|
|
All Technical Committee Conferences (Searched in: All Years)
|
|
Search Results: Conference Papers |
Conference Papers (Available on Advance Programs) (Sort by: Date Descending) |
|
Committee |
Date Time |
Place |
Paper Title / Authors |
Abstract |
Paper # |
HCS |
2020-03-05 10:30 |
Online |
Online Meeting |
[Online] Detection of decision-making process by biosignals (II) Toshihide Imaruoka, Nobuyuki Wanatabe (KIT), Yukiyasu Tsunoo (TOU), Maki Shigeri, Hiroyasu Kubo (NEC Solution Innovators), Takao Mikawa (NEC) HCS2019-93 |
The number of crimes, such like a “hey its me” scam or a wire-the-money scam, is tremendously increasing. In these cases... [more] |
HCS2019-93 pp.47-51 |
HCS, HIP, HI-SIGCOASTER [detail] |
2019-05-17 15:35 |
Okinawa |
Okinawa Industry Support Center |
Detection of decision-making process by biosignals (I) Toshihide Imaruoka, Nobuyuki Watanabe (KIT), Yukiyasu Tsunoo (TOU), Maki Shigeri, Hiroyasu Kubo (NEC Solution Innovators), Takao Mikawa (NEC) HCS2019-24 HIP2019-24 |
The number of crimes, such like a “hey its me” scam or a wire-the-money scam, is tremendously increasing. In these cases... [more] |
HCS2019-24 HIP2019-24 pp.201-205 |
VLD, DC, IPSJ-SLDM, CPSY, RECONF, ICD, CPM (Joint) [detail] |
2015-12-03 10:10 |
Nagasaki |
Nagasaki Kinro Fukushi Kaikan |
A Quantitative Criterion of Gate-Level Netlist Vulnerability Masaru Oya, Youhua Shi (Waseda Univ.), Noritaka Yamashita, Toshihiko Okamura, Yukiyasu Tsunoo (NEC), Masao Yanagisawa, Nozomu Togawa (Waseda Univ.) VLD2015-59 DC2015-55 |
Recently, digital ICs are designed by outside vendors to reduce costs in semiconductor industry.
This circumstance intr... [more] |
VLD2015-59 DC2015-55 pp.141-146 |
ISEC |
2012-09-21 10:50 |
Tokyo |
Kikai-Shinko-Kaikan Bldg. |
Differential cryptanalysis of CIPHERUNICORN-A Tomoyasu Suzaki (NEC), Takeshi Kawabata, Hiroyasu Kubo, Teruo Saito, Maki Shigeri (NEC Software Hokuriku), Yukiyasu Tsunoo (NEC) ISEC2012-46 |
This paper reports a security of the 128-bit block cipher CIPHERUNICORN-A against differential cryptanalysis. An upper b... [more] |
ISEC2012-46 pp.23-27 |
EMM, ISEC, SITE, ICSS, IPSJ-CSEC, IPSJ-SPT [detail] |
2012-07-20 13:30 |
Hokkaido |
|
Privacy Preserving Data Processing with Collaboration of Paillier and RSA Public Key Cryptosystems
-- For Overcoming Contradiction of Protection and Utilization of Personal Data -- Shigeo Tsujii, Hiroshi Yamaguchi (Chuo Univ.), Hiroshi Doi (IISEC), Yukiyasu Tsunoo (NEC), Ryo Fujita (Chuo Univ.), Takahiko Syouji (YDK) ISEC2012-33 SITE2012-29 ICSS2012-35 EMM2012-25 |
[more] |
ISEC2012-33 SITE2012-29 ICSS2012-35 EMM2012-25 pp.175-179 |
SITE, IPSJ-CE |
2011-12-17 15:15 |
Shimane |
|
On Electronic Government System for Overcoming Contradiction between Protection and Utilization of Personal Information and Privacy
-- Part 1 -- Shigeo Tsujii, Hiroshi Yamaguchi, Masahito Gotaishi (Chuo University), Yukiyasu Tsunoo (NEC), Mikio Ihori (IOG), Takuma Yamamoto (Kanamic) SITE2011-28 |
