IEICE Technical Committee Submission System
Conference Schedule
Online Proceedings
[Sign in]
Tech. Rep. Archives
    [Japanese] / [English] 
( Committee/Place/Topics  ) --Press->
 
( Paper Keywords:  /  Column:Title Auth. Affi. Abst. Keyword ) --Press->

All Technical Committee Conferences  (Searched in: All Years)

Search Results: Conference Papers
 Conference Papers (Available on Advance Programs)  (Sort by: Date Descending)
 Results 21 - 40 of 69 [Previous]  /  [Next]  
Committee Date Time Place Paper Title / Authors Abstract Paper #
HWS 2021-04-12
14:40
Tokyo Tokyo University/Online
(Primary: On-site, Secondary: Online)
On the Performance Evaluation of Deep-Learning Based Side-Channel Attacks
Akira Ito, Rei Ueno, Naofumi Homma (Tohoku Univ.) HWS2021-8
This paper presents a method for estimating the lower bound of success rate (SR) and the upper bound of guessing entropy... [more] HWS2021-8
pp.33-38
HWS, VLD [detail] 2021-03-04
15:20
Online Online Power Analysis Attack on a Unrolled Midori128 and its Evaluation
Shu Takemoto, Yoshiya Ikezaki, Yusuke Nozaki, Masaya Yoshikawa (Meijo Univ.) VLD2020-87 HWS2020-62
The lightweight block cipher Midori has been proposed as a cryptographic algorithm for low-power operation, which is imp... [more] VLD2020-87 HWS2020-62
pp.108-113
ICD, HWS [detail] 2020-10-26
09:00
Online Online Examination of requirements for power side-channel attack resistance evaluation boards of cryptographic integrated circuits -- PDN transfer impedance contributing to leakage strength --
Tomonobu Kan, Kengo Iokibe, Yoshitaka Toyota (Okayama Univ.) HWS2020-25 ICD2020-14
When evaluating the resistance of a cryptographic circuit to power analysis attacks by measurement, it is not easy to ev... [more] HWS2020-25 ICD2020-14
pp.1-6
ICD, HWS [detail] 2020-10-26
11:20
Online Online Feasibility of lattice attacks on ECDSA
Kotaro Abe, Makoto Ikeda (Tokyo Univ.) HWS2020-30 ICD2020-19
ECDSA secret key is recovered via lattice attacks when only a few bits of nonce$(k)$ are leaked. In this paper, we evalu... [more] HWS2020-30 ICD2020-19
pp.30-35
SITE, ISEC, HWS, EMM, BioX, IPSJ-CSEC, IPSJ-SPT, ICSS [detail] 2020-07-20
13:50
Online Online Side Channel Attack on CRT-RSA Using Sliding Window with Exponent Blinding
Soki Osawa, Rei Ueno, Naofumi Homma (Tohoku Univ.) ISEC2020-20 SITE2020-17 BioX2020-23 HWS2020-13 ICSS2020-7 EMM2020-17
This paper presents a side-channel attack on CRT-RSA. Some open-source cryptographic libraries (e.g.,
Libgcrypt) employ... [more]
ISEC2020-20 SITE2020-17 BioX2020-23 HWS2020-13 ICSS2020-7 EMM2020-17
pp.39-45
HWS 2020-04-07 Online Online A Study on Timing Information Acquiring Methodology for TLB Side-Channel Attacks
Yuki Matsumoto (Kyushu Univ.), Yuichiro Dan, Junko Takahashi (NTT), Takatsugu Ono (Kyushu Univ.) HWS2020-6
We report on the method of acquiring Translation Look-aside Buffer (TLB) access latency which required
for implementing... [more]
HWS2020-6
pp.29-34
HWS, VLD [detail] 2020-03-06
13:25
Okinawa Okinawa Ken Seinen Kaikan
(Cancelled but technical report was issued)
Fundamental Study on Side-Channel Attacks on Radio Communication ICs
Ryuuya Ichinose, Sakamoto Junichi, Tsutomu Matsumoto (Yokohama National Univ.) VLD2019-129 HWS2019-102
Radio waves emitted by the radio communication ICs may include some internal information of the ICs, and attackers can o... [more] VLD2019-129 HWS2019-102
pp.203-207
ICSS, IPSJ-SPT 2020-03-02
15:20
Okinawa Okinawa-Ken-Seinen-Kaikan
(Cancelled but technical report was issued)
Evaluating Effectiveness of a Timing Attack on Android Devices in JavaScript
Keisuke Sugita (Kobe Univ.), Ryoichi Isawa (NICT), Masakatsu Morii (Kobe Univ.) ICSS2019-79
(To be available after the conference date) [more] ICSS2019-79
pp.67-71
HWS, ICD [detail] 2019-11-01
15:20
Osaka DNP Namba SS Bld. Fundamental study on an estimation method of output bits from TERO-based TRNG during frequency injection attack
Saki Osuka, Daisuke Fujimoto, Yuichi Hayashi (NAIST) HWS2019-62 ICD2019-23
True random number generators (TRNGs) based on ring oscillators (ROs) are employed in many devices because they can be c... [more] HWS2019-62 ICD2019-23
pp.29-34
ISEC 2019-05-17
10:30
Tokyo Kikai-Shinko-Kaikan Bldg. [Invited Talk] Attacking Noisy Secret CRT-RSA Exponents in Binary Method (from ICISC 2018)
Kento Oonishi, Noboru Kunihiro (UTokyo) ISEC2019-2
In this presentation, we give a security evaluation on the RSA encryption scheme with the Chinese remainder theorem (CRT... [more] ISEC2019-2
p.3
IT, ISEC, WBS 2019-03-08
15:20
Tokyo University of Electro-Communications Key Reocvery Atttack on Ring-LWE Scheme Using Side-Channel Information in Number Theoretic Transform
