IEICE Technical Committee Submission System
Conference Schedule
Online Proceedings
[Sign in]
Tech. Rep. Archives
    [Japanese] / [English] 
( Committee/Place/Topics  ) --Press->
 
( Paper Keywords:  /  Column:Title Auth. Affi. Abst. Keyword ) --Press->

All Technical Committee Conferences  (Searched in: All Years)

Search Results: Conference Papers
 Conference Papers (Available on Advance Programs)  (Sort by: Date Descending)
 Results 1 - 20 of 72  /  [Next]  
Committee Date Time Place Paper Title / Authors Abstract Paper #
ICD 2024-04-11
10:45
Kanagawa
(Primary: On-site, Secondary: Online)
[Invited Lecture] An SPN Strong PUF with SRAM-based Entropy Source Featuring Both 100-Bit Output Space and Modeling Attack Resilience
Kunyang Liu (Kyoto Univ.), Yichen Tang (Lenovo), Shufan Xu, Kiichi Niitsu (Kyoto Univ.), Hirofumi Shinohara (Waseda Univ.)
(To be available after the conference date) [more]
VLD, HWS, ICD 2024-02-29
11:15
Okinawa
(Primary: On-site, Secondary: Online)
Design of RISC-V SoC with Post-quantum Encryption Algorithm Acceleration
Jiyuan Xin, Makoto Ikeda (UTokyo) VLD2023-110 HWS2023-70 ICD2023-99
The foundational elements of the Internet of Things (IoT) are increasingly intricate and robust Systems-on-Chips (SoCs) ... [more] VLD2023-110 HWS2023-70 ICD2023-99
pp.66-71
VLD, HWS, ICD 2024-03-01
12:05
Okinawa
(Primary: On-site, Secondary: Online)
Security Evaluation of Fault Analysis for SuperSonic
Shu Takemoto, Yusuke Nozaki, Masaya Yoshikawa (Meijo Univ.) VLD2023-126 HWS2023-86 ICD2023-115
SuperSonic, a low-latency lightweight block cipher, is suitable for securing edge devices with high real-time performanc... [more] VLD2023-126 HWS2023-86 ICD2023-115
pp.141-144
VLD, HWS, ICD 2024-03-01
15:30
Okinawa
(Primary: On-site, Secondary: Online)
A Pipelined NTT Transformer and its Extension Scheme Designed for the Digital Signature Scheme Crystals-Dilithium
Pengfei Sun, Makoto Ikeda (Tokyo Univ.) VLD2023-130 HWS2023-90 ICD2023-119
As quantum computing advances, it threatens the security of current encryption algorithms, making Post-Quantum Cryptogra... [more] VLD2023-130 HWS2023-90 ICD2023-119
pp.161-166
VLD, HWS, ICD 2024-03-01
16:20
Okinawa
(Primary: On-site, Secondary: Online)
An Efficient Hardware Approach for High-Speed SPHINCS+ Signature Generation
Yuta Takeshima, Makoto Ikeda (The Univ. of Tokyo) VLD2023-132 HWS2023-92 ICD2023-121
This study addresses the challenges traditional cryptographic systems face with the advent of quantum computers by focus... [more] VLD2023-132 HWS2023-92 ICD2023-121
pp.173-177
IE, CS, IPSJ-AVM [detail] 2023-12-11
15:30
Fukuoka Kyushu Institute of Technology
(Primary: On-site, Secondary: Online)
[Special Invited Talk] High-Performance Image Processing Utilizing Hardware
Norishige Fukushima (nitech) CS2023-83 IE2023-25
High-speed image signal processing is important to realize applications in various environments.
To complete image proc... [more]
CS2023-83 IE2023-25
p.16
SP, IPSJ-SLP, EA, SIP [detail] 2023-03-01
16:30
Okinawa
(Primary: On-site, Secondary: Online)
Low-bit Image Restoration with Loop-unrolled ISTA
Shu Abe, Soushi Takahashi, Shogo Muramatsu (Niigata Univ) EA2022-125 SIP2022-169 SP2022-89
