Online edition: ISSN 2432-6380
[TOP] | [2018] | [2019] | [2020] | [2021] | [2022] | [2023] | [2024] | [Japanese] / [English]
HWS2022-7
Side-Channel Attacks on Post-Quantum KEMs Using Multi-class Classification Neural Network
Yutaro Tanaka, Rei Ueno (Tohoku Univ.), Keita Xagawa, Akitra Ito, Junko Takahashi (NTT), Naofumi Homma (Tohoku Univ.)
pp. 1 - 6
HWS2022-8
Revisit of Non Profiled Side Channel Analysis via Deep Learning
Kentaro Imafuku, Shinichi Kawamura, Hanae Nozaki, Junichi Sakamoto, Saki Osuka (AIST)
pp. 7 - 12
HWS2022-9
Randomness evaluation of TERO-based TRNG with a side-channel attack countermeasure
Saki Osuka (AIST), Daisuke Fujimoto, Yuichi Hayashi (NAIST), Shinichi Kawamura (AIST)
pp. 13 - 17
HWS2022-10
A Study for Predicting Correlation Power Analysis Results by Using High-SNR Plaintexts Selected Based on Linear Leakage Model
Masaki Himuro, Kengo Iokibe, Yoshitaka Toyota (Okayama Univ.)
pp. 18 - 22
HWS2022-11
Issues and Considerations for Improvement of Verification in ECDSA Attestation of Intel SGX
Yagawa Takashi (Tsukuba Univ.), Suzaki Kuniyasu, Teruya Tadanori, Ohara Kazuma (AIST), Abe Hirotake (Tsukuba Univ.)
pp. 23 - 28
HWS2022-12
Revealing PUF Responses by Differential Power Analysis against Reed-Muller-Code-based Fuzzy Extractor
Soma Watanabe, Yuta Fukuda, Tatsuya Oyama, Kota Yoshida, Takeshi Fujino (Ritsumeikan Univ)
pp. 29 - 34
HWS2022-13
Security of Systems that Automatically Authenticate a User's Credentials and Location using Wireless Technology
Kazuki Tachibana, Junichi Sakamoto, Tsutomu Matsumoto (YNU)
pp. 35 - 39
HWS2022-14
Security Assessment and Countermeasures for Magnetic Malfunction of Electromagnetic Relays
Takumi Owada, Kazuki Tachibana, Tsutomu Matsumoto (YNU)
pp. 40 - 45
HWS2022-15
Distance Spoofing Detection by LiDAR and Stereo Camera
Ataru Kubo, Yuki Fukatsu, Naoki Yoshida, Tsutomu Matsumoto (YNU)
pp. 46 - 51
HWS2022-16
Security Evaluation of Cryptographic Circuits with Laser Sensors by Double-Spot Laser Irradiation
Masaki Chikano, Naoki Yoshida, Junichi Sakamoto, Syungo Hayashi, Tsutomu Matsumoto (YNU)
pp. 52 - 57
HWS2022-17
[Invited Talk]
Audio forensics and recording property estimation
Akira Nishimura (TUIS)
p. 58
HWS2022-18
Person Verification Using Evoked EEG by Ultrasound
-- Examination of Correlation in Fusing Features --
Yuta Ishikawa, Kotaro Mukai, Isao Nakanishi (Tottori Univ.)
pp. 59 - 63
HWS2022-19
Person Verification Using EEG Evoked by Ultrasound
-- Introduction of mutual features between electrodes --
Kotaro Mukai, Isao Nakanishi (Tottori Univ.)
pp. 64 - 69
HWS2022-20
A Study on Biometric Modality for Continuous Authentication of Smart Devices
Yuka Watanabe, Yasushi Yamazaki (Kitakyushu Univ.)
pp. 70 - 75
HWS2022-21
Person verification using evoked EEG from imperceptible vibratory stimulation
-- Introduction of normalization into EEG spectral content ratio --
Hiroki Kobayashi, Hirotomo Nakashima, Isao Nakanishi (Tottori Univ.)
pp. 76 - 80
HWS2022-22
Investigation of credit card fraud model and deterrence method on SNS
Zhixian Zhao, Shigeyuki Osada (JRI)
pp. 81 - 87
HWS2022-23
An overview of the secrecy of patent applications in the Japanese Law
Makoto Koike (MK Microwave)
pp. 88 - 97
HWS2022-24
Cryptocurrency Analysis System for Investigating Cyber Crime Economy
Hiroshi Mori, Hiroshi Kumagai, Yin Minn Pa Pa, Yuta Takata, Ryoya Furukawa, Yuji Sakurai, Masaki Kamizono (DTCY)
pp. 98 - 103
HWS2022-25
Distributed Random Number Generation Method on Smart Contracts
Kentaro Sako (Waseda Univ), Shin'ichiro Matsuo (Georgetown Univ), Tatsuya Mori (Waseda Univ)
pp. 104 - 109
HWS2022-26
An Efficient Sparse Multiplication Algorithm For Pairing-Friendly Elliptic Curves With Cubic Twist
Daiki Hayashida, Kenichiro Hayasaka (Mitsubishi Electric Corp.), Tadanori Teruya (AIST)
pp. 110 - 117
HWS2022-27
Revocable Identity-Based Encryption With Multiple Private-Key Generators secure against Chosen Ciphertext Attacks and Decryption Key Exposure
Yudai Suzuki, Atsushi Fujioka, Taroh Sasaki (Kanagawa Univ.), Akira Nagai (NTT)
pp. 118 - 123
HWS2022-28
Identification and tracking of website users in consideration of privacy in browser fingerprinting
Takashi Tsukazaki, Yuichi Futa (TUT), Tomomichi Suzuki (PitApp), Hiroyuki Okazaki (Shinshu Univ.)
pp. 124 - 130
HWS2022-29
Efficient Constructions of Adaptively and CCA-secure Identity-based Encryption with Equality Test from LWE Assumption in the Standard Model
Kyoichi Asano (UEC/NICT), Keita Emura (NICT), Atsushi Takayasu (Univ. Tokyo)
pp. 131 - 138
Note: Each article is a technical report without peer review, and its polished version will be published elsewhere.