Committee |
Date Time |
Place |
Paper Title / Authors |
Abstract |
Paper # |
VLD, HWS, ICD |
2024-03-01 11:15 |
Okinawa |
(Primary: On-site, Secondary: Online) |
Investigation of electromagnetic irradiation noise reduction by on-chip LDOs Rikuu Hasegawa, Kazuki Monta, Takuya Wadatsumi, Takuji Miki, Makoto Nagata (Kobe Univ.) VLD2023-124 HWS2023-84 ICD2023-113 |
IC chips are subject to the threat of fault injection attacks, which cause circuit malfunctions (faults) by injecting il... [more] |
VLD2023-124 HWS2023-84 ICD2023-113 pp.131-134 |
VLD, HWS, ICD |
2024-03-01 12:05 |
Okinawa |
(Primary: On-site, Secondary: Online) |
Security Evaluation of Fault Analysis for SuperSonic Shu Takemoto, Yusuke Nozaki, Masaya Yoshikawa (Meijo Univ.) VLD2023-126 HWS2023-86 ICD2023-115 |
SuperSonic, a low-latency lightweight block cipher, is suitable for securing edge devices with high real-time performanc... [more] |
VLD2023-126 HWS2023-86 ICD2023-115 pp.141-144 |
ICSS |
2023-11-16 15:20 |
Ishikawa |
IT Business Plaza Musashi and Online (Primary: On-site, Secondary: Online) |
Attack Verification and Evaluation of Incremental Fault Analysis against AES Encryption Processing Device Miran Tamagawa, Yuichi Futa (TUT), Takehiko Mieno (AVASYS), Hiroyuki Okazaki (Shinshu University) ICSS2023-56 |
In recent years,there has been a growing concern about the impact of fault analysis attack,which use hardware failures a... [more] |
ICSS2023-56 pp.35-41 |
VLD, DC, RECONF, ICD, IPSJ-SLDM [detail] |
2023-11-17 10:00 |
Kumamoto |
Civic Auditorium Sears Home Yume Hall (Primary: On-site, Secondary: Online) |
Derivation of secret keys by differential fault analysis using backside voltage fault injection Yusuke Hayashi, Rikuu Hasegawa, Takuya Wadatsumi, Kazuki Monta, Takuji Miki, Makoto Nagata (Kobe Univ.) VLD2023-64 ICD2023-72 DC2023-71 RECONF2023-67 |
Lasers have been the leading method of fault injection in fault injection attacks on cryptographic integrated circuit (I... [more] |
VLD2023-64 ICD2023-72 DC2023-71 RECONF2023-67 pp.178-181 |
HWS |
2023-04-14 14:45 |
Oita |
(Primary: On-site, Secondary: Online) |
Exploration of analysis methods of electromagnetic fault injection attacks on cryptographic IC chips Yusuke Hayashi, Rikuu Hasegawa, Takuya Wadatsumi, Kazuki Monta, Takuji Miki, Makoto Nagata (Kobe Univ.) HWS2023-4 |
There are various methods of fault injection attacks on cryptographic IC chips, such as lasers and electromagnetic waves... [more] |
HWS2023-4 pp.11-15 |
HWS |
2023-04-14 15:10 |
Oita |
(Primary: On-site, Secondary: Online) |
Electromagnetic fault injection attacks on cryptographic IC chips and analysis of internal voltage fluctuation Rikuu Hasegawa, Takuya Wadatsumi, Kazuki Monta, Takuji Miki, Makoto Nagata (Kobe Univ) HWS2023-5 |
Cryptographic IC chips are subject to the threat of fault injection attacks, which cause circuit malfunctions through in... [more] |
HWS2023-5 pp.16-19 |
HWS, ICD [detail] |
2021-10-19 10:50 |
Online |
Online |
Study on Fault Injection into Cryptographic Modules Using Continuous Sinusoidal Waves with Controlled Frequency, Amplitude and Phase Hikaru Nishiyama, Daisuke Fujimoto, Youngwoo Kim, Yuichi Hayashi (NAIST) HWS2021-43 ICD2021-17 |
A fault injection attack based on an intentional electromagnetic interference (IEMI) using a continuous sinusoidal wave ... [more] |
HWS2021-43 ICD2021-17 pp.13-18 |
WBS, IT, ISEC |
2021-03-04 11:45 |
Online |
Online |
Security analysis for the isogeny-based cryptography CSIDH Hayato Arai, Atsuko Miyaji, Kenta Kodera (Osaka Univ.) IT2020-123 ISEC2020-53 WBS2020-42 |
CSIDH (Commutative Supersingular Isogeny Diffie Hellman) is a kind of post-quantum cryptography that uses isogenies to e... [more] |
IT2020-123 ISEC2020-53 WBS2020-42 pp.73-80 |
ICD, HWS [detail] |
2020-10-26 13:00 |
Online |
Online |
Design of Efficient AES Hardware with Immediately Fault Detection Capability Yusuke Yagyu, Rei Ueno, Naofumi Homma (Tohoku Univ.) HWS2020-31 ICD2020-20 |
This paper presents an efficient AES encryption/decryption hardware architecture
with a fault detection scheme.
