IEICE Technical Committee Submission System
Conference Schedule
Online Proceedings
[Sign in]
Tech. Rep. Archives
    [Japanese] / [English] 
( Committee/Place/Topics  ) --Press->
 
( Paper Keywords:  /  Column:Title Auth. Affi. Abst. Keyword ) --Press->

All Technical Committee Conferences  (Searched in: All Years)

Search Results: Conference Papers
 Conference Papers (Available on Advance Programs)  (Sort by: Date Descending)
 Results 41 - 60 of 69 [Previous]  /  [Next]  
Committee Date Time Place Paper Title / Authors Abstract Paper #
EMCJ, IEE-EMC 2014-12-19
16:05
Shizuoka Shizuoka Univ. Security Evaluation of CSSAL Countermeasure against Side-Channel Attacks Using Frequency Spectrum Analysis
Cancio Monteiro, Yasuhiro Takahashi, Toshikazu Sekine (Gifu Univ.) EMCJ2014-82
Information leakage on cryptographic devices are possible because of the correlation between the processed data and its ... [more] EMCJ2014-82
pp.75-80
VLD, DC, IPSJ-SLDM, CPSY, RECONF, ICD, CPM
(Joint) [detail]
2014-11-27
16:25
Oita B-ConPlaza Design and study of PUF Circuit using IO-Masked Dual-Rail ROM with Resistance against Side-Channel Attacks
Takashi Nishimura, Akihiro Takeuchi, Mitsuru Shiozaki, Takeshi Fujino (Ritsumeikan Univ.) CPM2014-125 ICD2014-68
Physical unclonable function (PUF) has been proposed as tamper-resistant technique to protect secure device. The PUF ext... [more] CPM2014-125 ICD2014-68
pp.15-20
ICSS, ISEC, SITE, EMM, IPSJ-CSEC, IPSJ-SPT [detail] 2014-07-04
11:30
Hokkaido San-Refure Hakodate Quantitative Evaluation of the Key Information That is Learned through Timing Attack -- The Contribution of Bucketing Technique for RSA Cryptosystem --
Yasuyuki Kobayashi, Yuichi Kaji (NAIST), Hiroyuki Seki (Nagoya Univ.), Minoru Ito (NAIST) ISEC2014-35 SITE2014-30 ICSS2014-39 EMM2014-35
Timing attacks are regarded as serious threats to many practical cryptographic algorithms, but it is difficult to estima... [more] ISEC2014-35 SITE2014-30 ICSS2014-39 EMM2014-35
pp.253-258
CPSY, IPSJ-EMB, IPSJ-SLDM, DC [detail] 2014-03-15
18:05
Okinawa   Design and implementation of tamper-resistant authentication system for vehicle installation using PUF and side-channel attacks resistant AES.
Masashi Nakano, Shintaro Ukai, Megumi Shibatani, Takaya Kubota, Mitsuru Shiozaki, Takeshi Fujino (Ritsumeikan Univ.) CPSY2013-106 DC2013-93
Recently, IC chips implementing encryption circuit is widely used in various applications such as electronic money, cred... [more] CPSY2013-106 DC2013-93
pp.139-144
CPSY, IPSJ-EMB, IPSJ-SLDM, DC [detail] 2014-03-16
15:55
Okinawa   Template Attack in Frequency Domein and Its Evaluation
Yusuke Nozaki, Masaya Yoshikawa (Meijo Univ.) CPSY2013-120 DC2013-107
The encryption standard, such as AES, is certified that its decryption is computationally impossible. However, it was re... [more] CPSY2013-120 DC2013-107
pp.307-312
VLD 2014-03-03
15:35
Okinawa Okinawa Seinen Kaikan Improved scan-based side-channel attack on the LED block cipher independent of scan structure
Mika Fujishiro, Masao Yanagisawa, Nozomu Togawa (Waseda Univ.) VLD2013-139
LED (Light Encryption Device) block cipher, one of lightweight block ciphers, is very compact in hardware. The conventio... [more] VLD2013-139
pp.31-36
VLD 2014-03-03
16:00
