Committee |
Date Time |
Place |
Paper Title / Authors |
Abstract |
Paper # |
HWS |
2024-04-19 16:50 |
Tokyo |
(Primary: On-site, Secondary: Online) |
Supply chain risk and hardware trojan protection Shinichi Kawamura, Tsutomu Matsumoto, Hirotaka Yoshida (AIST), Yasuyoshi Uemura (SCU), Makoto Nagata (Kobe Univ.), Makoto Ikeda (Tokyo Univ.), Ken Takano (LINTEC) HWS2024-6 |
[more] |
HWS2024-6 pp.24-29 |
VLD, HWS, ICD |
2024-02-29 11:15 |
Okinawa |
(Primary: On-site, Secondary: Online) |
Design of RISC-V SoC with Post-quantum Encryption Algorithm Acceleration Jiyuan Xin, Makoto Ikeda (UTokyo) VLD2023-110 HWS2023-70 ICD2023-99 |
The foundational elements of the Internet of Things (IoT) are increasingly intricate and robust Systems-on-Chips (SoCs) ... [more] |
VLD2023-110 HWS2023-70 ICD2023-99 pp.66-71 |
VLD, HWS, ICD |
2024-03-01 14:00 |
Okinawa |
(Primary: On-site, Secondary: Online) |
High-Level Synthesis Method for Python Considering Runtime Profiling Yusuke Suzuki, Makoto Ikeda (UTokyo) VLD2023-127 HWS2023-87 ICD2023-116 |
With the increasing complexity of LSI design in recent years, high-level synthesis (HLS) technology has attracted attent... [more] |
VLD2023-127 HWS2023-87 ICD2023-116 pp.145-150 |
VLD, HWS, ICD |
2024-03-01 15:30 |
Okinawa |
(Primary: On-site, Secondary: Online) |
A Pipelined NTT Transformer and its Extension Scheme Designed for the Digital Signature Scheme Crystals-Dilithium Pengfei Sun, Makoto Ikeda (Tokyo Univ.) VLD2023-130 HWS2023-90 ICD2023-119 |
As quantum computing advances, it threatens the security of current encryption algorithms, making Post-Quantum Cryptogra... [more] |
VLD2023-130 HWS2023-90 ICD2023-119 pp.161-166 |
VLD, HWS, ICD |
2024-03-01 15:55 |
Okinawa |
(Primary: On-site, Secondary: Online) |
Hardware Design Based on Full Parameter Support and Parallelism Optimization for Key Encapsulation Mechanism FIPS203 Yuto Nakamura, Makoto Ikeda (UTokyo) VLD2023-131 HWS2023-91 ICD2023-120 |
The emergence of quantum computers potentially threatens the security of traditional cryptographic techniques that depen... [more] |
VLD2023-131 HWS2023-91 ICD2023-120 pp.167-172 |
VLD, HWS, ICD |
2024-03-01 16:20 |
Okinawa |
(Primary: On-site, Secondary: Online) |
An Efficient Hardware Approach for High-Speed SPHINCS+ Signature Generation Yuta Takeshima, Makoto Ikeda (The Univ. of Tokyo) VLD2023-132 HWS2023-92 ICD2023-121 |
This study addresses the challenges traditional cryptographic systems face with the advent of quantum computers by focus... [more] |
VLD2023-132 HWS2023-92 ICD2023-121 pp.173-177 |
VLD, HWS, ICD |
2024-03-02 10:50 |
Okinawa |
(Primary: On-site, Secondary: Online) |
Design of General Hardware for Optimal Strategy in Isogeny-Based Post-Quantum Cryptography Kosei Nakamura, Makoto Ikeda (UT) VLD2023-137 HWS2023-97 ICD2023-126 |
The computation in isogeny-based post-quantum cryptography primarily consists of two operations: scalar multiplication o... [more] |
VLD2023-137 HWS2023-97 ICD2023-126 pp.198-203 |
VLD, DC, RECONF, ICD, IPSJ-SLDM [detail] |
2023-11-17 10:25 |
Kumamoto |
Civic Auditorium Sears Home Yume Hall (Primary: On-site, Secondary: Online) |
Low-Latency Hardware Implementation for SPHINCS+ signature generation Yuta Takeshima, Makoto Ikeda (The Univ. of Tokyo) VLD2023-69 ICD2023-77 DC2023-76 RECONF2023-72 |
In recent years, research and standardization of post-quantum cryptography have been actively pursued. In 2022, the digi... [more] |
VLD2023-69 ICD2023-77 DC2023-76 RECONF2023-72 pp.200-204 |
ICD, HWS |
2023-10-31 15:25 |
Mie |
(Primary: On-site, Secondary: Online) |
CPA ToggleToggle-based Simulation against Multiplier for Pairingairing-based Cryptography Saito Kikuoka, Ikeda Makoto (Tokyo Univ.) HWS2023-58 ICD2023-37 |
Pairing-based cryptography is more secure than RSA with a shorter key length, but it is computationally expensive and mo... [more] |
HWS2023-58 ICD2023-37 pp.20-25 |
EMM, BioX, ISEC, SITE, ICSS, HWS, IPSJ-CSEC, IPSJ-SPT [detail] |
2023-07-25 11:20 |
Hokkaido |
Hokkaido Jichiro Kaikan |
Secure Cryptographic Unit with built-in Signature Generation Hardware for Aggregate Signature Schemes and its FPGA Implementation Toshihiro Sato, Shohei Kawasaki (SCU), Kaoru Masada (Tokyo Univ.), Riku Anzai, Junichi Sakamoto, Naoki Yoshida (YNU), Yasuyoshi Uemura (SCU), Makoto Ikeda (Tokyo Univ.), Tsutomu Matsumoto (YNU) ISEC2023-42 SITE2023-36 BioX2023-45 HWS2023-42 ICSS2023-39 EMM2023-42 |
