Mon, Jul 24 AM Chair: Soichiro Morishita (CyberAgent, Inc.) 10:00 - 11:30 |
(1) |
10:00-10:05 |
|
(2) SITE |
10:05-10:35 |
[Invited Talk]
Please fill in this form |
Hideyuki Nakashima (SCU) |
(3) SITE |
10:35-10:50 |
[Invited Talk]
Please fill in this form |
Mai Sugimoto (Kansai Univ.) |
(4) SITE |
10:50-11:05 |
[Invited Talk]
Please fill in this form |
Nobutsugu Kanzaki (Nanzan Univ.) |
(5) |
11:05-11:30 |
|
|
11:30-11:40 |
Break ( 10 min. ) |
Mon, Jul 24 AM 11:40 - 12:40 |
(6) |
11:40-12:40 |
|
|
12:40-14:00 |
Lunch Break ( 80 min. ) |
Mon, Jul 24 PM 14:00 - 15:20 |
(7) |
14:00-14:20 |
|
(8) |
14:20-14:40 |
|
(9) |
14:40-15:00 |
|
(10) |
15:00-15:20 |
|
|
15:20-15:40 |
Break ( 20 min. ) |
Mon, Jul 24 PM 16:00 - 17:00 |
(11) |
16:00-16:20 |
|
(12) |
16:20-16:40 |
|
(13) |
16:40-17:00 |
|
|
17:00-17:20 |
Break ( 20 min. ) |
Mon, Jul 24 PM 17:20 - 18:40 |
(14) |
17:20-17:40 |
|
(15) |
17:40-18:00 |
|
(16) |
18:00-18:20 |
|
(17) |
18:20-18:40 |
|
Mon, Jul 24 PM 14:00 - 15:40 |
(18) HWS |
14:00-14:20 |
Non-profiled Side-channel Attacks by using Clustering Scores in Deep Learning model (1)
-- Attacks by using Auto Encoder against hardware-implemented AES -- ISEC2023-14 SITE2023-8 BioX2023-17 HWS2023-14 ICSS2023-11 EMM2023-14 |
Mizuki Nagahisa, Fukuda Yuta, Yoshida Kota, Fujino Takeshi (Ristumei Univ) |
(19) HWS |
14:20-14:40 |
Non-profiled Side-Channel Attacks by using Clustering Scores in Deep Learning model (2)
-- Attacks by using Models to Predict Ciphertext against Hardware-implemented AES with Countermeasures -- ISEC2023-15 SITE2023-9 BioX2023-18 HWS2023-15 ICSS2023-12 EMM2023-15 |
Yuta Fukuda, Kota Yoshida, Takeshi Fujino (Ritsumeikan Univ.) |
(20) HWS |
14:40-15:00 |
Improving Non-profiled DL-based Side-Channel Attack Using Multiple Partial Key Difference Estimation ISEC2023-16 SITE2023-10 BioX2023-19 HWS2023-16 ICSS2023-13 EMM2023-16 |
Rikuma Tanaka, Rei Ueno (Tohoku Univ.), Akira Ito (NTT), Naofumi Homma (Tohoku Univ.) |
(21) HWS |
15:00-15:20 |
Tolerance Evaluation Cost Reduction of Deep-Learning-Based Side-Channel Attack Using Signal-to-Noise Ratio of Leakage Traces ISEC2023-17 SITE2023-11 BioX2023-20 HWS2023-17 ICSS2023-14 EMM2023-17 |
Tatsuya Sakagami, Masaki Himuro, Kengo Iokibe, Yoshitaka Toyota (Okayama Univ.) |
(22) HWS |
15:20-15:40 |
Deep Learning-Based Side-Channel Analysis Considering the Effect of Noise and Transfer Characteristics on the Measurement Process ISEC2023-18 SITE2023-12 BioX2023-21 HWS2023-18 ICSS2023-15 EMM2023-18 |
Yoshiki Kitamura, Taiki Kitazawa, Yuichi Hayashi (NAIST) |
