Online edition: ISSN 2432-6380
[TOP] | [2018] | [2019] | [2020] | [2021] | [2022] | [2023] | [2024] | [Japanese] / [English]
EMM2021-15
Fundamental Study on Acceleration of Inversion using Binary Extended Euclidean Algorithm for Pairing Computation in RNS Representation
Kota Morimoto, Daisuke Fujimoto, Saki Osuka (NAIST), Shinichi Kawamura, Tadanori Teruya (AIST), Yuichi hayashi (NAIST)
pp. 1 - 7
EMM2021-16
Memory-saving implementation of BLS12-381 Pairing-based cryptography
Riku Anzai, Junichi Sakamoto, Zihao Song, Naoki Yoshida, Tsutomu Matsumoto (YNU)
pp. 8 - 13
EMM2021-17
Design of Fp2 Multiplier Datapath Based on Parallelized QP Montgomery Multiplication for Application to Isogeny-based Cryptography
Rei Ueno (Tohoku Univ./JST PRESTO), Naofumi Homma (Tohoku Univ.)
pp. 14 - 19
EMM2021-18
A Website Fingerprinting Attack Based on the Virtual Memory of the Process on Android Devices
Tatsuya Okazaki, Hiroya Kato, Shuichiro Haruta, Iwao Sasase (Keio Univ.)
pp. 20 - 27
EMM2021-19
Rogue Access Point Detection by Using ARP Failure under the MAC Address Duplication
Kosuke Igarashi, Hiroya Kato, Iwao Sasase (Keio Univ.)
pp. 28 - 34
EMM2021-20
Fake Command Attack Detection of industrial Control System with SVM
Yuki Harada, Yuichi Futa (TUT), Hiroyuki Okazaki (Shinshu Univ.)
pp. 35 - 40
EMM2021-21
[Invited Talk]
ELSI in Data Science
Yuko Murakami (Rikkyo U)
pp. 41 - 46
EMM2021-22
[Invited Talk]
Cyber security of the Open University of Japan's courses of literacy in mathematical aspects, data science, and AI
Takeo Tatsumi (Open Univ. Japan)
pp. 47 - 49
EMM2021-23
[Invited Talk]
Ethics of AI and Its Education
Minao Kukita (Nagoya Univ.)
pp. 50 - 55
EMM2021-24
[Invited Talk]
Data science practice from a legal and ethical perspective
-- A case study of an avatar community application --
Soichiro Morishita (CA)
pp. 56 - 59
EMM2021-25
Consideration on hybrid security of authenticated key exchange FSXY
Takeru Kawaguchi, Seijuro Suzuki, Atushi Fujioka, Taro Sasaki (Kanagawa Univ.)
pp. 60 - 67
EMM2021-26
Evaluation on Biometric Template Protection System Based on Somewhat Homomorphic Encryption
Hiroto Tamiya, Toshiyuki Isshiki, Kengo Mori (NEC), Satoshi Obana (Hosei Univ.), Tetsushi Ohki (Shizuoka Univ.)
pp. 68 - 73
EMM2021-27
A Study of Black-box Adversarial Attack for Face Recognition Systems
Vo Ngoc Khoi Nguyen, Takamichi Terada, Masakatsu Nishigaki, Tetsushi Ohki (Shizuoka Univ.)
pp. 74 - 79
EMM2021-28
Deep-Learning Based Side-Channel Analysis on Cryptographic Hardware with Masking Countermeasure
Kenta Kojima, Akira Ito, Rei Ueno, Naofumi Homma (Tohoku Univ.)
pp. 80 - 85
EMM2021-29
Deep Learning Side-Channel Attacks against Unprotected AES and RSM-AES Implemented in ASIC
Yuta Fukuda, Kota Yoshida, Hisashi Hashimoto, Takeshi Fujino (Ritsumeikan Univ.)
