Online edition: ISSN 2432-6380
[TOP] | [2017] | [2018] | [2019] | [2020] | [2021] | [2022] | [2023] | [Japanese] / [English]
SITE2020-11
Development of the Ethics Assessment for Research & Innovation Guidelines under the SATORI project in Europe(2)
-- The Joint Framework of Ethics Assessment and CEN Workshop Agreement --
Takushi Otani (Kibi International Univ.), Nobutsugu Kanzaki (Nanzan Univ.), Minao Kukita (Nagoya Univ.), Hirotaka Osawa (Tsukuba Univ.), Reina Saijo (Osaka Univ.)
pp. 1 - 8
SITE2020-12
Report on the International Policy Trends in Data Protection
-- A Study on Facial Recognition Rules in Europe --
Naonori Kato (KDDI Research Inc./RIKEN AIP), Masatomo Suzuki (Niigata Univ./RIKEN AIP), Yosuke Murakami (KDDI Research Inc.)
pp. 9 - 13
SITE2020-13
Development of Feature Extractor for Visible Light Iris Recognition Using Deep Learning
Tetsuya Honda, Hironobu Takano (Toyama Pref. Univ.)
pp. 15 - 19
SITE2020-14
Biometric Authentication Using Evoked EEG by Invisible Visual Stimulation
-- Improved Verification Perfomance Based on Wavelet Transform and Machine Learning --
Takahiro Miyake, Nozom Kinjo, Isao Nakanishi (Tottori Univ)
pp. 21 - 26
SITE2020-15
Privacy Preserving of big data system using distributed machine learning
Zhaoheng Chen, Kazumasa omote (University of Tsukuba)
pp. 27 - 31
SITE2020-16
Risk analysis of zero downtime mechanism by dispersibility in blockchain technology (2)
Wataru Taguchi (Tsukuba Univ.), Kazumasa Omote (Tsukuba Univ./NICT)
pp. 33 - 38
SITE2020-17
Side Channel Attack on CRT-RSA Using Sliding Window with Exponent Blinding
Soki Osawa, Rei Ueno, Naofumi Homma (Tohoku Univ.)
pp. 39 - 45
SITE2020-18
Quantum Attacks on the Sum of Even-Mansour Pseudorandom Function
Kazuo Shinagawa, Tetsu Iwata (Nagoya Univ.)
pp. 47 - 51
SITE2020-19
Short Lattice Signatures in the Standard Model with Efficient Tag Generation and Its Implementation
Kaisei Kajita, Go Ohtake, Kazuto Ogawa (NHK), Koji Nuida, Tsuyoshi Takagi (Univ. of Tokyo)
pp. 53 - 60
SITE2020-20
A Study on Construction of Probablistic Homomorphic Encryption Using Stochastic Computing.
Ryusuke Koseki, Rei Ueno, Naofumi Homma (Tohoku Univ.)
pp. 61 - 67
SITE2020-21
Performance Evaluation of True Random Number Generator Using Latches
Naoya Torii, Hideaki Kevin Omae (Soka Univ.)
pp. 69 - 74
SITE2020-22
The Optimal Arrangement of Detectors and ECUs for Detection of Unauthorized Devices on the linear CAN Bus
Kunito Fukuda, Takahito Yasunaga, Yoshikazu Isoyama, Takumi Asaina, Yoichi Hata (Sumitomo Electric)
pp. 75 - 80
SITE2020-23
Adversarial scan attack against ICP algorithm for pose estimation on LiDAR-based SLAM
Kota Yoshida, Takeshi Fujino (Ritsumeikan Univ.)
pp. 81 - 86
SITE2020-24
Side-channel Analysis on Message Authentication Code for Controller Area Network
Kensei Nagato, Ville Yli-Mayry, Rei Ueno (Tohoku Univ.), Tsuyoshi Toyama, Hisashi Oguma (TOYOTA), Naohumi Homma (Tohoku Univ.)
pp. 87 - 92
SITE2020-25
Homomorphic commitment schemes with constant output locality
Hideaki Miyaji, Atsuko Miyaji (OU)
pp. 93 - 98
SITE2020-26
Key Holding System Without Exchanging Common Key between Users
-- TS Key Holding System --
Nobuharu Suzuki, Kouji Sasaki (Adin), Takahiro Yoshimura, Ken-ya Yoshimura (Monolith), Toshio Tsuji (Vega), Masao Yamasawa, Masahito Gotaishi, Shigeo Tsujii (Chuo Univ.)
pp. 99 - 103
SITE2020-27
Generalization of the hard part computation of final exponentiation for arbitrary BLS curves
Masaaki Shirase (FUN), Yuki Nanjo (Okayama Univ.)
pp. 105 - 110
SITE2020-28
Secure and Compact Elliptic Curve LR Scalar Multiplication
Yaoan Jin, Atsuko Miyaji (Osaka Univ)
pp. 111 - 118
Note: Each article is a technical report without peer review, and its polished version will be published elsewhere.