IEICE Technical Report

Print edition: ISSN 0913-5685      Online edition: ISSN 2432-6380

Volume 119, Number 140

Information Security

Workshop Date : 2019-07-23 - 2019-07-24 / Issue Date : 2019-07-16

[PREV] [NEXT]

[TOP] | [2016] | [2017] | [2018] | [2019] | [2020] | [2021] | [2022] | [Japanese] / [English]

[PROGRAM] [BULK PDF DOWNLOAD]


Table of contents

ISEC2019-12
Implementation of gathering system configuration and design vulnerability assessment for zero-day attack countermeasure using vulnerability information
Motoki Kusume, Koji Kida, Keizo Saisho (Kagawa Univ.)
pp. 1 - 6

ISEC2019-13
An Approach to Attack Scenario Generation for Simulation of Targeted Attacks
Yusuke Takahashi, Shigeyoshi Shima, Atsunori Naito (NEC), Rui Tanabe, Katsunari Yoshioka (YNU)
pp. 7 - 14

ISEC2019-14
Profiling of malicious users towards honeypot installation in the blockchain network
Kazuki Hara, Teppei Sato, Mitsuyoshi Imamura (Tsukuba Univ.), Kazumasa Omote (Tsukuba Univ./NICT)
pp. 15 - 22

ISEC2019-15
Risk analysis of zero downtime mechanism by dispersibility in blockchain technology
Wataru Taguchi, Mitsuyoshi Imamura (Tsukuba Univ.), Kazumasa Omote (uba Univ./NICT)
pp. 23 - 28

ISEC2019-16
A method of giving trust to users in Bitcoin
Asuka Suzuki, Teppei Sato (Tsukuba Univ.), Omote Kazumasa (Tsukuba Univ./NICT)
pp. 29 - 34

ISEC2019-17
Evaluation of Similarity Calculation Methods for Image Clustering based on PRNU Noise
Mai Uchida, Yoichi Tomioka (UoA)
pp. 75 - 79

ISEC2019-18
Development of 2,400ppi fingerprint sensor for capturing neonate fingerprint within 24 hours after Birth
Yoshinori Koda, Ai Takahashi, Koichi Ito, Takafumi Aoki (Tohoku Univ.)
pp. 81 - 85

ISEC2019-19
Introduction of Second-order Differential Phase Spectrum into Person Authentication using Intra-Palm Propagation Signal
Kohei Fujita, Yuya Isimoto, Isao Nakanishi (Tottori Univ)
pp. 87 - 92

ISEC2019-20
Empirical Evaluation on Face-Detection Prevention Technologies
Kazuki Eto, Kazushi Waki, Takafumi Mori, Hiroaki Kikuchi (Meiji Univ.)
pp. 93 - 98

ISEC2019-21
Constructing More Efficient Lattice-based Revocable IBE with Adaptive Security
Atsushi Takayasu (Univ. Tokyo)
pp. 99 - 106

ISEC2019-22
A Revocable Group Signature Scheme with Strong Anonymity for Crowdsensing
Yuto Nakazawa, Toru Nakanishi (Hiroshima Univ.)
pp. 107 - 112

ISEC2019-23
Privacy for Documents and Prototype of Risk Evaluation Tool
Tomoaki Mimoto, Shinsaku Kiyomoto (KDDI Research), Koji Kitamura (AIST), Atsuko Miyaji (Osaka Univ.)
pp. 113 - 118

ISEC2019-24
New Quantum Algorithms for Modular Inverse and Their Application on the Elliptic Curve Discrete Logarithm Problem
Ryo Kurama (Univ. of Tokyo), Noboru Kunihiro (Tsukuba Univ.)
pp. 119 - 124

ISEC2019-25
Attribute-Based Group Signatures for Revocable Members
Maharage Nisansala Sevwandi Perera, Toru Nakamura, Masayuki Hashimoto, Hiroyuki Yokoyama (ATR)
pp. 125 - 132

ISEC2019-26
A Formal Approach to Verifying Trojan-freeness of Cryptographic Circuits Based on Galois-Field Arithmetic
Akira Ito, Rei Ueno, Naofumi Homma (Tohoku Univ.)
pp. 133 - 138

ISEC2019-27
Side-channel leakage evaluation of cryptographic module by IC chip level consumption simulation
Kazuki Yasuda, Kazuki Monta, Akihiro Tsukioka, Noriyuki Miura, Makoto Nagata (Kobe Univ.)
pp. 139 - 143

