|
10:45-10:50 |
Opening Address ( 5 min. ) |
Thu, Nov 9 AM 10:50 - 11:50 |
(1) |
10:50-11:50 |
[Invited Talk]
Security Technologies to Improve Content-Distribution and Broadcasting Services |
Kazuto Ogawa (NICT) |
|
11:50-12:40 |
Break ( 50 min. ) |
Thu, Nov 9 PM 12:40 - 14:45 |
(2) |
12:40-13:05 |
Private-preserving encoding and decoding using variable-length coding schemes |
Yuki Seto, Kunihiko Sadakane, Kazunari Tozawa (UTokyo) |
(3) |
13:05-13:30 |
An Optimization Method for Share Reconstruction in (k,n)-Threshold Secret Sharing Scheme Using Exclusive-OR |
Shogo Naganuma, Yutaro Taki, Shigeru Fujita (CIT) |
(4) |
13:30-13:55 |
Optimum Median-Sum Fingerprinting for Winternitz One-Time Signature |
Motonari Honda, Yuichi Kaji (NU) |
(5) |
13:55-14:20 |
|
|
(6) |
14:20-14:45 |
Improving Triple Sieve Algorithm on Ideal Lattice |
Seishiro Terada, Yuntao Wang, Atsuko Miyaji (Osaka Univ.) |
|
14:45-15:00 |
Break ( 15 min. ) |
Thu, Nov 9 PM 15:00 - 16:30 |
(7) |
15:00-15:05 |
|
(8) |
15:05-15:50 |
[Invited Talk]
What Relationship can "Ethics of Conversations and Social Interactions" Have with "Information Ethics"? |
Masahiko Mizutani (Kyoto Univ.) |
(9) |
15:50-16:05 |
[Invited Talk]
Comment to the invited lecture"Being Together: Ethics of Conversations and Social Interactions" |
Yusuke Nagato (Osaka Univ.) |
(10) |
16:05-16:30 |
|
|
16:30-16:40 |
Break ( 10 min. ) |
Thu, Nov 9 PM 16:40 - 17:35 |
(11) |
16:40-17:05 |
Report of IEEE ISTAS 2023 |
Yusuke Kaneko (JRI) |
(12) |
17:05-17:30 |
Harm Caused by Databases |
Nobuyuki Yoshinaga () |
|
17:30-17:35 |
( 5 min. ) |
Fri, Nov 10 AM 09:50 - 11:10 |
|
09:50-09:55 |
( 5 min. ) |
(13) |
09:55-10:20 |
Proof-of-Concept and Discussion of Self-Management and Utilization of Personal Data in Broadcast Media Services |
Chigusa Yamamura, Takumi Mouri, Yasuhiro Murasaki, Satoshi Fujitsu, Kinji Matsumura (NHK) |
(14) |
10:20-10:45 |
Transaction Access Control Using ERC7303 and Its Applications |
Ko Fujimura (Otsuma Women's Univ.) |
(15) |
10:45-11:10 |
NTP Tunneling Threat Model Verification and Countermeasure |
Shinjisangeru Sugasawa, Hisayoshi Kunimune, Shigeaki Tanimoto (CIT) |
|
11:10-11:20 |
Break ( 10 min. ) |
Fri, Nov 10 AM 11:20 - 12:35 |
(16) |
11:20-11:45 |
Consideration of progressive BKZ by reordering of GramSchmidt vectors |
Katsuya Nakashima, Wang Yuntao, Miyaji Atsuko (Osaka Univ.) |
(17) |
11:45-12:10 |
Secure Identity-Based Authenticated Key Exchange with Multiple Private Key Generators against Malicious Generators |
Kazuma Wariki, Atsushi Fujioka (Kanagawa Univ.), Akira Nagai, Kan Yasuda (NTT) |
(18) |
12:10-12:35 |
Zero-Knowledge Proofs for ownership of Deep Neural Network |
Shungo Sato, Hidema Tanaka (NDA) |
|
12:35-13:35 |
Lunch Break ( 60 min. ) |
Fri, Nov 10 PM 13:35 - 14:50 |
(19) |
13:35-14:00 |
Side-Channel Security Evaluation of ASCON Implementation |
Daisuke Iwasa, Rei Ueno (Tohoku University), Kazuhide Fukushima (KDDI Research, Inc.), Naofumi Homma (Tohoku University) |
(20) |
14:00-14:25 |
A Study on Side-Channel Attacks for Unrolled Implementation of Block Ciphers |
Teppei Higashi, Rei Ueno, Naofumi Homma (Tohoku Univ) |
(21) |
14:25-14:50 |
A Proposed Link Key Hijacking Attack Using the Power-Saving Mode against Bluetooth BR/EDR |
Keiichiro Kimura, Hiroki Kuzuno, Yoshiaki Shiraishi, Masakatu Morii (Kobe Univ.) |
|
14:50-15:00 |
Break ( 10 min. ) |
Fri, Nov 10 PM 15:00 - 16:25 |
(22) |
15:00-15:25 |
The New Ecodesign Regulation in EU
-- Focusing on the Development of “the Right to Repair” -- |
Yusuke Tachibana (FIT) |
(23) |
15:25-15:50 |
Improvements for Enhancing the Reliability of NFTs
-- NFT Challenges and Solutions -- |
Yasushi Nakayama (SBI FERI) |
(24) |
15:50-16:15 |
A Legally Regulatable Stablecoin on a Public Blockchain
-- Four Corners Model for Stablecoin -- |
Hayato Shimamura, Shigeichiro Yamasaki (Kindai Univ.) |
|
16:15-16:25 |
Closing Address ( 10 min. ) |