• Search Research Projects
  • Search Researchers
  • How to Use
  1. Back to previous page

Resilience Enhancement of IoT Ecosystem by Cryptographic Technologies

Research Project

Project/Area Number 18H05289
Research Category

Grant-in-Aid for Scientific Research (S)

Allocation TypeSingle-year Grants
Review Section Broad Section J
Research InstitutionThe University of Electro-Communications

Principal Investigator

Sakiyama Kazuo  電気通信大学, 大学院情報理工学研究科, 教授 (80508838)

Co-Investigator(Kenkyū-buntansha) 廣瀬 勝一  福井大学, 学術研究院工学系部門, 教授 (20228836)
李 陽  電気通信大学, 大学院情報理工学研究科, 准教授 (20821812)
宮原 大輝  電気通信大学, 大学院情報理工学研究科, 助教 (20928288)
渡邉 洋平  電気通信大学, 大学院情報理工学研究科, 助教 (40792263)
岩本 貢  電気通信大学, 大学院情報理工学研究科, 教授 (50377016)
駒野 雄一  株式会社東芝研究開発センター, その他部局等, 主任研究員 (50393856)
菅原 健  電気通信大学, 大学院情報理工学研究科, 准教授 (60785236)
三浦 典之  大阪大学, 大学院情報科学研究科, 教授 (70650555)
太田 和夫  電気通信大学, 大学院情報理工学研究科, 特任教授 (80333491)
Project Period (FY) 2018-06-11 – 2023-03-31
Project Status Completed (Fiscal Year 2022)
Budget Amount *help
¥194,350,000 (Direct Cost: ¥149,500,000、Indirect Cost: ¥44,850,000)
Fiscal Year 2022: ¥34,450,000 (Direct Cost: ¥26,500,000、Indirect Cost: ¥7,950,000)
Fiscal Year 2021: ¥36,790,000 (Direct Cost: ¥28,300,000、Indirect Cost: ¥8,490,000)
Fiscal Year 2020: ¥32,240,000 (Direct Cost: ¥24,800,000、Indirect Cost: ¥7,440,000)
Fiscal Year 2019: ¥40,430,000 (Direct Cost: ¥31,100,000、Indirect Cost: ¥9,330,000)
Fiscal Year 2018: ¥50,440,000 (Direct Cost: ¥38,800,000、Indirect Cost: ¥11,640,000)
Keywords情報セキュリティ / 暗号理論 / 情報理論 / ハードウェアセキュリティ / 集積回路工学 / 集積回路学
Outline of Final Research Achievements

Against physical attacks that read signals inside IoT devices by laser irradiation or direct probing, by regarding the circulation of security states as a function of the IoT ecosystem, we worked on leakage-resilient cryptography (cryptography field), information distillation (information theory field), and leakage detection technology (hardware security field.) We have presented the research results at top-tier international conferences and academic journals. Furthermore, by promoting cross-disciplinary research beyond conventional research, we have developed leakage sensor circuits that detect attacks, algorithms that securely restore keys, and protocols that operate them securely. As a result, we have achieved significant results that contribute to constructing a resilient IoT system using cryptographic hardware.

Academic Significance and Societal Importance of the Research Achievements

情報基盤が高度に整備され、多くの人がデジタル化の利便性を享受できるようになった。しかし、社会に新しい技術が普及することでセキュリティを脅かす新たな脅威が出現している。セキュリティの根幹を担う暗号技術の脆弱性をつく攻撃者の手の内を明かし、効率的な対策を社会実装し、攻撃による被害を未然に防ぐ、あるいは最小限に留めるにはどうすれば良いか?
本研究課題で得られた成果は、こういった社会からのセキュリティ上のニーズに柔軟に応えた。学術の観点からは、複数の学術分野で培った知識を融合することで、セキュリティやプライバシーに関する暗号技術の
さらなる深化と新たな学術的知識創生の場の形成に寄与した。

Assessment Rating
Ex-post Assessment Comments (Rating)

A+: In light of the aim of introducing the research area into the research categories, more research outcomes have been produced than expected.

Assessment Rating
Interim Assessment Comments (Rating)

A+: In light of the aim of introducing the research area into the research categories, more progress has been made in research than expected.

Report

(11 results)
  • 2023 Ex-post Assessment (Comments) ( PDF )
  • 2022 Annual Research Report   Final Research Report ( PDF )
  • 2021 Annual Research Report
  • 2020 Abstract (Interim Assessment) ( PDF )   Annual Research Report   Interim Assessment (Comments) ( PDF )
  • 2019 Annual Research Report
  • 2018 Abstract ( PDF )   Comments on the Screening Results ( PDF )   Annual Research Report
  • Research Products

    (220 results)

All 2024 2023 2022 2021 2020 2019 2018 Other

All Int'l Joint Research (8 results) Journal Article (72 results) (of which Int'l Joint Research: 8 results,  Peer Reviewed: 69 results,  Open Access: 31 results) Presentation (131 results) (of which Int'l Joint Research: 16 results,  Invited: 18 results) Book (6 results) Remarks (3 results)

  • [Int'l Joint Research] KU Leuven大(ベルギー)

    • Related Report
      2022 Annual Research Report
  • [Int'l Joint Research] Clermont Auvergne大(フランス)

    • Related Report
      2022 Annual Research Report
  • [Int'l Joint Research] KU Leuven(ベルギー)

    • Related Report
      2021 Annual Research Report
  • [Int'l Joint Research] KU Leuven大(ベルギー)

    • Related Report
      2020 Annual Research Report
  • [Int'l Joint Research] KU Leuven(ベルギー)

    • Related Report
      2019 Annual Research Report
  • [Int'l Joint Research] Radboud University(オランダ)

    • Related Report
      2018 Annual Research Report
  • [Int'l Joint Research] Telecom ParisTech(フランス)

    • Related Report
      2018 Annual Research Report
  • [Int'l Joint Research] Le Quy Don Technical University(ベトナム)

    • Related Report
      2018 Annual Research Report
  • [Journal Article] A Computationally Efficient Card-Based Majority Voting Protocol with Fewer Cards in the Private Model2023

    • Author(s)
      ABE Yoshiki、NAKAI Takeshi、WATANABE Yohei、IWAMOTO Mitsugu、OHTA Kazuo
    • Journal Title

      IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences

      Volume: E106.A Issue: 3 Pages: 315-324

    • DOI

      10.1587/transfun.2022CIP0021

    • ISSN
      0916-8508, 1745-1337
    • Year and Date
      2023-03-01
    • Related Report
      2022 Annual Research Report
    • Peer Reviewed / Open Access
  • [Journal Article] Shape of Integrated System Interfacing between Cyber and Physical Space2023