ISEC2019-28
A Countermeasure against Side-Channel Analysis using Dynamic Power Control
Tomoaki Ukezono (Fukuoka Univ.)
pp. 145 - 149

ISEC2019-29
Side Channel Security of an FPGA Pairing Implementation with Pipelined Modular Multiplier
Mitsufumi Yamazaki, Junichi Sakamoto, Yuta Okuaki, Tsutomu Matsumoto (YNU)
pp. 151 - 156

ISEC2019-30
An FPGA Implementation of Aggregate Signature Schemes with Pipelined Modular Multiplier
Yota Okuaki, Junichi Sakamoto, Daisuke Fujimoto, Tsutomu Matsumoto (YNU)
pp. 157 - 162

ISEC2019-31
Proposal and Implementation of Password Reminder System for Partial Forgetting
Ryota Hosoda, Hiroyuki Inaba (KIT)
pp. 163 - 170

ISEC2019-32
Proposal of Spam Filter by Applying Neural Network for Mitigating Catastrophic Forgetting
Shuiti Kawahara, Lu Chen, Hiroyuki Inaba (KIT)
pp. 171 - 178

ISEC2019-33
Video Watermarking Using Difference of Persistent Homology in Consecutive Frames
Takaya Kimura, Hiroyuki Inaba (KIT)
pp. 179 - 186

ISEC2019-34
A simulation of a 3-D visual cryptography using holography
Takumi Takazawa, Kazuhiro Suzuki, Naoki Takada (Kochi Univ.)
pp. 187 - 192

ISEC2019-35
SecureHID: Securing the USB Interface
Jan Goette (Waseda Univ.), Naoto Yanai (Osaka Univ.), Tatsuya Mori (Waseda Univ.)
pp. 199 - 206

ISEC2019-36
A Performance Analysis of Supersingular Isogeny Diffie-Hellman with Several Classes of the Quadratic Extension Fields
Yuki Nanjo (Okayama Univ.), Masaaki Shirase (Future Univ. Hakodate), Takuya Kusaka, Yasuyuki Nogami (Okayama Univ.)
pp. 207 - 214

ISEC2019-37
Generic Even-Mansour Construction Based on Group Actions
Hector Hougaard, Chen-Mou Cheng, Miyaji Atsuko (Graduate School of Engineering, Osaka Univ.)
pp. 215 - 220

ISEC2019-38
Instruction Replacement Fault Attack for TVC using Double Laser Station
Tomoro Suzuki, Junichi Sakamoto, Tsutomu Matsumoto (YNU)
pp. 221 - 225

ISEC2019-39
Electromagnetic Analysis Attacks on an ASIC Implementation of a Ring-Oscillator PUF
Mitsuru Shiozaki, Takeshi Fujino (Ritsumeikan Univ.)
pp. 227 - 234

ISEC2019-40
Fundamental Study on an Estimation Method of Irradiate Frequencies to Forcibly Cause Electromagnetic Information Leakage
Shugo Kaji (NAIST), Masahiro Kinugawa (NIT), Daisuke Fujimoto, Yu-ichi Hayashi (NAIST)
pp. 235 - 238

ISEC2019-41
Instrumentation Security of Ranging Pulse LIDARs Using Multiple Photodetectors
Tatsuya Suehiro, Ryuya Ichinose, Satoru Sakurazawa, Naoki Yoshida, Tsutomu Matsumoto (YNU)
pp. 239 - 242

ISEC2019-42
Generation of Family Resemblance Inference Rules by Boid Annotation and Labeled-LDA -- A Machine Learning Approach to Integrate Inference Attack Analysis and Covert Channel Attack Analysis --
Kosuke Kurebayashi, Tetsuya Morizumi, Hirotsugu Kinoshita (KU)
pp. 243 - 249

ISEC2019-43
Implicit Guidance & Control at OODA Loop using as Countermeasures -- against SMS phishing --
Yuidhi Takigawa (N.D.A.), Takeo Tatsumi (O.U.J/)
pp. 251 - 258

ISEC2019-44
Server Configuration Training Including Vulnerability Assessment and Remediation process
Daisuke Suzuki (Hokuriku Univ.)
pp. 259 - 263

ISEC2019-45
Investigation on Blockchain-based Malware Information Sharing Method in Malware Detection System
Ryusei Fuji, Shotaro Usuzaki, Kentaro Aburada, Hisaaki Yamaba, Tetsuro Katayama (Univ. of Miyazaki), Mirang Park (Kanagawa Inst. of Tech.), Norio Shiratori (Chuo Univ.), Naonobu Okazaki (Univ. of Miyazaki)
pp. 293 - 298

