IEICE Technical Committee Submission System
Conference Schedule
Online Proceedings
[Sign in]
Tech. Rep. Archives
    [Japanese] / [English] 
( Committee/Place/Topics  ) --Press->
 
( Paper Keywords:  /  Column:Title Auth. Affi. Abst. Keyword ) --Press->

All Technical Committee Conferences  (All Years)

Search Results: Conference Papers
 Conference Papers (Available on Advance Programs)  (Sort by: Date Descending)
 Results 1 - 20 of 85  /  [Next]  
Committee Date Time Place Paper Title / Authors Abstract Paper #
HWS, ICD 2022-10-25
10:00
Shiga   Hardware Evaluation of Romulus with Threshold Implementation and Its Simulation-Based Leakage Assessment
Masaya Nemoto, Tamon Asano, Takeshi Sugawara (UEC)
(To be available after the conference date) [more]
SS, IPSJ-SE, KBSE [detail] 2022-07-28
16:30
Hokkaido Hokkaido-Jichiro-Kaikan (Sapporo)
(Primary: On-site, Secondary: Online)
Deep Learning Power Analysis Against Protected PRINCE
Shu Takemoto, Yoshiya Ikezaki, Yusuke Nozaki, Masaya Yoshikawa (Meijo Univ.) SS2022-4 KBSE2022-14
In recent years, with the development of deep learning, AI has been incorporated in the field of cyber security. On the ... [more] SS2022-4 KBSE2022-14
pp.19-24
EMM, BioX, ISEC, SITE, ICSS, HWS, IPSJ-CSEC, IPSJ-SPT [detail] 2022-07-19
13:00
Online Online Side-Channel Attacks on Post-Quantum KEMs Using Multi-class Classification Neural Network
Yutaro Tanaka, Rei Ueno (Tohoku Univ.), Keita Xagawa, Akitra Ito, Junko Takahashi (NTT), Naofumi Homma (Tohoku Univ.) ISEC2022-7 SITE2022-11 BioX2022-32 HWS2022-7 ICSS2022-15 EMM2022-15
(To be available after the conference date) [more] ISEC2022-7 SITE2022-11 BioX2022-32 HWS2022-7 ICSS2022-15 EMM2022-15
pp.1-6
EMM, BioX, ISEC, SITE, ICSS, HWS, IPSJ-CSEC, IPSJ-SPT [detail] 2022-07-19
14:15
Online Online A Study for Predicting Correlation Power Analysis Results by Using High-SNR Plaintexts Selected Based on Linear Leakage Model
Masaki Himuro, Kengo Iokibe, Yoshitaka Toyota (Okayama Univ.) ISEC2022-10 SITE2022-14 BioX2022-35 HWS2022-10 ICSS2022-18 EMM2022-18
To reduce the number of traces for evaluating side-channel attack (SCA) resistance, some methods for performing correlat... [more] ISEC2022-10 SITE2022-14 BioX2022-35 HWS2022-10 ICSS2022-18 EMM2022-18
pp.18-22
AI 2022-07-04
10:40
Hokkaido
(Primary: On-site, Secondary: Online)
Deep Learning Side-Channel Attacks for Rolled Architecture of PRINCE and Midori128
Shu Takemoto, Yoshiya Ikezaki, Yusuke Nozaki, Masaya Yoshikawa (Meijo Univ.) AI2022-3
With the recent expansion of small autonomous mobile robots such as drones, cyber security for small devices is very imp... [more] AI2022-3
pp.13-18
HWS 2022-04-26
11:20
Tokyo AIST Tokyo Waterfront (Annex)
(Primary: On-site, Secondary: Online)
Deep Learning-based Side-Channel Attacks against Software-Implemented RSA using Binary Exponentiation with Dummy Multiplication
Seiya Shimada, Kunihiro Kuroda, Yuta Fukuda, Kouta Yoshida, Takeshi Fujino (Ritsumeikan Univ.) HWS2022-3
Recently, deep learning-based side-channel attacks (DL-SCA) against symmetric key cryptography such as AES have been rep... [more] HWS2022-3
pp.13-18
VLD, HWS [detail] 2022-03-08
14:55
