Committee |
Date Time |
Place |
Paper Title / Authors |
Abstract |
Paper # |
ET |
2018-03-03 14:25 |
Kochi |
Kochi University of Technology (Eikokuji Campus) |
Construction of Latent Needs Visualization Agent Based on a Hierarchical Topic Model Yusuke Kometani (Kagawa Univ.), Takashi Satoh (The Univ. of Kitakyushu) ET2017-98 |
In troubleshooting process it is effective to make visible the root cause and its corresponding solution of problems tha... [more] |
ET2017-98 pp.53-58 |
ET |
2018-01-27 14:50 |
Hyogo |
Kobe Univ. |
Development of Latent Needs Visualization Agent for Supporting IT Troubleshooting Process within a University Yusuke Kometani (Kagawa Univ.), Takashi Satoh (The Univ. of Kitakyushu) ET2017-85 |
In troubleshooting process it is effective to make visible the root cause and its corresponding solution of problems tha... [more] |
ET2017-85 pp.31-36 |
ET |
2017-11-11 16:40 |
Tokyo |
Sophia Univ. |
Analysis of Latent Needs for IT Consultation within a University using a Topic Model Yusuke Kometani, Takashi Satoh (The Univ. of Kitakyushu) ET2017-66 |
When trouble comes, we often try to implement a workaround as a temporal solution. This approach is generally useless to... [more] |
ET2017-66 pp.69-74 |
ISEC |
2014-12-19 14:50 |
Tokyo |
Kikai-Shinko-Kaikan Bldg. |
Space-Time Encoding Schemes with No False Positives Ryosuke Shiraishi, Takashi Satoh, Masaki Shimoizumi (Univ. Kitakyushu), Masakazu Soshi (Hiroshima City Univ.) ISEC2014-71 |
IP traceback is a technique to detect attackers in denial of service (DoS) and distributed DoS (DDoS) attacks. We consid... [more] |
ISEC2014-71 pp.11-15 |
ICSS, ISEC, SITE, EMM, IPSJ-CSEC, IPSJ-SPT [detail] |
2014-07-04 14:15 |
Hokkaido |
San-Refure Hakodate |
DDoS Attack Path Reconstruction in Space-Time Encoding Schemes Takashi Satoh, Daichi Misumi, Masaki Shimoizumi (Univ. of Kitakyushu), Masakazu Soshi (Hiroshima City Univ.) ISEC2014-45 SITE2014-40 ICSS2014-49 EMM2014-45 |
There are several kinds of IP traceback techniques to trace attack paths in denial of service (DoS) and distributed Dos ... [more] |
ISEC2014-45 SITE2014-40 ICSS2014-49 EMM2014-45 pp.315-319 |
IT, ISEC, WBS |
2013-03-08 10:30 |
Osaka |
Kwansei Gakuin Univ., Osaka-Umeda Campus |
Laser Fault Injection Attack on Non-Decapped Contact Smart Card Hitoshi Ono, Yuu Tsuchiya, Tsuyoshi Toyama, Takeshi Kishikawa, Shohei Saito (Yokohama National Univ.), Akihiko Sasaki (MORITA TECH), Akashi Satoh (Univ. of Tokyo), Tsutomu Matsumoto (Yokohama National Univ.) IT2012-93 ISEC2012-111 WBS2012-79 |
[more] |
IT2012-93 ISEC2012-111 WBS2012-79 pp.195-202 |
ISEC, LOIS |
2012-11-21 14:15 |
Shizuoka |
Shizuoka City Industry-University Exchange Center |
How to Extract AES Key from Smart Card by Fault Injection Attack Using Electromaginetic Irradiataion Yuu Tsuchiya, Takeshi Kishikawa, Shohei Saito, Tsuyoshi Toyama (YNU), Akihiko Sasaki (MORITA TECH), Akashi Satoh (VDEC, Univ. Tokyo), Tsutomu Matsumoto (YNU) ISEC2012-57 LOIS2012-32 |
Fault injection attack, inducing partial fault in a cryptographic module and extracting the inside key, has been conside... [more] |
ISEC2012-57 LOIS2012-32 pp.1-8 |
IT, ISEC, WBS |
2012-03-02 14:25 |
Kanagawa |
|
[Invited Talk]
Physical Attacks and Countermeasures on Cryptographic Devices Akashi Satoh (AIST) IT2011-74 ISEC2011-101 WBS2011-75 |
After describing the history of cryptography, applications of cryptographic devices are overviewed. Then, physical attac... [more] |
IT2011-74 ISEC2011-101 WBS2011-75 p.181 |
ISEC |
2011-12-14 13:15 |
Tokyo |
Kikai-Shinko-Kaikan Bldg. |
A Report on CHES 2011 Tetsuya Izu (FUJITSU Lab.), Atsuo Inomata (NAIST), Katsuyuki Okeya (Renesas Electronics), Ken Kawabata, Yuichi Komano (Toshiba), Kazuo Sakiyama (UEC), Yumi Sakemi (FUJITSU Lab.), Akashi Satoh (AIST), Yuji Suga (IIJ), Tsuyoshi Takagi (Kyusyu Univ.), Junko Takahashi (NTT), Yukiyasu Tsunoo (NEC), Shiho Moriai (Sony), Yohei Hori (AIST), Naofumi Homma (Tohoku Univ.) ISEC2011-65 |
(To be available after the conference date) [more] |
ISEC2011-65 pp.21-24 |
RECONF |
2011-05-13 11:35 |
Hokkaido |
Hokkaido Univ. (Faculty of Eng., B3 Bldg.) |
Power Consumption Evaluation of a Dynamically Reconfigurable Multi-cryptoprocessor on Virtex-5 FPGA Yohei Hori, Toshihiro Katashita, Akashi Satoh (AIST) RECONF2011-17 |
[more] |
RECONF2011-17 pp.97-102 |
VLD, DC, IPSJ-SLDM, CPSY, RECONF, ICD, CPM (Joint) [detail] |
