Print edition: ISSN 0913-5685 Online edition: ISSN 2432-6380
[TOP] | [2015] | [2016] | [2017] | [2018] | [2019] | [2020] | [2021] | [Japanese] / [English]
SITE2018-5
Truly Efficient Robust Secret Sharing for the Real World
Yohei Watanabe (UEC), Kazuma Ohara (UEC/NEC), Mitsugu Iwamoto, Kazuo Ohta (UEC)
pp. 1 - 8
SITE2018-6
Construction of Revocable HIBE with Adaptive Security
Atsushi Takayasu (Univ. Tokyo)
pp. 9 - 16
SITE2018-7
Code-Based Signature Scheme without Trapdoors
Partha Sarathi Roy (KDDI Research), Kirill Morozov (Univ. of North Texas), Kazuhide Fukushima, Shinsaku Kiyomoto (KDDI Research), Tsuyoshi Takagi (Univ. of Tokyo)
pp. 17 - 22
SITE2018-8
On the integration of SCF-PEKS and PKE
Tatsuya Suzuki (Tokai Univ.), Keita Emura (NICT), Ohigashi Toshihiro (Tokai Univ.)
pp. 23 - 30
SITE2018-9
A Study on Amplitude Controlling Using Modulated Wave toward Countermeasure against Spoofing Attack on Ultrasonic Rangefinder
Daisuke Fujimoto, Yu-ichi Hayashi (NAIST)
pp. 55 - 59
SITE2018-10
A System for Evaluating Instrumentation Security of ToF Depth-Image Cameras against Pulse-light Spoofing
Satoru Sakurazawa, Daisuke Fujimoto, Tsutomu Matsumoto (YNU)
pp. 61 - 68
SITE2018-11
How to Evaluate Instrumentation Security of Stereo Vision Cameras against DoS and Illusion Attacks
Naoki Yoshida, Hiroki Nohira, Yasushi Iwata, Tsutomu Matsumoto (YNU)
pp. 69 - 75
SITE2018-12
Immunity Evaluation of Cryptographic Devices using Gaussian Noise against IEMI Fault Injection
Takumi Okamoto, Daisuke Fujimoto, Yuichi Hayashi (NAIST), Naofumi Homma (Tohoku Univ.), Arthur Beckers, Josep Balasch, Benedikt Gierlichs, Ingrid Verbauwhede (KU Leuven)
pp. 77 - 81
SITE2018-13
Fundamental Study on Identification of EM Leakage Source of Audio Information from a Smart Device
Izumi Nishina, Daisuke Fujimoto (NAIST), Masahiro Kinugawa (NIT), Yu-ichi Hayashi (NAIST)
pp. 83 - 88
SITE2018-14
[Invited Talk]
Tightly-Secure Key-Encapsulation Mechanism in the Quantum Random Oracle Model (from EUROCRYPT 2018)
Tsunekazu Saito, Keita Xagawa, Takashi Yamakawa (NTT)
p. 89
SITE2018-15
[Invited Talk]
Obfustopia Built on Secret-Key Functional Encryption (from EUROCRYPT 2018)
Fuyuki Kitagawa (Tokyo Tech), Ryo Nishimaki (NTT), Keisuke Tanaka (Tokyo Tech)
p. 91
SITE2018-16
[Invited Talk]
Memory Lower Bounds of Reductions Revisited (from EUROCRYPT 2018)
Yuyu Wang (Tokyo Tech/AIST/IOHK), Takahiro Matsuda, Goichiro Hanaoka (AIST), Keisuke Tanaka (Tokyo Tech)
p. 93
SITE2018-17
Practice and Evaluation of Penetration Testing Exercises for Raising Cybersecurity Awareness
Daisuke Suzuki (Hokuriku Univ.)
pp. 131 - 136
SITE2018-18
A Study on Public Wi-Fi Authentication Method with Anonymity and Traceability Using Blockchain
Tomoyuki Sanda, Hiroyuki Inaba (Kyoto Inst. of Tech.)
pp. 137 - 142
SITE2018-19
A design of interest-rate recordable cryptocurrency management program
Yusuke Kaneko (SMBC/JRI), Shigeyuki Osada (JRI), Shigeyuki Azuchi (HAW), Hitoshi Okada (NII), Shigeichiro Yamasaki (KINDAI Univ.)
pp. 143 - 148
SITE2018-20
Application of the Singular Curve Point Decompression Attack to the Bitcoin Curve
Akira Takahashi (Kyoto Univ.), Mehdi Tibouchi, Masayuki Abe (NTT)
pp. 149 - 153
SITE2018-21
Extended Partial Key Exposure Attacks on RSA
Kaichi Suzuki, Atsushi Takayasu, Noboru Kunihiro (Univ. of Tokyo)
pp. 155 - 162
SITE2018-22
Secure Multiparty Computation of Ranking Using a Deck of Cards
Ken Takashima, Yuta Abe, Tatsuya Sasaki, Daiki Miyahara (Tohoku Univ.), Kazumasa Shinagawa (Tokyo Inst. of Tech./AIST), Takaaki Mizuki, Hideaki Sone (Tohoku Univ.)
