Committee |
Date Time |
Place |
Paper Title / Authors |
Abstract |
Paper # |
ISEC |
2021-05-19 10:00 |
Online |
Online |
Card-based Cryptographic Protocols with a Standard Deck of Cards Using Private Operations Yoshifumi Manabe, Hibiki Ono (Kogakuin Univ) ISEC2021-1 |
This paper shows card-based cryptographic protocols that use a standard deck of cards. They are multi-party secure comp... [more] |
ISEC2021-1 pp.1-8 |
ISEC |
2021-05-19 10:25 |
Online |
Online |
Toward the proposal of Healthcare Information Exchange (HIE) system using blockchain Ryuji Ueno (Tsukuba Univ), Kazumasa Omote (Tsukuba Univ./NICT) ISEC2021-2 |
The introduction of healthcare information exchange (HIE) systems has been limited although its societal need has been r... [more] |
ISEC2021-2 pp.9-16 |
ISEC |
2021-05-19 11:05 |
Online |
Online |
[Invited Talk]
Six-Card Finite-Runtime XOR Protocol with Only Random Cut (from APKC 2020) Kodai Toyoda (Tohoku Univ.), Daiki Miyahara (Tohoku Univ./AIST), Takaaki Mizuki, Hideaki Sone (Tohoku Univ.) ISEC2021-3 |
In this invited talk, we introduce the paper ``Six-Card Finite-Runtime XOR Protocol with Only Random Cut'' by Kodai Toyo... [more] |
ISEC2021-3 p.17 |
ISEC |
2021-05-19 11:35 |
Online |
Online |
[Invited Talk]
Efficient blockchain-based IoT firmware update considering distribution incentives (from IDC 2021) Tatsuhiro Fukuda (Tsukuba Univ.), Kazumasa Omote (Tsukuba Univ./NICT) ISEC2021-4 |
This paper proposes a firmware distribution method that provides incentives for distributors to help with distribu- tion... [more] |
ISEC2021-4 p.18 |
ISEC |
2021-05-19 13:25 |
Online |
Online |
Secure Chat and Storage Systems based on Searchable Encryption: Implementation and Evaluation Keita Emura, Sachiko Kanamori, Ryo Nojima (NICT), Yohei Watanabe (UEC/NICT) ISEC2021-5 |
(To be available after the conference date) [more] |
ISEC2021-5 pp.19-24 |
ISEC |
2021-05-19 13:50 |
Online |
Online |
Distinguishing and Forgery Attacks against Romulus-N and Romulus-M Makoto Habu (Nagoya Univ.), Kazuhiko Minematsu (NEC), Tetsu Iwata (Nagoya Univ.) ISEC2021-6 |
Romulus is an authenticated encryption scheme based on a tweakable block cipher. It was submitted to the NIST Lightweigh... [more] |
ISEC2021-6 pp.25-31 |
ISEC |
2021-05-19 14:30 |
Online |
Online |
[Invited Talk]
Security Definitions on Time-Lock Puzzles (from ICISC 2020) Daiki Hiraga (Tokyo Tech), Keisuke Hara (Tokyo Tech/AIST), Masayuki Tezuka, Yusuke Yoshida, Keisuke Tanaka (Tokyo Tech) ISEC2021-7 |
Time-lock puzzles allow one to encapsulate a message for a pre-determined amount of time.
The message is required to be... [more] |
ISEC2021-7 p.32 |
ISEC |
2021-05-19 15:00 |
Online |
Online |
[Invited Talk]
Efficiency and Accuracy Improvements of Secure Floating-Point Addition over Secret Sharing (from IWSEC 2020) Kota Sasaki (The Univ. of Tokyo), Koji Nuida (Kyushu Univ.) ISEC2021-8 |
In secure multiparty computation (MPC), floating-point numbers should be handled in many potential applications, but the... [more] |
ISEC2021-8 p.33 |
ISEC |
2021-05-19 15:30 |
Online |
Online |
[Invited Talk]
Simple Electromagnetic Analysis Against Activation Functions of Deep Neural Networks (from AIHWS 2020) Go Takatoi, Takeshi Sugawara, Kazuo Sakiyama (UEC), Yuko Hara-Azumi (Tokyo Tech), Yang Li (UEC) ISEC2021-9 |
This invited abstract is based on the papers [1] and [2]. There are physical attacks such as side-channel attacks that a... [more] |
ISEC2021-9 p.34 |