Committee |
Date Time |
Place |
Paper Title / Authors |
Abstract |
Paper # |
IT |
2022-07-22 10:25 |
Okayama |
Okayama University of Science (Primary: On-site, Secondary: Online) |
Consideration of an authenticatio protocol uses CVMA parameters Akane Miyoshi, Kazuma Ikesaka, Yuta Kodera, Takuya Kusaka, Yasuyuki Nogami (Okayama Univ) IT2022-21 |
The authors implements the ElGamal encryption over extension field using the Cyclic Vector Multiplication Algorithm (CVM... [more] |
IT2022-21 pp.30-35 |
HWS, ICD [detail] |
2021-10-19 15:50 |
Online |
Online |
Design and implementation of a sophisticated control system for an air-conditioner with sensors Mengfang Duan, Daichi Hattori, Takuya Kusaka, Yasuyuki Nogami (Okayana Univ.) HWS2021-51 ICD2021-25 |
Recent climate change causes global warming, and the cost of air-conditioning becomes a problem. However, standard produ... [more] |
HWS2021-51 ICD2021-25 pp.53-56 |
IT |
2020-12-01 14:50 |
Online |
Online |
[Invited Talk]
Secure IoT and AI Utilization for Society 5.0 Yasuyuki Nogami (Oyamaya Univ.) IT2020-26 |
[more] |
IT2020-26 pp.13-14 |
LOIS, ISEC, SITE |
2020-11-06 10:30 |
Online |
Online |
Proposal of Optimal Curve Parameters for Pairing Computation on BLS12 Curve and Its Evaluation of Implementation Daichi Hattori, Yuto Takahashi, Tomoya Tatara, Yuki Nanjo, Yuta Kodera, Takuya Kusaka, Yasuyuki Nogami (Okayama Univ.) ISEC2020-32 SITE2020-29 LOIS2020-12 |
Pairing-based cryptography is one of the popular cryptographic techniques for achieving safety and usability. Since a pa... [more] |
ISEC2020-32 SITE2020-29 LOIS2020-12 pp.1-6 |
CQ, CS (Joint) |
2020-06-26 15:20 |
Online |
Online |
[Special Invited Talk]
LPWA and Security Techniques for IoT Era Yasuyuki Nogami (Okayama Univ.) CS2020-14 CQ2020-21 |
There are various sensors and small terminals that support many advanced technologies in the IoT era, and while a lot of... [more] |
CS2020-14 CQ2020-21 pp.59-61(CS), pp.103-105(CQ) |
HWS, ICD [detail] |
2019-11-01 13:00 |
Osaka |
DNP Namba SS Bld. |
Implementation and Evaluation of EC-ElGamal Encryption with a Twisted Montgomery Curve over Tower Field on Arduino Yuta Hashimoto, Tadaki Kanenari, Takuya Kusaka, Yasuyuki Nogami (Okayama Univ.) HWS2019-57 ICD2019-18 |
[more] |
HWS2019-57 ICD2019-18 pp.1-5 |
HWS, ICD [detail] |
2019-11-01 13:25 |
Osaka |
DNP Namba SS Bld. |
An Implementation of Tate and Ate Pairing of Embedding Degree 14 Zihao Song, Rikuya Matsumura, Yuki Nanjo, Yasuyuki Nogami, Takuya Kusaka (Okayama Univ.) HWS2019-58 ICD2019-19 |
Following a coming new age of IoT (Internet of Things) and tremendous growth of processing power of a personal
computer... [more] |
HWS2019-58 ICD2019-19 pp.7-12 |
ISEC, SITE, ICSS, EMM, HWS, BioX, IPSJ-CSEC, IPSJ-SPT [detail] |
2019-07-24 09:55 |
Kochi |
Kochi University of Technology |
A Performance Analysis of Supersingular Isogeny Diffie-Hellman with Several Classes of the Quadratic Extension Fields Yuki Nanjo (Okayama Univ.), Masaaki Shirase (Future Univ. Hakodate), Takuya Kusaka, Yasuyuki Nogami (Okayama Univ.) ISEC2019-36 SITE2019-30 BioX2019-28 HWS2019-31 ICSS2019-34 EMM2019-39 |
