Committee |
Date Time |
Place |
Paper Title / Authors |
Abstract |
Paper # |
IT, ISEC, WBS |
2013-03-08 10:30 |
Osaka |
Kwansei Gakuin Univ., Osaka-Umeda Campus |
Laser Fault Injection Attack on Non-Decapped Contact Smart Card Hitoshi Ono, Yuu Tsuchiya, Tsuyoshi Toyama, Takeshi Kishikawa, Shohei Saito (Yokohama National Univ.), Akihiko Sasaki (MORITA TECH), Akashi Satoh (Univ. of Tokyo), Tsutomu Matsumoto (Yokohama National Univ.) IT2012-93 ISEC2012-111 WBS2012-79 |
[more] |
IT2012-93 ISEC2012-111 WBS2012-79 pp.195-202 |
ISEC, LOIS |
2012-11-21 14:15 |
Shizuoka |
Shizuoka City Industry-University Exchange Center |
How to Extract AES Key from Smart Card by Fault Injection Attack Using Electromaginetic Irradiataion Yuu Tsuchiya, Takeshi Kishikawa, Shohei Saito, Tsuyoshi Toyama (YNU), Akihiko Sasaki (MORITA TECH), Akashi Satoh (VDEC, Univ. Tokyo), Tsutomu Matsumoto (YNU) ISEC2012-57 LOIS2012-32 |
Fault injection attack, inducing partial fault in a cryptographic module and extracting the inside key, has been conside... [more] |
ISEC2012-57 LOIS2012-32 pp.1-8 |
IT, ISEC, WBS |
2012-03-02 14:25 |
Kanagawa |
|
[Invited Talk]
Physical Attacks and Countermeasures on Cryptographic Devices Akashi Satoh (AIST) IT2011-74 ISEC2011-101 WBS2011-75 |
After describing the history of cryptography, applications of cryptographic devices are overviewed. Then, physical attac... [more] |
IT2011-74 ISEC2011-101 WBS2011-75 p.181 |
ISEC |
2011-12-14 13:15 |
Tokyo |
Kikai-Shinko-Kaikan Bldg. |
A Report on CHES 2011 Tetsuya Izu (FUJITSU Lab.), Atsuo Inomata (NAIST), Katsuyuki Okeya (Renesas Electronics), Ken Kawabata, Yuichi Komano (Toshiba), Kazuo Sakiyama (UEC), Yumi Sakemi (FUJITSU Lab.), Akashi Satoh (AIST), Yuji Suga (IIJ), Tsuyoshi Takagi (Kyusyu Univ.), Junko Takahashi (NTT), Yukiyasu Tsunoo (NEC), Shiho Moriai (Sony), Yohei Hori (AIST), Naofumi Homma (Tohoku Univ.) ISEC2011-65 |
(To be available after the conference date) [more] |
ISEC2011-65 pp.21-24 |
RECONF |
2011-05-13 11:35 |
Hokkaido |
Hokkaido Univ. (Faculty of Eng., B3 Bldg.) |
Power Consumption Evaluation of a Dynamically Reconfigurable Multi-cryptoprocessor on Virtex-5 FPGA Yohei Hori, Toshihiro Katashita, Akashi Satoh (AIST) RECONF2011-17 |
[more] |
RECONF2011-17 pp.97-102 |
VLD, DC, IPSJ-SLDM, CPSY, RECONF, ICD, CPM (Joint) [detail] |
2010-12-01 10:10 |
Fukuoka |
Kyushu University |
Magnetic Field Measurement for Side-channel Analysis Environment Toshihiro Katashita, Yohei Hori, Akashi Satoh (AIST) RECONF2010-46 |
Cryptography used widely in electronic products is evaluated in terms of computationally-secure, however there is vulner... [more] |
RECONF2010-46 pp.43-48 |
VLD, DC, IPSJ-SLDM, CPSY, RECONF, ICD, CPM (Joint) [detail] |
2010-12-01 11:05 |
Fukuoka |
Kyushu University |
A study of the success rate of MIA under various probability density function estimations Yohei Hori (AIST), Takahiro Yoshida (Aoyama Univ.), Toshihiro Katashita, Akashi Satoh (AIST) RECONF2010-48 |
The pfrobability density function (PDF) of voltage of AES hardware
module is estimated in various ways and applied to ... [more] |
RECONF2010-48 pp.55-60 |
VLD, DC, IPSJ-SLDM, CPSY, RECONF, ICD, CPM (Joint) [detail] |
2010-12-01 11:25 |
Fukuoka |
Kyushu University |
Performance Evaluation for PUF-based Authentication Systems with Shift Post-processing Hyunho Kang, Yohei Hori, Toshihiro Katashita, Akashi Satoh (AIST) RECONF2010-49 |
A physical unclonable function (PUF) is a physical system with a device manufacturing variations and could be useful for... [more] |
RECONF2010-49 pp.61-64 |
RECONF |