2010-12-01 10:10 |
Fukuoka |
Kyushu University |
Magnetic Field Measurement for Side-channel Analysis Environment Toshihiro Katashita, Yohei Hori, Akashi Satoh (AIST) RECONF2010-46 |
Cryptography used widely in electronic products is evaluated in terms of computationally-secure, however there is vulner... [more] |
RECONF2010-46 pp.43-48 |
VLD, DC, IPSJ-SLDM, CPSY, RECONF, ICD, CPM (Joint) [detail] |
2010-12-01 11:05 |
Fukuoka |
Kyushu University |
A study of the success rate of MIA under various probability density function estimations Yohei Hori (AIST), Takahiro Yoshida (Aoyama Univ.), Toshihiro Katashita, Akashi Satoh (AIST) RECONF2010-48 |
The pfrobability density function (PDF) of voltage of AES hardware
module is estimated in various ways and applied to ... [more] |
RECONF2010-48 pp.55-60 |
VLD, DC, IPSJ-SLDM, CPSY, RECONF, ICD, CPM (Joint) [detail] |
2010-12-01 11:25 |
Fukuoka |
Kyushu University |
Performance Evaluation for PUF-based Authentication Systems with Shift Post-processing Hyunho Kang, Yohei Hori, Toshihiro Katashita, Akashi Satoh (AIST) RECONF2010-49 |
A physical unclonable function (PUF) is a physical system with a device manufacturing variations and could be useful for... [more] |
RECONF2010-49 pp.61-64 |
RECONF |
2010-09-17 13:15 |
Shizuoka |
Shizuoka University (Faculty of Eng., Hall 2) |
Quantitative Performance Evaluation of Arbiter PUFs on FPGAs Yohei Hori (AIST), Takahiro Yoshida (Chuo Univ.), Toshihiro Katashita, Akashi Satoh (AIST) RECONF2010-37 |
The quantitative performance indicators of Physical Unclonable
Functions (PUFs)---Randomness, Steadiness, Correctness,... [more] |
RECONF2010-37 pp.115-120 |
ICSS |
2010-03-26 13:55 |
Fukuoka |
The University of Kitakyushu |
An Efficient Key Establishment Scheme through Intermediaries for Sensor Networks Tomonori Kubo, Takashi Satoh (Univ. Kitakyushu) ICSS2009-63 |
Establishing shared keys is a fundamental issue to provide secure communications among nodes in sensor networks. We prop... [more] |
ICSS2009-63 pp.7-11 |
VLD, DC, IPSJ-SLDM, CPSY, RECONF, ICD, CPM (Joint) [detail] |
2009-12-03 15:40 |
Kochi |
Kochi City Culture-Plaza |
Development of Standard Evaluation Environment for Side-channel Attacks and Countermeasures Toshihiro Katashita (AIST), Yohei Hori (Chuo Univ.), Akashi Satoh (AIST) RECONF2009-46 |
Cryptography used widely in electronic products is evaluated in terms of computationally-secure, however there is vulner... [more] |
RECONF2009-46 pp.31-36 |
EMCJ, ITE-BCT |
2009-03-13 14:05 |
Tokyo |
Kikai-Shinko-Kaikan Bldg. |
Magnetic Near Field Measurement of Cryptographic LSI using On-Chip Integrated Micro Magnetic Field probe Hideki Torizuka, Masahiro Yamaguchi, Takeshi Sugawara, Naofumi Homma (Tohoku Univ.), Akashi Satoh (Adv Ind Sci and Tech.), Takafumi Aoki (Tohoku Univ.) EMCJ2008-120 |
Increasingly a side channel attack which is to break a cryptographic key using the electromagnetic radiation and power c... [more] |
EMCJ2008-120 pp.37-42 |
VLD, DC, IPSJ-SLDM, CPSY, RECONF, ICD, CPM (Joint) [detail] |
2008-11-18 15:20 |
Fukuoka |
Kitakyushu Science and Research Park |
Development of Side-channel Attack Standard Evaluation BOard and Tool Yohei Hori, Toshihiro Katashita, Hirofumi Sakane, Kenji Toda, Akashi Satoh (National Institute of Advanced Industrial Science and Technology), Hideki Imai (Chuo Univ.) RECONF2008-54 |
Side-channel Attack Standard Evaluation BOards (SASEBO) and their
analysis tools are developed to provide uniform exp... [more] |
RECONF2008-54 pp.87-92 |
RECONF |
2008-05-22 13:50 |
Fukushima |
The University of Aizu |
Bitstream encryption and authentication with AES-GCM in dynamically reconfigurable systems Yohei Hori, Akashi Satoh, Hirofumi Sakane, Kenji Toda (AIST) RECONF2008-3 |
A high-speed and secure dynamic partial reconfiguration (DPR) system is realized with AES-GCM that guarantees both confi... [more] |
RECONF2008-3 pp.13-18 |
ISEC |
2008-05-16 15:20 |
Tokyo |
Kikai-Shinko-Kaikan Bldg. |
Integrating Fingerprint and Cryptosystem for Internet-Based Live Pay-TV System Shuhui Hou, Tetsutaro Uehara (Kyoto Univ.), Takashi Satoh (Univ. of Kitakyushu), Yoshitaka Morimura, Michihiko Minoh (Kyoto Univ.) ISEC2008-12 |
In the last few years, live pay-TV system via internet has come to be established with the development of broadband netw... [more] |
ISEC2008-12 pp.77-84 |