    • Author(s)
      三浦 典之
    • Journal Title

      IEICE ESS Fundamentals Review

      Volume: 16 Issue: 3 Pages: 147-155

    • DOI

      10.1587/essfr.16.3_147

    • ISSN
      1882-0875
    • Year and Date
      2023-01-01
    • Related Report
      2022 Annual Research Report
    • Peer Reviewed / Open Access
  • [Journal Article] Card-based Cryptographic Protocols for Private Set Intersection2023

    • Author(s)
      Anastasiia Doi, Toimoki Ono, Takeshi Nakai, Kazumasa Shinagawa, Yohei Watanabe, Koji Nuida, and Mitsugu Iwamoto
    • Journal Title

      Proc. ISITA 2022

      Volume: -

    • NAID

      170000186069

    • Related Report
      2022 Annual Research Report
    • Peer Reviewed
  • [Journal Article] An Improvement of Multi-Party Private Set Intersection Based on Oblivious Programmable PRFs2023

    • Author(s)
      Seiya Shimizu, Takeshi Nakai, Yohei Watanabe, and Mitsugu Iwamoto
    • Journal Title

      Proc. ISITA 2022

      Volume: -

    • Related Report
      2022 Annual Research Report
    • Peer Reviewed
  • [Journal Article] Card-Based Zero-Knowledge Proof Protocol for Pancake Sorting2023

    • Author(s)
      Yuichi Komano and Takaaki Mizuki
    • Journal Title

      Proc. SecITC 2022 (Lecture Notes in Computer Science)

      Volume: -

    • Related Report
      2022 Annual Research Report
    • Peer Reviewed
  • [Journal Article] Lightweight Authentication Using Noisy Key Derived from Physically Unclonable Function2023

    • Author(s)
      Yuichi Komano, Mitsugu Iwamoto, Kazuo Ohta, and Kazuo Sakiyama
    • Journal Title

      Proc. SecITC 2022 (Lecture Notes in Computer Science)

      Volume: -

    • Related Report
      2022 Annual Research Report
    • Peer Reviewed
  • [Journal Article] Hide a Liar: Card-Based ZKP Protocol for Usowan2023

    • Author(s)
      Robert Leo、Miyahara Daiki、Lafourcade Pascal、Mizuki Takaaki
    • Journal Title

      TAMC 2022, Lecture Notes in Computer Science

      Volume: 13571 Pages: 201-217

    • DOI

      10.1007/978-3-031-20350-3_17

    • ISBN
      9783031203497, 9783031203503
    • Related Report
      2022 Annual Research Report
    • Peer Reviewed / Open Access / Int'l Joint Research
  • [Journal Article] Secure Computations Through Checking Suits of Playing Cards2023

    • Author(s)
      Miyahara Daiki、Mizuki Takaaki
    • Journal Title

      FAW 2022, Lecture Notes in Computer Science

      Volume: 13461 Pages: 110-128

    • DOI

      10.1007/978-3-031-20796-9_9

    • ISBN
      9783031207952, 9783031207969
    • Related Report
      2022 Annual Research Report
    • Peer Reviewed / Open Access
  • [Journal Article] Towards Verifying Physical Assumption in Card-Based Cryptography2023

    • Author(s)
      Masahisa Shimano, Kazuo Sakiyama, and Daiki Miyahara
    • Journal Title

      Proc. SecITC 2022 (Lecture Notes in Computer Science)

      Volume: -

    • Related Report
      2022 Annual Research Report
    • Peer Reviewed
  • [Journal Article] Software Evaluation for Second Round Candidates in NIST Lightweight Cryptography2023

    • Author(s)
      Ryota Hira, Tomoaki Kitahara, Daiki Miyahara, Yuko Hara-Azumi, Yang Li, and Kazuo Sakiyama
    • Journal Title

      Journal of Information Processing

      Volume: 31 Issue: 0 Pages: 205-219

    • DOI

      10.2197/ipsjjip.31.205

    • ISSN
      1882-6652
    • Related Report
      2022 Annual Research Report
    • Peer Reviewed / Open Access
  • [Journal Article] Simulation Based Evaluation of Bit-Interaction Side-Channel2023

    • Author(s)
      Tamon Asano and Takeshi Sugawara
    • Journal Title

      Journal of Cryptographic Engineering

      Volume: -

    • Related Report
      2022 Annual Research Report
    • Peer Reviewed
  • [Journal Article] 高機能暗号の社会展開を促進する物理・視覚暗号2023

    • Author(s)
      花岡悟一郎, 岩本貢, 渡邉洋平, 水木敬明, 安部芳紀, 品川和雅, 新井美音, 矢内直人
    • Journal Title

      電子情報通信学会和文論文誌A

      Volume: J106-A

    • Related Report
      2022 Annual Research Report
    • Peer Reviewed
  • [Journal Article] How to Make a Secure Index for Searchable Symmetric Encryption, Revisited2022

    • Author(s)
      WATANABE Yohei、NAKAI Takeshi、OHARA Kazuma、NOJIMA Takuya、LIU Yexuan、IWAMOTO Mitsugu、OHTA Kazuo
    • Journal Title

      IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences

      Volume: E105.A Issue: 12 Pages: 1559-1577

    • DOI

      10.1587/transfun.2021EAP1163

    • ISSN
      0916-8508, 1745-1337
    • Year and Date
      2022-12-01
    • Related Report
      2022 Annual Research Report
    • Peer Reviewed / Open Access
  • [Journal Article] Mixture-Based 5-Round Physical Attack against AES: Attack Proposal and Noise Evaluation2022

    • Author(s)
      Go TAKAMI, Takeshi SUGAWARA, Kazuo SAKIYAMA, and Yang LI
    • Journal Title

      IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences

      Volume: E105.A Issue: 3 Pages: 289-299

    • DOI

      10.1587/transfun.2021CIP0016

    • NAID

      130008165429

    • ISSN
      0916-8508, 1745-1337
    • Year and Date
      2022-03-01
    • Related Report
      2021 Annual Research Report
    • Peer Reviewed / Open Access
  • [Journal Article] Secure Computation for Threshold Functions with Physical Cards: Power of Private Permutations2022

    • Author(s)
      Nakai Takeshi、Shirouchi Satoshi、Tokushige Yuuki、Iwamoto Mitsugu、Ohta Kazuo
    • Journal Title

      New Generation Computing

      Volume: 40 Issue: 1 Pages: 95-113

    • DOI

      10.1007/s00354-022-00153-7

    • Related Report
      2022 Annual Research Report
    • Peer Reviewed / Open Access
  • [Journal Article] Efficient Card-Based Majority Voting Protocols2022

