Committee |
Date Time |
Place |
Paper Title / Authors |
Abstract |
Paper # |
HWS |
2021-04-12 14:40 |
Tokyo |
Tokyo University/Online (Primary: On-site, Secondary: Online) |
On the Performance Evaluation of Deep-Learning Based Side-Channel Attacks Akira Ito, Rei Ueno, Naofumi Homma (Tohoku Univ.) HWS2021-8 |
This paper presents a method for estimating the lower bound of success rate (SR) and the upper bound of guessing entropy... [more] |
HWS2021-8 pp.33-38 |
HWS, VLD [detail] |
2021-03-04 15:20 |
Online |
Online |
Power Analysis Attack on a Unrolled Midori128 and its Evaluation Shu Takemoto, Yoshiya Ikezaki, Yusuke Nozaki, Masaya Yoshikawa (Meijo Univ.) VLD2020-87 HWS2020-62 |
The lightweight block cipher Midori has been proposed as a cryptographic algorithm for low-power operation, which is imp... [more] |
VLD2020-87 HWS2020-62 pp.108-113 |
ICD, HWS [detail] |
2020-10-26 09:00 |
Online |
Online |
Examination of requirements for power side-channel attack resistance evaluation boards of cryptographic integrated circuits
-- PDN transfer impedance contributing to leakage strength -- Tomonobu Kan, Kengo Iokibe, Yoshitaka Toyota (Okayama Univ.) HWS2020-25 ICD2020-14 |
When evaluating the resistance of a cryptographic circuit to power analysis attacks by measurement, it is not easy to ev... [more] |
HWS2020-25 ICD2020-14 pp.1-6 |
ICD, HWS [detail] |
2020-10-26 11:20 |
Online |
Online |
Feasibility of lattice attacks on ECDSA Kotaro Abe, Makoto Ikeda (Tokyo Univ.) HWS2020-30 ICD2020-19 |
ECDSA secret key is recovered via lattice attacks when only a few bits of nonce$(k)$ are leaked. In this paper, we evalu... [more] |
HWS2020-30 ICD2020-19 pp.30-35 |
SITE, ISEC, HWS, EMM, BioX, IPSJ-CSEC, IPSJ-SPT, ICSS [detail] |
2020-07-20 13:50 |
Online |
Online |
Side Channel Attack on CRT-RSA Using Sliding Window with Exponent Blinding Soki Osawa, Rei Ueno, Naofumi Homma (Tohoku Univ.) ISEC2020-20 SITE2020-17 BioX2020-23 HWS2020-13 ICSS2020-7 EMM2020-17 |
This paper presents a side-channel attack on CRT-RSA. Some open-source cryptographic libraries (e.g.,
Libgcrypt) employ... [more] |
ISEC2020-20 SITE2020-17 BioX2020-23 HWS2020-13 ICSS2020-7 EMM2020-17 pp.39-45 |
HWS |
2020-04-07 |
Online |
Online |
A Study on Timing Information Acquiring Methodology for TLB Side-Channel Attacks Yuki Matsumoto (Kyushu Univ.), Yuichiro Dan, Junko Takahashi (NTT), Takatsugu Ono (Kyushu Univ.) HWS2020-6 |
We report on the method of acquiring Translation Look-aside Buffer (TLB) access latency which required
for implementing... [more] |
HWS2020-6 pp.29-34 |
HWS, VLD [detail] |
2020-03-06 13:25 |
Okinawa |
Okinawa Ken Seinen Kaikan (Cancelled but technical report was issued) |
Fundamental Study on Side-Channel Attacks on Radio Communication ICs Ryuuya Ichinose, Sakamoto Junichi, Tsutomu Matsumoto (Yokohama National Univ.) VLD2019-129 HWS2019-102 |
Radio waves emitted by the radio communication ICs may include some internal information of the ICs, and attackers can o... [more] |
VLD2019-129 HWS2019-102 pp.203-207 |
ICSS, IPSJ-SPT |
2020-03-02 15:20 |
Okinawa |
Okinawa-Ken-Seinen-Kaikan (Cancelled but technical report was issued) |
Evaluating Effectiveness of a Timing Attack on Android Devices in JavaScript Keisuke Sugita (Kobe Univ.), Ryoichi Isawa (NICT), Masakatsu Morii (Kobe Univ.) ICSS2019-79 |
(To be available after the conference date) [more] |
ICSS2019-79 pp.67-71 |
HWS, ICD [detail] |
2019-11-01 15:20 |
Osaka |
DNP Namba SS Bld. |
Fundamental study on an estimation method of output bits from TERO-based TRNG during frequency injection attack Saki Osuka, Daisuke Fujimoto, Yuichi Hayashi (NAIST) HWS2019-62 ICD2019-23 |
True random number generators (TRNGs) based on ring oscillators (ROs) are employed in many devices because they can be c... [more] |
HWS2019-62 ICD2019-23 pp.29-34 |
ISEC |
2019-05-17 10:30 |
Tokyo |
Kikai-Shinko-Kaikan Bldg. |
[Invited Talk]
Attacking Noisy Secret CRT-RSA Exponents in Binary Method (from ICISC 2018) Kento Oonishi, Noboru Kunihiro (UTokyo) ISEC2019-2 |
In this presentation, we give a security evaluation on the RSA encryption scheme with the Chinese remainder theorem (CRT... [more] |
ISEC2019-2 p.3 |
IT, ISEC, WBS |
