IEICE Technical Committee Submission System
Conference Schedule
Online Proceedings
[Sign in]
Tech. Rep. Archives
    [Japanese] / [English] 
( Committee/Place/Topics  ) --Press->
 
( Paper Keywords:  /  Column:Title Auth. Affi. Abst. Keyword ) --Press->

All Technical Committee Conferences  (Searched in: All Years)

Search Results: Conference Papers
 Conference Papers (Available on Advance Programs)  (Sort by: Date Descending)
 Results 1 - 20 of 36  /  [Next]  
Committee Date Time Place Paper Title / Authors Abstract Paper #
ICSS, IPSJ-SPT 2024-03-22
11:45
Okinawa OIST
(Primary: On-site, Secondary: Online)
Fast and Secure Scalar Multiplication for the GLS254 Binary Elliptic Curve
Ryosuke Kido, Atsuko Miyaji (OU)
(To be available after the conference date) [more]
RCC, ISEC, IT, WBS 2024-03-14
09:05
Osaka Osaka Univ. (Suita Campus) Partial Key Exposure Attacks on UOV-like Signatures
Yuki Seto, Hiroki Furue, Atsushi Takayasu (UTokyo)
(To be available after the conference date) [more]
ICM, NS, CQ, NV
(Joint)
2023-11-21
13:15
Ehime Ehime Prefecture Gender Equality Center
(Primary: On-site, Secondary: Online)
[Encouragement Talk] Security Evaluation of Low-latency Cipher based on Improved Simon against Deep Learning Analysis using Profiled Power Consumption
Shu Takemoto, Yusuke Nozaki, Masaya Yoshikawa (Meijo Univ.) NS2023-114
Society 5.0 aims to solve problems in social systems through the intercommunication of small devices. On the other hand,... [more] NS2023-114
pp.20-25
VLD, DC, RECONF, ICD, IPSJ-SLDM [detail] 2023-11-16
13:20
Kumamoto Civic Auditorium Sears Home Yume Hall
(Primary: On-site, Secondary: Online)
Tamper Resistance Evaluation on FPGA for Low-Latency Cipher Sonic
Shu Takemoto, Yusuke Nozaki, Masaya Yoshikawa (Meijo Univ.) VLD2023-49 ICD2023-57 DC2023-56 RECONF2023-52
Industry 5.0 promotes smart factories for system optimization by utilizing IoT and AI in the industrial field. The smart... [more] VLD2023-49 ICD2023-57 DC2023-56 RECONF2023-52
pp.101-105
EMCJ 2023-01-27
13:50
Okayama WASHU BLUE RESORT
(Primary: On-site, Secondary: Online)
Side-Channel Information Leakage in Common-Mode Current from a Printed Circuit Board with Separated Ground Planes
Kohei Shimoda, Masaki Himuro, Kengo Iokibe, Yoshitaka Toyota (Okayama Univ.) EMCJ2022-84
Side-channel attacks, which break encryption by analyzing the physical behavior leaked from cryptographic devices, have ... [more] EMCJ2022-84
pp.66-71
VLD, DC, RECONF, ICD, IPSJ-SLDM [detail] 2022-11-29
14:40
Kumamoto  
(Primary: On-site, Secondary: Online)
Evaluating system level security of cryptography module
Takumi Matsumaru, Kazuki Monta (Kobe Univ.), Takaaki Okidono (SCU), Takuji Miki, Makoto Nagata (Kobe Univ.) VLD2022-32 ICD2022-49 DC2022-48 RECONF2022-55
Packaging technology is a technique used to encapsulate semiconductor chips in a frame, and has been attracting attentio... [more] VLD2022-32 ICD2022-49 DC2022-48 RECONF2022-55
pp.78-81
VLD, DC, RECONF, ICD, IPSJ-SLDM [detail] 2022-11-29
15:05
Kumamoto  
(Primary: On-site, Secondary: Online)
Evaluation of power delivery networks in secure semiconductor systems
Masaru Mashiba, Kazuki Monta (Kobe Univ.), Takaaki Okidono (SCU), Takuzi Miki, Makoto Nagata (Kobe Univ.) VLD2022-33 ICD2022-50 DC2022-49 RECONF2022-56
