Mon, Jul 24 AM Chair: Soichiro Morishita (CyberAgent, Inc.) 10:00 - 11:30 |
(1) |
10:00-10:05 |
|
(2) SITE |
10:05-10:35 |
[Invited Talk]
Please fill in this form |
Hideyuki Nakashima (SCU) |
(3) SITE |
10:35-10:50 |
[Invited Talk]
Please fill in this form |
Mai Sugimoto (Kansai Univ.) |
(4) SITE |
10:50-11:05 |
[Invited Talk]
Please fill in this form |
Nobutsugu Kanzaki (Nanzan Univ.) |
(5) |
11:05-11:30 |
|
|
11:30-11:40 |
Break ( 10 min. ) |
Mon, Jul 24 AM 11:40 - 12:40 |
(6) |
11:40-12:40 |
|
|
12:40-14:00 |
Lunch Break ( 80 min. ) |
Mon, Jul 24 PM 14:00 - 15:20 |
(7) |
14:00-14:20 |
|
(8) |
14:20-14:40 |
|
(9) |
14:40-15:00 |
|
(10) |
15:00-15:20 |
|
|
15:20-15:40 |
Break ( 20 min. ) |
Mon, Jul 24 PM 16:00 - 17:00 |
(11) |
16:00-16:20 |
|
(12) |
16:20-16:40 |
|
(13) |
16:40-17:00 |
|
|
17:00-17:20 |
Break ( 20 min. ) |
Mon, Jul 24 PM 17:20 - 18:40 |
(14) |
17:20-17:40 |
|
(15) |
17:40-18:00 |
|
(16) |
18:00-18:20 |
|
(17) |
18:20-18:40 |
|
Mon, Jul 24 PM 14:00 - 15:40 |
(18) HWS |
14:00-14:20 |
Non-profiled Side-channel Attacks by using Clustering Scores in Deep Learning model (1)
-- Attacks by using Auto Encoder against hardware-implemented AES -- |
Mizuki Nagahisa, Fukuda Yuta, Yoshida Kota, Fujino Takeshi (Ristumei Univ) |
(19) HWS |
14:20-14:40 |
Non-profiled Side-Channel Attacks by using Clustering Scores in Deep Learning model (2)
-- Attacks by using Models to Predict Ciphertext against Hardware-implemented AES with Countermeasures -- |
Yuta Fukuda, Kota Yoshida, Takeshi Fujino (Ritsumeikan Univ.) |
(20) HWS |
14:40-15:00 |
Improving Non-profiled DL-based Side-Channel Attack Using Multiple Partial Key Difference Estimation |
Rikuma Tanaka, Rei Ueno (Tohoku Univ.), Akira Ito (NTT), Naofumi Homma (Tohoku Univ.) |
(21) HWS |
15:00-15:20 |
Tolerance Evaluation Cost Reduction of Deep-Learning-Based Side-Channel Attack Using Signal-to-Noise Ratio of Leakage Traces |
Tatsuya Sakagami, Masaki Himuro, Kengo Iokibe, Yoshitaka Toyota (Okayama Univ.) |
(22) HWS |
15:20-15:40 |
Deep Learning-Based Side-Channel Analysis Considering the Effect of Noise and Transfer Characteristics on the Measurement Process |
Yoshiki Kitamura, Taiki Kitazawa, Yuichi Hayashi (NAIST) |
|
15:40-16:00 |
Break ( 20 min. ) |
Mon, Jul 24 PM 16:00 - 17:00 |
(23) ICSS |
16:00-16:20 |
Analysis of effective attribute values on risk-based authentication with browser fingerprint |
Takashi Tsukazaki, Yuichi Futa (TUT), Hiroyuki Okazaki, Hikofumi Suzuki (Shinshu Univ.) |
|
- |
|
|
- |
|
Mon, Jul 24 PM 17:20 - 18:20 |
(24) |
17:20-17:40 |
|
(25) |
17:40-18:00 |
|
(26) |
18:00-18:20 |
|
Mon, Jul 24 PM 18:20 - 18:40 |
(27) SITE |
18:20-18:40 |
International regulatory trend survey report on AI
-- Status of the European Parliament's consideration of the AI Act in the EU -- |
Naonori Kato (KDDI Research/NFI/RIKEN), Yosuke Murakami, Minoru Kozu (KDDI Research) |
Mon, Jul 24 PM Chair: Atsushi Takayasu (The University of Tokyo) 14:00 - 15:40 |
(28) ISEC |
14:00-14:20 |
Key Generation by Secure Computation of ID-NIKS based on Discrete Logarithm Problem over Composite Modulus |
Hayato Inoue, Mizuki Miki, Yasuyuki Murakami (OECU) |
(29) ISEC |
14:20-14:40 |
A Generic Construction of Outsider Anonymous Broadcast Encryption with Keyword Search |
Keita Emura (NICT), Kaisei Kajita, Go Ohtake (NHK) |