Online Online Evaluation of Side-channel Leaks Specific to Unrolled AES Hardware
Ayano Nakashima, Rei Ueno, Naofumi Homma (Tohoku Univ.) VLD2021-100 HWS2021-77
This paper presents the evaluation of a unique side-channel leakage occurred from the middle rounds
of (pipelined) unro... [more]
VLD2021-100 HWS2021-77
pp.135-140
ICSS, IPSJ-SPT 2022-03-08
10:00
Online Online Input predictive attack by keyboard acoustic emanations using BERT and its countermeasures
Masahiro Iida (Teikyo Univ.), Mitsuaki Akiyama (NTT), Masaki Kamizono (DTCY), Takahiro Kasama (NICT), Yuichi Hattori (Secure Cycle Inc.), Hiroyuki Inoue (Kyoto Sangyo Univ.), Atsuo Inomata (Osaka Univ.) ICSS2021-67
The Keyboard Acoustic Emanations has been proposed to estimate the input key from keystroke sounds as a kind of side-cha... [more] ICSS2021-67
pp.49-54
HWS, ICD [detail] 2021-10-19
10:00
Online Online Evaluations of tamper resistance by Wave-FF for Power Analysis Attack on AES
Tomoaki Ukezono (Fukuoka Univ.) HWS2021-41 ICD2021-15
Dual-Rail design represented by WDDL can be mentioned as a countermeasure against information leakage from power consump... [more] HWS2021-41 ICD2021-15
pp.1-6
HWS, ICD [detail] 2021-10-19
10:25
Online Online A Deep-Learning Based Single-Trace Side-Channel Attack on Tamper-Resistant CRT-RSA Software
Kotaro Saito, Akira Ito, Rei Ueno, Naofumi Homma (Tohoku Univ.) HWS2021-42 ICD2021-16
This paper proposes a deep-learning based single-trace side-channel attack on CRT-RSA software implementation secure aga... [more] HWS2021-42 ICD2021-16
pp.7-12
SDM, ICD, ITE-IST [detail] 2021-08-18
15:35
Online Online Evaluation of Side-channel Leakage on High-speed Asynchronous Successive Approximation Register AD Converters
Ryozo Takahashi, Kazuki Monta, Takuji Miki, Makoto Nagata (Kobe Univ.) SDM2021-43 ICD2021-14
This paper presents an evaluation of security level on high-speed asynchronous successive approximation register (SAR) a... [more] SDM2021-43 ICD2021-14
pp.68-71
BioX, ISEC, SITE, ICSS, EMM, HWS, IPSJ-CSEC, IPSJ-SPT [detail] 2021-07-20
14:50
Online Online Deep Learning Side-Channel Attacks against Unprotected AES and RSM-AES Implemented in ASIC
Yuta Fukuda, Kota Yoshida, Hisashi Hashimoto, Takeshi Fujino (Ritsumeikan Univ.) ISEC2021-24 SITE2021-18 BioX2021-25 HWS2021-24 ICSS2021-29 EMM2021-29
The cryptographic key can be revealed by exploiting side-channel information such as power traces under operation.
Rec... [more]
ISEC2021-24 SITE2021-18 BioX2021-25 HWS2021-24 ICSS2021-29 EMM2021-29
pp.86-91
ISEC 2021-05-19
15:30
Online Online [Invited Talk] Simple Electromagnetic Analysis Against Activation Functions of Deep Neural Networks (from AIHWS 2020)
Go Takatoi, Takeshi Sugawara, Kazuo Sakiyama (UEC), Yuko Hara-Azumi (Tokyo Tech), Yang Li (UEC) ISEC2021-9
This invited abstract is based on the papers [1] and [2]. There are physical attacks such as side-channel attacks that a... [more] ISEC2021-9
p.34
EMCJ 2021-04-16
15:00
Online Online Time-Frequency Domain Correlation Power Analysis for Side-Channel Attack Resistance Evaluation of Practical Modules
Masaki Himuro, Kengo Iokibe, Yoshitaka Toyota (Okayama Univ.) EMCJ2021-5
