Mon, Jul 20 AM 10:00 - 11:40 |
(1) SITE |
10:00-10:25 |
Development of the Ethics Assessment for Research & Innovation Guidelines under the SATORI project in Europe(2)
-- The Joint Framework of Ethics Assessment and CEN Workshop Agreement -- |
Takushi Otani (Kibi International Univ.), Nobutsugu Kanzaki (Nanzan Univ.), Minao Kukita (Nagoya Univ.), Hirotaka Osawa (Tsukuba Univ.), Reina Saijo (Osaka Univ.) |
(2) SITE |
10:25-10:50 |
Report on the International Policy Trends in Data Protection
-- A Study on Facial Recognition Rules in Europe -- |
Naonori Kato (KDDI Research Inc./RIKEN AIP), Masatomo Suzuki (Niigata Univ./RIKEN AIP), Yosuke Murakami (KDDI Research Inc.) |
(3) BioX |
10:50-11:15 |
Development of Feature Extractor for Visible Light Iris Recognition Using Deep Learning |
Tetsuya Honda, Hironobu Takano (Toyama Pref. Univ.) |
(4) BioX |
11:15-11:40 |
Biometric Authentication Using Evoked EEG by Invisible Visual Stimulation
-- Improved Verification Perfomance Based on Wavelet Transform and Machine Learning -- |
Takahiro Miyake, Nozom Kinjo, Isao Nakanishi (Tottori Univ) |
Mon, Jul 20 PM 13:00 - 14:15 |
(5) ISEC |
13:00-13:25 |
Privacy Preserving of big data system using distributed machine learning |
Zhaoheng Chen, Kazumasa omote (University of Tsukuba) |
(6) ISEC |
13:25-13:50 |
Risk analysis of zero downtime mechanism by dispersibility in blockchain technology (2) |
Wataru Taguchi (Tsukuba Univ.), Kazumasa Omote (Tsukuba Univ./NICT) |
(7) ISEC |
13:50-14:15 |
Side Channel Attack on CRT-RSA Using Sliding Window with Exponent Blinding |
Soki Osawa, Rei Ueno, Naofumi Homma (Tohoku Univ.) |
Mon, Jul 20 PM 13:00 - 14:15 |
(8) |
13:00-13:25 |
|
(9) |
13:25-13:50 |
|
(10) |
13:50-14:15 |
|
Mon, Jul 20 PM 14:30 - 15:30 |
(11) |
14:30-15:30 |
|
Mon, Jul 20 PM 15:45 - 17:00 |
(12) ISEC |
15:45-16:10 |
Quantum Attacks on the Sum of Even-Mansour Pseudorandom Function |
Kazuo Shinagawa, Tetsu Iwata (Nagoya Univ.) |
(13) ISEC |
16:10-16:35 |
Short Lattice Signatures in the Standard Model with Efficient Tag Generation and Its Implementation |
Kaisei Kajita, Go Ohtake, Kazuto Ogawa (NHK), Koji Nuida, Tsuyoshi Takagi (Univ. of Tokyo) |
(14) ISEC |
16:35-17:00 |
A Study on Construction of Probablistic Homomorphic Encryption Using Stochastic Computing. |
Ryusuke Koseki, Rei Ueno, Naofumi Homma (Tohoku Univ.) |
Mon, Jul 20 PM 15:45 - 16:35 |
(15) |
15:45-16:10 |
|
(16) |
16:10-16:35 |
|
Tue, Jul 21 AM 10:00 - 11:40 |
(17) HWS |
10:00-10:25 |
Performance Evaluation of True Random Number Generator Using Latches |
Naoya Torii, Hideaki Kevin Omae (Soka Univ.) |
(18) HWS |
10:25-10:50 |
The Optimal Arrangement of Detectors and ECUs for Detection of Unauthorized Devices on the linear CAN Bus |
Kunito Fukuda, Takahito Yasunaga, Yoshikazu Isoyama, Takumi Asaina, Yoichi Hata (Sumitomo Electric) |
(19) HWS |
10:50-11:15 |
Adversarial scan attack against ICP algorithm for pose estimation on LiDAR-based SLAM |
Kota Yoshida, Takeshi Fujino (Ritsumeikan Univ.) |
(20) HWS |
11:15-11:40 |
Side-channel Analysis on Message Authentication Code for Controller Area Network |
Kensei Nagato, Ville Yli-Mayry, Rei Ueno (Tohoku Univ.), Tsuyoshi Toyama, Hisashi Oguma (TOYOTA), Naohumi Homma (Tohoku Univ.) |
Tue, Jul 21 AM 10:00 - 11:40 |
(21) |
10:00-10:25 |
|
(22) |
10:25-10:50 |
|
(23) |
10:50-11:15 |
|
(24) |
11:15-11:40 |
|
Tue, Jul 21 PM 13:00 - 14:15 |
(25) |
13:00-13:25 |
|
(26) |
13:25-13:50 |
|
(27) ICSS |
13:50-14:15 |
Homomorphic commitment schemes with constant output locality |
Hideaki Miyaji, Atsuko Miyaji (OU) |
Tue, Jul 21 PM 13:00 - 14:15 |
(28) |
13:00-13:25 |
|
(29) |
13:25-13:50 |
|
(30) |
13:50-14:15 |
|
Tue, Jul 21 PM 14:30 - 15:30 |
(31) |
14:30-15:30 |
|
Tue, Jul 21 PM 15:45 - 17:00 |
(32) ISEC |
15:45-16:10 |
Key Holding System Without Exchanging Common Key between Users
-- TS Key Holding System -- |
Nobuharu Suzuki, Kouji Sasaki (Adin), Takahiro Yoshimura, Ken-ya Yoshimura (Monolith), Toshio Tsuji (Vega), Masao Yamasawa, Masahito Gotaishi, Shigeo Tsujii (Chuo Univ.) |
(33) ISEC |
16:10-16:35 |
Generalization of the hard part computation of final exponentiation for arbitrary BLS curves |
Masaaki Shirase (FUN), Yuki Nanjo (Okayama Univ.) |
(34) ISEC |
16:35-17:00 |
Secure and Compact Elliptic Curve LR Scalar Multiplication |
Yaoan Jin, Atsuko Miyaji (Osaka Univ) |