Committee |
Date Time |
Place |
Paper Title / Authors |
Abstract |
Paper # |
DC, CPSY, IPSJ-SLDM, IPSJ-EMB, IPSJ-ARC [detail] |
2023-03-25 14:05 |
Kagoshima |
Amagi Town Disaster Prevention Center (Tokunoshima) (Primary: On-site, Secondary: Online) |
Optimizing Hash Functions of Rabin-Karp Method for Multi-Pattern Matching with Multiple Pattern Length Soa Suzuki, Hayato Yamaki, Shinobu Miwa, Hiroki Honda (UEC) CPSY2022-54 DC2022-113 |
In recent years, demand for multi-pattern matching, in which a large number of patterns are matched against input data, ... [more] |
CPSY2022-54 DC2022-113 pp.118-123 |
IA, SITE, IPSJ-IOT [detail] |
2023-03-16 15:35 |
Gunma |
Maebashi Institute of Technology (Primary: On-site, Secondary: Online) |
Model compression by pruning of CNN based on perceptual hashes Shota Mishina, Tetsuya Morizumi, Hirotsugu Kinoshita (Kanagawa Univ.) SITE2022-59 IA2022-82 |
Message digests that identify images are indispensable for secure and convenient copyright management of digital content... [more] |
SITE2022-59 IA2022-82 pp.28-34 |
RCC, ISEC, IT, WBS |
2023-03-14 11:20 |
Yamaguchi |
(Primary: On-site, Secondary: Online) |
An analysis of the cost to find an isomorphism between hyperelliptic curves in isogeny-based cryptography Daiki Hayashida (Mitsubishi Electric Corp.), Masahiro Ishii (Tokyo Tech) IT2022-77 ISEC2022-56 WBS2022-74 RCC2022-74 |
Isogeny-based cryptography has been attracting attention as one of the candidates for post-quantum computer cryptography... [more] |
IT2022-77 ISEC2022-56 WBS2022-74 RCC2022-74 pp.61-67 |
CAS, CS |
2023-03-02 10:55 |
Fukuoka |
Kitakyushu International Conference Center (Primary: On-site, Secondary: Online) |
Routing using cache nodes and multicast in NDN Shohei Okubo, Hidenori Nakazato (Waseda Univ.) CAS2022-114 CS2022-91 |
In this paper, we propose a mechanism to improve content acquisition and to reduce routing table size in Named Data Netw... [more] |
CAS2022-114 CS2022-91 pp.107-112 |
SIP, BioX, IE, MI, ITE-IST, ITE-ME [detail] |
2022-05-20 14:00 |
Kumamoto |
Kumamoto University Kurokami Campus (Primary: On-site, Secondary: Online) |
Hadamard-Coded Supervised Discrete Hashing on Quaternion Domain Manabu Sueyasu (The Univ. Kitakyushu), Seisuke Kyochi (Kogakuin Univ.), Gou Koutaki (Kumamoto Univ.) SIP2022-23 BioX2022-23 IE2022-23 MI2022-23 |
This paper extends Hadamard-coded supervised discrete hashing on real domain (termed as $mathbb{R}$-HCSDH) using a real-... [more] |
SIP2022-23 BioX2022-23 IE2022-23 MI2022-23 pp.117-122 |
IT, ISEC, RCC, WBS |
2022-03-10 13:50 |
Online |
Online |
A study of explicit formulae of the isogenies between abelian surfaces Daiki Hayashida (Mitsubishi Electric Corp.), Masahiro Ishii (Tokyo Tech) IT2021-104 ISEC2021-69 WBS2021-72 RCC2021-79 |
In this paper, we focus on isogenies over abelian varieties for isogeny-based cryptography and propose the efficient alg... [more] |
IT2021-104 ISEC2021-69 WBS2021-72 RCC2021-79 pp.122-129 |
IT, ISEC, RCC, WBS |
2022-03-11 11:35 |
Online |
Online |
Improved Large-state Permutation based on AES instruction and Its Applications Motoki Nakahashi, Rentaro Shiba, Kosei Sakamoto, Fukang Liu (Univ. Hyogo), Ryoma Ito (NICT), Kazuhiko Minematsu (NEC), Takanori Isobe (Univ. Hyogo/NICT/PRESTO) IT2021-115 ISEC2021-80 WBS2021-83 RCC2021-90 |
In CSS2021, Nakahashi et al. showed an optimal Feistel-type large-state permutations using only AES-NI from the security... [more] |
IT2021-115 ISEC2021-80 WBS2021-83 RCC2021-90 pp.188-195 |
ICSS, IPSJ-SPT |
2022-03-07 14:40 |
Online |
Online |
Efficient Construction of Hash Trees over P2P systems Soma Ishihara, Masakazu Soshi (Hiroshima City Univ.) ICSS2021-63 |
P2P systems provide efficient distributed systems and have the benefit of being easily scalable. However, they also have... [more] |
ICSS2021-63 pp.26-31 |
ICSS, IPSJ-SPT |
2022-03-07 15:00 |
Online |
Online |
ICSS2021-64 |
Accountable Subgroup Multisignature (ASM) enables any subgroup of signers from a group to produce a multi-signature for ... [more] |
ICSS2021-64 pp.32-37 |
BioX, ISEC, SITE, ICSS, EMM, HWS, IPSJ-CSEC, IPSJ-SPT [detail] |
2021-07-20 14:25 |
Online |
Online |
