Committee |
Date Time |
Place |
Paper Title / Authors |
Abstract |
Paper # |
HWS |
2025-04-18 15:20 |
Tokyo |
(Primary: On-site, Secondary: Online) |
Statistical Fault Analysis Robust to Fault Model Differences Junichi Sakamoto, Shungo Hayashi, Kentaro Imafuku (AIST) |
[more] |
|
HWS, ICD |
2024-11-01 12:05 |
Aomori |
Hirosaki University (Primary: On-site, Secondary: Online) |
Examination of current status and issues for establishing minimum security requirements of semiconductor chips in embedded devices. Shinji Sato, Kota Ideguchi, Shinichi Kawamura (AIST), Makoto Nagata (Kobe Univ./AIST), Junichi Sakamoto, Hirotaka Yoshida (AIST) HWS2024-64 ICD2024-35 |
In order to develop minimum security requirement specifications for semiconductor chips in embedded devices, a survey an... [more] |
HWS2024-64 ICD2024-35 pp.12-17 |
HWS, ICD |
2024-11-01 15:15 |
Aomori |
Hirosaki University (Primary: On-site, Secondary: Online) |
A Study on the Effectiveness of 1bit-fault Model in Statistical Fault Analysis Shungo Hayashi (AIST/YNU), Junichi Sakamoto, Hikaru Nishiyama, Tsutomu Matsumoto (AIST) HWS2024-68 ICD2024-39 |
Statistical Ineffective Fault Analysis (SIFA), proposed in CHES2018, is a fault attack that uses only error-free ciphert... [more] |
HWS2024-68 ICD2024-39 pp.32-37 |
HWS |
2024-04-19 15:25 |
Tokyo |
(Primary: On-site, Secondary: Online) |
Applying Ring Oscillator-based Laser Detection Sensor to AES Circuitry on FPGA Shungo Hayashi, Junichi Sakamoto, Tsutomu Matsumoto (AIST/YNU) HWS2024-3 |
(To be available after the conference date) [more] |
HWS2024-3 pp.8-13 |
HWS |
2024-04-19 16:25 |
Tokyo |
(Primary: On-site, Secondary: Online) |
Non-Destructive Hardware Trojan Inspection by Backside Near Infrared Imaging Junichi Sakamoto, Yohei Hori, Shinichi Kawamura (AIST), Yuichi Hayashi (NAIST), Makoto Nagata (KU) HWS2024-5 |
Hardware Trojan detection is a critical topic for maintaining the security of IC supply chain. Previous studies have rep... [more] |
HWS2024-5 pp.18-23 |
VLD, HWS, ICD |
2024-03-01 11:40 |
Okinawa |
(Primary: On-site, Secondary: Online) |
Improved Ring Oscillator Sensor for Laser Fault Injection Detection on FPGA Masaki Chikano (YNU), Shungo Hayashi, Junichi Sakamoto (YNU/AIST), Tsutomu Matsumoto (YNU) VLD2023-125 HWS2023-85 ICD2023-114 |
A fault attack is an attack that intentionally injects a fault into an operating device in order to leak internal confid... [more] |
VLD2023-125 HWS2023-85 ICD2023-114 pp.135-140 |
ICD, HWS |
2023-10-31 14:20 |
Mie |
(Primary: On-site, Secondary: Online) |
Evaluation of Time-to-Digital Converter in Laser Fault Injection Detection on FPGA Shungo Hayashi, Junichi Sakamoto (YNU/AIST), Masaki Chikano, Tsutomu Matsumoto (YNU) HWS2023-56 ICD2023-35 |
Fault injection attacks are attacks that intentionally introduce faults into a running device in order to expose interna... [more] |
HWS2023-56 ICD2023-35 pp.10-15 |
EMM, BioX, ISEC, SITE, ICSS, HWS, IPSJ-CSEC, IPSJ-SPT [detail] |
2023-07-25 11:20 |
Hokkaido |
Hokkaido Jichiro Kaikan |
