Engineering Sciences/NOLTA-Hardware Security(Date:2023/07/24)

Presentation
Deep Learning-Based Side-Channel Analysis Considering the Effect of Noise and Transfer Characteristics on the Measurement Process

Yoshiki Kitamura(NAIST),  Taiki Kitazawa(NAIST),  Yuichi Hayashi(NAIST),  

[Date]2023-07-24
[Paper #]ISEC2023-18,SITE2023-12,BioX2023-21,HWS2023-18,ICSS2023-15,EMM2023-18
[Invited Talk] Please fill in this form

Hideyuki Nakashima(SCU),  

[Date]2023-07-24
[Paper #]
[Invited Talk] Please fill in this form

Mai Sugimoto(Kansai Univ.),  

[Date]2023-07-24
[Paper #]
[Invited Talk] Please fill in this form

Nobutsugu Kanzaki(Nanzan Univ.),  

[Date]2023-07-24
[Paper #]
Higher Order Differential Property of Block Cipher LBC-3

Naoki Shibayama(Tokyo Univ. of Science),  Yasutaka Igarashi(Tokyo Univ. of Science),  

[Date]2023-07-25
[Paper #]ISEC2023-47,SITE2023-41,BioX2023-50,HWS2023-47,ICSS2023-44,EMM2023-47
Secure Cryptographic Unit with built-in Signature Generation Hardware for Aggregate Signature Schemes and its FPGA Implementation

Toshihiro Sato(SCU),  Shohei Kawasaki(SCU),  Kaoru Masada(Tokyo Univ.),  Riku Anzai(YNU),  Junichi Sakamoto(YNU),  Naoki Yoshida(YNU),  Yasuyoshi Uemura(SCU),  Makoto Ikeda(Tokyo Univ.),  Tsutomu Matsumoto(YNU),  

[Date]2023-07-25
[Paper #]ISEC2023-42,SITE2023-36,BioX2023-45,HWS2023-42,ICSS2023-39,EMM2023-42
An Approach to Authorization Protocol Using PUF-based Access Token

Risa Yashiro(SECOM),  Kohei Isobe(SECOM),  Hiroki Kunii(SECOM),  

[Date]2023-07-25
[Paper #]ISEC2023-41,SITE2023-35,BioX2023-44,HWS2023-41,ICSS2023-38,EMM2023-41
SAT-based Differential analysis of AEGIS Family

Takuro Shiraya(UOH),  Kosei Sakamoto(Mitsubishi Electric),  Takanori Isobe(UOH),  

[Date]2023-07-25
[Paper #]ISEC2023-45,SITE2023-39,BioX2023-48,HWS2023-45,ICSS2023-42,EMM2023-45
SAT-based Search of Related-key Impossible Distinguisher for Piccolo, TWINE, LBlock

Shion Utsumi(Univ. of Hyogo),  Kosei Sakamoto(MELCO),  Takanori Isobe(Univ. of Hyogo),  

[Date]2023-07-25
[Paper #]ISEC2023-46,SITE2023-40,BioX2023-49,HWS2023-46,ICSS2023-43,EMM2023-46
Anomaly detection with dataset including replay-attack communication

Koushi Nishi(TUT),  Futa Yuichi(TUT),  Okazaki Hiroyuki(Shinshu University),  

[Date]2023-07-25
[Paper #]ISEC2023-52,SITE2023-46,BioX2023-55,HWS2023-52,ICSS2023-49,EMM2023-52
Side-Channel Attacks on Unrolled Implementation of Trivium

Soichiro Kobayashi(Tohoku Univ.),  Rei Ueno(Tohoku Univ.),  Yosuke Todo(NTT),  Naofumi Homma(Tohoku Univ.),  

[Date]2023-07-25
[Paper #]ISEC2023-44,SITE2023-38,BioX2023-47,HWS2023-44,ICSS2023-41,EMM2023-44
Implementation and Evaluation of Payload Encryption and Message Authentication Code Using Lightweight Cryptography ASCON in CAN FD Communication

Kotaro Ishikawa(Okayama Univ.),  Naoto Kawahara(Okayama Univ.),  Takuya Kusaka(Shimane Univ.),  Yuta Kodera(Okayama Univ.),  Yasuyuki Nogami(Okayama Univ.),  

[Date]2023-07-25
[Paper #]ISEC2023-38,SITE2023-32,BioX2023-41,HWS2023-38,ICSS2023-35,EMM2023-38
About the maximum probability differential characteristic for Multiple Branch Structures

Kazuma Taka(Hyogo Univ.),  Kosei Sakamoto(Mitsubishi Electric),  Takanori Isobe(Hyogo Univ.),  

[Date]2023-07-25
[Paper #]ISEC2023-48,SITE2023-42,BioX2023-51,HWS2023-48,ICSS2023-45,EMM2023-48
Security Analysis on Nostr protocol for decentralized SNS

Hayato Kimura(Univ. Hyogo),  Takanori Isobe(Univ. Hyogo),  

[Date]2023-07-25
[Paper #]ISEC2023-51,SITE2023-45,BioX2023-54,HWS2023-51,ICSS2023-48,EMM2023-51
Extended $k^m$-anonymity for randomization

Masaya Kobayashi(Kanagawa Univ.),  Atsushi Fujioka(Kanagawa Univ.),  Koji Chida(Gunma Univ.),  

[Date]2023-07-25
[Paper #]ISEC2023-53,SITE2023-47,BioX2023-56,HWS2023-53,ICSS2023-50,EMM2023-53
Clone Resistance of Artifact Metrics: Spatial Frequency Filtering

Akira Iwahashi(YNU),  Iwaki Miyamoto(YNU),  Naoki Yoshida(YNU),  Tsutomu Matsumoto(YNU),  

[Date]2023-07-25
[Paper #]ISEC2023-43,SITE2023-37,BioX2023-46,HWS2023-43,ICSS2023-40,EMM2023-43
An Implementation and Evaluation of Communication Schemes Using Authenticated Cryptography for MAVLink Communication

Ryuto Kuwada(Okayama Univ.),  Nobuya Ishihara(Okayama Univ.),  Yuta Kodera(Okayama Univ.),  Yasuyuki Nogami(Okayama Univ.),  

[Date]2023-07-25
[Paper #]ISEC2023-39,SITE2023-33,BioX2023-42,HWS2023-39,ICSS2023-36,EMM2023-39
CNN-Based Iris Recognition Using Multi-spectral Iris Images

Ryosuke Kuroda(Toyama Prefectural Univ.),  Tetsuya Honda(Toyama Prefectural Univ.),  Hironobu Takano(Toyama Prefectural Univ.),  

[Date]2023-07-25
[Paper #]ISEC2023-36,SITE2023-30,BioX2023-39,HWS2023-36,ICSS2023-33,EMM2023-36
A Study on the Application of Nudges to Improve Cyber Security Practices

Hideyuki Fujii(NRI Secure),  

[Date]2023-07-25
[Paper #]ISEC2023-50,SITE2023-44,BioX2023-53,HWS2023-50,ICSS2023-47,EMM2023-50
Is Copying for Information Security Research ‘Fair Use’?

Yusuke Tachibana(FIT),  

[Date]2023-07-25
[Paper #]ISEC2023-49,SITE2023-43,BioX2023-52,HWS2023-49,ICSS2023-46,EMM2023-49
<<123>> 21-40hit(43hit)