Committee |
Date Time |
Place |
Paper Title / Authors |
Abstract |
Paper # |
EMM, BioX, ISEC, SITE, ICSS, HWS, IPSJ-CSEC, IPSJ-SPT [detail] |
2022-07-19 13:00 |
Online |
Online |
Side-Channel Attacks on Post-Quantum KEMs Using Multi-class Classification Neural Network Yutaro Tanaka, Rei Ueno (Tohoku Univ.), Keita Xagawa, Akitra Ito, Junko Takahashi (NTT), Naofumi Homma (Tohoku Univ.) ISEC2022-7 SITE2022-11 BioX2022-32 HWS2022-7 ICSS2022-15 EMM2022-15 |
(To be available after the conference date) [more] |
ISEC2022-7 SITE2022-11 BioX2022-32 HWS2022-7 ICSS2022-15 EMM2022-15 pp.1-6 |
EMM, BioX, ISEC, SITE, ICSS, HWS, IPSJ-CSEC, IPSJ-SPT [detail] |
2022-07-19 14:15 |
Online |
Online |
A Study for Predicting Correlation Power Analysis Results by Using High-SNR Plaintexts Selected Based on Linear Leakage Model Masaki Himuro, Kengo Iokibe, Yoshitaka Toyota (Okayama Univ.) ISEC2022-10 SITE2022-14 BioX2022-35 HWS2022-10 ICSS2022-18 EMM2022-18 |
To reduce the number of traces for evaluating side-channel attack (SCA) resistance, some methods for performing correlat... [more] |
ISEC2022-10 SITE2022-14 BioX2022-35 HWS2022-10 ICSS2022-18 EMM2022-18 pp.18-22 |
AI |
2022-07-04 10:40 |
Hokkaido |
(Primary: On-site, Secondary: Online) |
Deep Learning Side-Channel Attacks for Rolled Architecture of PRINCE and Midori128 Shu Takemoto, Yoshiya Ikezaki, Yusuke Nozaki, Masaya Yoshikawa (Meijo Univ.) AI2022-3 |
With the recent expansion of small autonomous mobile robots such as drones, cyber security for small devices is very imp... [more] |
AI2022-3 pp.13-18 |
HWS |
2022-04-26 11:20 |
Tokyo |
AIST Tokyo Waterfront (Annex) (Primary: On-site, Secondary: Online) |
Deep Learning-based Side-Channel Attacks against Software-Implemented RSA using Binary Exponentiation with Dummy Multiplication Seiya Shimada, Kunihiro Kuroda, Yuta Fukuda, Kouta Yoshida, Takeshi Fujino (Ritsumeikan Univ.) HWS2022-3 |
Recently, deep learning-based side-channel attacks (DL-SCA) against symmetric key cryptography such as AES have been rep... [more] |
HWS2022-3 pp.13-18 |
VLD, HWS [detail] |
2022-03-08 14:55 |
Online |
Online |
Evaluation of Side-channel Leaks Specific to Unrolled AES Hardware Ayano Nakashima, Rei Ueno, Naofumi Homma (Tohoku Univ.) VLD2021-100 HWS2021-77 |
This paper presents the evaluation of a unique side-channel leakage occurred from the middle rounds
of (pipelined) unro... [more] |
VLD2021-100 HWS2021-77 pp.135-140 |
ICSS, IPSJ-SPT |
2022-03-08 10:00 |
Online |
Online |
Input predictive attack by keyboard acoustic emanations using BERT and its countermeasures Masahiro Iida (Teikyo Univ.), Mitsuaki Akiyama (NTT), Masaki Kamizono (DTCY), Takahiro Kasama (NICT), Yuichi Hattori (Secure Cycle Inc.), Hiroyuki Inoue (Kyoto Sangyo Univ.), Atsuo Inomata (Osaka Univ.) ICSS2021-67 |
The Keyboard Acoustic Emanations has been proposed to estimate the input key from keystroke sounds as a kind of side-cha... [more] |
ICSS2021-67 pp.49-54 |
HWS, ICD [detail] |
