IEICE Technical Committee Submission System
Conference Schedule
Online Proceedings
[Sign in]
Tech. Rep. Archives
    [Japanese] / [English] 
( Committee/Place/Topics  ) --Press->
 
( Paper Keywords:  /  Column:Title Auth. Affi. Abst. Keyword ) --Press->

All Technical Committee Conferences  (Searched in: All Years)

Search Results: Conference Papers
 Conference Papers (Available on Advance Programs)  (Sort by: Date Descending)
 Results 1 - 20 of 20  /   
Committee Date Time Place Paper Title / Authors Abstract Paper #
VLD, HWS, ICD 2024-03-02
11:40
Okinawa
(Primary: On-site, Secondary: Online)
eFPGA-based IP Protection of Embedded Processor Design
Tomosuke Ichioka, Tanvir Ahmed, Yuko Hara (Tokyo Tech) VLD2023-139 HWS2023-99 ICD2023-128
As manufacturing costs continue to grow, IC manufacturers are increasingly outsourcing IC manufacturing to third-party f... [more] VLD2023-139 HWS2023-99 ICD2023-128
pp.209-214
SAT, SANE
(Joint)
2024-02-09
13:20
Kagoshima AmaHome PLAZA (Amami City Shimin Koryu Center)
(Primary: On-site, Secondary: Online)
Secure Firmware Updates for Nano-Satellites: Design Considerations and PoC Implementation
Yuta Nakagawa, Keika Mori, Ryoya Furukawa, Hiroshi Kumagai, Masaki Kamizono (DTCY) SANE2023-111
With the increase in the number of satellite launches in recent years, cyber attacks on satellites have become a serious... [more] SANE2023-111
pp.43-48
EMM, BioX, ISEC, SITE, ICSS, HWS, IPSJ-CSEC, IPSJ-SPT [detail] 2023-07-25
09:20
Hokkaido Hokkaido Jichiro Kaikan SAT-based Differential analysis of AEGIS Family
Takuro Shiraya (UOH), Kosei Sakamoto (Mitsubishi Electric), Takanori Isobe (UOH) ISEC2023-45 SITE2023-39 BioX2023-48 HWS2023-45 ICSS2023-42 EMM2023-45
We evaluate the security of the AEGIS family which is authenticated encryption with an associated data scheme to achieve... [more] ISEC2023-45 SITE2023-39 BioX2023-48 HWS2023-45 ICSS2023-42 EMM2023-45
pp.202-207
EMM, BioX, ISEC, SITE, ICSS, HWS, IPSJ-CSEC, IPSJ-SPT [detail] 2023-07-25
09:40
Hokkaido Hokkaido Jichiro Kaikan SAT-based Search of Related-key Impossible Distinguisher for Piccolo, TWINE, LBlock
Shion Utsumi (Univ. of Hyogo), Kosei Sakamoto (MELCO), Takanori Isobe (Univ. of Hyogo) ISEC2023-46 SITE2023-40 BioX2023-49 HWS2023-46 ICSS2023-43 EMM2023-46
In this paper, we evaluate security of Piccolo, TWINE, T-TWINE and LBlcok angainst on impossilbe related-key differentia... [more] ISEC2023-46 SITE2023-40 BioX2023-49 HWS2023-46 ICSS2023-43 EMM2023-46
pp.208-213
EMM, BioX, ISEC, SITE, ICSS, HWS, IPSJ-CSEC, IPSJ-SPT [detail] 2023-07-25
10:20
Hokkaido Hokkaido Jichiro Kaikan On the Maximum Differential Characteristic Probabilities for Multi-Branch Structures
Kazuma Taka (Hyogo Univ.), Kosei Sakamoto (Mitsubishi Electric), Takanori Isobe (Hyogo Univ.) ISEC2023-48 SITE2023-42 BioX2023-51 HWS2023-48 ICSS2023-45 EMM2023-48
The design of multiple-branch-based designs, such as the low-latency pseudo-random function Orthros, holds the potential... [more] ISEC2023-48 SITE2023-42 BioX2023-51 HWS2023-48 ICSS2023-45 EMM2023-48
pp.221-228
ISEC 2023-05-17
15:55
Tokyo Kikai-Shinko-Kaikan Bldg. [Invited Talk] An Efficient Strategy to Construct a Better Differential on Multiple-Branch-Based Designs: Application to Orthros (from CT-RSA 2023)
