IEICE Technical Report

Print edition: ISSN 0913-5685      Online edition: ISSN 2432-6380

Volume 119, Number 143

Hardware Security

Workshop Date : 2019-07-23 - 2019-07-24 / Issue Date : 2019-07-16

[PREV] [NEXT]

[TOP] | [2016] | [2017] | [2018] | [2019] | [2020] | [2021] | [2022] | [Japanese] / [English]

[PROGRAM] [BULK PDF DOWNLOAD]


Table of contents

HWS2019-7
Implementation of gathering system configuration and design vulnerability assessment for zero-day attack countermeasure using vulnerability information
Motoki Kusume, Koji Kida, Keizo Saisho (Kagawa Univ.)
pp. 1 - 6

HWS2019-8
An Approach to Attack Scenario Generation for Simulation of Targeted Attacks
Yusuke Takahashi, Shigeyoshi Shima, Atsunori Naito (NEC), Rui Tanabe, Katsunari Yoshioka (YNU)
pp. 7 - 14

HWS2019-9
Profiling of malicious users towards honeypot installation in the blockchain network
Kazuki Hara, Teppei Sato, Mitsuyoshi Imamura (Tsukuba Univ.), Kazumasa Omote (Tsukuba Univ./NICT)
pp. 15 - 22

HWS2019-10
Risk analysis of zero downtime mechanism by dispersibility in blockchain technology
Wataru Taguchi, Mitsuyoshi Imamura (Tsukuba Univ.), Kazumasa Omote (uba Univ./NICT)
pp. 23 - 28

HWS2019-11
A method of giving trust to users in Bitcoin
Asuka Suzuki, Teppei Sato (Tsukuba Univ.), Omote Kazumasa (Tsukuba Univ./NICT)
pp. 29 - 34

HWS2019-12
Evaluation of Similarity Calculation Methods for Image Clustering based on PRNU Noise
Mai Uchida, Yoichi Tomioka (UoA)
pp. 75 - 79

HWS2019-13
Development of 2,400ppi fingerprint sensor for capturing neonate fingerprint within 24 hours after Birth
Yoshinori Koda, Ai Takahashi, Koichi Ito, Takafumi Aoki (Tohoku Univ.)
pp. 81 - 85

HWS2019-14
Introduction of Second-order Differential Phase Spectrum into Person Authentication using Intra-Palm Propagation Signal
Kohei Fujita, Yuya Isimoto, Isao Nakanishi (Tottori Univ)
pp. 87 - 92

HWS2019-15
Empirical Evaluation on Face-Detection Prevention Technologies
Kazuki Eto, Kazushi Waki, Takafumi Mori, Hiroaki Kikuchi (Meiji Univ.)
pp. 93 - 98

HWS2019-16
Constructing More Efficient Lattice-based Revocable IBE with Adaptive Security
Atsushi Takayasu (Univ. Tokyo)
pp. 99 - 106

HWS2019-17
A Revocable Group Signature Scheme with Strong Anonymity for Crowdsensing
Yuto Nakazawa, Toru Nakanishi (Hiroshima Univ.)
pp. 107 - 112

HWS2019-18
Privacy for Documents and Prototype of Risk Evaluation Tool
Tomoaki Mimoto, Shinsaku Kiyomoto (KDDI Research), Koji Kitamura (AIST), Atsuko Miyaji (Osaka Univ.)
pp. 113 - 118

HWS2019-19
New Quantum Algorithms for Modular Inverse and Their Application on the Elliptic Curve Discrete Logarithm Problem
Ryo Kurama (Univ. of Tokyo), Noboru Kunihiro (Tsukuba Univ.)
pp. 119 - 124

HWS2019-20
Attribute-Based Group Signatures for Revocable Members
Maharage Nisansala Sevwandi Perera, Toru Nakamura, Masayuki Hashimoto, Hiroyuki Yokoyama (ATR)
pp. 125 - 132

HWS2019-21
A Formal Approach to Verifying Trojan-freeness of Cryptographic Circuits Based on Galois-Field Arithmetic
Akira Ito, Rei Ueno, Naofumi Homma (Tohoku Univ.)
pp. 133 - 138

HWS2019-22
Side-channel leakage evaluation of cryptographic module by IC chip level consumption simulation
Kazuki Yasuda, Kazuki Monta, Akihiro Tsukioka, Noriyuki Miura, Makoto Nagata (Kobe Univ.)
pp. 139 - 143

