IEICE Technical Committee Submission System
Conference Schedule
Online Proceedings
[Sign in]
Tech. Rep. Archives
    [Japanese] / [English] 
( Committee/Place/Topics  ) --Press->
 
( Paper Keywords:  /  Column:Title Auth. Affi. Abst. Keyword ) --Press->

All Technical Committee Conferences  (Searched in: Recent 10 Years)

Search Results: Conference Papers
 Conference Papers (Available on Advance Programs)  (Sort by: Date Descending)
 Results 1 - 17 of 17  /   
Committee Date Time Place Paper Title / Authors Abstract Paper #
ICSS, IPSJ-SPT 2025-03-07
16:25
Okinawa Okinawa Prefectural Museum & Art Museum (Okinawa) Performance Comparison of Machine Learning Models for Output Prediction Attacks and Their Interpretability
Hayato Watanabe (Tokai Univ/NICT), Ryoma Ito (NICT), Toshihiro Ohigashi (Tokai Univ/NICT) ICSS2024-121
Watanabe et al. applied neural network (NN)-based output prediction attacks using LSTM, proposed by Kimura et al., to SI... [more] ICSS2024-121
pp.407-414
EMM, BioX, ISEC, SITE, ICSS, HWS, IPSJ-CSEC, IPSJ-SPT [detail] 2024-07-22
16:40
Hokkaido Sapporo Convention Center (Hokkaido) Implementation and Evaluation of an Application System combining a Lightweight Block Cipher and a Lightweight MAC using MPC
Kandai Nakagawa (Tokai Univ.), Kazuto Ogawa (NICT), Takeki Kitayama, Hayato Watanabe (Tokai Univ.), Toshihiro Ohigashi (Tokai Univ./NICT) ISEC2024-30 SITE2024-27 BioX2024-40 HWS2024-30 ICSS2024-34 EMM2024-36
Secret sharing based MPC is known as one of secret computation techniques and AES is one of the most popular block ciphe... [more] ISEC2024-30 SITE2024-27 BioX2024-40 HWS2024-30 ICSS2024-34 EMM2024-36
pp.147-154
ICSS, IPSJ-SPT 2024-03-22
10:55
Okinawa OIST (Okinawa, Online)
(Primary: On-site, Secondary: Online)
Discovery of a Vulnerable Structure of SIMON Variants
Hayato Watanabe (Tokai Univ.), Ryoma Ito (NICT), Toshihiro Ohigashi (Tokai Univ.) ICSS2023-92
In SCIS 2024, Watanabe et al. applied a deep learning-based output prediction attack to SIMON variants, which are varian... [more] ICSS2023-92
pp.166-173
ICSS, IPSJ-SPT 2024-03-22
11:20
Okinawa OIST (Okinawa, Online)
(Primary: On-site, Secondary: Online)
Development of an Outsourcing Password Evaluation System using Intel SGX
Takeki Kitayama, Yuma Nishihira (Tokai Univ.), Akira Kanaoka (Toho Univ.), Yoshio Kakizaki, Toshihiro Ohigashi (Tokai Univ.) ICSS2023-93
Users are required to set passwords that are both complex and not included in leaked lists, with the recent increase in ... [more] ICSS2023-93
pp.174-179
ICSS, IPSJ-SPT 2024-03-22
14:30
Okinawa OIST (Okinawa, Online)
(Primary: On-site, Secondary: Online)
A Search Method for Fake QR Codes Suitable for Long-Distance Attack Using Laser Irradiation
Dai Itakura, Taiga Manabe, Yuki Kamata, Ayana Oku, Hiroshi Yamamoto, Yoshihisa Takayama, Toshihiro Ohigashi (Tokai Univ.) ICSS2023-96
In this paper, we propose a search method for fake QR codes suitable for long-distance attack using laser irradiation. W... [more] ICSS2023-96
pp.194-200
ICSS, IPSJ-SPT 2024-03-22
14:55
Okinawa OIST (Okinawa, Online)
