Committee |
Date Time |
Place |
Paper Title / Authors |
Abstract |
Paper # |
HWS (2nd) |
2019-12-06 16:00 |
Tokyo |
Asakusabashi Hulic Conference |
[Poster Presentation]
An Evaluation of Pairing Implementation on Virtex-6 with Pipelined Modular Multiplier Yota Okuaki, Junichi Sakamoto, Daisuke Fujimoto, Tsutomu Matsumoto (YNU) |
[more] |
|
ISEC, SITE, ICSS, EMM, HWS, BioX, IPSJ-CSEC, IPSJ-SPT [detail] |
2019-07-23 14:25 |
Kochi |
Kochi University of Technology |
Side Channel Security of an FPGA Pairing Implementation with Pipelined Modular Multiplier Mitsufumi Yamazaki, Junichi Sakamoto, Yuta Okuaki, Tsutomu Matsumoto (YNU) ISEC2019-29 SITE2019-23 BioX2019-21 HWS2019-24 ICSS2019-27 EMM2019-32 |
Since bilinear pairing is useful in realizing advanced cryptography, side channel security evaluation of its high-speed ... [more] |
ISEC2019-29 SITE2019-23 BioX2019-21 HWS2019-24 ICSS2019-27 EMM2019-32 pp.151-156 |
ISEC, SITE, ICSS, EMM, HWS, BioX, IPSJ-CSEC, IPSJ-SPT [detail] |
2019-07-23 14:50 |
Kochi |
Kochi University of Technology |
An FPGA Implementation of Aggregate Signature Schemes with Pipelined Modular Multiplier Yota Okuaki, Junichi Sakamoto, Daisuke Fujimoto, Tsutomu Matsumoto (YNU) ISEC2019-30 SITE2019-24 BioX2019-22 HWS2019-25 ICSS2019-28 EMM2019-33 |
Expectations for "Advanced Cryptography" are increasing in order to enhance the security of cyber physical systems and c... [more] |
ISEC2019-30 SITE2019-24 BioX2019-22 HWS2019-25 ICSS2019-28 EMM2019-33 pp.157-162 |
ISEC, SITE, ICSS, EMM, HWS, BioX, IPSJ-CSEC, IPSJ-SPT [detail] |
2019-07-24 09:05 |
Kochi |
Kochi University of Technology |
Instruction Replacement Fault Attack for TVC using Double Laser Station Tomoro Suzuki, Junichi Sakamoto, Tsutomu Matsumoto (YNU) ISEC2019-38 SITE2019-32 BioX2019-30 HWS2019-33 ICSS2019-36 EMM2019-41 |
A powerful attack method called instruction replacement attack has been reported. The method manipulates any 1bit of a m... [more] |
ISEC2019-38 SITE2019-32 BioX2019-30 HWS2019-33 ICSS2019-36 EMM2019-41 pp.221-225 |
ISEC, SITE, ICSS, EMM, HWS, BioX, IPSJ-CSEC, IPSJ-SPT [detail] |
2019-07-24 15:25 |
Kochi |
Kochi University of Technology |
Possibility of Identifying USB Device by Voltage Changing Taku Toyama, Junichi Sakamoto, Naoki Yoshida, Tsutomu Matsumoto (YNU) ISEC2019-61 SITE2019-55 BioX2019-53 HWS2019-56 ICSS2019-59 EMM2019-64 |
In recent years, illegal USB devices have become problematic, such as malware infection by USB memory, incorrect key inp... [more] |
ISEC2019-61 SITE2019-55 BioX2019-53 HWS2019-56 ICSS2019-59 EMM2019-64 pp.391-396 |
HWS |
2019-04-12 15:30 |
Miyagi |
Tohoku University |
Analysis of information leakage induced by radio module transmitting EM waves Junichi Sakamoto (YNU), Masahiro Kinugawa (NIT, Sendai College), Daisuke Fujimoto, Yu-ichi Hayashi (NAIST), Tsutomu Matsumoto (YNU) HWS2019-5 |
(To be available after the conference date) [more] |
HWS2019-5 pp.25-29 |
HWS (2nd) |
2018-12-13 16:10 |
Tokyo |
Tokyo Univ. Takeda Bldg. Takeda Hall |
[Poster Presentation]
A YNU-made Low-Cost Laser Apparatus Capable of High-Precision Fault Injection Junichi Sakamoto, Tsutomu Matsumoto (YNU) |
(Advance abstract in Japanese is available) [more] |
|
HWS (2nd) |
2018-12-13 16:10 |
Tokyo |
Tokyo Univ. Takeda Bldg. Takeda Hall |
[Poster Presentation]
