Information and Systems-Image Engineering(Date:2019/11/01)

Presentation
Implementation and Evaluation of EC-ElGamal Encryption with a Twisted Montgomery Curve over Tower Field on Arduino

Yuta Hashimoto(Okayama Univ.),  Tadaki Kanenari(Okayama Univ.),  Takuya Kusaka(Okayama Univ.),  Yasuyuki Nogami(Okayama Univ.),  

[Date]2019-11-01
[Paper #]HWS2019-57,ICD2019-18
非正規挿入デバイス検知のための電気容量監視装置とその実験的評価

Makoto Nishizawa(Waseda Univ.),  Kento Hasegawa(Waseda Univ.),  Nozomu Togawa(Waseda Univ.),  

[Date]2019-11-01
[Paper #]HWS2019-66,ICD2019-27
An Implementation of Tate and Ate Pairing over a Curve of Embedded Degree 14

Zihao Song(Okayama Univ.),  Rikuya Matsumura(Okayama Univ.),  Yuki Nanjo(Okayama Univ.),  Takuya Kusaka(Okayama Univ.),  Yasuyuki Nogami(Okayama Univ.),  

[Date]2019-11-01
[Paper #]HWS2019-58,ICD2019-19
Demonstration of Adversarial Examples for Hardware Trojan Detection

Kohei Nozawa(Waseda Univ.),  Kento Hasegawa(Waseda Univ.),  Seira Hidano(KDDI Research),  Shinsaku Kiyomoto(KDDI Research),  Kazuo Hashimoto(Waseda Univ.),  Nozomu Togawa(Waseda Univ.),  

[Date]2019-11-01
[Paper #]HWS2019-64,ICD2019-25
Countermeasures for power noise and side-channel leakage in crypto modules (Ⅱ)

Kazuki Monta(Kobe Univ.),  Akihiro Tsukioka(Kobe Univ.),  Daichi Nakagawa(Kobe Univ.),  Kazuki Yasuoka(Kobe Univ.),  Noriyuki Miura(Kobe Univ.),  Makoto Nagata(Kobe Univ.),  Karthik Srinivasan(ANSYS),  Shan Wan(ANSYS),  Lang Lin(ANSYS),  Ying-Siun Li(ANSYS),  Norman Chang(ANSYS),  

[Date]2019-11-01
[Paper #]HWS2019-61,ICD2019-22
A Study on Correlation Electromagnetics Analysis on Pairing-based Cryptographic Hardware of Unified Hardware

Yuma Kadowaki(Tohoku Univ.),  Rei Ueno(Tohoku Univ.),  Ville Yli-M?yry(Tohoku Univ.),  Daisuke Fujimoto(NAIST),  Yuichi Hayashi(NAIST),  Makoto Nagata(Kobe Univ.),  Makoto Ikeda(UT),  Tsutomu Matsumto(YNU),  Naofumi Homma(Tohoku Univ.),  

[Date]2019-11-01
[Paper #]HWS2019-59,ICD2019-20
A Design of Isogeny-Based Cryptographic Hardware Architecture Using Residue Number System

Shuto Funakoshi(RIEC Tohoku Univ.),  Rei Ueno(RIEC Tohoku Univ.),  Naofumi Homma(RIEC Tohoku Univ.),  

[Date]2019-11-01
[Paper #]HWS2019-60,ICD2019-21
Physical-level detection approach against hardware Trojans inside semiconductor chips (I)

Shinichi Kawamura(AIST),  Kentaro Imafuku(AIST),  Hirofumi Sakane(AIST),  Yohei Hori(AIST),  Makoto Nagata(AIST/Kobe Univ.),  Yuichi Hayashi(AIST/NAIST),  Tsutomu Matsumoto(AIST/YNU),  

[Date]2019-11-01
[Paper #]HWS2019-65,ICD2019-26
Fundamental study on an estimation method of output bits from TERO-based TRNG during frequency injection attack

Saki Osuka(NAIST),  Daisuke Fujimoto(NAIST),  Yuichi Hayashi(NAIST),  

[Date]2019-11-01
[Paper #]HWS2019-62,ICD2019-23
A Study of Hardware Trojan Detection Method using Deep Learning in Asynchronous Circuits

Hikaru Inafune(Hirosaki Univ.),  Masashi Imai(Hirosaki Univ.),  

[Date]2019-11-01
[Paper #]HWS2019-63,ICD2019-24