IEICE Technical Committee Submission System
Conference Schedule
Online Proceedings
[Sign in]
... (for ESS/CS/ES/ISS)
Tech. Rep. Archives
... (for ES/CS)
    [Japanese] / [English] 
( Committee/Place/Topics  ) --Press->
 
( Paper Keywords:  /  Column:Title Auth. Affi. Abst. Keyword ) --Press->

All Technical Committee Conferences  (All Years)

Search Results: Conference Papers
 Conference Papers (Available on Advance Programs)  (Sort by: Date Descending)
 36件中 1~20件目  /  [Next]  
Committee Date Time Place Paper Title / Authors Abstract Paper #
HWS, ICD [detail] 2019-11-01
13:50
Osaka DNP Namba SS Bld. A Study on Correlation Electromagnetics Analysis on Pairing-based Cryptographic Hardware of Unified Hardware
Yuma Kadowaki, Rei Ueno, Ville Yli-Mäyry (Tohoku Univ.), Daisuke Fujimoto, Yuichi Hayashi (NAIST), Makoto Nagata (Kobe Univ.), Makoto Ikeda (UT), Tsutomu Matsumto (YNU), Naofumi Homma (Tohoku Univ.)
 [more]
HWS, ICD [detail] 2019-11-01
14:15
Osaka DNP Namba SS Bld. A Design of Isogeny-Based Cryptographic Hardware Architecture Using Residue Number System
Shuto Funakoshi, Rei Ueno, Naofumi Homma (RIEC Tohoku Univ.)
(To be available after the conference date) [more]
ISEC, SITE, ICSS, EMM, HWS, BioX, IPSJ-CSEC, IPSJ-SPT [detail] 2019-07-23
13:10
Kochi Kochi University of Technology A Formal Approach to Verifying Trojan-freeness of Cryptographic Circuits Based on Galois-Field Arithmetic
Akira Ito, Rei Ueno, Naofumi Homma (Tohoku Univ.)
This paper proposes a formal method for verifying whether Hardware Trojan (HT) exists or not (i.e., HT-freeness) in cryp... [more] ISEC2019-26 SITE2019-20 BioX2019-18 HWS2019-21 ICSS2019-24 EMM2019-29
pp.133-138
ISEC, SITE, ICSS, EMM, HWS, BioX, IPSJ-CSEC, IPSJ-SPT [detail] 2019-07-24
14:10
Kochi Kochi University of Technology Design of Highly Efficient AES Hardware Architectures Based on Multiplicative-Offset
Rei Ueno (Tohoku Univ.), Sumio Morioka (IST), Noriyuki Miura, Kohei Matsuda, Makoto Nagata (Kobe Univ.), Shivam Bhasin (NTU), Yves Mathieu, Tarik Graba, Jean-Luc Danger (TPT), Naofumi Homma (Tohoku Univ.)
This paper presents high throughput/gate hardware architectures. In order to achieve a high area-time efficiency, the pr... [more] ISEC2019-58 SITE2019-52 BioX2019-50 HWS2019-53 ICSS2019-56 EMM2019-61
pp.375-382
HWS 2019-04-12
14:20
Miyagi Tohoku University Design of Unified Hardware Architecture for GF-Arithmetic Authenticated Encryption Schemes
Shotaro Sawataishi, Rei Ueno, Naofumi Homma (Tohoku Univ.)
This paper presents an efficient unified hardware for several authenticated encryption schemes based on Galois-field (GF... [more] HWS2019-3
pp.13-18
HWS
(2nd)
2018-12-13
10:20
Tokyo Tokyo Univ. Takeda Bldg. Takeda Hall Report on CHES 2018
Naofumi Homma (Tohoku Univ.)
(Advance abstract in Japanese is available) [more]
HWS
(2nd)
2018-12-13
16:10
Tokyo Tokyo Univ. Takeda Bldg. Takeda Hall [Poster Presentation] Fundamental Study on Randomness Evaluation Method of True Random Number Generator Using Amplitude Probability Distribution