Kazuma Taka, Kosei Sakamoto (Hyogo Univ.), Tatsuya Ishikawa (WDB KOUGAKU Co.,Ltd.), Takanori Isobe (Hyogo Univ.) ISEC2023-12
As low-latency designs tend to have a small number of rounds to decrease latency, the differential-type cryptanalysis ca... [more] ISEC2023-12
p.65
HWS, VLD 2023-03-03
13:50
Okinawa
(Primary: On-site, Secondary: Online)
A Logic Locking Method based on Function Modification Circuit
Yohei Noguchi, Masayoshi Yoshimura (Kyoto Sangyo Univ.), Rei Miura, Toshinori Hosokawa (Nihon Univ.) VLD2022-107 HWS2022-78
In recent years, with the increase of VLSI integration, semiconductor design companies to design a VLSI have tended to u... [more] VLD2022-107 HWS2022-78
pp.185-190
DC 2022-03-01
13:45
Tokyo Kikai-Shinko-Kaikan Bldg.
(Primary: On-site, Secondary: Online)
A Logic Locking Method based on SFLL-hd at Register Transfer Level
Yohei Noguchi, Masayoshi Yoshimura (Kyoto Sangyo Univ.), Atsuya Tsujikawa, Toshinori Hosokawa (Nihon Univ.) DC2021-72
In recent years, with the increase of VLSI integration, LSI design companies utilize circuit design information, called ... [more] DC2021-72
pp.45-50
DC 2021-12-10
14:00
Kagawa
(Primary: On-site, Secondary: Online)
A SAT and FALL Attacks Resistant Logic Locking Method at Register Transfer Level
Atsuya Tsujikawa, Toshinori Hosokawa (Nihon Univ.), Masayoshi Yoshimura (Kyoto Sangyo Univ.) DC2021-57
In recent years, to meet strict time-to-market constraints, it has become difficult for only one semiconductor design co... [more] DC2021-57
pp.13-18
RCS, SAT
(Joint)
2021-08-27
10:55
Online Online [Encouragement Talk] Study on key-distillation system with adaptive polar codes in free-space quantum key distribution
Yuma Yamashita (NITech), Hiroyuki Endo (NICT), Shingo Fujita, Eiji Okamoto (NITech), Hideki Takenaka, Morio Toyoshima (NICT) SAT2021-35
Quantum key distribution (QKD) is a cryptographic method that has been proven as secure against any physically allowable... [more] SAT2021-35
pp.37-42
CPSY, DC, IPSJ-SLDM, IPSJ-EMB, IPSJ-ARC [detail] 2021-03-26
12:00
Online Online A Logic Locking Method Based on Anti-SAT at Register Transfer Level
Atsuya Tsujikawa, Toshinori Hosokawa (Nihon Univ.), Masayoshi Yoshimura (Kyoto Sangyo Univ.) CPSY2020-64 DC2020-94
In recent years, increasing circuit density, it has become difficult for only one semiconductor design company to design... [more] CPSY2020-64 DC2020-94
pp.85-90
AP, SANE, SAT
(Joint)
2020-07-15
15:05
Online Online Numerical investigation on the application of polar codes to free-space quantum key distribution
Yuma Yamashita (NITech), Hiroyuki Endo (NICT), Shingo Fujita, Eiji Okamoto (NITech), Hideki Takenaka, Morio Toyoshima (NICT) SAT2020-5
Quantum key distribution (QKD) is a technology to securely share keys against any attack physically permitted, with the ... [more] SAT2020-5
pp.13-18
SANE 2019-06-14
11:10
Kanagawa JAXA Sagamihara Campus A Space System for World Peace and Security -- For elimination of the threat of nuclear war --
Osamu Ichiyoshi (HNB21C) SANE2019-14
Nuclear weapons become useless if their transportation means are nullified. I have proposed a system that can immediatel... [more] SANE2019-14
pp.7-12
CS 2018-07-12
10:59
Okinawa Eef Information Plaza (Kumejima Is.) Study on Routing Control Method for DoS Attack
