Tue, Jul 19 AM Special Session 09:00 - 11:30 |
(1) |
09:00-09:05 |
Opening talk |
(2) |
09:05-09:20 |
|
(3) |
09:20-09:35 |
|
(4) |
09:35-09:50 |
|
|
09:50-10:00 |
Break ( 10 min. ) |
(5) |
10:00-10:40 |
|
|
10:40-10:50 |
Break ( 10 min. ) |
(6) |
10:50-11:30 |
|
|
11:30-13:00 |
Lunch Break ( 90 min. ) |
Tue, Jul 19 PM HWS1(Track 1) 13:00 - 14:40 |
(7) HWS |
13:00-13:25 |
Side-Channel Attacks on Post-Quantum KEMs Using Multi-class Classification Neural Network |
Yutaro Tanaka, Rei Ueno (Tohoku Univ.), Keita Xagawa, Akitra Ito, Junko Takahashi (NTT), Naofumi Homma (Tohoku Univ.) |
(8) HWS |
13:25-13:50 |
Revisit of Non Profiled Side Channel Analysis via Deep Learning |
Kentaro Imafuku, Shinichi Kawamura, Hanae Nozaki, Junichi Sakamoto, Saki Osuka (AIST) |
(9) HWS |
13:50-14:15 |
Randomness evaluation of TERO-based TRNG with a side-channel attack countermeasure |
Saki Osuka (AIST), Daisuke Fujimoto, Yuichi Hayashi (NAIST), Shinichi Kawamura (AIST) |
(10) HWS |
14:15-14:40 |
A Study for Predicting Correlation Power Analysis Results by Using High-SNR Plaintexts Selected Based on Linear Leakage Model |
Masaki Himuro, Kengo Iokibe, Yoshitaka Toyota (Okayama Univ.) |
|
14:40-14:50 |
Break ( 10 min. ) |
Tue, Jul 19 PM HWS2(Track 1) 14:50 - 16:05 |
(11) HWS |
14:50-15:15 |
Issues and Considerations for Improvement of Verification in ECDSA Attestation of Intel SGX |
Yagawa Takashi (Tsukuba Univ.), Suzaki Kuniyasu, Teruya Tadanori, Ohara Kazuma (AIST), Abe Hirotake (Tsukuba Univ.) |
(12) HWS |
15:15-15:40 |
Revealing PUF Responses by Differential Power Analysis against Reed-Muller-Code-based Fuzzy Extractor |
Soma Watanabe, Yuta Fukuda, Tatsuya Oyama, Kota Yoshida, Takeshi Fujino (Ritsumeikan Univ) |
(13) HWS |
15:40-16:05 |
Security of Systems that Automatically Authenticate a User's Credentials and Location using Wireless Technology |
Kazuki Tachibana, Junichi Sakamoto, Tsutomu Matsumoto (YNU) |
|
16:05-16:15 |
Break ( 10 min. ) |
Tue, Jul 19 PM HWS3(Track 1) 16:15 - 17:30 |
(14) HWS |
16:15-16:40 |
Security Assessment and Countermeasures for Magnetic Malfunction of Electromagnetic Relays |
Takumi Owada, Kazuki Tachibana, Tsutomu Matsumoto (YNU) |
(15) HWS |
16:40-17:05 |
Distance Spoofing Detection by LiDAR and Stereo Camera |
Ataru Kubo, Yuki Fukatsu, Naoki Yoshida, Tsutomu Matsumoto (YNU) |
(16) HWS |
17:05-17:30 |
Security Evaluation of Cryptographic Circuits with Laser Sensors by Double-Spot Laser Irradiation |
Masaki Chikano, Naoki Yoshida, Junichi Sakamoto, Syungo Hayashi, Tsutomu Matsumoto (YNU) |
Tue, Jul 19 PM CSEC1 (Track 2) 13:00 - 14:40 |
(17) |
13:00-13:25 |
|
(18) |
13:25-13:50 |
|
(19) |
13:50-14:15 |
|
(20) |
14:15-14:40 |
|
|
14:40-14:50 |
Break ( 10 min. ) |
Tue, Jul 19 PM CSEC2 (Track 2) 14:50 - 15:40 |
(21) |
14:50-15:15 |
|
(22) |
15:15-15:40 |
|
|
15:40-16:15 |
Break ( 35 min. ) |
Tue, Jul 19 PM CSEC3 (Track 2) 16:15 - 17:30 |
(23) |
16:15-16:40 |
|
(24) |
16:40-17:05 |
|
(25) |
17:05-17:30 |
|
Wed, Jul 20 AM Invited Lecture 09:00 - 10:00 |
(26) EMM |
09:00-10:00 |
[Invited Talk]
Audio forensics and recording property estimation |
Akira Nishimura (TUIS) |
|
10:00-10:15 |
Break ( 15 min. ) |
Wed, Jul 20 AM BioX (Track 1) 10:15 - 11:55 |