|
15:40-16:00 |
Break ( 20 min. ) |
Mon, Jul 24 PM 16:00 - 17:00 |
(23) ICSS |
16:00-16:20 |
Analysis of effective attribute values on risk-based authentication with browser fingerprint ISEC2023-19 SITE2023-13 BioX2023-22 HWS2023-19 ICSS2023-16 EMM2023-19 |
Takashi Tsukazaki, Yuichi Futa (TUT), Hiroyuki Okazaki, Hikofumi Suzuki (Shinshu Univ.) |
|
- |
|
|
- |
|
Mon, Jul 24 PM 17:20 - 18:20 |
(24) |
17:20-17:40 |
|
(25) |
17:40-18:00 |
|
(26) |
18:00-18:20 |
|
Mon, Jul 24 PM 18:20 - 18:40 |
(27) SITE |
18:20-18:40 |
International regulatory trend survey report on AI
-- Status of the European Parliament's consideration of the AI Act in the EU -- ISEC2023-20 SITE2023-14 BioX2023-23 HWS2023-20 ICSS2023-17 EMM2023-20 |
Naonori Kato (KDDI Research/NFI/RIKEN), Yosuke Murakami, Minoru Kozu (KDDI Research) |
Mon, Jul 24 PM Chair: Atsushi Takayasu (The University of Tokyo) 14:00 - 15:40 |
(28) ISEC |
14:00-14:20 |
Key Generation by Secure Computation of ID-NIKS based on Discrete Logarithm Problem over Composite Modulus ISEC2023-21 SITE2023-15 BioX2023-24 HWS2023-21 ICSS2023-18 EMM2023-21 |
Hayato Inoue, Mizuki Miki, Yasuyuki Murakami (OECU) |
(29) ISEC |
14:20-14:40 |
A Generic Construction of Outsider Anonymous Broadcast Encryption with Keyword Search ISEC2023-22 SITE2023-16 BioX2023-25 HWS2023-22 ICSS2023-19 EMM2023-22 |
Keita Emura (NICT), Kaisei Kajita, Go Ohtake (NHK) |
(30) ISEC |
14:40-15:00 |
Hierarchical Identity-based Matchmaking Encryption ISEC2023-23 SITE2023-17 BioX2023-26 HWS2023-23 ICSS2023-20 EMM2023-23 |
Sohto Chiku (YNU), Keisuke Hara (AIST/YNU), Junji Shikata (YNU) |
(31) ISEC |
15:00-15:20 |
Note on the Robustness of Single Sign-On Algorithm Based on Verifiable Encryption ISEC2023-24 SITE2023-18 BioX2023-27 HWS2023-24 ICSS2023-21 EMM2023-24 |
Chihiro Okubo, Satoshi Iriyama, Maki Kihara (TUS) |
(32) ISEC |
15:20-15:40 |
Threshold ring signature based on isogeny ISEC2023-25 SITE2023-19 BioX2023-28 HWS2023-25 ICSS2023-22 EMM2023-25 |
Naho Isogai, Takeshi Nakai, Koutarou Suzuki (TUT) |
|
15:40-16:00 |
Break ( 20 min. ) |
Mon, Jul 24 PM 16:00 - 17:00 |
(33) EMM |
16:00-16:20 |
Estimation of rotation angle using pilot signal for image watermarking ISEC2023-26 SITE2023-20 BioX2023-29 HWS2023-26 ICSS2023-23 EMM2023-26 |
Rinka Kawano, Masaki Kawamura (Yamaguchi Univ.) |
(34) EMM |
16:20-16:40 |
A Random Ensemble Method with Encrypted Models for Improving Robustness against Adversarial Examples ISEC2023-27 SITE2023-21 BioX2023-30 HWS2023-27 ICSS2023-24 EMM2023-27 |
