IEICE Technical Committee Submission System
Conference Schedule
Online Proceedings
[Sign in]
Tech. Rep. Archives
    [Japanese] / [English] 
( Committee/Place/Topics  ) --Press->
 
( Paper Keywords:  /  Column:Title Auth. Affi. Abst. Keyword ) --Press->

All Technical Committee Conferences  (Searched in: All Years)

Search Results: Conference Papers
 Conference Papers (Available on Advance Programs)  (Sort by: Date Descending)
 Results 1 - 20 of 93  /  [Next]  
Committee Date Time Place Paper Title / Authors Abstract Paper #
EMM, BioX, ISEC, SITE, ICSS, HWS, IPSJ-CSEC, IPSJ-SPT [detail] 2023-07-24
14:20
Hokkaido Hokkaido Jichiro Kaikan Non-profiled Side-Channel Attacks by using Clustering Scores in Deep Learning model (2) -- Attacks by using Models to Predict Ciphertext against Hardware-implemented AES with Countermeasures --
Yuta Fukuda, Kota Yoshida, Takeshi Fujino (Ritsumeikan Univ.) ISEC2023-15 SITE2023-9 BioX2023-18 HWS2023-15 ICSS2023-12 EMM2023-15
 [more] ISEC2023-15 SITE2023-9 BioX2023-18 HWS2023-15 ICSS2023-12 EMM2023-15
pp.7-12
HWS 2023-04-14
15:35
Oita
(Primary: On-site, Secondary: Online)
Object Generation - Backdoor Attack against Object-Detection DNN Triggered by Fault Injection into MIPI
Takumi Takubo, Tatsuya Oyama, Kota Yoshida, Shunsuke Okura, Takeshi Fujino (Ritsumeikan Univ.) HWS2023-6
Backdoor attacks that induce misclassification by poisoning training data and adding specific patterns (trigger marks) t... [more] HWS2023-6
pp.20-25
HWS, VLD 2023-03-03
15:45
Okinawa
(Primary: On-site, Secondary: Online)
Study of Intrinsic ID extracted from RG-DTM Arbiter PUF implemented on FPGA
Mika Sakai, Tatsuya Oyama, Kota Yoshida (Ritsumeikan Univ.), Yohei Hori, Toshihiro Katashita (AIST), Masayoshi Shirahata, Takeshi Fujino (Ritsumeikan Univ.) VLD2022-111 HWS2022-82
We studied the implementation method of PUF for generating a unique ID on FPGA. We adopted a method of controlling the p... [more] VLD2022-111 HWS2022-82
pp.209-214
VLD, DC, RECONF, ICD, IPSJ-SLDM [detail] 2022-11-30
16:40
Kumamoto  
(Primary: On-site, Secondary: Online)
Evaluation of Model Quantization Method on Vitis-AI for Mitigating Adversarial Examples
Yuta Fukuda, Kota Yoshida, Takeshi Fujino (Ritsumeikan Univ.) VLD2022-51 ICD2022-68 DC2022-67 RECONF2022-74
Adversarial examples (AEs) are security threats in deep neural networks (DNNs). One of the countermeasures is adversaria... [more] VLD2022-51 ICD2022-68 DC2022-67 RECONF2022-74
pp.182-187
HWS, ICD 2022-10-25
13:50
Shiga
(Primary: On-site, Secondary: Online)
Fundamental Study of Adversarial Examples Created by Fault Injection Attack on Image Sensor Interface
Tatsuya Oyama, Kota Yoshida, Shunsuke Okura, Takeshi Fujino (Ritsumeikan Univ.) HWS2022-36 ICD2022-28
Adversarial examples (AEs), which cause misclassification by adding subtle perturbations to input images, have been prop... [more] HWS2022-36 ICD2022-28
pp.35-40
HWS, ICD 2022-10-25
16:40
Shiga
(Primary: On-site, Secondary: Online)
A Study on Small Area HMAC-SHA256 Circuit suitable for CMOS Image Sensor
Yu Sekioka, Tatsuya Oyama, Hayato Tatsuno, Kota Yoshida, Shunsuke Okura, Takeshi Fujino (Ritsumeikan Univ) HWS2022-42 ICD2022-34
In order to realize data integrity and authentication for the edge imaging devices and to prevent the image information ... [more] HWS2022-42 ICD2022-34
pp.70-75
EMM, BioX, ISEC, SITE, ICSS, HWS, IPSJ-CSEC, IPSJ-SPT [detail] 2022-07-19
15:15
Online Online Revealing PUF Responses by Differential Power Analysis against Reed-Muller-Code-based Fuzzy Extractor
Soma Watanabe, Yuta Fukuda, Tatsuya Oyama, Kota Yoshida, Takeshi Fujino (Ritsumeikan Univ) ISEC2022-12 SITE2022-16 BioX2022-37 HWS2022-12 ICSS2022-20 EMM2022-20
