Committee |
Date Time |
Place |
Paper Title / Authors |
Abstract |
Paper # |
BioX, ISEC, SITE, ICSS, EMM, HWS, IPSJ-CSEC, IPSJ-SPT [detail] |
2021-07-19 13:30 |
Online |
Online |
Fundamental Study on Acceleration of Inversion using Binary Extended Euclidean Algorithm for Pairing Computation in RNS Representation Kota Morimoto, Daisuke Fujimoto, Saki Osuka (NAIST), Shinichi Kawamura, Tadanori Teruya (AIST), Yuichi hayashi (NAIST) ISEC2021-10 SITE2021-4 BioX2021-11 HWS2021-10 ICSS2021-15 EMM2021-15 |
Pairing computation is an essential tool in advanced cryptography, and Yao et al. have shown that a hardware implementat... [more] |
ISEC2021-10 SITE2021-4 BioX2021-11 HWS2021-10 ICSS2021-15 EMM2021-15 pp.1-7 |
BioX, ISEC, SITE, ICSS, EMM, HWS, IPSJ-CSEC, IPSJ-SPT [detail] |
2021-07-19 13:55 |
Online |
Online |
Memory-saving implementation of BLS12-381 Pairing-based cryptography Riku Anzai, Junichi Sakamoto, Zihao Song, Naoki Yoshida, Tsutomu Matsumoto (YNU) ISEC2021-11 SITE2021-5 BioX2021-12 HWS2021-11 ICSS2021-16 EMM2021-16 |
For smart security management of IoT systems, it is expected to utilize advanced cryptography such as identity-based enc... [more] |
ISEC2021-11 SITE2021-5 BioX2021-12 HWS2021-11 ICSS2021-16 EMM2021-16 pp.8-13 |
BioX, ISEC, SITE, ICSS, EMM, HWS, IPSJ-CSEC, IPSJ-SPT [detail] |
2021-07-19 14:20 |
Online |
Online |
Design of Fp2 Multiplier Datapath Based on Parallelized QP Montgomery Multiplication for Application to Isogeny-based Cryptography Rei Ueno (Tohoku Univ./JST PRESTO), Naofumi Homma (Tohoku Univ.) ISEC2021-12 SITE2021-6 BioX2021-13 HWS2021-12 ICSS2021-17 EMM2021-17 |
[more] |
ISEC2021-12 SITE2021-6 BioX2021-13 HWS2021-12 ICSS2021-17 EMM2021-17 pp.14-19 |
BioX, ISEC, SITE, ICSS, EMM, HWS, IPSJ-CSEC, IPSJ-SPT [detail] |
2021-07-19 10:30 |
Online |
Online |
A Website Fingerprinting Attack Based on the Virtual Memory of the Process on Android Devices Tatsuya Okazaki, Hiroya Kato, Shuichiro Haruta, Iwao Sasase (Keio Univ.) ISEC2021-13 SITE2021-7 BioX2021-14 HWS2021-13 ICSS2021-18 EMM2021-18 |
[more] |
ISEC2021-13 SITE2021-7 BioX2021-14 HWS2021-13 ICSS2021-18 EMM2021-18 pp.20-27 |
BioX, ISEC, SITE, ICSS, EMM, HWS, IPSJ-CSEC, IPSJ-SPT [detail] |
2021-07-19 10:55 |
Online |
Online |
Rogue Access Point Detection by Using ARP Failure under the MAC Address Duplication Kosuke Igarashi, Hiroya Kato, Iwao Sasase (Keio Univ.) ISEC2021-14 SITE2021-8 BioX2021-15 HWS2021-14 ICSS2021-19 EMM2021-19 |
Detecting a Rogue Access Point (RAP) in Wi-Fi network is imperative. In this paper, we propose RAP detection by using Ad... [more] |
ISEC2021-14 SITE2021-8 BioX2021-15 HWS2021-14 ICSS2021-19 EMM2021-19 pp.28-34 |
BioX, ISEC, SITE, ICSS, EMM, HWS, IPSJ-CSEC, IPSJ-SPT [detail] |
2021-07-19 11:20 |
Online |
Online |
Fake Command Attack Detection of industrial Control System with SVM Yuki Harada, Yuichi Futa (TUT), Hiroyuki Okazaki (Shinshu Univ.) ISEC2021-15 SITE2021-9 BioX2021-16 HWS2021-15 ICSS2021-20 EMM2021-20 |
Recently, industrial control systems (ICS) are introduced TCP/IP protocol and connect internet via office network. Secur... [more] |
ISEC2021-15 SITE2021-9 BioX2021-16 HWS2021-15 ICSS2021-20 EMM2021-20 pp.35-40 |
BioX, ISEC, SITE, ICSS, EMM, HWS, IPSJ-CSEC, IPSJ-SPT [detail] |
2021-07-19 13:35 |
Online |
Online |