2019-03-08 15:20 |
Tokyo |
University of Electro-Communications |
Key Reocvery Atttack on Ring-LWE Scheme Using Side-Channel Information in Number Theoretic Transform Kento Oonishi, Noboru Kunihiro (Tokyo Univ.) IT2018-112 ISEC2018-118 WBS2018-113 |
Recently, the researches of post-quantum cryptography are conducted because of the realization of quantum computers in t... [more] |
IT2018-112 ISEC2018-118 WBS2018-113 pp.229-234 |
EMCJ, IEE-EMC, IEE-MAG |
2018-11-22 11:30 |
Overseas |
KAIST |
[Invited Talk]
Security Simulation of Cryptographic Module in Side-Channel Attack Kengo Iokibe, Yoshitaka Toyota (Okayama Univ.) EMCJ2018-61 |
Side-channel attacks (SCAs) are one of the biggest threats to cryptography and one of important issues in IoT modules, c... [more] |
EMCJ2018-61 p.19 |
HWS, ISEC, SITE, ICSS, EMM, IPSJ-CSEC, IPSJ-SPT [detail] |
2018-07-26 14:35 |
Hokkaido |
Sapporo Convention Center |
Side-Channel Countermeasure for XOR based PUF and Its Evaluation Yusuke Nozaki, Masaya Yoshikawa (Meijo Univ.) ISEC2018-42 SITE2018-34 HWS2018-39 ICSS2018-45 EMM2018-41 |
XOR based physical unclonable functions (PUFs) have been proposed as countermeasures against modeling attacks. On the ot... [more] |
ISEC2018-42 SITE2018-34 HWS2018-39 ICSS2018-45 EMM2018-41 pp.337-342 |
EMCJ, IEE-EMC, MW, EST [detail] |
2016-10-21 09:00 |
Miyagi |
Tohoku Univ. |
Attempt for Determining Cryptographic Circuit Blocks Leaking Side-Channel Information Based on Internal Current Source
-- Examination with FPGA Implementation of AES Circuits -- Kengo Iokibe, Naoki Kawata, Yusuke Yano, Hiroto Kagotani, Yoshitaka Toyota (Okayama Univ.) EMCJ2016-74 MW2016-106 EST2016-70 |
For efficient security enhancement of cryptographic ICs against side-channel attacks (SCAs), it is important to identify... [more] |
EMCJ2016-74 MW2016-106 EST2016-70 pp.79-84 |
VLD, CAS, MSS, SIP |
2016-06-17 16:10 |
Aomori |
Hirosaki Shiritsu Kanko-kan |
Tamper Resistant Asynchronous Pipeline Circuits using Random Delay Elements Daiki Toyoshima, Atsushi Kurokawa, Masashi Imai (Hirosaki Univ.) CAS2016-34 VLD2016-40 SIP2016-68 MSS2016-34 |
Asynchronous bundled-data transfer circuits use delay elements as a strobe signal which indicates the stable state of th... [more] |
CAS2016-34 VLD2016-40 SIP2016-68 MSS2016-34 pp.185-190 |
SIS, IPSJ-AVM |
2015-09-03 13:10 |
Osaka |
Kansai Univ. |
[Tutorial Lecture]
Side-channel Attack on Cryptographic Embedded Systems and Its Countermeasure Naofumi Homma (Tohoku Univ.) SIS2015-18 |
Cryptography is an indispensable technology to construct safe and secure information-driven society, and systems includi... [more] |
SIS2015-18 pp.19-24 |
VLD, IPSJ-SLDM |
2015-05-14 15:25 |
Fukuoka |
Kitakyushu International Conference Center |
AES Encryption Circuit against Clock Glitch based Fault Analysis Daisuke Hirano, Youhua Shi, Nozomu Togawa, Masao Yanagisawa (Waseda Univ) VLD2015-7 |
Recently, fault analysis has attracted a lot of attentions as a new kind of side channel attack methods,in which malicio... [more] |
VLD2015-7 pp.51-55 |
DC, CPSY |
2015-04-17 16:40 |
Tokyo |
|
Frequency Domain aware Power Analysis based on Two Steps Hierarchal Alignment Method Yusuke Nozaki, Masaya Yoshikawa (Meijo Univ.) CPSY2015-14 DC2015-14 |
The thread of side-channel attacks is pointed out in recently times. Side-channel attacks utilize power consumption or e... [more] |
CPSY2015-14 DC2015-14 pp.77-82 |
ICSS |
2015-03-04 09:25 |
Okinawa |
Meio Univiersity |
Scalar Multiplication Algorithm with Resistance for Side-channel Attacks Keisuke Kito (JAIST), Atsuko Miyaji (JAIST/JST CREST), Ryota Takahashi (JAIST) ICSS2014-77 |
Elliptic curve cryptosystems require shorter key length than traditional cryptosystems. It is good that scalar multiplic... [more] |
ICSS2014-77 pp.85-90 |
ISEC, IT, WBS |
2015-03-03 13:15 |
Fukuoka |
The University of Kitakyushu |
[Invited Talk]
Fast and Secure Implementation of Cryptography and its Practical Application Shinichi Kawamura (Toshiba) IT2014-99 ISEC2014-112 WBS2014-91 |
The author will talk about his past research on implementation of cryptography. For the practical use of cryptography, i... [more] |
IT2014-99 ISEC2014-112 WBS2014-91 pp.231-238 |