Side-channel Attack using Average Power Traces against Pairing Implementation with Random Masking Countermeasure Mitsufumi Yamazaki, Junichi Sakamoto, Tsutomu Matsumoto (YNU) |
(Advance abstract in Japanese is available) [more] |
|
HWS (2nd) |
2018-12-13 16:10 |
Tokyo |
Tokyo Univ. Takeda Bldg. Takeda Hall |
[Poster Presentation]
A Power Analysis for Software Implemented Ring-LWE Lattice Cryptography with Number Theoretic Transformation Ryo Miyachi, Junichi Sakamoto, Tsutomu Matsumoto (YNU) |
(Advance abstract in Japanese is available) [more] |
|
HWS (2nd) |
2018-12-13 16:10 |
Tokyo |
Tokyo Univ. Takeda Bldg. Takeda Hall |
[Poster Presentation]
Laser-Irradiation-Based Instruction Replacement Can Break an Fault-Injection-Countermeasured AES Implemented in TVC Tomoro Suzuki, Junichi Sakamoto, Tsutomu Matsumoto (YNU) |
(Advance abstract in Japanese is available) [more] |
|
HWS, ICD |
2018-10-29 14:30 |
Osaka |
Kobe Univ. Umeda Intelligent Laboratory |
An Acceleration of Compressed Squaring for Pairing Implementation with Pipeline Modular Multiplier Yota Okuaki, Junichi Sakamoto, Naoki Yoshida, Daisuke Fujimoto, Tsutomu Matsumoto (YNU) HWS2018-50 ICD2018-42 |
One of the biggest problems of the emerging cyber-physical and cloud computing systems is how to ensure security with en... [more] |
HWS2018-50 ICD2018-42 pp.19-24 |
HWS, ICD |
2018-10-29 16:25 |
Osaka |
Kobe Univ. Umeda Intelligent Laboratory |
Impact of Instruction Replacing Laser Fault Attack on Implementation of Pairing Computation on ARM Processor Junichi Sakamoto, Tsutomu Matsumoto (YNU) HWS2018-54 ICD2018-46 |
Many studies on fault attack against many software were performed under the assumption that an attacker could skip an in... [more] |
HWS2018-54 ICD2018-46 pp.41-46 |
HWS |
2018-04-13 13:55 |
Fukuoka |
|
Energy Evaluation of FPGA Pairing Implementation with Pipeline Modular Multiplier Yusuke Nagahama, Daisuke Fujimoto, Junichi Sakamoto, Tsutomu Matsumoto (YNU) HWS2018-5 |
Energy consumption and latency are important features of dedicated hardware bilinear pairing calculators. However publi... [more] |
HWS2018-5 pp.23-28 |
HWS (2nd) |
2018-03-03 15:30 |
Okinawa |
|
Portable Security Testbed for Road Vehicles v1.1
-- Introduction and Verification of Countermeasure Against Message Forgery -- Tsuyoshi Toyama (TOYOTA ITC), Takahito Kiyokawa, Kazuki Shirai, Junichi Sakamoto (YNU), Hisashi Oguma (TOYOTA ITC), Tsutomu Matsumoto (YNU) |
(Advance abstract in Japanese is available) [more] |
|
SITE, EMM, ISEC, ICSS, IPSJ-CSEC, IPSJ-SPT [detail] |
2017-07-15 13:50 |
Tokyo |
|
Security Evaluation of the Software Architecture of TEE-enabled Device and Its Open-source Implementation Naoki Yoshida (YNU), Kazuhiko Fukushima, Shigenori Miyauchi (Renesas Electronics), Junichi Sakamoto, Daisuke Fujimoto, Tsutomu Matsumoto (YNU) ISEC2017-36 SITE2017-28 ICSS2017-35 EMM2017-39 |
It emerges that the use of security systems which separate device resources into Trusted Execution Environment (TEE) and... [more] |
ISEC2017-36 SITE2017-28 ICSS2017-35 EMM2017-39 pp.267-274 |
HWS (2nd) |
2017-06-13 09:00 |
Aomori |
Hirosaki University |
Self-Profiling Side Channel Attack Utilizing Templates for All Sub-Key Candidates Kenya Okutomi, Junichi Sakamoto, Tsutomu Matsumoto (YNU) |
(Advance abstract in Japanese is available) [more] |
|