Online edition: ISSN 2432-6380
[TOP] | [2018] | [2019] | [2020] | [2021] | [2022] | [2023] | [2024] | [Japanese] / [English]
SITE2023-48
[Invited Talk]
Security Technologies to Improve Content-Distribution and Broadcasting Services
Kazuto Ogawa (NICT)
p. 1
SITE2023-49
Private-preserving encoding and decoding using variable-length coding schemes
Yuki Seto, Kunihiko Sadakane, Kazunari Tozawa (UTokyo)
pp. 2 - 9
SITE2023-50
An Optimization Method for Share Reconstruction in (k,n)-Threshold Secret Sharing Scheme Using Exclusive-OR
Shogo Naganuma, Yutaro Taki, Shigeru Fujita (CIT)
pp. 10 - 17
SITE2023-51
Optimum Median-Sum Fingerprinting for Winternitz One-Time Signature
Motonari Honda, Yuichi Kaji (NU)
pp. 18 - 25
SITE2023-52
(See Japanese page.)
pp. 26 - 32
SITE2023-53
Improving Triple Sieve Algorithm on Ideal Lattice
Seishiro Terada, Yuntao Wang, Atsuko Miyaji (Osaka Univ.)
pp. 33 - 40
SITE2023-54
Report of IEEE ISTAS 2023
Yusuke Kaneko (JRI)
pp. 41 - 48
SITE2023-55
Harm Caused by Databases
Nobuyuki Yoshinaga ()
pp. 49 - 53
SITE2023-56
Proof-of-Concept and Discussion of Self-Management and Utilization of Personal Data in Broadcast Media Services
Chigusa Yamamura, Takumi Mouri, Yasuhiro Murasaki, Satoshi Fujitsu, Kinji Matsumura (NHK)
pp. 54 - 59
SITE2023-57
Transaction Access Control Using ERC7303 and Its Applications
Ko Fujimura (Otsuma Women's Univ.)
pp. 60 - 65
SITE2023-58
NTP Tunneling Threat Model Verification and Countermeasure
Shinjisangeru Sugasawa, Hisayoshi Kunimune, Shigeaki Tanimoto (CIT)
pp. 66 - 71
SITE2023-59
Consideration of progressive BKZ by reordering of GramSchmidt vectors
Katsuya Nakashima, Wang Yuntao, Miyaji Atsuko (Osaka Univ.)
pp. 72 - 77
SITE2023-60
Secure Identity-Based Authenticated Key Exchange with Multiple Private Key Generators against Malicious Generators
Kazuma Wariki, Atsushi Fujioka (Kanagawa Univ.), Akira Nagai, Kan Yasuda (NTT)
pp. 78 - 85
SITE2023-61
Zero-Knowledge Proofs for ownership of Deep Neural Network
Shungo Sato, Hidema Tanaka (NDA)
pp. 86 - 92
SITE2023-62
Side-Channel Security Evaluation of ASCON Implementation
Daisuke Iwasa, Rei Ueno (Tohoku University), Kazuhide Fukushima (KDDI Research, Inc.), Naofumi Homma (Tohoku University)
pp. 93 - 97
SITE2023-63
A Study on Side-Channel Attacks for Unrolled Implementation of Block Ciphers
Teppei Higashi, Rei Ueno, Naofumi Homma (Tohoku Univ)
pp. 98 - 102
SITE2023-64
A Proposed Link Key Hijacking Attack Using the Power-Saving Mode against Bluetooth BR/EDR
Keiichiro Kimura, Hiroki Kuzuno, Yoshiaki Shiraishi, Masakatu Morii (Kobe Univ.)
pp. 103 - 109
SITE2023-65
The New Ecodesign Regulation in EU
-- Focusing on the Development of “the Right to Repair” --
Yusuke Tachibana (FIT)
pp. 110 - 113
SITE2023-66
Improvements for Enhancing the Reliability of NFTs
-- NFT Challenges and Solutions --
Yasushi Nakayama (SBI FERI)
pp. 114 - 118
SITE2023-67
A Legally Regulatable Stablecoin on a Public Blockchain
-- Four Corners Model for Stablecoin --
Hayato Shimamura, Shigeichiro Yamasaki (Kindai Univ.)
pp. 119 - 126
Note: Each article is a technical report without peer review, and its polished version will be published elsewhere.