Committee |
Date Time |
Place |
Paper Title / Authors |
Abstract |
Paper # |
HWS, ICD, VLD |
2025-03-06 14:00 |
Okinawa |
(Okinawa, Online) (Primary: On-site, Secondary: Online) |
Application of Single-Base RNS Montgomery Multiplication Algorithm Shinichi Kawamura (AIST), Yuichi Komano (CIT) VLD2024-116 HWS2024-87 ICD2024-107 |
[more] |
VLD2024-116 HWS2024-87 ICD2024-107 pp.78-83 |
HWS, ICD |
2024-11-01 11:40 |
Aomori |
Hirosaki University (Aomori, Online) (Primary: On-site, Secondary: Online) |
Fundamental Study on Frequency Injection Attack on True Random Number Generator Using Phase-Locked Loop Hikaru Nishiyama (AIST), Daisuke Fujimoto, Yuichi Hayashi (NAIST), Shinichi Kawamura (AIST) HWS2024-63 ICD2024-34 |
(To be available after the conference date) [more] |
HWS2024-63 ICD2024-34 pp.7-11 |
HWS, ICD |
2024-11-01 12:05 |
Aomori |
Hirosaki University (Aomori, Online) (Primary: On-site, Secondary: Online) |
Examination of current status and issues for establishing minimum security requirements of semiconductor chips in embedded devices. Shinji Sato, Kota Ideguchi, Shinichi Kawamura (AIST), Makoto Nagata (Kobe Univ./AIST), Junichi Sakamoto, Hirotaka Yoshida (AIST) HWS2024-64 ICD2024-35 |
In order to develop minimum security requirement specifications for semiconductor chips in embedded devices, a survey an... [more] |
HWS2024-64 ICD2024-35 pp.12-17 |
HWS |
2024-04-19 16:25 |
Tokyo |
(Tokyo, Online) (Primary: On-site, Secondary: Online) |
Non-Destructive Hardware Trojan Inspection by Backside Near Infrared Imaging Junichi Sakamoto, Yohei Hori, Shinichi Kawamura (AIST), Yuichi Hayashi (NAIST), Makoto Nagata (KU) HWS2024-5 |
Hardware Trojan detection is a critical topic for maintaining the security of IC supply chain. Previous studies have rep... [more] |
HWS2024-5 pp.18-23 |
HWS |
2024-04-19 16:50 |
Tokyo |
(Tokyo, Online) (Primary: On-site, Secondary: Online) |
Supply chain risk and hardware trojan protection Shinichi Kawamura, Tsutomu Matsumoto, Hirotaka Yoshida (AIST), Yasuyoshi Uemura (SCU), Makoto Nagata (Kobe Univ.), Makoto Ikeda (Tokyo Univ.), Ken Takano (LINTEC) HWS2024-6 |
[more] |
HWS2024-6 pp.24-29 |
HWS, ICD |
2022-10-25 11:25 |
Shiga |
(Shiga, Online) (Primary: On-site, Secondary: Online) |
Fundamental Study on Randomness Evaluation of ERO-TRNG Using APD Keiichi Ozaki, Daisuke Fujimoto (NAIST), Saki Osuka, Shinichi Kawamura (AIST), Yuichi Hayashi (NAIST) HWS2022-33 ICD2022-25 |
Randomness evaluation of true random number generators (TRNGs) based on ring oscillators (ROs) requires an analysis of o... [more] |
HWS2022-33 ICD2022-25 pp.17-22 |
HWS, ICD |
2022-10-25 11:50 |
Shiga |
(Shiga, Online) (Primary: On-site, Secondary: Online) |
Optical Microscopic Observation of Semiconductor Devices toward Hardware Trojan Detection Hirofumi Sakane, Junichi Sakamoto, Shinichi Kawamura (AIST), Makoto Nagata (Kobe Univ.), Yuichi Hayashi (NAIST) HWS2022-34 ICD2022-26 |
In this paper we focus on detection of hardware Trojan (HT) in semiconductor devices under a scenario with following ste... [more] |
HWS2022-34 ICD2022-26 pp.23-28 |
EMM, BioX, ISEC, SITE, ICSS, HWS, IPSJ-CSEC, IPSJ-SPT [detail] |
2022-07-19 13:25 |
Online |
Online (Online) |
Revisit of Non Profiled Side Channel Analysis via Deep Learning Kentaro Imafuku, Shinichi Kawamura, Hanae Nozaki, Junichi Sakamoto, Saki Osuka (AIST) ISEC2022-8 SITE2022-12 BioX2022-33 HWS2022-8 ICSS2022-16 EMM2022-16 |
After a brief review of non-profile side channel analysis using deep learning, we propose some improved versions of the ... [more] |
ISEC2022-8 SITE2022-12 BioX2022-33 HWS2022-8 ICSS2022-16 EMM2022-16 pp.7-12 |
EMM, BioX, ISEC, SITE, ICSS, HWS, IPSJ-CSEC, IPSJ-SPT [detail] |
2022-07-19 13:50 |
Online |
Online (Online) |
Randomness evaluation of TERO-based TRNG with a side-channel attack countermeasure Saki Osuka (AIST), Daisuke Fujimoto, Yuichi Hayashi (NAIST), Shinichi Kawamura (AIST) ISEC2022-9 SITE2022-13 BioX2022-34 HWS2022-9 ICSS2022-17 EMM2022-17 |
True random number generators (TRNGs) based on ring oscillators (ROs) are employed in many devices because they can be c... [more] |
