Committee |
Date Time |
Place |
Paper Title / Authors |
Abstract |
Paper # |
ICSS, IPSJ-SPT |
2025-03-07 16:25 |
Okinawa |
Okinawa Prefectural Museum & Art Museum (Okinawa) |
Performance Comparison of Machine Learning Models for Output Prediction Attacks and Their Interpretability Hayato Watanabe (Tokai Univ/NICT), Ryoma Ito (NICT), Toshihiro Ohigashi (Tokai Univ/NICT) ICSS2024-121 |
Watanabe et al. applied neural network (NN)-based output prediction attacks using LSTM, proposed by Kimura et al., to SI... [more] |
ICSS2024-121 pp.407-414 |
EMM, BioX, ISEC, SITE, ICSS, HWS, IPSJ-CSEC, IPSJ-SPT [detail] |
2024-07-22 16:40 |
Hokkaido |
Sapporo Convention Center (Hokkaido) |
Implementation and Evaluation of an Application System combining a Lightweight Block Cipher and a Lightweight MAC using MPC Kandai Nakagawa (Tokai Univ.), Kazuto Ogawa (NICT), Takeki Kitayama, Hayato Watanabe (Tokai Univ.), Toshihiro Ohigashi (Tokai Univ./NICT) ISEC2024-30 SITE2024-27 BioX2024-40 HWS2024-30 ICSS2024-34 EMM2024-36 |
Secret sharing based MPC is known as one of secret computation techniques and AES is one of the most popular block ciphe... [more] |
ISEC2024-30 SITE2024-27 BioX2024-40 HWS2024-30 ICSS2024-34 EMM2024-36 pp.147-154 |
ICSS, IPSJ-SPT |
2024-03-22 10:55 |
Okinawa |
OIST (Okinawa, Online) (Primary: On-site, Secondary: Online) |
Discovery of a Vulnerable Structure of SIMON Variants Hayato Watanabe (Tokai Univ.), Ryoma Ito (NICT), Toshihiro Ohigashi (Tokai Univ.) ICSS2023-92 |
In SCIS 2024, Watanabe et al. applied a deep learning-based output prediction attack to SIMON variants, which are varian... [more] |
ICSS2023-92 pp.166-173 |
ICSS, IPSJ-SPT |
2024-03-22 11:20 |
Okinawa |
OIST (Okinawa, Online) (Primary: On-site, Secondary: Online) |
Development of an Outsourcing Password Evaluation System using Intel SGX Takeki Kitayama, Yuma Nishihira (Tokai Univ.), Akira Kanaoka (Toho Univ.), Yoshio Kakizaki, Toshihiro Ohigashi (Tokai Univ.) ICSS2023-93 |
Users are required to set passwords that are both complex and not included in leaked lists, with the recent increase in ... [more] |
ICSS2023-93 pp.174-179 |
ICSS, IPSJ-SPT |
2024-03-22 14:30 |
Okinawa |
OIST (Okinawa, Online) (Primary: On-site, Secondary: Online) |
A Search Method for Fake QR Codes Suitable for Long-Distance Attack Using Laser Irradiation Dai Itakura, Taiga Manabe, Yuki Kamata, Ayana Oku, Hiroshi Yamamoto, Yoshihisa Takayama, Toshihiro Ohigashi (Tokai Univ.) ICSS2023-96 |
In this paper, we propose a search method for fake QR codes suitable for long-distance attack using laser irradiation. W... [more] |
ICSS2023-96 pp.194-200 |
ICSS, IPSJ-SPT |
2024-03-22 14:55 |
Okinawa |
OIST (Okinawa, Online) (Primary: On-site, Secondary: Online) |
Adversarial Examples with Missing Perturbation Using Laser Irradiation Daisuke Kosuge, Hayato Watanabe, Taiga Manabe, Yoshihisa Takayama, Toshihiro Ohigashi (Tokai Univ.) ICSS2023-97 |
In recent years, neural networks have made remarkable progress in the field of image processing and other areas, and the... [more] |
ICSS2023-97 pp.201-207 |
ICSS |
2023-11-16 14:30 |
Ishikawa |
IT Business Plaza Musashi and Online (Ishikawa, Online) (Primary: On-site, Secondary: Online) |
Formal Verification of an Edge Computing Platform based on Modular Architecture using Intel SGX Yuma Nishihira (Tokai Univ.), Hayato Kimura (Univ. of Hyogo), Toshihiro Ohigashi (Tokai Univ.) ICSS2023-54 |
The proliferation of IoT devices requires an edge computing infrastructure that can process large amounts of data in a f... [more] |
ICSS2023-54 pp.22-29 |
ICSS |
2023-11-17 10:00 |
Ishikawa |
IT Business Plaza Musashi and Online (Ishikawa, Online) (Primary: On-site, Secondary: Online) |
Implementation and Evaluation of Lattice-based IBE with Security against the Key Generation Center Shuntaro Ema (Tokai Univ.), Keita Emura (Kanazawa Univ.), Toshihiro Ohigashi (Tokai Univ.) ICSS2023-60 |
[more] |
ICSS2023-60 pp.64-69 |
ICSS, IPSJ-SPT |
2023-03-13 12:50 |
Okinawa |
Okinawaken Seinenkaikan (Okinawa, Online) (Primary: On-site, Secondary: Online) |