Ryota Iijima, Miki Tanaka, Sayaka Shiota, Hitoshi Kiya (Tokyo Metro. Univ.) |
(35) EMM |
16:40-17:00 |
Novel Image authentication scheme using error correction code and digital signature ISEC2023-28 SITE2023-22 BioX2023-31 HWS2023-28 ICSS2023-25 EMM2023-28 |
Ken-ichi Sakina (QRTechnology) |
|
17:00-17:20 |
Break ( 20 min. ) |
Mon, Jul 24 PM Chair: Keita Emura (NICT) 17:20 - 18:40 |
(36) ISEC |
17:20-17:40 |
An Identity-based Signature Scheme with Tight Security Reduction ISEC2023-29 SITE2023-23 BioX2023-32 HWS2023-29 ICSS2023-26 EMM2023-29 |
Jiawei Chen, Hyungrok Jo, Shingo Sato, Junji Shikata (YNU) |
(37) ISEC |
17:40-18:00 |
Statistical Key Recovery Attack Against the Peregrine Lattice-Based Signature Scheme ISEC2023-30 SITE2023-24 BioX2023-33 HWS2023-30 ICSS2023-27 EMM2023-30 |
Moeto Suzuki (Kyoto Univ.), Xiuhan Lin (Shandong Univ.), Shiduo Zhang (Tsinghua Univ.), Thomas Espitau (PQShield), Yang Yu (Tsinghua Univ.), Mehdi Tibouchi, Masayuki Abe (NTT) |
(38) ISEC |
18:00-18:20 |
A security analysis on MQ-Sign submitted to Korean Post-Quantum Cryptography standardization ISEC2023-31 SITE2023-25 BioX2023-34 HWS2023-31 ICSS2023-28 EMM2023-31 |
Yasuhiko Ikematsu (Kyushu Univ.), Hyungrok Jo (YNU), Takanori Yasuda (OUS) |
(39) ISEC |
18:20-18:40 |
Implementation of Shor's algorithm for the discrete logarithm problem and experiments using the quantum computer simulator ISEC2023-32 SITE2023-26 BioX2023-35 HWS2023-32 ICSS2023-29 EMM2023-32 |
Kaito Kishi, Junpei Yamaguchi, Tetsuya Izu (Fujitsu Research), Noboru Kunihiro (Univ. of Tsukuba) |
Tue, Jul 25 AM 09:00 - 10:00 |
(40) |
09:00-09:20 |
|
(41) |
09:20-09:40 |
|
(42) |
09:40-10:00 |
|
|
10:00-10:40 |
Break ( 40 min. ) |
Tue, Jul 25 AM 11:00 - 10:40 |
Mon, Jul 24 PM 16:00 - 17:00 |
|
- |
|
(43) ICSS |
16:20-16:40 |
Analysis of Snort's impact due to DDoS attacks ISEC2023-33 SITE2023-27 BioX2023-36 HWS2023-33 ICSS2023-30 EMM2023-33 |
Kano Yuki, Yuichi Futa (TUT), Okazaki Hiroyuki, Suzuki Hikofumi (SHINSYU UNIVERSITY) |
(44) ICSS |
16:40-17:00 |
A Multiple Vantage Point-based Concept for Open-Source Information Space Awareness ISEC2023-34 SITE2023-28 BioX2023-37 HWS2023-34 ICSS2023-31 EMM2023-34 |
Blumbergs Bernhards (NAIST) |
Tue, Jul 25 PM 13:20 - 14:20 |
(45) HWS |
13:20-14:20 |
ISEC2023-35 SITE2023-29 BioX2023-38 HWS2023-35 ICSS2023-32 EMM2023-35 |
|
|
14:20-14:30 |
Break ( 10 min. ) |
Tue, Jul 25 PM 14:30 - 15:50 |
(46) |
14:30-14:50 |
|
(47) |
14:50-15:10 |
|
(48) |
15:10-15:30 |
|
(49) |
15:30-15:50 |
|
Tue, Jul 25 AM 09:00 - 10:40 |
(50) BioX |
09:00-09:20 |
