Committee |
Date Time |
Place |
Paper Title / Authors |
Abstract |
Paper # |
HWS |
2024-04-19 16:25 |
Tokyo |
(Primary: On-site, Secondary: Online) |
Non-Destructive Hardware Trojan Inspection by Backside Near Infrared Imaging Junichi Sakamoto, Yohei Hori, Shinichi Kawamura (AIST), Yuichi Hayashi (NAIST), Makoto Nagata (KU) |
(To be available after the conference date) [more] |
|
HWS |
2024-04-19 17:15 |
Tokyo |
(Primary: On-site, Secondary: Online) |
Supply chain security of semiconductor chips and countermeasure design technologies Makoto Nagata (Kobe Univ.), Kazuki Monta (Secafy Co., Ltd.), Yuichi Hayashi (NAIST), Naofumi Homma (Tohoku Univ.) |
(To be available after the conference date) [more] |
|
ICD |
2024-04-11 10:45 |
Kanagawa |
(Primary: On-site, Secondary: Online) |
[Invited Lecture]
An SPN Strong PUF with SRAM-based Entropy Source Featuring Both 100-Bit Output Space and Modeling Attack Resilience Kunyang Liu (Kyoto Univ.), Yichen Tang (Lenovo), Shufan Xu, Kiichi Niitsu (Kyoto Univ.), Hirofumi Shinohara (Waseda Univ.) |
(To be available after the conference date) [more] |
|
VLD, HWS, ICD |
2024-02-29 11:15 |
Okinawa |
(Primary: On-site, Secondary: Online) |
Design of RISC-V SoC with Post-quantum Encryption Algorithm Acceleration Jiyuan Xin, Makoto Ikeda (UTokyo) VLD2023-110 HWS2023-70 ICD2023-99 |
The foundational elements of the Internet of Things (IoT) are increasingly intricate and robust Systems-on-Chips (SoCs) ... [more] |
VLD2023-110 HWS2023-70 ICD2023-99 pp.66-71 |
VLD, HWS, ICD |
2024-03-01 12:05 |
Okinawa |
(Primary: On-site, Secondary: Online) |
Security Evaluation of Fault Analysis for SuperSonic Shu Takemoto, Yusuke Nozaki, Masaya Yoshikawa (Meijo Univ.) VLD2023-126 HWS2023-86 ICD2023-115 |
SuperSonic, a low-latency lightweight block cipher, is suitable for securing edge devices with high real-time performanc... [more] |
VLD2023-126 HWS2023-86 ICD2023-115 pp.141-144 |
VLD, HWS, ICD |
2024-03-01 15:30 |
Okinawa |
(Primary: On-site, Secondary: Online) |
A Pipelined NTT Transformer and its Extension Scheme Designed for the Digital Signature Scheme Crystals-Dilithium Pengfei Sun, Makoto Ikeda (Tokyo Univ.) VLD2023-130 HWS2023-90 ICD2023-119 |
As quantum computing advances, it threatens the security of current encryption algorithms, making Post-Quantum Cryptogra... [more] |
VLD2023-130 HWS2023-90 ICD2023-119 pp.161-166 |
RECONF, VLD |
2024-01-30 14:50 |
Kanagawa |
AIRBIC Meeting Room 1-4 (Primary: On-site, Secondary: Online) |
FPGA-Accelerated Random Forest for Real-Time IoT Intrusion Detection Qingyu Zeng, Yuko Hara (Tokyo Tech) VLD2023-97 RECONF2023-100 |
The rapid proliferation of the Internet of Things (IoT) has heightened cyber security concerns, necessitating efficient ... [more] |
VLD2023-97 RECONF2023-100 pp.99-104 |
ICSS |
2023-11-16 15:20 |
Ishikawa |
IT Business Plaza Musashi and Online (Primary: On-site, Secondary: Online) |
Attack Verification and Evaluation of Incremental Fault Analysis against AES Encryption Processing Device Miran Tamagawa, Yuichi Futa (TUT), Takehiko Mieno (AVASYS), Hiroyuki Okazaki (Shinshu University) ICSS2023-56 |
In recent years,there has been a growing concern about the impact of fault analysis attack,which use hardware failures a... [more] |
ICSS2023-56 pp.35-41 |
VLD, DC, RECONF, ICD, IPSJ-SLDM [detail] |
2023-11-16 13:20 |
Kumamoto |
Civic Auditorium Sears Home Yume Hall (Primary: On-site, Secondary: Online) |
Tamper Resistance Evaluation on FPGA for Low-Latency Cipher Sonic Shu Takemoto, Yusuke Nozaki, Masaya Yoshikawa (Meijo Univ.) VLD2023-49 ICD2023-57 DC2023-56 RECONF2023-52 |
Industry 5.0 promotes smart factories for system optimization by utilizing IoT and AI in the industrial field. The smart... [more] |
VLD2023-49 ICD2023-57 DC2023-56 RECONF2023-52 pp.101-105 |
VLD, DC, RECONF, ICD, IPSJ-SLDM [detail] |
2023-11-17 10:25 |
Kumamoto |
Civic Auditorium Sears Home Yume Hall (Primary: On-site, Secondary: Online) |
Low-Latency Hardware Implementation for SPHINCS+ signature generation Yuta Takeshima, Makoto Ikeda (The Univ. of Tokyo) VLD2023-69 ICD2023-77 DC2023-76 RECONF2023-72 |
In recent years, research and standardization of post-quantum cryptography have been actively pursued. In 2022, the digi... [more] |
VLD2023-69 ICD2023-77 DC2023-76 RECONF2023-72 pp.200-204 |
HWS |
2023-04-15 09:15 |
Oita |
(Primary: On-site, Secondary: Online) |
An AES Cryptographic Processor with Partial Re-Keying Scheme Utilizing Physical Attack Sensor Ryuki Ikemoto, Soichiro Fujii (Osaka Univ.), Yuki Yamashita, Makoto Nagata (Kobe Univ.), Jun Shiomi, Yoshihiro Midoh, Noriyuki Miura (Osaka Univ.) HWS2023-9 |
We propose a partial secret key update method for AES cryptography using sensors that can detect physical attacks on cry... [more] |
HWS2023-9 pp.34-36 |
HWS, VLD |
2023-03-02 15:20 |
Okinawa |
(Primary: On-site, Secondary: Online) |
Secure Cache System against On-Chip Threats Keisuke Kamahori, Shinya Takamaeda (UTokyo) VLD2022-95 HWS2022-66 |
In this paper, we propose a new threat model for secure processor design that considers on-chip threats.
