IEICE Technical Committee Submission System
Conference Schedule
Online Proceedings
[Sign in]
Tech. Rep. Archives
    [Japanese] / [English] 
( Committee/Place/Topics  ) --Press->
( Paper Keywords:  /  Column:Title Auth. Affi. Abst. Keyword ) --Press->

All Technical Committee Conferences  (Searched in: All Years)

Search Results: Conference Papers
 Conference Papers (Available on Advance Programs)  (Sort by: Date Descending)
 Results 1 - 20 of 41  /  [Next]  
Committee Date Time Place Paper Title / Authors Abstract Paper #
ICSS, IPSJ-SPT 2024-03-22
Okinawa OIST
(Primary: On-site, Secondary: Online)
Discovery of a Vulnerable Structure of SIMON Variants
Hayato Watanabe (Tokai Univ.), Ryoma Ito (NICT), Toshihiro Ohigashi (Tokai Univ.) ICSS2023-92
In SCIS 2024, Watanabe et al. applied a deep learning-based output prediction attack to SIMON variants, which are varian... [more] ICSS2023-92
ICSS, IPSJ-SPT 2024-03-22
Okinawa OIST
(Primary: On-site, Secondary: Online)
Development of an Outsourcing Password Evaluation System using Intel SGX
Takeki Kitayama, Yuma Nishihira (Tokai Univ.), Akira Kanaoka (Toho Univ.), Yoshio Kakizaki, Toshihiro Ohigashi (Tokai Univ.) ICSS2023-93
Users are required to set passwords that are both complex and not included in leaked lists, with the recent increase in ... [more] ICSS2023-93
ICSS, IPSJ-SPT 2024-03-22
Okinawa OIST
(Primary: On-site, Secondary: Online)
A Search Method for Fake QR Codes Suitable for Long-Distance Attack Using Laser Irradiation
Dai Itakura, Taiga Manabe, Yuki Kamata, Ayana Oku, Hiroshi Yamamoto, Yoshihisa Takayama, Toshihiro Ohigashi (Tokai Univ.) ICSS2023-96
In this paper, we propose a search method for fake QR codes suitable for long-distance attack using laser irradiation. W... [more] ICSS2023-96
ICSS, IPSJ-SPT 2024-03-22
Okinawa OIST
(Primary: On-site, Secondary: Online)
Adversarial Examples with Missing Perturbation Using Laser Irradiation
Daisuke Kosuge, Hayato Watanabe, Taiga Manabe, Yoshihisa Takayama, Toshihiro Ohigashi (Tokai Univ.) ICSS2023-97
In recent years, neural networks have made remarkable progress in the field of image processing and other areas, and the... [more] ICSS2023-97
ICSS 2023-11-16
Ishikawa IT Business Plaza Musashi and Online
(Primary: On-site, Secondary: Online)
Formal Verification of an Edge Computing Platform based on Modular Architecture using Intel SGX
Yuma Nishihira (Tokai Univ.), Hayato Kimura (Univ. of Hyogo), Toshihiro Ohigashi (Tokai Univ.) ICSS2023-54
The proliferation of IoT devices requires an edge computing infrastructure that can process large amounts of data in a f... [more] ICSS2023-54
ICSS 2023-11-17
Ishikawa IT Business Plaza Musashi and Online
(Primary: On-site, Secondary: Online)
Implementation and Evaluation of Lattice-based IBE with Security against the Key Generation Center
Shuntaro Ema (Tokai Univ.), Keita Emura (Kanazawa Univ.), Toshihiro Ohigashi (Tokai Univ.) ICSS2023-60
 [more] ICSS2023-60
ICSS, IPSJ-SPT 2023-03-13
Okinawa Okinawaken Seinenkaikan
(Primary: On-site, Secondary: Online)
Dynamic Fake QR Code using Invisible Laser Irradiation
Yuki Kamata, Shuya Kawaguchi, Toshihiro Ohigashi, Yoshihisa Takayama (Tokai Univ.) ICSS2022-49
