Committee |
Date Time |
Place |
Paper Title / Authors |
Abstract |
Paper # |
EMCJ, IEE-EMC |
2014-12-19 16:05 |
Shizuoka |
Shizuoka Univ. |
Security Evaluation of CSSAL Countermeasure against Side-Channel Attacks Using Frequency Spectrum Analysis Cancio Monteiro, Yasuhiro Takahashi, Toshikazu Sekine (Gifu Univ.) EMCJ2014-82 |
Information leakage on cryptographic devices are possible because of the correlation between the processed data and its ... [more] |
EMCJ2014-82 pp.75-80 |
VLD, DC, IPSJ-SLDM, CPSY, RECONF, ICD, CPM (Joint) [detail] |
2014-11-27 16:25 |
Oita |
B-ConPlaza |
Design and study of PUF Circuit using IO-Masked Dual-Rail ROM with Resistance against Side-Channel Attacks Takashi Nishimura, Akihiro Takeuchi, Mitsuru Shiozaki, Takeshi Fujino (Ritsumeikan Univ.) CPM2014-125 ICD2014-68 |
Physical unclonable function (PUF) has been proposed as tamper-resistant technique to protect secure device. The PUF ext... [more] |
CPM2014-125 ICD2014-68 pp.15-20 |
ICSS, ISEC, SITE, EMM, IPSJ-CSEC, IPSJ-SPT [detail] |
2014-07-04 11:30 |
Hokkaido |
San-Refure Hakodate |
Quantitative Evaluation of the Key Information That is Learned through Timing Attack
-- The Contribution of Bucketing Technique for RSA Cryptosystem -- Yasuyuki Kobayashi, Yuichi Kaji (NAIST), Hiroyuki Seki (Nagoya Univ.), Minoru Ito (NAIST) ISEC2014-35 SITE2014-30 ICSS2014-39 EMM2014-35 |
Timing attacks are regarded as serious threats to many practical cryptographic algorithms, but it is difficult to estima... [more] |
ISEC2014-35 SITE2014-30 ICSS2014-39 EMM2014-35 pp.253-258 |
CPSY, IPSJ-EMB, IPSJ-SLDM, DC [detail] |
2014-03-15 18:05 |
Okinawa |
|
Design and implementation of tamper-resistant authentication system for vehicle installation using PUF and side-channel attacks resistant AES. Masashi Nakano, Shintaro Ukai, Megumi Shibatani, Takaya Kubota, Mitsuru Shiozaki, Takeshi Fujino (Ritsumeikan Univ.) CPSY2013-106 DC2013-93 |
Recently, IC chips implementing encryption circuit is widely used in various applications such as electronic money, cred... [more] |
CPSY2013-106 DC2013-93 pp.139-144 |
CPSY, IPSJ-EMB, IPSJ-SLDM, DC [detail] |
2014-03-16 15:55 |
Okinawa |
|
Template Attack in Frequency Domein and Its Evaluation Yusuke Nozaki, Masaya Yoshikawa (Meijo Univ.) CPSY2013-120 DC2013-107 |
The encryption standard, such as AES, is certified that its decryption is computationally impossible. However, it was re... [more] |
CPSY2013-120 DC2013-107 pp.307-312 |
VLD |
2014-03-03 15:35 |
Okinawa |
Okinawa Seinen Kaikan |
Improved scan-based side-channel attack on the LED block cipher independent of scan structure Mika Fujishiro, Masao Yanagisawa, Nozomu Togawa (Waseda Univ.) VLD2013-139 |
LED (Light Encryption Device) block cipher, one of lightweight block ciphers, is very compact in hardware. The conventio... [more] |
VLD2013-139 pp.31-36 |
VLD |
2014-03-03 16:00 |
Okinawa |
Okinawa Seinen Kaikan |
Latch-based AES Encryption Circuit Against Fault Analysis Youhua Shi, Hiroaki Taniguchi, Nozomu Togawa, Masao Yanagisawa (Waseda Univ.) VLD2013-140 |
In general, cryptography is considered to be secure because it is based on complicated mathematical theories. In recent ... [more] |
VLD2013-140 pp.37-42 |
ISEC |
2013-12-11 15:20 |
Tokyo |
Kikai-Shinko-Kaikan Bldg. |
Education for Practical Hardware Security Based on Information Security Education Program Yu-ichi Hayashi, Naofumi Homma (Tohoku Univ.), Toshihiro Katashita (AIST), Hideaki Sone (Tohoku Univ.) ISEC2013-78 |
This paper reports an education course for the development of human resources in hardware security in a practical educat... [more] |
ISEC2013-78 pp.33-37 |
VLD, DC, IPSJ-SLDM, CPSY, RECONF, ICD, CPM (Joint) [detail] |
2013-11-27 10:20 |
Kagoshima |
|
Performance Evaluation of Tamper-Resistant AES Cryptographic Circuit utilizing Hybrid Masking Dual-Rail ROM Shintaro Ukai, Tsunato Nakai, Toshiki Kitamura, Takaya Kubota, Mitsuru Shiozaki, Takeshi Fujino (Ritsumeikan Univ.) CPM2013-111 ICD2013-88 |
Tamper-resistant devices require to protect cryptographic circuit from side-channel attacks such as power analysis (PA) ... [more] |
CPM2013-111 ICD2013-88 pp.19-24 |
VLD, DC, IPSJ-SLDM, CPSY, RECONF, ICD, CPM (Joint) [detail] |
2013-11-27 10:45 |
Kagoshima |
|
Design and study of PUF Circuit using IO-Masked Dual-Rail ROM with Resistance against Side-Channel Attacks Takashi Nishimura, Syuuhei Sugaya, Akihiro Takeuchi, Mitsuru Shiozaki, Takeshi Fujino (Ritsumeikan Univ.) CPM2013-112 ICD2013-89 |
