|
|
All Technical Committee Conferences (Searched in: All Years)
|
|
Search Results: Conference Papers |
Conference Papers (Available on Advance Programs) (Sort by: Date Descending) |
|
Committee |
Date Time |
Place |
Paper Title / Authors |
Abstract |
Paper # |
SITE, ISEC, HWS, EMM, BioX, IPSJ-CSEC, IPSJ-SPT, ICSS [detail] |
2020-07-21 11:15 |
Online |
Online |
Side-channel Analysis on Message Authentication Code for Controller Area Network Kensei Nagato, Ville Yli-Mayry, Rei Ueno (Tohoku Univ.), Tsuyoshi Toyama, Hisashi Oguma (TOYOTA), Naohumi Homma (Tohoku Univ.) ISEC2020-27 SITE2020-24 BioX2020-30 HWS2020-20 ICSS2020-14 EMM2020-24 |
[more] |
ISEC2020-27 SITE2020-24 BioX2020-30 HWS2020-20 ICSS2020-14 EMM2020-24 pp.87-92 |
HWS (2nd) |
2018-12-13 16:10 |
Tokyo |
Tokyo Univ. Takeda Bldg. Takeda Hall |
[Poster Presentation]
Prototype Development of ITS Security Research Platform
-- Miniature vehicle with simulated V2X communication over ZigBee and multiple censors -- Tsuyoshi Toyama, Takuya Yoshida, Hisashi Oguma (Toyota-ITC), Tsutomu Matsumoto (YNU) |
(Advance abstract in Japanese is available) [more] |
|
ISEC |
2018-09-07 09:30 |
Tokyo |
Kikai-Shinko-Kaikan Bldg. |
Development of Portable Automotive Security Testbed with Adaptability: PASTA Tsuyoshi Toyama, Hisashi Oguma (TOYOTA-ITC), Tsutomu Matsumoto (YNU) ISEC2018-51 |
For accelerating the development of sophisticated driving-assist technologies such as automated driving, securing vehicl... [more] |
ISEC2018-51 pp.7-14 |
HWS (2nd) |
2018-03-03 15:30 |
Okinawa |
|
Portable Security Testbed for Road Vehicles v1.1
-- Introduction and Verification of Countermeasure Against Message Forgery -- Tsuyoshi Toyama (TOYOTA ITC), Takahito Kiyokawa, Kazuki Shirai, Junichi Sakamoto (YNU), Hisashi Oguma (TOYOTA ITC), Tsutomu Matsumoto (YNU) |
(Advance abstract in Japanese is available) [more] |
|
HWS (2nd) |
2017-06-13 11:15 |
Aomori |
Hirosaki University |
Portable Security Testbed for Road Vehicles Tsuyoshi Toyama, Hisashi Oguma (TOYOTA-ITC), Tsutomu Matsumoto (YNU) |
(Advance abstract in Japanese is available) [more] |
|
IT, ISEC, WBS |
2013-03-08 10:30 |
Osaka |
Kwansei Gakuin Univ., Osaka-Umeda Campus |
Laser Fault Injection Attack on Non-Decapped Contact Smart Card Hitoshi Ono, Yuu Tsuchiya, Tsuyoshi Toyama, Takeshi Kishikawa, Shohei Saito (Yokohama National Univ.), Akihiko Sasaki (MORITA TECH), Akashi Satoh (Univ. of Tokyo), Tsutomu Matsumoto (Yokohama National Univ.) IT2012-93 ISEC2012-111 WBS2012-79 |
[more] |
IT2012-93 ISEC2012-111 WBS2012-79 pp.195-202 |
ISEC |
2012-12-12 14:55 |
Tokyo |
Kikai-Shinko-Kaikan Bldg. |
The YNU's Method for Acquiring Power-Consumption Traces Developed for DPA Contest v3 Tsutomu Matsumoto, Takeshi Kishikawa, Hitoshi Ono, Shohei Saito, Yuu Tsuchiya (Yokohama Nat'l Univ.), Akihiko Sasaki (MORITA TECH), Tsuyoshi Toyama (Yokohama Nat'l Univ.) ISEC2012-76 |
[more] |
ISEC2012-76 pp.29-36 |
ISEC, LOIS |
2012-11-21 14:15 |
Shizuoka |
Shizuoka City Industry-University Exchange Center |
How to Extract AES Key from Smart Card by Fault Injection Attack Using Electromaginetic Irradiataion Yuu Tsuchiya, Takeshi Kishikawa, Shohei Saito, Tsuyoshi Toyama (YNU), Akihiko Sasaki (MORITA TECH), Akashi Satoh (VDEC, Univ. Tokyo), Tsutomu Matsumoto (YNU) ISEC2012-57 LOIS2012-32 |
Fault injection attack, inducing partial fault in a cryptographic module and extracting the inside key, has been conside... [more] |
ISEC2012-57 LOIS2012-32 pp.1-8 |
ISEC |
2012-09-21 17:05 |
Tokyo |
Kikai-Shinko-Kaikan Bldg. |
An Efficient Method of Strictly Evaluating Side-Channel Security Takeshi Kishikawa, Shohei Saito, Yuu Tsuchiya, Tsuyoshi Toyama, Tsutomu Matsumoto (Yokohama Nat'l Univ.) ISEC2012-56 |
Evaluation of side-channel security, i.e., resistance against side-channel attacks of cryptographic modules is definitel... [more] |
ISEC2012-56 pp.67-74 |
ISEC |
2006-09-13 14:40 |
Tokyo |
Kikai-Shinko-Kaikan Bldg. |
A Method of Software Dynamic Birthmarks using History of API Function Calls Osamu Moriyama, Takahiro Furue, Tsuyoshi Toyama, Tsutomu Matsumoto (Yokohama National University) |
Dynamic Birthmarks using runtime information are a class of methods to detect software theft. Tamada et al. proposed a m... [more] |
ISEC2006-82 pp.77-84 |
|
|
|
Copyright and reproduction :
All rights are reserved and no part of this publication may be reproduced or transmitted in any form or by any means, electronic or mechanical, including photocopy, recording, or any information storage and retrieval system, without permission in writing from the publisher. Notwithstanding, instructors are permitted to photocopy isolated articles for noncommercial classroom use without fee. (License No.: 10GA0019/12GB0052/13GB0056/17GB0034/18GB0034)
|
[Return to Top Page]
[Return to IEICE Web Page]
|