IWSEC Best Poster Award(CSEC研究会)
IWSEC Best Poster Award(CSEC研究会)
賞の概要 | IWSECにおいて発表された優秀なポスターの著者に授与する。 |
選考委員会 | IWSEC Best Paper Award選奨委員会(プログラム委員長を含むプログラム委員若干名から成る) |
選考方法 | 参加者による投票をもとに選奨委員会が受賞ポスターを選出する。 |
選考基準 | IWSEC においてポスター発表を行った 3件程度とする。受賞者は著者全員とする。 |
表彰等 | 賞状 |
2023年度
受賞者 | タイトル |
Mine Arai, Naoto Yanai and Goichiro Hanaoka | KOTO Crypto: Educational cryptography with the Koto |
Hyuna Noh, Eunmin Lee, Minju Lee, Suhri Kim and Joohee Lee | Security Analysis on KpqC Round 1 Lattice-based Algorithms Using Lattice Estimator |
2022年度
受賞者 | タイトル |
Miho Miyake and Akinori Kawachi | Secure Multi-party Computation for Symmetric Function with Tree Interaction Patterns |
2021年度
受賞者 | タイトル |
Xuping Huang, Shunsuke Mochizuki, and Katsunari Yoshioka | Towards Estimating Radio Resources Wasted by IoT Botnet Attacks |
2020年度
(新型コロナウイルスの影響により選出なし)
2019年度
受賞者 | タイトル |
en Naganuma, Suzuki Takayuki, Kenta Takahashi, Yousuke Kaga, Masayuki Yoshino, and Noboru Kunihiro | Secure Key-management Technology for Blockchain using Biometrics Information |
Tomoki Moriya, Hiroshi Onuki, and Tsuyoshi Takagi | How to Construct CSIDH on Edwards Curves |
Yuji Koike, Takuya Hayashi, and Takanori Isobe | A Practical Leakage-Resilient Scheme using Big-key Encryptions |
Yoshiki Abe, Mitsugu Iwamoto, and Kazuo Ohta | How to improve the private PEZ protocol for general functions |
2018年度
受賞者(所属) | タイトル |
Daisuke Kito and Yoshiaki Isobe (Hitachi, Ltd.) | Study of Security Risk of Cryptocurrency Exchange Service |
Dang Duy Thang and Toshihiro Matsui (Institute of Information Security) | White-box Attack on Google Machine Learning System |
Erina Tatsumi, Kazuo Sakiyama and Takeshi Sugawara(The University of Electro-Communications) | A Case Study of Row Hammer under Different Refresh Rates |
Yuji Suga (Internet Initiative Japan Inc.) | Alexa, Renew the Public Key and the Certificate (of Your TLS Sites) |
2017年度
受賞者(所属) | タイトル |
Tatsuya Suzuki (Tokai University), Keita Emura (NICT), Hayato Kimura (Tokai University) and Toshihiro Ohigashi (Tokai University) | Implementation Results of Privacy-Preserving and Public Verifiable Data Aggregation Protocols |
Natsu Shoji, Ryuga Matsumura, Takeshi Sugawara and Kazuo Sakiyama (The University of Electro-Communications Department of Informatics) | An Evaluation of Ineffective Fault Analysis on AES using Single-Bit Bit-Set/Reset Faults |
Mitsuhiro Hattori (Mitsubishi Electric Corporation), Takato Hirano (Mitsubishi Electric Corporation), Nori Matsuda (Mitsubishi Electric Corporation), Rina Shimizu (Mitsubishi Electric Corporation), Ye Wang (Mitsubishi Electric Research Laboratories) | Privacy-Utility Tradeoff for Applications Using Energy Disaggregation of Smart-Meter Data |
2016年度
受賞者 | タイトル |
Eunkyung Kim and Mehdi Tibouchi | FHE over the Integers and Modular Arithmetic Circuits |
Yudai Nagamine, Naoto Yanai, Shingo Okamura, and Toru Fujiwara | Malware for Protocol Misidentification |
2015年度
受賞者 | タイトル |
Ai Ishida, Keita Emura, Goichiro Hanaoka, Yusuke Sakai, and Keisuke Tanaka | Disavowability on Public Key Encryption with Non-interactive Opening |
Akihiro Nishimura, Takuya Nishida, Yu-ichi Hayashi, Takaaki Mizuki, and Hideaki Sone | Card-Based Cryptographic Protocols with Unordinary Shuffle |
2014年度
受賞者 '*'=Presenter(s). |
タイトル |
*Yohei Watanabe and Junji Shikata | Information-Theoretically Secure Revocable-Storage Broadcast Encryption |
2013年度
受賞者 '*'=Presenter(s). |
タイトル |
*Shota Yamada, Nuttapong Attrapadung, Goichiro Hanaoka, and Noboru Kunihiro | New Security Proof for a Variant of the BGW Broadcast Encryption Scheme |
*Yuntao Wang, Hui Zhang, and Tsuyoshi Takagi | Improving BKZ Algorithm with Reordering Technique |
2012年度
受賞者 '*'=Presenter(s). |
タイトル |
Takayuki YAMADA, Seiichi GOHSHI, *Isao ECHIZEN | Privacy Visor: wearable device for privacy protection based on differences in sensory perception between humans and devices |
*Hui ZHANG, Tsuyoshi TAKAGI | Cryptanalysis of Multi-prime RSA with Small Prime Difference |
*Takashi Yamakawa, Shota Yamada, Goichiro Hanaoka, Noboru Kunihiro | Bounded CCA Secure KEM from the Computational Bilinear Diffie-Hellman Assumption |
*Yuji Suga | Optimal Construction of Graph-based Visual Secret Sharing Schemes for Multiple Secrets |
2011年度
受賞者 '*'=Presenter(s). |
タイトル |
*Ken Ichikawa and Kanta Matsuura | Preventing execution of JIT shellcode by isolating running process |
*Kaori Tosu and Noboru Kunihiro | Optimizing Bounds against Multi-Prime Phi-Hiding Problems |
*Yutaka Kawai | Schnorr Signature May Not Be Secure under Several Diffie-Hellman Type Assumptions |
Takayuki Yamada, *Seiichi Gohshi, and *Isao Echizen | Method for preventing illegal recording of displayed content based on differences in sensory perception between humans and devices |