With the development of the IoT, hardware security is becoming increasingly important. Physical attacks on cryptoprocess... [more] VLD2022-33 ICD2022-50 DC2022-49 RECONF2022-56
pp.82-86
NS, ICM, CQ, NV
(Joint)
2022-11-24
11:10
Fukuoka Humanities and Social Sciences Center, Fukuoka Univ. + Online
(Primary: On-site, Secondary: Online)
Deep Learning Side-Channel Attack in Noise Based Countermeasure Simon
Shu Takemoto, Yoshiya Ikezaki, Yusuke Nozaki, Masaya Yoshikawa (Meijo Univ.) NS2022-103
The IoT requires the implementation of cryptographic techniques to ensure the confidentiality, integrity, and availabili... [more] NS2022-103
pp.19-22
HWS, ICD 2022-10-25
10:25
Shiga
(Primary: On-site, Secondary: Online)
A Study on Profiled Side-channel Analysis against AES-CTR
Katsumi Ebina, Rei Ueno, Naohumi Homma (Tohoku Univ) HWS2022-31 ICD2022-23
This paper describes profiling Side-Channel Analysis for AES counter mode.
AES-CTR is a mode in which an internally sto... [more]
HWS2022-31 ICD2022-23
pp.6-11
SS, IPSJ-SE, KBSE [detail] 2022-07-28
16:30
Hokkaido Hokkaido-Jichiro-Kaikan (Sapporo)
(Primary: On-site, Secondary: Online)
Deep Learning Power Analysis Against Protected PRINCE
Shu Takemoto, Yoshiya Ikezaki, Yusuke Nozaki, Masaya Yoshikawa (Meijo Univ.) SS2022-4 KBSE2022-14
In recent years, with the development of deep learning, AI has been incorporated in the field of cyber security. On the ... [more] SS2022-4 KBSE2022-14
pp.19-24
AI 2022-07-04
10:40
Hokkaido
(Primary: On-site, Secondary: Online)
Deep Learning Side-Channel Attacks for Rolled Architecture of PRINCE and Midori128
Shu Takemoto, Yoshiya Ikezaki, Yusuke Nozaki, Masaya Yoshikawa (Meijo Univ.) AI2022-3
With the recent expansion of small autonomous mobile robots such as drones, cyber security for small devices is very imp... [more] AI2022-3
pp.13-18
HWS, ICD [detail] 2021-10-19
10:00
Online Online Evaluations of tamper resistance by Wave-FF for Power Analysis Attack on AES
Tomoaki Ukezono (Fukuoka Univ.) HWS2021-41 ICD2021-15
Dual-Rail design represented by WDDL can be mentioned as a countermeasure against information leakage from power consump... [more] HWS2021-41 ICD2021-15
pp.1-6
HWS, ICD [detail] 2021-10-19
11:15
Online Online High-Efficiency simulation method for evaluating power noise and side-channel leakage in crypto modules
Kazuki Monta, Takuji Miki, Makoto Nagata (Kobe Univ.) HWS2021-44 ICD2021-18
In semiconductor integrated circuits of cryptographic modules, the side-channel leakage from power supply noise is criti... [more] HWS2021-44 ICD2021-18
pp.19-22
SDM, ICD, ITE-IST [detail] 2021-08-18
15:35
Online Online Evaluation of Side-channel Leakage on High-speed Asynchronous Successive Approximation Register AD Converters
Ryozo Takahashi, Kazuki Monta, Takuji Miki, Makoto Nagata (Kobe Univ.) SDM2021-43 ICD2021-14
This paper presents an evaluation of security level on high-speed asynchronous successive approximation register (SAR) a... [more] SDM2021-43 ICD2021-14
pp.68-71
ISEC 2021-05-19
15:30
Online Online [Invited Talk] Simple Electromagnetic Analysis Against Activation Functions of Deep Neural Networks (from AIHWS 2020)
