|
|
All Technical Committee Conferences (Searched in: All Years)
|
|
Search Results: Conference Papers |
Conference Papers (Available on Advance Programs) (Sort by: Date Descending) |
|
Committee |
Date Time |
Place |
Paper Title / Authors |
Abstract |
Paper # |
HWS |
2020-04-07 |
Online |
Online |
A Study on Timing Information Acquiring Methodology for TLB Side-Channel Attacks Yuki Matsumoto (Kyushu Univ.), Yuichiro Dan, Junko Takahashi (NTT), Takatsugu Ono (Kyushu Univ.) HWS2020-6 |
We report on the method of acquiring Translation Look-aside Buffer (TLB) access latency which required
for implementing... [more] |
HWS2020-6 pp.29-34 |
ICSS, IPSJ-SPT |
2020-03-02 15:20 |
Okinawa |
Okinawa-Ken-Seinen-Kaikan (Cancelled but technical report was issued) |
Evaluating Effectiveness of a Timing Attack on Android Devices in JavaScript Keisuke Sugita (Kobe Univ.), Ryoichi Isawa (NICT), Masakatsu Morii (Kobe Univ.) ICSS2019-79 |
(To be available after the conference date) [more] |
ICSS2019-79 pp.67-71 |
VLD |
2016-03-01 11:20 |
Okinawa |
Okinawa Seinen Kaikan |
Timing-error-tolerant AES Cipher Shinnosuke Yoshida, Youhua Shi, Masao Yanagisawa, Nozomu Togawa (Waseda Univ.) VLD2015-123 |
With the technologies advance, the importance of crypto circuits is increasing as well. AES cipher is well known as theo... [more] |
VLD2015-123 pp.73-78 |
IA, ICSS |
2015-06-11 15:45 |
Fukuoka |
Kyushu Institute of Technology Univ. |
The Analysis of the CREAM vulnerability against OpenSSL Jun Hasegawa, Yuhei Watanabe, Masakatu Morii (Kobe Univ.) IA2015-6 ICSS2015-6 |
In this paper we discuss vulnerability of "CREAM", which was originally created by Daniel J. Bernstein in 2005 and named... [more] |
IA2015-6 ICSS2015-6 pp.27-32 |
ICSS, ISEC, SITE, EMM, IPSJ-CSEC, IPSJ-SPT [detail] |
2014-07-04 11:30 |
Hokkaido |
San-Refure Hakodate |
Quantitative Evaluation of the Key Information That is Learned through Timing Attack
-- The Contribution of Bucketing Technique for RSA Cryptosystem -- Yasuyuki Kobayashi, Yuichi Kaji (NAIST), Hiroyuki Seki (Nagoya Univ.), Minoru Ito (NAIST) ISEC2014-35 SITE2014-30 ICSS2014-39 EMM2014-35 |
Timing attacks are regarded as serious threats to many practical cryptographic algorithms, but it is difficult to estima... [more] |
ISEC2014-35 SITE2014-30 ICSS2014-39 EMM2014-35 pp.253-258 |
IA |
2014-01-31 13:35 |
Tokyo |
Kikai-Shinko-Kaikan Bldg. |
Development and Evaluation of Harmful Birds Detect and Attack System using Ultrasonic Sensors and ZigBee Atsushi Morikawa, Hiroshi Yamamoto, Maki Yamamoto, Katsuyuki Yamazaki (Nagaoka Univ. of Tech.) IA2013-80 |
In recent years, the number of predation damages by harmful birds such as herons is increasing, and they especially caus... [more] |
IA2013-80 pp.73-78 |
WBS, IT, ISEC |
2006-03-17 13:25 |
Aichi |
Nagoya Univ. |
A Study on necessary numbers of plaintexts for Cache Attack with Average Method Yoshitaka Ikeda, Kozue Yamaguchi, Toshinobu Kaneko (Tokyo Univ. of Science) |
2002, Tsunoo et al. proposed a cache attack using fluctuation of encryption times of a software implemented
on CPU with... [more] |
IT2005-104 ISEC2005-161 WBS2005-118 pp.55-60 |
IT, WBS, ISEC |
2005-03-17 15:45 |
Kyoto |
Kyoto Univ. |
A Study on a Cache Attack for SEED Yoshitaka Ikeda, Takenori Ichikawa, Toshinobu Kaneko (Tokyo Univ. of Science) |
In 2002, Tsunoo et al. proposed a cache attack using fluctuation of encryption times on a software implementation for CP... [more] |
IT2004-56 ISEC2004-112 WBS2004-171 pp.37-41 |
|
|
|
Copyright and reproduction :
All rights are reserved and no part of this publication may be reproduced or transmitted in any form or by any means, electronic or mechanical, including photocopy, recording, or any information storage and retrieval system, without permission in writing from the publisher. Notwithstanding, instructors are permitted to photocopy isolated articles for noncommercial classroom use without fee. (License No.: 10GA0019/12GB0052/13GB0056/17GB0034/18GB0034)
|
[Return to Top Page]
[Return to IEICE Web Page]
|