    • Author(s)
      Abe Yoshiki, Nakai Takeshi, Kuroki Yoshihisa, Suzuki Shinnosuke, Koga Yuta, Watanabe Yohei, Iwamoto Mitsugu, and Ohta Kazuo
    • Journal Title

      New Generation Computing

      Volume: 40 Issue: 1 Pages: 173-198

    • DOI

      10.1007/s00354-022-00161-7

    • Related Report
      2022 Annual Research Report
    • Peer Reviewed / Open Access
  • [Journal Article] Efficient Dynamic Searchable Encryption with Forward Privacy under the Decent Leakage2022

    • Author(s)
      Yohei Watanabe, Kazuma Ohara, Mitsugu Iwamoto, and Kazuo Ohta
    • Journal Title

      Proc. ACM CODASPY 2022

      Volume: - Pages: 312-323

    • Related Report
      2022 Annual Research Report
    • Peer Reviewed
  • [Journal Article] A Generic Construction of CCA-secure Attribute-based Encryption with Equality Test2022

    • Author(s)
      Kyoichi Asano, Keita Emura, Atsushi Takayasu, and Yohei Watanabe
    • Journal Title

      Proc. ProvSec 2022 (Lecture Notes in Computer Science)

      Volume: LNCS 13600 Pages: 3-19

    • DOI

      10.1007/978-3-031-20917-8_1

    • ISBN
      9783031209161, 9783031209178
    • Related Report
      2022 Annual Research Report
    • Peer Reviewed
  • [Journal Article] State-free End-to-End Encrypted Storage and Chat Systems based on Searchable Encryption2022

    • Author(s)
      Keita Emura, Ryoma Ito, Sachiko Kanamori, Ryo Nojima, and Yohei Watanabe
    • Journal Title

      Proc. ICEIS 2022

      Volume: - Pages: 312-323

    • Related Report
      2022 Annual Research Report
    • Peer Reviewed
  • [Journal Article] Physical Zero-Knowledge Proof Protocol for Topswops2022

    • Author(s)
      Komano Yuichi、Mizuki Takaaki
    • Journal Title

      ISPEC 2022, Lecture Notes in Computer Science

      Volume: 13620 Pages: 537-553

    • DOI

      10.1007/978-3-031-21280-2_30

    • ISBN
      9783031212796, 9783031212802
    • Related Report
      2022 Annual Research Report
    • Peer Reviewed / Open Access
  • [Journal Article] Card-Based ZKP Protocol for Nurimisaki2022

    • Author(s)
      Robert Leo、Miyahara Daiki、Lafourcade Pascal、Mizuki Takaaki
    • Journal Title

      SSS 2022, Lecture Notes in Computer Science

      Volume: 13751 Pages: 285-298

    • DOI

      10.1007/978-3-031-21017-4_19

    • ISBN
      9783031210167, 9783031210174
    • Related Report
      2022 Annual Research Report
    • Peer Reviewed / Open Access / Int'l Joint Research
  • [Journal Article] Optimized Software Implementations of Ascon, Grain-128AEAD, and TinyJambu on ARM Cortex-M2022

    • Author(s)
      Tomoaki Kitahara, Ryota Hira, Yuko Hara-Azumi, Daiki Miyahara, Yang Li, and Kazuo Sakiyama
    • Journal Title

      Proc. CANDARW 2022

      Volume: - Pages: 316-322

    • DOI

      10.1109/candarw57323.2022.00030

    • Related Report
      2022 Annual Research Report
    • Peer Reviewed
  • [Journal Article] Coin-based Secure Computations2022

    • Author(s)
      Yuichi Komano and Takaaki Mizuki
    • Journal Title

      International Journal of Information Security

      Volume: - Issue: 4 Pages: 1-14

    • DOI

      10.1007/s10207-022-00585-8

    • Related Report
      2021 Annual Research Report
    • Peer Reviewed / Open Access
  • [Journal Article] Information Leakage Due to Operative Errors in Card-based Protocols2022

    • Author(s)
      Takaaki Mizuki and Yuichi Komano
    • Journal Title

      Information and Computation

      Volume: - Pages: 1-15

    • DOI

      10.1016/j.ic.2022.104910

    • Related Report
      2021 Annual Research Report
    • Peer Reviewed / Open Access
  • [Journal Article] Identity-Based Encryption with Security against the KGC: A Formal Model and Its Instantiations2022

    • Author(s)
      Keita Emura, Shuichi Katsumata, and Yohei Watanabe
    • Journal Title

      Theoretical Computer Science

      Volume: 900 Pages: 97-119

    • DOI

      10.1016/j.tcs.2021.11.021

    • Related Report
      2021 Annual Research Report
    • Peer Reviewed / Open Access
  • [Journal Article] Provable-Security Analysis of Authenticated Encryption Based on Lesamnta-LW in the Ideal Cipher Model2021

    • Author(s)
      Shoichi Hirose, Hidenori Kuwakado, and Hirotaka Yoshida
    • Journal Title

      IEICE Transactions on Information and Systems

      Volume: E104.D Issue: 11 Pages: 1894-1901

    • DOI

      10.1587/transinf.2021NGP0008

    • NAID

      130008110114

    • ISSN
      0916-8532, 1745-1361
    • Year and Date
      2021-11-01
    • Related Report
      2021 Annual Research Report
    • Peer Reviewed
  • [Journal Article] Spectral Fingerprinting of Dimming White LEDs2021

    • Author(s)
      藤聡子, 土屋彩夏, 李陽, 崎山一男, 菅原健
    • Journal Title

      情報処理学会論文誌

      Volume: 62 Issue: 9 Pages: 1549-1559

    • DOI

      10.20729/00212760

    • NAID

      170000185555

    • Year and Date
      2021-09-15
    • Related Report
      2021 Annual Research Report
    • Peer Reviewed / Open Access
  • [Journal Article] Update on Analysis of Lesamnta-LW and New PRF Mode LRF2021

    • Author(s)
      Shoichi Hirose, Yu Sasaki, and Hirotaka Yoshida
    • Journal Title

      IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences

      Volume: E104.A Issue: 9 Pages: 1304-1320

    • DOI

      10.1587/transfun.2020EAP1109

    • NAID

      130008081823

    • ISSN
      0916-8508, 1745-1337
    • Year and Date
      2021-09-01
    • Related Report
      2021 Annual Research Report
    • Peer Reviewed
  • [Journal Article] Achieving Pairing-Free Aggregate Signatures using Pre-Communication between Signers2021

    • Author(s)
      K. Takemure, Y. Sakai, B. Santoso, G. Hanaoka, K. Ohta
    • Journal Title

      IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences

      Volume: E104.A Issue: 9 Pages: 1188-1205

    • DOI

      10.1587/transfun.2020DMP0023

    • NAID

      130008081795

    • ISSN
      0916-8508, 1745-1337
    • Year and Date
      2021-09-01
    • Related Report
      2021 Annual Research Report
    • Peer Reviewed / Int'l Joint Research
  • [Journal Article] Evaluation of Side-Channel Attack Resistance on LFI Detection Circuits2021

    • Author(s)
      羽田野凌太, 平田 遼, 松田航平, 三浦典之, 李陽, 崎山一男
    • Journal Title

      電子電子情報通信学会論文誌A 基礎・境界

      Volume: J104-A Issue: 5 Pages: 118-126

    • DOI

      10.14923/transfunj.2020JAP1023

    • ISSN
      1881-0195
    • Year and Date
      2021-05-01
    • Related Report
      2021 Annual Research Report
    • Peer Reviewed / Open Access
  • [Journal Article] Cooking Cryptographers: Secure Multiparty Computation Based on Balls and Bags2021

    • Author(s)
      Daiki Miyahara, Yuichi Komano, Takaaki Mizuki, and Hideaki Sone
    • Journal Title

      Proc. of CSF 2021

      Volume: - Pages: 1-16

    • DOI

      10.1109/csf51468.2021.00034

    • Related Report
      2021 Annual Research Report
    • Peer Reviewed / Open Access
  • [Journal Article] Another Algebraic Decomposition Method for Masked Implementation2021

    • Author(s)
      Shoichi Hirose
    • Journal Title

      Proc. of AC3 2021

      Volume: - Pages: 105-114

    • DOI

      10.1007/978-3-030-80851-8_8

    • ISBN
      9783030808501, 9783030808518
    • Related Report
      2021 Annual Research Report
    • Peer Reviewed
  • [Journal Article] Algebraic Fault Analysis of SHA-256 Compression Function and Its Application2021

    • Author(s)
      Kazuki Nakamura, Koji Hori, and Shoichi Hirose
    • Journal Title

      Information

      Volume: 12 Issue: 10 Pages: 1-9

    • DOI

      10.3390/info12100433

    • Related Report
      2021 Annual Research Report
    • Peer Reviewed / Open Access
  • [Journal Article] Efficient Identity-Based Encryption with Hierarchical Key-Insulation from HIBE2021

    • Author(s)
      Keita Emura, Atsushi Takayasu, and Yohei Watanabe
    • Journal Title

      Designs, Codes and Cryptography

      Volume: 89(10) Issue: 10 Pages: 2397-2431

    • DOI

      10.1007/s10623-021-00926-z

    • Related Report
      2021 Annual Research Report
    • Peer Reviewed / Open Access
  • [Journal Article] Adaptively Secure Revocable Hierarchical IBE from k-linear Assumption2021

    • Author(s)
      Keita Emura, Atsushi Takayasu, and Yohei Watanabe
    • Journal Title

      Designs, Codes and Cryptography

      Volume: 89(7) Issue: 7 Pages: 1535-1574

    • DOI

      10.1007/s10623-021-00880-w

    • Related Report
      2021 Annual Research Report
    • Peer Reviewed / Open Access
  • [Journal Article] Efficient Threshold Public Key Encryption from the Computational Bilinear Diffie-Hellman Assumption2021

    • Author(s)
      Masahiro Ebina, Jumpei Mita, Junji Shikata, and Yohei Watanabe
    • Journal Title

      Proc. of APKC 2021

      Volume: - Pages: 23-32

    • DOI

      10.1145/3457338.3458296

    • Related Report
      2021 Annual Research Report
    • Peer Reviewed
  • [Journal Article] Design and Concept Proof of an Inductive Impulse Self-Destructor in Sense-and-React Countermeasure Against Physical Attacks2021

    • Author(s)
      Sho Tada, Yuki Yamashita, Kohei Matsuda, Makoto Nagata, Kazuo Sakiyama, and Noriyuki Miura
    • Journal Title

      Japanese Journal of Applied Physics (JJAP)

      Volume: 60 Issue: SB Pages: SBBL01-SBBL01

    • DOI

      10.35848/1347-4065/abdf1f

    • Related Report
      2020 Annual Research Report
    • Peer Reviewed
  • [Journal Article] Revocable Identity-based Encryption with Bounded Decryption Key Exposure Resistance: Lattice-based Construction and More2021

    • Author(s)
      Atsushi Takayasu and Yohei Watanabe
    • Journal Title

      Theoretical Computer Science

      Volume: 849 Pages: 64-98

    • DOI

      10.1016/j.tcs.2020.10.010

    • Related Report
      2020 Annual Research Report
    • Peer Reviewed / Open Access
  • [Journal Article] How to Solve Millionaires’ Problem with Two Kinds of Cards2021

    • Author(s)
      Nakai Takeshi、Misawa Yuto、Tokushige Yuuki、Iwamoto Mitsugu、Ohta Kazuo
    • Journal Title

      New Generation Computing

      Volume: 39 Issue: 1 Pages: 98-105

    • DOI

      10.1007/s00354-020-00118-8

    • Related Report
      2020 Annual Research Report
    • Peer Reviewed / Open Access
  • [Journal Article] Countermeasure against Deep Learning-based Cloning Attack on Arbiter PUF by Using Intentional Errors2020

    • Author(s)
      八代理紗, 堀洋平, 片下敏宏, 崎山一男
    • Journal Title

      情報処理学会論文誌

      Volume: 61 Issue: 12 Pages: 1871-1880

    • DOI

      10.20729/00208749

    • NAID

      170000184172

    • Year and Date
      2020-12-15
    • Related Report
      2020 Annual Research Report
    • Peer Reviewed
  • [Journal Article] A Key Recovery Algorithm Using Random Key Leakage from AES Key Schedule2020

    • Author(s)
      Tomoki Uemura, Yohei Watanabe, Yang Li, Noriyuki Miura, Mitsugu Iwamoto, Kazuo Sakiyama, and Kazuo Ohta
    • Journal Title

      IEICE Proceeding Series

      Volume: 65 Pages: 382-386

    • DOI

      10.34385/proc.65.C01-10

    • NAID

      230000012603

    • ISSN
      2188-5079
    • Year and Date
      2020-10-18
    • Related Report
      2020 Annual Research Report
    • Peer Reviewed
  • [Journal Article] How to Detect Malicious Behaviors in a Card-Based Majority Voting Protocol with Three Inputs2020

    • Author(s)
      Yoshiki Abe, Mitsugu Iwamoto, and Kazuo Ohta
    • Journal Title

      IEICE Proceeding Series

      Volume: 65 Pages: 377-381

    • DOI

      10.34385/proc.65.C01-9

    • NAID

      230000012660

    • ISSN
      2188-5079
    • Year and Date
      2020-10-18
    • Related Report
      2020 Annual Research Report
    • Peer Reviewed
  • [Journal Article] Achieving Pairing-Free Aggregate Signatures using Pre-Communication between Signers2020

