Committee |
Date Time |
Place |
Paper Title / Authors |
Abstract |
Paper # |
ICM, NS, CQ, NV (Joint) |
2023-11-21 13:15 |
Ehime |
Ehime Prefecture Gender Equality Center (Primary: On-site, Secondary: Online) |
[Encouragement Talk]
Security Evaluation of Low-latency Cipher based on Improved Simon against Deep Learning Analysis using Profiled Power Consumption Shu Takemoto, Yusuke Nozaki, Masaya Yoshikawa (Meijo Univ.) |
[more] |
|
VLD, DC, RECONF, ICD, IPSJ-SLDM [detail] |
2023-11-16 13:20 |
Kumamoto |
Civic Auditorium Sears Home Yume Hall (Primary: On-site, Secondary: Online) |
Tamper Resistance Evaluation on FPGA for Low-Latency Cipher Sonic Shu Takemoto, Yusuke Nozaki, Masaya Yoshikawa (Meijo Univ.) |
[more] |
|
AI |
2023-09-12 15:35 |
Hokkaido |
|
Variational Autoencoder Oriented Protection for Intellectual Property Ryo Kumagai, Shu Takemoto, Yusuke Nozaki, Masaya Yoshikawa (Meijo Univ.) AI2023-31 |
In recent years, generative AI, which generates images based on instructions in natural language, has developed rapidly ... [more] |
AI2023-31 pp.180-186 |
ICSS, IPSJ-SPT |
2023-03-13 13:30 |
Okinawa |
Okinawaken Seinenkaikan (Primary: On-site, Secondary: Online) |
Basic Study on IoT Security Using Robot Arm Shu Takemoto, Yoshiya Ikezaki, Yusuke Nozaki, Masaya Yoshikawa (Meijo Univ.) ICSS2022-51 |
The introduction of IoT devices in industrial systems is becoming increasingly active in order to realise Industry 4.0. ... [more] |
ICSS2022-51 pp.19-24 |
IE, ITS, ITE-MMS, ITE-ME, ITE-AIT [detail] |
2023-02-22 10:15 |
Hokkaido |
Hokkaido Univ. |
Generation Method of Targeted Adversarial Examples using Gradient Information for the Target Class of the Image Ryo Kumagai, Shu Takemoto, Yusuke Nozaki, Masaya Yoshikawa (Meijo Univ.) ITS2022-61 IE2022-78 |
With the advancement of AI technology, the vulnerability of AI system is pointed out. The adversarial examples (AE), whi... [more] |
ITS2022-61 IE2022-78 pp.107-111 |
NS, ICM, CQ, NV (Joint) |
2022-11-24 11:10 |
Fukuoka |
Humanities and Social Sciences Center, Fukuoka Univ. + Online (Primary: On-site, Secondary: Online) |
Deep Learning Side-Channel Attack in Noise Based Countermeasure Simon Shu Takemoto, Yoshiya Ikezaki, Yusuke Nozaki, Masaya Yoshikawa (Meijo Univ.) NS2022-103 |
The IoT requires the implementation of cryptographic techniques to ensure the confidentiality, integrity, and availabili... [more] |
NS2022-103 pp.19-22 |
SIP |
2022-08-26 14:26 |
Okinawa |
Nobumoto Ohama Memorial Hall (Ishigaki Island) (Primary: On-site, Secondary: Online) |
Generation method of Adversarial Examples using XAI Ryo Kumagai, Shu Takemoto, Yusuke Nozaki, Masaya Yoshikawa (Meijo Univ.) SIP2022-72 |
With the advancement of AI technology, AI can be applied to various fields. Therefore the accountability for the decisio... [more] |
SIP2022-72 pp.115-120 |
ICD, SDM, ITE-IST [detail] |
2022-08-08 15:45 |
Online |
|
Evaluation of Low-Latency Cryptography MANTIS based Low-Power oriented Tamper-Resistant Circuit Kosuke Hamaguchi, Shu Takemoto, Yusuke Nozaki, Masaya Yoshikawa (Meijo Univ.) SDM2022-41 ICD2022-9 |
Lightweight cryptography can not only be implemented in a small area, but also with low latency and low power consumptio... [more] |
SDM2022-41 ICD2022-9 pp.31-36 |
IN, CCS (Joint) |
2022-08-05 15:00 |
Hokkaido |
Hokkaido University(Centennial Hall) (Primary: On-site, Secondary: Online) |
Countermeasure of In-vehicle System using Authenticated Encryption against DoS Attacks Daichi Hirose, Shu Takemoto, Yusuke Nozaki, Masaya Yoshikawa (Meijo Univ.) IN2022-22 |
In-vehicle systems adopt Controller Area Network (CAN) which is the standard communication protocol. Many kinds of data ... [more] |
IN2022-22 pp.39-44 |
SS, IPSJ-SE, KBSE [detail] |
2022-07-28 16:30 |
Hokkaido |
Hokkaido-Jichiro-Kaikan (Sapporo) (Primary: On-site, Secondary: Online) |
Deep Learning Power Analysis Against Protected PRINCE Shu Takemoto, Yoshiya Ikezaki, Yusuke Nozaki, Masaya Yoshikawa (Meijo Univ.) SS2022-4 KBSE2022-14 |
In recent years, with the development of deep learning, AI has been incorporated in the field of cyber security. On the ... [more] |