ISEC2019-46
Automatic Node Manipulation System for Active Monitoring Environment
Shingo Yasuda, Nobuyuki Kanaya, Yu Tsuda, Satoshi Ohta, Ryosuke Miura, Daisuke Inoue (NICT)
pp. 299 - 304

ISEC2019-47
A Study on Suppression of Inappropriate Use of Illegal Contents Based on Conformity Caused by Normative Influence
Hiroki Yamaguchi, Kazuhiro Kono (Kansai Univ.)
pp. 305 - 310

ISEC2019-48
Recording device identification based on audio distortion depending on system-on-chip
Akira Nishimura (Tokyo Univ. Info. Sci.)
pp. 311 - 316

ISEC2019-49
Stochastic Existence Connecting Logos that are not necessarily completely divided and Language Games -- Limitations of Security Models and the Possibility of Artificial Intelligence --
Tetsuya Morizumi (KU)
pp. 317 - 324

ISEC2019-50
International regulatory trend survey report on AI -- Focusing on the OECD Principles on AI --
Naonori Kato (KDDI Research), Masatomo Suzuki (Niigata Univ./RIKEN), Yoichiro Itakura (Hikari Sogoh Law Offices/RIKEN), Yosuke Murakami (KDDI Research)
pp. 325 - 331

ISEC2019-51
Development of the Ethics Assessment for Research & Innovation Guidelines under the SATORI project in Europe (1) -- Background and Outline --
Takushi Otani (Kibi International Univ.), Hirotaka Osawa (Tsukuba Univ.), Minao Kukita (Nagoya Univ.), Reina Saijo (Kyoto Univ.)
pp. 333 - 340

ISEC2019-52
3 Layers Public Key Cryptosystem with a Short Tandem Repeat DNA for Ultimate Personal Identification -- Introduction of Short Tandem Repeat Coupled with Mai Nanbaa and its Application --
Shigeo Tsujii, Toshiaki Saisho, Masao Yamasawa, Ko Shikata (Chuo Univ.), Koji Sasaki, Nobuharu Suzuki (Ad.)
pp. 341 - 346

ISEC2019-53
Anonymous Public-Key Certificates based on Elliptic Curve
Kazuomi Oishi (SIST)
pp. 347 - 352

ISEC2019-54
A Method for Key-Updatable Symmetric Searchable Encryption
Natsume Matsuzaki, Hiroaki Anada (Univ. of Nagasaki)
pp. 353 - 356

ISEC2019-55
Participation Report of the 9th BIU Winter School on Cryptography
Hiroaki Anada (Univ. Nagasaki)
pp. 357 - 361

ISEC2019-56
Garbled Circuit by three valued logics by Bochvar
Shunsuke Hayashi, Taroh Sasaki, Athushi Fujioka (Kanagawa Univ.)
pp. 363 - 368

ISEC2019-57
Design Space Search Applying Bayesian Optimization to High-level Design Flow
Ryohei Nakayama (UTokyo), Hiromitsu Awano (Osaka Univ.), Makoto Ikeda (UTokyo)
pp. 369 - 374

ISEC2019-58
Design of Highly Efficient AES Hardware Architectures Based on Multiplicative-Offset
Rei Ueno (Tohoku Univ.), Sumio Morioka (IST), Noriyuki Miura, Kohei Matsuda, Makoto Nagata (Kobe Univ.), Shivam Bhasin (NTU), Yves Mathieu, Tarik Graba, Jean-Luc Danger (TPT), Naofumi Homma (Tohoku Univ.)
pp. 375 - 382

ISEC2019-59
Design of High Performance Processor for Paillier Algorithm With Homomorphism
Chun Cai, Hiromitsu Awano, Makoto Ikeda (Tokyo Univ.)
pp. 383 - 388

ISEC2019-60
Potential Method to Extract Uniqueness from Non-Ideality of Sensor Device
Thibaut Constant, Makoto Nagata, Noriyuki Miura (Kobe Univ.)
pp. 389 - 390

ISEC2019-61
Possibility of Identifying USB Device by Voltage Changing
Taku Toyama, Junichi Sakamoto, Naoki Yoshida, Tsutomu Matsumoto (YNU)
pp. 391 - 396

Note: Each article is a technical report without peer review, and its polished version will be published elsewhere.


The Institute of Electronics, Information and Communication Engineers (IEICE), Japan