Committee |
Date Time |
Place |
Paper Title / Authors |
Abstract |
Paper # |
HWS, ICD |
2022-10-25 10:00 |
Shiga |
(Primary: On-site, Secondary: Online) |
Hardware Evaluation of Romulus with Threshold Implementation and Its Simulation-Based Leakage Assessment Masaya Nemoto, Tamon Asano, Takeshi Sugawara (UEC) HWS2022-30 ICD2022-22 |
This paper provides a third-party hardware performance evaluation of the NIST LWC finalist
Romulus with threshold imple... [more] |
HWS2022-30 ICD2022-22 pp.1-5 |
HWS, ICD |
2022-10-25 10:25 |
Shiga |
(Primary: On-site, Secondary: Online) |
A Study on Profiled Side-channel Analysis against AES-CTR Katsumi Ebina, Rei Ueno, Naohumi Homma (Tohoku Univ) HWS2022-31 ICD2022-23 |
This paper describes profiling Side-Channel Analysis for AES counter mode.
AES-CTR is a mode in which an internally sto... [more] |
HWS2022-31 ICD2022-23 pp.6-11 |
HWS, ICD |
2022-10-25 10:50 |
Shiga |
(Primary: On-site, Secondary: Online) |
Power current simulation and side channel leakage evaluation of cryptographic IC chips Rikuu Hasegawa, Takuya Wadatsumi, Kazuki Monta, Takuji Miki, Makoto Nagata (Kobe Univ.) HWS2022-32 ICD2022-24 |
Cryptographic modules are threatened by side-channel attacks that use side-channel information to decrypt internal confi... [more] |
HWS2022-32 ICD2022-24 pp.12-16 |
HWS, ICD |
2022-10-25 11:25 |
Shiga |
(Primary: On-site, Secondary: Online) |
Fundamental Study on Randomness Evaluation of ERO-TRNG Using APD Keiichi Ozaki, Daisuke Fujimoto (NAIST), Saki Osuka, Shinichi Kawamura (AIST), Yuichi Hayashi (NAIST) HWS2022-33 ICD2022-25 |
Randomness evaluation of true random number generators (TRNGs) based on ring oscillators (ROs) requires an analysis of o... [more] |
HWS2022-33 ICD2022-25 pp.17-22 |
HWS, ICD |
2022-10-25 11:50 |
Shiga |
(Primary: On-site, Secondary: Online) |
Optical Microscopic Observation of Semiconductor Devices toward Hardware Trojan Detection Hirofumi Sakane, Junichi Sakamoto, Shinichi Kawamura (AIST), Makoto Nagata (Kobe Univ.), Yuichi Hayashi (NAIST) HWS2022-34 ICD2022-26 |
In this paper we focus on detection of hardware Trojan (HT) in semiconductor devices under a scenario with following ste... [more] |
HWS2022-34 ICD2022-26 pp.23-28 |
HWS, ICD |
2022-10-25 13:25 |
Shiga |
(Primary: On-site, Secondary: Online) |
Manipulating the Behaviors of Delay-Sensitive Circuits Using Lasers Kohei Yamashita (UEC), Benjamin Cyr, Kevin Fu (UMich), Wayne Burleson (UMass), Takeshi Sugawara (UEC) HWS2022-35 ICD2022-27 |
[more] |
HWS2022-35 ICD2022-27 pp.29-34 |
HWS, ICD |
2022-10-25 13:50 |
Shiga |
(Primary: On-site, Secondary: Online) |
Fundamental Study of Adversarial Examples Created by Fault Injection Attack on Image Sensor Interface Tatsuya Oyama, Kota Yoshida, Shunsuke Okura, Takeshi Fujino (Ritsumeikan Univ.) HWS2022-36 ICD2022-28 |
Adversarial examples (AEs), which cause misclassification by adding subtle perturbations to input images, have been prop... [more] |
HWS2022-36 ICD2022-28 pp.35-40 |
HWS, ICD |
2022-10-25 14:15 |
Shiga |
(Primary: On-site, Secondary: Online) |
An Estimation Method of the Irradiation Timing of an Attack Pulse for Distance Spoofing Attack Against Direct ToF LiDAR Midori Tomijima, Daisuke Fujimoto, Yuichi Hayashi (NAIST) HWS2022-37 ICD2022-29 |
Autonomous vehicles are equipped with numerous sensors, and the vehicle runs according to their measurements. Therefore,... [more] |
HWS2022-37 ICD2022-29 pp.41-45 |
HWS, ICD |
2022-10-25 14:50 |
Shiga |
(Primary: On-site, Secondary: Online) |
Design and Prototype Evaluation of Stochastic Encrypted Computing Hardware Yuki Tamura, Rei Ueno, Naofumi Homma (Tohoku Univ.) HWS2022-38 ICD2022-30 |
This paper describes the design and evaluation of Homomorphic Encryption for
Stochastic Computing (HESC) hardware.HESC ... [more] |
HWS2022-38 ICD2022-30 pp.46-51 |
HWS, ICD |
2022-10-25 15:15 |
Shiga |
(Primary: On-site, Secondary: Online) |
A Memory-Saving Software Implementation of Pairing Computation on the GMT8-544 Curve Hiroto Miyata, Junichi Sakamoto, Naoki Yoshida, Riku Anzai, Tsutomu Matsumoto (YNU) HWS2022-39 ICD2022-31 |
There has been a lot of research on increasing the security of IoT, and encryption is one of the methods. Pairing crypto... [more] |
HWS2022-39 ICD2022-31 pp.52-57 |
HWS, ICD |
2022-10-25 15:40 |
Shiga |
(Primary: On-site, Secondary: Online) |
Hardware Acceleration of TFHE-based Adder by Controlling Error Yinfan Zhao, Ikeda Makoto (Univ. of Tokyo) HWS2022-40 ICD2022-32 |
Fully homomorphic encryption (FHE) is expected to be used in the secure delegating computation. The bootstrapping in the... [more] |
HWS2022-40 ICD2022-32 pp.58-63 |
HWS, ICD |
2022-10-25 16:15 |
Shiga |
(Primary: On-site, Secondary: Online) |
Design and Implementation of Payload Encryption and MAC for CAN Communication Using Lightweight Encryption SIMON Tomoya Tsuboi, Yuta Kodera, Yasuyuki Nogami, Takuya Kusaka (Okayama Univ) HWS2022-41 ICD2022-33 |
CAN, which is widely used for in-vehicle networks, is a low-cost and efficient connection between electronic control uni... [more] |
HWS2022-41 ICD2022-33 pp.64-69 |
HWS, ICD |
2022-10-25 16:40 |
Shiga |
(Primary: On-site, Secondary: Online) |
A Study on Small Area HMAC-SHA256 Circuit suitable for CMOS Image Sensor Yu Sekioka, Tatsuya Oyama, Hayato Tatsuno, Kota Yoshida, Shunsuke Okura, Takeshi Fujino (Ritsumeikan Univ) HWS2022-42 ICD2022-34 |
In order to realize data integrity and authentication for the edge imaging devices and to prevent the image information ... [more] |
HWS2022-42 ICD2022-34 pp.70-75 |
HWS, ICD |
2022-10-25 17:05 |
Shiga |
(Primary: On-site, Secondary: Online) |
How to Identify the Physical Direction of CAN Message Transmission Yosuke Maekawa, Camille Gay (TOYOTA/YNU), Tsutomu Matsumoto (YNU) HWS2022-43 ICD2022-35 |
The impact of cyber-attacks on automobiles is becoming more serious as vehicles become more connected and multi-function... [more] |
HWS2022-43 ICD2022-35 pp.76-81 |