IEICE Technical Committee Submission System
Conference Schedule
Online Proceedings
[Sign in]
Tech. Rep. Archives
    [Japanese] / [English] 
( Committee/Place/Topics  ) --Press->
 
( Paper Keywords:  /  Column:Title Auth. Affi. Abst. Keyword ) --Press->

All Technical Committee Conferences  (Searched in: All Years)

Search Results: Conference Papers
 Conference Papers (Available on Advance Programs)  (Sort by: Date Descending)
 Results 1 - 17 of 17  /   
Committee Date Time Place Paper Title / Authors Abstract Paper #
LOIS, SITE, ISEC 2023-11-10
13:35
Hiroshima Satellite Campus Hiroshima
(Primary: On-site, Secondary: Online)
Side-Channel Security Evaluation of ASCON Implementation
Daisuke Iwasa, Rei Ueno (Tohoku University), Kazuhide Fukushima (KDDI Research, Inc.), Naofumi Homma (Tohoku University)
 [more]
HWS, VLD 2023-03-03
14:15
Okinawa
(Primary: On-site, Secondary: Online)
N/A
Yuka Ikegami, Kazuki Yamashita (Waseda Univ.), Kento Hasegawa, Kazuhide Fukushima, Shinsaku Kiyomoto (KDDI Research, Inc.), Nozomu Togawa (Waseda Univ.) VLD2022-108 HWS2022-79
N/A [more] VLD2022-108 HWS2022-79
pp.191-196
ICSS 2022-11-08
10:55
Hokkaido Hokkaido Jichiro Kaikan
(Primary: On-site, Secondary: Online)
An Efficient Method of Finding Flippable Bits for RAMBleed
Haruka Okuda (Kobe Univ.), Makoto Takita (Univ. of Hyogo), Kazuhide Fukushima, Yuto Nakano (KDDI Research, Inc.), Yoshiaki Shiraishi, Masakatu Morii (Kobe Univ.) ICSS2022-47
Rowhammer is an attack that repeatedly accesses the same row in DRAM (Dynamic Random Access Memory) to cause bit flippin... [more] ICSS2022-47
pp.55-60
SITE, ISEC, LOIS 2021-11-12
14:50
Online Online A Study of Deep Learning based Side-Channel Analysis on Lightweight Cryptography GIMLI-AEAD
Keigo Ito, Akira Ito, Rei Ueno (Tohoku Univ.), Kazuhide Fukushima, Shinsaku Kiyomoto (KDDI Research Inc.), Naofumi Homma (Tohoku Univ.) ISEC2021-45 SITE2021-39 LOIS2021-28
In this paper, we describe a side-channel analysis for the lightweight cipher Gimli-AEAD.
In particular, we apply a De... [more]
ISEC2021-45 SITE2021-39 LOIS2021-28
pp.20-25
ISEC, SITE, LOIS 2019-11-02
10:00
Osaka Osaka Univ. Evolving Secret Sharing: Hierarchical Access Structure with Polynomial Share Size
Sabyasachi Dutta (Univ. of Calgary), Partha Sarathi Roy, Kazuhide Fukushima, Shinsaku Kiyomoto (KDDI Research), Kouichi Sakurai (Kyushu Univ.) ISEC2019-76 SITE2019-70 LOIS2019-35
Secret sharing allows storing secret information in a distributed manner among several participants.
The original setti... [more]
ISEC2019-76 SITE2019-70 LOIS2019-35
pp.93-98
IT, ISEC, WBS 2019-03-08
12:05
Tokyo University of Electro-Communications Secret Sharing on Evolving Multi-level Access Structure
Partha Sarathi Roy (KDDI Research), Sabyasachi Dutta (Kyushu Univ.), Kazuhide Fukushima, Shinsaku Kiyomoto (KDDI Research), Kouichi Sakurai (Kyushu Univ.) IT2018-121 ISEC2018-127 WBS2018-122
 [more] IT2018-121 ISEC2018-127 WBS2018-122
pp.281-284
SITE, ISEC, LOIS 2018-11-04
14:10
Fukuoka   Time Complexity of Syndrome Decoding Problem and Security Analysis of Code-based Signature Scheme
Partha Sarathi Roy (KDDI Research), Kirill Morozov (Univ. of North Texas), Kazuhide Fukushima, Shinsaku Kiyomoto (KDDI Research), Tsuyoshi Takagi (Univ. of Tokyo) ISEC2018-77 SITE2018-55 LOIS2018-37
 [more] ISEC2018-77 SITE2018-55 LOIS2018-37
pp.73-78
HWS, ISEC, SITE, ICSS, EMM, IPSJ-CSEC, IPSJ-SPT [detail] 2018-07-25
10:45
Hokkaido Sapporo Convention Center Code-Based Signature Scheme without Trapdoors
