Committee |
Date Time |
Place |
Paper Title / Authors |
Abstract |
Paper # |
MSS, CAS, SIP, VLD |
2023-07-06 13:00 |
Hokkaido |
(Primary: On-site, Secondary: Online) |
[Panel Discussion]
Democratization of Researches in Circuits and Systems fields and Initiatives in Technical Groups Makoto Ikeda (The Univ. of Tokyo), Yasutoshi Aibara (OVT), Shigetoshi Nakatake (The Univ. of Kitakyushu), Takayuki Nakachi (Univ. of Ryukyus), Shingo Yamaguchi (Yamaguchi Univ.) CAS2023-7 VLD2023-7 SIP2023-23 MSS2023-7 |
Open Access initiatives, which allow access and use of research results funded by public research funds not only by the ... [more] |
CAS2023-7 VLD2023-7 SIP2023-23 MSS2023-7 pp.34-36 |
EMCJ, IEE-EMC, IEE-SPC |
2023-05-12 13:15 |
Okinawa |
(Primary: On-site, Secondary: Online) |
Evaluating Transmission Efficiency Impact on Screen Reconstruction Accuracy for High-Resolution Displays Taiki Kitazawa, Yuichi Hayashi (NAIST) EMCJ2023-6 |
In TEMPEST attacks targeting high-resolution displays with divided screens, reconstructing screen information proves dif... [more] |
EMCJ2023-6 pp.1-6 |
HWS |
2023-04-14 13:45 |
Oita |
(Primary: On-site, Secondary: Online) |
Fundamental Study on the effect of the Number of RNS Bases on the Side-channel Information Leakage from Modular Multiplier Daisuke Fujimoto, Rikuo Haga, Yuichi Hayashi (NAIST) HWS2023-2 |
In public-key cryptography, the Residue Number System (RNS) has been proposed as a hardware implementation approach that... [more] |
HWS2023-2 pp.6-8 |
HWS, VLD |
2023-03-04 13:30 |
Okinawa |
(Primary: On-site, Secondary: Online) |
Threat of EM Information Leakage from Speakerphones Due to IEMI and Suppression Indexes for EMC Countermeasures Seiya Takano, Yuichi Hayashi (NAIST) VLD2022-120 HWS2022-91 |
Threats of causing forced electromagnetic information leakage by irradiating devices with electromagnetic waves have bee... [more] |
VLD2022-120 HWS2022-91 pp.261-266 |
EMCJ |
2023-01-27 13:30 |
Okayama |
WASHU BLUE RESORT (Primary: On-site, Secondary: Online) |
Fundamental Study on Reconstruction of Sound Information from EM Leakage Focusing on Multiple Demodulation Methods Taiki Kitazawa, Seiya Takano, Yuichi Hayashi (NAIST) EMCJ2022-83 |
It has been reported that speakerphones used in remote work environments leak audio information through electromagnetic ... [more] |
EMCJ2022-83 pp.60-65 |
QIT (2nd) |
2022-12-09 10:30 |
Kanagawa |
Keio Univ. (Primary: On-site, Secondary: Online) |
Refined security proof of the binary-modulation continuous-variable quantum key distribution Takaya Matsuura (RMIT Univ.), Shinichiro Yamano (Univ. of Tokyo), Yui Kuramochi (Kyushu Univ.), Toshihiko Sasaki, Masato Koashi (Univ. of Tokyo) |
Continuous-variable (CV) quantum key distribution (QKD) has its distinct advantages in lower-cost
implementation and mu... [more] |
|
EMCJ, MW, EST, IEE-EMC [detail] |
2022-10-13 09:55 |
Akita |
Akita University (Primary: On-site, Secondary: Online) |
Fundamental Study on Leakage Source Model for Electromagnetic Information Leakage from Video Display Units Taiki Kitazawa (NAIST), Hiroyuki Kubo (Chiba Univ.), Yuichi Hayashi (NAIST) EMCJ2022-37 MW2022-83 EST2022-47 |
In the case of applying zoning countermeasures against the threat of information leakage using electromagnetic (EM) wave... [more] |
EMCJ2022-37 MW2022-83 EST2022-47 pp.11-15 |
EMCJ, MW, EST, IEE-EMC [detail] |
2022-10-14 09:50 |
Akita |
Akita University (Primary: On-site, Secondary: Online) |
Development of an Evaluation System for Modeling of Information Leakage Induced by Low-Power IEMI Seiya Takano, Shugo Kaji (NAIST), Masahiro Kinugawa (Univ. of Fukuchiyama), Daisuke Fujimoto, Yuichi Hayashi (NAIST) EMCJ2022-53 MW2022-99 EST2022-63 |
The threats of electromagnetic (EM) information leakage induced by low-power intentional EM interference have been repor... [more] |
EMCJ2022-53 MW2022-99 EST2022-63 pp.93-96 |
EMM, BioX, ISEC, SITE, ICSS, HWS, IPSJ-CSEC, IPSJ-SPT [detail] |
2022-07-20 13:50 |
Online |
Online |
An overview of the secrecy of patent applications in the Japanese Law Makoto Koike (MK Microwave) ISEC2022-23 SITE2022-27 BioX2022-48 HWS2022-23 ICSS2022-31 EMM2022-31 |
Economic security promotion law enacted on May 11, 2022 includes the provisions to keep patent application secret in Jap... [more] |
ISEC2022-23 SITE2022-27 BioX2022-48 HWS2022-23 ICSS2022-31 EMM2022-31 pp.88-97 |
HWS |
2022-04-26 13:55 |
Tokyo |
AIST Tokyo Waterfront (Annex) (Primary: On-site, Secondary: Online) |
Evaluation of Electromagnetic Information Leakage Intensity from Displays under Different Usage Environment Yoshiki Kitamura, Taiki Kitazawa, Daisuke Fujimoto, Yuichi Hayahi (NAIST) HWS2022-5 |
