Committee |
Date Time |
Place |
Paper Title / Authors |
Abstract |
Paper # |
HWS |
2024-04-19 15:25 |
Tokyo |
(Primary: On-site, Secondary: Online) |
Applying Ring Oscillator-based Laser Detection Sensor to AES Circuitry on FPGA Shungo Hayashi, Junichi Sakamoto, Tsutomu Matsumoto (AIST/YNU) HWS2024-3 |
[more] |
HWS2024-3 pp.8-13 |
HWS |
2024-04-19 16:25 |
Tokyo |
(Primary: On-site, Secondary: Online) |
Non-Destructive Hardware Trojan Inspection by Backside Near Infrared Imaging Junichi Sakamoto, Yohei Hori, Shinichi Kawamura (AIST), Yuichi Hayashi (NAIST), Makoto Nagata (KU) HWS2024-5 |
Hardware Trojan detection is a critical topic for maintaining the security of IC supply chain. Previous studies have rep... [more] |
HWS2024-5 pp.18-23 |
VLD, HWS, ICD |
2024-03-01 11:40 |
Okinawa |
(Primary: On-site, Secondary: Online) |
Improved Ring Oscillator Sensor for Laser Fault Injection Detection on FPGA Masaki Chikano (YNU), Shungo Hayashi, Junichi Sakamoto (YNU/AIST), Tsutomu Matsumoto (YNU) VLD2023-125 HWS2023-85 ICD2023-114 |
A fault attack is an attack that intentionally injects a fault into an operating device in order to leak internal confid... [more] |
VLD2023-125 HWS2023-85 ICD2023-114 pp.135-140 |
ICD, HWS |
2023-10-31 14:20 |
Mie |
(Primary: On-site, Secondary: Online) |
Evaluation of Time-to-Digital Converter in Laser Fault Injection Detection on FPGA Shungo Hayashi, Junichi Sakamoto (YNU/AIST), Masaki Chikano, Tsutomu Matsumoto (YNU) HWS2023-56 ICD2023-35 |
Fault injection attacks are attacks that intentionally introduce faults into a running device in order to expose interna... [more] |
HWS2023-56 ICD2023-35 pp.10-15 |
EMM, BioX, ISEC, SITE, ICSS, HWS, IPSJ-CSEC, IPSJ-SPT [detail] |
2023-07-25 11:20 |
Hokkaido |
Hokkaido Jichiro Kaikan |
Secure Cryptographic Unit with built-in Signature Generation Hardware for Aggregate Signature Schemes and its FPGA Implementation Toshihiro Sato, Shohei Kawasaki (SCU), Kaoru Masada (Tokyo Univ.), Riku Anzai, Junichi Sakamoto, Naoki Yoshida (YNU), Yasuyoshi Uemura (SCU), Makoto Ikeda (Tokyo Univ.), Tsutomu Matsumoto (YNU) ISEC2023-42 SITE2023-36 BioX2023-45 HWS2023-42 ICSS2023-39 EMM2023-42 |
Secure Cryptographic Unit (SCU) consists of a hardware cryptographic engine and an access control mechanism for the engi... [more] |
ISEC2023-42 SITE2023-36 BioX2023-45 HWS2023-42 ICSS2023-39 EMM2023-42 pp.182-187 |
HWS, VLD |
2023-03-04 10:00 |
Okinawa |
(Primary: On-site, Secondary: Online) |
Importance of Inverters Placement in Ring-Oscilator for Laser Irradiation Detection Shungo Hayashi (YNU), Junichi Sakamoto (AIST/YNU), Masaki Chikano, Tsutomu Matsumoto (YNU) VLD2022-115 HWS2022-86 |
Laser fault injection is known as the most efficient fault injection technique due to its high spatial controllability a... [more] |
VLD2022-115 HWS2022-86 pp.233-238 |
HWS, VLD |
2023-03-04 11:55 |
Okinawa |
(Primary: On-site, Secondary: Online) |
