Committee |
Date Time |
Place |
Paper Title / Authors |
Abstract |
Paper # |
HWS, ICD |
2018-10-29 16:00 |
Osaka |
Kobe Univ. Umeda Intelligent Laboratory |
Evaluation of Availability on Cache Leakage from OSS-RSA Hayato Mori, Rei Ueno (Tohoku Univ.), Junko Takahashi (NTT), Yuichi Hayashi (naist), Naohumi Honma (Tohoku Univ.) HWS2018-53 ICD2018-45 |
In recent years, a new cache attack against RSA encryption using the time difference of operations, named SWL (SWL: Slid... [more] |
HWS2018-53 ICD2018-45 pp.35-40 |
DC |
2017-12-15 15:55 |
Akita |
Akita Study Center, The Open University of Japan |
[Invited Talk]
Hardware Trojan detection based on side-channel analysis Michiko Inoue (NAIST) DC2017-76 |
A hardware Trojan, a malicious addition and/or modification to ICs, caused by outsourcing of design
and/or manufacturin... [more] |
DC2017-76 pp.43-48 |
EMCJ |
2017-11-22 16:05 |
Tokyo |
Kikai-Shinko-Kaikan Bldg. |
Efficient Evaluation Method for Information Leakage of Cryptographic Devices Based on Frequency Selection Airi Sugimoto (Tohoku Univ.), Daisuke Fujimoto, Yu-ichi Hayashi (NAIST), Takaaki Mizuki, Hideaki Sone (Tohoku Univ.) EMCJ2017-75 |
Evaluating electromagnetic information leakage from a cryptographic device takes a considerable amount of time because o... [more] |
EMCJ2017-75 pp.63-66 |
EMCJ, IEE-EMC, MW, EST [detail] |
2016-10-21 09:00 |
Miyagi |
Tohoku Univ. |
Attempt for Determining Cryptographic Circuit Blocks Leaking Side-Channel Information Based on Internal Current Source
-- Examination with FPGA Implementation of AES Circuits -- Kengo Iokibe, Naoki Kawata, Yusuke Yano, Hiroto Kagotani, Yoshitaka Toyota (Okayama Univ.) EMCJ2016-74 MW2016-106 EST2016-70 |
For efficient security enhancement of cryptographic ICs against side-channel attacks (SCAs), it is important to identify... [more] |
EMCJ2016-74 MW2016-106 EST2016-70 pp.79-84 |
EMCJ, IEE-EMC, IEE-MAG |
2016-06-02 13:36 |
Overseas |
NTU, Taiwan |
[Poster Presentation]
Investigation of Relationship between Signal-to-Noise Ratio of EM Information Leakage and Side-Channel Attacking Cost. Yusuke Yano, Kengo Iokibe, Yoshitaka Toyota (Okayama Univ.) EMCJ2016-25 |
Attacking cost of side-channel attack (SCA) can increase by application of various countermeasures to electromagnetic (E... [more] |
EMCJ2016-25 pp.23-24 |
EMCJ, IEE-EMC |
2014-12-19 16:05 |
Shizuoka |
Shizuoka Univ. |
Security Evaluation of CSSAL Countermeasure against Side-Channel Attacks Using Frequency Spectrum Analysis Cancio Monteiro, Yasuhiro Takahashi, Toshikazu Sekine (Gifu Univ.) EMCJ2014-82 |
Information leakage on cryptographic devices are possible because of the correlation between the processed data and its ... [more] |
EMCJ2014-82 pp.75-80 |
VLD, DC, IPSJ-SLDM, CPSY, RECONF, ICD, CPM (Joint) [detail] |
2014-11-27 16:00 |
Oita |
B-ConPlaza |
Integrated-Circuit Countermeasures Against Side-Channel Information Leakage Noriyuki Miura, Daisuke Fujimoto, Makoto Nagata (Kobe University) CPM2014-124 ICD2014-67 |
This paper describes integrated-circuit countermeasures against information leakage from cryptographic processor ICs thr... [more] |