Okinawa Okinawa Seinen Kaikan Latch-based AES Encryption Circuit Against Fault Analysis
Youhua Shi, Hiroaki Taniguchi, Nozomu Togawa, Masao Yanagisawa (Waseda Univ.) VLD2013-140
In general, cryptography is considered to be secure because it is based on complicated mathematical theories. In recent ... [more] VLD2013-140
pp.37-42
ISEC 2013-12-11
15:20
Tokyo Kikai-Shinko-Kaikan Bldg. Education for Practical Hardware Security Based on Information Security Education Program
Yu-ichi Hayashi, Naofumi Homma (Tohoku Univ.), Toshihiro Katashita (AIST), Hideaki Sone (Tohoku Univ.) ISEC2013-78
This paper reports an education course for the development of human resources in hardware security in a practical educat... [more] ISEC2013-78
pp.33-37
VLD, DC, IPSJ-SLDM, CPSY, RECONF, ICD, CPM
(Joint) [detail]
2013-11-27
10:20
Kagoshima   Performance Evaluation of Tamper-Resistant AES Cryptographic Circuit utilizing Hybrid Masking Dual-Rail ROM
Shintaro Ukai, Tsunato Nakai, Toshiki Kitamura, Takaya Kubota, Mitsuru Shiozaki, Takeshi Fujino (Ritsumeikan Univ.) CPM2013-111 ICD2013-88
Tamper-resistant devices require to protect cryptographic circuit from side-channel attacks such as power analysis (PA) ... [more] CPM2013-111 ICD2013-88
pp.19-24
VLD, DC, IPSJ-SLDM, CPSY, RECONF, ICD, CPM
(Joint) [detail]
2013-11-27
10:45
Kagoshima   Design and study of PUF Circuit using IO-Masked Dual-Rail ROM with Resistance against Side-Channel Attacks
Takashi Nishimura, Syuuhei Sugaya, Akihiro Takeuchi, Mitsuru Shiozaki, Takeshi Fujino (Ritsumeikan Univ.) CPM2013-112 ICD2013-89
Physical unclonable function (PUF) has been proposed as tamper-resistant technique to protect secure device. The PUF ext... [more] CPM2013-112 ICD2013-89
pp.25-30
IE, ICD, VLD, IPSJ-SLDM [detail] 2013-10-08
09:25
Aomori   Scan-based attack on the LED block cipher using scan signatures
Mika Fujishiro, Masao Yanagisawa, Nozomu Togawa (Waseda Univ.) VLD2013-55 ICD2013-79 IE2013-55
LED (Light Encryption Device) block cipher, one of lightweight block ciphers, is very compact in hardware. Its encryptio... [more] VLD2013-55 ICD2013-79 IE2013-55
pp.47-52
VLD, IPSJ-SLDM 2013-05-16
15:35
Fukuoka Kitakyushu International Conference Center Scan-based Attack against Trivium Stream Cipher Using Scan Signatures
Mika Fujishiro, Masao Yanagisawa, Nozomu Togawa (Waseda Univ.) VLD2013-8
Trivium is a synchronous stream cipher using three shift registers. It is designed to have a simple structure and runs a... [more] VLD2013-8
pp.61-66
VLD 2013-03-06
14:45
Okinawa Okinawa Seinen Kaikan Probability Driven Hierarchical Fault Analysis System and its Implementation
Hikaru Goto, Masaya Yoshikawa (Meijo Univ.) VLD2012-160
Although encryption standards are theoretically safe, it has been recently reported that confidential information could ... [more] VLD2012-160
pp.135-140
VLD, DC, IPSJ-SLDM, CPSY, RECONF, ICD, CPM
(Joint) [detail]
2012-11-26
16:25
Fukuoka Centennial Hall Kyushu University School of Medicine Scan-based Attack against Camellia Cryptosystems
Hirokazu Kodera, Masao Yanagisawa, Nozomu Togawa (Waseda Univ.) VLD2012-68 DC2012-34
Camellia is a common key cryptosystem and it has higher tolerance for cryptoanalysis than AES. In addition, Camellia has... [more] VLD2012-68 DC2012-34
pp.51-56
