Committee |
Date Time |
Place |
Paper Title / Authors |
Abstract |
Paper # |
RCC, ISEC, IT, WBS |
2024-03-13 - 2024-03-14 |
Osaka |
Osaka Univ. (Suita Campus) |
An improvement method and security evaluation for the method of protecting ownership using digital watermark Dung Ta Anh, Hidema Tanaka (NDA) IT2023-76 ISEC2023-75 WBS2023-64 RCC2023-58 |
Since developing high-performance AI models requires significant time and cost, it is common to customize publicly avail... [more] |
IT2023-76 ISEC2023-75 WBS2023-64 RCC2023-58 pp.5-11 |
LOIS, SITE, ISEC |
2023-11-10 12:10 |
Hiroshima |
Satellite Campus Hiroshima (Primary: On-site, Secondary: Online) |
Zero-Knowledge Proofs for ownership of Deep Neural Network Shungo Sato, Hidema Tanaka (NDA) ISEC2023-67 SITE2023-61 LOIS2023-25 |
Because AI technologies have rapidly spread and developed in our society, Neural Networks, which are one of Machine Lear... [more] |
ISEC2023-67 SITE2023-61 LOIS2023-25 pp.86-92 |
LOIS, ISEC, SITE |
2020-11-06 10:55 |
Online |
Online |
Information theoretical evaluation for visual secret sharing Le Thanh Thai Binh, Hidema Tanaka (NDA) ISEC2020-33 SITE2020-30 LOIS2020-13 |
[more] |
ISEC2020-33 SITE2020-30 LOIS2020-13 pp.7-12 |
ISEC |
2016-05-19 10:25 |
Tokyo |
Kikai-Shinko-Kaikan Bldg. |
IDS using Discrete Fourier Transform with window functions Yusuke Tsuge, Keisuke Iwai, Hidema Tanaka, Takakazu Kurokawa (NDA) ISEC2016-2 |
An Intrusion Detection System (IDS) is countermeasure against network attack. There are mainly two types of detections; ... [more] |
ISEC2016-2 pp.5-11 |
IT, ISEC, WBS |
2016-03-10 13:40 |
Tokyo |
The University of Electro-Communications |
Collision-Free Rainbow Table Structure Yuki Tabata, Keisuke Iwai, Hidema Tanaka, Takakazu Kurokawa (NDA) IT2015-114 ISEC2015-73 WBS2015-97 |
Rainbow table is a method to crack the password in high speed from hash values. Collision of password candidates occurs,... [more] |
IT2015-114 ISEC2015-73 WBS2015-97 pp.81-88 |
ISEC |
2015-12-18 13:55 |
Tokyo |
Kikai-Shinko-Kaikan Bldg. |
Evaluation of authenticated encryptions implemented on FPGA with high-level synthesis Makoto Kotegawa, Keisuke Iwai, Hidema Tanaka, Takakazu Kurokawa (NDA) ISEC2015-55 |
Competition for Authenticated Encryption Security, Applicability, and Robustness (CAESAR) which is a development and eva... [more] |
ISEC2015-55 pp.9-16 |
ISEC |
2015-09-04 10:55 |
Tokyo |
Kikai-Shinko-Kaikan Bldg. |
Improvement of RainbowCrack Reduction Function Yuki Tabata, Keisuke Iwai, Hidema Tanaka, Takakazu Kurokawa (NDA) ISEC2015-26 |
Rainbow table is a method to crack the password in high speed from hash values. Rainbow table can crack passwords only i... [more] |
ISEC2015-26 pp.9-14 |
ISEC |
2015-09-04 11:20 |
Tokyo |
Kikai-Shinko-Kaikan Bldg. |
High speed implementation of Hash function on GPU Nguyen Dat Thuong, Keisuke Iwai, Hidema Tanaka, Takakazu Kurokawa (NDA) ISEC2015-27 |
In order to protect the personal information and high confidential information, encryption technology and hash function ... [more] |
ISEC2015-27 pp.15-19 |
IA, ICSS |
2015-06-11 14:35 |
Fukuoka |
Kyushu Institute of Technology Univ. |
An Efficient Rainbow Table Compression Yuki Tabata, Keisuke Iwai, Hidema Tanaka, Takakazu Kurokawa (NDA) IA2015-3 ICSS2015-3 |