It is well-known that the class of binomial extension field (BEF) is widely used to construct a quadratic extension fiel... [more] |
ISEC2019-36 SITE2019-30 BioX2019-28 HWS2019-31 ICSS2019-34 EMM2019-39 pp.207-214 |
IT, ISEC, WBS |
2019-03-07 10:55 |
Tokyo |
University of Electro-Communications |
An Implementation and Evaluation of Pairing Library ELiPS for BLS Curve with Several Techniques Yuto Takahashi, Tadaki Kanenari, Yuki Nanjo, Md. Al-Amin Khandaker, Takuya Kusaka, Yasuyuki Nogami (Okayama Univ.) IT2018-78 ISEC2018-84 WBS2018-79 |
In recent years, pairing encryption has attracted attention as an encryption method to realize high-performance encrypti... [more] |
IT2018-78 ISEC2018-84 WBS2018-79 pp.21-26 |
IT, ISEC, WBS |
2019-03-07 11:20 |
Tokyo |
University of Electro-Communications |
A Consideration of the Properties of Edwards Curve Whose Order is a Power of 2 Hiromasa Miura, Kazuya Kobayashi, Takuya Kusaka, Yasuyuki Nogami (Okayama Univ.) IT2018-79 ISEC2018-85 WBS2018-80 |
Based on the proposal of pairing-based cryptography, ID-based cryptography, searchable cryptography, and attribute-based... [more] |
IT2018-79 ISEC2018-85 WBS2018-80 pp.27-32 |
IT, ISEC, WBS |
2019-03-07 14:30 |
Tokyo |
University of Electro-Communications |
A Study on the System of Detecting Falsification for Conference Records Using Echo Spread Method and Octave Similarity Shoya Ogaki (Univ. Kitakyushu), Shunsuke Araki (Kyutech), Takeru Miyazaki, Satoshi Uehara (Univ. Kitakyushu), Yasuyuki Nogami (Okayama Univ.) IT2018-84 ISEC2018-90 WBS2018-85 |
In this paper, we propose strengthen the robustness against tampering of audio data for conference recording using audio... [more] |
IT2018-84 ISEC2018-90 WBS2018-85 pp.57-64 |
IT, ISEC, WBS |
2019-03-07 15:30 |
Tokyo |
University of Electro-Communications |
Analyzing Final Round Key of AES Implemented on Microcomputer using Neural Network Satoshi Kosugi, Sho Joichi, Ken Ikuta, Takuya Kusaka, Yasuyuki Nogami, Norikazu Takahashi (Okayama University) IT2018-86 ISEC2018-92 WBS2018-87 |
A side channel attack is an attack method that enable external key estimation by observing secondary information generat... [more] |
IT2018-86 ISEC2018-92 WBS2018-87 pp.71-76 |
IT, ISEC, WBS |
2019-03-08 10:50 |
Tokyo |
University of Electro-Communications |
A Consideration of Computational Delay Time by Using MAC Implemented on CAN Hiroto Ogura, Ryunosuke Isshiki, Takuya Kusaka, Yasuyuki Nogami, Kamegawa Tetsushi (Okayama Univ.), Shoichi Maeyama (Kagawa Univ.), Shunsuke Araki (Kyutech) IT2018-105 ISEC2018-111 WBS2018-106 |
CAN(Controller Area Network) is widely used as the vehicle network, however, CAN have no security system. In this manusc... [more] |
IT2018-105 ISEC2018-111 WBS2018-106 pp.181-186 |
EMCJ, IEE-EMC, IEE-MAG |
2018-11-22 14:00 |
Overseas |
KAIST |
