Committee |
Date Time |
Place |
Paper Title / Authors |
Abstract |
Paper # |
HWS, VLD [detail] |
2021-03-04 13:25 |
Online |
Online |
A Low-Latency Memory Encryption Scheme with Tweakable Block Cipher and Its Hardware Design Maya Oda, Rei Ueno, Naofumi Homma (Tohoku Univ.), Akiko Inoue, Kazuhiko Minematsu (NEC) VLD2020-83 HWS2020-58 |
In this paper, we propose a highly efficient memory protection method based on the Tweakable block cipher (TBC). The lat... [more] |
VLD2020-83 HWS2020-58 pp.85-90 |
HWS, VLD [detail] |
2021-03-04 13:50 |
Online |
Online |
Design and Evaluation of Efficient AES S-box Hardware with Optimization of Linear Mappings Ayano Nakashima, Rei Ueno, Naofumi Homma (Tohoku Univ.) VLD2020-84 HWS2020-59 |
This paper presents a new AES S-Box hardware design based on the optimization of linear mappings by combining multiplica... [more] |
VLD2020-84 HWS2020-59 pp.91-96 |
ICD, HWS [detail] |
2020-10-26 13:00 |
Online |
Online |
Design of Efficient AES Hardware with Immediately Fault Detection Capability Yusuke Yagyu, Rei Ueno, Naofumi Homma (Tohoku Univ.) HWS2020-31 ICD2020-20 |
This paper presents an efficient AES encryption/decryption hardware architecture
with a fault detection scheme.
The pr... [more] |
HWS2020-31 ICD2020-20 pp.36-41 |
ICD, HWS [detail] |
2020-10-26 16:25 |
Online |
Online |
A Detection Method for Hardware Trojans Inserted into Cryptographic Hardware Netlists Akira Ito, Rei Ueno, Naofumi Homma (Tohoku Univ.) HWS2020-38 ICD2020-27 |
[more] |
HWS2020-38 ICD2020-27 pp.77-82 |
SITE, ISEC, HWS, EMM, BioX, IPSJ-CSEC, IPSJ-SPT, ICSS [detail] |
2020-07-20 13:50 |
Online |
Online |
Side Channel Attack on CRT-RSA Using Sliding Window with Exponent Blinding Soki Osawa, Rei Ueno, Naofumi Homma (Tohoku Univ.) ISEC2020-20 SITE2020-17 BioX2020-23 HWS2020-13 ICSS2020-7 EMM2020-17 |
This paper presents a side-channel attack on CRT-RSA. Some open-source cryptographic libraries (e.g.,
Libgcrypt) employ... [more] |
ISEC2020-20 SITE2020-17 BioX2020-23 HWS2020-13 ICSS2020-7 EMM2020-17 pp.39-45 |
SITE, ISEC, HWS, EMM, BioX, IPSJ-CSEC, IPSJ-SPT, ICSS [detail] |
2020-07-20 16:35 |
Online |
Online |
A Study on Construction of Probablistic Homomorphic Encryption Using Stochastic Computing. Ryusuke Koseki, Rei Ueno, Naofumi Homma (Tohoku Univ.) ISEC2020-23 SITE2020-20 BioX2020-26 HWS2020-16 ICSS2020-10 EMM2020-20 |
In this paper, we describe a construct and evaluation of probabilistic homomorphic encryption (PHE)scheme. PHE is const... [more] |
ISEC2020-23 SITE2020-20 BioX2020-26 HWS2020-16 ICSS2020-10 EMM2020-20 pp.61-67 |
SITE, ISEC, HWS, EMM, BioX, IPSJ-CSEC, IPSJ-SPT, ICSS [detail] |
2020-07-21 11:15 |
Online |
Online |
Side-channel Analysis on Message Authentication Code for Controller Area Network Kensei Nagato, Ville Yli-Mayry, Rei Ueno (Tohoku Univ.), Tsuyoshi Toyama, Hisashi Oguma (TOYOTA), Naohumi Homma (Tohoku Univ.) ISEC2020-27 SITE2020-24 BioX2020-30 HWS2020-20 ICSS2020-14 EMM2020-24 |
[more] |
ISEC2020-27 SITE2020-24 BioX2020-30 HWS2020-20 ICSS2020-14 EMM2020-24 pp.87-92 |
HWS |
2020-04-07 |
Online |
Online |
EM Analysis Attack on FPGA implementation of Binarized Neural Network Ville Yli-Mayry, Akira Ito, Rei Ueno (Tohoku Univ.), Shivam Bhasin (Nanyang Technological Univ.), Dirmanto Jap (Nanyang Technological University), Naofumi Homma (Tohoku Univ.) HWS2020-5 |
[more] |
HWS2020-5 pp.25-28 |
HWS, ICD [detail] |
2019-11-01 13:50 |
Osaka |
DNP Namba SS Bld. |
A Study on Correlation Electromagnetics Analysis on Pairing-based Cryptographic Hardware of Unified Hardware Yuma Kadowaki, Rei Ueno, Ville Yli-Mäyry (Tohoku Univ.), Daisuke Fujimoto, Yuichi Hayashi (NAIST), Makoto Nagata (Kobe Univ.), Makoto Ikeda (UT), Tsutomu Matsumto (YNU), Naofumi Homma (Tohoku Univ.) HWS2019-59 ICD2019-20 |
[more] |
HWS2019-59 ICD2019-20 pp.13-18 |
HWS, ICD [detail] |
2019-11-01 14:15 |
Osaka |
DNP Namba SS Bld. |
A Design of Isogeny-Based Cryptographic Hardware Architecture Using Residue Number System Shuto Funakoshi, Rei Ueno, Naofumi Homma (Tohoku Univ.) HWS2019-60 ICD2019-21 |
