Committee |
Date Time |
Place |
Paper Title / Authors |
Abstract |
Paper # |
HWS, ICD |
2022-10-25 13:50 |
Shiga |
|
Fundamental Study of Adversarial Examples Created by Fault Injection Attack on Image Sensor Interface Tatsuya Oyama, Kota Yoshida, Shunsuke Okura, Takeshi Fujino (Ritsumeikan Univ.) |
[more] |
|
HWS, ICD |
2022-10-25 16:40 |
Shiga |
|
A Study on Small Area HMAC-SHA256 Circuit suitable for CMOS Image Sensor Yu Sekioka, Tatsuya Oyama, Hayato Tatsuno, Kota Yoshida, Shunsuke Okura, Takeshi Fujino (Ritsumeikan Univ) |
[more] |
|
EMM, BioX, ISEC, SITE, ICSS, HWS, IPSJ-CSEC, IPSJ-SPT [detail] |
2022-07-19 15:15 |
Online |
Online |
Revealing PUF Responses by Differential Power Analysis against Reed-Muller-Code-based Fuzzy Extractor Soma Watanabe, Yuta Fukuda, Tatsuya Oyama, Kota Yoshida, Takeshi Fujino (Ritsumeikan Univ) ISEC2022-12 SITE2022-16 BioX2022-37 HWS2022-12 ICSS2022-20 EMM2022-20 |
IoT devices that use the Physically Unclonable Function (PUF) response to generate a secret key has been proposed. Since... [more] |
ISEC2022-12 SITE2022-16 BioX2022-37 HWS2022-12 ICSS2022-20 EMM2022-20 pp.29-34 |
HWS |
2022-04-26 10:55 |
Tokyo |
AIST Tokyo Waterfront (Annex) (Primary: On-site, Secondary: Online) |
Deep Learning Side-Channel Attacks against Hardware-Implemented Lightweight Cipher Midori64 Madoka Sako, Kunihiro Kuroda, Yuta Fukuda, Kota Yoshida, Takeshi Fujino (Ritsumeikan Univ.) HWS2022-2 |
Midori is a lightweight cipher and it is developed to achieve superior circuit size, low latency, and low power consumpt... [more] |
HWS2022-2 pp.7-12 |
HWS |
2022-04-26 11:20 |
Tokyo |
AIST Tokyo Waterfront (Annex) (Primary: On-site, Secondary: Online) |
Deep Learning-based Side-Channel Attacks against Software-Implemented RSA using Binary Exponentiation with Dummy Multiplication Seiya Shimada, Kunihiro Kuroda, Yuta Fukuda, Kouta Yoshida, Takeshi Fujino (Ritsumeikan Univ.) HWS2022-3 |
Recently, deep learning-based side-channel attacks (DL-SCA) against symmetric key cryptography such as AES have been rep... [more] |
HWS2022-3 pp.13-18 |
VLD, HWS [detail] |
2022-03-08 13:25 |
Online |
Online |
A Study on Small Area Circuits for CMOS Image Sensors with Message Authentication Codes (1)
-- Drive Circuit and Pixel Array Configuration -- Yoshihiro Akamatsu, Hiroaki Ogawa, Tatsuya Oyama, Hayato Tatsuno, Yu Sekioka, Shunsuke Okura, Takeshi Fujino (Ritsumeikan Univ) VLD2021-97 HWS2021-74 |
In edge AI, the information acquired by sensors is classified or recognized at the edge, and therefore, guaranteeing the... [more] |
VLD2021-97 HWS2021-74 pp.117-122 |
VLD, HWS [detail] |
2022-03-08 13:50 |
Online |
Online |
A Study on Small Area Circuits for CMOS Image Sensor with Message Authentication codes (2)
-- Code generation circuit -- Yu Sekioka, Hiroaki Ogawa, Hayato Tatsuno, Tatsuya Oyama, Yoshihiro Akamatsu, Shunsuke Okura, Takeshi Fujino (Ritsumeikan Univ) VLD2021-98 HWS2021-75 |
In edge AI (Artificial Intelligence) computing, information acquired by sensors is processed with distributed IoT device... [more] |
VLD2021-98 HWS2021-75 pp.123-128 |
BioX, ISEC, SITE, ICSS, EMM, HWS, IPSJ-CSEC, IPSJ-SPT [detail] |
2021-07-20 14:50 |
Online |
Online |
Deep Learning Side-Channel Attacks against Unprotected AES and RSM-AES Implemented in ASIC Yuta Fukuda, Kota Yoshida, Hisashi Hashimoto, Takeshi Fujino (Ritsumeikan Univ.) ISEC2021-24 SITE2021-18 BioX2021-25 HWS2021-24 ICSS2021-29 EMM2021-29 |
The cryptographic key can be revealed by exploiting side-channel information such as power traces under operation.
