Committee |
Date Time |
Place |
Paper Title / Authors |
Abstract |
Paper # |
HWS, ICD |
2022-10-25 14:50 |
Shiga |
(Primary: On-site, Secondary: Online) |
Design and Prototype Evaluation of Stochastic Encrypted Computing Hardware Yuki Tamura, Rei Ueno, Naofumi Homma (Tohoku Univ.) HWS2022-38 ICD2022-30 |
This paper describes the design and evaluation of Homomorphic Encryption for
Stochastic Computing (HESC) hardware.HESC ... [more] |
HWS2022-38 ICD2022-30 pp.46-51 |
EMM, BioX, ISEC, SITE, ICSS, HWS, IPSJ-CSEC, IPSJ-SPT [detail] |
2022-07-19 13:00 |
Online |
Online |
Side-Channel Attacks on Post-Quantum KEMs Using Multi-class Classification Neural Network Yutaro Tanaka, Rei Ueno (Tohoku Univ.), Keita Xagawa, Akitra Ito, Junko Takahashi (NTT), Naofumi Homma (Tohoku Univ.) ISEC2022-7 SITE2022-11 BioX2022-32 HWS2022-7 ICSS2022-15 EMM2022-15 |
(To be available after the conference date) [more] |
ISEC2022-7 SITE2022-11 BioX2022-32 HWS2022-7 ICSS2022-15 EMM2022-15 pp.1-6 |
HWS |
2022-04-26 10:30 |
Tokyo |
AIST Tokyo Waterfront (Annex) (Primary: On-site, Secondary: Online) |
An Analysis on Relation between Cross Entropy Loss Function and Attack Performance in Deep-learning Based Side-Channel Attacks Akira Ito, Rei Ueno, Naofumi Homma (Tohoku Univ.) HWS2022-1 |
[more] |
HWS2022-1 pp.1-6 |
VLD, HWS [detail] |
2022-03-07 11:50 |
Online |
Online |
An efficient scheme of homomorphic encryption for stochastic computing and its performance evaluation Ryusuke Koseki, Rei Ueno, Akira Ito, Naofumi Homma (Tohoku Univ.) VLD2021-82 HWS2021-59 |
This paper describes how to improve the efficiency of Homomorphic Encryption for Stochastic Computing (HESC) and its per... [more] |
VLD2021-82 HWS2021-59 pp.37-42 |
VLD, HWS [detail] |
2022-03-08 14:55 |
Online |
Online |
Evaluation of Side-channel Leaks Specific to Unrolled AES Hardware Ayano Nakashima, Rei Ueno, Naofumi Homma (Tohoku Univ.) VLD2021-100 HWS2021-77 |
This paper presents the evaluation of a unique side-channel leakage occurred from the middle rounds
of (pipelined) unro... [more] |
VLD2021-100 HWS2021-77 pp.135-140 |
VLD, HWS [detail] |
2022-03-08 15:20 |
Online |
Online |
Bypassing Isolated Execution on RISC-V Keystone using Fault Injection Shoei Nashimoto, Daisuke Suzuki (Mitsubishi Electric), Rei Ueno, Naofumi Homma (Tohoku Univ.) VLD2021-101 HWS2021-78 |
This paper summarizes an attack and countermeasure against RISC-V Keystone from a paper [1] to be presented at TCHES (IA... [more] |
VLD2021-101 HWS2021-78 pp.141-146 |
SITE, ISEC, LOIS |
2021-11-12 14:50 |
Online |
Online |
A Study of Deep Learning based Side-Channel Analysis on Lightweight Cryptography GIMLI-AEAD Keigo Ito, Akira Ito, Rei Ueno (Tohoku Univ.), Kazuhide Fukushima, Shinsaku Kiyomoto (KDDI Research Inc.), Naofumi Homma (Tohoku Univ.) ISEC2021-45 SITE2021-39 LOIS2021-28 |
In this paper, we describe a side-channel analysis for the lightweight cipher Gimli-AEAD.