Saki Osuka, Daisuke Fujimoto (NAIST), Naofumi Homma (Tohoku Univ.), Arthur Beckers, Josep Balasch, Benedikt Gierlichs, Ingrid Verbauwhede (KU Leuven), Yu-ichi Hayashi (NAIST)
(Advance abstract in Japanese is available) [more]
EMCJ, IEE-EMC, IEE-MAG 2018-11-22
15:10
Overseas KAIST [Poster Presentation] Fundamental Study on Degradation of Randomness in TRNG Due to Intentional Electromagnetic Interference
Saki Osuka, Daisuke Fujimoto (NAIST), Naofumi Homma (Tohoku Univ.), Arthur Beckers, Josep Balasch, Benedikt Gierlichs, Ingrid Verbauwhede (KU Leuven), Yu-ichi Hayashi (NAIST)
Attacks that degrade the randomness of a true random number generator (TRNG) by physical attacks on entropy sources, whi... [more] EMCJ2018-66
pp.35-36
HWS, ICD 2018-10-29
14:55
Osaka Kobe Univ. Umeda Intelligent Laboratory Selection and evaluation of optimal bases in the case of implementing Q-RNS MR algorithm in FPGA
Yoshihiro Kori, Daisuke Fujimoto, Yu-ichi Hayasi (NAIST), Naofumi Homma (Tohoku Univ.)
To improve a computation speed of public cryptography, Montgomery Reduction(MR) and Residue Number System (RNS) are ofte... [more] HWS2018-51 ICD2018-43
pp.25-30
HWS, ICD 2018-10-29
15:20
Osaka Kobe Univ. Umeda Intelligent Laboratory A Design and Implementation of Ring-LWE Cryptography Hardware Based on Number Theoretic Transform
Sora Endo, Rei Ueno, Takafumi Aoki, Naofumi Homma (Tohoku Univ.)
This paper presents an efficient Ring-LWE cryptographic hardware architecture based on number theoretic transformation. ... [more] HWS2018-52 ICD2018-44
pp.31-34
HWS, ISEC, SITE, ICSS, EMM, IPSJ-CSEC, IPSJ-SPT [detail] 2018-07-25
14:25
Hokkaido Sapporo Convention Center Immunity Evaluation of Cryptographic Devices using Gaussian Noise against IEMI Fault Injection
Takumi Okamoto, Daisuke Fujimoto, Yuichi Hayashi (NAIST), Naofumi Homma (Tohoku Univ.), Arthur Beckers, Josep Balasch, Benedikt Gierlichs, Ingrid Verbauwhede (KU Leuven)
Fault injection attacks using intentional electromagnetic interference against cryptographic devices have been reported.... [more] ISEC2018-20 SITE2018-12 HWS2018-17 ICSS2018-23 EMM2018-19
pp.77-81
HWS, ISEC, SITE, ICSS, EMM, IPSJ-CSEC, IPSJ-SPT [detail] 2018-07-26
15:25
Hokkaido Sapporo Convention Center A Study on Systematic Insertion of Hardware Trojan Based on Path Delay
Akira Ito, Rei Ueno, Naofumi Homma, Takafumi Aoki (Tohoku Univ.)
This paper presents a non-reversible and analytical method for inserting a path delay hardware Trojan (PDHT). The conven... [more] ISEC2018-44 SITE2018-36 HWS2018-41 ICSS2018-47 EMM2018-43
pp.349-356
HWS
(2nd)
2017-09-15
16:30
Tokyo   Stable and Efficient Key Generation Based on Multiple-Velued PUF
Manami Suzuki, Rei Ueno, Naofumi Homma, Takafumi Aoki (Tohoku Univ.)
(Advance abstract in Japanese is available) [more]
HWS
(2nd)
2017-06-12
16:50
Aomori Hirosaki University Ultra-Light-Weight Implementation of PRINCE Cryptographic Processor