The pr... [more] |
HWS2020-31 ICD2020-20 pp.36-41 |
VLD |
2016-03-01 11:20 |
Okinawa |
Okinawa Seinen Kaikan |
Timing-error-tolerant AES Cipher Shinnosuke Yoshida, Youhua Shi, Masao Yanagisawa, Nozomu Togawa (Waseda Univ.) VLD2015-123 |
With the technologies advance, the importance of crypto circuits is increasing as well. AES cipher is well known as theo... [more] |
VLD2015-123 pp.73-78 |
CAS |
2016-01-28 14:45 |
Tokyo |
Kikai-Shinko-Kaikan Bldg. |
Fault Analysis Attack for a Lightweight Block Cipher Simeck Yusuke Nozaki, Masaya Yoshikawa (Meijo Univ.) CAS2015-67 |
Since internet of things (IoT) devices such as sensor device or automotive equipment, become widespread, the security of... [more] |
CAS2015-67 pp.33-38 |
CAS |
2016-01-28 15:10 |
Tokyo |
Kikai-Shinko-Kaikan Bldg. |
Fault Analysis Attack for Piccolo-OTR Kohei Nohara, Masaya Yoshikawa (Meijo Univ.) CAS2015-68 |
Authenticated encryption which has encryption and authentication function has attracted the attention of many researcher... [more] |
CAS2015-68 pp.39-44 |
ITS, IPSJ-ITS, IEE-ITS |
2015-08-24 16:00 |
Hokkaido |
Wakkanai Hokusei Gakuen Univ. |
Fault Analysis for a Lightweight Block Cipher TWINE and its Evaluation using FPGA Yusuke Nozaki, Masaya Yoshikawa (Meijo Univ.) ITS2015-7 |
The security for automotive is very important, because automotive system performs road-to-vehicle and inter-vehicle comm... [more] |
ITS2015-7 pp.57-62 |
VLD, IPSJ-SLDM |
2015-05-14 15:25 |
Fukuoka |
Kitakyushu International Conference Center |
AES Encryption Circuit against Clock Glitch based Fault Analysis Daisuke Hirano, Youhua Shi, Nozomu Togawa, Masao Yanagisawa (Waseda Univ) VLD2015-7 |
Recently, fault analysis has attracted a lot of attentions as a new kind of side channel attack methods,in which malicio... [more] |
VLD2015-7 pp.51-55 |
CAS, CS |
2015-02-26 14:50 |
Tottori |
Tottori University |
Statistical Fault Analysis Attack for PRESENT Ryoma Matsuhisa, Tomoyuki Miyamoto, Masaya Yoshikawa (Meijo Univ.) CAS2014-129 CS2014-101 |
Recently, with the spread of portable devices such as notepads, compact devices are required in embedded applications. T... [more] |
CAS2014-129 CS2014-101 pp.55-60 |
EMCJ, IEE-EMC, MW, EST [detail] |
2014-10-23 10:25 |
Akita |
Akita Prefectural Univ. |
Effect of Precisely Timed Intentional Electromagnetic Interference on Internal Operation in Cryptographic Device Mizuki Kobayashi, Yu-ichi Hayashi, Naofumi Homma, Takaaki Mizuki, Takafumi Aoki, Hideaki Sone (Tohoku Univ.) EMCJ2014-46 MW2014-102 EST2014-60 |
This paper presents a new intentional electromagnetic interference (IEMI) fault-injection method that can inject transie... [more] |
EMCJ2014-46 MW2014-102 EST2014-60 pp.11-15 |
VLD |
2014-03-03 16:00 |
Okinawa |
Okinawa Seinen Kaikan |
Latch-based AES Encryption Circuit Against Fault Analysis Youhua Shi, Hiroaki Taniguchi, Nozomu Togawa, Masao Yanagisawa (Waseda Univ.) VLD2013-140 |
In general, cryptography is considered to be secure because it is based on complicated mathematical theories. In recent ... [more] |
VLD2013-140 pp.37-42 |
EMCJ, IEE-EMC, MW, EST [detail] |
2013-10-25 17:05 |
Miyagi |
Tohoku Univ. |
Fundamental Study on a Mechanism of Non-invasive Fault-injection at Arbitrary Timing of Cryptographic Processing Mizuki Kobayashi, Yu-ichi Hayashi, Naofumi Homma, Takaaki Mizuki, Takafumi Aoki, Hideaki Sone (Tohoku Univ.) EMCJ2013-90 MW2013-130 EST2013-82 |
In this paper, we introduce a new type of intentional electromagnetic interference (IEMI) fault-injection method with ti... [more] |
EMCJ2013-90 MW2013-130 EST2013-82 pp.175-179 |
EMCJ |
2013-04-12 15:25 |
Okayama |
Okayama Univ. |
Fundamental Study on Visualization of Intentional Electromagnetic Interference Fault Injection on Cryptographic Device Yu-ichi Hayashi, Naofumi Homma, Takaaki Mizuki, Takafumi Aoki, Hideaki Sone (Tohoku Univ.) EMCJ2013-8 |
An IEMI-based fault injection is drawing much attention in the field of physical attacks on cryptographic devices due to... [more] |
EMCJ2013-8 pp.43-47 |
VLD |
2013-03-06 14:45 |
Okinawa |
Okinawa Seinen Kaikan |
Probability Driven Hierarchical Fault Analysis System and its Implementation Hikaru Goto, Masaya Yoshikawa (Meijo Univ.) VLD2012-160 |
Although encryption standards are theoretically safe, it has been recently reported that confidential information could ... [more] |
VLD2012-160 pp.135-140 |