(1) |
09:50-10:00 |
|
Tue, Oct 25 AM HWS(1):Side Channel Attack 10:00 - 11:15 |
(2) |
10:00-10:25 |
Hardware Evaluation of Romulus with Threshold Implementation and Its Simulation-Based Leakage Assessment |
Masaya Nemoto, Tamon Asano, Takeshi Sugawara (UEC) |
(3) |
10:25-10:50 |
A Study on Profiled Side-channel Analysis against AES-CTR |
Katsumi Ebina, Rei Ueno, Naohumi Homma (Tohoku Univ) |
(4) |
10:50-11:15 |
Power current simulation and side channel leakage evaluation of cryptographic IC chips |
Rikuu Hasegawa, Takuya Wadatsumi, Kazuki Monta, Takuji Miki, Makoto Nagata (Kobe Univ.) |
|
11:15-11:25 |
Break ( 10 min. ) |
Tue, Oct 25 AM HWS(2):RNG/HW Trojan 11:25 - 12:15 |
(5) |
11:25-11:50 |
Fundamental Study on Randomness Evaluation of ERO-TRNG Using APD |
Keiichi Ozaki, Daisuke Fujimoto (NAIST), Saki Osuka, Shinichi Kawamura (AIST), Yuichi Hayashi (NAIST) |
(6) |
11:50-12:15 |
Optical Microscopic Observation of Semiconductor Devices toward Hardware Trojan Detection |
Hirofumi Sakane, Junichi Sakamoto, Shinichi Kawamura (AIST), Makoto Nagata (Kobe Univ.), Yuichi Hayashi (NAIST) |
|
12:15-13:25 |
Break ( 70 min. ) |
Tue, Oct 25 PM HWS(3):Fault Injection 13:25 - 14:40 |
(7) |
13:25-13:50 |
Manipulating the Behaviors of Delay-Sensitive Circuits Using Lasers |
Kohei Yamashita (UEC), Benjamin Cyr, Kevin Fu (UMich), Wayne Burleson (UMass), Takeshi Sugawara (UEC) |
(8) |
13:50-14:15 |
Fundamental Study of Adversarial Examples Created by Fault Injection Attack on Image Sensor Interface |
Tatsuya Oyama, Kota Yoshida, Shunsuke Okura, Takeshi Fujino (Ritsumeikan Univ.) |
(9) |
14:15-14:40 |
An Estimation Method of the Irradiation Timing of an Attack Pulse for Distance Spoofing Attack Against Direct ToF LiDAR |
Midori Tomijima, Daisuke Fujimoto, Yuichi Hayashi (NAIST) |
|
14:40-14:50 |
Break ( 10 min. ) |
Tue, Oct 25 PM ICD/HWS(4):Crypto Algorithm/Implementation/Protocol(1) 14:50 - 16:05 |
(10) |
14:50-15:15 |
Design and Prototype Evaluation of Stochastic Encrypted Computing Hardware |
Yuki Tamura, Rei Ueno, Naofumi Homma (Tohoku Univ.) |
(11) |
15:15-15:40 |
A Memory-Saving Software Implementation of Pairing Computation on the GMT8-544 Curve |
Hiroto Miyata, Junichi Sakamoto, Naoki Yoshida, Riku Anzai, Tsutomu Matsumoto (YNU) |
(12) |
15:40-16:05 |
Hardware Acceleration of TFHE-based Adder by Controlling Error |
Yinfan Zhao, Ikeda Makoto (Univ. of Tokyo) |
|
16:05-16:15 |
Break ( 10 min. ) |
Tue, Oct 25 PM ICD/HWS(5):Crypto Algorithm/Implementation/Protocol(2) 16:15 - 17:30 |
(13) |
16:15-16:40 |
Design and Implementation of Payload Encryption and MAC for CAN Communication Using Lightweight Encryption SIMON |
Tomoya Tsuboi, Yuta Kodera, Yasuyuki Nogami, Takuya Kusaka (Okayama Univ) |
(14) |
16:40-17:05 |
A Study on Small Area HMAC-SHA256 Circuit suitable for CMOS Image Sensor |
Yu Sekioka, Tatsuya Oyama, Hayato Tatsuno, Kota Yoshida, Shunsuke Okura, Takeshi Fujino (Ritsumeikan Univ) |
(15) |
17:05-17:30 |
How to Identify the Physical Direction of CAN Message Transmission |
Yosuke Maekawa, Camille Gay (TOYOTA/YNU), Tsutomu Matsumoto (YNU) |