This study proposes a low-bit image restoration method based on a loop-unrolled network of Iterative Shrinkage Threshold... [more] EA2022-125 SIP2022-169 SP2022-89
pp.288-293
VLD, DC, RECONF, ICD, IPSJ-SLDM [detail] 2022-11-30
17:05
Kumamoto  
(Primary: On-site, Secondary: Online)
Error detection and countermeasures caused by hardware trojan inserted computers
Takuro Kasai, Masashi Imai (Hirosaki Univ.) VLD2022-55 ICD2022-72 DC2022-71 RECONF2022-78
In recent years, the threat of hardware Trojans has become a serious problem. However, due to the nature of hardware Tro... [more] VLD2022-55 ICD2022-72 DC2022-71 RECONF2022-78
pp.206-211
SS, IPSJ-SE, KBSE [detail] 2022-07-28
16:30
Hokkaido Hokkaido-Jichiro-Kaikan (Sapporo)
(Primary: On-site, Secondary: Online)
Deep Learning Power Analysis Against Protected PRINCE
Shu Takemoto, Yoshiya Ikezaki, Yusuke Nozaki, Masaya Yoshikawa (Meijo Univ.) SS2022-4 KBSE2022-14
In recent years, with the development of deep learning, AI has been incorporated in the field of cyber security. On the ... [more] SS2022-4 KBSE2022-14
pp.19-24
IA, ICSS 2022-06-24
10:25
Nagasaki Univ. of Nagasaki
(Primary: On-site, Secondary: Online)
Application of Adversarial Examples to Physical ECG Signals
Taiga Ono (Waseda Univ.), Takeshi Sugawara (UEC), Jun Sakuma (Tsukuba Univ./RIKEN), Tatsuya Mori (Waseda Univ./RIKEN/NICT) IA2022-11 ICSS2022-11
This work aims to assess the reality and feasibility of applying adversarial examples to attack cardiac diagnosis system... [more] IA2022-11 ICSS2022-11
pp.61-66
VLD, HWS [detail] 2022-03-08
11:00
Online Online Evaluation of a Lightweight Cryptographic Finalist on SROS2
Shu Takemoto, Yoshiya Ikezaki, Yusuke Nozaki, Masaya Yoshikawa (Meijo Univ.) VLD2021-94 HWS2021-71
In cyber-physical systems, small devices are connected to the network to enable the analysis of sensor values. Also, sin... [more] VLD2021-94 HWS2021-71
pp.99-104
HWS, VLD [detail] 2021-03-04
15:20
Online Online Power Analysis Attack on a Unrolled Midori128 and its Evaluation
Shu Takemoto, Yoshiya Ikezaki, Yusuke Nozaki, Masaya Yoshikawa (Meijo Univ.) VLD2020-87 HWS2020-62
The lightweight block cipher Midori has been proposed as a cryptographic algorithm for low-power operation, which is imp... [more] VLD2020-87 HWS2020-62
pp.108-113
VLD, DC, RECONF, ICD, IPSJ-SLDM
(Joint) [detail]
2020-11-18
14:25
Online Online On-chip power supply noise monitoring for evaluation of multi-chip board power delivery networks
Daichi Nakagawa, Kazuki Yasuda, Masaru Mashiba, Kazuki Monta, Takaaki Okidono, Takuji Miki, Makoto Nagata (Kobe Univ) VLD2020-31 ICD2020-51 DC2020-51 RECONF2020-50
In these days, information and communication technology has been evolving more and more, and hardware security has been ... [more] VLD2020-31 ICD2020-51 DC2020-51 RECONF2020-50
pp.115-117
IPSJ-SLDM, RECONF, VLD, CPSY, IPSJ-ARC [detail] 2020-01-23
16:55
Kanagawa Raiosha, Hiyoshi Campus, Keio University VLD2019-79 CPSY2019-77 RECONF2019-69 This talk reviews research on parallel processing and hardware algorithms for FPGAs that the speaker have been done so f... [more] VLD2019-79 CPSY2019-77 RECONF2019-69
p.157
VLD, DC, CPSY, RECONF, ICD, IE, IPSJ-SLDM, IPSJ-EMB, IPSJ-ARC
(Joint) [detail]
2019-11-15
09:40
Ehime Ehime Prefecture Gender Equality Center Modeling attacks against device authentication using CMOS image sensor PUF