    • Author(s)
      Kaoru Takemure、Yusuke Sakai、Bagus Santoso 、Goichiro Hanaoka 、Kazuo Ohta
    • Journal Title

      ProvSec 2020

      Volume: LNCS 12505 Pages: 65-84

    • DOI

      10.1007/978-3-030-62576-4_4

    • NAID

      130008081795

    • ISBN
      9783030625757, 9783030625764
    • Related Report
      2020 Annual Research Report
    • Peer Reviewed / Int'l Joint Research
  • [Journal Article] Lesamnta-LW Revisited: Improved Security Analysis of Primitive and New PRF Mode2020

    • Author(s)
      Shoichi Hirose, Yu Sasaki, and Hirotaka Yoshida
    • Journal Title

      Proc. of ACNS 2020

      Volume: LNCS12146 Pages: 89-109

    • DOI

      10.1007/978-3-030-57808-4_5

    • ISBN
      9783030578077, 9783030578084
    • Related Report
      2020 Annual Research Report
    • Peer Reviewed
  • [Journal Article] Compactly Committing Authenticated Encryption Using Tweakable Block Cipher2020

    • Author(s)
      Shoichi Hirose
    • Journal Title

      Proc. of NSS 2020

      Volume: LNCS12570 Pages: 187-206

    • DOI

      10.1007/978-3-030-65745-1_11

    • ISBN
      9783030657444, 9783030657451
    • Related Report
      2020 Annual Research Report
    • Peer Reviewed
  • [Journal Article] 検索可能暗号:データベースシステムの安全な運用に向けて2020

    • Author(s)
      渡邉 洋平
    • Journal Title

      ケミカルエンジニヤリング

      Volume: 65(9) Pages: 552-560

    • Related Report
      2020 Annual Research Report
  • [Journal Article] Flush Code Eraser: Fast Attack Response Invalidating Cryptographic Sensitive Data2020

    • Author(s)
      Kazuo Sakiyama, Tatsuya, Fujii, Kohei Matsuda, and Noriyuki Miura
    • Journal Title

      IEEE Embedded Systems Letters

      Volume: - Issue: 2 Pages: 37-40

    • DOI

      10.1109/les.2019.2949788

    • Related Report
      2019 Annual Research Report
    • Peer Reviewed / Open Access
  • [Journal Article] An IC-Level Countermeasure Against Laser Fault Injection Attack By Information Leakage Sensing Based on Laser-Induced Opto-Electric Bulk Current Density2020

    • Author(s)
      Kohei Matsuda, Sho Tada, Makoto Nagata, Yuichi Komano, Yang Li, Takeshi Sugawara, Mitsugu Iwamoto, Kazuo Ohta, Kazuo Sakiyama, Noriyuki Miura
    • Journal Title

      Japanese Journal of Applied Physics (JJAP)

      Volume: Vol.59 Issue: SG Pages: SGGL02-SGGL02

    • DOI

      10.7567/1347-4065/ab65d3

    • NAID

      210000157953

    • Related Report
      2019 Annual Research Report
    • Peer Reviewed / Open Access
  • [Journal Article] サイドチャネル攻撃と対策2020

    • Author(s)
      菅原健
    • Journal Title

      電子情報通信学会誌

      Volume: 103巻1号 Pages: 45-50

    • Related Report
      2019 Annual Research Report
  • [Journal Article] Validating the DFA Attack Resistance of AES (Short Paper)2020

    • Author(s)
      Hakuei Sugimoto, Ryota Hatano, Natsu Shoji, and Kazuo Sakiyama
    • Journal Title

      Proc. International Symposium on Foundations & Practice of Security (FPS2019)

      Volume: LNCS12056 Pages: 371-378

    • DOI

      10.1007/978-3-030-45371-8_25

    • ISBN
      9783030453701, 9783030453718
    • Related Report
      2019 Annual Research Report
    • Peer Reviewed
  • [Journal Article] Side-Channel Leakage of Alarm Signal for a Bulk-Current-Based Laser Sensor2020

    • Author(s)
      Yang Li, Ryota Hatano, Sho Tada, Kohei Matsuda, Noriyuki Miura, Takeshi Sugawara, and Kazuo Sakiyama,
    • Journal Title

      Proc. International Conference on Information Security and Cryptology (Inscrypt2019)

      Volume: LNCS12020 Pages: 346-361

    • DOI

      10.1007/978-3-030-42921-8_20

    • ISBN
      9783030429201, 9783030429218
    • Related Report
      2019 Annual Research Report
    • Peer Reviewed
  • [Journal Article] Authenticated Encryption Based on Lesamnta-LW Hashing Mode2020

    • Author(s)
      Shoichi Hirose, Hidenori Kuwakado and Hirotaka Yoshida
    • Journal Title

      Proc. International Conference on Information Security and Cryptology (ICISC 2019)

      Volume: LNCS11975 Pages: 52-69

    • DOI

      10.1007/978-3-030-40921-0_3

    • ISBN
      9783030409203, 9783030409210
    • Related Report
      2019 Annual Research Report
    • Peer Reviewed
  • [Journal Article] Multi-Party Computation for Modular Exponentiation Based on Replicated Secret Sharing2019

    • Author(s)
      K. Ohara, Y. Watanabe, M. Iwamoto, and K. Ohta
    • Journal Title

      IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences

      Volume: E102.A Issue: 9 Pages: 1079-1090

    • DOI

      10.1587/transfun.E102.A.1079

    • NAID

      130007699566

    • ISSN
      0916-8508, 1745-1337
    • Year and Date
      2019-09-01
    • Related Report
      2019 Annual Research Report
    • Peer Reviewed
  • [Journal Article] Shortening the Libert-Peters-Yung Revocable Group Signature Scheme by Using the Random Oracle Methodology2019

    • Author(s)
      K. Ohara, K. Emura, G. Hanaoka, A. Ishida, K. Ohta, and Y. Sakai
    • Journal Title

      IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences

      Volume: E102.A Issue: 9 Pages: 1101-1117

    • DOI

      10.1587/transfun.E102.A.1101

    • NAID

      130007699571

    • ISSN
      0916-8508, 1745-1337
    • Year and Date
      2019-09-01
    • Related Report
      2019 Annual Research Report
    • Peer Reviewed
  • [Journal Article] Fingerprinting Light Emitting Diodes Using Spectrometer2019

    • Author(s)
      Akiko Toh, Yang Li, Kazuo Sakiyama, and Takeshi Sugawara
    • Journal Title

