IEICE Technical Committee Submission System
Conference Schedule
Online Proceedings
[Sign in]
Tech. Rep. Archives
    [Japanese] / [English] 
( Committee/Place/Topics  ) --Press->
 
( Paper Keywords:  /  Column:Title Auth. Affi. Abst. Keyword ) --Press->

All Technical Committee Conferences  (Searched in: All Years)

Search Results: Conference Papers
 Conference Papers (Available on Advance Programs)  (Sort by: Date Descending)
 Results 21 - 40 of 50 [Previous]  /  [Next]  
Committee Date Time Place Paper Title / Authors Abstract Paper #
CAS, CS 2022-03-04
14:35
Online Online Unrolled Architecture oriented Countermeasure Circuit for Low-power Cryptography Midori128 and its Evaluation
Shunsuke Miwa, Shu Takemoto, Yusuke Nozaki, Masaya Yoshikawa (Meijo Univ.) CAS2021-96 CS2021-98
The number of IoT devices is growing rapidly, ensuring security in those devices is an important issue. Lightweight bloc... [more] CAS2021-96 CS2021-98
pp.118-123
AI 2022-02-28
15:00
Miyazaki Youth Hostel Sunflower MIYAZAKI
(Primary: On-site, Secondary: Online)
Basic Study for Backdoor Attack based on Invisible Trigger
Ryo Kumagai, Shu Takemoto, Yusuke Nozaki, Masaya Yoshikawa (Meijo Univ.) AI2021-21
A backdoor attack is a threat to deep neural networks (DNN). In an attack on a DNN for the purpose of image classificati... [more] AI2021-21
pp.53-58
IE, ITS, ITE-AIT, ITE-ME, ITE-MMS [detail] 2022-02-22
11:55
Online Online Bit-plane oriented Detection method of Malicious Code Hidden in the Image
Ryo Kumagai, Shu Takemoto, Yusuke Nozaki, Masaya Yoshikawa (Meijo Univ.) ITS2021-50 IE2021-59
With the increasing importance of cyberspace, the threat of malware has also been increasing. Malware which hides malici... [more] ITS2021-50 IE2021-59
pp.151-156
HWS, VLD [detail] 2021-03-04
15:20
Online Online Power Analysis Attack on a Unrolled Midori128 and its Evaluation
Shu Takemoto, Yoshiya Ikezaki, Yusuke Nozaki, Masaya Yoshikawa (Meijo Univ.) VLD2020-87 HWS2020-62
The lightweight block cipher Midori has been proposed as a cryptographic algorithm for low-power operation, which is imp... [more] VLD2020-87 HWS2020-62
pp.108-113
ICSS, IPSJ-SPT 2021-03-02
16:25
Online Online Security Evaluation of PUF utilizing Unrolled Architecture
Yusuke Nozaki, Kensaku Asahi, Masaya Yoshikawa (Meijo Univ.) ICSS2020-53
To improve the security of LSI circuit, physically unclonable functions (PUF) have been attracted attention. The glitch ... [more] ICSS2020-53
pp.160-165
ICD, HWS [detail] 2020-10-26
15:20
Online Online Hardware Trojan using LUT Structure of AI Inference Devices
Yusuke Nozaki, Shu Takemoto, Yoshiya Ikezaki, Masaya Yoshikawa (Meijo Univ.) HWS2020-36 ICD2020-25
The artificial intelligence (AI) technology has been attracted attention in several fields. On the other hand, security ... [more] HWS2020-36 ICD2020-25
pp.65-70
ICD, HWS [detail] 2020-10-26
15:45
Online Online Low-Latency Countermeasure Circuit Oriented Hardware Trojan and its Evaluation
Shu Takemoto, Yoshiya Ikezaki, Yusuke Nozaki, Masaya Yoshikawa (Meijo Univ.) HWS2020-37 ICD2020-26
Outsourcing and the use of IP are the mainstream in the design and manufacturing of system LSIs. On the other hand, the ... [more] HWS2020-37 ICD2020-26
pp.71-76
DC 2020-02-26
12:25
Tokyo   Glitch PUF utilizing Unrolled Architecture and its Evaluation
Yusuke Nozaki, Masaya Yoshikawa (Meijo Univ.) DC2019-91
The physically unclonable functions (PUFs) have attracted attention as technologies for authentication of large scale in... [more] DC2019-91
pp.31-36
HWS, VLD 2019-03-01
14:55
Okinawa Okinawa Ken Seinen Kaikan Performance and Security Evaluation of Ring Oscillator PUF Implemented on ASIC
Yusuke Nozaki, Masaya Yoshikawa (Meijo Univ.) VLD2018-131 HWS2018-94
This study evaluates the performance and the security of ring oscillator physical unclonable function (RO PUF) implement... [more] VLD2018-131 HWS2018-94
pp.225-230
HWS, VLD 2019-03-01
15:20
Okinawa Okinawa Ken Seinen Kaikan An Attack with Linear Model Against Improved Arbiter PUF
Susumu Matsumi, Yusuke Nozaki, Masaya Yoshikawa (Meijo Univ.) VLD2018-132 HWS2018-95
Imitations of electronic parts are distributed to the market, which is a serious problem. PUFs have attracted attention ... [more] VLD2018-132 HWS2018-95
pp.231-236
HWS, VLD 2019-03-01
16:20
