Committee |
Date Time |
Place |
Paper Title / Authors |
Abstract |
Paper # |
RCS, SAT (Joint) |
2023-09-01 13:40 |
Nagano |
Naganoken Nokyo Building, and online (Primary: On-site, Secondary: Online) |
SB-SPS Resource Management Scheme to reduce transmission delay for Relay Transmissions in Platooning with Sidelink Communications Kohei Murata, Kosuke Sanada, Hiroyuki Hatano, Kazuo Mori (Mie Univ) RCS2023-125 |
In C-V2X (Cellular-Vehicle to Everything), one of the key technologies for intelligent transportation systems (ITS),side... [more] |
RCS2023-125 pp.119-124 |
EMM, BioX, ISEC, SITE, ICSS, HWS, IPSJ-CSEC, IPSJ-SPT [detail] |
2023-07-25 09:00 |
Hokkaido |
Hokkaido Jichiro Kaikan |
Side-Channel Attacks on Unrolled Implementation of Trivium Soichiro Kobayashi, Rei Ueno (Tohoku Univ.), Yosuke Todo (NTT), Naofumi Homma (Tohoku Univ.) ISEC2023-44 SITE2023-38 BioX2023-47 HWS2023-44 ICSS2023-41 EMM2023-44 |
This paper describes a side-channel attack (SCA) on unrolled implementation of Trivium. Previous SCAs on Trivium, such a... [more] |
ISEC2023-44 SITE2023-38 BioX2023-47 HWS2023-44 ICSS2023-41 EMM2023-44 pp.194-201 |
RCS |
2023-06-16 14:30 |
Hokkaido |
Hokkaido University, and online (Primary: On-site, Secondary: Online) |
SB-SPS Resource Management Scheme to Mitigate Half Duplex Problem in Platoon Relay Transmission using Sidelink Communication Akito Ohshima, Kosuke Sanada, Hiroyuki Hatano, Kazuo Mori (Mie Univ.) RCS2023-75 |
Vehicle to Vehicle (V2V) communication using C-V2X (Cellular Vehicle to Everything) has attracted attention recently, wh... [more] |
RCS2023-75 pp.276-281 |
EMCJ |
2023-06-09 15:05 |
Hokkaido |
Otaru Chamber of Commerce & Industry (Primary: On-site, Secondary: Online) |
Fundamental Investigation of Electromagnetic Analysis Attack Detection Based on Frequency Difference between Ring Oscillators Taichi Sato, Daisuke Fujimoto, Yuichi Hayashi (NAIST) EMCJ2023-25 |
An attack that measures the power consumption of an encryption circuit using an EM probe and acquires secret information... [more] |
EMCJ2023-25 pp.66-69 |
HWS |
2023-04-14 13:45 |
Oita |
(Primary: On-site, Secondary: Online) |
Fundamental Study on the effect of the Number of RNS Bases on the Side-channel Information Leakage from Modular Multiplier Daisuke Fujimoto, Rikuo Haga, Yuichi Hayashi (NAIST) HWS2023-2 |
In public-key cryptography, the Residue Number System (RNS) has been proposed as a hardware implementation approach that... [more] |
HWS2023-2 pp.6-8 |
RCC, ISEC, IT, WBS |
2023-03-14 09:25 |
Yamaguchi |
(Primary: On-site, Secondary: Online) |
Security Anslysis of binary elliptic curve GLS254 Yue Gao (Osaka Univ.), ShuFan Wu (Taiwan Univ.), Atsuko Miyaji (Osaka Univ.) IT2022-73 ISEC2022-52 WBS2022-70 RCC2022-70 |
In now days, light weight system like Iot(Internet of Things) and FPGA have attracted many researchers and have applied... [more] |
IT2022-73 ISEC2022-52 WBS2022-70 RCC2022-70 pp.33-40 |
RCS, SR, SRW (Joint) |
2023-03-02 11:40 |
Tokyo |
Tokyo Institute of Technology, and Online (Primary: On-site, Secondary: Online) |