Cloud Based Evaluation of Communication Bandwidth and Tracking Time of Traceable Aggregate Signature Protocols Koudai Aoyama, Riku Anzai, Junichi Sakamoto, Naoki Yoshida, Tsutomu Matsumoto (Yokohama National Univ.) VLD2022-119 HWS2022-90 |
Traceable Aggregate Signature is a scheme that has the ability to identify the source of an illegal signature if it is i... [more] |
VLD2022-119 HWS2022-90 pp.257-260 |
HWS, ICD |
2022-10-25 11:50 |
Shiga |
(Primary: On-site, Secondary: Online) |
Optical Microscopic Observation of Semiconductor Devices toward Hardware Trojan Detection Hirofumi Sakane, Junichi Sakamoto, Shinichi Kawamura (AIST), Makoto Nagata (Kobe Univ.), Yuichi Hayashi (NAIST) HWS2022-34 ICD2022-26 |
In this paper we focus on detection of hardware Trojan (HT) in semiconductor devices under a scenario with following ste... [more] |
HWS2022-34 ICD2022-26 pp.23-28 |
HWS, ICD |
2022-10-25 15:15 |
Shiga |
(Primary: On-site, Secondary: Online) |
A Memory-Saving Software Implementation of Pairing Computation on the GMT8-544 Curve Hiroto Miyata, Junichi Sakamoto, Naoki Yoshida, Riku Anzai, Tsutomu Matsumoto (YNU) HWS2022-39 ICD2022-31 |
There has been a lot of research on increasing the security of IoT, and encryption is one of the methods. Pairing crypto... [more] |
HWS2022-39 ICD2022-31 pp.52-57 |
EMM, BioX, ISEC, SITE, ICSS, HWS, IPSJ-CSEC, IPSJ-SPT [detail] |
2022-07-19 13:25 |
Online |
Online |
Revisit of Non Profiled Side Channel Analysis via Deep Learning Kentaro Imafuku, Shinichi Kawamura, Hanae Nozaki, Junichi Sakamoto, Saki Osuka (AIST) ISEC2022-8 SITE2022-12 BioX2022-33 HWS2022-8 ICSS2022-16 EMM2022-16 |
After a brief review of non-profile side channel analysis using deep learning, we propose some improved versions of the ... [more] |
ISEC2022-8 SITE2022-12 BioX2022-33 HWS2022-8 ICSS2022-16 EMM2022-16 pp.7-12 |
EMM, BioX, ISEC, SITE, ICSS, HWS, IPSJ-CSEC, IPSJ-SPT [detail] |
2022-07-19 15:40 |
Online |
Online |
Security of Systems that Automatically Authenticate a User's Credentials and Location using Wireless Technology Kazuki Tachibana, Junichi Sakamoto, Tsutomu Matsumoto (YNU) ISEC2022-13 SITE2022-17 BioX2022-38 HWS2022-13 ICSS2022-21 EMM2022-21 |
To enhance user convenience, there is a movement to automate certain processes in systems by performing authentication v... [more] |
ISEC2022-13 SITE2022-17 BioX2022-38 HWS2022-13 ICSS2022-21 EMM2022-21 pp.35-39 |
EMM, BioX, ISEC, SITE, ICSS, HWS, IPSJ-CSEC, IPSJ-SPT [detail] |
2022-07-19 17:05 |
Online |
Online |
Security Evaluation of Cryptographic Circuits with Laser Sensors by Double-Spot Laser Irradiation Masaki Chikano, Naoki Yoshida, Junichi Sakamoto, Syungo Hayashi, Tsutomu Matsumoto (YNU) ISEC2022-16 SITE2022-20 BioX2022-41 HWS2022-16 ICSS2022-24 EMM2022-24 |
A fault injection attack is an attack method that intentionally injects faults into a device to cause it to malfunction,... [more] |
ISEC2022-16 SITE2022-20 BioX2022-41 HWS2022-16 ICSS2022-24 EMM2022-24 pp.52-57 |
BioX, ISEC, SITE, ICSS, EMM, HWS, IPSJ-CSEC, IPSJ-SPT [detail] |