pp. 86 - 91
EMM2021-30
Implimentation of RISC-V TEE using PUF as Root of Trust
Kota Yoshida (Ritsumeikan Univ.), Kuniyasu Suzaki (AIST), Takeshi Fujino (Ritsumeikan Univ.)
pp. 92 - 97
EMM2021-31
Evaluation of TRNG Using CMOS Image Sensor
Hayato Tatsuno, Tatsuya Oyama, Masayoshi Shirahata, Shunsuke Okura, Takeshi Fujino (Ritsumeikan Univ.)
pp. 98 - 103
EMM2021-32
Implementation and Evaluation of a Ring Oscillator Type True Random Number Generator (2)
Ryuichi Minagawa, KevinHideaki Omae, Kotarou Hayashi, Naoya Torii (Soka Univ.)
pp. 104 - 109
EMM2021-33
A Study Toward Practical Use of "Emergency Button" Which Enables Crypto Asset Evacuation When Key Loss
Natsume Matsuzaki, Yoshihiro Kita (Univ. of Nagasaki)
pp. 110 - 114
EMM2021-34
Characteristics and security risk considerations in Dogecoin network
Mitsuyoshi Imamura (Tsukuba Univ.), Omote Kazumasa (Tsukuba Univ./NICT)
pp. 115 - 122
EMM2021-35
Security Risk Considerations in NFT Reliability
Keigo Kimura (Tsukuba Univ.), Mitsuyoshi Imamura (Nomura Asset Management), Kazumasa Omote (Tsukuba Univ.)
pp. 123 - 130
EMM2021-36
Development of an AI Literacy Learning Tool Using Minecraft
Suika Kishimoto, Kazuhiro Kono (Kansai Univ.)
pp. 131 - 135
EMM2021-37
Hybrid Multiplicative Secret Sharing
Maki Yoshida (NICT)
pp. 136 - 140
EMM2021-38
(See Japanese page.)
pp. 141 - 146
EMM2021-39
A Large-scale Investigation into the Possibility of Malware Infection of IoT Devices with Weak Credentials
Kosuke Murakami, Takahiro Kasama, Daisuke Inoue (NICT)
pp. 147 - 152
EMM2021-40
Differential Path Search Using MILP against ForkSkinny
Masaya Okazaki (Nagoya Univ.), Yu Sasaki (NTT), Tetsu Iwata (Nagoya Univ.)
pp. 153 - 160
EMM2021-41
Computer experiment evaluation for time variance of virtual currency mining using cryptographic hash function
Kei Ikebe, Kouichi Sakurai (Kyushu Univ.)
pp. 161 - 166
EMM2021-42
A study of frequency domain-based steganography with adaptive gain on DCT blocks
Kaito Onuma, Sumiko Miyata (SIT)
pp. 167 - 173
EMM2021-43
Applying Transcreation to Development of Programing Education
-- Creation and Utilization of Transcreation Scale --
Masahiro Morita (Matsuyama Junior College)
pp. 174 - 181
EMM2021-44
Research Ethics as Decision Making Assistance
-- The Principles and Ethical Analysis of AoIR Internet Research Ethics Guideline --
Takushi Otani (Kibi International Univ.), Hirotaka Osawa (Tsukuba Univ.), Akiyoshi Kabeya (Toyo Eiwa Univ.), Nobutsugu Kanzaki (Nanzan Univ.), Minao Kukita (Nagoya Univ.), Reina Saijo (Osaka Univ.)
pp. 182 - 189
EMM2021-45
International regulatory trend survey report on AI
-- Analysis of Proposal for a Regulation on a European approach for Artificial Intelligence Ⅱ --
Naonori Kato (KDDI Research/RIKEN), Masato Suzuki (Niigata Univ./RIKEN), Yoichiro Itakura (Hikari Sogoh Law Offices/RIKEN), Yosuke Murakami, Katsutoshi Hanahara (KDDI Research)
pp. 190 - 197
Note: Each article is a technical report without peer review, and its polished version will be published elsewhere.