Committee |
Date Time |
Place |
Paper Title / Authors |
Abstract |
Paper # |
SIP |
2022-08-26 14:26 |
Okinawa |
Nobumoto Ohama Memorial Hall (Ishigaki Island) (Primary: On-site, Secondary: Online) |
Generation method of Adversarial Examples using XAI Ryo Kumagai, Shu Takemoto, Yusuke Nozaki, Masaya Yoshikawa (Meijo Univ.) |
[more] |
|
ICD, SDM, ITE-IST [detail] |
2022-08-08 15:30 |
Hokkaido |
Hokkaido University (Primary: On-site, Secondary: Online) |
Evaluation of Low-Latency Cryptography MANTIS based Low-Power oriented Tamper-Resistant Circuit Kosuke Hamaguchi, Shu Takemoto, Yusuke Nozaki, Masaya Yoshikawa (Meijo Univ.) |
[more] |
|
IN, CCS (Joint) |
2022-08-05 15:00 |
Hokkaido |
Hokkaido University(Centennial Hall) (Primary: On-site, Secondary: Online) |
Countermeasure of In-vehicle System using Authenticated Encryption against DoS Attacks Daichi Hirose, Shu Takemoto, Yusuke Nozaki, Masaya Yoshikawa (Meijo Univ.) |
[more] |
|
SS, IPSJ-SE, KBSE [detail] |
2022-07-28 16:30 |
Hokkaido |
Hokkaido-Jichiro-Kaikan (Sapporo) (Primary: On-site, Secondary: Online) |
Deep Learning Power Analysis Against Protected PRINCE Shu Takemoto, Yoshiya Ikezaki, Yusuke Nozaki, Masaya Yoshikawa (Meijo Univ.) |
(To be available after the conference date) [more] |
|
AI |
2022-07-04 10:40 |
Hokkaido |
(Primary: On-site, Secondary: Online) |
Deep Learning Side-Channel Attacks for Rolled Architecture of PRINCE and Midori128 Shu Takemoto, Yoshiya Ikezaki, Yusuke Nozaki, Masaya Yoshikawa (Meijo Univ.) AI2022-3 |
(To be available after the conference date) [more] |
AI2022-3 pp.13-18 |
CNR |
2022-07-01 14:30 |
Okinawa |
(Primary: On-site, Secondary: Online) |
Evaluation of SROS2 Using the Tweakable Block Cipher Shu Takemoto, Kosuke Hamaguchi, Yoshiya Ikezaki, Yusuke Nozaki, Masaya Yoshikawa (Meijo Univ.) CNR2022-7 |
(To be available after the conference date) [more] |
CNR2022-7 pp.29-34 |
VLD, HWS [detail] |
2022-03-08 11:00 |
Online |
Online |
Evaluation of a Lightweight Cryptographic Finalist on SROS2 Shu Takemoto, Yoshiya Ikezaki, Yusuke Nozaki, Masaya Yoshikawa (Meijo Univ.) VLD2021-94 HWS2021-71 |
In cyber-physical systems, small devices are connected to the network to enable the analysis of sensor values. Also, sin... [more] |
VLD2021-94 HWS2021-71 pp.99-104 |
VLD, HWS [detail] |
2022-03-08 13:00 |
Online |
Online |
Implementation Evaluation of Glitch PUF Using a Low-Latency Cryptography MANTIS Kosuke Hamaguchi, Shu Takemoto, Yusuke Nozaki, Masaya Yoshikawa (Meijo Univ.) VLD2021-96 HWS2021-73 |
This paper proposes a low-latency cipher MANTIS based PUF which uses signal glitch during encryption. The security level... [more] |
VLD2021-96 HWS2021-73 pp.111-116 |
CAS, CS |
2022-03-04 13:45 |
Online |
Online |
Evaluation of Trojan Detector for AI Hardware Shu Takemoto, Yoshiya Ikezaki, Yusuke Nozaki, Masaya Yoshikawa (Meijo Univ.) CAS2021-94 CS2021-96 |
In recent years, AI edge computing has been expanding to realize real-time inference by implementing AI models on edge d... [more] |
CAS2021-94 CS2021-96 pp.106-111 |
CAS, CS |
2022-03-04 14:10 |
Online |
Online |
Secure In-vehicle System using Authenticated Encryption Midori-OTR and its Implementation Evaluation Daichi Hirose, Shu Takemoto, Yusuke Nozaki, Masaya Yoshikawa (Meijo Univ.) CAS2021-95 CS2021-97 |
In recent years, many electronic control units called ECUs have been installed in automobiles to perform various functio... [more] |
CAS2021-95 CS2021-97 pp.112-117 |
CAS, CS |
2022-03-04 14:35 |
Online |
Online |
Unrolled Architecture oriented Countermeasure Circuit for Low-power Cryptography Midori128 and its Evaluation Shunsuke Miwa, Shu Takemoto, Yusuke Nozaki, Masaya Yoshikawa (Meijo Univ.) CAS2021-96 CS2021-98 |
