Online edition: ISSN 2432-6380
[TOP] | [2018] | [2019] | [2020] | [2021] | [2022] | [2023] | [2024] | [Japanese] / [English]
EMM2022-15
Side-Channel Attacks on Post-Quantum KEMs Using Multi-class Classification Neural Network
Yutaro Tanaka, Rei Ueno (Tohoku Univ.), Keita Xagawa, Akitra Ito, Junko Takahashi (NTT), Naofumi Homma (Tohoku Univ.)
pp. 1 - 6
EMM2022-16
Revisit of Non Profiled Side Channel Analysis via Deep Learning
Kentaro Imafuku, Shinichi Kawamura, Hanae Nozaki, Junichi Sakamoto, Saki Osuka (AIST)
pp. 7 - 12
EMM2022-17
Randomness evaluation of TERO-based TRNG with a side-channel attack countermeasure
Saki Osuka (AIST), Daisuke Fujimoto, Yuichi Hayashi (NAIST), Shinichi Kawamura (AIST)
pp. 13 - 17
EMM2022-18
A Study for Predicting Correlation Power Analysis Results by Using High-SNR Plaintexts Selected Based on Linear Leakage Model
Masaki Himuro, Kengo Iokibe, Yoshitaka Toyota (Okayama Univ.)
pp. 18 - 22
EMM2022-19
Issues and Considerations for Improvement of Verification in ECDSA Attestation of Intel SGX
Yagawa Takashi (Tsukuba Univ.), Suzaki Kuniyasu, Teruya Tadanori, Ohara Kazuma (AIST), Abe Hirotake (Tsukuba Univ.)
pp. 23 - 28
EMM2022-20
Revealing PUF Responses by Differential Power Analysis against Reed-Muller-Code-based Fuzzy Extractor
Soma Watanabe, Yuta Fukuda, Tatsuya Oyama, Kota Yoshida, Takeshi Fujino (Ritsumeikan Univ)
pp. 29 - 34
EMM2022-21
Security of Systems that Automatically Authenticate a User's Credentials and Location using Wireless Technology
Kazuki Tachibana, Junichi Sakamoto, Tsutomu Matsumoto (YNU)
pp. 35 - 39
EMM2022-22
Security Assessment and Countermeasures for Magnetic Malfunction of Electromagnetic Relays
Takumi Owada, Kazuki Tachibana, Tsutomu Matsumoto (YNU)
pp. 40 - 45
EMM2022-23
Distance Spoofing Detection by LiDAR and Stereo Camera
Ataru Kubo, Yuki Fukatsu, Naoki Yoshida, Tsutomu Matsumoto (YNU)
pp. 46 - 51
EMM2022-24
Security Evaluation of Cryptographic Circuits with Laser Sensors by Double-Spot Laser Irradiation
Masaki Chikano, Naoki Yoshida, Junichi Sakamoto, Syungo Hayashi, Tsutomu Matsumoto (YNU)
pp. 52 - 57
EMM2022-25
[Invited Talk]
Audio forensics and recording property estimation
Akira Nishimura (TUIS)
p. 58
EMM2022-26
Person Verification Using Evoked EEG by Ultrasound
-- Examination of Correlation in Fusing Features --
Yuta Ishikawa, Kotaro Mukai, Isao Nakanishi (Tottori Univ.)
pp. 59 - 63
EMM2022-27
Person Verification Using EEG Evoked by Ultrasound
-- Introduction of mutual features between electrodes --
Kotaro Mukai, Isao Nakanishi (Tottori Univ.)
pp. 64 - 69
EMM2022-28
A Study on Biometric Modality for Continuous Authentication of Smart Devices
Yuka Watanabe, Yasushi Yamazaki (Kitakyushu Univ.)
pp. 70 - 75
EMM2022-29
Person verification using evoked EEG from imperceptible vibratory stimulation
-- Introduction of normalization into EEG spectral content ratio --
Hiroki Kobayashi, Hirotomo Nakashima, Isao Nakanishi (Tottori Univ.)
pp. 76 - 80
EMM2022-30
Investigation of credit card fraud model and deterrence method on SNS
Zhixian Zhao, Shigeyuki Osada (JRI)
pp. 81 - 87
EMM2022-31
An overview of the secrecy of patent applications in the Japanese Law
Makoto Koike (MK Microwave)
pp. 88 - 97
EMM2022-32
Cryptocurrency Analysis System for Investigating Cyber Crime Economy
Hiroshi Mori, Hiroshi Kumagai, Yin Minn Pa Pa, Yuta Takata, Ryoya Furukawa, Yuji Sakurai, Masaki Kamizono (DTCY)
pp. 98 - 103
EMM2022-33
Distributed Random Number Generation Method on Smart Contracts
Kentaro Sako (Waseda Univ), Shin'ichiro Matsuo (Georgetown Univ), Tatsuya Mori (Waseda Univ)
pp. 104 - 109
EMM2022-34
An Efficient Sparse Multiplication Algorithm For Pairing-Friendly Elliptic Curves With Cubic Twist
Daiki Hayashida, Kenichiro Hayasaka (Mitsubishi Electric Corp.), Tadanori Teruya (AIST)
pp. 110 - 117
EMM2022-35
Revocable Identity-Based Encryption With Multiple Private-Key Generators secure against Chosen Ciphertext Attacks and Decryption Key Exposure
Yudai Suzuki, Atsushi Fujioka, Taroh Sasaki (Kanagawa Univ.), Akira Nagai (NTT)
pp. 118 - 123
EMM2022-36
Identification and tracking of website users in consideration of privacy in browser fingerprinting
Takashi Tsukazaki, Yuichi Futa (TUT), Tomomichi Suzuki (PitApp), Hiroyuki Okazaki (Shinshu Univ.)
pp. 124 - 130
EMM2022-37
Efficient Constructions of Adaptively and CCA-secure Identity-based Encryption with Equality Test from LWE Assumption in the Standard Model
Kyoichi Asano (UEC/NICT), Keita Emura (NICT), Atsushi Takayasu (Univ. Tokyo)
pp. 131 - 138
Note: Each article is a technical report without peer review, and its polished version will be published elsewhere.