Mon, Jun 12 PM 15:00 - 16:15 |
(1) |
15:00-15:25 |
Malware Attacks and Countermeasures in IoT Systems
-- From the perspective of processor architecture -- |
Takatsugu Ono, Koyo Miyamura, Koji Inoue (Kyushu Univ.) |
(2) |
15:25-15:50 |
A Study of Development Environment Using Zynq for Pairing-based Cryptography |
Takanori Miyoshi, Tsutomu Matsumoto (YNU) |
(3) |
15:50-16:15 |
Scheduling for Extension Fields on the BN curve of a 254-bit prime field |
Tadayuki Ichihashi, Makoto Ikeda (Tokyo Univ.) |
Mon, Jun 12 PM 16:25 - 18:05 |
(4) |
16:25-16:50 |
Trends Toward Lightweight Cryptography Algorithms for IoT Networks |
Awny El-Mohandes (E-JUST) |
(5) |
16:50-17:15 |
Ultra-Light-Weight Implementation of PRINCE Cryptographic Processor |
Kohei Matsuda, Noriyuki Miura, Makoto Nagata (Kobe Univ.), Shivam Bashin (Nanyang Tech. Univ.), Ville Yli-Mayry, Naofumi Homma (Tohoku Univ.), Yves Mathieu, Tarik Graba, Jean-Luc Danger (Telecom ParisTech) |
(6) |
17:15-17:40 |
Hardware Trojan Insertion into Asynchronous On-chip Network Router |
Koutaro Inaba, Masashi Imai (Hirosaki Univ.) |
(7) |
17:40-18:05 |
A study on triggering hardware trojans in IC using intentional EM injection |
Daisuke Fujimoto, Yu-ichi Hayashi (NAIST), Tsutomu Matsumoto (YNU) |
Tue, Jun 13 AM 09:00 - 10:40 |
(8) |
09:00-09:25 |
Self-Profiling Side Channel Attack Utilizing Templates for All Sub-Key Candidates |
Kenya Okutomi, Junichi Sakamoto, Tsutomu Matsumoto (YNU) |
(9) |
09:25-09:50 |
A Study of Chosen Plaintexts Having Equivalent Probability Distribution to Population in Hamming Distance for Cost Reduction of Security Evaluation against Side-Channel Attacks |
Toshiaki Teshima, Yusuke Yano, Kengo Iokibe, Yoshitaka Toyota (Okayama Univ.) |
(10) |
09:50-10:15 |
Fault Analysis Attack on AES without Faulty Ciphertexts |
Natsu Shoji, Ryuga Matsumura, Takeshi Sugawara, Kazuo Sakiyama (UEC) |
(11) |
10:15-10:40 |
Side-Channel Authentication Using Diode Laser |
Ryuga Matsumura, Natsu Shoji, Takeshi Sugawara, Kazuo Sakiyama (UEC) |
Tue, Jun 13 AM 10:50 - 12:30 |
(12) |
10:50-11:15 |
Automotive Attacks on Time-Trigger In-Vehicle Network |
Junko Takahashi (NTT) |
(13) |
11:15-11:40 |
Portable Security Testbed for Road Vehicles |
Tsuyoshi Toyama, Hisashi Oguma (TOYOTA-ITC), Tsutomu Matsumoto (YNU) |
(14) |
11:40-12:05 |
A Preliminary Experiment on Row Hammer |
Erina Tatsumi, Takeshi Sugawara, Kazuo Sakiyama (UEC) |
(15) |
12:05-12:30 |
Introduction of Japan Cryptographic Module Validation Program(JCMVP) |
Gen'ya Sakurai (IPA) |