Also, we desi... [more] |
VLD2022-95 HWS2022-66 pp.113-118 |
HWS, VLD |
2023-03-02 15:45 |
Okinawa |
(Primary: On-site, Secondary: Online) |
Hiding Memory Structure for IP Protection Sun Tanaka, Shinya Takamaeda (UTokyo) VLD2022-96 HWS2022-67 |
This paper proposes a concept and a method of hiding memory structure for IP protection. [more] |
VLD2022-96 HWS2022-67 pp.119-124 |
HWS, VLD |
2023-03-04 13:30 |
Okinawa |
(Primary: On-site, Secondary: Online) |
Threat of EM Information Leakage from Speakerphones Due to IEMI and Suppression Indexes for EMC Countermeasures Seiya Takano, Yuichi Hayashi (NAIST) VLD2022-120 HWS2022-91 |
Threats of causing forced electromagnetic information leakage by irradiating devices with electromagnetic waves have bee... [more] |
VLD2022-120 HWS2022-91 pp.261-266 |
HWS, VLD |
2023-03-04 13:55 |
Okinawa |
(Primary: On-site, Secondary: Online) |
* Masaru Mashiba, Kazuki Monta (Kobe Univ.), Takaaki Okidono (SCU), Takuzi Miki, Nagata Makoto (Kobe Univ.) VLD2022-121 HWS2022-92 |
With the development of IoT, security is becoming increasingly important. Confidential information and other information... [more] |
VLD2022-121 HWS2022-92 pp.267-272 |
VLD, DC, RECONF, ICD, IPSJ-SLDM [detail] |
2022-11-29 15:05 |
Kumamoto |
(Primary: On-site, Secondary: Online) |
Evaluation of power delivery networks in secure semiconductor systems Masaru Mashiba, Kazuki Monta (Kobe Univ.), Takaaki Okidono (SCU), Takuzi Miki, Makoto Nagata (Kobe Univ.) VLD2022-33 ICD2022-50 DC2022-49 RECONF2022-56 |
With the development of the IoT, hardware security is becoming increasingly important. Physical attacks on cryptoprocess... [more] |
VLD2022-33 ICD2022-50 DC2022-49 RECONF2022-56 pp.82-86 |
HWS, ICD |
2022-10-25 15:40 |
Shiga |
(Primary: On-site, Secondary: Online) |
Hardware Acceleration of TFHE-based Adder by Controlling Error Yinfan Zhao, Ikeda Makoto (Univ. of Tokyo) HWS2022-40 ICD2022-32 |
Fully homomorphic encryption (FHE) is expected to be used in the secure delegating computation. The bootstrapping in the... [more] |
HWS2022-40 ICD2022-32 pp.58-63 |
ICD, SDM, ITE-IST [detail] |
2022-08-08 15:45 |
Online |
|
Evaluation of Low-Latency Cryptography MANTIS based Low-Power oriented Tamper-Resistant Circuit Kosuke Hamaguchi, Shu Takemoto, Yusuke Nozaki, Masaya Yoshikawa (Meijo Univ.) SDM2022-41 ICD2022-9 |
Lightweight cryptography can not only be implemented in a small area, but also with low latency and low power consumptio... [more] |
SDM2022-41 ICD2022-9 pp.31-36 |
SS, IPSJ-SE, KBSE [detail] |
2022-07-28 16:30 |
Hokkaido |
Hokkaido-Jichiro-Kaikan (Sapporo) (Primary: On-site, Secondary: Online) |
Deep Learning Power Analysis Against Protected PRINCE Shu Takemoto, Yoshiya Ikezaki, Yusuke Nozaki, Masaya Yoshikawa (Meijo Univ.) SS2022-4 KBSE2022-14 |
In recent years, with the development of deep learning, AI has been incorporated in the field of cyber security. On the ... [more] |
SS2022-4 KBSE2022-14 pp.19-24 |
AI |
2022-07-04 10:40 |
Hokkaido |
(Primary: On-site, Secondary: Online) |
Deep Learning Side-Channel Attacks for Rolled Architecture of PRINCE and Midori128 Shu Takemoto, Yoshiya Ikezaki, Yusuke Nozaki, Masaya Yoshikawa (Meijo Univ.) AI2022-3 |
With the recent expansion of small autonomous mobile robots such as drones, cyber security for small devices is very imp... [more] |
AI2022-3 pp.13-18 |