Building an SDVN Framework for RSU-Centric Cooperative Perception with Heterogeneous V2X Zongdian Li, Tao Yu, Taisei Suzuki, Kei Sakaguchi (Tokyo Tech) RCS2022-275 |
In Cooperative Intelligent Transportation System (C-ITS), cooperative perception emerges as a core application empowered... [more] |
RCS2022-275 pp.161-166 |
HWS, VLD |
2023-03-04 14:20 |
Okinawa |
(Primary: On-site, Secondary: Online) |
Side-channel Information Leakage Resistance Evaluation of Cryptographic Multi- chip Modules Takumi Matsumaru, Kazuki Monta (Kobe Univ.), Takaaki Okidono (SCU), Takuzi Miki, Makoto Nagata (Kobe Univ.) VLD2022-122 HWS2022-93 |
Demand for multi-chip packaging technology is rising. This study focuses on two types of packaging technologies in parti... [more] |
VLD2022-122 HWS2022-93 pp.273-278 |
EMCJ |
2023-01-27 13:50 |
Okayama |
WASHU BLUE RESORT (Primary: On-site, Secondary: Online) |
Side-Channel Information Leakage in Common-Mode Current from a Printed Circuit Board with Separated Ground Planes Kohei Shimoda, Masaki Himuro, Kengo Iokibe, Yoshitaka Toyota (Okayama Univ.) EMCJ2022-84 |
Side-channel attacks, which break encryption by analyzing the physical behavior leaked from cryptographic devices, have ... [more] |
EMCJ2022-84 pp.66-71 |
VLD, DC, RECONF, ICD, IPSJ-SLDM [detail] |
2022-11-29 15:05 |
Kumamoto |
(Primary: On-site, Secondary: Online) |
Evaluation of power delivery networks in secure semiconductor systems Masaru Mashiba, Kazuki Monta (Kobe Univ.), Takaaki Okidono (SCU), Takuzi Miki, Makoto Nagata (Kobe Univ.) VLD2022-33 ICD2022-50 DC2022-49 RECONF2022-56 |
With the development of the IoT, hardware security is becoming increasingly important. Physical attacks on cryptoprocess... [more] |
VLD2022-33 ICD2022-50 DC2022-49 RECONF2022-56 pp.82-86 |
NS, ICM, CQ, NV (Joint) |
2022-11-24 11:10 |
Fukuoka |
Humanities and Social Sciences Center, Fukuoka Univ. + Online (Primary: On-site, Secondary: Online) |
Deep Learning Side-Channel Attack in Noise Based Countermeasure Simon Shu Takemoto, Yoshiya Ikezaki, Yusuke Nozaki, Masaya Yoshikawa (Meijo Univ.) NS2022-103 |
The IoT requires the implementation of cryptographic techniques to ensure the confidentiality, integrity, and availabili... [more] |
NS2022-103 pp.19-22 |
RISING (3rd) |
2022-10-31 14:00 |
Kyoto |
Kyoto Terrsa (Day 1), and Online (Day 2, 3) |
[Poster Presentation]
Object Detection via Pseudo-Analog Communications in Automated Mobility with Infrastructure Cooperation Junichiro Yamada (UEC) |
A concept of automated mobility with infrastructure cooperation can enhance the safety level because vehicles obtain inf... [more] |
|
HWS, ICD |
2022-10-25 10:50 |
Shiga |
(Primary: On-site, Secondary: Online) |
Power current simulation and side channel leakage evaluation of cryptographic IC chips Rikuu Hasegawa, Takuya Wadatsumi, Kazuki Monta, Takuji Miki, Makoto Nagata (Kobe Univ.) HWS2022-32 ICD2022-24 |
Cryptographic modules are threatened by side-channel attacks that use side-channel information to decrypt internal confi... [more] |
