Committee 
Date Time 
Place 
Paper Title / Authors 
Abstract 
Paper # 
IT 
20220722 10:25 
Okayama 
Okayama University of Science (Primary: Onsite, Secondary: Online) 
Consideration of an authenticatio protocol uses CVMA parameters Akane Miyoshi, Kazuma Ikesaka, Yuta Kodera, Takuya Kusaka, Yasuyuki Nogami (Okayama Univ) IT202221 
The authors implements the ElGamal encryption over extension field using the Cyclic Vector Multiplication Algorithm (CVM... [more] 
IT202221 pp.3035 
HWS, ICD [detail] 
20211019 15:50 
Online 
Online 
Design and implementation of a sophisticated control system for an airconditioner with sensors Mengfang Duan, Daichi Hattori, Takuya Kusaka, Yasuyuki Nogami (Okayana Univ.) HWS202151 ICD202125 
Recent climate change causes global warming, and the cost of airconditioning becomes a problem. However, standard produ... [more] 
HWS202151 ICD202125 pp.5356 
IT 
20201201 14:50 
Online 
Online 
[Invited Talk]
Secure IoT and AI Utilization for Society 5.0 Yasuyuki Nogami (Oyamaya Univ.) IT202026 
[more] 
IT202026 pp.1314 
LOIS, ISEC, SITE 
20201106 10:30 
Online 
Online 
Proposal of Optimal Curve Parameters for Pairing Computation on BLS12 Curve and Its Evaluation of Implementation Daichi Hattori, Yuto Takahashi, Tomoya Tatara, Yuki Nanjo, Yuta Kodera, Takuya Kusaka, Yasuyuki Nogami (Okayama Univ.) ISEC202032 SITE202029 LOIS202012 
Pairingbased cryptography is one of the popular cryptographic techniques for achieving safety and usability. Since a pa... [more] 
ISEC202032 SITE202029 LOIS202012 pp.16 
CQ, CS (Joint) 
20200626 15:20 
Online 
Online 
[Special Invited Talk]
LPWA and Security Techniques for IoT Era Yasuyuki Nogami (Okayama Univ.) CS202014 CQ202021 
There are various sensors and small terminals that support many advanced technologies in the IoT era, and while a lot of... [more] 
CS202014 CQ202021 pp.5961(CS), pp.103105(CQ) 
HWS, ICD [detail] 
20191101 13:00 
Osaka 
DNP Namba SS Bld. 
Implementation and Evaluation of ECElGamal Encryption with a Twisted Montgomery Curve over Tower Field on Arduino Yuta Hashimoto, Tadaki Kanenari, Takuya Kusaka, Yasuyuki Nogami (Okayama Univ.) HWS201957 ICD201918 
[more] 
HWS201957 ICD201918 pp.15 
HWS, ICD [detail] 
20191101 13:25 
Osaka 
DNP Namba SS Bld. 
An Implementation of Tate and Ate Pairing of Embedding Degree 14 Zihao Song, Rikuya Matsumura, Yuki Nanjo, Yasuyuki Nogami, Takuya Kusaka (Okayama Univ.) HWS201958 ICD201919 
Following a coming new age of IoT (Internet of Things) and tremendous growth of processing power of a personal
computer... [more] 
HWS201958 ICD201919 pp.712 
ISEC, SITE, ICSS, EMM, HWS, BioX, IPSJCSEC, IPSJSPT [detail] 
20190724 09:55 
Kochi 
Kochi University of Technology 
A Performance Analysis of Supersingular Isogeny DiffieHellman with Several Classes of the Quadratic Extension Fields Yuki Nanjo (Okayama Univ.), Masaaki Shirase (Future Univ. Hakodate), Takuya Kusaka, Yasuyuki Nogami (Okayama Univ.) ISEC201936 SITE201930 BioX201928 HWS201931 ICSS201934 EMM201939 
It is wellknown that the class of binomial extension field (BEF) is widely used to construct a quadratic extension fiel... [more] 
ISEC201936 SITE201930 BioX201928 HWS201931 ICSS201934 EMM201939 pp.207214 
IT, ISEC, WBS 
20190307 10:55 
Tokyo 
University of ElectroCommunications 
An Implementation and Evaluation of Pairing Library ELiPS for BLS Curve with Several Techniques Yuto Takahashi, Tadaki Kanenari, Yuki Nanjo, Md. AlAmin Khandaker, Takuya Kusaka, Yasuyuki Nogami (Okayama Univ.) IT201878 ISEC201884 WBS201879 
In recent years, pairing encryption has attracted attention as an encryption method to realize highperformance encrypti... [more] 
IT201878 ISEC201884 WBS201879 pp.2126 
IT, ISEC, WBS 
20190307 11:20 
Tokyo 
University of ElectroCommunications 
A Consideration of the Properties of Edwards Curve Whose Order is a Power of 2 Hiromasa Miura, Kazuya Kobayashi, Takuya Kusaka, Yasuyuki Nogami (Okayama Univ.) IT201879 ISEC201885 WBS201880 
Based on the proposal of pairingbased cryptography, IDbased cryptography, searchable cryptography, and attributebased... [more] 
IT201879 ISEC201885 WBS201880 pp.2732 
IT, ISEC, WBS 
20190307 14:30 
Tokyo 
University of ElectroCommunications 