Secure Cryptographic Unit (SCU) consists of a hardware cryptographic engine and an access control mechanism for the engi... [more] |
ISEC2023-42 SITE2023-36 BioX2023-45 HWS2023-42 ICSS2023-39 EMM2023-42 pp.182-187 |
MSS, CAS, SIP, VLD |
2023-07-06 13:00 |
Hokkaido |
(Primary: On-site, Secondary: Online) |
[Panel Discussion]
Democratization of Researches in Circuits and Systems fields and Initiatives in Technical Groups Makoto Ikeda (The Univ. of Tokyo), Yasutoshi Aibara (OVT), Shigetoshi Nakatake (The Univ. of Kitakyushu), Takayuki Nakachi (Univ. of Ryukyus), Shingo Yamaguchi (Yamaguchi Univ.) CAS2023-7 VLD2023-7 SIP2023-23 MSS2023-7 |
Open Access initiatives, which allow access and use of research results funded by public research funds not only by the ... [more] |
CAS2023-7 VLD2023-7 SIP2023-23 MSS2023-7 pp.34-36 |
HWS |
2023-04-15 09:40 |
Oita |
(Primary: On-site, Secondary: Online) |
Investigation of automated design technique of pairing engine Momoko Fukuda, Makoto Ikeda (UT) HWS2023-10 |
We have realized a design automation platform of hardware accelerator for pairing operation over multiple elliptic curve... [more] |
HWS2023-10 pp.37-42 |
HWS, VLD |
2023-03-03 14:40 |
Okinawa |
(Primary: On-site, Secondary: Online) |
Toggle-based simulation of side-channel attack against multiplier for pairing-based cryptography Saito Kikuoka, Makoto Ikeda (Tokyo Univ.) VLD2022-109 HWS2022-80 |
Pairing-based cryptography is more secure than RSA with a shorter key length, but it is computationally expensive and mo... [more] |
VLD2022-109 HWS2022-80 pp.197-202 |
HWS, VLD |
2023-03-03 15:20 |
Okinawa |
(Primary: On-site, Secondary: Online) |
Design optimization of TFHE-based 4+ input homomorphic logic gates by error controlling Yinfan Zhao, Makoto Ikeda (Tokyo Univ.) VLD2022-110 HWS2022-81 |
Fully homomorphic encryption (FHE) is a way to delegate the processing of the data without giving a way access to it. FH... [more] |
VLD2022-110 HWS2022-81 pp.203-208 |
HWS, ICD |
2022-10-25 15:40 |
Shiga |
(Primary: On-site, Secondary: Online) |
Hardware Acceleration of TFHE-based Adder by Controlling Error Yinfan Zhao, Ikeda Makoto (Univ. of Tokyo) HWS2022-40 ICD2022-32 |
Fully homomorphic encryption (FHE) is expected to be used in the secure delegating computation. The bootstrapping in the... [more] |
HWS2022-40 ICD2022-32 pp.58-63 |
VLD, HWS [detail] |
2022-03-07 11:25 |
Online |
Online |
Design and Measurement of Crypto Processor for Post Quantum Cryptography CRYSTALS-Kyber Taishin Shimada, Makoto Ikeda (Univ. of Tokyo) VLD2021-81 HWS2021-58 |
CRYSTALS-Kyber is one of the public key cryptosystems being considered as a public key cryptosystem after the advent of ... [more] |
VLD2021-81 HWS2021-58 pp.31-36 |
HWS, ICD [detail] |
2021-10-19 16:15 |
Online |
Online |
Security evaluatuion of pairing-based cryptography against Special extended Number Field Sieve method Saito Kikuoka, Makoto Ikeda (Tokyo Univ.) HWS2021-52 ICD2021-26 |
Pairing-based cryptography is an extension of elliptic-curve-based cryptography for applications realizing functional cr... [more] |
HWS2021-52 ICD2021-26 pp.57-62 |
SDM, ICD, ITE-IST [detail] |
2021-08-17 16:10 |
Online |
Online |
Design and Evaluation of ToF image sensor with Pulse-Frequency-Modulation Pixel for In-Pixel Code Discrimination Nao Watanabe, Makoto Ikeda (Univ. of Tokyo) SDM2021-34 ICD2021-5 |
ToF's operational issues include multi-user interference and intentional attacks by third party. To deal with such inter... [more] |
SDM2021-34 ICD2021-5 pp.22-27 |
SDM, ICD, ITE-IST [detail] |
2021-08-17 16:35 |
Online |
Online |
Design and evaluation of phase shifter for range-extension of ToF imager Jiang Dingyu, Makoto Ikdeda (UTokyo) SDM2021-35 ICD2021-6 |
The 3D imaging has been becoming more and more popular in the image sensor field. Among the depth range finding methods,... [more] |
SDM2021-35 ICD2021-6 pp.28-32 |
HWS |
2021-04-12 10:25 |
Tokyo |
Tokyo University/Online (Primary: On-site, Secondary: Online) |
Approximate Solution of Large-Scale Job Shop Scheduling Problem and Its Application to Hardware Cryptographic Design Kento Ikeda, Makoto Ikeda (Tokyo Univ.) HWS2021-2 |
The optimal design of cryptographic data paths in hardware can be considered as a job-shop scheduling problem. This prob... [more] |
HWS2021-2 pp.7-12 |