Committee |
Date Time |
Place |
Paper Title / Authors |
Abstract |
Paper # |
PN |
2024-03-14 11:10 |
Kagoshima |
(Primary: On-site, Secondary: Online) |
100 GBaud Superchannel Transmission Experiment in CTR Mode Keiji Shimada (Kagawa Univ.), Ryosuke Matsumoto (AIST), Takahiro Kodama (Kagawa Univ.) PN2023-69 |
We evaluated encryption penalty associated with symbolic block cipher applied CTR mode for 100 GBaud QAM signal by simul... [more] |
PN2023-69 pp.1-5 |
PN |
2024-03-15 09:20 |
Kagoshima |
(Primary: On-site, Secondary: Online) |
Study on Symbol-block AES Cryptography for Digital Coherent Communication Hodaka Amano, Takahiro Kodama (Kagawa Univ.) PN2023-77 |
We applied symbol block AES encryption, which inherits the four functions that form the basic structure of the advanced ... [more] |
PN2023-77 pp.42-47 |
RCC, ISEC, IT, WBS |
2024-03-14 16:35 |
Osaka |
Osaka Univ. (Suita Campus) |
Integral Attack with Bit-Based Division Property on Block Cipher LBC Naoki Shibayama, Yasutaka Igarashi (Tokyo Univ. of Science) IT2023-131 ISEC2023-130 WBS2023-119 RCC2023-113 |
LBC is a block cipher proposed by Kapalova et al. in 2023. The block size is 64-bit, the secret key size is 80-bit, and ... [more] |
IT2023-131 ISEC2023-130 WBS2023-119 RCC2023-113 pp.350-357 |
VLD, HWS, ICD |
2024-03-01 12:05 |
Okinawa |
(Primary: On-site, Secondary: Online) |
Security Evaluation of Fault Analysis for SuperSonic Shu Takemoto, Yusuke Nozaki, Masaya Yoshikawa (Meijo Univ.) VLD2023-126 HWS2023-86 ICD2023-115 |
SuperSonic, a low-latency lightweight block cipher, is suitable for securing edge devices with high real-time performanc... [more] |
VLD2023-126 HWS2023-86 ICD2023-115 pp.141-144 |
ICM, NS, CQ, NV (Joint) |
2023-11-21 13:15 |
Ehime |
Ehime Prefecture Gender Equality Center (Primary: On-site, Secondary: Online) |
[Encouragement Talk]
Security Evaluation of Low-latency Cipher based on Improved Simon against Deep Learning Analysis using Profiled Power Consumption Shu Takemoto, Yusuke Nozaki, Masaya Yoshikawa (Meijo Univ.) NS2023-114 |
Society 5.0 aims to solve problems in social systems through the intercommunication of small devices. On the other hand,... [more] |
NS2023-114 pp.20-25 |
VLD, DC, RECONF, ICD, IPSJ-SLDM [detail] |
2023-11-16 13:20 |
Kumamoto |
Civic Auditorium Sears Home Yume Hall (Primary: On-site, Secondary: Online) |
Tamper Resistance Evaluation on FPGA for Low-Latency Cipher Sonic Shu Takemoto, Yusuke Nozaki, Masaya Yoshikawa (Meijo Univ.) VLD2023-49 ICD2023-57 DC2023-56 RECONF2023-52 |
Industry 5.0 promotes smart factories for system optimization by utilizing IoT and AI in the industrial field. The smart... [more] |
VLD2023-49 ICD2023-57 DC2023-56 RECONF2023-52 pp.101-105 |
OCS, LQE, OPE |
2023-10-19 16:15 |
Kochi |
(Primary: On-site, Secondary: Online) |
AES Algorithm Modified Symbol Block Ciphering Hodaka Amano, Takahiro Kodama (Kagawa Univ.) OCS2023-36 OPE2023-91 LQE2023-38 |