IoT devices that use the Physically Unclonable Function (PUF) response to generate a secret key has been proposed. Since... [more] ISEC2022-12 SITE2022-16 BioX2022-37 HWS2022-12 ICSS2022-20 EMM2022-20
pp.29-34
HWS 2022-04-26
10:55
Tokyo AIST Tokyo Waterfront (Annex)
(Primary: On-site, Secondary: Online)
Deep Learning Side-Channel Attacks against Hardware-Implemented Lightweight Cipher Midori64
Madoka Sako, Kunihiro Kuroda, Yuta Fukuda, Kota Yoshida, Takeshi Fujino (Ritsumeikan Univ.) HWS2022-2
Midori is a lightweight cipher and it is developed to achieve superior circuit size, low latency, and low power consumpt... [more] HWS2022-2
pp.7-12
HWS 2022-04-26
11:20
Tokyo AIST Tokyo Waterfront (Annex)
(Primary: On-site, Secondary: Online)
Deep Learning-based Side-Channel Attacks against Software-Implemented RSA using Binary Exponentiation with Dummy Multiplication
Seiya Shimada, Kunihiro Kuroda, Yuta Fukuda, Kouta Yoshida, Takeshi Fujino (Ritsumeikan Univ.) HWS2022-3
Recently, deep learning-based side-channel attacks (DL-SCA) against symmetric key cryptography such as AES have been rep... [more] HWS2022-3
pp.13-18
VLD, HWS [detail] 2022-03-08
13:25
Online Online A Study on Small Area Circuits for CMOS Image Sensors with Message Authentication Codes (1) -- Drive Circuit and Pixel Array Configuration --
Yoshihiro Akamatsu, Hiroaki Ogawa, Tatsuya Oyama, Hayato Tatsuno, Yu Sekioka, Shunsuke Okura, Takeshi Fujino (Ritsumeikan Univ) VLD2021-97 HWS2021-74
In edge AI, the information acquired by sensors is classified or recognized at the edge, and therefore, guaranteeing the... [more] VLD2021-97 HWS2021-74
pp.117-122
VLD, HWS [detail] 2022-03-08
13:50
Online Online A Study on Small Area Circuits for CMOS Image Sensor with Message Authentication codes (2) -- Code generation circuit --
Yu Sekioka, Hiroaki Ogawa, Hayato Tatsuno, Tatsuya Oyama, Yoshihiro Akamatsu, Shunsuke Okura, Takeshi Fujino (Ritsumeikan Univ) VLD2021-98 HWS2021-75
In edge AI (Artificial Intelligence) computing, information acquired by sensors is processed with distributed IoT device... [more] VLD2021-98 HWS2021-75
pp.123-128
BioX, ISEC, SITE, ICSS, EMM, HWS, IPSJ-CSEC, IPSJ-SPT [detail] 2021-07-20
14:50
Online Online Deep Learning Side-Channel Attacks against Unprotected AES and RSM-AES Implemented in ASIC
Yuta Fukuda, Kota Yoshida, Hisashi Hashimoto, Takeshi Fujino (Ritsumeikan Univ.) ISEC2021-24 SITE2021-18 BioX2021-25 HWS2021-24 ICSS2021-29 EMM2021-29
The cryptographic key can be revealed by exploiting side-channel information such as power traces under operation.
Rec... [more]
ISEC2021-24 SITE2021-18 BioX2021-25 HWS2021-24 ICSS2021-29 EMM2021-29
pp.86-91
BioX, ISEC, SITE, ICSS, EMM, HWS, IPSJ-CSEC, IPSJ-SPT [detail] 2021-07-20
15:30
Online Online Implimentation of RISC-V TEE using PUF as Root of Trust
Kota Yoshida (Ritsumeikan Univ.), Kuniyasu Suzaki (AIST), Takeshi Fujino (Ritsumeikan Univ.) ISEC2021-25 SITE2021-19 BioX2021-26 HWS2021-25 ICSS2021-30 EMM2021-30
In society 5.0, acquiring trustworthy data from a huge amount of IoT devices in physical spaces, it is important to veri... [more] ISEC2021-25 SITE2021-19 BioX2021-26 HWS2021-25 ICSS2021-30 EMM2021-30
pp.92-97
BioX, ISEC, SITE, ICSS, EMM, HWS, IPSJ-CSEC, IPSJ-SPT [detail] 2021-07-20
15:55
Online Online Evaluation of TRNG Using CMOS Image Sensor
Hayato Tatsuno, Tatsuya Oyama, Masayoshi Shirahata, Shunsuke Okura, Takeshi Fujino (Ritsumeikan Univ.) ISEC2021-26 SITE2021-20 BioX2021-27 HWS2021-26 ICSS2021-31 EMM2021-31