HWS2019-23
A Countermeasure against Side-Channel Analysis using Dynamic Power Control
Tomoaki Ukezono (Fukuoka Univ.)
pp. 145 - 149

HWS2019-24
Side Channel Security of an FPGA Pairing Implementation with Pipelined Modular Multiplier
Mitsufumi Yamazaki, Junichi Sakamoto, Yuta Okuaki, Tsutomu Matsumoto (YNU)
pp. 151 - 156

HWS2019-25
An FPGA Implementation of Aggregate Signature Schemes with Pipelined Modular Multiplier
Yota Okuaki, Junichi Sakamoto, Daisuke Fujimoto, Tsutomu Matsumoto (YNU)
pp. 157 - 162

HWS2019-26
Proposal and Implementation of Password Reminder System for Partial Forgetting
Ryota Hosoda, Hiroyuki Inaba (KIT)
pp. 163 - 170

HWS2019-27
Proposal of Spam Filter by Applying Neural Network for Mitigating Catastrophic Forgetting
Shuiti Kawahara, Lu Chen, Hiroyuki Inaba (KIT)
pp. 171 - 178

HWS2019-28
Video Watermarking Using Difference of Persistent Homology in Consecutive Frames
Takaya Kimura, Hiroyuki Inaba (KIT)
pp. 179 - 186

HWS2019-29
A simulation of a 3-D visual cryptography using holography
Takumi Takazawa, Kazuhiro Suzuki, Naoki Takada (Kochi Univ.)
pp. 187 - 192

HWS2019-30
SecureHID: Securing the USB Interface
Jan Goette (Waseda Univ.), Naoto Yanai (Osaka Univ.), Tatsuya Mori (Waseda Univ.)
pp. 199 - 206

HWS2019-31
A Performance Analysis of Supersingular Isogeny Diffie-Hellman with Several Classes of the Quadratic Extension Fields
Yuki Nanjo (Okayama Univ.), Masaaki Shirase (Future Univ. Hakodate), Takuya Kusaka, Yasuyuki Nogami (Okayama Univ.)
pp. 207 - 214

HWS2019-32
Generic Even-Mansour Construction Based on Group Actions
Hector Hougaard, Chen-Mou Cheng, Miyaji Atsuko (Graduate School of Engineering, Osaka Univ.)
pp. 215 - 220

HWS2019-33
Instruction Replacement Fault Attack for TVC using Double Laser Station
Tomoro Suzuki, Junichi Sakamoto, Tsutomu Matsumoto (YNU)
pp. 221 - 225

HWS2019-34
Electromagnetic Analysis Attacks on an ASIC Implementation of a Ring-Oscillator PUF
Mitsuru Shiozaki, Takeshi Fujino (Ritsumeikan Univ.)
pp. 227 - 234

HWS2019-35
Fundamental Study on an Estimation Method of Irradiate Frequencies to Forcibly Cause Electromagnetic Information Leakage
Shugo Kaji (NAIST), Masahiro Kinugawa (NIT), Daisuke Fujimoto, Yu-ichi Hayashi (NAIST)
pp. 235 - 238

HWS2019-36
Instrumentation Security of Ranging Pulse LIDARs Using Multiple Photodetectors
Tatsuya Suehiro, Ryuya Ichinose, Satoru Sakurazawa, Naoki Yoshida, Tsutomu Matsumoto (YNU)
pp. 239 - 242

HWS2019-37
Generation of Family Resemblance Inference Rules by Boid Annotation and Labeled-LDA -- A Machine Learning Approach to Integrate Inference Attack Analysis and Covert Channel Attack Analysis --
Kosuke Kurebayashi, Tetsuya Morizumi, Hirotsugu Kinoshita (KU)
pp. 243 - 249

HWS2019-38
Implicit Guidance & Control at OODA Loop using as Countermeasures -- against SMS phishing --
Yuidhi Takigawa (N.D.A.), Takeo Tatsumi (O.U.J/)
pp. 251 - 258

HWS2019-39
Server Configuration Training Including Vulnerability Assessment and Remediation process
Daisuke Suzuki (Hokuriku Univ.)
pp. 259 - 263

HWS2019-40
Investigation on Blockchain-based Malware Information Sharing Method in Malware Detection System
Ryusei Fuji, Shotaro Usuzaki, Kentaro Aburada, Hisaaki Yamaba, Tetsuro Katayama (Univ. of Miyazaki), Mirang Park (Kanagawa Inst. of Tech.), Norio Shiratori (Chuo Univ.), Naonobu Okazaki (Univ. of Miyazaki)
pp. 293 - 298