(27) BioX |
10:15-10:40 |
Person Verification Using Evoked EEG by Ultrasound
-- Examination of Correlation in Fusing Features -- |
Yuta Ishikawa, Kotaro Mukai, Isao Nakanishi (Tottori Univ.) |
(28) BioX |
10:40-11:05 |
Person Verification Using EEG Evoked by Ultrasound
-- Introduction of mutual features between electrodes -- |
Kotaro Mukai, Isao Nakanishi (Tottori Univ.) |
(29) BioX |
11:05-11:30 |
A Study on Biometric Modality for Continuous Authentication of Smart Devices |
Yuka Watanabe, Yasushi Yamazaki (Kitakyushu Univ.) |
(30) BioX |
11:30-11:55 |
Person verification using evoked EEG from imperceptible vibratory stimulation
-- Introduction of normalization into EEG spectral content ratio -- |
Hiroki Kobayashi, Hirotomo Nakashima, Isao Nakanishi (Tottori Univ.) |
|
11:55-13:00 |
Break ( 65 min. ) |
Wed, Jul 20 PM SITE (Track 1) 13:00 - 14:15 |
(31) SITE |
13:00-13:25 |
Investigation of credit card fraud model and deterrence method on SNS |
Zhixian Zhao, Shigeyuki Osada (JRI) |
(32) SITE |
13:25-13:50 |
What type of document is CWA (CEN Workshop Agreement) in European Committee for Standardization |
Takushi Otani (Kibi International Univ.) |
(33) SITE |
13:50-14:15 |
An overview of the secrecy of patent applications in the Japanese Law |
Makoto Koike (MK Microwave) |
|
14:15-14:25 |
Break ( 10 min. ) |
Wed, Jul 20 PM 14:25 - 15:15 |
(34) ICSS |
14:25-14:50 |
Cryptocurrency Analysis System for Investigating Cyber Crime Economy |
Hiroshi Mori, Hiroshi Kumagai, Yin Minn Pa Pa, Yuta Takata, Ryoya Furukawa, Yuji Sakurai, Masaki Kamizono (DTCY) |
(35) ICSS |
14:50-15:15 |
Distributed Random Number Generation Method on Smart Contracts |
Kentaro Sako (Waseda Univ), Shin'ichiro Matsuo (Georgetown Univ), Tatsuya Mori (Waseda Univ) |
|
15:15-15:25 |
Break ( 10 min. ) |
Wed, Jul 20 PM ISEC (Track1) Chair: Yoshikazu Hanatani (Toshiba) 15:25 - 17:05 |
(36) ISEC |
15:25-15:50 |
An Efficient Sparse Multiplication Algorithm For Pairing-Friendly Elliptic Curves With Cubic Twist |
Daiki Hayashida, Kenichiro Hayasaka (Mitsubishi Electric Corp.), Tadanori Teruya (AIST) |
(37) ISEC |
15:50-16:15 |
Revocable Identity-Based Encryption With Multiple Private-Key Generators secure against Chosen Ciphertext Attacks and Decryption Key Exposure |
Yudai Suzuki, Atsushi Fujioka, Taroh Sasaki (Kanagawa Univ.), Akira Nagai (NTT) |
(38) ISEC |
16:15-16:40 |
Identification and tracking of website users in consideration of privacy in browser fingerprinting |
Takashi Tsukazaki, Yuichi Futa (TUT), Tomomichi Suzuki (PitApp), Hiroyuki Okazaki (Shinshu Univ.) |
(39) ISEC |
16:40-17:05 |
Efficient Constructions of Adaptively and CCA-secure Identity-based Encryption with Equality Test from LWE Assumption in the Standard Model |
Kyoichi Asano (UEC/NICT), Keita Emura (NICT), Atsushi Takayasu (Univ. Tokyo) |
Wed, Jul 20 AM CSEC4 (Track 2) 10:15 - 11:30 |
(40) |
10:15-10:40 |
|
(41) |
10:40-11:05 |
|
(42) |
11:05-11:30 |
|
|
11:30-13:00 |
Lunch Break ( 90 min. ) |
Wed, Jul 20 PM SPT (Track 2) 13:00 - 13:50 |
(43) |
13:00-13:25 |
|
(44) |
13:25-13:50 |
|
|
13:50-14:25 |
Break ( 35 min. ) |
Wed, Jul 20 PM PWS Special Session (Track2) 14:25 - 15:30 |
(45) |
14:25-15:30 |
|