CNN-Based Iris Recognition Using Multi-spectral Iris Images ISEC2023-36 SITE2023-30 BioX2023-39 HWS2023-36 ICSS2023-33 EMM2023-36 |
Ryosuke Kuroda, Tetsuya Honda, Hironobu Takano (Toyama Prefectural Univ.) |
(51) BioX |
09:20-09:40 |
Automatic Credential Entry EMS: EMS System that reproduces Secret Information without exposing biometric data ISEC2023-37 SITE2023-31 BioX2023-40 HWS2023-37 ICSS2023-34 EMM2023-37 |
Takumi Takaiwa, Nozaki Shinnosuke, Numada Kota, Shibata Tsubasa, Okumura Sana, Takigawa Soichi, Ohki Tetsushi, Nishigaki Masakatsu (Shizuoka Univ.) |
(52) HWS |
09:40-10:00 |
Implementation and Evaluation of Payload Encryption and Message Authentication Code Using Lightweight Cryptography ASCON in CAN FD Communication ISEC2023-38 SITE2023-32 BioX2023-41 HWS2023-38 ICSS2023-35 EMM2023-38 |
Kotaro Ishikawa, Naoto Kawahara (Okayama Univ.), Takuya Kusaka (Shimane Univ.), Yuta Kodera, Yasuyuki Nogami (Okayama Univ.) |
(53) HWS |
10:00-10:20 |
An Implementation and Evaluation of Communication Schemes Using Authenticated Cryptography for MAVLink Communication ISEC2023-39 SITE2023-33 BioX2023-42 HWS2023-39 ICSS2023-36 EMM2023-39 |
Ryuto Kuwada, Nobuya Ishihara, Yuta Kodera, Yasuyuki Nogami (Okayama Univ.) |
(54) HWS |
10:20-10:40 |
ISEC2023-40 SITE2023-34 BioX2023-43 HWS2023-40 ICSS2023-37 EMM2023-40 |
Takayuki Kondo, Taiki Kitazawa, Shugo Kaji, Daisuke Fujimoto, Yuichi Hayashi (NAIST) |
|
10:40-11:00 |
Break ( 20 min. ) |
Tue, Jul 25 AM 11:00 - 12:00 |
(55) HWS |
11:00-11:20 |
An Approach to Authorization Protocol Using PUF-based Access Token ISEC2023-41 SITE2023-35 BioX2023-44 HWS2023-41 ICSS2023-38 EMM2023-41 |
Risa Yashiro, Kohei Isobe, Hiroki Kunii (SECOM) |
(56) HWS |
11:20-11:40 |
Secure Cryptographic Unit with built-in Signature Generation Hardware for Aggregate Signature Schemes and its FPGA Implementation ISEC2023-42 SITE2023-36 BioX2023-45 HWS2023-42 ICSS2023-39 EMM2023-42 |
Toshihiro Sato, Shohei Kawasaki (SCU), Kaoru Masada (Tokyo Univ.), Riku Anzai, Junichi Sakamoto, Naoki Yoshida (YNU), Yasuyoshi Uemura (SCU), Makoto Ikeda (Tokyo Univ.), Tsutomu Matsumoto (YNU) |
(57) HWS |
11:40-12:00 |
Clone Resistance of Artifact Metrics: Spatial Frequency Filtering ISEC2023-43 SITE2023-37 BioX2023-46 HWS2023-43 ICSS2023-40 EMM2023-43 |
Akira Iwahashi, Iwaki Miyamoto, Naoki Yoshida, Tsutomu Matsumoto (YNU) |
|
12:00-13:20 |
Lunch Break ( 80 min. ) |
Tue, Jul 25 PM 14:30 - 15:10 |
(58) |
14:30-14:50 |
|
(59) |
14:50-15:10 |
|
Tue, Jul 25 AM Chair: Takahiro Matsuda (AIST) 09:00 - 10:40 |
(60) ISEC |
