IWSEC Best Poster Award(CSEC研究会)

IWSEC Best Poster Award(CSEC研究会)

 
賞の概要 IWSECにおいて発表された優秀なポスターの著者に授与する。
選考委員会 IWSEC Best Paper Award選奨委員会(プログラム委員長を含むプログラム委員若干名から成る)
選考方法 参加者による投票をもとに選奨委員会が受賞ポスターを選出する。
選考基準 IWSEC においてポスター発表を行った 3件程度とする。受賞者は著者全員とする。
表彰等 賞状

2024年度

受賞者(所属) タイトル
Dmitry Prokhorenkov Reference Model for Differential Privacy (RMDP)
Yuki Seto, Hiroki Furue and Atsushi Takayasu Partial Key Exposure Attacks on UOV and Its Variants
Takumi Nishimura and Atsushi Takayasu Efficient Revocable Identity-Based Encryption from Middle-Product LWE

2023年度

受賞者 タイトル
Mine Arai, Naoto Yanai and Goichiro Hanaoka KOTO Crypto: Educational cryptography with the Koto
Hyuna Noh, Eunmin Lee, Minju Lee, Suhri Kim and Joohee Lee Security Analysis on KpqC Round 1 Lattice-based Algorithms Using Lattice Estimator

2022年度

受賞者 タイトル
Miho Miyake and Akinori Kawachi Secure Multi-party Computation for Symmetric Function with Tree Interaction Patterns

2021年度

受賞者 タイトル
Xuping Huang, Shunsuke Mochizuki, and Katsunari Yoshioka Towards Estimating Radio Resources Wasted by IoT Botnet Attacks

2020年度

 (新型コロナウイルスの影響により選出なし)

2019年度

受賞者 タイトル
en Naganuma, Suzuki Takayuki, Kenta Takahashi, Yousuke Kaga, Masayuki Yoshino, and Noboru Kunihiro Secure Key-management Technology for Blockchain using Biometrics Information
Tomoki Moriya, Hiroshi Onuki, and Tsuyoshi Takagi How to Construct CSIDH on Edwards Curves
Yuji Koike, Takuya Hayashi, and Takanori Isobe A Practical Leakage-Resilient Scheme using Big-key Encryptions
Yoshiki Abe, Mitsugu Iwamoto, and Kazuo Ohta How to improve the private PEZ protocol for general functions

2018年度

受賞者(所属) タイトル
Daisuke Kito and Yoshiaki Isobe (Hitachi, Ltd.) Study of Security Risk of Cryptocurrency Exchange Service
Dang Duy Thang and Toshihiro Matsui (Institute of Information Security) White-box Attack on Google Machine Learning System
Erina Tatsumi, Kazuo Sakiyama and Takeshi Sugawara(The University of Electro-Communications) A Case Study of Row Hammer under Different Refresh Rates
Yuji Suga (Internet Initiative Japan Inc.) Alexa, Renew the Public Key and the Certificate (of Your TLS Sites)

2017年度

受賞者(所属) タイトル
Tatsuya Suzuki (Tokai University), Keita Emura (NICT), Hayato Kimura (Tokai University) and Toshihiro Ohigashi (Tokai University) Implementation Results of Privacy-Preserving and Public Verifiable Data Aggregation Protocols
Natsu Shoji, Ryuga Matsumura, Takeshi Sugawara and Kazuo Sakiyama (The University of Electro-Communications Department of Informatics) An Evaluation of Ineffective Fault Analysis on AES using Single-Bit Bit-Set/Reset Faults
Mitsuhiro Hattori (Mitsubishi Electric Corporation), Takato Hirano (Mitsubishi Electric Corporation), Nori Matsuda (Mitsubishi Electric Corporation), Rina Shimizu (Mitsubishi Electric Corporation), Ye Wang (Mitsubishi Electric Research Laboratories) Privacy-Utility Tradeoff for Applications Using Energy Disaggregation of Smart-Meter Data

2016年度

受賞者 タイトル
Eunkyung Kim and Mehdi Tibouchi FHE over the Integers and Modular Arithmetic Circuits
Yudai Nagamine, Naoto Yanai, Shingo Okamura, and Toru Fujiwara Malware for Protocol Misidentification

2015年度

受賞者 タイトル
Ai Ishida, Keita Emura, Goichiro Hanaoka, Yusuke Sakai, and Keisuke Tanaka Disavowability on Public Key Encryption with Non-interactive Opening
Akihiro Nishimura, Takuya Nishida, Yu-ichi Hayashi, Takaaki Mizuki, and Hideaki Sone Card-Based Cryptographic Protocols with Unordinary Shuffle

2014年度

受賞者
'*'=Presenter(s).
タイトル
*Yohei Watanabe and Junji Shikata Information-Theoretically Secure Revocable-Storage Broadcast Encryption

2013年度

受賞者
'*'=Presenter(s).
タイトル
*Shota Yamada, Nuttapong Attrapadung, Goichiro Hanaoka, and Noboru Kunihiro New Security Proof for a Variant of the BGW Broadcast Encryption Scheme
*Yuntao Wang, Hui Zhang, and Tsuyoshi Takagi Improving BKZ Algorithm with Reordering Technique

2012年度

受賞者
'*'=Presenter(s).
タイトル
Takayuki YAMADA, Seiichi GOHSHI, *Isao ECHIZEN Privacy Visor: wearable device for privacy protection based on differences in sensory perception between humans and devices
*Hui ZHANG, Tsuyoshi TAKAGI Cryptanalysis of Multi-prime RSA with Small Prime Difference
*Takashi Yamakawa, Shota Yamada, Goichiro Hanaoka, Noboru Kunihiro Bounded CCA Secure KEM from the Computational Bilinear Diffie-Hellman Assumption
*Yuji Suga Optimal Construction of Graph-based Visual Secret Sharing Schemes for Multiple Secrets

2011年度

受賞者
'*'=Presenter(s).
タイトル
*Ken Ichikawa and Kanta Matsuura Preventing execution of JIT shellcode by isolating running process
*Kaori Tosu and Noboru Kunihiro Optimizing Bounds against Multi-Prime Phi-Hiding Problems
*Yutaka Kawai Schnorr Signature May Not Be Secure under Several Diffie-Hellman Type Assumptions
Takayuki Yamada, *Seiichi Gohshi, and *Isao Echizen Method for preventing illegal recording of displayed content based on differences in sensory perception between humans and devices