|
|
All Technical Committee Conferences (Searched in: All Years)
|
|
Search Results: Conference Papers |
Conference Papers (Available on Advance Programs) (Sort by: Date Descending) |
|
Committee |
Date Time |
Place |
Paper Title / Authors |
Abstract |
Paper # |
VLD, HWS [detail] |
2022-03-08 14:15 |
Online |
Online |
A Study on Security Evaluation of COSO-based TRNG Ryuichi Minagawa, Kotaro Hayashi, Naoya Torii (Soka Univ) VLD2021-99 HWS2021-76 |
[more] |
VLD2021-99 HWS2021-76 pp.129-134 |
BioX, ISEC, SITE, ICSS, EMM, HWS, IPSJ-CSEC, IPSJ-SPT [detail] |
2021-07-20 16:20 |
Online |
Online |
Implementation and Evaluation of a Ring Oscillator Type True Random Number Generator (2) Ryuichi Minagawa, KevinHideaki Omae, Kotarou Hayashi, Naoya Torii (Soka Univ.) ISEC2021-27 SITE2021-21 BioX2021-28 HWS2021-27 ICSS2021-32 EMM2021-32 |
A true random number generator (TRNG) is suitable for securing key generation and nonce generation on IoT devices. The r... [more] |
ISEC2021-27 SITE2021-21 BioX2021-28 HWS2021-27 ICSS2021-32 EMM2021-32 pp.104-109 |
SITE, ISEC, HWS, EMM, BioX, IPSJ-CSEC, IPSJ-SPT, ICSS [detail] |
2020-07-21 10:00 |
Online |
Online |
Performance Evaluation of True Random Number Generator Using Latches Naoya Torii, Hideaki Kevin Omae (Soka Univ.) ISEC2020-24 SITE2020-21 BioX2020-27 HWS2020-17 ICSS2020-11 EMM2020-21 |
The use of a physical random number generator (TRNG) is suitable for secure key generation of IoT devices and secure non... [more] |
ISEC2020-24 SITE2020-21 BioX2020-27 HWS2020-17 ICSS2020-11 EMM2020-21 pp.69-74 |
ICSS, ISEC, SITE, EMM, IPSJ-CSEC, IPSJ-SPT [detail] |
2014-07-04 14:15 |
Hokkaido |
San-Refure Hakodate |
Vulnerability in a Privacy-preserving Biometric Authentication by using Homomorphic Encryption Yumi Sakemi, Masahiko Takenaka, Naoya Torii, Masaya Yasuda (Fujitsu Labs. Ltd.) ISEC2014-41 SITE2014-36 ICSS2014-45 EMM2014-41 |
[more] |
ISEC2014-41 SITE2014-36 ICSS2014-45 EMM2014-41 pp.287-292 |
ICSS, ISEC, SITE, EMM, IPSJ-CSEC, IPSJ-SPT [detail] |
2014-07-04 14:40 |
Hokkaido |
San-Refure Hakodate |
Countermeasure to Attack against a Privacy-preserving Biometric Authentication by using Homomorphic Encryption Yumi Sakemi, Masahiko Takenaka, Naoya Torii, Masaya Yasuda (Fujitsu Labs. Ltd.) ISEC2014-42 SITE2014-37 ICSS2014-46 EMM2014-42 |
[more] |
ISEC2014-42 SITE2014-37 ICSS2014-46 EMM2014-42 pp.293-300 |
ISEC |
2013-12-11 15:45 |
Tokyo |
Kikai-Shinko-Kaikan Bldg. |
Another Vulnerability in a Cancelable Biometrics Authentication Scheme Tetsuya Izu, Yumi Sakemi, Masahiko Takenaka, Naoya Torii (Fijitsu Labs.) ISEC2013-79 |
[more] |
ISEC2013-79 pp.39-45 |
IT, ISEC, WBS |
2010-03-05 10:15 |
Nagano |
Nagano-Engineering Campus, Shinshu University |
Obtaining Local Information from FPGA Using Electromagnetic Analysis Takao Ochiai, Dai Yamamoto, Kouichi Itoh, Masahiko Takenaka, Naoya Torii, Daisuke Uchida, Toshiaki Nagai, Shinichi Wakana (Fujitsu Labs.) IT2009-105 ISEC2009-113 WBS2009-84 |
A side channel attack by means of electromagnetic analysis for SASEBO-AES was investigated. Local information from FPGA ... [more] |
IT2009-105 ISEC2009-113 WBS2009-84 pp.217-223 |
ISEC, IPSJ-CSEC |
2004-07-20 15:50 |
Tokushima |
Tokushima Univ. |
An Analysis of Feasibility for the Factoring Device TWIRL (I) Tetsuya Izu, Kouichi Itoh, Jun Kogure, Kiyoshi Kohiyama, Takeshi Shimoyama, Masahiko Takenaka, Naoya Torii, Shouichi Masui (Fujitsu Lab. LTD.), Kenji Mukaida (Fujitsu) |
This document reports an overview of our evaluation results of the dedicated factoring device TWIRL by reviewing the cir... [more] |
ISEC2004-23 pp.61-68 |
ISEC, IPSJ-CSEC |
2004-07-20 16:15 |
Tokushima |
Tokushima Univ. |
An Analysis of Feasibility for the Factoring Device TWIRL (II) Tetsuya Izu, Kouichi Itoh, Jun Kogure, Kiyoshi Kohiyama, Takeshi Shimoyama, Masahiko Takenaka, Naoya Torii, Shouichi Masui (Fujitsu Lab.), Kenji Mukaida (Fujitsu) |
[more] |
ISEC2004-24 pp.69-76 |
|
|
|
Copyright and reproduction :
All rights are reserved and no part of this publication may be reproduced or transmitted in any form or by any means, electronic or mechanical, including photocopy, recording, or any information storage and retrieval system, without permission in writing from the publisher. Notwithstanding, instructors are permitted to photocopy isolated articles for noncommercial classroom use without fee. (License No.: 10GA0019/12GB0052/13GB0056/17GB0034/18GB0034)
|
[Return to Top Page]
[Return to IEICE Web Page]
|