[Invited Talk]
ELSI in Data Science Yuko Murakami (Rikkyo U) ISEC2021-16 SITE2021-10 BioX2021-17 HWS2021-16 ICSS2021-21 EMM2021-21 |
Ethical, legal, and social issues (ELSI) of artificial intelligence (AI) and data science (DS) should be classified firs... [more] |
ISEC2021-16 SITE2021-10 BioX2021-17 HWS2021-16 ICSS2021-21 EMM2021-21 pp.41-46 |
BioX, ISEC, SITE, ICSS, EMM, HWS, IPSJ-CSEC, IPSJ-SPT [detail] |
2021-07-19 14:00 |
Online |
Online |
[Invited Talk]
Cyber security of the Open University of Japan's courses of literacy in mathematical aspects, data science, and AI Takeo Tatsumi (Open Univ. Japan) ISEC2021-17 SITE2021-11 BioX2021-18 HWS2021-17 ICSS2021-22 EMM2021-22 |
With incorporating the introduction of mathematical aspects, data science, and AI to university education, many universi... [more] |
ISEC2021-17 SITE2021-11 BioX2021-18 HWS2021-17 ICSS2021-22 EMM2021-22 pp.47-49 |
BioX, ISEC, SITE, ICSS, EMM, HWS, IPSJ-CSEC, IPSJ-SPT [detail] |
2021-07-19 14:25 |
Online |
Online |
[Invited Talk]
Law and Ethics on data science Naonori Kato (KDDI Research/RIKEN) |
[more] |
|
BioX, ISEC, SITE, ICSS, EMM, HWS, IPSJ-CSEC, IPSJ-SPT [detail] |
2021-07-19 15:00 |
Online |
Online |
[Invited Talk]
Ethics of AI and Its Education Minao Kukita (Nagoya Univ.) ISEC2021-18 SITE2021-12 BioX2021-19 HWS2021-18 ICSS2021-23 EMM2021-23 |
Currently, artificial intelligence is causing various ethical problems. In order to develop artificial intelligence in a... [more] |
ISEC2021-18 SITE2021-12 BioX2021-19 HWS2021-18 ICSS2021-23 EMM2021-23 pp.50-55 |
BioX, ISEC, SITE, ICSS, EMM, HWS, IPSJ-CSEC, IPSJ-SPT [detail] |
2021-07-19 15:25 |
Online |
Online |
[Invited Talk]
Data science practice from a legal and ethical perspective
-- A case study of an avatar community application -- Soichiro Morishita (CA) ISEC2021-19 SITE2021-13 BioX2021-20 HWS2021-19 ICSS2021-24 EMM2021-24 |
In social networking services, messages may be monitored before and after with valid consent obtained from the user in o... [more] |
ISEC2021-19 SITE2021-13 BioX2021-20 HWS2021-19 ICSS2021-24 EMM2021-24 pp.56-59 |
BioX, ISEC, SITE, ICSS, EMM, HWS, IPSJ-CSEC, IPSJ-SPT [detail] |
2021-07-19 16:55 |
Online |
Online |
Evaluation on Biometric Template Protection System Based on Somewhat Homomorphic Encryption Hiroto Tamiya, Toshiyuki Isshiki, Kengo Mori (NEC), Satoshi Obana (Hosei Univ.), Tetsushi Ohki (Shizuoka Univ.) ISEC2021-21 SITE2021-15 BioX2021-22 HWS2021-21 ICSS2021-26 EMM2021-26 |
Many biometric template protection systems have been proposed to perform biometric authentication while keeping the biom... [more] |
ISEC2021-21 SITE2021-15 BioX2021-22 HWS2021-21 ICSS2021-26 EMM2021-26 pp.68-73 |
BioX, ISEC, SITE, ICSS, EMM, HWS, IPSJ-CSEC, IPSJ-SPT [detail] |
2021-07-19 17:20 |
Online |
Online |
Consideration on hybrid security of authenticated key exchange FSXY Takeru Kawaguchi, Seijuro Suzuki, Atushi Fujioka, Taro Sasaki (Kanagawa Univ.) ISEC2021-20 SITE2021-14 BioX2021-21 HWS2021-20 ICSS2021-25 EMM2021-25 |
[more] |
ISEC2021-20 SITE2021-14 BioX2021-21 HWS2021-20 ICSS2021-25 EMM2021-25 pp.60-67 |
BioX, ISEC, SITE, ICSS, EMM, HWS, IPSJ-CSEC, IPSJ-SPT [detail] |
2021-07-20 10:55 |
Online |
Online |
