Session Details

[A-7]Information Security

Thu. Sep 11, 2025 9:30 AM - 12:15 PM JST
Thu. Sep 11, 2025 12:30 AM - 3:15 AM UTC
Building for General Education (A/B/C) 2F B21(Okayama University)
Chair:AKINORI KAWACHI(Mie University)

[A-7-01]Fast Program Launch with Statically-Instrumented Fork Server

〇Kyohei Yamada1, Tomoki Nakashima1, Yuta Kazato1, Takehiro Kitano1, Akinori Shiraga1 (1. Network Innovation Center, NTT, Inc.)

[A-7-02]カードベース対称関数プロトコルのデモ活用に向けた初期検討

〇Futa Ito1, Yang Li1, Kazuo Sakiyama1, Daiki Miyahara1 (1. The University of Electro-Communications)

[A-7-03]Generating random numbers by Generative Adversarial Networks: a preliminary study

〇Tenyu Kudo1, Shuichi Ichikawa1 (1. Toyohashi University of Technology)

[A-7-04]Integral Attack on the Block Cipher GFSPX analyzing Key Schedule

〇Naoki Shibayama1, Akihisa Ishii1, Yasutaka Igarashi1 (1. Tokyo Univ. of Science)

[A-7-05]Physical Zero-Knowledge Proofs for ASP-Completeness

〇Shiho Terunuma1, Yang Li1, Kazuo Sakiyama1, Daiki Miyahara1 (1. The University of Electro-Communications)

Break time

[A-7-06]鍵列挙アルゴリズムによるZV-FAの効率化の可能性について

〇Riku Kuratani1, Daiki Miyahara1, Kazuo Sakiyama1, Yang Li1 (1. The University of Electro-Communications)

[A-7-07]A Share Generation Method to Reduce the Data Size in Secret Sharing

〇Koki Idehara1, Satoshi Inai1, Hideyoshi Miura1, Yuya Tarutani2, Yukinobu Fukushima1, Tokumi Yokohira1 (1. Okayama University, 2. The University of Osaka)

[A-7-08]Security Study of Cryptoasset Wallets using Multi-Party Computation

〇Yuto Takei1 (1. Mercari)

[A-7-09]Proposal for guidelines on responding to OAuth misuse in authentication

〇Akira Kusama1, Kazue Sako1 (1. Waseda University)

[A-7-10]被覆攻撃の対象となる偶標数有限体上Ordinary楕円曲線に対する被覆曲線の構成に関する研究

〇Koki Yoshida1, Yusuke Uesato1, Mahoro Shimura2, Jinhui Chao1 (1. Graduate School of Science and Engineering, Chuo Univ., 2. Tokai University STEM Education Center)