Committee |
Date Time |
Place |
Paper Title / Authors |
Abstract |
Paper # |
ICSS, IPSJ-SPT |
2024-03-22 11:45 |
Okinawa |
OIST (Primary: On-site, Secondary: Online) |
Fast and Secure Scalar Multiplication for the GLS254 Binary Elliptic Curve Ryosuke Kido, Atsuko Miyaji (OU) ICSS2023-94 |
Elliptic curve cryptosystems (ECCs) are cryptographic schemes based on the discrete logarithm problem on an elliptic cur... [more] |
ICSS2023-94 pp.180-187 |
RCC, ISEC, IT, WBS |
2024-03-13 - 2024-03-14 |
Osaka |
Osaka Univ. (Suita Campus) |
Partial Key Exposure Attacks on UOV-like Signatures Yuki Seto, Hiroki Furue, Atsushi Takayasu (UTokyo) IT2023-104 ISEC2023-103 WBS2023-92 RCC2023-86 |
NIST is currently working on the standardization of post-quantum cryptography (PQC). Forty signature schemes were submit... [more] |
IT2023-104 ISEC2023-103 WBS2023-92 RCC2023-86 pp.189-196 |
VLD, HWS, ICD |
2024-02-29 15:55 |
Okinawa |
(Primary: On-site, Secondary: Online) |
[Memorial Lecture]
Modeling of Tamper Resistance to Electromagnetic Side-channel Attacks on Voltage-scaled Circuits Kazuki Minamiguchi, Yoshihiro Midoh, Noriyuki Miura, Jun Shiomi (Osaka Univ.) VLD2023-117 HWS2023-77 ICD2023-106 |
The threat of information leakage by Side-Channel Attacks (SCAs) using ElectroMagnetic (EM) leakage is becoming more and... [more] |
VLD2023-117 HWS2023-77 ICD2023-106 p.99 |
ICM, NS, CQ, NV (Joint) |
2023-11-21 13:15 |
Ehime |
Ehime Prefecture Gender Equality Center (Primary: On-site, Secondary: Online) |
[Encouragement Talk]
Security Evaluation of Low-latency Cipher based on Improved Simon against Deep Learning Analysis using Profiled Power Consumption Shu Takemoto, Yusuke Nozaki, Masaya Yoshikawa (Meijo Univ.) NS2023-114 |
Society 5.0 aims to solve problems in social systems through the intercommunication of small devices. On the other hand,... [more] |
NS2023-114 pp.20-25 |
VLD, DC, RECONF, ICD, IPSJ-SLDM [detail] |
2023-11-16 13:20 |
Kumamoto |
Civic Auditorium Sears Home Yume Hall (Primary: On-site, Secondary: Online) |
Tamper Resistance Evaluation on FPGA for Low-Latency Cipher Sonic Shu Takemoto, Yusuke Nozaki, Masaya Yoshikawa (Meijo Univ.) VLD2023-49 ICD2023-57 DC2023-56 RECONF2023-52 |
Industry 5.0 promotes smart factories for system optimization by utilizing IoT and AI in the industrial field. The smart... [more] |
VLD2023-49 ICD2023-57 DC2023-56 RECONF2023-52 pp.101-105 |
VLD, DC, RECONF, ICD, IPSJ-SLDM [detail] |
2023-11-17 09:35 |
Kumamoto |
Civic Auditorium Sears Home Yume Hall (Primary: On-site, Secondary: Online) |
Backside Side-Channel Attack by Silicon Substrate Voltage and Simulation Rikuu Hasegawa, Kazuki Monta, Takuya Watatsumi, Takuji Miki, Makoto Nagata (Kobe Univ) VLD2023-63 ICD2023-71 DC2023-70 RECONF2023-66 |
Integrated circuit (IC) chips equipped with cryptographic circuits are vulnerable to side-channel attacks, which use exp... [more] |
VLD2023-63 ICD2023-71 DC2023-70 RECONF2023-66 pp.173-177 |
EMM, BioX, ISEC, SITE, ICSS, HWS, IPSJ-CSEC, IPSJ-SPT [detail] |
2023-07-25 09:00 |
Hokkaido |
Hokkaido Jichiro Kaikan |
