Mon, Jul 19 AM 09:10 - 10:15 |
(1) |
09:10-10:15 |
|
|
10:15-10:30 |
Break ( 15 min. ) |
Mon, Jul 19 AM 10:30 - 11:45 |
(2) |
10:30-10:55 |
|
(3) |
10:55-11:20 |
|
(4) |
11:20-11:45 |
|
|
11:45-13:30 |
Lunch Break ( 105 min. ) |
Mon, Jul 19 PM 13:30 - 14:45 |
(5) HWS |
13:30-13:55 |
Fundamental Study on Acceleration of Inversion using Binary Extended Euclidean Algorithm for Pairing Computation in RNS Representation |
Kota Morimoto, Daisuke Fujimoto, Saki Osuka (NAIST), Shinichi Kawamura, Tadanori Teruya (AIST), Yuichi hayashi (NAIST) |
(6) HWS |
13:55-14:20 |
Memory-saving implementation of BLS12-381 Pairing-based cryptography |
Riku Anzai, Junichi Sakamoto, Zihao Song, Naoki Yoshida, Tsutomu Matsumoto (YNU) |
(7) HWS |
14:20-14:45 |
Design of Fp2 Multiplier Datapath Based on Parallelized QP Montgomery Multiplication for Application to Isogeny-based Cryptography |
Rei Ueno (Tohoku Univ./JST PRESTO), Naofumi Homma (Tohoku Univ.) |
|
14:45-15:00 |
Break ( 15 min. ) |
Mon, Jul 19 PM 15:00 - 16:15 |
(8) |
15:00-15:25 |
|
(9) |
15:25-15:50 |
|
(10) |
15:50-16:15 |
|
|
16:15-16:55 |
Break ( 40 min. ) |
Mon, Jul 19 PM 16:55 - 18:10 |
(11) |
16:55-17:20 |
|
(12) |
17:20-17:45 |
|
(13) |
17:45-18:10 |
|
Mon, Jul 19 AM Chair: Dai Yamamoto (Fujitsu Labs.) 10:30 - 11:45 |
(14) ISEC |
10:30-10:55 |
A Website Fingerprinting Attack Based on the Virtual Memory of the Process on Android Devices |
Tatsuya Okazaki, Hiroya Kato, Shuichiro Haruta, Iwao Sasase (Keio Univ.) |
(15) ISEC |
10:55-11:20 |
Rogue Access Point Detection by Using ARP Failure under the MAC Address Duplication |
Kosuke Igarashi, Hiroya Kato, Iwao Sasase (Keio Univ.) |
(16) ISEC |
11:20-11:45 |
Fake Command Attack Detection of industrial Control System with SVM |
Yuki Harada, Yuichi Futa (TUT), Hiroyuki Okazaki (Shinshu Univ.) |
|
11:45-13:30 |
Lunch Break ( 105 min. ) |
Mon, Jul 19 PM 13:30 - 16:30 |
|
13:30-13:35 |
( 5 min. ) |
(17) SITE |
13:35-14:00 |
[Invited Talk]
ELSI in Data Science |
Yuko Murakami (Rikkyo U) |
(18) SITE |
14:00-14:25 |
[Invited Talk]
Cyber security of the Open University of Japan's courses of literacy in mathematical aspects, data science, and AI |
Takeo Tatsumi (Open Univ. Japan) |
(19) SITE |
14:25-14:50 |
[Invited Talk]
Law and Ethics on data science |
Naonori Kato (KDDI Research/RIKEN) |
|
14:50-15:00 |
Break ( 10 min. ) |
(20) SITE |
15:00-15:25 |
[Invited Talk]
Ethics of AI and Its Education |
Minao Kukita (Nagoya Univ.) |
(21) SITE |
15:25-15:50 |
[Invited Talk]
Data science practice from a legal and ethical perspective
-- A case study of an avatar community application -- |
Soichiro Morishita (CA) |
|
15:50-16:00 |
Break ( 10 min. ) |
|
- |
Discussion |
|
16:30-16:55 |
Break ( 25 min. ) |
Mon, Jul 19 PM Chair: Noboru Kunihiro (Univ. of Tsukuba) 16:55 - 17:45 |
(22) ISEC |
16:55-17:20 |
Evaluation on Biometric Template Protection System Based on Somewhat Homomorphic Encryption |
Hiroto Tamiya, Toshiyuki Isshiki, Kengo Mori (NEC), Satoshi Obana (Hosei Univ.), Tetsushi Ohki (Shizuoka Univ.) |
(23) ISEC |
17:20-17:45 |
Consideration on hybrid security of authenticated key exchange FSXY |
Takeru Kawaguchi, Seijuro Suzuki, Atushi Fujioka, Taro Sasaki (Kanagawa Univ.) |
Tue, Jul 20 AM 09:00 - 10:15 |
(24) |
09:00-09:25 |
|
(25) |
09:25-09:50 |
|
(26) |
09:50-10:15 |
|
|
10:15-10:30 |
Break ( 15 min. ) |
Tue, Jul 20 AM 10:30 - 11:20 |
(27) |
10:30-10:55 |
|
(28) BioX |
10:55-11:20 |
A Study of Black-box Adversarial Attack for Face Recognition Systems |
Vo Ngoc Khoi Nguyen, Takamichi Terada, Masakatsu Nishigaki, Tetsushi Ohki (Shizuoka Univ.) |
|
11:20-13:10 |
Lunch Break ( 110 min. ) |
Tue, Jul 20 PM 13:10 - 14:10 |
(29) |
13:10-14:10 |
|
|
14:10-14:25 |
Break ( 15 min. ) |
Tue, Jul 20 PM 14:25 - 15:15 |
(30) HWS |
