Morozov, and Tsuyoshi Takagi | Cheater Identifiable Secret Sharing Schemes Via Multi-Receiver Authentication |
2013 | Yun-Ju Huang, Christophe Petit, Naoyuki Shinohara, and Tsuyoshi Takagi | Improvement of Faugere et al.'s method to solve ECDLP |
2012 | Susumu Kiyoshima, Yoshifumi Manabe, and Tatsuaki Okamoto | Efficient Concurrent Oblivious Transfer in Super-Polynomial-Simulation Security |
2011 | S. Sharmila Deva Selvi, S. Sree Vivek, and C. Pandu Rangan | Identity Based Deterministic Signature Scheme Without Forking-Lemma |
2010 | Yusuke Sakai, Goichiro Hanaoka, Kaoru Kurosawa, and Kazuo Ohta | A Generic Method for Reducing Ciphertext Length of Reproducible KEMs in the RO Model |
2009 | Minkyu Kim, Atsushi Fujioka, and Berkant Ustaoglu | Strongly Secure Authenticated Key Exchange without NAXOS' Approach |
2008 | Fuchun Guo, Yi Mu, and Zhide Chen | Efficient Batch Verification of Short Signatures for a Single-Signer Setting Without Random Oracles |
Naoki Ogura and Shigenori Uchiyama | Remarks on the Attack of Fougue et al. against the l IC Scheme | |
2007 | Qiong Huang and Duncan S. Wong | Generic Certificateless Encryption in the Standard Model |
Bertrand Anckaert, Mariusz Jakubowski, Ramarathnam Venkatesan, and Koen De Bosschere | Run-Time Randomization to Mitigate Tampering | |
2006 | Seung Geol Choi, Kunsoo Park, and Moti Yung | Short Traceable Signatures Based on Bilinear Pairings |
IWSEC Best Poster Award
詳細を表示
Year | Authors | Title |
---|---|---|
2023 | Mine Arai, Naoto Yanai and Goichiro Hanaoka | KOTO Crypto: Educational cryptography with the Koto |
Hyuna Noh, Eunmin Lee, Minju Lee, Suhri Kim and Joohee Lee | Security Analysis on KpqC Round 1 Lattice-based Algorithms Using Lattice Estimator | |
2022 | Miho Miyake and Akinori Kawachi | Secure Multi-party Computation for Symmetric Function with Tree Interaction Patterns |
2021 | Xuping Huang, Shunsuke Mochizuki, and Katsunari Yoshioka | Towards Estimating Radio Resources Wasted by IoT Botnet Attacks |
2019 | Ken Naganuma, Suzuki Takayuki, Kenta Takahashi, Yousuke Kaga, Masayuki Yoshino, Noboru Kunihiro | Secure Key-management Technology for Blockchain using Biometrics Information |
Tomoki Moriya, Hiroshi Onuki, and Tsuyoshi Takagi | How to Construct CSIDH on Edwards Curves | |
Yuji Koike, Takuya Hayashi, Takanori Isobe | A Practical Leakage-Resilient Scheme using Big-key Encryptions | |
Yoshiki Abe, Mitsugu Iwamoto, Kazuo Ohta | How to improve the private PEZ protocol for general functions | |
2018 | Daisuke Kito and Yoshiaki Isobe | Study of Security Risk of Cryptocurrency Exchange Service |
Dang Duy Thang and Toshihiro Matsui | White-box Attack on Google Machine Learning System | |
Erina Tatsumi, Kazuo Sakiyama and Takeshi Sugawara | A Case Study of Row Hammer under Different Refresh Rates | |
Yuji Suga | Alexa, Renew the Public Key and the Certificate (of Your TLS Sites) | |
2017 | Tatsuya Suzuki, Keita Emura, Hayato Kimura, and Toshihiro Ohigashi | Implementation Results of Privacy-Preserving and Public Verifiable Data Aggregation Protocols |
Natsu Shoji, Ryuga Matsumura, Takeshi Sugawara, and Kazuo Sakiyama | An Evaluation of Ineffective Fault Analysis on AES using Single-Bit Bit-Set/Reset Faults | |
Mitsuhiro Hattori, Takato Hirano, Nori Matsuda, Rina Shimizu, and Ye Wang | Privacy-Utility Tradeoff for Applications Using Energy Disaggregation of Smart-Meter Data | |
2016 | Eunkyung Kim and Mehdi Tibouchi | FHE over the Integers and Modular Arithmetic Circuits |
Yudai Nagamine, Naoto Yanai, Shingo Okamura, and Toru Fujiwara | Malware for Protocol Misidentification | |
2015 | Ai Ishida, Keita Emura, Goichiro Hanaoka, Yusuke Sakai, and Keisuke Tanaka | Disavowability on Public Key Encryption with Non-interactive Opening |
Akihiro Nishimura, Takuya Nishida, Yu-ichi Hayashi, Takaaki Mizuki, and Hideaki Sone | Card-Based Cryptographic Protocols with Unordinary Shuffle | |
2014 | Yohei Watanabe and Junji Shikata | Information-Theoretically Secure Revocable-Storage Broadcast Encryption |
2013 | Shota Yamada, Nuttapong Attrapadung, Goichiro Hanaoka, and Noboru Kunihiro | New Security Proof for a Variant of the BGW Broadcast Encryption Scheme |
Yuntao Wang, Hui Zhang, and Tsuyoshi Takagi | Improving BKZ Algorithm with Reordering Technique | |
2012 | Takayuki YAMADA, Seiichi GOHSHI, and Isao ECHIZEN | Privacy Visor: wearable device for privacy protection based on differences in sensory perception between humans and devices |
Hui ZHANG and Tsuyoshi TAKAGI | Cryptanalysis of Multi-prime RSA with Small Prime Difference | |
Takashi Yamakawa, Shota Yamada, Goichiro Hanaoka, and Noboru Kunihiro | Bounded CCA Secure KEM from the Computational Bilinear Diffie-Hellman Assumption | |
Yuji Suga | Optimal Construction of Graph-based Visual Secret Sharing Schemes for Multiple Secrets | |
2011 | Ken Ichikawa and Kanta Matsuura | Preventing execution of JIT shellcode by isolating running process |
Kaori Tosu and Noboru Kunihiro | Optimizing Bounds against Multi-Prime Phi-Hiding Problems | |
Yutaka Kawai | Schnorr Signature May Not Be Secure under Several Diffie-Hellman Type Assumptions | |
Takayuki Yamada, Seiichi Gohshi, and Isao Echizen | Method for preventing illegal recording of displayed content based on differences in sensory perception between humans and devices |