Online edition: ISSN 2432-6380
[TOP] | [2018] | [2019] | [2020] | [2021] | [2022] | [2023] | [2024] | [Japanese] / [English]
ISEC2023-54
[Invited Talk]
Security Technologies to Improve Content-Distribution and Broadcasting Services
Kazuto Ogawa (NICT)
p. 1
ISEC2023-55
Private-preserving encoding and decoding using variable-length coding schemes
Yuki Seto, Kunihiko Sadakane, Kazunari Tozawa (UTokyo)
pp. 2 - 9
ISEC2023-56
An Optimization Method for Share Reconstruction in (k,n)-Threshold Secret Sharing Scheme Using Exclusive-OR
Shogo Naganuma, Yutaro Taki, Shigeru Fujita (CIT)
pp. 10 - 17
ISEC2023-57
Optimum Median-Sum Fingerprinting for Winternitz One-Time Signature
Motonari Honda, Yuichi Kaji (NU)
pp. 18 - 25
ISEC2023-58
(See Japanese page.)
pp. 26 - 32
ISEC2023-59
Improving Triple Sieve Algorithm on Ideal Lattice
Seishiro Terada, Yuntao Wang, Atsuko Miyaji (Osaka Univ.)
pp. 33 - 40
ISEC2023-60
Report of IEEE ISTAS 2023
Yusuke Kaneko (JRI)
pp. 41 - 48
ISEC2023-61
Harm Caused by Databases
Nobuyuki Yoshinaga ()
pp. 49 - 53
ISEC2023-62
Proof-of-Concept and Discussion of Self-Management and Utilization of Personal Data in Broadcast Media Services
Chigusa Yamamura, Takumi Mouri, Yasuhiro Murasaki, Satoshi Fujitsu, Kinji Matsumura (NHK)
pp. 54 - 59
ISEC2023-63
Transaction Access Control Using ERC7303 and Its Applications
Ko Fujimura (Otsuma Women's Univ.)
pp. 60 - 65
ISEC2023-64
NTP Tunneling Threat Model Verification and Countermeasure
Shinjisangeru Sugasawa, Hisayoshi Kunimune, Shigeaki Tanimoto (CIT)
pp. 66 - 71
ISEC2023-65
Consideration of progressive BKZ by reordering of GramSchmidt vectors
Katsuya Nakashima, Wang Yuntao, Miyaji Atsuko (Osaka Univ.)
pp. 72 - 77
ISEC2023-66
Secure Identity-Based Authenticated Key Exchange with Multiple Private Key Generators against Malicious Generators
Kazuma Wariki, Atsushi Fujioka (Kanagawa Univ.), Akira Nagai, Kan Yasuda (NTT)
pp. 78 - 85
ISEC2023-67
Zero-Knowledge Proofs for ownership of Deep Neural Network
Shungo Sato, Hidema Tanaka (NDA)
pp. 86 - 92
ISEC2023-68
Side-Channel Security Evaluation of ASCON Implementation
Daisuke Iwasa, Rei Ueno (Tohoku University), Kazuhide Fukushima (KDDI Research, Inc.), Naofumi Homma (Tohoku University)
pp. 93 - 97
ISEC2023-69
A Study on Side-Channel Attacks for Unrolled Implementation of Block Ciphers
Teppei Higashi, Rei Ueno, Naofumi Homma (Tohoku Univ)
pp. 98 - 102
ISEC2023-70
A Proposed Link Key Hijacking Attack Using the Power-Saving Mode against Bluetooth BR/EDR
Keiichiro Kimura, Hiroki Kuzuno, Yoshiaki Shiraishi, Masakatu Morii (Kobe Univ.)
pp. 103 - 109
ISEC2023-71
The New Ecodesign Regulation in EU
-- Focusing on the Development of “the Right to Repair” --
Yusuke Tachibana (FIT)
pp. 110 - 113
ISEC2023-72
Improvements for Enhancing the Reliability of NFTs
-- NFT Challenges and Solutions --
Yasushi Nakayama (SBI FERI)
pp. 114 - 118
ISEC2023-73
A Legally Regulatable Stablecoin on a Public Blockchain
-- Four Corners Model for Stablecoin --
Hayato Shimamura, Shigeichiro Yamasaki (Kindai Univ.)
pp. 119 - 126
Note: Each article is a technical report without peer review, and its polished version will be published elsewhere.