When evaluating the Side-Channel Attack resistance of a practical module, the correlation coefficient, a measure of side... [more] EMCJ2021-5
pp.21-26
HWS 2021-04-12
14:40
Tokyo Tokyo University/Online
(Primary: On-site, Secondary: Online)
On the Performance Evaluation of Deep-Learning Based Side-Channel Attacks
Akira Ito, Rei Ueno, Naofumi Homma (Tohoku Univ.) HWS2021-8
This paper presents a method for estimating the lower bound of success rate (SR) and the upper bound of guessing entropy... [more] HWS2021-8
pp.33-38
HWS, VLD [detail] 2021-03-04
14:55
Online Online FPGA Implementation of Lightweight Cipher Chaskey through High-Level Synthesis and its Evaluation of Side-Channel Attack Resistance
Saya Inagaki, Mingyu Yang (Tokyo Tech), Yang Li, Kazuo Sakiyama (UEC), Yuko Hara (Tokyo Tech) VLD2020-86 HWS2020-61
(To be available after the conference date) [more] VLD2020-86 HWS2020-61
pp.102-107
HWS, VLD [detail] 2021-03-04
15:20
Online Online Power Analysis Attack on a Unrolled Midori128 and its Evaluation
Shu Takemoto, Yoshiya Ikezaki, Yusuke Nozaki, Masaya Yoshikawa (Meijo Univ.) VLD2020-87 HWS2020-62
The lightweight block cipher Midori has been proposed as a cryptographic algorithm for low-power operation, which is imp... [more] VLD2020-87 HWS2020-62
pp.108-113
ICD, HWS [detail] 2020-10-26
09:00
Online Online Examination of requirements for power side-channel attack resistance evaluation boards of cryptographic integrated circuits -- PDN transfer impedance contributing to leakage strength --
Tomonobu Kan, Kengo Iokibe, Yoshitaka Toyota (Okayama Univ.) HWS2020-25 ICD2020-14
When evaluating the resistance of a cryptographic circuit to power analysis attacks by measurement, it is not easy to ev... [more] HWS2020-25 ICD2020-14
pp.1-6
ICD, HWS [detail] 2020-10-26
09:25
Online Online Power Analysis Attack Using Pipeline Scheduling on Pairing Hardware
Mitsufumi Yamazaki, Junichi Sakamoto, Tsutomu Matsumoto (YNU) HWS2020-26 ICD2020-15
To reduce the latency of pairing calculation for advanced cryptography, hardware implementations with pipelined modular ... [more] HWS2020-26 ICD2020-15
pp.7-12
ICD, HWS [detail] 2020-10-26
11:20
Online Online Feasibility of lattice attacks on ECDSA
Kotaro Abe, Makoto Ikeda (Tokyo Univ.) HWS2020-30 ICD2020-19
ECDSA secret key is recovered via lattice attacks when only a few bits of nonce$(k)$ are leaked. In this paper, we evalu... [more] HWS2020-30 ICD2020-19
pp.30-35
 Results 1 - 20 of 85  /  [Next]  
Choose a download format for default settings. [NEW !!]
Text format pLaTeX format CSV format BibTeX format
Copyright and reproduction : All rights are reserved and no part of this publication may be reproduced or transmitted in any form or by any means, electronic or mechanical, including photocopy, recording, or any information storage and retrieval system, without permission in writing from the publisher. Notwithstanding, instructors are permitted to photocopy isolated articles for noncommercial classroom use without fee. (License No.: 10GA0019/12GB0052/13GB0056/17GB0034/18GB0034)


[Return to Top Page]

[Return to IEICE Web Page]


The Institute of Electronics, Information and Communication Engineers (IEICE), Japan