Committee |
Date Time |
Place |
Paper Title / Authors |
Abstract |
Paper # |
VLD, HWS [detail] |
2022-03-07 11:00 |
Online |
Online |
Attribute-based Encryption Acceleration by Pairing Engine Hardware on FPGA Anawin Opasatian, Makoto Ikeda (EEIS, The University of Tokyo) VLD2021-80 HWS2021-57 |
Attribute-based Encryption (ABE) can provide fine grain access control which is suitable for a shared file system such a... [more] |
VLD2021-80 HWS2021-57 pp.25-30 |
VLD, HWS [detail] |
2022-03-07 11:25 |
Online |
Online |
Design and Measurement of Crypto Processor for Post Quantum Cryptography CRYSTALS-Kyber Taishin Shimada, Makoto Ikeda (Univ. of Tokyo) VLD2021-81 HWS2021-58 |
CRYSTALS-Kyber is one of the public key cryptosystems being considered as a public key cryptosystem after the advent of ... [more] |
VLD2021-81 HWS2021-58 pp.31-36 |
HWS, ICD [detail] |
2021-10-19 13:55 |
Online |
Online |
Attribute-based Encryption for File Encryption Application Anawin Opasatian, Makoto Ikeda (The University of Tokyo) HWS2021-47 ICD2021-21 |
Attribute-based Encryption (ABE) allows fine grain access control in the system. In this work, we look into practical us... [more] |
HWS2021-47 ICD2021-21 pp.32-37 |
HWS, ICD [detail] |
2021-10-19 16:15 |
Online |
Online |
Security evaluatuion of pairing-based cryptography against Special extended Number Field Sieve method Saito Kikuoka, Makoto Ikeda (Tokyo Univ.) HWS2021-52 ICD2021-26 |
Pairing-based cryptography is an extension of elliptic-curve-based cryptography for applications realizing functional cr... [more] |
HWS2021-52 ICD2021-26 pp.57-62 |
SDM, ICD, ITE-IST [detail] |
2021-08-17 11:45 |
Online |
Online |
Approximation of Non-Linear Function for Hardware Implementation of Echo-State-Network Amartuvshin Bayasgalan, Makoto Ikeda (UTokyo) SDM2021-32 ICD2021-3 |
Reservoir computing (RC) is a machine-learning algorithm that can learn complex temporal signals while presenting a fast... [more] |
SDM2021-32 ICD2021-3 pp.12-17 |
SDM, ICD, ITE-IST [detail] |
2021-08-17 16:10 |
Online |
Online |
Design and Evaluation of ToF image sensor with Pulse-Frequency-Modulation Pixel for In-Pixel Code Discrimination Nao Watanabe, Makoto Ikeda (Univ. of Tokyo) SDM2021-34 ICD2021-5 |
ToF's operational issues include multi-user interference and intentional attacks by third party. To deal with such inter... [more] |
SDM2021-34 ICD2021-5 pp.22-27 |
HWS |
2021-04-12 10:25 |
Tokyo |
Tokyo University/Online (Primary: On-site, Secondary: Online) |
Approximate Solution of Large-Scale Job Shop Scheduling Problem and Its Application to Hardware Cryptographic Design Kento Ikeda, Makoto Ikeda (Tokyo Univ.) HWS2021-2 |
The optimal design of cryptographic data paths in hardware can be considered as a job-shop scheduling problem. This prob... [more] |
HWS2021-2 pp.7-12 |
ICD, HWS [detail] |
2020-10-26 11:20 |
Online |
Online |
Feasibility of lattice attacks on ECDSA Kotaro Abe, Makoto Ikeda (Tokyo Univ.) HWS2020-30 ICD2020-19 |
ECDSA secret key is recovered via lattice attacks when only a few bits of nonce$(k)$ are leaked. In this paper, we evalu... [more] |
HWS2020-30 ICD2020-19 pp.30-35 |
ICD, SDM, ITE-IST [detail] |
2020-08-06 11:25 |
Online |
Online |
A TOF CMOS Image Sensor With Code Authentication Function Using In-Pixel Pulse Frequency Modulation Nao Watanabe, Makoto Ikeda (Tokyo Univ.) |
[more] |
|
HWS, VLD [detail] |
2020-03-06 13:50 |
Okinawa |
Okinawa Ken Seinen Kaikan (Cancelled but technical report was issued) |
Design Space Search for Faster Fp256 Elliptic Curve Cryptography Kento Ikeda (Tokyo Univ.), Makoto Ikeda (d.lab) VLD2019-130 HWS2019-103 |
In this study, we created a scheduling of operations by changing parameters such as elliptic curves, their formulas, the... [more] |