Physical unclonable function (PUF) has been proposed as tamper-resistant technique to protect secure device. The PUF ext... [more] |
CPM2013-112 ICD2013-89 pp.25-30 |
IE, ICD, VLD, IPSJ-SLDM [detail] |
2013-10-08 09:25 |
Aomori |
|
Scan-based attack on the LED block cipher using scan signatures Mika Fujishiro, Masao Yanagisawa, Nozomu Togawa (Waseda Univ.) VLD2013-55 ICD2013-79 IE2013-55 |
LED (Light Encryption Device) block cipher, one of lightweight block ciphers, is very compact in hardware. Its encryptio... [more] |
VLD2013-55 ICD2013-79 IE2013-55 pp.47-52 |
VLD, IPSJ-SLDM |
2013-05-16 15:35 |
Fukuoka |
Kitakyushu International Conference Center |
Scan-based Attack against Trivium Stream Cipher Using Scan Signatures Mika Fujishiro, Masao Yanagisawa, Nozomu Togawa (Waseda Univ.) VLD2013-8 |
Trivium is a synchronous stream cipher using three shift registers. It is designed to have a simple structure and runs a... [more] |
VLD2013-8 pp.61-66 |
VLD |
2013-03-06 14:45 |
Okinawa |
Okinawa Seinen Kaikan |
Probability Driven Hierarchical Fault Analysis System and its Implementation Hikaru Goto, Masaya Yoshikawa (Meijo Univ.) VLD2012-160 |
Although encryption standards are theoretically safe, it has been recently reported that confidential information could ... [more] |
VLD2012-160 pp.135-140 |
VLD, DC, IPSJ-SLDM, CPSY, RECONF, ICD, CPM (Joint) [detail] |
2012-11-26 16:25 |
Fukuoka |
Centennial Hall Kyushu University School of Medicine |
Scan-based Attack against Camellia Cryptosystems Hirokazu Kodera, Masao Yanagisawa, Nozomu Togawa (Waseda Univ.) VLD2012-68 DC2012-34 |
Camellia is a common key cryptosystem and it has higher tolerance for cryptoanalysis than AES. In addition, Camellia has... [more] |
VLD2012-68 DC2012-34 pp.51-56 |
VLD, DC, IPSJ-SLDM, CPSY, RECONF, ICD, CPM (Joint) [detail] |
2012-11-28 10:55 |
Fukuoka |
Centennial Hall Kyushu University School of Medicine |
AES Cryptographic Circuit utilizing Dual-Rail RSL Memory Technique Yuki Hashimoto, Mitsuru Shiozaki, Takaya Kubota, Takeshi Fujino (Ritsumeikan Univ.) CPM2012-120 ICD2012-84 |
Tamper LSI design methodology has to be applied in order to implement secure cryptographic circuit, which is resistant t... [more] |
CPM2012-120 ICD2012-84 pp.43-48 |
VLD, DC, IPSJ-SLDM, CPSY, RECONF, ICD, CPM (Joint) [detail] |
2011-11-28 09:25 |
Miyazaki |
NewWelCity Miyazaki |
Scan-based Attack against Triple DES Cryptosystems Using Scan Signatures Hirokazu Kodera, Masao Yanagisawa, Nozomu Togawa (Waseda Univ.) VLD2011-53 DC2011-29 |
Scan-path test is one of the useful design-for-test techniques, which can observe and control registers inside LSIs. On ... [more] |
VLD2011-53 DC2011-29 pp.7-12 |
EMCJ |
2011-04-22 14:35 |
Hyogo |
University of Hyogo |
Decoupling of Power Distribution Network to Improve Tolerance of Side-Channel Attacks in Cryptographic FPGA Tetsuo Amano, Kengo Iokibe, Yoshitaka Toyota (Okayama Univ.) EMCJ2011-4 |
Side-channel attack is a cryptanalytic attack by means of radio frequency (RF) power current from cryptographic IC. On-b... [more] |
EMCJ2011-4 pp.19-24 |
VLD, DC, IPSJ-SLDM, CPSY, RECONF, ICD, CPM (Joint) [detail] |
2010-12-01 10:10 |
Fukuoka |
Kyushu University |
Magnetic Field Measurement for Side-channel Analysis Environment Toshihiro Katashita, Yohei Hori, Akashi Satoh (AIST) RECONF2010-46 |
Cryptography used widely in electronic products is evaluated in terms of computationally-secure, however there is vulner... [more] |
RECONF2010-46 pp.43-48 |
VLD, DC, IPSJ-SLDM, CPSY, RECONF, ICD, CPM (Joint) [detail] |
2010-12-01 11:05 |
Fukuoka |
Kyushu University |
A study of the success rate of MIA under various probability density function estimations Yohei Hori (AIST), Takahiro Yoshida (Aoyama Univ.), Toshihiro Katashita, Akashi Satoh (AIST) RECONF2010-48 |
The pfrobability density function (PDF) of voltage of AES hardware
module is estimated in various ways and applied to ... [more] |
RECONF2010-48 pp.55-60 |
MW, EMCJ |
2010-10-21 16:20 |
Akita |
Akita Univ. |
Influence of Device Structures on Frequency Spectrum of Common-Mode Current Kouhei Ohmura, Yu-ichi Hayashi, Takaaki Mizuki, Hideaki Sone (Tohoku Univ.) EMCJ2010-59 MW2010-94 |
When a cryptographic module performs encryption or decryption, secret information which correlate to the intermediate da... [more] |
EMCJ2010-59 MW2010-94 pp.43-48 |