Committee |
Date Time |
Place |
Paper Title / Authors |
Abstract |
Paper # |
ICD, HWS [detail] |
2020-10-26 09:00 |
Online |
Online |
Examination of requirements for power side-channel attack resistance evaluation boards of cryptographic integrated circuits
-- PDN transfer impedance contributing to leakage strength -- Tomonobu Kan, Kengo Iokibe, Yoshitaka Toyota (Okayama Univ.) HWS2020-25 ICD2020-14 |
When evaluating the resistance of a cryptographic circuit to power analysis attacks by measurement, it is not easy to ev... [more] |
HWS2020-25 ICD2020-14 pp.1-6 |
ICD, HWS [detail] |
2020-10-26 09:25 |
Online |
Online |
Power Analysis Attack Using Pipeline Scheduling on Pairing Hardware Mitsufumi Yamazaki, Junichi Sakamoto, Tsutomu Matsumoto (YNU) HWS2020-26 ICD2020-15 |
To reduce the latency of pairing calculation for advanced cryptography, hardware implementations with pipelined modular ... [more] |
HWS2020-26 ICD2020-15 pp.7-12 |
ICD, HWS [detail] |
2020-10-26 09:50 |
Online |
Online |
Fundamental Evaluation Method of EM Information Leakage Caused by Intentional Electromagnetic Interference
-- Impact of Impedance Change in Digital Output Circuits -- Shugo Kaji, Daisuke Fujimoto (NAIST), Masahiro Kinugawa (Univ. of Fukuchiyama), Yuichi Hayashi (NAIST) HWS2020-27 ICD2020-16 |
New threats have been shown to cause information leakage by irradiating electromagnetic (EM) waves of specific intensity... [more] |
HWS2020-27 ICD2020-16 pp.13-17 |
ICD, HWS [detail] |
2020-10-26 10:30 |
Online |
Online |
Laser-based Attacks on Ultrasonic Sensors Tatsuya Suehiro, Taku Toyama, Junichi Sakamoto, Tsutomu Matsumoto (Yokohama National Univ.) HWS2020-28 ICD2020-17 |
We examine the instrumentation security threat of irradiating laser for a piezoelectric MEMS transducer in a MEMS ultras... [more] |
HWS2020-28 ICD2020-17 pp.18-23 |
ICD, HWS [detail] |
2020-10-26 10:55 |
Online |
Online |
Probing Attack on Share-Serial Threshold Implementation of AES Takeshi Sugawara, Yang Li, Kazuo Sakiyama (UEC) HWS2020-29 ICD2020-18 |
[more] |
HWS2020-29 ICD2020-18 pp.24-29 |
ICD, HWS [detail] |
2020-10-26 11:20 |
Online |
Online |
Feasibility of lattice attacks on ECDSA Kotaro Abe, Makoto Ikeda (Tokyo Univ.) HWS2020-30 ICD2020-19 |
ECDSA secret key is recovered via lattice attacks when only a few bits of nonce$(k)$ are leaked. In this paper, we evalu... [more] |
HWS2020-30 ICD2020-19 pp.30-35 |
ICD, HWS [detail] |
2020-10-26 13:00 |
Online |
Online |
Design of Efficient AES Hardware with Immediately Fault Detection Capability Yusuke Yagyu, Rei Ueno, Naofumi Homma (Tohoku Univ.) HWS2020-31 ICD2020-20 |
This paper presents an efficient AES encryption/decryption hardware architecture
with a fault detection scheme.