Partha Sarathi Roy (KDDI Research), Kirill Morozov (Univ. of North Texas), Kazuhide Fukushima, Shinsaku Kiyomoto (KDDI Research), Tsuyoshi Takagi (Univ. of Tokyo) ISEC2018-15 SITE2018-7 HWS2018-12 ICSS2018-18 EMM2018-14
 [more] ISEC2018-15 SITE2018-7 HWS2018-12 ICSS2018-18 EMM2018-14
pp.17-22
BioX, ITE-ME, ITE-IST [detail] 2016-06-20
16:20
Ishikawa Ishikawa-Shiko-Kinen-Bunka-Koryukan [Invited Talk] Physically Unclonable Function for IoT Devices
Kazuhide Fukushima, Seira Hidano, Shinsaku Kiyomoto (KDDI Labs) BioX2016-4
 [more] BioX2016-4
p.29
ISEC 2010-05-21
13:25
Tokyo Kikai-Shinko-Kaikan Bldg. Side-Channel Analysis and Countermeasures of Stream Cipher K2
Matt Henricksen, Wun-she Yap, Chee-hoo Yian (I2R), Yuto Nakano, Kazuhide Fukushima, Shinsaku Kiyomoto, Toshiaki Tanaka (KDDI Labs.) ISEC2010-2
In this paper we provide the first side-channel analysis of the K2 stream cipher. We apply timing attacks, power analysi... [more] ISEC2010-2
pp.5-10
ISEC, IPSJ-CSEC, SITE, ICSS [detail] 2009-07-03
16:10
Akita Akita University Software Protection Mechanism Using Tamper-Proof Module
Kazuhide Fukushima, Shinsaku Kiyomoto, Toshiaki Tanaka (KDDI R&D Labs.) ISEC2009-38 SITE2009-30 ICSS2009-52
 [more] ISEC2009-38 SITE2009-30 ICSS2009-52
pp.213-219
ISEC, SITE, IPSJ-CSEC 2008-07-25
16:35
Fukuoka Fukuoka Institute of System LSI Design Industry Illegal Copy Detection Framework for CAD Tools based on Watermarks Embedded in VHDL Codes
Kazuhide Fukushima, Shinsaku Kiyomoto, Toshiaki Tanaka (KDDI R&D Labs.), Kouichi Sakurai, Hiroto Yasuura (Kyushu Univ.) ISEC2008-58
 [more] ISEC2008-58
pp.169-176
ISEC 2008-05-16
11:10
Tokyo Kikai-Shinko-Kaikan Bldg. Coalition Resistant Ternary Subset Difference Method
Kazuhide Fukushima, Shinsaku Kiyomoto, Toshiaki Tanaka (KDDI Labs.), Kouichi Sakurai (Kyushu Univ.) ISEC2008-5
 [more] ISEC2008-5
pp.31-38
ISEC 2007-09-07
09:00
Tokyo Kikai-Shinko-Kaikan Bldg. An Extension of Fast Threshold Schemes Using XOR Operations (1)
Jun Kurihara, Shinsaku Kiyomoto, Kazuhide Fukushima, Toshiaki Tanaka (KDDI R&D Labs.) ISEC2007-74
 [more] ISEC2007-74
pp.1-8
ISEC 2007-09-07
09:25
Tokyo Kikai-Shinko-Kaikan Bldg. An Extension of Fast Threshold Schemes Using XOR Operations (2)
Jun Kurihara, Shinsaku Kiyomoto, Kazuhide Fukushima, Toshiaki Tanaka (KDDI R&D Labs.) ISEC2007-75
 [more] ISEC2007-75
pp.9-15
ISEC 2007-05-18
11:00
Tokyo Kikai-Shinko-Kaikan Bldg. A Fast (4,n)-Threshold Secret Sharing Scheme Using Exclusive-OR Operations, and Its Extension to (k,n)-Threshold Schemes
Jun Kurihara, Shinsaku Kiyomoto, Kazuhide Fukushima, Toshiaki Tanaka (KDDI R&D Labs.) ISEC2007-4
 [more] ISEC2007-4
pp.23-30
ISEC, SITE, IPSJ-CSEC 2006-07-21
15:20
Okayama Okayama Univ. Key-Management Scheme for Secure Multicast based on Network Topology
Kazuhide Fukushima, Shinsaku Kiyomoto, Toshiaki Tanaka (KDDI R&D Lab.), Kouichi Sakurai (Kyushu Univ.)
 [more] ISEC2006-57
pp.131-135
 Results 1 - 17 of 17  /   
Choose a download format for default settings. [NEW !!]
Text format pLaTeX format CSV format BibTeX format
Copyright and reproduction : All rights are reserved and no part of this publication may be reproduced or transmitted in any form or by any means, electronic or mechanical, including photocopy, recording, or any information storage and retrieval system, without permission in writing from the publisher. Notwithstanding, instructors are permitted to photocopy isolated articles for noncommercial classroom use without fee. (License No.: 10GA0019/12GB0052/13GB0056/17GB0034/18GB0034)


[Return to Top Page]

[Return to IEICE Web Page]


The Institute of Electronics, Information and Communication Engineers (IEICE), Japan