09:00-09:20 |
Side-Channel Attacks on Unrolled Implementation of Trivium ISEC2023-44 SITE2023-38 BioX2023-47 HWS2023-44 ICSS2023-41 EMM2023-44 |
Soichiro Kobayashi, Rei Ueno (Tohoku Univ.), Yosuke Todo (NTT), Naofumi Homma (Tohoku Univ.) |
(61) ISEC |
09:20-09:40 |
SAT-based Differential analysis of AEGIS Family ISEC2023-45 SITE2023-39 BioX2023-48 HWS2023-45 ICSS2023-42 EMM2023-45 |
Takuro Shiraya (UOH), Kosei Sakamoto (Mitsubishi Electric), Takanori Isobe (UOH) |
(62) ISEC |
09:40-10:00 |
SAT-based Search of Related-key Impossible Distinguisher for Piccolo, TWINE, LBlock ISEC2023-46 SITE2023-40 BioX2023-49 HWS2023-46 ICSS2023-43 EMM2023-46 |
Shion Utsumi (Univ. of Hyogo), Kosei Sakamoto (MELCO), Takanori Isobe (Univ. of Hyogo) |
(63) ISEC |
10:00-10:20 |
Higher Order Differential Property of Block Cipher LBC-3 ISEC2023-47 SITE2023-41 BioX2023-50 HWS2023-47 ICSS2023-44 EMM2023-47 |
Naoki Shibayama, Yasutaka Igarashi (Tokyo Univ. of Science) |
(64) ISEC |
10:20-10:40 |
On the Maximum Differential Characteristic Probabilities for Multi-Branch Structures ISEC2023-48 SITE2023-42 BioX2023-51 HWS2023-48 ICSS2023-45 EMM2023-48 |
Kazuma Taka (Hyogo Univ.), Kosei Sakamoto (Mitsubishi Electric), Takanori Isobe (Hyogo Univ.) |
|
10:40-11:00 |
Break ( 20 min. ) |
Tue, Jul 25 AM Chair: Takushi Otani (Kibi International Univ.) 11:00 - 11:40 |
(65) SITE |
11:00-11:20 |
Is Copying for Information Security Research ‘Fair Use’?
-- Apple Inc. v. Corellium, Inc., No. 21-12835 (11th Cir. 2023) -- ISEC2023-49 SITE2023-43 BioX2023-52 HWS2023-49 ICSS2023-46 EMM2023-49 |
Yusuke Tachibana (FIT) |
(66) SITE |
11:20-11:40 |
A Study on the Application of Nudge to Improve Cybersecurity ISEC2023-50 SITE2023-44 BioX2023-53 HWS2023-50 ICSS2023-47 EMM2023-50 |
Hideyuki Fujii (NRI Secure) |
|
11:40-13:00 |
Lunch Break ( 80 min. ) |
Tue, Jul 25 PM Chair: Kotaro Suzuki (TUT) 14:30 - 15:30 |
(67) ISEC |
14:30-14:50 |
Security Analysis on Nostr protocol for decentralized SNS ISEC2023-51 SITE2023-45 BioX2023-54 HWS2023-51 ICSS2023-48 EMM2023-51 |
Hayato Kimura, Takanori Isobe (Univ. Hyogo) |
(68) ISEC |
14:50-15:10 |
Anomaly detection with dataset including replay-attack communication ISEC2023-52 SITE2023-46 BioX2023-55 HWS2023-52 ICSS2023-49 EMM2023-52 |
Koushi Nishi, Futa Yuichi (TUT), Okazaki Hiroyuki (Shinshu University) |
(69) ISEC |
15:10-15:30 |
Extended $k^m$-anonymity for randomization ISEC2023-53 SITE2023-47 BioX2023-56 HWS2023-53 ICSS2023-50 EMM2023-53 |
Masaya Kobayashi, Atsushi Fujioka (Kanagawa Univ.), Koji Chida (Gunma Univ.) |