Secure Cryptographic Unit with built-in Signature Generation Hardware for Aggregate Signature Schemes and its FPGA Implementation Toshihiro Sato, Shohei Kawasaki (SCU), Kaoru Masada (Tokyo Univ.), Riku Anzai, Junichi Sakamoto, Naoki Yoshida (YNU), Yasuyoshi Uemura (SCU), Makoto Ikeda (Tokyo Univ.), Tsutomu Matsumoto (YNU) ISEC2023-42 SITE2023-36 BioX2023-45 HWS2023-42 ICSS2023-39 EMM2023-42 |
Secure Cryptographic Unit (SCU) consists of a hardware cryptographic engine and an access control mechanism for the engi... [more] |
ISEC2023-42 SITE2023-36 BioX2023-45 HWS2023-42 ICSS2023-39 EMM2023-42 pp.182-187 |
HWS, VLD |
2023-03-04 10:00 |
Okinawa |
(Primary: On-site, Secondary: Online) |
Importance of Inverters Placement in Ring-Oscilator for Laser Irradiation Detection Shungo Hayashi (YNU), Junichi Sakamoto (AIST/YNU), Masaki Chikano, Tsutomu Matsumoto (YNU) VLD2022-115 HWS2022-86 |
Laser fault injection is known as the most efficient fault injection technique due to its high spatial controllability a... [more] |
VLD2022-115 HWS2022-86 pp.233-238 |
HWS, VLD |
2023-03-04 11:55 |
Okinawa |
(Primary: On-site, Secondary: Online) |
Cloud Based Evaluation of Communication Bandwidth and Tracking Time of Traceable Aggregate Signature Protocols Koudai Aoyama, Riku Anzai, Junichi Sakamoto, Naoki Yoshida, Tsutomu Matsumoto (Yokohama National Univ.) VLD2022-119 HWS2022-90 |
Traceable Aggregate Signature is a scheme that has the ability to identify the source of an illegal signature if it is i... [more] |
VLD2022-119 HWS2022-90 pp.257-260 |
HWS, ICD |
2022-10-25 11:50 |
Shiga |
(Primary: On-site, Secondary: Online) |
Optical Microscopic Observation of Semiconductor Devices toward Hardware Trojan Detection Hirofumi Sakane, Junichi Sakamoto, Shinichi Kawamura (AIST), Makoto Nagata (Kobe Univ.), Yuichi Hayashi (NAIST) HWS2022-34 ICD2022-26 |
In this paper we focus on detection of hardware Trojan (HT) in semiconductor devices under a scenario with following ste... [more] |
HWS2022-34 ICD2022-26 pp.23-28 |
HWS, ICD |
2022-10-25 15:15 |
Shiga |
(Primary: On-site, Secondary: Online) |
A Memory-Saving Software Implementation of Pairing Computation on the GMT8-544 Curve Hiroto Miyata, Junichi Sakamoto, Naoki Yoshida, Riku Anzai, Tsutomu Matsumoto (YNU) HWS2022-39 ICD2022-31 |
There has been a lot of research on increasing the security of IoT, and encryption is one of the methods. Pairing crypto... [more] |
HWS2022-39 ICD2022-31 pp.52-57 |
EMM, BioX, ISEC, SITE, ICSS, HWS, IPSJ-CSEC, IPSJ-SPT [detail] |
2022-07-19 13:25 |
Online |
Online |
Revisit of Non Profiled Side Channel Analysis via Deep Learning Kentaro Imafuku, Shinichi Kawamura, Hanae Nozaki, Junichi Sakamoto, Saki Osuka (AIST) ISEC2022-8 SITE2022-12 BioX2022-33 HWS2022-8 ICSS2022-16 EMM2022-16 |
After a brief review of non-profile side channel analysis using deep learning, we propose some improved versions of the ... [more] |
ISEC2022-8 SITE2022-12 BioX2022-33 HWS2022-8 ICSS2022-16 EMM2022-16 pp.7-12 |
EMM, BioX, ISEC, SITE, ICSS, HWS, IPSJ-CSEC, IPSJ-SPT [detail] |
2022-07-19 15:40 |
Online |
Online |
