Engineering Sciences/NOLTA-Hardware Security(Date:2020/10/26)

Presentation
Probing Attack on Share-Serial Threshold Implementation of AES

Takeshi Sugawara(UEC),  Yang Li(UEC),  Kazuo Sakiyama(UEC),  

[Date]2020-10-26
[Paper #]HWS2020-29,ICD2020-18
Feasibility of lattice attacks on ECDSA

Kotaro Abe(Tokyo Univ.),  Makoto Ikeda(Tokyo Univ.),  

[Date]2020-10-26
[Paper #]HWS2020-30,ICD2020-19
Hardware Trojan using LUT Structure of AI Inference Devices

Yusuke Nozaki(Meijo Univ.),  Shu Takemoto(Meijo Univ.),  Yoshiya Ikezaki(Meijo Univ.),  Masaya Yoshikawa(Meijo Univ.),  

[Date]2020-10-26
[Paper #]HWS2020-36,ICD2020-25
Low-Latency Countermeasure Circuit Oriented Hardware Trojan and its Evaluation

Shu Takemoto(Meijo Univ.),  Yoshiya Ikezaki(Meijo Univ.),  Yusuke Nozaki(Meijo Univ.),  Masaya Yoshikawa(Meijo Univ.),  

[Date]2020-10-26
[Paper #]HWS2020-37,ICD2020-26
Security Threats and Preventions for Photonics Computing Model

Junko Takahashi(NTT),  Koji Chida(NTT),  Takeshi Sakamoto(NTT),  

[Date]2020-10-26
[Paper #]HWS2020-33,ICD2020-22
Investigation of High-Efficiency Simulation Method for Detection of Physical Design Falsification in Secure IC Chip

Kazuki Yasuda(Kobe Univ.),  Kazuki Monta(Kobe Univ.),  Daichi Nakagawa(Kobe Univ.),  Makoto Nagata(Kobe Univ.),  

[Date]2020-10-26
[Paper #]HWS2020-41,ICD2020-30
Domestic Hardware Trojan Research Trends

Shinichi Kawamura(AIST),  Yu-ich Hayashi(AIST),  

[Date]2020-10-26
[Paper #]HWS2020-34,ICD2020-23
N/A

Kazunari Takasaki(Waseda Univ.),  Ryoichi Kida(LAC),  Nozomu Togawa(Waseda Univ.),  

[Date]2020-10-26
[Paper #]HWS2020-32,ICD2020-21
A Detection Method for Hardware Trojans Inserted into Cryptographic Hardware Netlists

Akira Ito(Tohoku Univ.),  Rei Ueno(Tohoku Univ.),  Naofumi Homma(Tohoku Univ.),  

[Date]2020-10-26
[Paper #]HWS2020-38,ICD2020-27
Design of Efficient AES Hardware with Immediately Fault Detection Capability

Yusuke Yagyu(Tohoku Univ.),  Rei Ueno(Tohoku Univ.),  Naofumi Homma(Tohoku Univ.),  

[Date]2020-10-26
[Paper #]HWS2020-31,ICD2020-20
N/A

Tatsuki Kurihara(Waseda Univ.),  Nozomu Togawa(Waseda Univ.),  

[Date]2020-10-26
[Paper #]HWS2020-39,ICD2020-28
Examination of requirements for power side-channel attack resistance evaluation boards of cryptographic integrated circuits

Tomonobu Kan(Okayama Univ.),  Kengo Iokibe(Okayama Univ.),  Yoshitaka Toyota(Okayama Univ.),  

[Date]2020-10-26
[Paper #]HWS2020-25,ICD2020-14
Laser-based Attacks on Ultrasonic Sensors

Tatsuya Suehiro(Yokohama National Univ.),  Taku Toyama(Yokohama National Univ.),  Junichi Sakamoto(Yokohama National Univ.),  Tsutomu Matsumoto(Yokohama National Univ.),  

[Date]2020-10-26
[Paper #]HWS2020-28,ICD2020-17
N/A

Kohei Nozawa(Waseda Univ.),  Kento Hasegawa(KDDI Research, Inc.),  Seira Hidano(KDDI Research, Inc.),  Shinsaku Kiyomoto(KDDI Research, Inc.),  Nozomu Togawa(Waseda Univ.),  

[Date]2020-10-26
[Paper #]HWS2020-40,ICD2020-29
Power Analysis Attack Using Pipeline Scheduling on Pairing Hardware

Mitsufumi Yamazaki(YNU),  Junichi Sakamoto(YNU),  Tsutomu Matsumoto(YNU),  

[Date]2020-10-26
[Paper #]HWS2020-26,ICD2020-15
Physical-Level Detection Approach against Hardware Trojans inside Semiconductor Chips (II)

Hirofumi Sakane(AIST),  Shinichi Kawamura(AIST),  Kentaro Imafuku(AIST),  Yohei Hori(AIST),  Makoto Nagata(AIST),  Yuichi Hayashi(AIST),  Tsutomu Matsumoto(AIST),  

[Date]2020-10-26
[Paper #]HWS2020-35,ICD2020-24
Fundamental Evaluation Method of EM Information Leakage Caused by Intentional Electromagnetic Interference

Shugo Kaji(NAIST),  Daisuke Fujimoto(NAIST),  Masahiro Kinugawa(Univ. of Fukuchiyama),  Yuichi Hayashi(NAIST),  

[Date]2020-10-26
[Paper #]HWS2020-27,ICD2020-16