In this paper, we will propose an efficient hardware architecture of isogeny-based cryptography. The proposed architectu... [more] |
HWS2019-60 ICD2019-21 pp.19-24 |
ISEC, SITE, ICSS, EMM, HWS, BioX, IPSJ-CSEC, IPSJ-SPT [detail] |
2019-07-23 13:10 |
Kochi |
Kochi University of Technology |
A Formal Approach to Verifying Trojan-freeness of Cryptographic Circuits Based on Galois-Field Arithmetic Akira Ito, Rei Ueno, Naofumi Homma (Tohoku Univ.) ISEC2019-26 SITE2019-20 BioX2019-18 HWS2019-21 ICSS2019-24 EMM2019-29 |
This paper proposes a formal method for verifying whether Hardware Trojan (HT) exists or not (i.e., HT-freeness) in cryp... [more] |
ISEC2019-26 SITE2019-20 BioX2019-18 HWS2019-21 ICSS2019-24 EMM2019-29 pp.133-138 |
ISEC, SITE, ICSS, EMM, HWS, BioX, IPSJ-CSEC, IPSJ-SPT [detail] |
2019-07-24 14:10 |
Kochi |
Kochi University of Technology |
Design of Highly Efficient AES Hardware Architectures Based on Multiplicative-Offset Rei Ueno (Tohoku Univ.), Sumio Morioka (IST), Noriyuki Miura, Kohei Matsuda, Makoto Nagata (Kobe Univ.), Shivam Bhasin (NTU), Yves Mathieu, Tarik Graba, Jean-Luc Danger (TPT), Naofumi Homma (Tohoku Univ.) ISEC2019-58 SITE2019-52 BioX2019-50 HWS2019-53 ICSS2019-56 EMM2019-61 |
This paper presents high throughput/gate hardware architectures. In order to achieve a high area-time efficiency, the pr... [more] |
ISEC2019-58 SITE2019-52 BioX2019-50 HWS2019-53 ICSS2019-56 EMM2019-61 pp.375-382 |
HWS |
2019-04-12 14:20 |
Miyagi |
Tohoku University |
Design of Unified Hardware Architecture for GF-Arithmetic Authenticated Encryption Schemes Shotaro Sawataishi, Rei Ueno, Naofumi Homma (Tohoku Univ.) HWS2019-3 |
This paper presents an efficient unified hardware for several authenticated encryption schemes based on Galois-field (GF... [more] |
HWS2019-3 pp.13-18 |
HWS (2nd) |
2018-12-13 11:10 |
Tokyo |
Tokyo Univ. Takeda Bldg. Takeda Hall |
Tamper-Evident Cryptographic Key Storage Based on Weak PUF Rei Ueno, Noafumi Homma (Tohoku Univ.) |
(Advance abstract in Japanese is available) [more] |
|
HWS, ICD |
2018-10-29 15:20 |
Osaka |
Kobe Univ. Umeda Intelligent Laboratory |
A Design and Implementation of Ring-LWE Cryptography Hardware Based on Number Theoretic Transform Sora Endo, Rei Ueno, Takafumi Aoki, Naofumi Homma (Tohoku Univ.) HWS2018-52 ICD2018-44 |
This paper presents an efficient Ring-LWE cryptographic hardware architecture based on number theoretic transformation. ... [more] |
HWS2018-52 ICD2018-44 pp.31-34 |
HWS, ICD |
2018-10-29 16:00 |
Osaka |
Kobe Univ. Umeda Intelligent Laboratory |
Evaluation of Availability on Cache Leakage from OSS-RSA Hayato Mori, Rei Ueno (Tohoku Univ.), Junko Takahashi (NTT), Yuichi Hayashi (naist), Naohumi Honma (Tohoku Univ.) HWS2018-53 ICD2018-45 |
In recent years, a new cache attack against RSA encryption using the time difference of operations, named SWL (SWL: Slid... [more] |
HWS2018-53 ICD2018-45 pp.35-40 |
HWS, ISEC, SITE, ICSS, EMM, IPSJ-CSEC, IPSJ-SPT [detail] |
2018-07-26 15:25 |
Hokkaido |
Sapporo Convention Center |
A Study on Systematic Insertion of Hardware Trojan Based on Path Delay Akira Ito, Rei Ueno, Naofumi Homma, Takafumi Aoki (Tohoku Univ.) ISEC2018-44 SITE2018-36 HWS2018-41 ICSS2018-47 EMM2018-43 |
This paper presents a non-reversible and analytical method for inserting a path delay hardware Trojan (PDHT). The conven... [more] |
ISEC2018-44 SITE2018-36 HWS2018-41 ICSS2018-47 EMM2018-43 pp.349-356 |
HWS |
2018-04-13 13:30 |
Fukuoka |
|
AES-OTR Hardware Architecture and Its Evaluation Rei Ueno, Noafumi Homma (Tohoku Univ.), Tomonori Iida (YDK), Kazuhiko Minematsu (NEC) HWS2018-4 |
This paper reports a hardware implementation of AES-OTR, an authenticated encryption schemes based on AES. AES-OTR is a ... [more] |
HWS2018-4 pp.17-21 |
HWS (2nd) |
2017-09-15 16:30 |
Tokyo |
|
Stable and Efficient Key Generation Based on Multiple-Velued PUF Manami Suzuki, Rei Ueno, Naofumi Homma, Takafumi Aoki (Tohoku Univ.) |
(Advance abstract in Japanese is available) [more] |
|