Committee |
Date Time |
Place |
Paper Title / Authors |
Abstract |
Paper # |
HWS (2nd) |
2017-06-12 15:00 |
Aomori |
Hirosaki University |
Malware Attacks and Countermeasures in IoT Systems
-- From the perspective of processor architecture -- Takatsugu Ono, Koyo Miyamura, Koji Inoue (Kyushu Univ.) |
(Advance abstract in Japanese is available) [more] |
|
HWS (2nd) |
2017-06-12 15:25 |
Aomori |
Hirosaki University |
A Study of Development Environment Using Zynq for Pairing-based Cryptography Takanori Miyoshi, Tsutomu Matsumoto (YNU) |
(Advance abstract in Japanese is available) [more] |
|
HWS (2nd) |
2017-06-12 15:50 |
Aomori |
Hirosaki University |
Scheduling for Extension Fields on the BN curve of a 254-bit prime field Tadayuki Ichihashi, Makoto Ikeda (Tokyo Univ.) |
(Advance abstract in Japanese is available) [more] |
|
HWS (2nd) |
2017-06-12 16:25 |
Aomori |
Hirosaki University |
Trends Toward Lightweight Cryptography Algorithms for IoT Networks Awny El-Mohandes (E-JUST) |
(Advance abstract in Japanese is available) [more] |
|
HWS (2nd) |
2017-06-12 16:50 |
Aomori |
Hirosaki University |
Ultra-Light-Weight Implementation of PRINCE Cryptographic Processor Kohei Matsuda, Noriyuki Miura, Makoto Nagata (Kobe Univ.), Shivam Bashin (Nanyang Tech. Univ.), Ville Yli-Mayry, Naofumi Homma (Tohoku Univ.), Yves Mathieu, Tarik Graba, Jean-Luc Danger (Telecom ParisTech) |
(Advance abstract in Japanese is available) [more] |
|
HWS (2nd) |
2017-06-12 17:15 |
Aomori |
Hirosaki University |
Hardware Trojan Insertion into Asynchronous On-chip Network Router Koutaro Inaba, Masashi Imai (Hirosaki Univ.) |
(Advance abstract in Japanese is available) [more] |
|
HWS (2nd) |
2017-06-12 17:40 |
Aomori |
Hirosaki University |
A study on triggering hardware trojans in IC using intentional EM injection Daisuke Fujimoto, Yu-ichi Hayashi (NAIST), Tsutomu Matsumoto (YNU) |
(Advance abstract in Japanese is available) [more] |
|
HWS (2nd) |
2017-06-13 09:00 |
Aomori |
Hirosaki University |
Self-Profiling Side Channel Attack Utilizing Templates for All Sub-Key Candidates Kenya Okutomi, Junichi Sakamoto, Tsutomu Matsumoto (YNU) |
(Advance abstract in Japanese is available) [more] |
|
HWS (2nd) |
2017-06-13 09:25 |
Aomori |
Hirosaki University |
A Study of Chosen Plaintexts Having Equivalent Probability Distribution to Population in Hamming Distance for Cost Reduction of Security Evaluation against Side-Channel Attacks Toshiaki Teshima, Yusuke Yano, Kengo Iokibe, Yoshitaka Toyota (Okayama Univ.) |
(Advance abstract in Japanese is available) [more] |
|
HWS (2nd) |
2017-06-13 09:50 |
Aomori |
Hirosaki University |
Fault Analysis Attack on AES without Faulty Ciphertexts Natsu Shoji, Ryuga Matsumura, Takeshi Sugawara, Kazuo Sakiyama (UEC) |
(Advance abstract in Japanese is available) [more] |
|
HWS (2nd) |
2017-06-13 10:15 |
Aomori |
Hirosaki University |
Side-Channel Authentication Using Diode Laser Ryuga Matsumura, Natsu Shoji, Takeshi Sugawara, Kazuo Sakiyama (UEC) |
(Advance abstract in Japanese is available) [more] |
|
HWS (2nd) |
2017-06-13 10:50 |
Aomori |
Hirosaki University |
Automotive Attacks on Time-Trigger In-Vehicle Network Junko Takahashi (NTT) |
(Advance abstract in Japanese is available) [more] |
|
HWS (2nd) |
2017-06-13 11:15 |
Aomori |
Hirosaki University |
Portable Security Testbed for Road Vehicles Tsuyoshi Toyama, Hisashi Oguma (TOYOTA-ITC), Tsutomu Matsumoto (YNU) |
(Advance abstract in Japanese is available) [more] |
|
HWS (2nd) |
2017-06-13 11:40 |
Aomori |
Hirosaki University |
A Preliminary Experiment on Row Hammer Erina Tatsumi, Takeshi Sugawara, Kazuo Sakiyama (UEC) |
(Advance abstract in Japanese is available) [more] |
|
HWS (2nd) |
2017-06-13 12:05 |
Aomori |
Hirosaki University |
Introduction of Japan Cryptographic Module Validation Program(JCMVP) Gen'ya Sakurai (IPA) |
(Advance abstract in Japanese is available) [more] |
|