Hiroshi Yamada, Shunsuke Okura, Mitsuru Shiozaki, Masayoshi Shirahata, Takeshi Fujino (Ritsumeikan Univ.) ICD2019-34 IE2019-40
A CMOS image sensor physically unclonable function (CIS-PUF) for device authentication by the unique responses extracted... [more] ICD2019-34 IE2019-40
pp.31-36
VLD, DC, CPSY, RECONF, ICD, IE, IPSJ-SLDM, IPSJ-EMB, IPSJ-ARC
(Joint) [detail]
2019-11-15
10:45
Ehime Ehime Prefecture Gender Equality Center [Keynote Address] Co-optimization of hardware architecture and algorithm for energy-efficient CNN inference
Daisuke Miyashita (Kioxia) VLD2019-47 ICD2019-36 IE2019-42 CPSY2019-46 DC2019-71 RECONF2019-42
(To be available after the conference date) [more] VLD2019-47 ICD2019-36 IE2019-42 CPSY2019-46 DC2019-71 RECONF2019-42
p.173(VLD), p.41(ICD), p.41(IE), p.53(CPSY), p.173(DC), p.31(RECONF)
HWS, VLD 2019-03-01
14:55
Okinawa Okinawa Ken Seinen Kaikan Performance and Security Evaluation of Ring Oscillator PUF Implemented on ASIC
Yusuke Nozaki, Masaya Yoshikawa (Meijo Univ.) VLD2018-131 HWS2018-94
This study evaluates the performance and the security of ring oscillator physical unclonable function (RO PUF) implement... [more] VLD2018-131 HWS2018-94
pp.225-230
SIS, ITE-BCT 2018-10-26
11:30
Kyoto Kyoto University Clock Tower Centennial Hall A Hardware Implementation of Craik-O'Brien Effect-Based Contrast Improvement for Dichromats
Tomohiro Ono (Kyutech), Ryosuke Kubota (NITUC), Noriaki Suetake (YU), Hakaru Tamukoh (Kyutech) SIS2018-20
In this paper, we design a digital hardware circuit to realize the contrast improvement algorithm for dichromats. The pr... [more] SIS2018-20
pp.95-100
RECONF 2018-09-18
14:50
Fukuoka LINE Fukuoka Cafe Space Data Flow Representation and its Applications to Machine Learning Accelerator
Kazuki Nakada (Tsukuba Univ. of Tech.), Keiji Miura (Kwansei Gakuin Univ.) RECONF2018-32
Researches and development of machine learning accelerators have been rapidly progressing. It is becoming important to r... [more] RECONF2018-32
pp.73-78
HWS, ISEC, SITE, ICSS, EMM, IPSJ-CSEC, IPSJ-SPT [detail] 2018-07-26
15:25
Hokkaido Sapporo Convention Center A Study on Systematic Insertion of Hardware Trojan Based on Path Delay
Akira Ito, Rei Ueno, Naofumi Homma, Takafumi Aoki (Tohoku Univ.) ISEC2018-44 SITE2018-36 HWS2018-41 ICSS2018-47 EMM2018-43
This paper presents a non-reversible and analytical method for inserting a path delay hardware Trojan (PDHT). The conven... [more] ISEC2018-44 SITE2018-36 HWS2018-41 ICSS2018-47 EMM2018-43
pp.349-356
 Results 1 - 20 of 72  /  [Next]  
Choose a download format for default settings. [NEW !!]
Text format pLaTeX format CSV format BibTeX format
Copyright and reproduction : All rights are reserved and no part of this publication may be reproduced or transmitted in any form or by any means, electronic or mechanical, including photocopy, recording, or any information storage and retrieval system, without permission in writing from the publisher. Notwithstanding, instructors are permitted to photocopy isolated articles for noncommercial classroom use without fee. (License No.: 10GA0019/12GB0052/13GB0056/17GB0034/18GB0034)


[Return to Top Page]

[Return to IEICE Web Page]


The Institute of Electronics, Information and Communication Engineers (IEICE), Japan