14:25-14:50 |
Deep-Learning Based Side-Channel Analysis on Cryptographic Hardware with Masking Countermeasure |
Kenta Kojima, Akira Ito, Rei Ueno, Naofumi Homma (Tohoku Univ.) |
(31) HWS |
14:50-15:15 |
Deep Learning Side-Channel Attacks against Unprotected AES and RSM-AES Implemented in ASIC |
Yuta Fukuda, Kota Yoshida, Hisashi Hashimoto, Takeshi Fujino (Ritsumeikan Univ.) |
|
15:15-15:30 |
Break ( 15 min. ) |
Tue, Jul 20 PM 15:30 - 16:45 |
(32) HWS |
15:30-15:55 |
Implimentation of RISC-V TEE using PUF as Root of Trust |
Kota Yoshida (Ritsumeikan Univ.), Kuniyasu Suzaki (AIST), Takeshi Fujino (Ritsumeikan Univ.) |
(33) HWS |
15:55-16:20 |
Evaluation of TRNG Using CMOS Image Sensor |
Hayato Tatsuno, Tatsuya Oyama, Masayoshi Shirahata, Shunsuke Okura, Takeshi Fujino (Ritsumeikan Univ.) |
(34) HWS |
16:20-16:45 |
Implementation and Evaluation of a Ring Oscillator Type True Random Number Generator (2) |
Ryuichi Minagawa, KevinHideaki Omae, Kotarou Hayashi, Naoya Torii (Soka Univ.) |
Tue, Jul 20 AM Chair: Goichiro Hanaoka (AIST) 09:00 - 10:15 |
(35) ISEC |
09:00-09:25 |
A Study Toward Practical Use of "Emergency Button" Which Enables Crypto Asset Evacuation When Key Loss |
Natsume Matsuzaki, Yoshihiro Kita (Univ. of Nagasaki) |
(36) ISEC |
09:25-09:50 |
Characteristics and security risk considerations in Dogecoin network |
Mitsuyoshi Imamura (Tsukuba Univ.), Omote Kazumasa (Tsukuba Univ./NICT) |
(37) ISEC |
09:50-10:15 |
Security Risk Considerations in NFT Reliability |
Keigo Kimura (Tsukuba Univ.), Mitsuyoshi Imamura (Nomura Asset Management), Kazumasa Omote (Tsukuba Univ.) |
|
10:15-10:30 |
Break ( 15 min. ) |
Tue, Jul 20 AM 10:30 - 12:10 |
(38) EMM |
10:30-10:55 |
Development of an AI Literacy Learning Tool Using Minecraft |
Suika Kishimoto, Kazuhiro Kono (Kansai Univ.) |
(39) EMM |
10:55-11:20 |
Hybrid Multiplicative Secret Sharing |
Maki Yoshida (NICT) |
(40) ICSS |
11:20-11:45 |
|
|
(41) ICSS |
11:45-12:10 |
A Large-scale Investigation into the Possibility of Malware Infection of IoT Devices with Weak Credentials |
Kosuke Murakami, Takahiro Kasama, Daisuke Inoue (NICT) |
|
12:10-13:10 |
Lunch Break ( 60 min. ) |
Tue, Jul 20 PM 13:10 - 14:10 |
|
- |
|
|
14:10-14:25 |
Break ( 15 min. ) |
Tue, Jul 20 PM Chair: Kazuki Yoneyama (Ibaraki Univ.) 14:25 - 15:15 |
(42) ISEC |
14:25-14:50 |
Computer experiment evaluation for time variance of virtual currency mining using cryptographic hash function |
Kei Ikebe, Kouichi Sakurai (Kyushu Univ.) |
(43) ISEC |
14:50-15:15 |
Differential Path Search Using MILP against ForkSkinny |
Masaya Okazaki (Nagoya Univ.), Yu Sasaki (NTT), Tetsu Iwata (Nagoya Univ.) |
|
15:15-15:30 |
Break ( 15 min. ) |
Tue, Jul 20 PM 15:30 - 17:10 |
(44) SITE |
15:30-15:55 |
A study of frequency domain-based steganography with adaptive gain on DCT blocks |
Kaito Onuma, Sumiko Miyata (SIT) |
(45) SITE |
15:55-16:20 |
Applying Transcreation to Development of Programing Education
-- Creation and Utilization of Transcreation Scale -- |
Masahiro Morita (Matsuyama Junior College) |
(46) SITE |
16:20-16:45 |
Research Ethics as Decision Making Assistance
-- The Principles and Ethical Analysis of AoIR Internet Research Ethics Guideline -- |
Takushi Otani (Kibi International Univ.), Hirotaka Osawa (Tsukuba Univ.), Akiyoshi Kabeya (Toyo Eiwa Univ.), Nobutsugu Kanzaki (Nanzan Univ.), Minao Kukita (Nagoya Univ.), Reina Saijo (Osaka Univ.) |
(47) SITE |
16:45-17:10 |
International regulatory trend survey report on AI
-- Analysis of Proposal for a Regulation on a European approach for Artificial Intelligence Ⅱ -- |
Naonori Kato (KDDI Research/RIKEN), Masato Suzuki (Niigata Univ./RIKEN), Yoichiro Itakura (Hikari Sogoh Law Offices/RIKEN), Yosuke Murakami, Katsutoshi Hanahara (KDDI Research) |