VLD, DC, IPSJ-SLDM, CPSY, RECONF, ICD, CPM
(Joint) [detail]
2012-11-28
10:55
Fukuoka Centennial Hall Kyushu University School of Medicine AES Cryptographic Circuit utilizing Dual-Rail RSL Memory Technique
Yuki Hashimoto, Mitsuru Shiozaki, Takaya Kubota, Takeshi Fujino (Ritsumeikan Univ.) CPM2012-120 ICD2012-84
Tamper LSI design methodology has to be applied in order to implement secure cryptographic circuit, which is resistant t... [more] CPM2012-120 ICD2012-84
pp.43-48
VLD, DC, IPSJ-SLDM, CPSY, RECONF, ICD, CPM
(Joint) [detail]
2011-11-28
09:25
Miyazaki NewWelCity Miyazaki Scan-based Attack against Triple DES Cryptosystems Using Scan Signatures
Hirokazu Kodera, Masao Yanagisawa, Nozomu Togawa (Waseda Univ.) VLD2011-53 DC2011-29
Scan-path test is one of the useful design-for-test techniques, which can observe and control registers inside LSIs. On ... [more] VLD2011-53 DC2011-29
pp.7-12
EMCJ 2011-04-22
14:35
Hyogo University of Hyogo Decoupling of Power Distribution Network to Improve Tolerance of Side-Channel Attacks in Cryptographic FPGA
Tetsuo Amano, Kengo Iokibe, Yoshitaka Toyota (Okayama Univ.) EMCJ2011-4
Side-channel attack is a cryptanalytic attack by means of radio frequency (RF) power current from cryptographic IC. On-b... [more] EMCJ2011-4
pp.19-24
VLD, DC, IPSJ-SLDM, CPSY, RECONF, ICD, CPM
(Joint) [detail]
2010-12-01
10:10
Fukuoka Kyushu University Magnetic Field Measurement for Side-channel Analysis Environment
Toshihiro Katashita, Yohei Hori, Akashi Satoh (AIST) RECONF2010-46
Cryptography used widely in electronic products is evaluated in terms of computationally-secure, however there is vulner... [more] RECONF2010-46
pp.43-48
VLD, DC, IPSJ-SLDM, CPSY, RECONF, ICD, CPM
(Joint) [detail]
2010-12-01
11:05
Fukuoka Kyushu University A study of the success rate of MIA under various probability density function estimations
Yohei Hori (AIST), Takahiro Yoshida (Aoyama Univ.), Toshihiro Katashita, Akashi Satoh (AIST) RECONF2010-48
The pfrobability density function (PDF) of voltage of AES hardware
module is estimated in various ways and applied to ... [more]
RECONF2010-48
pp.55-60
MW, EMCJ 2010-10-21
16:20
Akita Akita Univ. Influence of Device Structures on Frequency Spectrum of Common-Mode Current
Kouhei Ohmura, Yu-ichi Hayashi, Takaaki Mizuki, Hideaki Sone (Tohoku Univ.) EMCJ2010-59 MW2010-94
When a cryptographic module performs encryption or decryption, secret information which correlate to the intermediate da... [more] EMCJ2010-59 MW2010-94
pp.43-48
 Results 41 - 60 of 69 [Previous]  /  [Next]  
Choose a download format for default settings. [NEW !!]
Text format pLaTeX format CSV format BibTeX format
Copyright and reproduction : All rights are reserved and no part of this publication may be reproduced or transmitted in any form or by any means, electronic or mechanical, including photocopy, recording, or any information storage and retrieval system, without permission in writing from the publisher. Notwithstanding, instructors are permitted to photocopy isolated articles for noncommercial classroom use without fee. (License No.: 10GA0019/12GB0052/13GB0056/17GB0034/18GB0034)


[Return to Top Page]

[Return to IEICE Web Page]


The Institute of Electronics, Information and Communication Engineers (IEICE), Japan