Search Results - "Kodera, Yuta"
-
1
A Business-to-Business Collaboration System That Promotes Data Utilization While Encrypting Information on the Blockchain
Published in Sensors (Basel, Switzerland) (29-06-2022)“…Ensuring the reliability of data gathering from every connected device is an essential issue for promoting the advancement of the next paradigm shift, i.e.,…”
Get full text
Journal Article -
2
Optimizing IoT Intrusion Detection Using Balanced Class Distribution, Feature Selection, and Ensemble Machine Learning Techniques
Published in Sensors (Basel, Switzerland) (01-07-2024)“…Internet of Things (IoT) devices are leading to advancements in innovation, efficiency, and sustainability across various industries. However, as the number of…”
Get full text
Journal Article -
3
Transition Probability Test for an RO-Based Generator and the Relevance between the Randomness and the Number of ROs
Published in Entropy (Basel, Switzerland) (31-05-2022)“…A ring oscillator is a well-known circuit used for generating random numbers, and interested readers can find many research results concerning the evaluation…”
Get full text
Journal Article -
4
Consideration for Affects of an XOR in a Random Number Generator Using Ring Oscillators
Published in Entropy (Basel, Switzerland) (05-09-2021)“…A cloud service to offer entropy has been paid much attention to. As one of the entropy sources, a physical random number generator is used as a true random…”
Get full text
Journal Article -
5
Improvement of Final Exponentiation for a Pairing on FK12 Curve and its Implementation
Published in 2022 37th International Technical Conference on Circuits/Systems, Computers and Communications (ITC-CSCC) (05-07-2022)“…Pairings on elliptic curves are used for innovative protocols such as ID-based encryption and zk-SNARKs. To make the pairings secure, it is important to…”
Get full text
Conference Proceeding -
6
An implementation of ELiPS-based Ciphertext-Policy Attribute-Based Encryption
Published in 2023 Eleventh International Symposium on Computing and Networking Workshops (CANDARW) (27-11-2023)“…Pairing-based cryptography serves as a fundamental building block for a wide range of advanced cryptographic protocols, including Ciphertext-Policy…”
Get full text
Conference Proceeding -
7
Efficient Final Exponentiation for Pairings on Several Curves Resistant to Special TNFS
Published in 2021 Ninth International Symposium on Computing and Networking (CANDAR) (01-11-2021)“…Pairings on elliptic curves are exploited for pairing-based cryptography, e.g., ID-based encryption and group signature authentication. For secure…”
Get full text
Conference Proceeding -
8
A Comparison of Relic-toolkit and ELiPS Libraries for a Pairing-based Homomorphic Encryption
Published in 2019 34th International Technical Conference on Circuits/Systems, Computers and Communications (ITC-CSCC) (01-06-2019)“…In recent years, the number of companies are adopting cloud computing service for outsourcing is increasing. On the other hand, there are threats that are like…”
Get full text
Conference Proceeding -
9
Distribution of bit patterns on multi-value sequence over odd characteristics field
Published in 2017 IEEE International Conference on Consumer Electronics - Taiwan (ICCE-TW) (01-06-2017)“…The Internet of Things (IoT) provides much convenient life for us, at the same time it has brought threats for our privacy. In this context, secure and…”
Get full text
Conference Proceeding -
10
Evaluation of IDS model by improving accuracy and reducing overfitting using stacking LSTM
Published in 2024 IEEE International Conference on Consumer Electronics (ICCE) (06-01-2024)“…Utilizing Machine Learning (ML) techniques to construct models for Intrusion Detection Systems (IDS) has emerged as a leading strategy to enhance security…”
Get full text
Conference Proceeding -
11
Optimizing CRYSTALS-Dilithium in Rust: Radix-4 NTT and Assembly-level Comparison with Official C Implementation
Published in 2024 International Conference on Consumer Electronics - Taiwan (ICCE-Taiwan) (09-07-2024)“…Post-Quantum Cryptography (PQC) is becoming popular since it offers protection against quantum attacks. CRYSTALS-Dilithium is being considered as a promising…”
Get full text
Conference Proceeding -
12
Investigating Vulnerabilities in RSA-like Cryptosystems Through Lattice-based Attacks on Small Exponent Keys
Published in 2024 International Conference on Consumer Electronics - Taiwan (ICCE-Taiwan) (09-07-2024)“…RSA-like cryptosystems, based on the original RSA algorithm, are gaining attention as potential alternatives to traditional techniques. They offer better…”
Get full text
Conference Proceeding -
13
Method to Eliminate Fruitless Cycles for Pollard's Rho Method with Splitting Table
Published in 2023 International Technical Conference on Circuits/Systems, Computers, and Communications (ITC-CSCC) (25-06-2023)“…This research focuses on attacks against a type of curve suitable for pairing, called Barreto-Naehring curves. The accelerated attack will evaluate the level…”
Get full text
Conference Proceeding -
14
Secure Comparison Protocol for Promoting Business to Business Collaboration on the Blockchain
Published in 2021 IEEE International Conference on Consumer Electronics-Taiwan (ICCE-TW) (15-09-2021)“…To promote Industry 4.0 and Society 5.0 and so on, it is important to connect and share data so that every member can trust it. Blockchain technology is…”
Get full text
Conference Proceeding -
15
Improvement of Optimal-Ate Pairing on Cocks-Pinch Curve with Embedding Degree 6 in Affine Coordinates
Published in 2022 Tenth International Symposium on Computing and Networking Workshops (CANDARW) (01-11-2022)“…In recent years, several advanced cryptographic protocols that provides practical security and privacy features have been proposed. Pairing-based cryptography…”
Get full text
Conference Proceeding -
16
Improvement of Miller Loop for a Pairing on FK12 Curve and its Implementation
Published in 2022 Tenth International Symposium on Computing and Networking (CANDAR) (01-11-2022)“…Pairing is carried out by two steps, Miller loop and final exponentiation. In this manuscript, the authors propose an efficient Miller loop for a pairing on…”
Get full text
Conference Proceeding -
17
A Method to Eliminate Fruitless Cycles for Pollard's Rho Method by Splitting a Seed-point Table for a Random Walk
Published in 2022 Tenth International Symposium on Computing and Networking (CANDAR) (01-11-2022)“…The most efficient method for solving ECDLP is the Pollard-Rho method, which is known to be more efficient in solving ECDLP by using skew Frobenius mapping and…”
Get full text
Conference Proceeding -
18
An In-depth Analysis of Kerberos and Blockchain Integration on VANETs' Security and Performance
Published in 2024 International Conference on Consumer Electronics - Taiwan (ICCE-Taiwan) (09-07-2024)“…Vehicular Ad-Hoc Networks (VANETs) are essential for modern transportation systems, but their openness exposes them to cyber threats. Authentication in VANETs…”
Get full text
Conference Proceeding -
19
A Study to Improve Calculation Efficiency of CKKS Encoding with Parallelization
Published in 2024 International Conference on Consumer Electronics - Taiwan (ICCE-Taiwan) (09-07-2024)“…CKKS homomorphic encryption is frequently utilized in cloud-based applications due to its ability to handle both real and complex numbers, ensuring the…”
Get full text
Conference Proceeding -
20
SnapSafe: Enabling Selective Image Privacy Through YOLO and AES-Protected Facial Encryption with QR Code
Published in 2024 International Technical Conference on Circuits/Systems, Computers, and Communications (ITC-CSCC) (02-07-2024)“…In the digital age, organizations commonly use photos to share their activities for brand visibility. However, it is crucial to safeguard the facial…”
Get full text
Conference Proceeding