Jun Kiyama, Takuya shindo, Takefumi Hiraguri (NIT) CS2018-24
DoS attack that attack a web service and the internet is a big problem in recent years, because DoS attack takes a resou... [more] CS2018-24
pp.67-70
SANE 2017-05-22
11:00
Tokyo Kikai-Shinko-Kaikan Bldg. Measurement deception and its countermeasure in a navigation satellite system
Takashi Iwamoto (Mitsubishi Electric Corp.) SANE2017-4
Broadened applications of navigation satellite systems as social bases have been revealing vulnerabilities of being inte... [more] SANE2017-4
pp.19-22
IT, ISEC, WBS 2012-03-01
15:45
Kanagawa   New Saturation Characteristics of HyRAL
Naoki Shibayama, Toshinobu Kaneko, Seiichiro Hangai (Tokyo Univ. of Science) IT2011-54 ISEC2011-81 WBS2011-55
HyRAL is the 128-bit block cipher proposed by Hirata in 2010. It has been shown that 13-round with 256-bit secret key is... [more] IT2011-54 ISEC2011-81 WBS2011-55
pp.53-60
ISEC, IPSJ-CSEC, SITE, ICSS, EMM, IPSJ-SPT [detail] 2011-07-13
10:55
Shizuoka Shizuoka University Security Evaluation of HyRAL against Saturation Cryptanalysis(II)
Naoki Shibayama, Yasutaka Igarashi, Toshinobu Kaneko, Seiichiro Hangai (Tokyo Univ. of Science) ISEC2011-19 SITE2011-16 ICSS2011-24 EMM2011-18
In this paper, we focuse on the saturation attack on block cipher HyRAL that was proposed by Hirata in 2010.
It has bee... [more]
ISEC2011-19 SITE2011-16 ICSS2011-24 EMM2011-18
pp.103-109
AP, SAT
(Joint)
2009-07-09
16:10
Hokkaido Otaru city, Hokkaido [Special Talk] J-ALERT -- The warning system which tells an emergency immediately --
Chiharu Ohuchi, Yasuzumi Izumi (Lascom) AP2009-68 SAT2009-11
"The civil protection warning system" (J-ALERT) which notifies large-scale disasters, armed attack information and so on... [more] AP2009-68 SAT2009-11
pp.141-146(AP), pp.23-28(SAT)
WBS, IT, ISEC 2006-03-17
10:45
Aichi Nagoya Univ. Proposal of Image Compensation Which Embeds Data for Compensation in An Image
Takumi Sasaki, Kunikatsu Kobayashi (Yamagata Univ.)
Generally digital watermarking has the problem of being weak in the geometric
attack of rotation, expansion or reducti... [more]
IT2005-100 ISEC2005-157 WBS2005-114
pp.31-36
IE, ITE-BCT, ITE-AIT, ITE-ME 2004-11-25
16:40
Nagasaki   Watermarking Method for Motion Pictures in MPEG Compressed Bitstream
Shigeyuki Sakazawa, Yasuhiro Takishima (KDDI R&D LABS)
A novel video watermarking method is proposed, which can directly embed a watermark into a bitstream encoded by MPEG. It... [more] IE2004-85
pp.33-38
 Results 1 - 20 of 20  /   
Choose a download format for default settings. [NEW !!]
Text format pLaTeX format CSV format BibTeX format
Copyright and reproduction : All rights are reserved and no part of this publication may be reproduced or transmitted in any form or by any means, electronic or mechanical, including photocopy, recording, or any information storage and retrieval system, without permission in writing from the publisher. Notwithstanding, instructors are permitted to photocopy isolated articles for noncommercial classroom use without fee. (License No.: 10GA0019/12GB0052/13GB0056/17GB0034/18GB0034)


[Return to Top Page]

[Return to IEICE Web Page]


The Institute of Electronics, Information and Communication Engineers (IEICE), Japan