HWS2022-32 ICD2022-24 pp.12-16 |
SS, IPSJ-SE, KBSE [detail] |
2022-07-28 16:30 |
Hokkaido |
Hokkaido-Jichiro-Kaikan (Sapporo) (Primary: On-site, Secondary: Online) |
Deep Learning Power Analysis Against Protected PRINCE Shu Takemoto, Yoshiya Ikezaki, Yusuke Nozaki, Masaya Yoshikawa (Meijo Univ.) SS2022-4 KBSE2022-14 |
In recent years, with the development of deep learning, AI has been incorporated in the field of cyber security. On the ... [more] |
SS2022-4 KBSE2022-14 pp.19-24 |
EMM, BioX, ISEC, SITE, ICSS, HWS, IPSJ-CSEC, IPSJ-SPT [detail] |
2022-07-19 13:25 |
Online |
Online |
Revisit of Non Profiled Side Channel Analysis via Deep Learning Kentaro Imafuku, Shinichi Kawamura, Hanae Nozaki, Junichi Sakamoto, Saki Osuka (AIST) ISEC2022-8 SITE2022-12 BioX2022-33 HWS2022-8 ICSS2022-16 EMM2022-16 |
After a brief review of non-profile side channel analysis using deep learning, we propose some improved versions of the ... [more] |
ISEC2022-8 SITE2022-12 BioX2022-33 HWS2022-8 ICSS2022-16 EMM2022-16 pp.7-12 |
SC |
2022-05-27 10:55 |
Online |
Online |
Improving data security by mapping data and storage relations for data management in large environment Avais Ahmad, Shinichi Hayashi, Satoshi Kaneko, Takashi Tameshige (Hitachi) SC2022-4 |
Large-scale organizations are required to manage multitude data assets and identify data flow and lo cation. Relationshi... [more] |
SC2022-4 pp.19-24 |
ICSS, IPSJ-SPT |
2022-03-08 10:00 |
Online |
Online |
Input predictive attack by keyboard acoustic emanations using BERT and its countermeasures Masahiro Iida (Teikyo Univ.), Mitsuaki Akiyama (NTT), Masaki Kamizono (DTCY), Takahiro Kasama (NICT), Yuichi Hattori (Secure Cycle Inc.), Hiroyuki Inoue (Kyoto Sangyo Univ.), Atsuo Inomata (Osaka Univ.) ICSS2021-67 |
The Keyboard Acoustic Emanations has been proposed to estimate the input key from keystroke sounds as a kind of side-cha... [more] |
ICSS2021-67 pp.49-54 |
SR |
2022-01-25 13:40 |
Online |
Online |
[Short Paper]
Roadside Video Broadcasting with Softcast Junichiro Yamada, Katsuya Suto (UEC) SR2021-78 |
In the current autonomous driving, the surrounding situation is always grasped by using the cameras and sensors mounted ... [more] |
SR2021-78 pp.96-98 |
SITE, ISEC, LOIS |
2021-11-12 14:50 |
Online |
Online |
A Study of Deep Learning based Side-Channel Analysis on Lightweight Cryptography GIMLI-AEAD Keigo Ito, Akira Ito, Rei Ueno (Tohoku Univ.), Kazuhide Fukushima, Shinsaku Kiyomoto (KDDI Research Inc.), Naofumi Homma (Tohoku Univ.) ISEC2021-45 SITE2021-39 LOIS2021-28 |
In this paper, we describe a side-channel analysis for the lightweight cipher Gimli-AEAD.
In particular, we apply a De... [more] |
ISEC2021-45 SITE2021-39 LOIS2021-28 pp.20-25 |
HWS, ICD [detail] |
2021-10-19 10:00 |
Online |
Online |
Evaluations of tamper resistance by Wave-FF for Power Analysis Attack on AES Tomoaki Ukezono (Fukuoka Univ.) HWS2021-41 ICD2021-15 |
Dual-Rail design represented by WDDL can be mentioned as a countermeasure against information leakage from power consump... [more] |
HWS2021-41 ICD2021-15 pp.1-6 |