2021-10-19 10:00 |
Online |
Online |
Evaluations of tamper resistance by Wave-FF for Power Analysis Attack on AES Tomoaki Ukezono (Fukuoka Univ.) HWS2021-41 ICD2021-15 |
Dual-Rail design represented by WDDL can be mentioned as a countermeasure against information leakage from power consump... [more] |
HWS2021-41 ICD2021-15 pp.1-6 |
HWS, ICD [detail] |
2021-10-19 10:25 |
Online |
Online |
A Deep-Learning Based Single-Trace Side-Channel Attack on Tamper-Resistant CRT-RSA Software Kotaro Saito, Akira Ito, Rei Ueno, Naofumi Homma (Tohoku Univ.) HWS2021-42 ICD2021-16 |
This paper proposes a deep-learning based single-trace side-channel attack on CRT-RSA software implementation secure aga... [more] |
HWS2021-42 ICD2021-16 pp.7-12 |
SDM, ICD, ITE-IST [detail] |
2021-08-18 15:35 |
Online |
Online |
Evaluation of Side-channel Leakage on High-speed Asynchronous Successive Approximation Register AD Converters Ryozo Takahashi, Kazuki Monta, Takuji Miki, Makoto Nagata (Kobe Univ.) SDM2021-43 ICD2021-14 |
This paper presents an evaluation of security level on high-speed asynchronous successive approximation register (SAR) a... [more] |
SDM2021-43 ICD2021-14 pp.68-71 |
BioX, ISEC, SITE, ICSS, EMM, HWS, IPSJ-CSEC, IPSJ-SPT [detail] |
2021-07-20 14:50 |
Online |
Online |
Deep Learning Side-Channel Attacks against Unprotected AES and RSM-AES Implemented in ASIC Yuta Fukuda, Kota Yoshida, Hisashi Hashimoto, Takeshi Fujino (Ritsumeikan Univ.) ISEC2021-24 SITE2021-18 BioX2021-25 HWS2021-24 ICSS2021-29 EMM2021-29 |
The cryptographic key can be revealed by exploiting side-channel information such as power traces under operation.
Rec... [more] |
ISEC2021-24 SITE2021-18 BioX2021-25 HWS2021-24 ICSS2021-29 EMM2021-29 pp.86-91 |
ISEC |
2021-05-19 15:30 |
Online |
Online |
[Invited Talk]
Simple Electromagnetic Analysis Against Activation Functions of Deep Neural Networks (from AIHWS 2020) Go Takatoi, Takeshi Sugawara, Kazuo Sakiyama (UEC), Yuko Hara-Azumi (Tokyo Tech), Yang Li (UEC) ISEC2021-9 |
This invited abstract is based on the papers [1] and [2]. There are physical attacks such as side-channel attacks that a... [more] |
ISEC2021-9 p.34 |
EMCJ |
2021-04-16 15:00 |
Online |
Online |
Time-Frequency Domain Correlation Power Analysis for Side-Channel Attack Resistance Evaluation of Practical Modules Masaki Himuro, Kengo Iokibe, Yoshitaka Toyota (Okayama Univ.) EMCJ2021-5 |
When evaluating the Side-Channel Attack resistance of a practical module, the correlation coefficient, a measure of side... [more] |
EMCJ2021-5 pp.21-26 |
HWS |
2021-04-12 14:40 |
Tokyo |
Tokyo University/Online (Primary: On-site, Secondary: Online) |
On the Performance Evaluation of Deep-Learning Based Side-Channel Attacks Akira Ito, Rei Ueno, Naofumi Homma (Tohoku Univ.) HWS2021-8 |
This paper presents a method for estimating the lower bound of success rate (SR) and the upper bound of guessing entropy... [more] |
HWS2021-8 pp.33-38 |
HWS, VLD [detail] |