Security of Systems that Automatically Authenticate a User's Credentials and Location using Wireless Technology Kazuki Tachibana, Junichi Sakamoto, Tsutomu Matsumoto (YNU) ISEC2022-13 SITE2022-17 BioX2022-38 HWS2022-13 ICSS2022-21 EMM2022-21 |
To enhance user convenience, there is a movement to automate certain processes in systems by performing authentication v... [more] |
ISEC2022-13 SITE2022-17 BioX2022-38 HWS2022-13 ICSS2022-21 EMM2022-21 pp.35-39 |
EMM, BioX, ISEC, SITE, ICSS, HWS, IPSJ-CSEC, IPSJ-SPT [detail] |
2022-07-19 17:05 |
Online |
Online |
Security Evaluation of Cryptographic Circuits with Laser Sensors by Double-Spot Laser Irradiation Masaki Chikano, Naoki Yoshida, Junichi Sakamoto, Syungo Hayashi, Tsutomu Matsumoto (YNU) ISEC2022-16 SITE2022-20 BioX2022-41 HWS2022-16 ICSS2022-24 EMM2022-24 |
A fault injection attack is an attack method that intentionally injects faults into a device to cause it to malfunction,... [more] |
ISEC2022-16 SITE2022-20 BioX2022-41 HWS2022-16 ICSS2022-24 EMM2022-24 pp.52-57 |
BioX, ISEC, SITE, ICSS, EMM, HWS, IPSJ-CSEC, IPSJ-SPT [detail] |
2021-07-19 13:55 |
Online |
Online |
Memory-saving implementation of BLS12-381 Pairing-based cryptography Riku Anzai, Junichi Sakamoto, Zihao Song, Naoki Yoshida, Tsutomu Matsumoto (YNU) ISEC2021-11 SITE2021-5 BioX2021-12 HWS2021-11 ICSS2021-16 EMM2021-16 |
For smart security management of IoT systems, it is expected to utilize advanced cryptography such as identity-based enc... [more] |
ISEC2021-11 SITE2021-5 BioX2021-12 HWS2021-11 ICSS2021-16 EMM2021-16 pp.8-13 |
HWS |
2021-04-12 10:50 |
Tokyo |
Tokyo University/Online (Primary: On-site, Secondary: Online) |
Performance Evaluation of an FPGA-Based Pairing Computation Accelerator Junichi Sakamoto, Naoki Yoshida, Tsutomu Matsumoto (YNU) HWS2021-3 |
Several hardware-based accelerators have been proposed to speed up or reduce the power consumption of computationally ex... [more] |
HWS2021-3 pp.13-18 |
HWS |
2021-04-12 11:15 |
Tokyo |
Tokyo University/Online (Primary: On-site, Secondary: Online) |
An Implementation of a Pairing on Cocks-Pinch Curve with Embedding Degree 6 Zihao Song, Junichi Sakamoto, Tsutomu Matsumoto (YNU) HWS2021-4 |
In recent years, with the proliferation of IoT devices and computer performance improvement, there are increasing expect... [more] |
HWS2021-4 pp.19-24 |
ICD, HWS [detail] |
2020-10-26 09:25 |
Online |
Online |
Power Analysis Attack Using Pipeline Scheduling on Pairing Hardware Mitsufumi Yamazaki, Junichi Sakamoto, Tsutomu Matsumoto (YNU) HWS2020-26 ICD2020-15 |
To reduce the latency of pairing calculation for advanced cryptography, hardware implementations with pipelined modular ... [more] |
HWS2020-26 ICD2020-15 pp.7-12 |
ICD, HWS [detail] |
2020-10-26 10:30 |
Online |
Online |
Laser-based Attacks on Ultrasonic Sensors Tatsuya Suehiro, Taku Toyama, Junichi Sakamoto, Tsutomu Matsumoto (Yokohama National Univ.) HWS2020-28 ICD2020-17 |
We examine the instrumentation security threat of irradiating laser for a piezoelectric MEMS transducer in a MEMS ultras... [more] |
HWS2020-28 ICD2020-17 pp.18-23 |