Dynamic Fake QR Code using Invisible Laser Irradiation Yuki Kamata, Shuya Kawaguchi, Toshihiro Ohigashi, Yoshihisa Takayama (Tokai Univ.) ICSS2022-49 |
In this paper, we propose a method to generate a fake QR code that can lead to a malicious site at any given time by las... [more] |
ICSS2022-49 pp.7-12 |
ICSS, IPSJ-SPT |
2023-03-14 13:50 |
Okinawa |
Okinawaken Seinenkaikan (Okinawa, Online) (Primary: On-site, Secondary: Online) |
An Edge Computing Platform based on Modular Architecture using Intel SGX and its Evaluation Yuma Nishihira, Tomoya Suzuki, Takuya Ishibashi, Yoshio Kakizaki, Toshihiro Ohigashi (Tokai Univ.), Hidenobu Watanabe, Tohru Kondo, Reiji Aibara (Hiroshima Univ.) ICSS2022-79 |
The proliferation of IoT devices, the number of devices connected to the Internet is rapidly expanding. An edge computin... [more] |
ICSS2022-79 pp.187-192 |
NS, ICM, CQ, NV (Joint) |
2020-11-26 15:25 |
Online |
Online (Online) |
[Invited Talk]
Development of the Edge Computing Platform with Dynamic Modular Architecture and its Application of Cryptography with Advanced Functionality Hidenobu Watanabe, Tohru Kondo (Hiroshima Univ.), Toshihiro Ohigashi (Tokai Univ.) NS2020-75 CQ2020-47 ICM2020-26 |
We have developed an edge computing platform that can coordinate with each computing resources of device , edge and clou... [more] |
NS2020-75 CQ2020-47 ICM2020-26 pp.4-8(NS), pp.4-8(CQ), pp.38-42(ICM) |
ISEC |
2019-05-17 16:30 |
Tokyo |
Kikai-Shinko-Kaikan Bldg. (Tokyo) |
[Invited Talk]
A Generic Construction of Integrated Secure-Channel Free PEKS and PKE (from ISPEC 2018) Tatsuya Suzuki (Tokai Univ./NICT), Keita Emura (NICT), Toshihiro Ohigashi (Tokai Univ./NICT) ISEC2019-10 |
In this talk we explain the content of ``A Generic Construction of Integrated Secure-Channel Free PEKS and PKE'' (Tatsuy... [more] |
ISEC2019-10 p.47 |
SITE, ISEC, LOIS |
2018-11-03 11:00 |
Fukuoka |
(Fukuoka) |
A Statistical Method for Searching Biases of Stream Ciphers Seiya Tanamoto, Toshihiro Ohigashi (Tokai Univ), Takanori Isobe (Univ. of Hyogo) ISEC2018-64 SITE2018-42 LOIS2018-24 |
Plaintext recovery attacks on stream ciphers based on biases of keystream in the broadcast setting where same plaintext ... [more] |
ISEC2018-64 SITE2018-42 LOIS2018-24 pp.1-6 |
SITE, ISEC, LOIS |
2018-11-03 11:30 |
Fukuoka |
(Fukuoka) |
A Study on a New Evaluation Tool for Pseudo Random Number Generators based on Neural Network Hayato Kimura (Tokai Univ.), Takanori Isobe (Univ. of Hyogo), Toshihiro Ohigashi (Tokai Univ.) ISEC2018-65 SITE2018-43 LOIS2018-25 |
Security of stream cipher depends on PRNG (Pseudo Random Number Generator) of the stream cipher. There are evaluation me... [more] |
ISEC2018-65 SITE2018-43 LOIS2018-25 pp.7-12 |
IA, SITE, IPSJ-IOT [detail] |
2018-03-05 14:30 |
Tochigi |
Kinugawa Onsen Hotel (Tochigi) |
Implementation and Evaluation on Security Modules for the Edge Computing Platform based on Modular Architecture Hiroyuki Yanagi, Hayato Kimura (Tokai Univ.), Tohru Kondo, Hidenobu Watanabe (Hiroshima Univ.), Toshihiro Ohigashi (Tokai Univ.) SITE2017-65 IA2017-76 |
Edge computing platform requires capability of deploy demanded functions appropriately and rapidly. We proposed Edge Com... [more] |
SITE2017-65 IA2017-76 pp.91-96 |
ISEC, COMP |
2017-12-21 15:25 |
Kochi |
Eikokuji Campus, Kochi University of Technology (Kochi) |
Implementation Results of Privacy-Preserving and Public-Verifiable Data Aggregation Protocols Tatsuya Suzuki (Tokai Univ.), Keita Emura (NICT), Hayato Kimura, Toshihiro Ohigashi (Tokai Univ.) ISEC2017-79 COMP2017-33 |
Aggregator Oblivious Encryption (AOE) was proposed by Shi et al. in NDSS 2011. AOE with public verifiability was also pr... [more] |
ISEC2017-79 COMP2017-33 pp.43-50 |
ISEC, WBS, IT |
2017-03-09 10:25 |
Tokyo |
TOKAI University (Tokyo) |
A Note on Key Dependency of Stream Cipher Grain v1 Satoshi Kidokoro (Tokai Univ.), Takanori Isobe (Kobe Univ.), Toshihiro Ohigashi (Tokai Univ.) IT2016-99 ISEC2016-89 WBS2016-75 |
Meet-in-the-middle (MITM) attack is a powerful cryptanalytic method for block ciphers. Several attacks for block ciphers... [more] |
IT2016-99 ISEC2016-89 WBS2016-75 pp.1-6 |