We propose a new variant of the AES algorithm, named the AES symbol block cipher, designed for M-ary quadrature amplitud... [more] |
OCS2023-36 OPE2023-91 LQE2023-38 pp.47-52 |
EMM, BioX, ISEC, SITE, ICSS, HWS, IPSJ-CSEC, IPSJ-SPT [detail] |
2023-07-25 09:40 |
Hokkaido |
Hokkaido Jichiro Kaikan |
SAT-based Search of Related-key Impossible Distinguisher for Piccolo, TWINE, LBlock Shion Utsumi (Univ. of Hyogo), Kosei Sakamoto (MELCO), Takanori Isobe (Univ. of Hyogo) ISEC2023-46 SITE2023-40 BioX2023-49 HWS2023-46 ICSS2023-43 EMM2023-46 |
In this paper, we evaluate security of Piccolo, TWINE, T-TWINE and LBlcok angainst on impossilbe related-key differentia... [more] |
ISEC2023-46 SITE2023-40 BioX2023-49 HWS2023-46 ICSS2023-43 EMM2023-46 pp.208-213 |
EMM, BioX, ISEC, SITE, ICSS, HWS, IPSJ-CSEC, IPSJ-SPT [detail] |
2023-07-25 10:00 |
Hokkaido |
Hokkaido Jichiro Kaikan |
Higher Order Differential Property of Block Cipher LBC-3 Naoki Shibayama, Yasutaka Igarashi (Tokyo Univ. of Science) ISEC2023-47 SITE2023-41 BioX2023-50 HWS2023-47 ICSS2023-44 EMM2023-47 |
LBC-3 is a block cipher proposed by Nyssanbayeva et al. in 2022. The block size is 64-bit, the secret key size is 80-bit... [more] |
ISEC2023-47 SITE2023-41 BioX2023-50 HWS2023-47 ICSS2023-44 EMM2023-47 pp.214-220 |
RCC, ISEC, IT, WBS |
2023-03-15 16:10 |
Yamaguchi |
(Primary: On-site, Secondary: Online) |
Active S-box Number Analysis with MILP of Type-2 Generalized Feistel Structure Using Sub-Block Dividing Masaya Okazaki, Tetsu Iwata (Nagoya Univ.) IT2022-134 ISEC2022-113 WBS2022-131 RCC2022-131 |
Type-2 Generalized Feistel Structures (GFSs) are a well-known structure for constructing secure block ciphers. At Indocr... [more] |
IT2022-134 ISEC2022-113 WBS2022-131 RCC2022-131 pp.419-426 |
NS, ICM, CQ, NV (Joint) |
2022-11-24 11:10 |
Fukuoka |
Humanities and Social Sciences Center, Fukuoka Univ. + Online (Primary: On-site, Secondary: Online) |
Deep Learning Side-Channel Attack in Noise Based Countermeasure Simon Shu Takemoto, Yoshiya Ikezaki, Yusuke Nozaki, Masaya Yoshikawa (Meijo Univ.) NS2022-103 |
The IoT requires the implementation of cryptographic techniques to ensure the confidentiality, integrity, and availabili... [more] |
NS2022-103 pp.19-22 |
ISEC, SITE, LOIS |
2022-11-18 14:55 |
Online |
Online |
Active S-box Number Analysis with MILP of Type-2 Generalized Feistel Structure Consisting of Multiple SP Layers F-function Masaya Okazaki, Tetsu Iwata (Nagoya Univ.) ISEC2022-36 SITE2022-40 LOIS2022-20 |
Type-2 Generalized Feistel Structure (GFS) is known as a way to construct a secure block cipher. It is a $dm$-bit ($d ge... [more] |
ISEC2022-36 SITE2022-40 LOIS2022-20 pp.32-38 |
HWS, ICD |
2022-10-25 16:15 |
Shiga |
(Primary: On-site, Secondary: Online) |
Design and Implementation of Payload Encryption and MAC for CAN Communication Using Lightweight Encryption SIMON Tomoya Tsuboi, Yuta Kodera, Yasuyuki Nogami, Takuya Kusaka (Okayama Univ) HWS2022-41 ICD2022-33 |