SS2022-4 KBSE2022-14 pp.19-24 |
AI |
2022-07-04 10:40 |
Hokkaido |
(Primary: On-site, Secondary: Online) |
Deep Learning Side-Channel Attacks for Rolled Architecture of PRINCE and Midori128 Shu Takemoto, Yoshiya Ikezaki, Yusuke Nozaki, Masaya Yoshikawa (Meijo Univ.) AI2022-3 |
With the recent expansion of small autonomous mobile robots such as drones, cyber security for small devices is very imp... [more] |
AI2022-3 pp.13-18 |
CNR |
2022-07-01 14:30 |
Okinawa |
(Primary: On-site, Secondary: Online) |
Evaluation of SROS2 Using the Tweakable Block Cipher Shu Takemoto, Kosuke Hamaguchi, Yoshiya Ikezaki, Yusuke Nozaki, Masaya Yoshikawa (Meijo Univ.) CNR2022-7 |
In recent years, autonomous mobile robots have been utilized in a wide range of fields, including industrial fields, req... [more] |
CNR2022-7 pp.29-34 |
VLD, HWS [detail] |
2022-03-08 11:00 |
Online |
Online |
Evaluation of a Lightweight Cryptographic Finalist on SROS2 Shu Takemoto, Yoshiya Ikezaki, Yusuke Nozaki, Masaya Yoshikawa (Meijo Univ.) VLD2021-94 HWS2021-71 |
In cyber-physical systems, small devices are connected to the network to enable the analysis of sensor values. Also, sin... [more] |
VLD2021-94 HWS2021-71 pp.99-104 |
VLD, HWS [detail] |
2022-03-08 13:00 |
Online |
Online |
Implementation Evaluation of Glitch PUF Using a Low-Latency Cryptography MANTIS Kosuke Hamaguchi, Shu Takemoto, Yusuke Nozaki, Masaya Yoshikawa (Meijo Univ.) VLD2021-96 HWS2021-73 |
This paper proposes a low-latency cipher MANTIS based PUF which uses signal glitch during encryption. The security level... [more] |
VLD2021-96 HWS2021-73 pp.111-116 |
CAS, CS |
2022-03-04 13:45 |
Online |
Online |
Evaluation of Trojan Detector for AI Hardware Shu Takemoto, Yoshiya Ikezaki, Yusuke Nozaki, Masaya Yoshikawa (Meijo Univ.) CAS2021-94 CS2021-96 |
In recent years, AI edge computing has been expanding to realize real-time inference by implementing AI models on edge d... [more] |
CAS2021-94 CS2021-96 pp.106-111 |
CAS, CS |
2022-03-04 14:10 |
Online |
Online |
Secure In-vehicle System using Authenticated Encryption Midori-OTR and its Implementation Evaluation Daichi Hirose, Shu Takemoto, Yusuke Nozaki, Masaya Yoshikawa (Meijo Univ.) CAS2021-95 CS2021-97 |
In recent years, many electronic control units called ECUs have been installed in automobiles to perform various functio... [more] |
CAS2021-95 CS2021-97 pp.112-117 |
CAS, CS |
2022-03-04 14:35 |
Online |
Online |
Unrolled Architecture oriented Countermeasure Circuit for Low-power Cryptography Midori128 and its Evaluation Shunsuke Miwa, Shu Takemoto, Yusuke Nozaki, Masaya Yoshikawa (Meijo Univ.) CAS2021-96 CS2021-98 |
The number of IoT devices is growing rapidly, ensuring security in those devices is an important issue. Lightweight bloc... [more] |
CAS2021-96 CS2021-98 pp.118-123 |
AI |
2022-02-28 15:00 |
Miyazaki |
Youth Hostel Sunflower MIYAZAKI (Primary: On-site, Secondary: Online) |
Basic Study for Backdoor Attack based on Invisible Trigger Ryo Kumagai, Shu Takemoto, Yusuke Nozaki, Masaya Yoshikawa (Meijo Univ.) AI2021-21 |
A backdoor attack is a threat to deep neural networks (DNN). In an attack on a DNN for the purpose of image classificati... [more] |
AI2021-21 pp.53-58 |
IE, ITS, ITE-AIT, ITE-ME, ITE-MMS [detail] |
2022-02-22 11:55 |
Online |
Online |
Bit-plane oriented Detection method of Malicious Code Hidden in the Image Ryo Kumagai, Shu Takemoto, Yusuke Nozaki, Masaya Yoshikawa (Meijo Univ.) ITS2021-50 IE2021-59 |
With the increasing importance of cyberspace, the threat of malware has also been increasing. Malware which hides malici... [more] |
ITS2021-50 IE2021-59 pp.151-156 |
HWS, VLD [detail] |
2021-03-04 15:20 |
Online |
Online |
Power Analysis Attack on a Unrolled Midori128 and its Evaluation Shu Takemoto, Yoshiya Ikezaki, Yusuke Nozaki, Masaya Yoshikawa (Meijo Univ.) VLD2020-87 HWS2020-62 |
The lightweight block cipher Midori has been proposed as a cryptographic algorithm for low-power operation, which is imp... [more] |
VLD2020-87 HWS2020-62 pp.108-113 |