In this paper, we propose a method to generate a fake QR code that can lead to a malicious site at any given time by las... [more] ICSS2022-49
ICSS, IPSJ-SPT 2023-03-14
Okinawa Okinawaken Seinenkaikan
(Primary: On-site, Secondary: Online)
An Edge Computing Platform based on Modular Architecture using Intel SGX and its Evaluation
Yuma Nishihira, Tomoya Suzuki, Takuya Ishibashi, Yoshio Kakizaki, Toshihiro Ohigashi (Tokai Univ.), Hidenobu Watanabe, Tohru Kondo, Reiji Aibara (Hiroshima Univ.) ICSS2022-79
The proliferation of IoT devices, the number of devices connected to the Internet is rapidly expanding. An edge computin... [more] ICSS2022-79
Online Online [Invited Talk] Development of the Edge Computing Platform with Dynamic Modular Architecture and its Application of Cryptography with Advanced Functionality
Hidenobu Watanabe, Tohru Kondo (Hiroshima Univ.), Toshihiro Ohigashi (Tokai Univ.) NS2020-75 CQ2020-47 ICM2020-26
We have developed an edge computing platform that can coordinate with each computing resources of device , edge and clou... [more] NS2020-75 CQ2020-47 ICM2020-26
pp.4-8(NS), pp.4-8(CQ), pp.38-42(ICM)
ISEC 2019-05-17
Tokyo Kikai-Shinko-Kaikan Bldg. [Invited Talk] A Generic Construction of Integrated Secure-Channel Free PEKS and PKE (from ISPEC 2018)
Tatsuya Suzuki (Tokai Univ./NICT), Keita Emura (NICT), Toshihiro Ohigashi (Tokai Univ./NICT) ISEC2019-10
In this talk we explain the content of ``A Generic Construction of Integrated Secure-Channel Free PEKS and PKE'' (Tatsuy... [more] ISEC2019-10
SITE, ISEC, LOIS 2018-11-03
Fukuoka   A Statistical Method for Searching Biases of Stream Ciphers
Seiya Tanamoto, Toshihiro Ohigashi (Tokai Univ), Takanori Isobe (Univ. of Hyogo) ISEC2018-64 SITE2018-42 LOIS2018-24
Plaintext recovery attacks on stream ciphers based on biases of keystream in the broadcast setting where same plaintext ... [more] ISEC2018-64 SITE2018-42 LOIS2018-24
SITE, ISEC, LOIS 2018-11-03
Fukuoka   A Study on a New Evaluation Tool for Pseudo Random Number Generators based on Neural Network
Hayato Kimura (Tokai Univ.), Takanori Isobe (Univ. of Hyogo), Toshihiro Ohigashi (Tokai Univ.) ISEC2018-65 SITE2018-43 LOIS2018-25
Security of stream cipher depends on PRNG (Pseudo Random Number Generator) of the stream cipher. There are evaluation me... [more] ISEC2018-65 SITE2018-43 LOIS2018-25
IA, SITE, IPSJ-IOT [detail] 2018-03-05
Tochigi Kinugawa Onsen Hotel Implementation and Evaluation on Security Modules for the Edge Computing Platform based on Modular Architecture
Hiroyuki Yanagi, Hayato Kimura (Tokai Univ.), Tohru Kondo, Hidenobu Watanabe (Hiroshima Univ.), Toshihiro Ohigashi (Tokai Univ.) SITE2017-65 IA2017-76
Edge computing platform requires capability of deploy demanded functions appropriately and rapidly. We proposed Edge Com... [more] SITE2017-65 IA2017-76
ISEC, COMP 2017-12-21
Kochi Eikokuji Campus, Kochi University of Technology Implementation Results of Privacy-Preserving and Public-Verifiable Data Aggregation Protocols
Tatsuya Suzuki (Tokai Univ.), Keita Emura (NICT), Hayato Kimura, Toshihiro Ohigashi (Tokai Univ.) ISEC2017-79 COMP2017-33