VLD2019-130 HWS2019-103 pp.209-214 |
HWS, VLD [detail] |
2020-03-07 14:15 |
Okinawa |
Okinawa Ken Seinen Kaikan (Cancelled but technical report was issued) |
Algorithm and Architecture Design for Fully Homomorphic Encryption Hardware Shotaro Sugiyama, Makoto Ikeda (Tokyo Univ.) VLD2019-144 HWS2019-117 |
Fully Homomorphic Encryption (FHE), a core technology of privacy guard on cloud services, has a disadvantage of high com... [more] |
VLD2019-144 HWS2019-117 pp.285-290 |
HWS (2nd) |
2019-12-06 16:00 |
Tokyo |
Asakusabashi Hulic Conference |
[Poster Presentation]
Fully Homomorphic Encrypted Inference Model of Binarized Neural Network Shotaro Sugiyama, Makoto Ikeda (UTokyo) |
[more] |
|
HWS (2nd) |
2019-12-06 16:00 |
Tokyo |
Asakusabashi Hulic Conference |
[Poster Presentation]
Design of Pairing Processor for Functional Cryptography Ryohei Nakayama, Makoto Ikeda (Univ. of Tokyo) |
[more] |
|
HWS, ICD [detail] |
2019-11-01 13:50 |
Osaka |
DNP Namba SS Bld. |
A Study on Correlation Electromagnetics Analysis on Pairing-based Cryptographic Hardware of Unified Hardware Yuma Kadowaki, Rei Ueno, Ville Yli-Mäyry (Tohoku Univ.), Daisuke Fujimoto, Yuichi Hayashi (NAIST), Makoto Nagata (Kobe Univ.), Makoto Ikeda (UT), Tsutomu Matsumto (YNU), Naofumi Homma (Tohoku Univ.) HWS2019-59 ICD2019-20 |
[more] |
HWS2019-59 ICD2019-20 pp.13-18 |
ISEC, SITE, ICSS, EMM, HWS, BioX, IPSJ-CSEC, IPSJ-SPT [detail] |
2019-07-24 13:45 |
Kochi |
Kochi University of Technology |
Design Space Search Applying Bayesian Optimization to High-level Design Flow Ryohei Nakayama (UTokyo), Hiromitsu Awano (Osaka Univ.), Makoto Ikeda (UTokyo) ISEC2019-57 SITE2019-51 BioX2019-49 HWS2019-52 ICSS2019-55 EMM2019-60 |
Now that circuit scale is increasing, high-level synthesis technology that designs circuits using high-level programming... [more] |
ISEC2019-57 SITE2019-51 BioX2019-49 HWS2019-52 ICSS2019-55 EMM2019-60 pp.369-374 |
ISEC, SITE, ICSS, EMM, HWS, BioX, IPSJ-CSEC, IPSJ-SPT [detail] |
2019-07-24 14:35 |
Kochi |
Kochi University of Technology |
Design of High Performance Processor for Paillier Algorithm With Homomorphism Chun Cai, Hiromitsu Awano, Makoto Ikeda (Tokyo Univ.) ISEC2019-59 SITE2019-53 BioX2019-51 HWS2019-54 ICSS2019-57 EMM2019-62 |
[more] |
ISEC2019-59 SITE2019-53 BioX2019-51 HWS2019-54 ICSS2019-57 EMM2019-62 pp.383-388 |
HWS, VLD |
2019-02-28 16:20 |
Okinawa |
Okinawa Ken Seinen Kaikan |
Design of High-Speed Gaussian Sampler Using Micciancio-Walter Algorithm Keitaro Koga (UTokyo), Hiromitsu Awano (Osaka Univ.), Makoto Ikeda (UTokyo) VLD2018-119 HWS2018-82 |
[more] |
VLD2018-119 HWS2018-82 pp.157-162 |
HWS, VLD |
2019-03-01 15:45 |
Okinawa |
Okinawa Ken Seinen Kaikan |
On Machine Learning Attack Tolerance for PUF-based Device Authentication System Tomoki Iizuka (UTokyo), Yasuhiro Ogasahara, Toshihiro Katashita, Yohei Hori (AIST), Hiromitsu Awano (Osaka Univ.), Makoto Ikeda (UTokyo) VLD2018-133 HWS2018-96 |
Double-Arbiter PUF (DAPUF) and PL-PUF are known to be highly resistant to machine learning attacks.
In this paper, we p... [more] |
VLD2018-133 HWS2018-96 pp.237-242 |
HWS (2nd) |
2018-12-13 16:10 |
Tokyo |
Tokyo Univ. Takeda Bldg. Takeda Hall |
[Poster Presentation]
Modeling Attacks on Double-Arbiter PUF Using End-to-End Deep Neural Network Tomoki Iizuka, Hiromitsu Awano, Makoto Ikeda (UTokyo) |
(Advance abstract in Japanese is available) [more] |
|
HWS (2nd) |
2018-12-13 16:10 |
Tokyo |
Tokyo Univ. Takeda Bldg. Takeda Hall |
[Poster Presentation]
Base Sampler Design of Micciancio-Walter Algorithm on ASIC Keitaro Koga, Hiromitsu Awano, Makoto Ikeda (UTokyo) |
(Advance abstract in Japanese is available) [more] |
|