Committee |
Date Time |
Place |
Paper Title / Authors |
Abstract |
Paper # |
ISEC, SITE, LOIS |
2022-11-18 09:00 |
Online |
Online |
Construction of Quantum-Resistant Crypotsystems combining CSIDH with Y-00 quantum stream cipher Shigeo Tsuii, Osamu Hirota (Chuo Univ.) ISEC2022-31 SITE2022-35 LOIS2022-15 |
This paper describes total constructive structure of PQC (Post-quantum cryptography) including mathematical public key c... [more] |
ISEC2022-31 SITE2022-35 LOIS2022-15 pp.9-15 |
ISEC, SITE, LOIS |
2022-11-18 09:25 |
Online |
Online |
International Trend of Development on Y-00 Quantum Cryptography
-- Cryptologic Perspective -- Shigeo Tsujii (Chuo Univ.), Kentaro Kato (Tamagawa Univ.), Osamu Hirota (Chuo Univ.) ISEC2022-30 SITE2022-34 LOIS2022-14 |
Cryptography has developed based on mathematics and has now become an indispensable technology in society. In order to c... [more] |
ISEC2022-30 SITE2022-34 LOIS2022-14 pp.1-8 |
ISEC, SITE, LOIS |
2022-11-18 09:00 |
Online |
Online |
On the CEN Workshop Agreement (CWA) concerning the trust and trustworthiness of Journalism
-- Introduction and analysis of CWA17493 -- Takushi Otani (Kibi International Univ.) |
[more] |
|
ISEC, SITE, LOIS |
2022-11-18 09:25 |
Online |
Online |
Analysis of EU Cyber Resilience Act
-- from a Perspective of Cyber Supply Chain Security -- Yusuke Tachibana (FIT) ISEC2022-32 SITE2022-36 LOIS2022-16 |
This past September, the European Commission published the Cyber Resilience Act. It will establish security requirements... [more] |
ISEC2022-32 SITE2022-36 LOIS2022-16 pp.16-19 |
ISEC, SITE, LOIS |
2022-11-18 10:05 |
Online |
Online |
[Invited Talk]
About "Ctrl + Z: Right to be forgotten"(1) Hideyuki Fujii (NRI Secure) |
[more] |
|
ISEC, SITE, LOIS |
2022-11-18 10:30 |
Online |
Online |
[Invited Talk]
About "Ctrl + Z: Right to be forgotten" (2) Naonori Kato (KDDI RI/NFI) |
[more] |
|
ISEC, SITE, LOIS |
2022-11-18 11:05 |
Online |
Online |
[Invited Talk]
Artificiality, Complexity and Feasibility of The Right to Be Forgotten
-- Reviewing Meg Leta Jones' Ctrl+Z: The Right to Be Forgotten -- Akiyoshi Kabeya (Toyo Eiwa Univ.) ISEC2022-33 SITE2022-37 LOIS2022-17 |
[more] |
ISEC2022-33 SITE2022-37 LOIS2022-17 pp.20-25 |
ISEC, SITE, LOIS |
2022-11-18 13:00 |
Online |
Online |
[Invited Talk]
Quantum Computation and Cryptography Takashi Yamakawa (NTT) ISEC2022-34 SITE2022-38 LOIS2022-18 |
Recently, there have been many exciting works in the interdisciplinary field of quantum computations and cryptography. T... [more] |
ISEC2022-34 SITE2022-38 LOIS2022-18 p.26 |
ISEC, SITE, LOIS |
2022-11-18 13:50 |
Online |
Online |
[Invited Talk]
Two-Layered QR Codes and Their Principles
-- Development of Hologram QR Codes -- Masakatsu Morii (Kobe University) |
[more] |
|
ISEC, SITE, LOIS |
2022-11-18 14:30 |
Online |
Online |
Investigating the Use of Latent Representations in Federated Learning Using Normalizing Flow and Optimal Transport Algorithms Motonobu Uchikoshi, Takeshi Mori (JRI) ISEC2022-35 SITE2022-39 LOIS2022-19 |
(To be available after the conference date) [more] |
ISEC2022-35 SITE2022-39 LOIS2022-19 pp.27-31 |
ISEC, SITE, LOIS |
2022-11-18 14:55 |
Online |
Online |
Active S-box Number Analysis with MILP of Type-2 Generalized Feistel Structure Consisting of Multiple SP Layers F-function Masaya Okazaki, Tetsu Iwata (Nagoya Univ.) ISEC2022-36 SITE2022-40 LOIS2022-20 |