A Study on the System of Detecting Falsification for Conference Records Using Echo Spread Method and Octave Similarity Shoya Ogaki (Univ. Kitakyushu), Shunsuke Araki (Kyutech), Takeru Miyazaki, Satoshi Uehara (Univ. Kitakyushu), Yasuyuki Nogami (Okayama Univ.) IT201884 ISEC201890 WBS201885 
In this paper, we propose strengthen the robustness against tampering of audio data for conference recording using audio... [more] 
IT201884 ISEC201890 WBS201885 pp.5764 
IT, ISEC, WBS 
20190307 15:30 
Tokyo 
University of ElectroCommunications 
Analyzing Final Round Key of AES Implemented on Microcomputer using Neural Network Satoshi Kosugi, Sho Joichi, Ken Ikuta, Takuya Kusaka, Yasuyuki Nogami, Norikazu Takahashi (Okayama University) IT201886 ISEC201892 WBS201887 
A side channel attack is an attack method that enable external key estimation by observing secondary information generat... [more] 
IT201886 ISEC201892 WBS201887 pp.7176 
IT, ISEC, WBS 
20190308 10:50 
Tokyo 
University of ElectroCommunications 
A Consideration of Computational Delay Time by Using MAC Implemented on CAN Hiroto Ogura, Ryunosuke Isshiki, Takuya Kusaka, Yasuyuki Nogami, Kamegawa Tetsushi (Okayama Univ.), Shoichi Maeyama (Kagawa Univ.), Shunsuke Araki (Kyutech) IT2018105 ISEC2018111 WBS2018106 
CAN(Controller Area Network) is widely used as the vehicle network, however, CAN have no security system. In this manusc... [more] 
IT2018105 ISEC2018111 WBS2018106 pp.181186 
EMCJ, IEEEMC, IEEMAG 
20181122 14:00 
Overseas 
KAIST 
Investigation of CAN transceiver and controller response to electromagnetic disturbance by using current injection probe Ryunosuke Isshiki, Kengo Iokibe, Takuya Kusaka, Tetsushi Kamegawa, Yasuyuki Nogami (Okayama Univ.) EMCJ201863 
Recently, connected cars are having a major role on modern traffic system. However, it might include vulnerability and i... [more] 
EMCJ201863 pp.2328 
ISEC 
20180516 10:25 
Tokyo 
Ookayama Campus, Tokyo Institute of Technology 
Determining BLS Curves for Pairing over Efficient Tower of Extension Field Yuki Nanjo, Md. AlAmin Khandaker (Okayama Univ.), Masaaki Shirase (Future Univ. Hakodate), Takuya Kusaka, Yasuyuki Nogami (Okayama Univ.) ISEC20182 
Pairingbased cryptography (PBC) is receiving a lot of attention since it enables many innovative and multifunctional c... [more] 
ISEC20182 pp.916 
EMCJ 
20180118 15:00 
Okayama 

Investigation of Reaction of Error Control of CAN Protocol in Case of Electromagnetic Disturbance Injection Ryunosuke Isshiki, Takuya Kusaka, Kengo Iokibe, Yasuyuki Nogami (Okayama Univ.) EMCJ201792 
CAN (Controller Area Network) is employed widely as invehicle network protocol. Since the protocol is employed in a sit... [more] 
EMCJ201792 pp.2530 
EMCJ 
20171122 13:50 
Tokyo 
KikaiShinkoKaikan Bldg. 
Improvement of Noise Source Amplitude Modulation Method to Identify Source Devices of Electromagnetic Interference Chiaki Ishida, Shinpei Yoshino, Chiaki Ogawa, Kengo Iokibe, Yoshitaka Tyota, Yasuyuki Nogami (Okayama Univ.) EMCJ201770 
For a low cost determination of noise sources to reduce electromagnetic interference (EMI), we have proposed a method to... [more] 
EMCJ201770 pp.3540 
IT 
20160729 10:15 
Fukuoka 
Seminar House, Fukuoka Univ. 
A Consideration of an Efficient Calculation over the Extension Field of Degree 4 for Elliptic Curve Pairing Cryptography Akihito Sanada (Okayama Univ.), Sylvain Duquesne (Univ. Rennes 1), Masaaki Shirase (FUN), Yasuyuki Nogami (Okayama Univ.) IT201629 
Pairing based cryptography with BLS(BonehLynnShacham) curve is defined over extension field of degree 24 .
Base exten... [more] 
IT201629 pp.4550 
IT 
20160729 10:40 
Fukuoka 
Seminar House, Fukuoka Univ. 
A Consideration of an Efficient Calculation over the Extension Field of Degree 3 for Elliptic Curve Pairing Cryptography Yuta Kodera (Okayama Univ.), Sylvain Duquesne (Univ. Rennes 1), Masaaki Shirase (FUN), Yasuyuki Nogami (Okayama Univ.) IT201630 
Recently, pairing based cryptography, which is one of publickey cryptographies, has been paid attention. Mathematically... [more] 
IT201630 pp.5156 
IT 
20150904 10:50 
Ishikawa 
Hakusan Shobutei 
A Consideration on Trace Sequence over Finite Field Yasuyuki Nogami, Hiroto Ino (Okayama Univ.), Kazuyoshi Tsuchiya (Koden), Satoshi Uehara (Kitakyu Univ.), Robert H, Morelos Zaragoza (SJSU) IT201538 
The authors have proposed a class of pseudo multivalue sequences generated by trace and power residue over nite eld. ... [more] 
IT201538 pp.2529 