First the concept of 3 layers of electronic government is proposed. 3 layers are mental, social system, and technologica... [more] |
SITE2011-28 pp.19-24 |
ISEC |
2011-12-14 13:15 |
Tokyo |
Kikai-Shinko-Kaikan Bldg. |
A Report on CHES 2011 Tetsuya Izu (FUJITSU Lab.), Atsuo Inomata (NAIST), Katsuyuki Okeya (Renesas Electronics), Ken Kawabata, Yuichi Komano (Toshiba), Kazuo Sakiyama (UEC), Yumi Sakemi (FUJITSU Lab.), Akashi Satoh (AIST), Yuji Suga (IIJ), Tsuyoshi Takagi (Kyusyu Univ.), Junko Takahashi (NTT), Yukiyasu Tsunoo (NEC), Shiho Moriai (Sony), Yohei Hori (AIST), Naofumi Homma (Tohoku Univ.) ISEC2011-65 |
(To be available after the conference date) [more] |
ISEC2011-65 pp.21-24 |
ISEC, LOIS |
2008-11-13 14:50 |
Aichi |
Nagoya Noh Theater |
An Experiment with DPA and DEMA on FPGA Equipped on SASEBO Takahiko Syouji, Akira Nozawa, Takayuki Kimura (Y.D.K. Co.,Ltd.), Tomoyasu Suzaki, Noritaka Yamashita, Yukiyasu Tsunoo (NEC Corporation) ISEC2008-77 OIS2008-53 |
(To be available after the conference date) [more] |
ISEC2008-77 OIS2008-53 pp.29-34 |
ISEC |
2008-05-16 10:20 |
Tokyo |
Kikai-Shinko-Kaikan Bldg. |
New Impossible Differentials of CLEFIA Etsuko Tsujihara (YDK), Maki Shigeri (NEC Software Hokuriku), Tomoyasu Suzaki (NEC), Takeshi Kawabata (NEC Software Hokuriku), Yukiyasu Tsunoo (NEC) ISEC2008-3 |
This paper reports impossible differential cryptanalysis on the 128-bit block cipher CLEFIA that was proposed in 2007. T... [more] |
ISEC2008-3 pp.15-22 |
ISEC, IT, WBS |
2008-02-29 08:30 |
Tokyo |
|
High-Precision Differential Side-channel Analysis Using Band-Pass Filter Toru Hisakado, Noritaka Yamashita, Tomoyasu Suzaki, Yukiyasu Tsunoo (NEC), Takahiko Shouji, Akira Nozawa, Takayuki Kimura (YDK) IT2007-49 ISEC2007-146 WBS2007-80 |
In this paper, we describe high-precision method for differential side-channel analysis(DSCA) using a band-pass filter. ... [more] |
IT2007-49 ISEC2007-146 WBS2007-80 pp.1-6 |
WBS, IT, ISEC |
2006-03-16 10:20 |
Aichi |
Nagoya Univ. |
Experimental Results on INSTAC-8 Compliant Board Yukiyasu Tsunoo, Toru Hisakado (NEC), Etsuko Tsujihara (Y.D.K.), Tsutomu Matsumoto (Yokohama National Univ.), Shinichi Kawamura, Kouichi Fujisaki (Toshiba) |
This paper presents the results of three kinds of Side-channel attacks, experimentally made against software-implemented... [more] |
IT2005-78 ISEC2005-135 WBS2005-92 pp.81-85 |
|
|
|
Copyright and reproduction :
All rights are reserved and no part of this publication may be reproduced or transmitted in any form or by any means, electronic or mechanical, including photocopy, recording, or any information storage and retrieval system, without permission in writing from the publisher. Notwithstanding, instructors are permitted to photocopy isolated articles for noncommercial classroom use without fee. (License No.: 10GA0019/12GB0052/13GB0056/17GB0034/18GB0034)
|
[Return to Top Page]
[Return to IEICE Web Page]
|