(Primary: On-site, Secondary: Online)
Adversarial Examples with Missing Perturbation Using Laser Irradiation
Daisuke Kosuge, Hayato Watanabe, Taiga Manabe, Yoshihisa Takayama, Toshihiro Ohigashi (Tokai Univ.) ICSS2023-97
In recent years, neural networks have made remarkable progress in the field of image processing and other areas, and the... [more] ICSS2023-97
pp.201-207
ICSS 2023-11-16
14:30
Ishikawa IT Business Plaza Musashi and Online (Ishikawa, Online)
(Primary: On-site, Secondary: Online)
Formal Verification of an Edge Computing Platform based on Modular Architecture using Intel SGX
Yuma Nishihira (Tokai Univ.), Hayato Kimura (Univ. of Hyogo), Toshihiro Ohigashi (Tokai Univ.) ICSS2023-54
The proliferation of IoT devices requires an edge computing infrastructure that can process large amounts of data in a f... [more] ICSS2023-54
pp.22-29
ICSS 2023-11-17
10:00
Ishikawa IT Business Plaza Musashi and Online (Ishikawa, Online)
(Primary: On-site, Secondary: Online)
Implementation and Evaluation of Lattice-based IBE with Security against the Key Generation Center
Shuntaro Ema (Tokai Univ.), Keita Emura (Kanazawa Univ.), Toshihiro Ohigashi (Tokai Univ.) ICSS2023-60
 [more] ICSS2023-60
pp.64-69
ICSS, IPSJ-SPT 2023-03-13
12:50
Okinawa Okinawaken Seinenkaikan (Okinawa, Online)
(Primary: On-site, Secondary: Online)
Dynamic Fake QR Code using Invisible Laser Irradiation
Yuki Kamata, Shuya Kawaguchi, Toshihiro Ohigashi, Yoshihisa Takayama (Tokai Univ.) ICSS2022-49
In this paper, we propose a method to generate a fake QR code that can lead to a malicious site at any given time by las... [more] ICSS2022-49
pp.7-12
ICSS, IPSJ-SPT 2023-03-14
13:50
Okinawa Okinawaken Seinenkaikan (Okinawa, Online)
(Primary: On-site, Secondary: Online)
An Edge Computing Platform based on Modular Architecture using Intel SGX and its Evaluation
Yuma Nishihira, Tomoya Suzuki, Takuya Ishibashi, Yoshio Kakizaki, Toshihiro Ohigashi (Tokai Univ.), Hidenobu Watanabe, Tohru Kondo, Reiji Aibara (Hiroshima Univ.) ICSS2022-79
The proliferation of IoT devices, the number of devices connected to the Internet is rapidly expanding. An edge computin... [more] ICSS2022-79
pp.187-192
NS, ICM, CQ, NV
(Joint)
2020-11-26
15:25
Online Online (Online) [Invited Talk] Development of the Edge Computing Platform with Dynamic Modular Architecture and its Application of Cryptography with Advanced Functionality
Hidenobu Watanabe, Tohru Kondo (Hiroshima Univ.), Toshihiro Ohigashi (Tokai Univ.) NS2020-75 CQ2020-47 ICM2020-26
We have developed an edge computing platform that can coordinate with each computing resources of device , edge and clou... [more] NS2020-75 CQ2020-47 ICM2020-26
pp.4-8(NS), pp.4-8(CQ), pp.38-42(ICM)
ISEC 2019-05-17
16:30
Tokyo Kikai-Shinko-Kaikan Bldg. (Tokyo) [Invited Talk] A Generic Construction of Integrated Secure-Channel Free PEKS and PKE (from ISPEC 2018)
Tatsuya Suzuki (Tokai Univ./NICT), Keita Emura (NICT), Toshihiro Ohigashi (Tokai Univ./NICT) ISEC2019-10
In this talk we explain the content of ``A Generic Construction of Integrated Secure-Channel Free PEKS and PKE'' (Tatsuy... [more] ISEC2019-10