CAN, which is widely used for in-vehicle networks, is a low-cost and efficient connection between electronic control uni... [more] |
HWS2022-41 ICD2022-33 pp.64-69 |
ICD, SDM, ITE-IST [detail] |
2022-08-08 15:45 |
Online |
|
Evaluation of Low-Latency Cryptography MANTIS based Low-Power oriented Tamper-Resistant Circuit Kosuke Hamaguchi, Shu Takemoto, Yusuke Nozaki, Masaya Yoshikawa (Meijo Univ.) SDM2022-41 ICD2022-9 |
Lightweight cryptography can not only be implemented in a small area, but also with low latency and low power consumptio... [more] |
SDM2022-41 ICD2022-9 pp.31-36 |
SS, IPSJ-SE, KBSE [detail] |
2022-07-28 16:30 |
Hokkaido |
Hokkaido-Jichiro-Kaikan (Sapporo) (Primary: On-site, Secondary: Online) |
Deep Learning Power Analysis Against Protected PRINCE Shu Takemoto, Yoshiya Ikezaki, Yusuke Nozaki, Masaya Yoshikawa (Meijo Univ.) SS2022-4 KBSE2022-14 |
In recent years, with the development of deep learning, AI has been incorporated in the field of cyber security. On the ... [more] |
SS2022-4 KBSE2022-14 pp.19-24 |
AI |
2022-07-04 10:40 |
Hokkaido |
(Primary: On-site, Secondary: Online) |
Deep Learning Side-Channel Attacks for Rolled Architecture of PRINCE and Midori128 Shu Takemoto, Yoshiya Ikezaki, Yusuke Nozaki, Masaya Yoshikawa (Meijo Univ.) AI2022-3 |
With the recent expansion of small autonomous mobile robots such as drones, cyber security for small devices is very imp... [more] |
AI2022-3 pp.13-18 |
CNR |
2022-07-01 14:30 |
Okinawa |
(Primary: On-site, Secondary: Online) |
Evaluation of SROS2 Using the Tweakable Block Cipher Shu Takemoto, Kosuke Hamaguchi, Yoshiya Ikezaki, Yusuke Nozaki, Masaya Yoshikawa (Meijo Univ.) CNR2022-7 |
In recent years, autonomous mobile robots have been utilized in a wide range of fields, including industrial fields, req... [more] |
CNR2022-7 pp.29-34 |
VLD, HWS [detail] |
2022-03-08 13:00 |
Online |
Online |
Implementation Evaluation of Glitch PUF Using a Low-Latency Cryptography MANTIS Kosuke Hamaguchi, Shu Takemoto, Yusuke Nozaki, Masaya Yoshikawa (Meijo Univ.) VLD2021-96 HWS2021-73 |
This paper proposes a low-latency cipher MANTIS based PUF which uses signal glitch during encryption. The security level... [more] |
VLD2021-96 HWS2021-73 pp.111-116 |
VLD, HWS [detail] |
2022-03-08 14:55 |
Online |
Online |
Evaluation of Side-channel Leaks Specific to Unrolled AES Hardware Ayano Nakashima, Rei Ueno, Naofumi Homma (Tohoku Univ.) VLD2021-100 HWS2021-77 |
This paper presents the evaluation of a unique side-channel leakage occurred from the middle rounds
of (pipelined) unro... [more] |
VLD2021-100 HWS2021-77 pp.135-140 |
ISEC |
2021-05-19 13:50 |
Online |
Online |
Distinguishing and Forgery Attacks against Romulus-N and Romulus-M Makoto Habu (Nagoya Univ.), Kazuhiko Minematsu (NEC), Tetsu Iwata (Nagoya Univ.) ISEC2021-6 |
Romulus is an authenticated encryption scheme based on a tweakable block cipher. It was submitted to the NIST Lightweigh... [more] |
ISEC2021-6 pp.25-31 |