(30) ISEC |
14:40-15:00 |
Hierarchical Identity-based Matchmaking Encryption |
Sohto Chiku (YNU), Keisuke Hara (AIST/YNU), Junji Shikata (YNU) |
(31) ISEC |
15:00-15:20 |
Note on the Robustness of Single Sign-On Algorithm Based on Verifiable Encryption |
Chihiro Okubo, Satoshi Iriyama, Maki Kihara (TUS) |
(32) ISEC |
15:20-15:40 |
Threshold ring signature based on isogeny |
Naho Isogai, Takeshi Nakai, Koutarou Suzuki (TUT) |
|
15:40-16:00 |
Break ( 20 min. ) |
Mon, Jul 24 PM 16:00 - 17:00 |
(33) EMM |
16:00-16:20 |
Estimation of rotation angle using pilot signal for image watermarking |
Rinka Kawano, Masaki Kawamura (Yamaguchi Univ.) |
(34) EMM |
16:20-16:40 |
A Random Ensemble Method with Encrypted Models for Improving Robustness against Adversarial Examples |
Ryota Iijima, Miki Tanaka, Sayaka Shiota, Hitoshi Kiya (Tokyo Metro. Univ.) |
(35) EMM |
16:40-17:00 |
Novel Image authentication scheme using error correction code and digital signature |
Ken-ichi Sakina (QRTechnology) |
|
17:00-17:20 |
Break ( 20 min. ) |
Mon, Jul 24 PM Chair: Keita Emura (NICT) 17:20 - 18:40 |
(36) ISEC |
17:20-17:40 |
An Identity-based Signature Scheme with Tight Security Reduction |
Jiawei Chen, Hyungrok Jo, Shingo Sato, Junji Shikata (YNU) |
(37) ISEC |
17:40-18:00 |
Statistical Key Recovery Attack Against the Peregrine Lattice-Based Signature Scheme |
Moeto Suzuki (Kyoto Univ.), Xiuhan Lin (Shandong Univ.), Shiduo Zhang (Tsinghua Univ.), Thomas Espitau (PQShield), Yang Yu (Tsinghua Univ.), Mehdi Tibouchi, Masayuki Abe (NTT) |
(38) ISEC |
18:00-18:20 |
A security analysis on MQ-Sign submitted to Korean Post-Quantum Cryptography standardization |
Yasuhiko Ikematsu (Kyushu Univ.), Hyungrok Jo (YNU), Takanori Yasuda (OUS) |
(39) ISEC |
18:20-18:40 |
Implementation of Shor's algorithm for the discrete logarithm problem and experiments using the quantum computer simulator |
Kaito Kishi, Junpei Yamaguchi, Tetsuya Izu (Fujitsu Research), Noboru Kunihiro (Univ. of Tsukuba) |
Tue, Jul 25 AM 09:00 - 10:00 |
(40) |
09:00-09:20 |
|
(41) |
09:20-09:40 |
|
(42) |
09:40-10:00 |
|
|
10:00-10:40 |
Break ( 40 min. ) |
Tue, Jul 25 AM 11:00 - 10:40 |
Mon, Jul 24 PM 16:00 - 17:00 |
|
- |
|
(43) ICSS |
16:20-16:40 |
Analysis of Snort's impact due to DDoS attacks |
Kano Yuki, Yuichi Futa (TUT), Okazaki Hiroyuki, Suzuki Hikofumi (SHINSYU UNIVERSITY) |
(44) ICSS |
16:40-17:00 |
A Multiple Vantage Point-based Concept for Open-Source Information Space Awareness |
Blumbergs Bernhards (NAIST) |
Tue, Jul 25 PM 13:20 - 14:20 |
(45) HWS |
13:20-14:20 |
|
|
|
14:20-14:30 |
Break ( 10 min. ) |
Tue, Jul 25 PM 14:30 - 15:50 |
(46) |
14:30-14:50 |
|
(47) |
14:50-15:10 |
|
(48) |
15:10-15:30 |
|
(49) |
15:30-15:50 |
|
Tue, Jul 25 AM 09:00 - 10:40 |
(50) BioX |
09:00-09:20 |
CNN-Based Iris Recognition Using Multi-spectral Iris Images |
Ryosuke Kuroda, Tetsuya Honda, Hironobu Takano (Toyama Prefectural Univ.) |
(51) BioX |
09:20-09:40 |
Automatic Credential Entry EMS: EMS System that reproduces Secret Information without exposing biometric data |
Takumi Takaiwa, Nozaki Shinnosuke, Numada Kota, Shibata Tsubasa, Okumura Sana, Takigawa Soichi, Ohki Tetsushi, Nishigaki Masakatsu (Shizuoka Univ.) |
(52) HWS |
09:40-10:00 |
Implementation and Evaluation of Payload Encryption and Message Authentication Code Using Lightweight Cryptography ASCON in CAN FD Communication |