Side-Channel Attacks on Unrolled Implementation of Trivium Soichiro Kobayashi, Rei Ueno (Tohoku Univ.), Yosuke Todo (NTT), Naofumi Homma (Tohoku Univ.) ISEC2023-44 SITE2023-38 BioX2023-47 HWS2023-44 ICSS2023-41 EMM2023-44 |
This paper describes a side-channel attack (SCA) on unrolled implementation of Trivium. Previous SCAs on Trivium, such a... [more] |
ISEC2023-44 SITE2023-38 BioX2023-47 HWS2023-44 ICSS2023-41 EMM2023-44 pp.194-201 |
EMCJ |
2023-06-09 15:05 |
Hokkaido |
Otaru Chamber of Commerce & Industry (Primary: On-site, Secondary: Online) |
Fundamental Investigation of Electromagnetic Analysis Attack Detection Based on Frequency Difference between Ring Oscillators Taichi Sato, Daisuke Fujimoto, Yuichi Hayashi (NAIST) EMCJ2023-25 |
An attack that measures the power consumption of an encryption circuit using an EM probe and acquires secret information... [more] |
EMCJ2023-25 pp.66-69 |
HWS |
2023-04-14 13:45 |
Oita |
(Primary: On-site, Secondary: Online) |
Fundamental Study on the effect of the Number of RNS Bases on the Side-channel Information Leakage from Modular Multiplier Daisuke Fujimoto, Rikuo Haga, Yuichi Hayashi (NAIST) HWS2023-2 |
In public-key cryptography, the Residue Number System (RNS) has been proposed as a hardware implementation approach that... [more] |
HWS2023-2 pp.6-8 |
HWS |
2023-04-14 14:10 |
Oita |
(Primary: On-site, Secondary: Online) |
Modeling of Electromagnetic Leakage from Voltage-scaled Cryptographic Circuits Kazuki Minamiguchi, Yoshihiro Midoh, Noriyuki Miura, Jun Shiomi (Osaka Univ.) HWS2023-3 |
This paper evaluates an electromagnetic leakage model which predicts the supply voltage dependency by using practical cr... [more] |
HWS2023-3 pp.9-10 |
HWS, VLD |
2023-03-04 14:20 |
Okinawa |
(Primary: On-site, Secondary: Online) |
Side-channel Information Leakage Resistance Evaluation of Cryptographic Multi- chip Modules Takumi Matsumaru, Kazuki Monta (Kobe Univ.), Takaaki Okidono (SCU), Takuzi Miki, Makoto Nagata (Kobe Univ.) VLD2022-122 HWS2022-93 |
Demand for multi-chip packaging technology is rising. This study focuses on two types of packaging technologies in parti... [more] |
VLD2022-122 HWS2022-93 pp.273-278 |
EMCJ |
2023-01-27 13:50 |
Okayama |
WASHU BLUE RESORT (Primary: On-site, Secondary: Online) |
Side-Channel Information Leakage in Common-Mode Current from a Printed Circuit Board with Separated Ground Planes Kohei Shimoda, Masaki Himuro, Kengo Iokibe, Yoshitaka Toyota (Okayama Univ.) EMCJ2022-84 |
Side-channel attacks, which break encryption by analyzing the physical behavior leaked from cryptographic devices, have ... [more] |
EMCJ2022-84 pp.66-71 |
VLD, DC, RECONF, ICD, IPSJ-SLDM [detail] |
2022-11-29 14:40 |
Kumamoto |
(Primary: On-site, Secondary: Online) |
Evaluating system level security of cryptography module Takumi Matsumaru, Kazuki Monta (Kobe Univ.), Takaaki Okidono (SCU), Takuji Miki, Makoto Nagata (Kobe Univ.) VLD2022-32 ICD2022-49 DC2022-48 RECONF2022-55 |
Packaging technology is a technique used to encapsulate semiconductor chips in a frame, and has been attracting attentio... [more] |
VLD2022-32 ICD2022-49 DC2022-48 RECONF2022-55 pp.78-81 |
VLD, DC, RECONF, ICD, IPSJ-SLDM [detail] |