2021-03-04 14:55 |
Online |
Online |
FPGA Implementation of Lightweight Cipher Chaskey through High-Level Synthesis and its Evaluation of Side-Channel Attack Resistance Saya Inagaki, Mingyu Yang (Tokyo Tech), Yang Li, Kazuo Sakiyama (UEC), Yuko Hara (Tokyo Tech) VLD2020-86 HWS2020-61 |
(To be available after the conference date) [more] |
VLD2020-86 HWS2020-61 pp.102-107 |
HWS, VLD [detail] |
2021-03-04 15:20 |
Online |
Online |
Power Analysis Attack on a Unrolled Midori128 and its Evaluation Shu Takemoto, Yoshiya Ikezaki, Yusuke Nozaki, Masaya Yoshikawa (Meijo Univ.) VLD2020-87 HWS2020-62 |
The lightweight block cipher Midori has been proposed as a cryptographic algorithm for low-power operation, which is imp... [more] |
VLD2020-87 HWS2020-62 pp.108-113 |
ICD, HWS [detail] |
2020-10-26 09:00 |
Online |
Online |
Examination of requirements for power side-channel attack resistance evaluation boards of cryptographic integrated circuits
-- PDN transfer impedance contributing to leakage strength -- Tomonobu Kan, Kengo Iokibe, Yoshitaka Toyota (Okayama Univ.) HWS2020-25 ICD2020-14 |
When evaluating the resistance of a cryptographic circuit to power analysis attacks by measurement, it is not easy to ev... [more] |
HWS2020-25 ICD2020-14 pp.1-6 |
ICD, HWS [detail] |
2020-10-26 09:25 |
Online |
Online |
Power Analysis Attack Using Pipeline Scheduling on Pairing Hardware Mitsufumi Yamazaki, Junichi Sakamoto, Tsutomu Matsumoto (YNU) HWS2020-26 ICD2020-15 |
To reduce the latency of pairing calculation for advanced cryptography, hardware implementations with pipelined modular ... [more] |
HWS2020-26 ICD2020-15 pp.7-12 |
ICD, HWS [detail] |
2020-10-26 11:20 |
Online |
Online |
Feasibility of lattice attacks on ECDSA Kotaro Abe, Makoto Ikeda (Tokyo Univ.) HWS2020-30 ICD2020-19 |
ECDSA secret key is recovered via lattice attacks when only a few bits of nonce$(k)$ are leaked. In this paper, we evalu... [more] |
HWS2020-30 ICD2020-19 pp.30-35 |
SITE, ISEC, HWS, EMM, BioX, IPSJ-CSEC, IPSJ-SPT, ICSS [detail] |
2020-07-20 13:50 |
Online |
Online |
Side Channel Attack on CRT-RSA Using Sliding Window with Exponent Blinding Soki Osawa, Rei Ueno, Naofumi Homma (Tohoku Univ.) ISEC2020-20 SITE2020-17 BioX2020-23 HWS2020-13 ICSS2020-7 EMM2020-17 |
This paper presents a side-channel attack on CRT-RSA. Some open-source cryptographic libraries (e.g.,
Libgcrypt) employ... [more] |
ISEC2020-20 SITE2020-17 BioX2020-23 HWS2020-13 ICSS2020-7 EMM2020-17 pp.39-45 |
SITE, ISEC, HWS, EMM, BioX, IPSJ-CSEC, IPSJ-SPT, ICSS [detail] |
2020-07-21 16:35 |
Online |
Online |
Secure and Compact Elliptic Curve LR Scalar Multiplication Yaoan Jin, Atsuko Miyaji (Osaka Univ) ISEC2020-31 SITE2020-28 BioX2020-34 HWS2020-24 ICSS2020-18 EMM2020-28 |
Elliptic curve cryptography (ECC) can ensure an equivalent security with much smaller key sizes. Elliptic curve scalar m... [more] |
ISEC2020-31 SITE2020-28 BioX2020-34 HWS2020-24 ICSS2020-18 EMM2020-28 pp.111-118 |