HWS2019-41
Automatic Node Manipulation System for Active Monitoring Environment
Shingo Yasuda, Nobuyuki Kanaya, Yu Tsuda, Satoshi Ohta, Ryosuke Miura, Daisuke Inoue (NICT)
pp. 299 - 304

HWS2019-42
A Study on Suppression of Inappropriate Use of Illegal Contents Based on Conformity Caused by Normative Influence
Hiroki Yamaguchi, Kazuhiro Kono (Kansai Univ.)
pp. 305 - 310

HWS2019-43
Recording device identification based on audio distortion depending on system-on-chip
Akira Nishimura (Tokyo Univ. Info. Sci.)
pp. 311 - 316

HWS2019-44
Stochastic Existence Connecting Logos that are not necessarily completely divided and Language Games -- Limitations of Security Models and the Possibility of Artificial Intelligence --
Tetsuya Morizumi (KU)
pp. 317 - 324

HWS2019-45
International regulatory trend survey report on AI -- Focusing on the OECD Principles on AI --
Naonori Kato (KDDI Research), Masatomo Suzuki (Niigata Univ./RIKEN), Yoichiro Itakura (Hikari Sogoh Law Offices/RIKEN), Yosuke Murakami (KDDI Research)
pp. 325 - 331

HWS2019-46
Development of the Ethics Assessment for Research & Innovation Guidelines under the SATORI project in Europe (1) -- Background and Outline --
Takushi Otani (Kibi International Univ.), Hirotaka Osawa (Tsukuba Univ.), Minao Kukita (Nagoya Univ.), Reina Saijo (Kyoto Univ.)
pp. 333 - 340

HWS2019-47
3 Layers Public Key Cryptosystem with a Short Tandem Repeat DNA for Ultimate Personal Identification -- Introduction of Short Tandem Repeat Coupled with Mai Nanbaa and its Application --
Shigeo Tsujii, Toshiaki Saisho, Masao Yamasawa, Ko Shikata (Chuo Univ.), Koji Sasaki, Nobuharu Suzuki (Ad.)
pp. 341 - 346

HWS2019-48
Anonymous Public-Key Certificates based on Elliptic Curve
Kazuomi Oishi (SIST)
pp. 347 - 352

HWS2019-49
A Method for Key-Updatable Symmetric Searchable Encryption
Natsume Matsuzaki, Hiroaki Anada (Univ. of Nagasaki)
pp. 353 - 356

HWS2019-50
Participation Report of the 9th BIU Winter School on Cryptography
Hiroaki Anada (Univ. Nagasaki)
pp. 357 - 361

HWS2019-51
Garbled Circuit by three valued logics by Bochvar
Shunsuke Hayashi, Taroh Sasaki, Athushi Fujioka (Kanagawa Univ.)
pp. 363 - 368

HWS2019-52
Design Space Search Applying Bayesian Optimization to High-level Design Flow
Ryohei Nakayama (UTokyo), Hiromitsu Awano (Osaka Univ.), Makoto Ikeda (UTokyo)
pp. 369 - 374

HWS2019-53
Design of Highly Efficient AES Hardware Architectures Based on Multiplicative-Offset
Rei Ueno (Tohoku Univ.), Sumio Morioka (IST), Noriyuki Miura, Kohei Matsuda, Makoto Nagata (Kobe Univ.), Shivam Bhasin (NTU), Yves Mathieu, Tarik Graba, Jean-Luc Danger (TPT), Naofumi Homma (Tohoku Univ.)
pp. 375 - 382

HWS2019-54
Design of High Performance Processor for Paillier Algorithm With Homomorphism
Chun Cai, Hiromitsu Awano, Makoto Ikeda (Tokyo Univ.)
pp. 383 - 388

HWS2019-55
Potential Method to Extract Uniqueness from Non-Ideality of Sensor Device
Thibaut Constant, Makoto Nagata, Noriyuki Miura (Kobe Univ.)
pp. 389 - 390

HWS2019-56
Possibility of Identifying USB Device by Voltage Changing
Taku Toyama, Junichi Sakamoto, Naoki Yoshida, Tsutomu Matsumoto (YNU)
pp. 391 - 396

Note: Each article is a technical report without peer review, and its polished version will be published elsewhere.


The Institute of Electronics, Information and Communication Engineers (IEICE), Japan