Aggregator Oblivious Encryption (AOE) was proposed by Shi et al. in NDSS 2011. AOE with public verifiability was also pr... [more] ISEC2017-79 COMP2017-33
ISEC, WBS, IT 2017-03-09
Tokyo TOKAI University A Note on Key Dependency of Stream Cipher Grain v1
Satoshi Kidokoro (Tokai Univ.), Takanori Isobe (Kobe Univ.), Toshihiro Ohigashi (Tokai Univ.) IT2016-99 ISEC2016-89 WBS2016-75
Meet-in-the-middle (MITM) attack is a powerful cryptanalytic method for block ciphers. Several attacks for block ciphers... [more] IT2016-99 ISEC2016-89 WBS2016-75
ICSS, IA 2014-06-06
Hyogo Takikawa Memorial Hall, Kobe University Ransomware: Threat Analysis and Countermeasures
Akira Kanaoka (Toho Univ.), Toshihiro Ohigashi (Hiroshima Univ.) IA2014-7 ICSS2014-7
Ransomware which disables data or functions in victim's computer and demand money from victim, uses cryptographic techno... [more] IA2014-7 ICSS2014-7
ICSS, IPSJ-SPT 2014-03-27
Okinawa Meio Univiersity An Active Attack on RC4 in SSL/TLS
Toshihiro Ohigashi (Hiroshima Univ.), Takanori Isobe (Sony), Yuhei Watanabe (Kobe Univ.), Ryo Nojima (NICT), Masakatu Morii (Kobe Univ.) ICSS2013-63
In 2013, Isobe et al. and AlFardan et al. proposed practical plaintext recovery attacks on RC4 in SSL/TLS in the broadca... [more] ICSS2013-63
IA, ICSS 2013-06-20
Niigata Ao-re Nagaoka Vulnerability of RC4 in SSL/TLS
Yuhei Watanabe, Takanori Isobe (Kobe Univ.), Toshihiro Ohigashi (Hiroshima Univ.), Masakatu Morii (Kobe Univ.) IA2013-4 ICSS2013-4
In FSE2013, we showed that the first 257 bytes and 1000T bytes of the plaintext could be easily recovered with high prob... [more] IA2013-4 ICSS2013-4
ICSS 2012-11-22
Hiroshima Miyajima Mori-no-Yado Implementation and Evaluation of a File Sharing Service with File Name Encryption using CP-ABE
Megumi Goto, Toshihiro Ohigashi, Kouji Nishimura, Reiji Aibara (Hiroshima Univ.) ICSS2012-53
Online storage services, e.g. Dropbox, have a weakness, which the storage administrator can obtain contents of user's fi... [more] ICSS2012-53
IT, ISEC, WBS 2010-03-05
Nagano Nagano-Engineering Campus, Shinshu University A Forgery Attack for WPA-TKIP by Modifying Any Packet to the QoS Packet -- Almost All Implementations of WPA-TKIP Can Be Attacked --
Yosuke Todo, Yuki Ozawa (Kobe Univ.), Toshihiro Ohigashi (Hiroshima Univ.), Masakatu Morii (Kobe Univ.) IT2009-106 ISEC2009-114 WBS2009-85
 [more] IT2009-106 ISEC2009-114 WBS2009-85
 Results 1 - 20 of 41  /  [Next]  
Choose a download format for default settings. [NEW !!]
Text format pLaTeX format CSV format BibTeX format
Copyright and reproduction : All rights are reserved and no part of this publication may be reproduced or transmitted in any form or by any means, electronic or mechanical, including photocopy, recording, or any information storage and retrieval system, without permission in writing from the publisher. Notwithstanding, instructors are permitted to photocopy isolated articles for noncommercial classroom use without fee. (License No.: 10GA0019/12GB0052/13GB0056/17GB0034/18GB0034)

[Return to Top Page]

[Return to IEICE Web Page]

The Institute of Electronics, Information and Communication Engineers (IEICE), Japan