Computer experiment evaluation for time variance of virtual currency mining using cryptographic hash function Kei Ikebe, Kouichi Sakurai (Kyushu Univ.) ISEC2021-36 SITE2021-30 BioX2021-37 HWS2021-36 ICSS2021-41 EMM2021-41 |
Cryptocurrencies are searching for solutions to difficult-to-calculate problems called mining when conducting transactio... [more] |
ISEC2021-36 SITE2021-30 BioX2021-37 HWS2021-36 ICSS2021-41 EMM2021-41 pp.161-166 |
ICSS, IPSJ-SPT |
2021-03-01 14:30 |
Online |
Online |
A path authentication framework based on One-way cross networks Kosuke Ishibashi, Masakazu Soshi (Hiroshima City Univ.) ICSS2020-33 |
Since MANETs can transmit information between mobile devices, it is critically important to guarantee that the transmitt... [more] |
ICSS2020-33 pp.43-48 |
ICSS, IPSJ-SPT |
2021-03-02 09:35 |
Online |
Online |
Proposal for Chameleon Hash with a Revocation Function Koki Matsubara (Osaka Univ.), Atsuko Miyaji (Osaka Univ./ JAIST), Tian Yangguang (Osaka Univ.) ICSS2020-42 |
The data registered on the blockchain cannot be changed again, but Policy-based Chameleon Hash (PCH)by Derler et al. (20... [more] |
ICSS2020-42 pp.96-101 |
ISEC |
2020-05-20 14:40 |
Online |
Online |
Making Variance of Mining Time Smaller for Computational Problems Based on Hash Functions
-- Serial Concatenation and Parallel Concatenation -- Hiroaki Anada (Univ. Nagasaki), Kouichi Sakurai (Kyushu Univ.) ISEC2020-9 |
In Bitcoin, the computational problem which miners should solve is
an equation described in the term of a hash functio... [more] |
ISEC2020-9 pp.33-40 |
IT, ISEC, WBS |
2019-03-08 09:00 |
Tokyo |
University of Electro-Communications |
History-Free Sequential Aggregate MAC without Pseudorandom Permutation Shoichi Hirose (Univ. Fukui/JDC), Junji Shikata (Yokohama National Univ.) IT2018-101 ISEC2018-107 WBS2018-102 |
Eikemeier et al. introduced and formalized sequential aggregate MAC in 2010. They also proposed a history-free scheme f... [more] |
IT2018-101 ISEC2018-107 WBS2018-102 pp.155-162 |
IT, ISEC, WBS |
2019-03-08 16:45 |
Tokyo |
University of Electro-Communications |
[Invited Talk]
Exceptional Experiences of my Research Activities on Modern Cryptography Kazuo Ohta (UEC) IT2018-115 ISEC2018-121 WBS2018-116 |
As a fellow receiving a prize commemorative lecture, I look back on 36-year research and education experiences on modern... [more] |
IT2018-115 ISEC2018-121 WBS2018-116 p.249 |
ICSS, IPSJ-SPT |
2019-03-08 13:00 |
Okinawa |
NICT Okinawa Electromagnetic Technology Center |
Authentication with hash chain computation model Shinta Hirai, Masakazu Soshi (Hiroshima City Univ.) ICSS2018-84 |
Due to the spread of IoT devices, the number of devices restricted by memory etc. has increased.
In order to securely ... [more] |
ICSS2018-84 pp.149-153 |
ISEC |
2017-09-04 15:20 |
Tokyo |
Kikai-Shinko-Kaikan Bldg. |
Provably Secure Code-Based Signature Schemes via Fiat-Shamir Transform with Theoretical and Practical Analysis on Hash Encodings Taiyo Yamaguchi, Bagus Santoso (UEC) ISEC2017-46 |
In this paper, we propose signature schemes constructed from code-based identification scheme proposed by Stern via Fiat... [more] |
ISEC2017-46 pp.35-42 |
SS |
2017-03-09 11:50 |
Okinawa |
|
Equivalence Checking for Methods in Java and Its Applications Kozo Okano (Shinshu Univ.), Satoshi Harauchi (Mitsubishi Electric Corp.), Shinpei Ogata (Shinshu Univ.), Toshifusa Sekizawa (Nihon Univ.), Takeshi Obara (Shinshu Univ.) SS2016-65 |
A programmer sometimes implements both of equals method and hashCode method in a class of Java. The programmer should ob... [more] |
SS2016-65 pp.31-36 |
TL |
2016-12-17 14:00 |
Tokyo |
Room 303/304/305, Building #8, Waseda University |
From Twitter to Mainstream Usage
-- The Electronic Origins of A New Use of "Can" in Colloquial Singapore English -- Lan Yingjie (Cambridge Univ.) TL2016-52 |
In Standard English, can functions as a modal auxiliary. However, it has also been documented to have other functions in... [more] |
TL2016-52 pp.81-86 |
ISEC |
2015-09-04 10:55 |
Tokyo |
Kikai-Shinko-Kaikan Bldg. |
Improvement of RainbowCrack Reduction Function Yuki Tabata, Keisuke Iwai, Hidema Tanaka, Takakazu Kurokawa (NDA) ISEC2015-26 |
Rainbow table is a method to crack the password in high speed from hash values. Rainbow table can crack passwords only i... [more] |
ISEC2015-26 pp.9-14 |