Recently, the number of IoT devices has been increasing rapidly, and cryptographic functions such as authentication, key... [more] ISEC2021-26 SITE2021-20 BioX2021-27 HWS2021-26 ICSS2021-31 EMM2021-31
pp.98-103
HWS, VLD [detail] 2021-03-04
13:00
Online Online Design of Area-Efficient Response Generator for CMOS Image Sensor PUF
Masanori Aoki, Shunsuke Okura, Masayoshi Shirahata, Takeshi Fujino (Ritsumeikan Univ.) VLD2020-82 HWS2020-57
(To be available after the conference date) [more] VLD2020-82 HWS2020-57
pp.79-84
SITE, ISEC, HWS, EMM, BioX, IPSJ-CSEC, IPSJ-SPT, ICSS [detail] 2020-07-21
10:50
Online Online Adversarial scan attack against ICP algorithm for pose estimation on LiDAR-based SLAM
Kota Yoshida, Takeshi Fujino (Ritsumeikan Univ.) ISEC2020-26 SITE2020-23 BioX2020-29 HWS2020-19 ICSS2020-13 EMM2020-23
An autonomous robot is controlled on physical information acquired by various sensors. Some physical attacks are propose... [more] ISEC2020-26 SITE2020-23 BioX2020-29 HWS2020-19 ICSS2020-13 EMM2020-23
pp.81-86
HWS, VLD [detail] 2020-03-07
10:30
Okinawa Okinawa Ken Seinen Kaikan
(Cancelled but technical report was issued)
Causes of Entropy Loss on Non-IID PUFs and their Entropy Estimations (1)
Mitsuru Shiozaki (Ritsumeikan Univ.), Yohei Hori (AIST), Shunsuke Okura, Masayoshi Shirahata, Takeshi Fujino (Ritsumeikan Univ.) VLD2019-138 HWS2019-111
Recently, evaluation items and evaluation schemes of Physically Unclonable Functions (PUFs) are discussed in internation... [more] VLD2019-138 HWS2019-111
pp.257-262
HWS, VLD [detail] 2020-03-07
10:55
Okinawa Okinawa Ken Seinen Kaikan
(Cancelled but technical report was issued)
Causes of Entropy Loss on Non-IID PUFs and their Entropy Estimations (2)
Mitsuru Shiozaki (Ritsumeikan Univ.), Yohei Hori (AIST), Shunsuke Okura, Masayoshi Shirahata, Takeshi Fujino (Ritsumeikan Univ.) VLD2019-139 HWS2019-112
Recently, evaluation items and evaluation schemes of Physically Unclonable Functions (PUFs) are discussed in internation... [more] VLD2019-139 HWS2019-112
pp.263-268
HWS
(2nd)
2019-12-06
16:00
Tokyo Asakusabashi Hulic Conference [Poster Presentation] Model Reverse-Engineering Attack using Correlation Power Analysis against Systolic Array Based Neural Network Accelerator
Kota Yoshida, Shunsuke Okura, Mitsuru Shiozaki, Takaya Kubota, Takeshi Fujino (Ritsumeikan Univ.)
 [more]
VLD, DC, CPSY, RECONF, ICD, IE, IPSJ-SLDM, IPSJ-EMB, IPSJ-ARC
(Joint) [detail]
2019-11-15
09:15
Ehime Ehime Prefecture Gender Equality Center A Study on Dependence between Performance Metrics of PUFs and the Number of Response Bits using PUF Numerical Model
Tatsuya Oyama, Masayoshi Shirahata, Mitsuru Shiozaki, Shunsuke Okura (Ritsumeikan Univ.), Yohei Hori (AIST), Takeshi Fujino (Ritsumeikan Univ.) ICD2019-33 IE2019-39
Recently, performance metrics of Physically Unclonable Function (PUF) are discussed toward international standardization... [more] ICD2019-33 IE2019-39
pp.25-30
 Results 1 - 20 of 93  /  [Next]  
Choose a download format for default settings. [NEW !!]
Text format pLaTeX format CSV format BibTeX format
Copyright and reproduction : All rights are reserved and no part of this publication may be reproduced or transmitted in any form or by any means, electronic or mechanical, including photocopy, recording, or any information storage and retrieval system, without permission in writing from the publisher. Notwithstanding, instructors are permitted to photocopy isolated articles for noncommercial classroom use without fee. (License No.: 10GA0019/12GB0052/13GB0056/17GB0034/18GB0034)


[Return to Top Page]

[Return to IEICE Web Page]


The Institute of Electronics, Information and Communication Engineers (IEICE), Japan