pp. 163 - 169
SITE2018-23
Chi-Squared Test for Independence Between Single Nucleotide Polymorphisms and Diseases Using Mis-operation Resistant Searchable Homomorphic Encryption
Keita Emura, Takuya Hayashi (NICT/JST), Wenjie Lu (University of Tsukuba/JST CREST), Shiho Moriai (NICT/JST), Jun Sakuma (University of Tsukuba/JST CREST/RIKEN), Yoshiji Yamada (Mie University/JST CREST)
pp. 171 - 176
SITE2018-24
Some tips for information hiding from the viewpoint of magic trick
Naofumi Aoki (Hokkaido Univ.)
pp. 225 - 227
SITE2018-25
Effects of high frequency components on steganalysis of data hiding in low-order bits of an audio waveform
Akira Nishimura (Tokyo Univ. Info. Sci.)
pp. 229 - 236
SITE2018-26
Regulatory Policies Regarding Mobile Spectrum Holdings in the United States and EU Countries
Tomoko Yamajo (KDDI Research)
pp. 269 - 274
SITE2018-27
A Study on Limitation on Copyright in Machine Learning
-- Review of the reform bill in Japan --
Naonori Kato (KDDI Research), Masatomo Suzuki (Niigata Univ./RIKEN), Yosuke Murakami (KDDI Research)
pp. 275 - 280
SITE2018-28
About Access Control with the Deconstruction Device in Probability Measures on Metric Spaces
Tetsuya Morizumi, Hirotsugu Kinoshita (KU)
pp. 281 - 287
SITE2018-29
Kenta Watanabe, Miwako Mishima (Gifu Univ.)
pp. 289 - 295
SITE2018-30
Real-time Botnet Detection Using Nonnegative Tucker Decomposition
Hideaki Kanehara, Yuma Murakami (Waseda Univ.), Jumpei Shimamura (Clwit), Takeshi Takahashi (NICT), Noboru Murata (Waseda Univ.), Daisuke Inoue (NICT)
pp. 297 - 304
SITE2018-31
(See Japanese page.)
pp. 305 - 310
SITE2018-32
Consideration on Crypto Key Management Devices on the Market.
Kohei Isobe, Keisuke Hasegawa, Tadahiko Ito (SECOM)
pp. 327 - 332
SITE2018-33
Compensation of Temperature Induced Flipping-Bits in CMOS SRAM PUF by NMOS Body-Bias
Xuanhao Zhang, Xiang Chen, Hanfeng Sun, Hirofumi Shinohara (Waseda Univ.)
pp. 333 - 336
SITE2018-34
Side-Channel Countermeasure for XOR based PUF and Its Evaluation
Yusuke Nozaki, Masaya Yoshikawa (Meijo Univ.)
pp. 337 - 342
SITE2018-35
Side-Channel Attacks on an Error-Correction Circuit of Fuzzy Extractor
Yuta Goto, Mitsuru Shiozaki, Takeshi Fujino (Ritsumeikan Univ)
pp. 343 - 348
SITE2018-36
A Study on Systematic Insertion of Hardware Trojan Based on Path Delay
Akira Ito, Rei Ueno, Naofumi Homma, Takafumi Aoki (Tohoku Univ.)
pp. 349 - 356
SITE2018-37
Proposal of Multivariate Public Key Cryptosystem Based on Modulus of Numerous Prime Numbers and CRT
Shigeo Tsujii, Ryo Fujita, Masahito Gotaishi (Chuo Univ.)
pp. 357 - 362
SITE2018-38
A New Embedding Method for Generalized LWE
Weiyao Wang, Yuntao Wang, Atsushi Takayasu, Tsuyoshi Takagi (Univ. Tokyo)
pp. 363 - 370
SITE2018-39
The Precise Security Analysis of Block Ciphers Enhanced by FX-Construction against a Quantum Algorithm
Syo Yasui, Noboru Kunihiro (UTokyo)
pp. 371 - 378
SITE2018-40
Plaintext Recovery Attacks against WPA-TKIP Using Iterated RC4 Key Correlations
Ryoma Ito, Atsuko Miyaji (Osaka Univ.)
pp. 379 - 386
SITE2018-41
A construction of generic Multiparty Private Set Intersection
Katsunari Shishido, Motoi Hayashi, Atsuko Miyaji (Osaka Univ.)
pp. 387 - 394
Note: Each article is a technical report without peer review, and its polished version will be published elsewhere.