In particular, we apply a De... [more] |
ISEC2021-45 SITE2021-39 LOIS2021-28 pp.20-25 |
HWS, ICD [detail] |
2021-10-19 10:25 |
Online |
Online |
A Deep-Learning Based Single-Trace Side-Channel Attack on Tamper-Resistant CRT-RSA Software Kotaro Saito, Akira Ito, Rei Ueno, Naofumi Homma (Tohoku Univ.) HWS2021-42 ICD2021-16 |
This paper proposes a deep-learning based single-trace side-channel attack on CRT-RSA software implementation secure aga... [more] |
HWS2021-42 ICD2021-16 pp.7-12 |
HWS, ICD [detail] |
2021-10-19 13:30 |
Online |
Online |
Design of NTT Hardware Based on K-RED for Lattice-Based Cryptography Yuma Itabashi, Rei Ueno, Naofumi Homma (Tohoku Univ.) HWS2021-46 ICD2021-20 |
This paper presents an efficient hardware that efficiently performs Number Theoretic Transform(NTT) which is a dominant ... [more] |
HWS2021-46 ICD2021-20 pp.26-31 |
BioX, ISEC, SITE, ICSS, EMM, HWS, IPSJ-CSEC, IPSJ-SPT [detail] |
2021-07-19 14:20 |
Online |
Online |
Design of Fp2 Multiplier Datapath Based on Parallelized QP Montgomery Multiplication for Application to Isogeny-based Cryptography Rei Ueno (Tohoku Univ./JST PRESTO), Naofumi Homma (Tohoku Univ.) ISEC2021-12 SITE2021-6 BioX2021-13 HWS2021-12 ICSS2021-17 EMM2021-17 |
[more] |
ISEC2021-12 SITE2021-6 BioX2021-13 HWS2021-12 ICSS2021-17 EMM2021-17 pp.14-19 |
BioX, ISEC, SITE, ICSS, EMM, HWS, IPSJ-CSEC, IPSJ-SPT [detail] |
2021-07-20 14:25 |
Online |
Online |
Deep-Learning Based Side-Channel Analysis on Cryptographic Hardware with Masking Countermeasure Kenta Kojima, Akira Ito, Rei Ueno, Naofumi Homma (Tohoku Univ.) ISEC2021-23 SITE2021-17 BioX2021-24 HWS2021-23 ICSS2021-28 EMM2021-28 |
[more] |
ISEC2021-23 SITE2021-17 BioX2021-24 HWS2021-23 ICSS2021-28 EMM2021-28 pp.80-85 |
HWS |
2021-04-12 10:00 |
Tokyo |
Tokyo University/Online (Primary: On-site, Secondary: Online) |
Design and Evaluation of High Speed Hardware of Isogeny-based Cryptography Using Residue Number System Rei Ueno, Naofumi Homma (Tohoku Univ.) HWS2021-1 |
[more] |
HWS2021-1 pp.1-6 |
HWS |
2021-04-12 13:00 |
Tokyo |
Tokyo University/Online (Primary: On-site, Secondary: Online) |
[Invited Talk]
Rejection Sampling Schemes for Extracting Uniform Distribution from Biased PUFs (from CHES 2020) Rei Ueno, Kohei Kazumori, Naofumi Homma (Tohoku Univ.) HWS2021-5 |
[more] |
HWS2021-5 p.25 |
HWS |
2021-04-12 14:40 |
Tokyo |
Tokyo University/Online (Primary: On-site, Secondary: Online) |
On the Performance Evaluation of Deep-Learning Based Side-Channel Attacks Akira Ito, Rei Ueno, Naofumi Homma (Tohoku Univ.) HWS2021-8 |
This paper presents a method for estimating the lower bound of success rate (SR) and the upper bound of guessing entropy... [more] |
HWS2021-8 pp.33-38 |
HWS, VLD [detail] |
2021-03-04 13:25 |
Online |
Online |
A Low-Latency Memory Encryption Scheme with Tweakable Block Cipher and Its Hardware Design Maya Oda, Rei Ueno, Naofumi Homma (Tohoku Univ.), Akiko Inoue, Kazuhiko Minematsu (NEC) VLD2020-83 HWS2020-58 |
In this paper, we propose a highly efficient memory protection method based on the Tweakable block cipher (TBC). The lat... [more] |
VLD2020-83 HWS2020-58 pp.85-90 |
HWS, VLD [detail] |
2021-03-04 13:50 |
Online |
Online |
Design and Evaluation of Efficient AES S-box Hardware with Optimization of Linear Mappings Ayano Nakashima, Rei Ueno, Naofumi Homma (Tohoku Univ.) VLD2020-84 HWS2020-59 |
This paper presents a new AES S-Box hardware design based on the optimization of linear mappings by combining multiplica... [more] |
VLD2020-84 HWS2020-59 pp.91-96 |
ICD, HWS [detail] |
2020-10-26 13:00 |
Online |
Online |
Design of Efficient AES Hardware with Immediately Fault Detection Capability Yusuke Yagyu, Rei Ueno, Naofumi Homma (Tohoku Univ.) HWS2020-31 ICD2020-20 |
This paper presents an efficient AES encryption/decryption hardware architecture
with a fault detection scheme.
The pr... [more] |
HWS2020-31 ICD2020-20 pp.36-41 |
ICD, HWS [detail] |
2020-10-26 16:25 |
Online |
Online |
A Detection Method for Hardware Trojans Inserted into Cryptographic Hardware Netlists Akira Ito, Rei Ueno, Naofumi Homma (Tohoku Univ.) HWS2020-38 ICD2020-27 |
[more] |
HWS2020-38 ICD2020-27 pp.77-82 |
SITE, ISEC, HWS, EMM, BioX, IPSJ-CSEC, IPSJ-SPT, ICSS [detail] |
2020-07-20 13:50 |
Online |
Online |
Side Channel Attack on CRT-RSA Using Sliding Window with Exponent Blinding Soki Osawa, Rei Ueno, Naofumi Homma (Tohoku Univ.) ISEC2020-20 SITE2020-17 BioX2020-23 HWS2020-13 ICSS2020-7 EMM2020-17 |
This paper presents a side-channel attack on CRT-RSA. Some open-source cryptographic libraries (e.g.,
Libgcrypt) employ... [more] |
ISEC2020-20 SITE2020-17 BioX2020-23 HWS2020-13 ICSS2020-7 EMM2020-17 pp.39-45 |
SITE, ISEC, HWS, EMM, BioX, IPSJ-CSEC, IPSJ-SPT, ICSS [detail] |
2020-07-20 16:35 |
Online |
Online |
A Study on Construction of Probablistic Homomorphic Encryption Using Stochastic Computing. Ryusuke Koseki, Rei Ueno, Naofumi Homma (Tohoku Univ.) ISEC2020-23 SITE2020-20 BioX2020-26 HWS2020-16 ICSS2020-10 EMM2020-20 |
In this paper, we describe a construct and evaluation of probabilistic homomorphic encryption (PHE)scheme. PHE is const... [more] |
ISEC2020-23 SITE2020-20 BioX2020-26 HWS2020-16 ICSS2020-10 EMM2020-20 pp.61-67 |