2022-11-29 15:05 |
Kumamoto |
(Primary: On-site, Secondary: Online) |
Evaluation of power delivery networks in secure semiconductor systems Masaru Mashiba, Kazuki Monta (Kobe Univ.), Takaaki Okidono (SCU), Takuzi Miki, Makoto Nagata (Kobe Univ.) VLD2022-33 ICD2022-50 DC2022-49 RECONF2022-56 |
With the development of the IoT, hardware security is becoming increasingly important. Physical attacks on cryptoprocess... [more] |
VLD2022-33 ICD2022-50 DC2022-49 RECONF2022-56 pp.82-86 |
NS, ICM, CQ, NV (Joint) |
2022-11-24 11:10 |
Fukuoka |
Humanities and Social Sciences Center, Fukuoka Univ. + Online (Primary: On-site, Secondary: Online) |
Deep Learning Side-Channel Attack in Noise Based Countermeasure Simon Shu Takemoto, Yoshiya Ikezaki, Yusuke Nozaki, Masaya Yoshikawa (Meijo Univ.) NS2022-103 |
The IoT requires the implementation of cryptographic techniques to ensure the confidentiality, integrity, and availabili... [more] |
NS2022-103 pp.19-22 |
ICSS |
2022-11-08 10:55 |
Hokkaido |
Hokkaido Jichiro Kaikan (Primary: On-site, Secondary: Online) |
An Efficient Method of Finding Flippable Bits for RAMBleed Haruka Okuda (Kobe Univ.), Makoto Takita (Univ. of Hyogo), Kazuhide Fukushima, Yuto Nakano (KDDI Research, Inc.), Yoshiaki Shiraishi, Masakatu Morii (Kobe Univ.) ICSS2022-47 |
Rowhammer is an attack that repeatedly accesses the same row in DRAM (Dynamic Random Access Memory) to cause bit flippin... [more] |
ICSS2022-47 pp.55-60 |
HWS, ICD |
2022-10-25 10:00 |
Shiga |
(Primary: On-site, Secondary: Online) |
Hardware Evaluation of Romulus with Threshold Implementation and Its Simulation-Based Leakage Assessment Masaya Nemoto, Tamon Asano, Takeshi Sugawara (UEC) HWS2022-30 ICD2022-22 |
This paper provides a third-party hardware performance evaluation of the NIST LWC finalist
Romulus with threshold imple... [more] |
HWS2022-30 ICD2022-22 pp.1-5 |
HWS, ICD |
2022-10-25 10:25 |
Shiga |
(Primary: On-site, Secondary: Online) |
A Study on Profiled Side-channel Analysis against AES-CTR Katsumi Ebina, Rei Ueno, Naohumi Homma (Tohoku Univ) HWS2022-31 ICD2022-23 |
This paper describes profiling Side-Channel Analysis for AES counter mode.
AES-CTR is a mode in which an internally sto... [more] |
HWS2022-31 ICD2022-23 pp.6-11 |
HWS, ICD |
2022-10-25 10:50 |
Shiga |
(Primary: On-site, Secondary: Online) |
Power current simulation and side channel leakage evaluation of cryptographic IC chips Rikuu Hasegawa, Takuya Wadatsumi, Kazuki Monta, Takuji Miki, Makoto Nagata (Kobe Univ.) HWS2022-32 ICD2022-24 |
Cryptographic modules are threatened by side-channel attacks that use side-channel information to decrypt internal confi... [more] |
HWS2022-32 ICD2022-24 pp.12-16 |
SS, IPSJ-SE, KBSE [detail] |
2022-07-28 16:30 |
Hokkaido |
Hokkaido-Jichiro-Kaikan (Sapporo) (Primary: On-site, Secondary: Online) |
Deep Learning Power Analysis Against Protected PRINCE Shu Takemoto, Yoshiya Ikezaki, Yusuke Nozaki, Masaya Yoshikawa (Meijo Univ.) SS2022-4 KBSE2022-14 |
In recent years, with the development of deep learning, AI has been incorporated in the field of cyber security. On the ... [more] |
SS2022-4 KBSE2022-14 pp.19-24 |