IEICE Technical Committee Submission System
Conference Schedule
Online Proceedings
[Sign in]
Tech. Rep. Archives
    [Japanese] / [English] 
( Committee/Place/Topics  ) --Press->
 
( Paper Keywords:  /  Column:Title Auth. Affi. Abst. Keyword ) --Press->

All Technical Committee Conferences  (Searched in: All Years)

Search Results: Conference Papers
 Conference Papers (Available on Advance Programs)  (Sort by: Date Descending)
 Results 1 - 17 of 17  /   
Committee Date Time Place Paper Title / Authors Abstract Paper #
IT, ISEC, WBS 2013-03-08
10:30
Osaka Kwansei Gakuin Univ., Osaka-Umeda Campus Laser Fault Injection Attack on Non-Decapped Contact Smart Card
Hitoshi Ono, Yuu Tsuchiya, Tsuyoshi Toyama, Takeshi Kishikawa, Shohei Saito (Yokohama National Univ.), Akihiko Sasaki (MORITA TECH), Akashi Satoh (Univ. of Tokyo), Tsutomu Matsumoto (Yokohama National Univ.) IT2012-93 ISEC2012-111 WBS2012-79
 [more] IT2012-93 ISEC2012-111 WBS2012-79
pp.195-202
ISEC, LOIS 2012-11-21
14:15
Shizuoka Shizuoka City Industry-University Exchange Center How to Extract AES Key from Smart Card by Fault Injection Attack Using Electromaginetic Irradiataion
Yuu Tsuchiya, Takeshi Kishikawa, Shohei Saito, Tsuyoshi Toyama (YNU), Akihiko Sasaki (MORITA TECH), Akashi Satoh (VDEC, Univ. Tokyo), Tsutomu Matsumoto (YNU) ISEC2012-57 LOIS2012-32
Fault injection attack, inducing partial fault in a cryptographic module and extracting the inside key, has been conside... [more] ISEC2012-57 LOIS2012-32
pp.1-8
IT, ISEC, WBS 2012-03-02
14:25
Kanagawa   [Invited Talk] Physical Attacks and Countermeasures on Cryptographic Devices
Akashi Satoh (AIST) IT2011-74 ISEC2011-101 WBS2011-75
After describing the history of cryptography, applications of cryptographic devices are overviewed. Then, physical attac... [more] IT2011-74 ISEC2011-101 WBS2011-75
p.181
ISEC 2011-12-14
13:15
Tokyo Kikai-Shinko-Kaikan Bldg. A Report on CHES 2011
Tetsuya Izu (FUJITSU Lab.), Atsuo Inomata (NAIST), Katsuyuki Okeya (Renesas Electronics), Ken Kawabata, Yuichi Komano (Toshiba), Kazuo Sakiyama (UEC), Yumi Sakemi (FUJITSU Lab.), Akashi Satoh (AIST), Yuji Suga (IIJ), Tsuyoshi Takagi (Kyusyu Univ.), Junko Takahashi (NTT), Yukiyasu Tsunoo (NEC), Shiho Moriai (Sony), Yohei Hori (AIST), Naofumi Homma (Tohoku Univ.) ISEC2011-65
(To be available after the conference date) [more] ISEC2011-65
pp.21-24
RECONF 2011-05-13
11:35
Hokkaido Hokkaido Univ. (Faculty of Eng., B3 Bldg.) Power Consumption Evaluation of a Dynamically Reconfigurable Multi-cryptoprocessor on Virtex-5 FPGA
Yohei Hori, Toshihiro Katashita, Akashi Satoh (AIST) RECONF2011-17
 [more] RECONF2011-17
pp.97-102
VLD, DC, IPSJ-SLDM, CPSY, RECONF, ICD, CPM
(Joint) [detail]
2010-12-01
10:10
Fukuoka Kyushu University Magnetic Field Measurement for Side-channel Analysis Environment
Toshihiro Katashita, Yohei Hori, Akashi Satoh (AIST) RECONF2010-46
Cryptography used widely in electronic products is evaluated in terms of computationally-secure, however there is vulner... [more] RECONF2010-46
pp.43-48
VLD, DC, IPSJ-SLDM, CPSY, RECONF, ICD, CPM
(Joint) [detail]
2010-12-01
11:05
Fukuoka Kyushu University A study of the success rate of MIA under various probability density function estimations
Yohei Hori (AIST), Takahiro Yoshida (Aoyama Univ.), Toshihiro Katashita, Akashi Satoh (AIST) RECONF2010-48
The pfrobability density function (PDF) of voltage of AES hardware
module is estimated in various ways and applied to ... [more]
RECONF2010-48
pp.55-60
VLD, DC, IPSJ-SLDM, CPSY, RECONF, ICD, CPM
(Joint) [detail]
2010-12-01
11:25
Fukuoka Kyushu University Performance Evaluation for PUF-based Authentication Systems with Shift Post-processing
Hyunho Kang, Yohei Hori, Toshihiro Katashita, Akashi Satoh (AIST) RECONF2010-49
A physical unclonable function (PUF) is a physical system with a device manufacturing variations and could be useful for... [more] RECONF2010-49
pp.61-64
RECONF 2010-09-17
13:15
Shizuoka Shizuoka University (Faculty of Eng., Hall 2) Quantitative Performance Evaluation of Arbiter PUFs on FPGAs
