IEICE Technical Committee Submission System
Conference Schedule
Online Proceedings
[Sign in]
Tech. Rep. Archives
    [Japanese] / [English] 
( Committee/Place/Topics  ) --Press->
 
( Paper Keywords:  /  Column:Title Auth. Affi. Abst. Keyword ) --Press->

All Technical Committee Conferences  (Searched in: Recent 10 Years)

Search Results: Conference Papers
 Conference Papers (Available on Advance Programs)  (Sort by: Date Descending)
 Results 1 - 9 of 9  /   
Committee Date Time Place Paper Title / Authors Abstract Paper #
HWS, ICD, VLD 2025-03-08
09:45
Okinawa (Okinawa, Online)
(Primary: On-site, Secondary: Online)
Implementation of Side-channel-attack Environment against In-vehicle ECUs Using CAN Packet Monitoring for Triggering Waveform Acquisition
Tomoe Kato, Yuta Fukuda, Mizuki Nagahisa, Masato Okuda, Kota Yoshida, Takeshi Fujino (Ritsumeikan Univ.)
(To be available after the conference date) [more]
VLD, DC, RECONF, ICD, IPSJ-SLDM [detail] 2024-11-12
16:25
Oita COMPAL HALL (Oita, Online)
(Primary: On-site, Secondary: Online)
Implementation and Evaluation of Arithmetic Masking to Mitigate Side-channel Attacks on Wavefront Array-based DNN Accelerator
Hirokatsu Yamasaki, Kota Yoshida, Yuta Fukuda, Takeshi Fujino (Ritsumeikan Univ) VLD2024-36 ICD2024-54 DC2024-58 RECONF2024-66
Since training deep neural networks (DNNs) requires huge costs, trained models are important intellectual property. Ther... [more] VLD2024-36 ICD2024-54 DC2024-58 RECONF2024-66
pp.55-60
VLD, DC, RECONF, ICD, IPSJ-SLDM [detail] 2024-11-13
15:35
Oita COMPAL HALL (Oita, Online)
(Primary: On-site, Secondary: Online)
A Preliminary Evaluation of fDTM-PUF with TDC Sensor for Controlled Threshold
Kazuki Fujimoto, Yuta Fukuda, Tatsuya Oyama (Ritsumeikan Univ.), Yohei Hori, Toshihiro Katashita (AIST), Takeshi Fujino (Ritsumeikan Univ.) VLD2024-54 ICD2024-72 DC2024-76 RECONF2024-84
 [more] VLD2024-54 ICD2024-72 DC2024-76 RECONF2024-84
pp.153-158
EMM, BioX, ISEC, SITE, ICSS, HWS, IPSJ-CSEC, IPSJ-SPT [detail] 2023-07-24
14:20
Hokkaido Hokkaido Jichiro Kaikan (Hokkaido) Non-profiled Side-Channel Attacks by using Clustering Scores in Deep Learning model (2) -- Attacks by using Models to Predict Ciphertext against Hardware-implemented AES with Countermeasures --
Yuta Fukuda, Kota Yoshida, Takeshi Fujino (Ritsumeikan Univ.) ISEC2023-15 SITE2023-9 BioX2023-18 HWS2023-15 ICSS2023-12 EMM2023-15
 [more] ISEC2023-15 SITE2023-9 BioX2023-18 HWS2023-15 ICSS2023-12 EMM2023-15
pp.7-12
VLD, DC, RECONF, ICD, IPSJ-SLDM [detail] 2022-11-30
16:40
Kumamoto   (Kumamoto, Online)
(Primary: On-site, Secondary: Online)
Evaluation of Model Quantization Method on Vitis-AI for Mitigating Adversarial Examples
Yuta Fukuda, Kota Yoshida, Takeshi Fujino (Ritsumeikan Univ.) VLD2022-51 ICD2022-68 DC2022-67 RECONF2022-74
Adversarial examples (AEs) are security threats in deep neural networks (DNNs). One of the countermeasures is adversaria... [more] VLD2022-51 ICD2022-68 DC2022-67 RECONF2022-74
pp.182-187
EMM, BioX, ISEC, SITE, ICSS, HWS, IPSJ-CSEC, IPSJ-SPT [detail] 2022-07-19
15:15
Online Online (Online) Revealing PUF Responses by Differential Power Analysis against Reed-Muller-Code-based Fuzzy Extractor
Soma Watanabe, Yuta Fukuda, Tatsuya Oyama, Kota Yoshida, Takeshi Fujino (Ritsumeikan Univ) ISEC2022-12 SITE2022-16 BioX2022-37 HWS2022-12 ICSS2022-20 EMM2022-20
IoT devices that use the Physically Unclonable Function (PUF) response to generate a secret key has been proposed. Since... [more] ISEC2022-12 SITE2022-16 BioX2022-37 HWS2022-12 ICSS2022-20 EMM2022-20
pp.29-34
HWS 2022-04-26
10:55
Tokyo AIST Tokyo Waterfront (Annex) (Tokyo, Online)
(Primary: On-site, Secondary: Online)
Deep Learning Side-Channel Attacks against Hardware-Implemented Lightweight Cipher Midori64
Madoka Sako, Kunihiro Kuroda, Yuta Fukuda, Kota Yoshida, Takeshi Fujino (Ritsumeikan Univ.) HWS2022-2
Midori is a lightweight cipher and it is developed to achieve superior circuit size, low latency, and low power consumpt... [more] HWS2022-2
pp.7-12
HWS 2022-04-26
11:20
Tokyo AIST Tokyo Waterfront (Annex) (Tokyo, Online)
(Primary: On-site, Secondary: Online)
Deep Learning-based Side-Channel Attacks against Software-Implemented RSA using Binary Exponentiation with Dummy Multiplication
Seiya Shimada, Kunihiro Kuroda, Yuta Fukuda, Kouta Yoshida, Takeshi Fujino (Ritsumeikan Univ.) HWS2022-3
Recently, deep learning-based side-channel attacks (DL-SCA) against symmetric key cryptography such as AES have been rep... [more] HWS2022-3
pp.13-18
BioX, ISEC, SITE, ICSS, EMM, HWS, IPSJ-CSEC, IPSJ-SPT [detail] 2021-07-20
14:50
Online Online (Online) Deep Learning Side-Channel Attacks against Unprotected AES and RSM-AES Implemented in ASIC
Yuta Fukuda, Kota Yoshida, Hisashi Hashimoto, Takeshi Fujino (Ritsumeikan Univ.) ISEC2021-24 SITE2021-18 BioX2021-25 HWS2021-24 ICSS2021-29 EMM2021-29
The cryptographic key can be revealed by exploiting side-channel information such as power traces under operation.
Rec... [more]
ISEC2021-24 SITE2021-18 BioX2021-25 HWS2021-24 ICSS2021-29 EMM2021-29
pp.86-91
 Results 1 - 9 of 9  /   
Choose a download format for default settings. [NEW !!]
Text format pLaTeX format CSV format BibTeX format
Copyright and reproduction : All rights are reserved and no part of this publication may be reproduced or transmitted in any form or by any means, electronic or mechanical, including photocopy, recording, or any information storage and retrieval system, without permission in writing from the publisher. Notwithstanding, instructors are permitted to photocopy isolated articles for noncommercial classroom use without fee. (License No.: 10GA0019/12GB0052/13GB0056/17GB0034/18GB0034)


[Return to Top Page]

[Return to IEICE Web Page]


The Institute of Electronics, Information and Communication Engineers (IEICE), Japan