ISEC2022-9 SITE2022-13 BioX2022-34 HWS2022-9 ICSS2022-17 EMM2022-17 pp.13-17 |
BioX, ISEC, SITE, ICSS, EMM, HWS, IPSJ-CSEC, IPSJ-SPT [detail] |
2021-07-19 13:30 |
Online |
Online (Online) |
Fundamental Study on Acceleration of Inversion using Binary Extended Euclidean Algorithm for Pairing Computation in RNS Representation Kota Morimoto, Daisuke Fujimoto, Saki Osuka (NAIST), Shinichi Kawamura, Tadanori Teruya (AIST), Yuichi hayashi (NAIST) ISEC2021-10 SITE2021-4 BioX2021-11 HWS2021-10 ICSS2021-15 EMM2021-15 |
Pairing computation is an essential tool in advanced cryptography, and Yao et al. have shown that a hardware implementat... [more] |
ISEC2021-10 SITE2021-4 BioX2021-11 HWS2021-10 ICSS2021-15 EMM2021-15 pp.1-7 |
HWS |
2021-04-12 14:15 |
Tokyo |
Tokyo University/Online (Tokyo, Online) (Primary: On-site, Secondary: Online) |
A division algorithm with constant divisor in the residue number system Shinichi Kawamura (AIST/Toshiba), Yuichi Komano (Toshiba) HWS2021-7 |
A lot of works has been done on the research of RNS (Residue Number System), which is one of the integer representations... [more] |
HWS2021-7 pp.27-32 |
ICD, HWS [detail] |
2020-10-26 14:30 |
Online |
Online (Online) |
Domestic Hardware Trojan Research Trends Shinichi Kawamura, Yu-ich Hayashi (AIST) HWS2020-34 ICD2020-23 |
[more] |
HWS2020-34 ICD2020-23 pp.54-58 |
ICD, HWS [detail] |
2020-10-26 14:55 |
Online |
Online (Online) |
Physical-Level Detection Approach against Hardware Trojans inside Semiconductor Chips (II) Hirofumi Sakane, Shinichi Kawamura, Kentaro Imafuku, Yohei Hori, Makoto Nagata, Yuichi Hayashi, Tsutomu Matsumoto (AIST) HWS2020-35 ICD2020-24 |
Hardware Trojans, known to be designed and crafted with malicious intent and deployed to be part of the hardware of the ... [more] |
HWS2020-35 ICD2020-24 pp.59-64 |
HWS |
2020-04-07 10:00 |
Online |
Online (Online) |
A mode for performance evaluation of Montgomery multiplication in RNS Shinichi Kawamura (ECSEC TRA) HWS2020-1 |
[more] |
HWS2020-1 pp.1-6 |
HWS, ICD [detail] |
2019-11-01 16:50 |
Osaka |
DNP Namba SS Bld. (Osaka) |
Physical-level detection approach against hardware Trojans inside semiconductor chips (I) Shinichi Kawamura, Kentaro Imafuku, Hirofumi Sakane, Yohei Hori (AIST), Makoto Nagata (AIST/Kobe Univ.), Yuichi Hayashi (AIST/NAIST), Tsutomu Matsumoto (AIST/YNU) HWS2019-65 ICD2019-26 |
It is of great concern that malicious hardware should be inserted inside semiconductor chips and on printed circuit boar... [more] |
HWS2019-65 ICD2019-26 pp.47-52 |
HWS |
2019-04-12 13:30 |
Miyagi |
Tohoku University (Miyagi) |
An Improved RNS Binary Extended Euclidean Algorithm and a Residue Decoding Algorithm Shinichi Kawamura (ECSEC TRA/Toshiba/AIST), Yuichi Komano, Hideo Shimizu (Toshiba) HWS2019-1 |
[more] |
HWS2019-1 pp.1-6 |
HWS (2nd) |
2018-12-13 16:10 |
Tokyo |
Tokyo Univ. Takeda Bldg. Takeda Hall (Tokyo) |
[Poster Presentation]
Computer experiments for efficient sign detection in RNS Yuya Kakei (ECSEC), Shinichi Kawamura (ECSEC/Toshiba) |
(Advance abstract in Japanese is available) [more] |
|
MWP |
2016-11-14 13:20 |
Tokyo |
Kikai-Shinko-Kaikan Bldg. (Tokyo) |
[Invited Talk]
Technology overview of high speed and stable quantum key distribution Yoshimichi Tanizawa, Akira Murakami, Alexander R. Dixon (Toshiba), James F. Dynes, Marco Lucamarini, Bernd Fröhlich, Andrew W. Sharpe, Alan Plews, Winci Tam, Zhiliang L. Yuan (Toshiba Research Europe Limited), Hideaki Sato, Shinichi Kawamura (Toshiba), Mikio Fujiwara, Masahide Sasaki (NICT), Andrew J. Shields (Toshiba Research Europe Limited) MWP2016-47 |
[more] |
MWP2016-47 pp.23-27 |
ISEC, IT, WBS |
2015-03-03 13:15 |
Fukuoka |
The University of Kitakyushu (Fukuoka) |
[Invited Talk]
Fast and Secure Implementation of Cryptography and its Practical Application Shinichi Kawamura (Toshiba) IT2014-99 ISEC2014-112 WBS2014-91 |
The author will talk about his past research on implementation of cryptography. For the practical use of cryptography, i... [more] |
IT2014-99 ISEC2014-112 WBS2014-91 pp.231-238 |