|
|
All Technical Committee Conferences (Searched in: All Years)
|
|
Search Results: Conference Papers |
Conference Papers (Available on Advance Programs) (Sort by: Date Descending) |
|
Committee |
Date Time |
Place |
Paper Title / Authors |
Abstract |
Paper # |
VLD, CAS, SIP, MSS |
2024-07-18 14:50 |
Aomori |
(Primary: On-site, Secondary: Online) |
NA Hibiki Nakanishi (Waseda Univ.), Kento Hasegawa, Seira Hidano, Kazuhide Fukushima (KDDI Research, Inc.), Kazuo Hashimoto, Nozomu Togawa (Waseda Univ.) CAS2024-10 VLD2024-10 SIP2024-27 MSS2024-10 |
(To be available after the conference date) [more] |
CAS2024-10 VLD2024-10 SIP2024-27 MSS2024-10 pp.51-56 |
VLD, CAS, SIP, MSS |
2024-07-18 15:40 |
Aomori |
(Primary: On-site, Secondary: Online) |
CAS2024-12 VLD2024-12 SIP2024-29 MSS2024-12 |
(To be available after the conference date) [more] |
CAS2024-12 VLD2024-12 SIP2024-29 MSS2024-12 pp.63-68 |
LOIS, SITE, ISEC |
2023-11-10 13:35 |
Hiroshima |
Satellite Campus Hiroshima (Primary: On-site, Secondary: Online) |
Side-Channel Security Evaluation of ASCON Implementation Daisuke Iwasa, Rei Ueno (Tohoku University), Kazuhide Fukushima (KDDI Research, Inc.), Naofumi Homma (Tohoku University) ISEC2023-68 SITE2023-62 LOIS2023-26 |
(To be available after the conference date) [more] |
ISEC2023-68 SITE2023-62 LOIS2023-26 pp.93-97 |
HWS, VLD |
2023-03-03 14:15 |
Okinawa |
(Primary: On-site, Secondary: Online) |
N/A Yuka Ikegami, Kazuki Yamashita (Waseda Univ.), Kento Hasegawa, Kazuhide Fukushima, Shinsaku Kiyomoto (KDDI Research, Inc.), Nozomu Togawa (Waseda Univ.) VLD2022-108 HWS2022-79 |
N/A [more] |
VLD2022-108 HWS2022-79 pp.191-196 |
ICSS |
2022-11-08 10:55 |
Hokkaido |
Hokkaido Jichiro Kaikan (Primary: On-site, Secondary: Online) |
An Efficient Method of Finding Flippable Bits for RAMBleed Haruka Okuda (Kobe Univ.), Makoto Takita (Univ. of Hyogo), Kazuhide Fukushima, Yuto Nakano (KDDI Research, Inc.), Yoshiaki Shiraishi, Masakatu Morii (Kobe Univ.) ICSS2022-47 |
Rowhammer is an attack that repeatedly accesses the same row in DRAM (Dynamic Random Access Memory) to cause bit flippin... [more] |
ICSS2022-47 pp.55-60 |
SITE, ISEC, LOIS |
2021-11-12 14:50 |
Online |
Online |
A Study of Deep Learning based Side-Channel Analysis on Lightweight Cryptography GIMLI-AEAD Keigo Ito, Akira Ito, Rei Ueno (Tohoku Univ.), Kazuhide Fukushima, Shinsaku Kiyomoto (KDDI Research Inc.), Naofumi Homma (Tohoku Univ.) ISEC2021-45 SITE2021-39 LOIS2021-28 |
In this paper, we describe a side-channel analysis for the lightweight cipher Gimli-AEAD.
In particular, we apply a De... [more] |
ISEC2021-45 SITE2021-39 LOIS2021-28 pp.20-25 |
ISEC, SITE, LOIS |
2019-11-02 10:00 |
Osaka |
Osaka Univ. |
Evolving Secret Sharing: Hierarchical Access Structure with Polynomial Share Size Sabyasachi Dutta (Univ. of Calgary), Partha Sarathi Roy, Kazuhide Fukushima, Shinsaku Kiyomoto (KDDI Research), Kouichi Sakurai (Kyushu Univ.) ISEC2019-76 SITE2019-70 LOIS2019-35 |
Secret sharing allows storing secret information in a distributed manner among several participants.