Okinawa Okinawa Ken Seinen Kaikan Low-Cost Power Analysis Countermeasures for Unrolled Architecture Implementation PRINCE
Shu Takemoto, Yusuke Nozaki, Masaya Yoshikawa (Meijo Univ.) VLD2018-134 HWS2018-97
Lightweight block ciphers, which can be implemented with low cost, are suitable for improving the safety of small device... [more] VLD2018-134 HWS2018-97
pp.243-248
HWS, VLD 2019-03-01
16:45
Okinawa Okinawa Ken Seinen Kaikan A Counter Synchronization Method for MAC generation in CAN Communication
Kanata Nishida, Yusuke Nozaki, Masaya Yoshikawa (Meijo Univ.) VLD2018-135 HWS2018-98
The control of the automobile is realized by ECU. CAN is widely used as a network connecting the ECU. However, since CAN... [more] VLD2018-135 HWS2018-98
pp.249-254
VLD, DC, CPSY, RECONF, CPM, ICD, IE, IPSJ-SLDM, IPSJ-EMB, IPSJ-ARC
(Joint) [detail]
2018-12-06
09:50
Hiroshima Satellite Campus Hiroshima Secure PUF Authentication Method against Machine Learning Attack
Yusuke Nozaki, Masaya Yoshikawa (Meijo Univ.) VLD2018-49 DC2018-35
It has been reported that the challenge and response authentication, which is a typical PUF authentication method, is vu... [more] VLD2018-49 DC2018-35
pp.77-82
HWS, ISEC, SITE, ICSS, EMM, IPSJ-CSEC, IPSJ-SPT [detail] 2018-07-26
14:35
Hokkaido Sapporo Convention Center Side-Channel Countermeasure for XOR based PUF and Its Evaluation
Yusuke Nozaki, Masaya Yoshikawa (Meijo Univ.) ISEC2018-42 SITE2018-34 HWS2018-39 ICSS2018-45 EMM2018-41
XOR based physical unclonable functions (PUFs) have been proposed as countermeasures against modeling attacks. On the ot... [more] ISEC2018-42 SITE2018-34 HWS2018-39 ICSS2018-45 EMM2018-41
pp.337-342
VLD, HWS
(Joint)
2018-03-02
14:55
Okinawa Okinawa Seinen Kaikan Machine Learning Attack Using Selectable Challenge Set for Feed-Forward PUF
Yusuke Nozaki, Masaya Yoshikawa (Meijo Univ.) VLD2017-128
The dreadful of machine learning attack for physical unclonable functions (PUFs) has been reported. Therefore, PUFs with... [more] VLD2017-128
pp.237-242
NLP 2017-07-14
10:25
Okinawa Miyako Island Marine Terminal Power Analysis Attack for SIMON-JAMBU
Yusuke Nozaki, Masaya Yoshikawa (Meijo Univ.) NLP2017-40
Authenticated encryption mode, which can perform the encryption of data and the authentication simultaneously, has been ... [more] NLP2017-40
pp.67-72
NLP 2016-12-12
15:50
Aichi Chukyo Univ. Fault Analysis for Midori
Yusuke Nozaki, Masaya Yoshikawa (Meijo Univ.) NLP2016-90
Lightweight block ciphers, which can be utilized in low power and small area, have attracted attention in the security o... [more] NLP2016-90
pp.33-38
MSS, CAS, IPSJ-AL [detail] 2016-11-24
10:00
Hyogo Kobe Institute of Computing Hardware Trojan with Sensor Trigger
Takato Iwase, Yusuke Nozaki, Masaya Yoshikawa (Meijo Univ.) CAS2016-58 MSS2016-38
Recently, in-vehicle system technology has been rapidly developed. However, in-vehicle system is vulnerable because of s... [more] CAS2016-58 MSS2016-38
pp.1-6
CAS, NLP 2016-10-28
10:20
Tokyo   Power Analysis Attack for Midori
Yusuke Nozaki, Masaya Yoshikawa (Meijo Univ.) CAS2016-53 NLP2016-79
Recently, lightweight block ciphers, which can be implemented on small area and low energy, have attracted attention. Mi... [more] CAS2016-53 NLP2016-79
pp.79-84
VLD 2016-03-01
10:30
Okinawa Okinawa Seinen Kaikan Electromagnetic Analysis Attack for Simeck and Simon
Yusuke Nozaki, Masaya Yoshikawa (Meijo Univ.) VLD2015-121
The risk of attack against IoT devices has been increased. Since IoT devices require constraint of area and power consum... [more] VLD2015-121
pp.61-66
 Results 21 - 40 of 50 [Previous]  /  [Next]  
Choose a download format for default settings. [NEW !!]
Text format pLaTeX format CSV format BibTeX format
Copyright and reproduction : All rights are reserved and no part of this publication may be reproduced or transmitted in any form or by any means, electronic or mechanical, including photocopy, recording, or any information storage and retrieval system, without permission in writing from the publisher. Notwithstanding, instructors are permitted to photocopy isolated articles for noncommercial classroom use without fee. (License No.: 10GA0019/12GB0052/13GB0056/17GB0034/18GB0034)


[Return to Top Page]

[Return to IEICE Web Page]


The Institute of Electronics, Information and Communication Engineers (IEICE), Japan