Yohei Hori (AIST), Takahiro Yoshida (Chuo Univ.), Toshihiro Katashita, Akashi Satoh (AIST) RECONF2010-37
The quantitative performance indicators of Physical Unclonable
Functions (PUFs)---Randomness, Steadiness, Correctness,... [more]
RECONF2010-37
pp.115-120
VLD, DC, IPSJ-SLDM, CPSY, RECONF, ICD, CPM
(Joint) [detail]
2009-12-03
15:40
Kochi Kochi City Culture-Plaza Development of Standard Evaluation Environment for Side-channel Attacks and Countermeasures
Toshihiro Katashita (AIST), Yohei Hori (Chuo Univ.), Akashi Satoh (AIST) RECONF2009-46
Cryptography used widely in electronic products is evaluated in terms of computationally-secure, however there is vulner... [more] RECONF2009-46
pp.31-36
EMCJ, ITE-BCT 2009-03-13
14:05
Tokyo Kikai-Shinko-Kaikan Bldg. Magnetic Near Field Measurement of Cryptographic LSI using On-Chip Integrated Micro Magnetic Field probe
Hideki Torizuka, Masahiro Yamaguchi, Takeshi Sugawara, Naofumi Homma (Tohoku Univ.), Akashi Satoh (Adv Ind Sci and Tech.), Takafumi Aoki (Tohoku Univ.) EMCJ2008-120
Increasingly a side channel attack which is to break a cryptographic key using the electromagnetic radiation and power c... [more] EMCJ2008-120
pp.37-42
VLD, DC, IPSJ-SLDM, CPSY, RECONF, ICD, CPM
(Joint) [detail]
2008-11-18
15:20
Fukuoka Kitakyushu Science and Research Park Development of Side-channel Attack Standard Evaluation BOard and Tool
Yohei Hori, Toshihiro Katashita, Hirofumi Sakane, Kenji Toda, Akashi Satoh (National Institute of Advanced Industrial Science and Technology), Hideki Imai (Chuo Univ.) RECONF2008-54
Side-channel Attack Standard Evaluation BOards (SASEBO) and their
analysis tools are developed to provide uniform exp... [more]
RECONF2008-54
pp.87-92
RECONF 2008-05-22
13:50
Fukushima The University of Aizu Bitstream encryption and authentication with AES-GCM in dynamically reconfigurable systems
Yohei Hori, Akashi Satoh, Hirofumi Sakane, Kenji Toda (AIST) RECONF2008-3
A high-speed and secure dynamic partial reconfiguration (DPR) system is realized with AES-GCM that guarantees both confi... [more] RECONF2008-3
pp.13-18
IT, ISEC, WBS 2007-03-16
14:15
Gunma Gunma Univ. (Kiryu Campus) Performance Comparison of the ISO standard block ciphers in ASICs
Takeshi Sugawara, Naofumi Homma, Takafumi Aoki (Tohoku Univ.), Akashi Satoh (IBM Japan)
 [more] IT2006-104 ISEC2006-159 WBS2006-101
pp.111-117
ISEC 2006-05-19
13:25
Tokyo Kikai-Shinko-Kaikan Bldg. Bit-Transition Differential Power Analysis on FPGA Implementaion of Block Cipher with Masking Countermeasure
Yoshio Takahashi (NTT Data/Yokohama Nat'l Univ.), Tsutomu Matsumoto (Yokohama Nat'l Univ.), Akashi Satoh (IBM Japan)
 [more] ISEC2006-1
pp.1-6
WBS, IT, ISEC 2006-03-16
11:35
Aichi Nagoya Univ. A High-Resolution Waveform Analysis Based on Phase-Only Correlation and Its Application to Side-Channel Attacks
Yuichi Imai, Naofumi Homma, Sei Nagashima, Takafumi Aoki (Tohoku Univ.), Akashi Satoh (IBM Japan)
This paper presents a high-resolution waveform alignment method using a Phase-Only Correlation (POC) technique and its a... [more] IT2005-81 ISEC2005-138 WBS2005-95
pp.97-103
ISEC 2005-12-16
11:05
Tokyo Kikai-Shinko-Kaikan Bldg. Side channel attacks against block cipher implementation on FPGA
Yoshio Takahashi (NTT Data), Akashi Satoh (IBM Research), Nobuaki Umeda (NTT Data)
 [more] ISEC2005-111
pp.5-10
 Results 1 - 17 of 17  /   
Choose a download format for default settings. [NEW !!]
Text format pLaTeX format CSV format BibTeX format
Copyright and reproduction : All rights are reserved and no part of this publication may be reproduced or transmitted in any form or by any means, electronic or mechanical, including photocopy, recording, or any information storage and retrieval system, without permission in writing from the publisher. Notwithstanding, instructors are permitted to photocopy isolated articles for noncommercial classroom use without fee. (License No.: 10GA0019/12GB0052/13GB0056/17GB0034/18GB0034)


[Return to Top Page]

[Return to IEICE Web Page]


The Institute of Electronics, Information and Communication Engineers (IEICE), Japan