      IET Electronics Letters

      Volume: Volume 55, Issue 24 Issue: 24 Pages: 1295-1297

    • DOI

      10.1049/el.2019.1908

    • Related Report
      2019 Annual Research Report
    • Peer Reviewed / Open Access
  • [Journal Article] Side-Channel Leakage from Sensor-Based Countermeasures against Fault Injection Attack2019

    • Author(s)
      Takeshi Sugawara, Natsu Shoji, Kazuo Sakiyama, Kohei Matsuda, Noriyuki Miura, and Makoto Nagata
    • Journal Title

      Microelectronics Journal

      Volume: Volume 90 Pages: 63-71

    • DOI

      10.1016/j.mejo.2019.05.017

    • NAID

      120006713576

    • Related Report
      2019 Annual Research Report
    • Peer Reviewed / Open Access
  • [Journal Article] Integrative Acceleration of First-order Boolean Masking for Embedded IoT Devices2019

    • Author(s)
      Yuichi Komano, Hideo Shimizu, and Hideyuki Miyake
    • Journal Title

      Journal of Information Processing

      Volume: 27 Issue: 0 Pages: 585-592

    • DOI

      10.2197/ipsjjip.27.585

    • NAID

      130007706909

    • ISSN
      1882-6652
    • Related Report
      2019 Annual Research Report
    • Peer Reviewed / Open Access
  • [Journal Article] 組込機器のセキュリティを脅かすレーザーフォールト攻撃2019

    • Author(s)
      菅原健,崎山一男
    • Journal Title

      レーザー研究

      Volume: 47巻7号 Pages: 305-309

    • NAID

      130008074098

    • Related Report
      2019 Annual Research Report
  • [Journal Article] Optimal Multiple Assignment Schemes Using Ideal Multipartite Secret Sharing Schemes2019

    • Author(s)
      Reo Eriguchi, Noboru Kunihiro, and Mitsugu Iwamoto
    • Journal Title

      Proc. IEEE International Symposium on Information Theory (ISIT2019)

      Volume: 2019-July Pages: 3047-3051

    • DOI

      10.1109/isit.2019.8849591

    • Related Report
      2019 Annual Research Report
    • Peer Reviewed
  • [Journal Article] An Information Leakage Sensor Based on Measurement of Laser-Induced Opto-Electric Bulk Current Density2019

    • Author(s)
      Kohei Matsuda, Sho Tada, Makoto Nagata, Yang Li, Takeshi Sugawara, Mitsugu Iwamoto, Kazuo Ohta, Kazuo Sakiyama, Noriyuki Miura
    • Journal Title

      Extended Abstracts of International Conference on Solid State Devices and Materials (SSDM)

      Volume: - Pages: 501-502

    • Related Report
      2019 Annual Research Report
    • Peer Reviewed
  • [Journal Article] Efficient Private PEZ Protocols for Symmetric Functions2019

    • Author(s)
      Y. Abe, M. Iwamoto, and K. Ohta
    • Journal Title

      Proc. Theory of Cryptography Conference (TCC2019)

      Volume: LNCS11891 Pages: 372-392

    • DOI

      10.1007/978-3-030-36030-6_15

    • ISBN
      9783030360290, 9783030360306
    • Related Report
      2019 Annual Research Report
    • Peer Reviewed
  • [Journal Article] An Abstraction Model for 1-bit Probing Attack on Block Ciphers2019

    • Author(s)
      Natsu Shoji, Takeshi Sugawara, Mitsugu Iwamoto, and Kazuo Sakiyama
    • Journal Title

      Proc. International Conference on Computer and Communication Systems (ICCCS2019)

      Volume: -

    • Related Report
      2018 Annual Research Report
    • Peer Reviewed
  • [Journal Article] Re-Keying Scheme Revisited: Security Model and Instantiations2019

    • Author(s)
      Yuichi Komano and Shoichi Hirose
    • Journal Title

      Applied Sciences

      Volume: 9(5), 1002 Issue: 5 Pages: 1-15

    • DOI

      10.3390/app9051002

    • Related Report
      2018 Annual Research Report
    • Peer Reviewed / Open Access
  • [Journal Article] Single-Round Pattern Matching Key Generation Using Physically Unclonable Function2019

    • Author(s)
      Yuichi Komano, Kazuo Ohta, Kazuo Sakiyama, Mitsugu Iwamoto, and Ingrid Verbauwhede
    • Journal Title

      Security and Communication Networks

      Volume: - Pages: 1-13

    • DOI

      10.1155/2019/1719585

    • Related Report
      2018 Annual Research Report
    • Peer Reviewed / Open Access / Int'l Joint Research
  • [Journal Article] 3-Share Threshold Implementation of AES S-box without Fresh Randomness2019

    • Author(s)
      Takeshi Sugawara
    • Journal Title

      IACR Transactions on Cryptographic Hardware and Embedded Systems

      Volume: Volume 2019, Issue 1 Pages: 123-145

    • DOI

      10.13154/TCHES.V2019.I1.123-145

    • Related Report
      2018 Annual Research Report
    • Peer Reviewed / Open Access
  • [Journal Article] Probing Attack of Share-Serial Threshold Implementation of Advanced Encryption Standard2019

    • Author(s)
      Takeshi Sugawara, Yang Li, and Kazuo Sakiyama
    • Journal Title

      IET Electronics Letters

      Volume: - Issue: 9 Pages: 517-519

    • DOI

      10.1049/el.2018.7518

    • Related Report
      2018 Annual Research Report
    • Peer Reviewed / Open Access
  • [Journal Article] A Secure LiDAR with Side-channel Fingerprinting2018

    • Author(s)
      Ryuga Matsumura, Takeshi Sugawara, and Kazuo Sakiyama
    • Journal Title

      Proc. International Symposium on Computing and Networking, CANDAR Workshops (CANDARW2018)

      Volume: - Pages: 479-482

    • DOI

      10.1109/candarw.2018.00092

    • Related Report
      2018 Annual Research Report
    • Peer Reviewed
  • [Journal Article] A 286 F2/Cell Distributed Bulk-Current Sensor and Secure Flush Code Eraser Against Laser Fault Injection Attack on Cryptographic Processor2018

    • Author(s)
      Kohei Matsuda, Tatsuya Fujii, Natsu Shoji, Takeshi Sugawara, Kazuo Sakiyama, Yu-ichi Hayashi, Makoto Nagata, and Noriyuki Miura
    • Journal Title

      IEEE Journal of Solid-State Circuits

      Volume: Vol.53, No.11 Issue: 11 Pages: 3174-3182

    • DOI

      10.1109/jssc.2018.2869142

    • NAID

      120006550256

    • Related Report
      2018 Annual Research Report
    • Peer Reviewed
  • [Journal Article] Recovering Memory Access Sequence with Differential Flush+Reload Attack2018