2010-09-17 13:15 |
Shizuoka |
Shizuoka University (Faculty of Eng., Hall 2) |
Quantitative Performance Evaluation of Arbiter PUFs on FPGAs Yohei Hori (AIST), Takahiro Yoshida (Chuo Univ.), Toshihiro Katashita, Akashi Satoh (AIST) RECONF2010-37 |
The quantitative performance indicators of Physical Unclonable
Functions (PUFs)---Randomness, Steadiness, Correctness,... [more] |
RECONF2010-37 pp.115-120 |
VLD, DC, IPSJ-SLDM, CPSY, RECONF, ICD, CPM (Joint) [detail] |
2009-12-03 15:40 |
Kochi |
Kochi City Culture-Plaza |
Development of Standard Evaluation Environment for Side-channel Attacks and Countermeasures Toshihiro Katashita (AIST), Yohei Hori (Chuo Univ.), Akashi Satoh (AIST) RECONF2009-46 |
Cryptography used widely in electronic products is evaluated in terms of computationally-secure, however there is vulner... [more] |
RECONF2009-46 pp.31-36 |
EMCJ, ITE-BCT |
2009-03-13 14:05 |
Tokyo |
Kikai-Shinko-Kaikan Bldg. |
Magnetic Near Field Measurement of Cryptographic LSI using On-Chip Integrated Micro Magnetic Field probe Hideki Torizuka, Masahiro Yamaguchi, Takeshi Sugawara, Naofumi Homma (Tohoku Univ.), Akashi Satoh (Adv Ind Sci and Tech.), Takafumi Aoki (Tohoku Univ.) EMCJ2008-120 |
Increasingly a side channel attack which is to break a cryptographic key using the electromagnetic radiation and power c... [more] |
EMCJ2008-120 pp.37-42 |
VLD, DC, IPSJ-SLDM, CPSY, RECONF, ICD, CPM (Joint) [detail] |
2008-11-18 15:20 |
Fukuoka |
Kitakyushu Science and Research Park |
Development of Side-channel Attack Standard Evaluation BOard and Tool Yohei Hori, Toshihiro Katashita, Hirofumi Sakane, Kenji Toda, Akashi Satoh (National Institute of Advanced Industrial Science and Technology), Hideki Imai (Chuo Univ.) RECONF2008-54 |
Side-channel Attack Standard Evaluation BOards (SASEBO) and their
analysis tools are developed to provide uniform exp... [more] |
RECONF2008-54 pp.87-92 |
RECONF |
2008-05-22 13:50 |
Fukushima |
The University of Aizu |
Bitstream encryption and authentication with AES-GCM in dynamically reconfigurable systems Yohei Hori, Akashi Satoh, Hirofumi Sakane, Kenji Toda (AIST) RECONF2008-3 |
A high-speed and secure dynamic partial reconfiguration (DPR) system is realized with AES-GCM that guarantees both confi... [more] |
RECONF2008-3 pp.13-18 |
IT, ISEC, WBS |
2007-03-16 14:15 |
Gunma |
Gunma Univ. (Kiryu Campus) |
Performance Comparison of the ISO standard block ciphers in ASICs Takeshi Sugawara, Naofumi Homma, Takafumi Aoki (Tohoku Univ.), Akashi Satoh (IBM Japan) |
[more] |
IT2006-104 ISEC2006-159 WBS2006-101 pp.111-117 |
ISEC |
2006-05-19 13:25 |
Tokyo |
Kikai-Shinko-Kaikan Bldg. |
Bit-Transition Differential Power Analysis on FPGA Implementaion of Block Cipher with Masking Countermeasure Yoshio Takahashi (NTT Data/Yokohama Nat'l Univ.), Tsutomu Matsumoto (Yokohama Nat'l Univ.), Akashi Satoh (IBM Japan) |
[more] |
ISEC2006-1 pp.1-6 |
WBS, IT, ISEC |
2006-03-16 11:35 |
Aichi |
Nagoya Univ. |
A High-Resolution Waveform Analysis Based on Phase-Only Correlation and Its Application to Side-Channel Attacks Yuichi Imai, Naofumi Homma, Sei Nagashima, Takafumi Aoki (Tohoku Univ.), Akashi Satoh (IBM Japan) |
This paper presents a high-resolution waveform alignment method using a Phase-Only Correlation (POC) technique and its a... [more] |
IT2005-81 ISEC2005-138 WBS2005-95 pp.97-103 |
ISEC |
2005-12-16 11:05 |
Tokyo |
Kikai-Shinko-Kaikan Bldg. |
Side channel attacks against block cipher implementation on FPGA Yoshio Takahashi (NTT Data), Akashi Satoh (IBM Research), Nobuaki Umeda (NTT Data) |
[more] |
ISEC2005-111 pp.5-10 |