Rainbow table is a method to crack the password in high speed from hash values. Rainbow table can crack passwords only i... [more] |
IA2015-3 ICSS2015-3 pp.9-14 |
ISEC |
2014-09-05 15:35 |
Tokyo |
Kikai-Shinko-Kaikan Bldg. |
GPU implementation of Ciphers using Schematic to Program Translator(SPT) Masashi Watanabe, Keisuke Iwai, Hidema Tanaka, Takakazu Kurokawa (NDA) ISEC2014-52 |
With the spread of heterogeneous computing, accelerators such as GPU are widely used. However, it is not easy to develop... [more] |
ISEC2014-52 pp.35-42 |
CPSY, DC (Joint) |
2014-07-29 17:50 |
Niigata |
Toki Messe, Niigata |
Development of Cipher implementation tool using GUI Masashi Watanabe, Keisuke Iwai, Hidema Tanaka, Takakazu Kurokawa (NDA) CPSY2014-31 |
With the spread of heterogeneous computing, accelerators such as GPU are widely used. However, it
is not easy to write ... [more] |
CPSY2014-31 pp.125-129 |
ISEC |
2014-05-09 14:40 |
Tokyo |
Kikai-Shinko-Kaikan Bldg. |
A Study of IDS using Discrete Fourier Transform Enkhbold Chimedtseren, Keisuke Iwai, Hidema Tanaka, Takakazu Kurokawa (NDA) ISEC2014-4 |
Intrusion Detection System (IDS) detects an attack with an identifying pattern file which is known as called a signature... [more] |
ISEC2014-4 pp.21-27 |
ISEC |
2013-05-23 13:45 |
Tokyo |
Kikai-Shinko-Kaikan Bldg. |
Information theoretical analysis of side-channel attack (2) Hiroaki Mizuno, Keisuke Iwai, Hidema Tanaka, Takakazu Kurokawa (National Defense Academy) ISEC2013-3 |
In the evaluation of side-channel resistance, it is argued how many observation of physical phenomena which is caused by... [more] |
ISEC2013-3 pp.15-22 |
SANE, SAT (Joint) |
2011-02-25 15:30 |
Hyogo |
NICT Kobe Research Laboratories |
Study on high speed mobile laser communications and secure global quantum key distribution technology Morio Toyoshima, Takashi Sasaki, Hideki Takenaka, Yoshihisa Takayama, Mikio Fujiwara, Masahiro Takeoka, Masahide Sasaki, Zhen Wang, Shigehito Miki, Taro Yamashita, Hidema Tanaka, Atsushi Waseda, Seiho Uratsuka, Toshihiko Umehara, Jyunpei Uemoto (NICT) SANE2010-167 |
National Institute of Information and Communications Technology (NICT) successfully developed the quantum entanglement s... [more] |
SANE2010-167 pp.49-51 |
IT, ISEC, WBS |
2007-03-16 13:00 |
Gunma |
Gunma Univ. (Kiryu Campus) |
Linearization method and linear complexity Hidema Tanaka (NICT) |
[more] |
IT2006-101 ISEC2006-156 WBS2006-98 pp.93-98 |
ISEC |
2005-12-16 14:15 |
Tokyo |
Kikai-Shinko-Kaikan Bldg. |
Anonymous Password-Based Authenticated Key Exchange Duong Viet Quang, Akihiro Yamamura, Hidema Tanaka (NICT) |
We propose and discuss an {\it anonymous password-based authenticated key exchange scheme} that allows a user in a group... [more] |
ISEC2005-116 pp.35-42 |
ISEC, LOIS |
2005-11-14 16:35 |
Fukuoka |
Kitakyushu Science and Research Park |
A study of the reconstruction of display image on a PC's monitor by unintiontional electromagnetic emanation
-- Emanated electromagnetic signal measurement method and reconstructed display image using measured signal emanation -- Hidenori Sekiguchi, Hidema Tanaka, Shinji Seto, Akihiro Yamamura (NICT) |
[more] |
ISEC2005-97 OIS2005-60 pp.53-58 |