p.47
SITE, ISEC, LOIS 2018-11-03
11:00
Fukuoka (Fukuoka) A Statistical Method for Searching Biases of Stream Ciphers
Seiya Tanamoto, Toshihiro Ohigashi (Tokai Univ), Takanori Isobe (Univ. of Hyogo) ISEC2018-64 SITE2018-42 LOIS2018-24
Plaintext recovery attacks on stream ciphers based on biases of keystream in the broadcast setting where same plaintext ... [more] ISEC2018-64 SITE2018-42 LOIS2018-24
pp.1-6
SITE, ISEC, LOIS 2018-11-03
11:30
Fukuoka (Fukuoka) A Study on a New Evaluation Tool for Pseudo Random Number Generators based on Neural Network
Hayato Kimura (Tokai Univ.), Takanori Isobe (Univ. of Hyogo), Toshihiro Ohigashi (Tokai Univ.) ISEC2018-65 SITE2018-43 LOIS2018-25
Security of stream cipher depends on PRNG (Pseudo Random Number Generator) of the stream cipher. There are evaluation me... [more] ISEC2018-65 SITE2018-43 LOIS2018-25
pp.7-12
IA, SITE, IPSJ-IOT [detail] 2018-03-05
14:30
Tochigi Kinugawa Onsen Hotel (Tochigi) Implementation and Evaluation on Security Modules for the Edge Computing Platform based on Modular Architecture
Hiroyuki Yanagi, Hayato Kimura (Tokai Univ.), Tohru Kondo, Hidenobu Watanabe (Hiroshima Univ.), Toshihiro Ohigashi (Tokai Univ.) SITE2017-65 IA2017-76
Edge computing platform requires capability of deploy demanded functions appropriately and rapidly. We proposed Edge Com... [more] SITE2017-65 IA2017-76
pp.91-96
ISEC, COMP 2017-12-21
15:25
Kochi Eikokuji Campus, Kochi University of Technology (Kochi) Implementation Results of Privacy-Preserving and Public-Verifiable Data Aggregation Protocols
Tatsuya Suzuki (Tokai Univ.), Keita Emura (NICT), Hayato Kimura, Toshihiro Ohigashi (Tokai Univ.) ISEC2017-79 COMP2017-33
Aggregator Oblivious Encryption (AOE) was proposed by Shi et al. in NDSS 2011. AOE with public verifiability was also pr... [more] ISEC2017-79 COMP2017-33
pp.43-50
ISEC, WBS, IT 2017-03-09
10:25
Tokyo TOKAI University (Tokyo) A Note on Key Dependency of Stream Cipher Grain v1
Satoshi Kidokoro (Tokai Univ.), Takanori Isobe (Kobe Univ.), Toshihiro Ohigashi (Tokai Univ.) IT2016-99 ISEC2016-89 WBS2016-75
Meet-in-the-middle (MITM) attack is a powerful cryptanalytic method for block ciphers. Several attacks for block ciphers... [more] IT2016-99 ISEC2016-89 WBS2016-75
pp.1-6
 Results 1 - 17 of 17  /   
Choose a download format for default settings. [NEW !!]
Text format pLaTeX format CSV format BibTeX format
Copyright and reproduction : All rights are reserved and no part of this publication may be reproduced or transmitted in any form or by any means, electronic or mechanical, including photocopy, recording, or any information storage and retrieval system, without permission in writing from the publisher. Notwithstanding, instructors are permitted to photocopy isolated articles for noncommercial classroom use without fee. (License No.: 10GA0019/12GB0052/13GB0056/17GB0034/18GB0034)


[Return to Top Page]

[Return to IEICE Web Page]


The Institute of Electronics, Information and Communication Engineers (IEICE), Japan