Go Takatoi, Takeshi Sugawara, Kazuo Sakiyama (UEC), Yuko Hara-Azumi (Tokyo Tech), Yang Li (UEC) ISEC2021-9
This invited abstract is based on the papers [1] and [2]. There are physical attacks such as side-channel attacks that a... [more] ISEC2021-9
p.34
HWS, VLD [detail] 2021-03-04
15:20
Online Online Power Analysis Attack on a Unrolled Midori128 and its Evaluation
Shu Takemoto, Yoshiya Ikezaki, Yusuke Nozaki, Masaya Yoshikawa (Meijo Univ.) VLD2020-87 HWS2020-62
The lightweight block cipher Midori has been proposed as a cryptographic algorithm for low-power operation, which is imp... [more] VLD2020-87 HWS2020-62
pp.108-113
ICD, HWS [detail] 2020-10-26
09:25
Online Online Power Analysis Attack Using Pipeline Scheduling on Pairing Hardware
Mitsufumi Yamazaki, Junichi Sakamoto, Tsutomu Matsumoto (YNU) HWS2020-26 ICD2020-15
To reduce the latency of pairing calculation for advanced cryptography, hardware implementations with pipelined modular ... [more] HWS2020-26 ICD2020-15
pp.7-12
SITE, ISEC, HWS, EMM, BioX, IPSJ-CSEC, IPSJ-SPT, ICSS [detail] 2020-07-21
16:35
Online Online Secure and Compact Elliptic Curve LR Scalar Multiplication
Yaoan Jin, Atsuko Miyaji (Osaka Univ) ISEC2020-31 SITE2020-28 BioX2020-34 HWS2020-24 ICSS2020-18 EMM2020-28
Elliptic curve cryptography (ECC) can ensure an equivalent security with much smaller key sizes. Elliptic curve scalar m... [more] ISEC2020-31 SITE2020-28 BioX2020-34 HWS2020-24 ICSS2020-18 EMM2020-28
pp.111-118
HWS, ICD [detail] 2019-11-01
15:20
Osaka DNP Namba SS Bld. Fundamental study on an estimation method of output bits from TERO-based TRNG during frequency injection attack
Saki Osuka, Daisuke Fujimoto, Yuichi Hayashi (NAIST) HWS2019-62 ICD2019-23
True random number generators (TRNGs) based on ring oscillators (ROs) are employed in many devices because they can be c... [more] HWS2019-62 ICD2019-23
pp.29-34
ISEC, SITE, ICSS, EMM, HWS, BioX, IPSJ-CSEC, IPSJ-SPT [detail] 2019-07-23
14:25
Kochi Kochi University of Technology Side Channel Security of an FPGA Pairing Implementation with Pipelined Modular Multiplier
Mitsufumi Yamazaki, Junichi Sakamoto, Yuta Okuaki, Tsutomu Matsumoto (YNU) ISEC2019-29 SITE2019-23 BioX2019-21 HWS2019-24 ICSS2019-27 EMM2019-32
Since bilinear pairing is useful in realizing advanced cryptography, side channel security evaluation of its high-speed ... [more] ISEC2019-29 SITE2019-23 BioX2019-21 HWS2019-24 ICSS2019-27 EMM2019-32
pp.151-156
 Results 1 - 20 of 36  /  [Next]  
Choose a download format for default settings. [NEW !!]
Text format pLaTeX format CSV format BibTeX format
Copyright and reproduction : All rights are reserved and no part of this publication may be reproduced or transmitted in any form or by any means, electronic or mechanical, including photocopy, recording, or any information storage and retrieval system, without permission in writing from the publisher. Notwithstanding, instructors are permitted to photocopy isolated articles for noncommercial classroom use without fee. (License No.: 10GA0019/12GB0052/13GB0056/17GB0034/18GB0034)


[Return to Top Page]

[Return to IEICE Web Page]


The Institute of Electronics, Information and Communication Engineers (IEICE), Japan