Investigation of CAN transceiver and controller response to electromagnetic disturbance by using current injection probe Ryunosuke Isshiki, Kengo Iokibe, Takuya Kusaka, Tetsushi Kamegawa, Yasuyuki Nogami (Okayama Univ.) EMCJ2018-63 |
Recently, connected cars are having a major role on modern traffic system. However, it might include vulnerability and i... [more] |
EMCJ2018-63 pp.23-28 |
ISEC |
2018-05-16 10:25 |
Tokyo |
Ookayama Campus, Tokyo Institute of Technology |
Determining BLS Curves for Pairing over Efficient Tower of Extension Field Yuki Nanjo, Md. Al-Amin Khandaker (Okayama Univ.), Masaaki Shirase (Future Univ. Hakodate), Takuya Kusaka, Yasuyuki Nogami (Okayama Univ.) ISEC2018-2 |
Pairing-based cryptography (PBC) is receiving a lot of attention since it enables many innovative and multi-functional c... [more] |
ISEC2018-2 pp.9-16 |
EMCJ |
2018-01-18 15:00 |
Okayama |
|
Investigation of Reaction of Error Control of CAN Protocol in Case of Electromagnetic Disturbance Injection Ryunosuke Isshiki, Takuya Kusaka, Kengo Iokibe, Yasuyuki Nogami (Okayama Univ.) EMCJ2017-92 |
CAN (Controller Area Network) is employed widely as in-vehicle network protocol. Since the protocol is employed in a sit... [more] |
EMCJ2017-92 pp.25-30 |
EMCJ |
2017-11-22 13:50 |
Tokyo |
Kikai-Shinko-Kaikan Bldg. |
Improvement of Noise Source Amplitude Modulation Method to Identify Source Devices of Electromagnetic Interference Chiaki Ishida, Shinpei Yoshino, Chiaki Ogawa, Kengo Iokibe, Yoshitaka Tyota, Yasuyuki Nogami (Okayama Univ.) EMCJ2017-70 |
For a low cost determination of noise sources to reduce electromagnetic interference (EMI), we have proposed a method to... [more] |
EMCJ2017-70 pp.35-40 |
IT |
2016-07-29 10:15 |
Fukuoka |
Seminar House, Fukuoka Univ. |
A Consideration of an Efficient Calculation over the Extension Field of Degree 4 for Elliptic Curve Pairing Cryptography Akihito Sanada (Okayama Univ.), Sylvain Duquesne (Univ. Rennes 1), Masaaki Shirase (FUN), Yasuyuki Nogami (Okayama Univ.) IT2016-29 |
Pairing based cryptography with BLS(Boneh-Lynn-Shacham) curve is defined over extension field of degree 24 .
Base exten... [more] |
IT2016-29 pp.45-50 |
IT |
2016-07-29 10:40 |
Fukuoka |
Seminar House, Fukuoka Univ. |
A Consideration of an Efficient Calculation over the Extension Field of Degree 3 for Elliptic Curve Pairing Cryptography Yuta Kodera (Okayama Univ.), Sylvain Duquesne (Univ. Rennes 1), Masaaki Shirase (FUN), Yasuyuki Nogami (Okayama Univ.) IT2016-30 |
Recently, pairing based cryptography, which is one of public-key cryptographies, has been paid attention. Mathematically... [more] |
IT2016-30 pp.51-56 |
IT |
2015-09-04 10:50 |
Ishikawa |
Hakusan Shobutei |
A Consideration on Trace Sequence over Finite Field Yasuyuki Nogami, Hiroto Ino (Okayama Univ.), Kazuyoshi Tsuchiya (Koden), Satoshi Uehara (Kitakyu Univ.), Robert H, Morelos Zaragoza (SJSU) IT2015-38 |
The authors have proposed a class of pseudo multi-value sequences generated by trace and power residue over nite eld. ... [more] |
IT2015-38 pp.25-29 |