The threat of TEMPEST attack which reconstructs the screen information from the electromagnetic leakage caused by operat... [more] |
HWS2022-5 pp.24-27 |
VLD, HWS [detail] |
2022-03-08 15:45 |
Online |
Online |
Evaluation Method for EM Information Leakage from Speakerphone Using Voice Frequency Spectrum Analysis Hiroyuki Ueda, Seiya Takano, Daisuke Fujimoto, Yuichi Hayashi (NAIST) VLD2021-102 HWS2021-79 |
The usage environment for speakerphones becomes more diverse with remote work. As a result, the surrounding environment ... [more] |
VLD2021-102 HWS2021-79 pp.147-152 |
VLD, HWS [detail] |
2022-03-08 16:10 |
Online |
Online |
Fundamental Evaluation Method for EM Information Leakage Caused by Hardware Trojans on Signal Cables
-- Impact of Modulation Factor and Emission Intensity -- Taiga Yukawa, Shugo Kaji, Daisuke Fujimoto, Yuichi Hayashi (NAIST) VLD2021-103 HWS2021-80 |
The threats of electromagnetic (EM) information leakage caused by hardware Trojans (HTs) implemented on signal cables ha... [more] |
VLD2021-103 HWS2021-80 pp.153-157 |
HWS, VLD [detail] |
2021-03-04 17:15 |
Online |
Online |
Fundamental Study on Evaluation of EM Information Leakage from Smart Speakers with Different Installation Environments and Its Countermeasures Shogo Fukushima, Daisuke Fujimoto, Yuichi Hayashi (NAIST) VLD2020-91 HWS2020-66 |
Conventional studies on EM information leakage have mainly focused on only individual information devices. On the other ... [more] |
VLD2020-91 HWS2020-66 pp.130-135 |
IA |
2021-01-29 14:50 |
Online |
Online |
Retrieval in Confined Decodable Secret Sharing Scheme by Comparison of Difference in Coefficient between Shares and Its Security Evaluation Tomo Nakamura, Ryohei Yoshitomi, Eiji Fukutomi, Masahiro Fukumoto (KUT) IA2020-34 |
In Kochi Prefecture, an effort is underway to back up medical data such as electronic medical records to remote location... [more] |
IA2020-34 pp.21-26 |
ICD, HWS [detail] |
2020-10-26 09:50 |
Online |
Online |
Fundamental Evaluation Method of EM Information Leakage Caused by Intentional Electromagnetic Interference
-- Impact of Impedance Change in Digital Output Circuits -- Shugo Kaji, Daisuke Fujimoto (NAIST), Masahiro Kinugawa (Univ. of Fukuchiyama), Yuichi Hayashi (NAIST) HWS2020-27 ICD2020-16 |
New threats have been shown to cause information leakage by irradiating electromagnetic (EM) waves of specific intensity... [more] |
HWS2020-27 ICD2020-16 pp.13-17 |
EMCJ |
2020-07-02 15:20 |
Online |
Online |
Fundamental Evaluation of EM Information Leakage Caused by Intentional Electromagnetic Interference Shugo Kaji, Daisuke Fujimoto, Yuichi Hayashi (NAIST) EMCJ2020-15 |
The threat of electromagnetic (EM) information leakage has been focused on the acquisition of information inside the dev... [more] |
EMCJ2020-15 pp.25-28 |
SR |
2019-11-04 11:00 |
Overseas |
Rutgers University Inn & Conference Center, NJ, USA |
[Poster Presentation]
Optimal transmission order of information exchange among three nodes through relay with two antennas in Wireless MIMO Switching Arata Takahashi, Osamu Takyu, Hiroshi Fujiwara (Shinshu Univ.) SR2019-67 |
Communication using a repeater such as Wireless MIMO Switching enables efficient communication by simply deploying a net... [more] |
SR2019-67 pp.7-8 |
HWS |
2019-04-12 15:55 |
Miyagi |
Tohoku University |
Fundamental Study on Suppression of Self-Interference Wave Caused by Intentional Information Leakage with IEMI Riho Kawakami, Shugo Kaji (NAIST), Masahiro Kinugawa (NIT, Sendai College), Diasuke Fujimoto, Yu-ichi Hayashi (NAIST) HWS2019-6 |
There is a threat of information leakage through unintentional electromagnetic (EM) emissions from equipment. The feasib... [more] |
HWS2019-6 pp.31-35 |
RCS, SR, SRW (Joint) |
2019-03-08 13:45 |
Kanagawa |
YRP |
Consideration of security for PLNC with Untrusted Relay by double-objective optimization problem Go Ikeuchi, Osamu Takyu (Shinshu Univ), Takeo Fujii (UEC), Tomoaki Ohtsuki (Keio Univ), Fumihito Sasamori, Shiro Handa (Shinshu Univ) RCS2018-335 |
In this study, we have focused on wireless communication networks which can easily construct a network by using the rela... [more] |
RCS2018-335 pp.279-284 |
EMCJ, IEE-EMC, IEE-MAG |
2018-11-22 15:10 |
Overseas |
KAIST |
[Poster Presentation]
A Specification Method of Faulty Bytes in Cryptographic Module Using EM Information Leakage Naoto Saga (Tohoku Univ.), Yu-ichi Hayashi (NAIST), Takaaki Mizuki, Hideaki Sone (Tohoku Univ.) EMCJ2018-68 |
Fault analysis methods such as Differential Fault Analysis (DFA) need ciphertexts which have specific timing faults and ... [more] |
EMCJ2018-68 pp.39-40 |