2021-07-19 13:55 |
Online |
Online |
Memory-saving implementation of BLS12-381 Pairing-based cryptography Riku Anzai, Junichi Sakamoto, Zihao Song, Naoki Yoshida, Tsutomu Matsumoto (YNU) ISEC2021-11 SITE2021-5 BioX2021-12 HWS2021-11 ICSS2021-16 EMM2021-16 |
For smart security management of IoT systems, it is expected to utilize advanced cryptography such as identity-based enc... [more] |
ISEC2021-11 SITE2021-5 BioX2021-12 HWS2021-11 ICSS2021-16 EMM2021-16 pp.8-13 |
HWS |
2021-04-12 10:50 |
Tokyo |
Tokyo University/Online (Primary: On-site, Secondary: Online) |
Performance Evaluation of an FPGA-Based Pairing Computation Accelerator Junichi Sakamoto, Naoki Yoshida, Tsutomu Matsumoto (YNU) HWS2021-3 |
Several hardware-based accelerators have been proposed to speed up or reduce the power consumption of computationally ex... [more] |
HWS2021-3 pp.13-18 |
HWS |
2021-04-12 11:15 |
Tokyo |
Tokyo University/Online (Primary: On-site, Secondary: Online) |
An Implementation of a Pairing on Cocks-Pinch Curve with Embedding Degree 6 Zihao Song, Junichi Sakamoto, Tsutomu Matsumoto (YNU) HWS2021-4 |
In recent years, with the proliferation of IoT devices and computer performance improvement, there are increasing expect... [more] |
HWS2021-4 pp.19-24 |
ICD, HWS [detail] |
2020-10-26 09:25 |
Online |
Online |
Power Analysis Attack Using Pipeline Scheduling on Pairing Hardware Mitsufumi Yamazaki, Junichi Sakamoto, Tsutomu Matsumoto (YNU) HWS2020-26 ICD2020-15 |
To reduce the latency of pairing calculation for advanced cryptography, hardware implementations with pipelined modular ... [more] |
HWS2020-26 ICD2020-15 pp.7-12 |
ICD, HWS [detail] |
2020-10-26 10:30 |
Online |
Online |
Laser-based Attacks on Ultrasonic Sensors Tatsuya Suehiro, Taku Toyama, Junichi Sakamoto, Tsutomu Matsumoto (Yokohama National Univ.) HWS2020-28 ICD2020-17 |
We examine the instrumentation security threat of irradiating laser for a piezoelectric MEMS transducer in a MEMS ultras... [more] |
HWS2020-28 ICD2020-17 pp.18-23 |
HWS, VLD [detail] |
2020-03-06 13:25 |
Okinawa |
Okinawa Ken Seinen Kaikan (Cancelled but technical report was issued) |
Fundamental Study on Side-Channel Attacks on Radio Communication ICs Ryuuya Ichinose, Sakamoto Junichi, Tsutomu Matsumoto (Yokohama National Univ.) VLD2019-129 HWS2019-102 |
Radio waves emitted by the radio communication ICs may include some internal information of the ICs, and attackers can o... [more] |
VLD2019-129 HWS2019-102 pp.203-207 |
HWS (2nd) |
2019-12-06 16:00 |
Tokyo |
Asakusabashi Hulic Conference |
[Poster Presentation]
Can Coding Prevent 1-bit Instruction Replacement Fault Attacks? Shungo Hayashi, Junichi Sakamoto, Tsutomu Matsumoto (YNU) |
[more] |
|
HWS (2nd) |
2019-12-06 16:00 |
Tokyo |
Asakusabashi Hulic Conference |
[Poster Presentation]
A System for USB Device Identification Based on Electrical Characteristics Taku Toyama, Junichi Sakamoto, Naoki Yoshida, Tsutomu Matsumoto (YNU) |
[more] |
|