Rec... [more] |
ISEC2021-24 SITE2021-18 BioX2021-25 HWS2021-24 ICSS2021-29 EMM2021-29 pp.86-91 |
BioX, ISEC, SITE, ICSS, EMM, HWS, IPSJ-CSEC, IPSJ-SPT [detail] |
2021-07-20 15:30 |
Online |
Online |
Implimentation of RISC-V TEE using PUF as Root of Trust Kota Yoshida (Ritsumeikan Univ.), Kuniyasu Suzaki (AIST), Takeshi Fujino (Ritsumeikan Univ.) ISEC2021-25 SITE2021-19 BioX2021-26 HWS2021-25 ICSS2021-30 EMM2021-30 |
In society 5.0, acquiring trustworthy data from a huge amount of IoT devices in physical spaces, it is important to veri... [more] |
ISEC2021-25 SITE2021-19 BioX2021-26 HWS2021-25 ICSS2021-30 EMM2021-30 pp.92-97 |
BioX, ISEC, SITE, ICSS, EMM, HWS, IPSJ-CSEC, IPSJ-SPT [detail] |
2021-07-20 15:55 |
Online |
Online |
Evaluation of TRNG Using CMOS Image Sensor Hayato Tatsuno, Tatsuya Oyama, Masayoshi Shirahata, Shunsuke Okura, Takeshi Fujino (Ritsumeikan Univ.) ISEC2021-26 SITE2021-20 BioX2021-27 HWS2021-26 ICSS2021-31 EMM2021-31 |
Recently, the number of IoT devices has been increasing rapidly, and cryptographic functions such as authentication, key... [more] |
ISEC2021-26 SITE2021-20 BioX2021-27 HWS2021-26 ICSS2021-31 EMM2021-31 pp.98-103 |
HWS, VLD [detail] |
2021-03-04 13:00 |
Online |
Online |
Design of Area-Efficient Response Generator for CMOS Image Sensor PUF Masanori Aoki, Shunsuke Okura, Masayoshi Shirahata, Takeshi Fujino (Ritsumeikan Univ.) VLD2020-82 HWS2020-57 |
(To be available after the conference date) [more] |
VLD2020-82 HWS2020-57 pp.79-84 |
SITE, ISEC, HWS, EMM, BioX, IPSJ-CSEC, IPSJ-SPT, ICSS [detail] |
2020-07-21 10:50 |
Online |
Online |
Adversarial scan attack against ICP algorithm for pose estimation on LiDAR-based SLAM Kota Yoshida, Takeshi Fujino (Ritsumeikan Univ.) ISEC2020-26 SITE2020-23 BioX2020-29 HWS2020-19 ICSS2020-13 EMM2020-23 |
An autonomous robot is controlled on physical information acquired by various sensors. Some physical attacks are propose... [more] |
ISEC2020-26 SITE2020-23 BioX2020-29 HWS2020-19 ICSS2020-13 EMM2020-23 pp.81-86 |
HWS, VLD [detail] |
2020-03-07 10:30 |
Okinawa |
Okinawa Ken Seinen Kaikan (Cancelled but technical report was issued) |
Causes of Entropy Loss on Non-IID PUFs and their Entropy Estimations (1) Mitsuru Shiozaki (Ritsumeikan Univ.), Yohei Hori (AIST), Shunsuke Okura, Masayoshi Shirahata, Takeshi Fujino (Ritsumeikan Univ.) VLD2019-138 HWS2019-111 |
Recently, evaluation items and evaluation schemes of Physically Unclonable Functions (PUFs) are discussed in internation... [more] |
VLD2019-138 HWS2019-111 pp.257-262 |
HWS, VLD [detail] |
2020-03-07 10:55 |
Okinawa |
Okinawa Ken Seinen Kaikan (Cancelled but technical report was issued) |
Causes of Entropy Loss on Non-IID PUFs and their Entropy Estimations (2) Mitsuru Shiozaki (Ritsumeikan Univ.), Yohei Hori (AIST), Shunsuke Okura, Masayoshi Shirahata, Takeshi Fujino (Ritsumeikan Univ.) VLD2019-139 HWS2019-112 |
Recently, evaluation items and evaluation schemes of Physically Unclonable Functions (PUFs) are discussed in internation... [more] |