Type-2 Generalized Feistel Structure (GFS) is known as a way to construct a secure block cipher. It is a $dm$-bit ($d ge... [more] |
ISEC2022-36 SITE2022-40 LOIS2022-20 pp.32-38 |
ISEC, SITE, LOIS |
2022-11-18 15:20 |
Online |
Online |
On the difficulty of the 2nd MeDLP Masaaki Shirase (FUN) ISEC2022-37 SITE2022-41 LOIS2022-21 |
The Me scalar multiplication is defined for the Me operations on elliptic curves over finite fields, and Me version of t... [more] |
ISEC2022-37 SITE2022-41 LOIS2022-21 pp.39-46 |
ISEC, SITE, LOIS |
2022-11-18 14:30 |
Online |
Online |
Development of QR Code with superimposed Kanji font Naoya Tahara, Hiroshi Kai (Ehime Univ.), Masakatu Morii (Kobe Univ.) ISEC2022-38 SITE2022-42 LOIS2022-22 |
[more] |
ISEC2022-38 SITE2022-42 LOIS2022-22 pp.47-52 |
ISEC, SITE, LOIS |
2022-11-18 14:55 |
Online |
Online |
A Study on Document Classification of National Nursing Examination Using BERT Takao Nishi, Yu Ichifuji (Nagasaki Univ.) ISEC2022-39 SITE2022-43 LOIS2022-23 |
[more] |
ISEC2022-39 SITE2022-43 LOIS2022-23 pp.53-58 |
ISEC, SITE, LOIS |
2022-11-18 15:55 |
Online |
Online |
Secure Computation of Symmetric Functions Using Four Types of Cards Hayato Shikata, Takaaki Mizuki (Tohoku Univ.) ISEC2022-40 SITE2022-44 LOIS2022-24 |
(To be available after the conference date) [more] |
ISEC2022-40 SITE2022-44 LOIS2022-24 pp.59-65 |
ISEC, SITE, LOIS |
2022-11-18 16:20 |
Online |
Online |
Decentralization of Revocation Process Using Intermediate Servers in Revocable Group Signatures Kai Kimura, Toru Nakanishi, Teruaki Kitasuka (Hiroshima Univ.) ISEC2022-41 SITE2022-45 LOIS2022-25 |
A group signature is a signature method that allows a user who belongs to a group to prove that he or she ”belongs to th... [more] |
ISEC2022-41 SITE2022-45 LOIS2022-25 pp.66-72 |
ISEC, SITE, LOIS |
2022-11-18 15:55 |
Online |
Online |
Token-Controlled Token Circulation Ko Fujimura (Otsuma Univ.) ISEC2022-42 SITE2022-46 LOIS2022-26 |
This paper presents a general-purpose token circulating system for circulating various types of rights such as tickets, ... [more] |
ISEC2022-42 SITE2022-46 LOIS2022-26 pp.73-78 |
ISEC, SITE, LOIS |
2022-11-18 16:20 |
Online |
Online |
Efficient workers' behavior segmentation with GP-HSMM Toshiyuki Hatta, Tsubasa Tomoda, Tetsuya Tamaki, Shotaro Miwa (Mitsubishi Electric Corp.) ISEC2022-43 SITE2022-47 LOIS2022-27 |
(To be available after the conference date) [more] |
ISEC2022-43 SITE2022-47 LOIS2022-27 pp.79-84 |
ISEC, SITE, LOIS |
2022-11-18 16:55 |
Online |
Online |
Reducing Authentication Data Size in Decentralized Blacklistable Anonymous Credential System Using DualRing Atsuki Iriboshi, Toru Nakanishi, Katsunobu Imai (Hiroshima Univ.) ISEC2022-44 SITE2022-48 LOIS2022-28 |
For privacy protection, blacklistable anonymous credential systems have been proposed, where a user is authenticated wit... [more] |
ISEC2022-44 SITE2022-48 LOIS2022-28 pp.85-91 |
ISEC, SITE, LOIS |
2022-11-18 17:20 |
Online |
Online |
Security Proof and Parameters for a Lattice-based Fuzzy Signature Scheme Yuichi Hasegawa, Shingo Sato, Junji Shikata (Yokohama National Univ.) ISEC2022-45 SITE2022-49 LOIS2022-29 |
Recently, password-based authentication is often used for entity authentication of systems. However, because recently cy... [more] |
ISEC2022-45 SITE2022-49 LOIS2022-29 pp.92-99 |