    • Author(s)
      Zhiwei Yuan, Yang Li, Kazuo Sakiyama, Takeshi Sugawara, and Jian Wang
    • Journal Title

      Proc. International Conference on Information Security Practice and Experience (ISPEC2018)

      Volume: LNCS11125 Pages: 424-439

    • DOI

      10.1007/978-3-319-99807-7_26

    • ISBN
      9783319998060, 9783319998077
    • Related Report
      2018 Annual Research Report
    • Peer Reviewed / Int'l Joint Research
  • [Journal Article] Card-Based Majority Voting Protocols with Three Inputs Using Three Cards2018

    • Author(s)
      Yohei Watanabe, Yoshihisa Kuroki, Shinnosuke Suzuki, Yuta Koga, Mitsugu Iwamoto, Kazuo Ohta
    • Journal Title

      Proc. International Symposium on Information Theory and Its Applications (ISITA2018)

      Volume: - Pages: 218-222

    • DOI

      10.23919/isita.2018.8664324

    • Related Report
      2018 Annual Research Report
    • Peer Reviewed
  • [Journal Article] A Proactive Secret Image Sharing Scheme with Resistance to Machine Learning Based Steganalysis2018

    • Author(s)
      Anjelina Espejel-Trujillo, Mitsugu Iwamoto, and Mariko Nakano-Miyatake
    • Journal Title

      Multimedia Tools And Applications

      Volume: 77 Issue: 12 Pages: 15161-15179

    • DOI

      10.1007/s11042-017-5097-8

    • Related Report
      2018 Annual Research Report
    • Peer Reviewed / Int'l Joint Research
  • [Journal Article] Analysis of Mixed PUF-TRNG Circuit Based on SR-Latches in FD-SOI Technology2018

    • Author(s)
      Jean-Luc Danger, Risa Yashiro, Tarik Graba, Yves Mathieu, Abdelmalek Si-Merabet, Kazuo Sakiyama, Noriyuki Miura, and Makoto Nagata
    • Journal Title

      Proc. 21st Euromicro Conference on Digital System Design (DSD2018)

      Volume: - Pages: 508-515

    • DOI

      10.1109/dsd.2018.00090

    • Related Report
      2018 Annual Research Report
    • Peer Reviewed / Int'l Joint Research
  • [Presentation] m値n入力関数を計算するprivate PEZプロトコルの初期文字列長の漸近評価2023

    • Author(s)
      安部 芳紀, 岩本 貢, 太田 和夫
    • Organizer
      暗号と情報セキュリティシンポジウム (SCIS)
    • Related Report
      2022 Annual Research Report
  • [Presentation] CCA安全な鍵更新可能公開鍵暗号の安全性解析と効率的な一般的構成法2023

    • Author(s)
      淺野 京一, 渡邉 洋平
    • Organizer
      暗号と情報セキュリティシンポジウム (SCIS)
    • Related Report
      2022 Annual Research Report
  • [Presentation] 効率的かつ安全な更新処理を備えた結果秘匿可能な検索可能暗号2023

    • Author(s)
      甘田 拓海, 岩本 貢, 渡邉 洋平
    • Organizer
      暗号と情報セキュリティシンポジウム (SCIS)
    • Related Report
      2022 Annual Research Report
  • [Presentation] 秘匿置換を用いた効率的なトランプベース秘密計算プロトコル2023

    • Author(s)
      岩成 慶太, 小野 知樹, 安倍 芳紀, 中井 雄士, 渡邉 洋平, 岩本 貢
    • Organizer
      暗号と情報セキュリティシンポジウム (SCIS)
    • Related Report
      2022 Annual Research Report
  • [Presentation] 保証金が一定なビットコインベース宝くじプロトコルの拡張2023

    • Author(s)
      内薗 駿, 中井 雄士, 渡邉 洋平, 岩本 貢
    • Organizer
      暗号と情報セキュリティシンポジウム (SCIS)
    • Related Report
      2022 Annual Research Report
  • [Presentation] 任意の論理回路に対する1ゲートあたり6枚のカードベースプロトコル2023

    • Author(s)
      小野 知樹, 品川 和雅, 中井 雄士, 渡邉 洋平, 岩本 貢
    • Organizer
      暗号と情報セキュリティシンポジウム (SCIS)
    • Related Report
      2022 Annual Research Report
  • [Presentation] Two Sheriffs Problemの一般化と鍵共有プロトコルへの応用2023

    • Author(s)
      杉本 航太, 渡邉 洋平, 岩本 貢
    • Organizer
      暗号と情報セキュリティシンポジウム (SCIS)
    • Related Report
      2022 Annual Research Report
  • [Presentation] 天体ショーに対する物理的ゼロ知識証明2023

    • Author(s)
      初貝 恭祐, 渡邉 洋平, 岩本 貢
    • Organizer
      暗号と情報セキュリティシンポジウム (SCIS)
    • Related Report
      2022 Annual Research Report
  • [Presentation] ハッシュ関数SHA-1, SHA-256に基づくMAC関数への偽造攻撃を目的とした代数的故障利用解析2023

    • Author(s)
      中村一貴, 飯沼浩仁, 廣瀬勝一
    • Organizer
      暗号と情報セキュリティシンポジウム (SCIS)
    • Related Report
      2022 Annual Research Report
  • [Presentation] 相互補助相関電力解析の正解鍵順位と鍵復元率の調査2023

    • Author(s)
      西澤慧悟 , 崎山一男, 原祐子, 李陽
    • Organizer
      暗号と情報セキュリティシンポジウム (SCIS)
    • Related Report
      2022 Annual Research Report
  • [Presentation] Attention-Based Non-Profiled SCA on ASCAD Database2023

    • Author(s)
      Enhao Xu, Takeshi Sugawara, Kazuo Sakiyama, Yuko Hara-Azumi, and Yang Li
    • Organizer
      暗号と情報セキュリティシンポジウム (SCIS)
    • Related Report
      2022 Annual Research Report
  • [Presentation] SAKURA-GにおけるVITIセンサーの実装2023

    • Author(s)
      内山 一秀, 李 陽
    • Organizer
      情報処理学会 全国大会
    • Related Report
      2022 Annual Research Report
  • [Presentation] TI技術によりシェア化されたAES S-boxの故障感度解析手法2023

    • Author(s)
      佐藤 泰雅, 古野 亨紀, 平田 遼, 宮原 大輝, 李 陽, 崎山 一男
    • Organizer
      暗号と情報セキュリティシンポジウム (SCIS)
    • Related Report
      2022 Annual Research Report
  • [Presentation] 天秤とコインを使った秘密計算2023