Kento Oonishi, Noboru Kunihiro (Tokyo Univ.) IT2018-112 ISEC2018-118 WBS2018-113
Recently, the researches of post-quantum cryptography are conducted because of the realization of quantum computers in t... [more] IT2018-112 ISEC2018-118 WBS2018-113
pp.229-234
EMCJ, IEE-EMC, IEE-MAG 2018-11-22
11:30
Overseas KAIST [Invited Talk] Security Simulation of Cryptographic Module in Side-Channel Attack
Kengo Iokibe, Yoshitaka Toyota (Okayama Univ.) EMCJ2018-61
Side-channel attacks (SCAs) are one of the biggest threats to cryptography and one of important issues in IoT modules, c... [more] EMCJ2018-61
p.19
HWS, ISEC, SITE, ICSS, EMM, IPSJ-CSEC, IPSJ-SPT [detail] 2018-07-26
14:35
Hokkaido Sapporo Convention Center Side-Channel Countermeasure for XOR based PUF and Its Evaluation
Yusuke Nozaki, Masaya Yoshikawa (Meijo Univ.) ISEC2018-42 SITE2018-34 HWS2018-39 ICSS2018-45 EMM2018-41
XOR based physical unclonable functions (PUFs) have been proposed as countermeasures against modeling attacks. On the ot... [more] ISEC2018-42 SITE2018-34 HWS2018-39 ICSS2018-45 EMM2018-41
pp.337-342
EMCJ, IEE-EMC, MW, EST [detail] 2016-10-21
09:00
Miyagi Tohoku Univ. Attempt for Determining Cryptographic Circuit Blocks Leaking Side-Channel Information Based on Internal Current Source -- Examination with FPGA Implementation of AES Circuits --
Kengo Iokibe, Naoki Kawata, Yusuke Yano, Hiroto Kagotani, Yoshitaka Toyota (Okayama Univ.) EMCJ2016-74 MW2016-106 EST2016-70
For efficient security enhancement of cryptographic ICs against side-channel attacks (SCAs), it is important to identify... [more] EMCJ2016-74 MW2016-106 EST2016-70
pp.79-84
VLD, CAS, MSS, SIP 2016-06-17
16:10
Aomori Hirosaki Shiritsu Kanko-kan Tamper Resistant Asynchronous Pipeline Circuits using Random Delay Elements
Daiki Toyoshima, Atsushi Kurokawa, Masashi Imai (Hirosaki Univ.) CAS2016-34 VLD2016-40 SIP2016-68 MSS2016-34
Asynchronous bundled-data transfer circuits use delay elements as a strobe signal which indicates the stable state of th... [more] CAS2016-34 VLD2016-40 SIP2016-68 MSS2016-34
pp.185-190
SIS, IPSJ-AVM 2015-09-03
13:10
Osaka Kansai Univ. [Tutorial Lecture] Side-channel Attack on Cryptographic Embedded Systems and Its Countermeasure
Naofumi Homma (Tohoku Univ.) SIS2015-18
Cryptography is an indispensable technology to construct safe and secure information-driven society, and systems includi... [more] SIS2015-18
pp.19-24
VLD, IPSJ-SLDM 2015-05-14
15:25
Fukuoka Kitakyushu International Conference Center AES Encryption Circuit against Clock Glitch based Fault Analysis
Daisuke Hirano, Youhua Shi, Nozomu Togawa, Masao Yanagisawa (Waseda Univ) VLD2015-7
Recently, fault analysis has attracted a lot of attentions as a new kind of side channel attack methods,in which malicio... [more] VLD2015-7
pp.51-55
DC, CPSY 2015-04-17
16:40
Tokyo   Frequency Domain aware Power Analysis based on Two Steps Hierarchal Alignment Method
Yusuke Nozaki, Masaya Yoshikawa (Meijo Univ.) CPSY2015-14 DC2015-14
The thread of side-channel attacks is pointed out in recently times. Side-channel attacks utilize power consumption or e... [more] CPSY2015-14 DC2015-14
pp.77-82
ICSS 2015-03-04
09:25
Okinawa Meio Univiersity Scalar Multiplication Algorithm with Resistance for Side-channel Attacks
Keisuke Kito (JAIST), Atsuko Miyaji (JAIST/JST CREST), Ryota Takahashi (JAIST) ICSS2014-77
Elliptic curve cryptosystems require shorter key length than traditional cryptosystems. It is good that scalar multiplic... [more] ICSS2014-77
pp.85-90
ISEC, IT, WBS 2015-03-03
13:15
Fukuoka The University of Kitakyushu [Invited Talk] Fast and Secure Implementation of Cryptography and its Practical Application
Shinichi Kawamura (Toshiba) IT2014-99 ISEC2014-112 WBS2014-91
The author will talk about his past research on implementation of cryptography. For the practical use of cryptography, i... [more] IT2014-99 ISEC2014-112 WBS2014-91
pp.231-238
 Results 21 - 40 of 69 [Previous]  /  [Next]  
Choose a download format for default settings. [NEW !!]
Text format pLaTeX format CSV format BibTeX format
Copyright and reproduction : All rights are reserved and no part of this publication may be reproduced or transmitted in any form or by any means, electronic or mechanical, including photocopy, recording, or any information storage and retrieval system, without permission in writing from the publisher. Notwithstanding, instructors are permitted to photocopy isolated articles for noncommercial classroom use without fee. (License No.: 10GA0019/12GB0052/13GB0056/17GB0034/18GB0034)


[Return to Top Page]

[Return to IEICE Web Page]


The Institute of Electronics, Information and Communication Engineers (IEICE), Japan