CPM2014-124 ICD2014-67 pp.9-14 |
EMCJ, IEE-EMC |
2014-06-20 10:35 |
Hyogo |
Kobe Univ. |
Side-Channel Leakage on Silicon Substrate of CMOS Cryptographic Chip Daisuke Fujimoto, Noriyuki Miura, Makoto Nagata (Kobe Univ.), Yu-ichi Hayashi, Naofumi Homma (Tohoku Univ.), Shivam Bhasin, Jean-Luc Danger (Telecom Paristech) EMCJ2014-10 |
Power supply currents of CMOS digital circuits partly flow through a silicon substrate in their returning (ground) paths... [more] |
EMCJ2014-10 pp.1-6 |
EMCJ |
2014-03-14 14:25 |
Tokyo |
Kikai-Shinko-Kaikan Bldg. |
Reduction Effect of Information Leakage from a Cryptographic LSI by a Magnetic Thin Film Makiko Otomo, Kaoru Arai, Tetsuo Ito, Yasushi Endo, Masahiro Yamaguchi, Yu-ichi Hayashi, Hideaki Sone, Naofumi Homma, Takafumi Aoki (Tohoku Univ.) EMCJ2013-134 |
This paper describes the differential electromagnetic analysis (DEMA) on a cryptographic LSI and the reduction effect of... [more] |
EMCJ2013-134 pp.11-16 |
ISEC |
2013-12-11 15:20 |
Tokyo |
Kikai-Shinko-Kaikan Bldg. |
Education for Practical Hardware Security Based on Information Security Education Program Yu-ichi Hayashi, Naofumi Homma (Tohoku Univ.), Toshihiro Katashita (AIST), Hideaki Sone (Tohoku Univ.) ISEC2013-78 |
This paper reports an education course for the development of human resources in hardware security in a practical educat... [more] |
ISEC2013-78 pp.33-37 |
VLD, DC, IPSJ-SLDM, CPSY, RECONF, ICD, CPM (Joint) [detail] |
2013-11-27 10:20 |
Kagoshima |
|
Performance Evaluation of Tamper-Resistant AES Cryptographic Circuit utilizing Hybrid Masking Dual-Rail ROM Shintaro Ukai, Tsunato Nakai, Toshiki Kitamura, Takaya Kubota, Mitsuru Shiozaki, Takeshi Fujino (Ritsumeikan Univ.) CPM2013-111 ICD2013-88 |
Tamper-resistant devices require to protect cryptographic circuit from side-channel attacks such as power analysis (PA) ... [more] |
CPM2013-111 ICD2013-88 pp.19-24 |
ISEC |
2013-05-23 13:45 |
Tokyo |
Kikai-Shinko-Kaikan Bldg. |
Information theoretical analysis of side-channel attack (2) Hiroaki Mizuno, Keisuke Iwai, Hidema Tanaka, Takakazu Kurokawa (National Defense Academy) ISEC2013-3 |
In the evaluation of side-channel resistance, it is argued how many observation of physical phenomena which is caused by... [more] |
ISEC2013-3 pp.15-22 |
MW, EMCJ |
2010-10-21 16:20 |
Akita |
Akita Univ. |
Influence of Device Structures on Frequency Spectrum of Common-Mode Current Kouhei Ohmura, Yu-ichi Hayashi, Takaaki Mizuki, Hideaki Sone (Tohoku Univ.) EMCJ2010-59 MW2010-94 |
When a cryptographic module performs encryption or decryption, secret information which correlate to the intermediate da... [more] |
EMCJ2010-59 MW2010-94 pp.43-48 |
EMCJ, MW, IEE-MAG |
2009-10-22 14:00 |
Iwate |
Iwate Univ. |
The Influence of Attached Lines for Electromagnetic Information Leakage from Information Devices Kouhei Ohmura, Yu-ichi Hayashi, Takaaki Mizuki, Hideaki Sone (Tohoku Univ.) EMCJ2009-47 MW2009-96 |
Recently, a lot of attack methods which target information leakage via electromagnetic emanation from information device... [more] |
EMCJ2009-47 MW2009-96 pp.19-24 |