The pr... [more] |
HWS2020-31 ICD2020-20 pp.36-41 |
ICD, HWS [detail] |
2020-10-26 13:25 |
Online |
Online |
N/A Kazunari Takasaki (Waseda Univ.), Ryoichi Kida (LAC), Nozomu Togawa (Waseda Univ.) HWS2020-32 ICD2020-21 |
N/A [more] |
HWS2020-32 ICD2020-21 pp.42-47 |
ICD, HWS [detail] |
2020-10-26 13:50 |
Online |
Online |
Security Threats and Preventions for Photonics Computing Model Junko Takahashi, Koji Chida, Takeshi Sakamoto (NTT) HWS2020-33 ICD2020-22 |
This paper presents security analysis on photonic computing models in All-Photonics Network (APN). New computing archite... [more] |
HWS2020-33 ICD2020-22 pp.48-53 |
ICD, HWS [detail] |
2020-10-26 14:30 |
Online |
Online |
Domestic Hardware Trojan Research Trends Shinichi Kawamura, Yu-ich Hayashi (AIST) HWS2020-34 ICD2020-23 |
[more] |
HWS2020-34 ICD2020-23 pp.54-58 |
ICD, HWS [detail] |
2020-10-26 14:55 |
Online |
Online |
Physical-Level Detection Approach against Hardware Trojans inside Semiconductor Chips (II) Hirofumi Sakane, Shinichi Kawamura, Kentaro Imafuku, Yohei Hori, Makoto Nagata, Yuichi Hayashi, Tsutomu Matsumoto (AIST) HWS2020-35 ICD2020-24 |
Hardware Trojans, known to be designed and crafted with malicious intent and deployed to be part of the hardware of the ... [more] |
HWS2020-35 ICD2020-24 pp.59-64 |
ICD, HWS [detail] |
2020-10-26 15:20 |
Online |
Online |
Hardware Trojan using LUT Structure of AI Inference Devices Yusuke Nozaki, Shu Takemoto, Yoshiya Ikezaki, Masaya Yoshikawa (Meijo Univ.) HWS2020-36 ICD2020-25 |
The artificial intelligence (AI) technology has been attracted attention in several fields. On the other hand, security ... [more] |
HWS2020-36 ICD2020-25 pp.65-70 |
ICD, HWS [detail] |
2020-10-26 15:45 |
Online |
Online |
Low-Latency Countermeasure Circuit Oriented Hardware Trojan and its Evaluation Shu Takemoto, Yoshiya Ikezaki, Yusuke Nozaki, Masaya Yoshikawa (Meijo Univ.) HWS2020-37 ICD2020-26 |
Outsourcing and the use of IP are the mainstream in the design and manufacturing of system LSIs. On the other hand, the ... [more] |
HWS2020-37 ICD2020-26 pp.71-76 |
ICD, HWS [detail] |
2020-10-26 16:25 |
Online |
Online |
A Detection Method for Hardware Trojans Inserted into Cryptographic Hardware Netlists Akira Ito, Rei Ueno, Naofumi Homma (Tohoku Univ.) HWS2020-38 ICD2020-27 |
[more] |
HWS2020-38 ICD2020-27 pp.77-82 |
ICD, HWS [detail] |
2020-10-26 16:50 |
Online |
Online |
N/A Tatsuki Kurihara, Nozomu Togawa (Waseda Univ.) HWS2020-39 ICD2020-28 |
(To be available after the conference date) [more] |
HWS2020-39 ICD2020-28 pp.83-87 |
ICD, HWS [detail] |
2020-10-26 17:15 |
Online |
Online |
N/A Kohei Nozawa (Waseda Univ.), Kento Hasegawa, Seira Hidano, Shinsaku Kiyomoto (KDDI Research, Inc.), Nozomu Togawa (Waseda Univ.) HWS2020-40 ICD2020-29 |
(To be available after the conference date) [more] |
HWS2020-40 ICD2020-29 pp.88-93 |
ICD, HWS [detail] |
2020-10-26 17:40 |
Online |
Online |
Investigation of High-Efficiency Simulation Method for Detection of Physical Design Falsification in Secure IC Chip Kazuki Yasuda, Kazuki Monta, Daichi Nakagawa, Makoto Nagata (Kobe Univ.) HWS2020-41 ICD2020-30 |
With the development of the IoT society in recent years, various security measures have been developed for integrated ci... [more] |
HWS2020-41 ICD2020-30 pp.94-98 |