Kotaro Ishikawa, Naoto Kawahara (Okayama Univ.), Takuya Kusaka (Shimane Univ.), Yuta Kodera, Yasuyuki Nogami (Okayama Univ.) |
(53) HWS |
10:00-10:20 |
An Implementation and Evaluation of Communication Schemes Using Authenticated Cryptography for MAVLink Communication |
Ryuto Kuwada, Nobuya Ishihara, Yuta Kodera, Yasuyuki Nogami (Okayama Univ.) |
(54) HWS |
10:20-10:40 |
|
Takayuki Kondo, Taiki Kitazawa, Shugo Kaji, Daisuke Fujimoto, Yuichi Hayashi (NAIST) |
|
10:40-11:00 |
Break ( 20 min. ) |
Tue, Jul 25 AM 11:00 - 12:00 |
(55) HWS |
11:00-11:20 |
An Approach to Authorization Protocol Using PUF-based Access Token |
Risa Yashiro, Kohei Isobe, Hiroki Kunii (SECOM) |
(56) HWS |
11:20-11:40 |
Secure Cryptographic Unit with built-in Signature Generation Hardware for Aggregate Signature Schemes and its FPGA Implementation |
Toshihiro Sato, Shohei Kawasaki (SCU), Kaoru Masada (Tokyo Univ.), Riku Anzai, Junichi Sakamoto, Naoki Yoshida (YNU), Yasuyoshi Uemura (SCU), Makoto Ikeda (Tokyo Univ.), Tsutomu Matsumoto (YNU) |
(57) HWS |
11:40-12:00 |
Clone Resistance of Artifact Metrics: Spatial Frequency Filtering |
Akira Iwahashi, Iwaki Miyamoto, Naoki Yoshida, Tsutomu Matsumoto (YNU) |
|
12:00-13:20 |
Lunch Break ( 80 min. ) |
Tue, Jul 25 PM 14:30 - 15:10 |
(58) |
14:30-14:50 |
|
(59) |
14:50-15:10 |
|
Tue, Jul 25 AM Chair: Takahiro Matsuda (AIST) 09:00 - 10:40 |
(60) ISEC |
09:00-09:20 |
Side-Channel Attacks on Unrolled Implementation of Trivium |
Soichiro Kobayashi, Rei Ueno (Tohoku Univ.), Yosuke Todo (NTT), Naofumi Homma (Tohoku Univ.) |
(61) ISEC |
09:20-09:40 |
SAT-based Differential analysis of AEGIS Family |
Takuro Shiraya (UOH), Kosei Sakamoto (Mitsubishi Electric), Takanori Isobe (UOH) |
(62) ISEC |
09:40-10:00 |
SAT-based Search of Related-key Impossible Distinguisher for Piccolo, TWINE, LBlock |
Shion Utsumi (Univ. of Hyogo), Kosei Sakamoto (MELCO), Takanori Isobe (Univ. of Hyogo) |
(63) ISEC |
10:00-10:20 |
Higher Order Differential Property of Block Cipher LBC-3 |
Naoki Shibayama, Yasutaka Igarashi (Tokyo Univ. of Science) |
(64) ISEC |
10:20-10:40 |
On the Maximum Differential Characteristic Probabilities for Multi-Branch Structures |
Kazuma Taka (Hyogo Univ.), Kosei Sakamoto (Mitsubishi Electric), Takanori Isobe (Hyogo Univ.) |
|
10:40-11:00 |
Break ( 20 min. ) |
Tue, Jul 25 AM Chair: Takushi Otani (Kibi International Univ.) 11:00 - 11:40 |
(65) SITE |
11:00-11:20 |
Is Copying for Information Security Research ‘Fair Use’?
-- Apple Inc. v. Corellium, Inc., No. 21-12835 (11th Cir. 2023) -- |
Yusuke Tachibana (FIT) |
(66) SITE |
11:20-11:40 |
A Study on the Application of Nudge to Improve Cybersecurity |
Hideyuki Fujii (NRI Secure) |
|
11:40-13:00 |
Lunch Break ( 80 min. ) |
Tue, Jul 25 PM Chair: Kotaro Suzuki (TUT) 14:30 - 15:30 |
(67) ISEC |
14:30-14:50 |
Security Analysis on Nostr protocol for decentralized SNS |
Hayato Kimura, Takanori Isobe (Univ. Hyogo) |
(68) ISEC |
14:50-15:10 |
Anomaly detection with dataset including replay-attack communication |
Koushi Nishi, Futa Yuichi (TUT), Okazaki Hiroyuki (Shinshu University) |
(69) ISEC |
15:10-15:30 |
Extended $k^m$-anonymity for randomization |
Masaya Kobayashi, Atsushi Fujioka (Kanagawa Univ.), Koji Chida (Gunma Univ.) |