VLD2019-139 HWS2019-112 pp.263-268 |
HWS (2nd) |
2019-12-06 16:00 |
Tokyo |
Asakusabashi Hulic Conference |
[Poster Presentation]
Model Reverse-Engineering Attack using Correlation Power Analysis against Systolic Array Based Neural Network Accelerator Kota Yoshida, Shunsuke Okura, Mitsuru Shiozaki, Takaya Kubota, Takeshi Fujino (Ritsumeikan Univ.) |
[more] |
|
VLD, DC, CPSY, RECONF, ICD, IE, IPSJ-SLDM, IPSJ-EMB, IPSJ-ARC (Joint) [detail] |
2019-11-15 09:15 |
Ehime |
Ehime Prefecture Gender Equality Center |
A Study on Dependence between Performance Metrics of PUFs and the Number of Response Bits using PUF Numerical Model Tatsuya Oyama, Masayoshi Shirahata, Mitsuru Shiozaki, Shunsuke Okura (Ritsumeikan Univ.), Yohei Hori (AIST), Takeshi Fujino (Ritsumeikan Univ.) ICD2019-33 IE2019-39 |
Recently, performance metrics of Physically Unclonable Function (PUF) are discussed toward international standardization... [more] |
ICD2019-33 IE2019-39 pp.25-30 |
VLD, DC, CPSY, RECONF, ICD, IE, IPSJ-SLDM, IPSJ-EMB, IPSJ-ARC (Joint) [detail] |
2019-11-15 09:40 |
Ehime |
Ehime Prefecture Gender Equality Center |
Modeling attacks against device authentication using CMOS image sensor PUF Hiroshi Yamada, Shunsuke Okura, Mitsuru Shiozaki, Masayoshi Shirahata, Takeshi Fujino (Ritsumeikan Univ.) ICD2019-34 IE2019-40 |
A CMOS image sensor physically unclonable function (CIS-PUF) for device authentication by the unique responses extracted... [more] |
ICD2019-34 IE2019-40 pp.31-36 |
ISEC, SITE, ICSS, EMM, HWS, BioX, IPSJ-CSEC, IPSJ-SPT [detail] |
2019-07-24 09:30 |
Kochi |
Kochi University of Technology |
Electromagnetic Analysis Attacks on an ASIC Implementation of a Ring-Oscillator PUF Mitsuru Shiozaki, Takeshi Fujino (Ritsumeikan Univ.) ISEC2019-39 SITE2019-33 BioX2019-31 HWS2019-34 ICSS2019-37 EMM2019-42 |
Physically unclonable functions (PUFs) are assumed to provide high tamper resistance against counterfeits and hardware a... [more] |
ISEC2019-39 SITE2019-33 BioX2019-31 HWS2019-34 ICSS2019-37 EMM2019-42 pp.227-234 |
HWS |
2019-04-12 15:05 |
Miyagi |
Tohoku University |
Implementation and Experimental Evaluation of Physically Unclonable Functions in 180nm CMOS Process Mitsuru Shiozaki, Takaya Kubota, Masayoshi Shirahata (Ritsumeikan Univ.), Yohei Hori, Toshihiro Katashita (AIST), Takeshi Fujino (Ritsumeikan Univ.) HWS2019-4 |
Evaluation items and evaluation schemes of Physically Unclonable Function (PUF) are discussed in international standardi... [more] |
HWS2019-4 pp.19-24 |
HWS, VLD |
2019-02-28 17:10 |
Okinawa |
Okinawa Ken Seinen Kaikan |
Error correction method for PUF utilizing the Pixel Variation in the CMOS Image Sensor Ryota Ishiki, Masayoshi Shirahata (Ritsumeikan Univ.), Shunsuke Okura (Brillnics), Mitsuru Shiozaki, Takaya Kubota (Ritsumeikan Univ.), Kenichiro Ishikawa, Isao Takayanagi (Brillnics), Takeshi Fujino (Ritsumeikan Univ.) VLD2018-121 HWS2018-84 |
(To be available after the conference date) [more] |
VLD2018-121 HWS2018-84 pp.169-174 |