A Study of Black-box Adversarial Attack for Face Recognition Systems Vo Ngoc Khoi Nguyen, Takamichi Terada, Masakatsu Nishigaki, Tetsushi Ohki (Shizuoka Univ.) ISEC2021-22 SITE2021-16 BioX2021-23 HWS2021-22 ICSS2021-27 EMM2021-27 |
[more] |
ISEC2021-22 SITE2021-16 BioX2021-23 HWS2021-22 ICSS2021-27 EMM2021-27 pp.74-79 |
BioX, ISEC, SITE, ICSS, EMM, HWS, IPSJ-CSEC, IPSJ-SPT [detail] |
2021-07-20 14:25 |
Online |
Online |
Deep-Learning Based Side-Channel Analysis on Cryptographic Hardware with Masking Countermeasure Kenta Kojima, Akira Ito, Rei Ueno, Naofumi Homma (Tohoku Univ.) ISEC2021-23 SITE2021-17 BioX2021-24 HWS2021-23 ICSS2021-28 EMM2021-28 |
[more] |
ISEC2021-23 SITE2021-17 BioX2021-24 HWS2021-23 ICSS2021-28 EMM2021-28 pp.80-85 |
BioX, ISEC, SITE, ICSS, EMM, HWS, IPSJ-CSEC, IPSJ-SPT [detail] |
2021-07-20 14:50 |
Online |
Online |
Deep Learning Side-Channel Attacks against Unprotected AES and RSM-AES Implemented in ASIC Yuta Fukuda, Kota Yoshida, Hisashi Hashimoto, Takeshi Fujino (Ritsumeikan Univ.) ISEC2021-24 SITE2021-18 BioX2021-25 HWS2021-24 ICSS2021-29 EMM2021-29 |
The cryptographic key can be revealed by exploiting side-channel information such as power traces under operation.
Rec... [more] |
ISEC2021-24 SITE2021-18 BioX2021-25 HWS2021-24 ICSS2021-29 EMM2021-29 pp.86-91 |
BioX, ISEC, SITE, ICSS, EMM, HWS, IPSJ-CSEC, IPSJ-SPT [detail] |
2021-07-20 15:30 |
Online |
Online |
Implimentation of RISC-V TEE using PUF as Root of Trust Kota Yoshida (Ritsumeikan Univ.), Kuniyasu Suzaki (AIST), Takeshi Fujino (Ritsumeikan Univ.) ISEC2021-25 SITE2021-19 BioX2021-26 HWS2021-25 ICSS2021-30 EMM2021-30 |
In society 5.0, acquiring trustworthy data from a huge amount of IoT devices in physical spaces, it is important to veri... [more] |
ISEC2021-25 SITE2021-19 BioX2021-26 HWS2021-25 ICSS2021-30 EMM2021-30 pp.92-97 |
BioX, ISEC, SITE, ICSS, EMM, HWS, IPSJ-CSEC, IPSJ-SPT [detail] |
2021-07-20 15:55 |
Online |
Online |
Evaluation of TRNG Using CMOS Image Sensor Hayato Tatsuno, Tatsuya Oyama, Masayoshi Shirahata, Shunsuke Okura, Takeshi Fujino (Ritsumeikan Univ.) ISEC2021-26 SITE2021-20 BioX2021-27 HWS2021-26 ICSS2021-31 EMM2021-31 |
Recently, the number of IoT devices has been increasing rapidly, and cryptographic functions such as authentication, key... [more] |
ISEC2021-26 SITE2021-20 BioX2021-27 HWS2021-26 ICSS2021-31 EMM2021-31 pp.98-103 |
BioX, ISEC, SITE, ICSS, EMM, HWS, IPSJ-CSEC, IPSJ-SPT [detail] |
2021-07-20 16:20 |
Online |
Online |
Implementation and Evaluation of a Ring Oscillator Type True Random Number Generator (2) Ryuichi Minagawa, KevinHideaki Omae, Kotarou Hayashi, Naoya Torii (Soka Univ.) ISEC2021-27 SITE2021-21 BioX2021-28 HWS2021-27 ICSS2021-32 EMM2021-32 |
A true random number generator (TRNG) is suitable for securing key generation and nonce generation on IoT devices. The r... [more] |
ISEC2021-27 SITE2021-21 BioX2021-28 HWS2021-27 ICSS2021-32 EMM2021-32 pp.104-109 |
BioX, ISEC, SITE, ICSS, EMM, HWS, IPSJ-CSEC, IPSJ-SPT [detail] |
2021-07-20 09:00 |
Online |
Online |
A Study Toward Practical Use of "Emergency Button" Which Enables Crypto Asset Evacuation When Key Loss Natsume Matsuzaki, Yoshihiro Kita (Univ. of Nagasaki) ISEC2021-28 SITE2021-22 BioX2021-29 HWS2021-28 ICSS2021-33 EMM2021-33 |
[more] |
ISEC2021-28 SITE2021-22 BioX2021-29 HWS2021-28 ICSS2021-33 EMM2021-33 pp.110-114 |