Kohei Matsuda, Noriyuki Miura, Makoto Nagata (Kobe Univ.), Shivam Bashin (Nanyang Tech. Univ.), Ville Yli-Mayry, Naofumi Homma (Tohoku Univ.), Yves Mathieu, Tarik Graba, Jean-Luc Danger (Telecom ParisTech)
(Advance abstract in Japanese is available) [more]
EMCJ 2016-03-11
11:30
Tokyo Kikai-Shinko-Kaikan Bldg. A study on possibility of screen reconstruction by frequency analysis of electromagnetic emanation from mobile devices
Go Itami, Yohei Toriumi, Shinji Goto, Kazuhiro Takaya (NTT), Yu-ichi Hayashi, Naofumi Homma, Takafumi Aoki (Tohoku Univ.)
There is the risk for mobile devices that its screen is monitored by attackers capturing electromagnetic emanation from ... [more] EMCJ2015-125
pp.5-9
SIS, IPSJ-AVM 2015-09-03
13:10
Osaka Kansai Univ. [Tutorial Lecture] Side-channel Attack on Cryptographic Embedded Systems and Its Countermeasure
Naofumi Homma (Tohoku Univ.)
Cryptography is an indispensable technology to construct safe and secure information-driven society, and systems includi... [more] SIS2015-18
pp.19-24
EMCJ 2015-07-09
16:40
Tokyo Kikai-Shinko-Kaikan Bldg. Feasibility of Fault Injection Time Estimation Using EM Leakage from Cryptographic Devices
Ko Nakamaura (Tohoku Univ.), Yu-ichi Hayashi (Tohoku Gakuin Univ.), Takaaki Mizuki, Naofumi Homma, Takafumi Aoki, Hideaki Sone (Tohoku Univ.)
 [more] EMCJ2015-43
pp.73-78
IA, ICSS 2015-06-12
13:00
Fukuoka Kyushu Institute of Technology Univ. [Invited Talk] Hardware Security for Mobile Devices in Public Spaces
Yu-ichi Hayashi (Tohoku Gakuin Univ.), Naofumi Homma, Takafumi Aoki, Hideaki Sone (Tohoku Univ.)
The users of tablet PCs are rapidly spreading, and accordingly there are many scenes browsing and inputting personal inf... [more] IA2015-13 ICSS2015-13
pp.69-74
EMCJ, WPT
(Joint)
2015-01-23
15:50
Okinawa Okinawaken Jichikaikan Study on detection method for clock error due to intentional electromagnetic interference
Atsushi Nagao, Yuichiro Okugawa, Kazuhiro Takaya (NTT), Yu-ichi Hayashi, Naofumi Homma, Takafumi Aoki (Tohoku Univ.)
Overclocking, which occurs because of the disruption of the clock frequency, causes LSI modules to malfunction. The Elec... [more] EMCJ2014-100
pp.83-88
EMCJ, IEE-EMC, MW, EST [detail] 2014-10-23
10:25
Akita Akita Prefectural Univ. Effect of Precisely Timed Intentional Electromagnetic Interference on Internal Operation in Cryptographic Device
Mizuki Kobayashi, Yu-ichi Hayashi, Naofumi Homma, Takaaki Mizuki, Takafumi Aoki, Hideaki Sone (Tohoku Univ.)
This paper presents a new intentional electromagnetic interference (IEMI) fault-injection method that can inject transie... [more] EMCJ2014-46 MW2014-102 EST2014-60
pp.11-15
 36件中 1~20件目  /  [Next]  
Choose a download format for default settings. [NEW !!]
Text format pLaTeX format CSV format BibTeX format


[Return to Top Page]

[Return to IEICE Web Page]


The Institute of Electronics, Information and Communication Engineers (IEICE), Japan