IEICE Technical Report

Online edition: ISSN 2432-6380

Volume 123, Number 246

Social Implications of Technology and Information Ethics

Workshop Date : 2023-11-09 - 2023-11-10 / Issue Date : 2023-11-02

[PREV] [NEXT]

[TOP] | [2018] | [2019] | [2020] | [2021] | [2022] | [2023] | [2024] | [Japanese] / [English]

[PROGRAM] [BULK PDF DOWNLOAD]


Table of contents

SITE2023-48
[Invited Talk] Security Technologies to Improve Content-Distribution and Broadcasting Services
Kazuto Ogawa (NICT)
p. 1

SITE2023-49
Private-preserving encoding and decoding using variable-length coding schemes
Yuki Seto, Kunihiko Sadakane, Kazunari Tozawa (UTokyo)
pp. 2 - 9

SITE2023-50
An Optimization Method for Share Reconstruction in (k,n)-Threshold Secret Sharing Scheme Using Exclusive-OR
Shogo Naganuma, Yutaro Taki, Shigeru Fujita (CIT)
pp. 10 - 17

SITE2023-51
Optimum Median-Sum Fingerprinting for Winternitz One-Time Signature
Motonari Honda, Yuichi Kaji (NU)
pp. 18 - 25

SITE2023-52
(See Japanese page.)
pp. 26 - 32

SITE2023-53
Improving Triple Sieve Algorithm on Ideal Lattice
Seishiro Terada, Yuntao Wang, Atsuko Miyaji (Osaka Univ.)
pp. 33 - 40

SITE2023-54
Report of IEEE ISTAS 2023
Yusuke Kaneko (JRI)
pp. 41 - 48

SITE2023-55
Harm Caused by Databases
Nobuyuki Yoshinaga ()
pp. 49 - 53

SITE2023-56
Proof-of-Concept and Discussion of Self-Management and Utilization of Personal Data in Broadcast Media Services
Chigusa Yamamura, Takumi Mouri, Yasuhiro Murasaki, Satoshi Fujitsu, Kinji Matsumura (NHK)
pp. 54 - 59

SITE2023-57
Transaction Access Control Using ERC7303 and Its Applications
Ko Fujimura (Otsuma Women's Univ.)
pp. 60 - 65

SITE2023-58
NTP Tunneling Threat Model Verification and Countermeasure
Shinjisangeru Sugasawa, Hisayoshi Kunimune, Shigeaki Tanimoto (CIT)
pp. 66 - 71

SITE2023-59
Consideration of progressive BKZ by reordering of GramSchmidt vectors
Katsuya Nakashima, Wang Yuntao, Miyaji Atsuko (Osaka Univ.)
pp. 72 - 77

SITE2023-60
Secure Identity-Based Authenticated Key Exchange with Multiple Private Key Generators against Malicious Generators
Kazuma Wariki, Atsushi Fujioka (Kanagawa Univ.), Akira Nagai, Kan Yasuda (NTT)
pp. 78 - 85

SITE2023-61
Zero-Knowledge Proofs for ownership of Deep Neural Network
Shungo Sato, Hidema Tanaka (NDA)
pp. 86 - 92

SITE2023-62
Side-Channel Security Evaluation of ASCON Implementation
Daisuke Iwasa, Rei Ueno (Tohoku University), Kazuhide Fukushima (KDDI Research, Inc.), Naofumi Homma (Tohoku University)
pp. 93 - 97

SITE2023-63
A Study on Side-Channel Attacks for Unrolled Implementation of Block Ciphers
Teppei Higashi, Rei Ueno, Naofumi Homma (Tohoku Univ)
pp. 98 - 102

SITE2023-64
A Proposed Link Key Hijacking Attack Using the Power-Saving Mode against Bluetooth BR/EDR
Keiichiro Kimura, Hiroki Kuzuno, Yoshiaki Shiraishi, Masakatu Morii (Kobe Univ.)
pp. 103 - 109

SITE2023-65
The New Ecodesign Regulation in EU -- Focusing on the Development of “the Right to Repair” --
Yusuke Tachibana (FIT)
pp. 110 - 113

SITE2023-66
Improvements for Enhancing the Reliability of NFTs -- NFT Challenges and Solutions --
Yasushi Nakayama (SBI FERI)
pp. 114 - 118

SITE2023-67
A Legally Regulatable Stablecoin on a Public Blockchain -- Four Corners Model for Stablecoin --
Hayato Shimamura, Shigeichiro Yamasaki (Kindai Univ.)
pp. 119 - 126

Note: Each article is a technical report without peer review, and its polished version will be published elsewhere.


The Institute of Electronics, Information and Communication Engineers (IEICE), Japan