The original setti... [more] |
ISEC2019-76 SITE2019-70 LOIS2019-35 pp.93-98 |
IT, ISEC, WBS |
2019-03-08 12:05 |
Tokyo |
University of Electro-Communications |
Secret Sharing on Evolving Multi-level Access Structure Partha Sarathi Roy (KDDI Research), Sabyasachi Dutta (Kyushu Univ.), Kazuhide Fukushima, Shinsaku Kiyomoto (KDDI Research), Kouichi Sakurai (Kyushu Univ.) IT2018-121 ISEC2018-127 WBS2018-122 |
[more] |
IT2018-121 ISEC2018-127 WBS2018-122 pp.281-284 |
SITE, ISEC, LOIS |
2018-11-04 14:10 |
Fukuoka |
|
Time Complexity of Syndrome Decoding Problem and Security Analysis of Code-based Signature Scheme Partha Sarathi Roy (KDDI Research), Kirill Morozov (Univ. of North Texas), Kazuhide Fukushima, Shinsaku Kiyomoto (KDDI Research), Tsuyoshi Takagi (Univ. of Tokyo) ISEC2018-77 SITE2018-55 LOIS2018-37 |
[more] |
ISEC2018-77 SITE2018-55 LOIS2018-37 pp.73-78 |
HWS, ISEC, SITE, ICSS, EMM, IPSJ-CSEC, IPSJ-SPT [detail] |
2018-07-25 10:45 |
Hokkaido |
Sapporo Convention Center |
Code-Based Signature Scheme without Trapdoors Partha Sarathi Roy (KDDI Research), Kirill Morozov (Univ. of North Texas), Kazuhide Fukushima, Shinsaku Kiyomoto (KDDI Research), Tsuyoshi Takagi (Univ. of Tokyo) ISEC2018-15 SITE2018-7 HWS2018-12 ICSS2018-18 EMM2018-14 |
[more] |
ISEC2018-15 SITE2018-7 HWS2018-12 ICSS2018-18 EMM2018-14 pp.17-22 |
BioX, ITE-ME, ITE-IST [detail] |
2016-06-20 16:20 |
Ishikawa |
Ishikawa-Shiko-Kinen-Bunka-Koryukan |
[Invited Talk]
Physically Unclonable Function for IoT Devices Kazuhide Fukushima, Seira Hidano, Shinsaku Kiyomoto (KDDI Labs) BioX2016-4 |
[more] |
BioX2016-4 p.29 |
ISEC |
2010-05-21 13:25 |
Tokyo |
Kikai-Shinko-Kaikan Bldg. |
Side-Channel Analysis and Countermeasures of Stream Cipher K2 Matt Henricksen, Wun-she Yap, Chee-hoo Yian (I2R), Yuto Nakano, Kazuhide Fukushima, Shinsaku Kiyomoto, Toshiaki Tanaka (KDDI Labs.) ISEC2010-2 |
In this paper we provide the first side-channel analysis of the K2 stream cipher. We apply timing attacks, power analysi... [more] |
ISEC2010-2 pp.5-10 |
ISEC, IPSJ-CSEC, SITE, ICSS [detail] |
2009-07-03 16:10 |
Akita |
Akita University |
Software Protection Mechanism Using Tamper-Proof Module Kazuhide Fukushima, Shinsaku Kiyomoto, Toshiaki Tanaka (KDDI R&D Labs.) ISEC2009-38 SITE2009-30 ICSS2009-52 |
[more] |
ISEC2009-38 SITE2009-30 ICSS2009-52 pp.213-219 |
ISEC, SITE, IPSJ-CSEC |
2008-07-25 16:35 |
Fukuoka |
Fukuoka Institute of System LSI Design Industry |
Illegal Copy Detection Framework for CAD Tools based on Watermarks Embedded in VHDL Codes Kazuhide Fukushima, Shinsaku Kiyomoto, Toshiaki Tanaka (KDDI R&D Labs.), Kouichi Sakurai, Hiroto Yasuura (Kyushu Univ.) ISEC2008-58 |
[more] |
ISEC2008-58 pp.169-176 |
ISEC |
2008-05-16 11:10 |
Tokyo |
Kikai-Shinko-Kaikan Bldg. |
Coalition Resistant Ternary Subset Difference Method Kazuhide Fukushima, Shinsaku Kiyomoto, Toshiaki Tanaka (KDDI Labs.), Kouichi Sakurai (Kyushu Univ.) ISEC2008-5 |
[more] |
ISEC2008-5 pp.31-38 |
ISEC |
2007-09-07 09:00 |
Tokyo |
Kikai-Shinko-Kaikan Bldg. |
An Extension of Fast Threshold Schemes Using XOR Operations (1) Jun Kurihara, Shinsaku Kiyomoto, Kazuhide Fukushima, Toshiaki Tanaka (KDDI R&D Labs.) ISEC2007-74 |
[more] |
ISEC2007-74 pp.1-8 |
ISEC |
2007-09-07 09:25 |
Tokyo |
Kikai-Shinko-Kaikan Bldg. |
An Extension of Fast Threshold Schemes Using XOR Operations (2) Jun Kurihara, Shinsaku Kiyomoto, Kazuhide Fukushima, Toshiaki Tanaka (KDDI R&D Labs.) ISEC2007-75 |
[more] |
ISEC2007-75 pp.9-15 |
ISEC |
2007-05-18 11:00 |
Tokyo |
Kikai-Shinko-Kaikan Bldg. |
A Fast (4,n)-Threshold Secret Sharing Scheme Using Exclusive-OR Operations, and Its Extension to (k,n)-Threshold Schemes Jun Kurihara, Shinsaku Kiyomoto, Kazuhide Fukushima, Toshiaki Tanaka (KDDI R&D Labs.) ISEC2007-4 |
[more] |
ISEC2007-4 pp.23-30 |
ISEC, SITE, IPSJ-CSEC |
2006-07-21 15:20 |
Okayama |
Okayama Univ. |
Key-Management Scheme for Secure Multicast based on Network Topology Kazuhide Fukushima, Shinsaku Kiyomoto, Toshiaki Tanaka (KDDI R&D Lab.), Kouichi Sakurai (Kyushu Univ.) |
[more] |
ISEC2006-57 pp.131-135 |
|
|
|
Copyright and reproduction :
All rights are reserved and no part of this publication may be reproduced or transmitted in any form or by any means, electronic or mechanical, including photocopy, recording, or any information storage and retrieval system, without permission in writing from the publisher. Notwithstanding, instructors are permitted to photocopy isolated articles for noncommercial classroom use without fee. (License No.: 10GA0019/12GB0052/13GB0056/17GB0034/18GB0034)
|
[Return to Top Page]
[Return to IEICE Web Page]
|