The number of IoT devices is growing rapidly, ensuring security in those devices is an important issue. Lightweight bloc... [more] |
CAS2021-96 CS2021-98 pp.118-123 |
AI |
2022-02-28 15:00 |
Miyazaki |
Youth Hostel Sunflower MIYAZAKI (Primary: On-site, Secondary: Online) |
Basic Study for Backdoor Attack based on Invisible Trigger Ryo Kumagai, Shu Takemoto, Yusuke Nozaki, Masaya Yoshikawa (Meijo Univ.) AI2021-21 |
A backdoor attack is a threat to deep neural networks (DNN). In an attack on a DNN for the purpose of image classificati... [more] |
AI2021-21 pp.53-58 |
IE, ITS, ITE-AIT, ITE-ME, ITE-MMS [detail] |
2022-02-22 11:55 |
Online |
Online |
Bit-plane oriented Detection method of Malicious Code Hidden in the Image Ryo Kumagai, Shu Takemoto, Yusuke Nozaki, Masaya Yoshikawa (Meijo Univ.) ITS2021-50 IE2021-59 |
With the increasing importance of cyberspace, the threat of malware has also been increasing. Malware which hides malici... [more] |
ITS2021-50 IE2021-59 pp.151-156 |
HWS, VLD [detail] |
2021-03-04 15:20 |
Online |
Online |
Power Analysis Attack on a Unrolled Midori128 and its Evaluation Shu Takemoto, Yoshiya Ikezaki, Yusuke Nozaki, Masaya Yoshikawa (Meijo Univ.) VLD2020-87 HWS2020-62 |
The lightweight block cipher Midori has been proposed as a cryptographic algorithm for low-power operation, which is imp... [more] |
VLD2020-87 HWS2020-62 pp.108-113 |
ICSS, IPSJ-SPT |
2021-03-02 16:25 |
Online |
Online |
Security Evaluation of PUF utilizing Unrolled Architecture Yusuke Nozaki, Kensaku Asahi, Masaya Yoshikawa (Meijo Univ.) ICSS2020-53 |
To improve the security of LSI circuit, physically unclonable functions (PUF) have been attracted attention. The glitch ... [more] |
ICSS2020-53 pp.160-165 |
ICD, HWS [detail] |
2020-10-26 15:20 |
Online |
Online |
Hardware Trojan using LUT Structure of AI Inference Devices Yusuke Nozaki, Shu Takemoto, Yoshiya Ikezaki, Masaya Yoshikawa (Meijo Univ.) HWS2020-36 ICD2020-25 |
The artificial intelligence (AI) technology has been attracted attention in several fields. On the other hand, security ... [more] |
HWS2020-36 ICD2020-25 pp.65-70 |
ICD, HWS [detail] |
2020-10-26 15:45 |
Online |
Online |
Low-Latency Countermeasure Circuit Oriented Hardware Trojan and its Evaluation Shu Takemoto, Yoshiya Ikezaki, Yusuke Nozaki, Masaya Yoshikawa (Meijo Univ.) HWS2020-37 ICD2020-26 |
Outsourcing and the use of IP are the mainstream in the design and manufacturing of system LSIs. On the other hand, the ... [more] |
HWS2020-37 ICD2020-26 pp.71-76 |
DC |
2020-02-26 12:25 |
Tokyo |
|
Glitch PUF utilizing Unrolled Architecture and its Evaluation Yusuke Nozaki, Masaya Yoshikawa (Meijo Univ.) DC2019-91 |
The physically unclonable functions (PUFs) have attracted attention as technologies for authentication of large scale in... [more] |
DC2019-91 pp.31-36 |
HWS, VLD |
2019-03-01 14:55 |
Okinawa |
Okinawa Ken Seinen Kaikan |
Performance and Security Evaluation of Ring Oscillator PUF Implemented on ASIC Yusuke Nozaki, Masaya Yoshikawa (Meijo Univ.) VLD2018-131 HWS2018-94 |
This study evaluates the performance and the security of ring oscillator physical unclonable function (RO PUF) implement... [more] |
VLD2018-131 HWS2018-94 pp.225-230 |
HWS, VLD |
2019-03-01 15:20 |
Okinawa |
Okinawa Ken Seinen Kaikan |
An Attack with Linear Model Against Improved Arbiter PUF Susumu Matsumi, Yusuke Nozaki, Masaya Yoshikawa (Meijo Univ.) VLD2018-132 HWS2018-95 |
Imitations of electronic parts are distributed to the market, which is a serious problem. PUFs have attracted attention ... [more] |
VLD2018-132 HWS2018-95 pp.231-236 |