    • Author(s)
      吉田 深月, 金子 尚平, 李 陽, 崎山 一男, 宮原 大輝
    • Organizer
      暗号と情報セキュリティシンポジウム (SCIS)
    • Related Report
      2022 Annual Research Report
  • [Presentation] 安全に証明する方法~ペンシルパズルを例に~2023

    • Author(s)
      宮原大輝
    • Organizer
      IPSJ-ONE
    • Related Report
      2022 Annual Research Report
    • Invited
  • [Presentation] 乱数の消費が少なく PINI を満たす 4 次マスキング2023

    • Author(s)
      平賀幸仁, 菅原健
    • Organizer
      暗号と情報セキュリティシンポジウム (SCIS)
    • Related Report
      2022 Annual Research Report
  • [Presentation] 誤り訂正符号によって生じるビット非独立なサイドチャネルリーク2023

    • Author(s)
      浅野多聞, 菅原健
    • Organizer
      暗号と情報セキュリティシンポジウム (SCIS)
    • Related Report
      2022 Annual Research Report
  • [Presentation] Romulus の TI 付きハードウェア実装と電力リークのシミュレーション評価2023

    • Author(s)
      根本昌也, 浅野多聞, 菅原健
    • Organizer
      ハードウェアセキュリティ研究会 (HWS)
    • Related Report
      2022 Annual Research Report
  • [Presentation] Abstraction Model of Probing and DFA Attacks on Block Ciphers2023

    • Author(s)
      Yuiko Matsubara, Daiki Miyahara, Yohei Watanabe, Mitsugu Iwamoto, and Kazuo Sakiyama
    • Organizer
      IACR Cryptology ePrint Archive: Report 2023/443
    • Related Report
      2022 Annual Research Report
    • Int'l Joint Research
  • [Presentation] カードを用いた秘匿和集合プロトコル2022

    • Author(s)
      土井 アナスタシヤ, 小野 知樹, 安部 芳紀, 渡邉 洋平, 岩本 貢
    • Organizer
      コンピュータセキュリティシンポジウム(CSS)
    • Related Report
      2022 Annual Research Report
  • [Presentation] 任意のブール回路に対する秘匿操作を用いたカードベースプロトコル2022

    • Author(s)
      小野 知樹, 中井 雄士, 渡邉 洋平, 岩本 貢
    • Organizer
      コンピュータセキュリティシンポジウム(CSS)
    • Related Report
      2022 Annual Research Report
  • [Presentation] 効率的かつ検索結果秘匿可能な動的検索可能暗号2022

    • Author(s)
      甘田 拓海, 岩本 貢, 渡邉 洋平
    • Organizer
      コンピュータセキュリティシンポジウム(CSS)
    • Related Report
      2022 Annual Research Report
  • [Presentation] CCA安全な平文一致確認可能属性ベース暗号の一般的構成2022

    • Author(s)
      淺野 京一, 江村 恵太, 高安 敦, 渡邉 洋平
    • Organizer
      コンピュータセキュリティシンポジウム(CSS)
    • Related Report
      2022 Annual Research Report
  • [Presentation] 攻撃成功確率からみたTwo Sheriffs Problem2022

    • Author(s)
      杉本 航太, 中井 雄士, 渡邉 洋平, 岩本 貢
    • Organizer
      コンピュータセキュリティシンポジウム(CSS)
    • Related Report
      2022 Annual Research Report
  • [Presentation] Recent Progress in Searchable Encryption2022

    • Author(s)
      渡邉 洋平
    • Organizer
      IMI共同利用研究集会 高度化する暗号技術と数学的技法の進展
    • Related Report
      2022 Annual Research Report
    • Invited
  • [Presentation] Compactly Committing Authenticated Encryption Using Encryptment and Tweakable Block Cipher2022

    • Author(s)
      Shoichi Hirose and Kazuhiko Minematsu
    • Organizer
      IACR Cryptology ePrint Archive: Report 2022/1670
    • Related Report
      2022 Annual Research Report
    • Int'l Joint Research
  • [Presentation] Pancakeソーティングに対する物理的ゼロ知識証明2022

    • Author(s)
      駒野 雄一, 水木 敬明
    • Organizer
      コンピュータセキュリティシンポジウム(CSS)
    • Related Report
      2022 Annual Research Report
  • [Presentation] Topswopsの物理的ゼロ知識証明プロトコル2022

    • Author(s)
      駒野 雄一, 水木 敬明
    • Organizer
      マルチメディア、分散、協調とモバイル(DICOMO 2022 )シンポジウム
    • Related Report
      2022 Annual Research Report
  • [Presentation] サイドチャネル攻撃と偽コイン問題の関連性2022

    • Author(s)
      吉田 深月, 宮原 大輝, 崎山 一男
    • Organizer
      電子情報通信学会ソサイエティ大会
    • Related Report
      2022 Annual Research Report
  • [Presentation] AES暗号に対する非プロファイリング深層学習攻撃の再現実験2022

    • Author(s)
      荻原 実那, 李 陽, 宮原 大輝, 崎山 一男
    • Organizer
      電子情報通信学会ソサイエティ大会
    • Related Report
      2022 Annual Research Report
  • [Presentation] TI技術を用いたAES S-boxの故障感度の評価2022

    • Author(s)
      佐藤 泰雅, 古野 亨紀, 平田 遼, 宮原 大輝, 崎山 一男
    • Organizer
      電子情報通信学会ソサイエティ大会
    • Related Report
      2022 Annual Research Report
  • [Presentation] ハイパースペクトルカメラを用いた指紋の付着時期推定2022

    • Author(s)
      工藤 紗織, 嶌野 雅久, 宮原 大輝, 崎山 一男
    • Organizer
      電子情報通信学会ソサイエティ大会
    • Related Report
      2022 Annual Research Report
  • [Presentation] カードベース暗号における物理仮定に対する脅威とその対策に関する検討2022

    • Author(s)
      嶌野 雅久, 崎山 一男, 宮原 大輝
    • Organizer
      コンピュータセキュリティシンポジウム(CSS)
    • Related Report
      2022 Annual Research Report
  • [Presentation] Glitch-Based Key Recovery with Shannon Entropy on the Last AES Round2022

    • Author(s)
      Haruka Hirata, Daiki Miyahara, Yang Li, and Kazuo Sakiyama
    • Organizer
      Poster Session, CARDIS 2022
    • Related Report
      2022 Annual Research Report
    • Int'l Joint Research
  • [Presentation] バレルシフタと加算器によるビット非独立なサイドチャネルリークの発生機序とその対策2022

    • Author(s)
      浅野多聞, 菅原健
    • Organizer
      暗号と情報セキュリティシンポジウム (SCIS)
    • Related Report
      2021 Annual Research Report
  • [Presentation] パイプライン化されたAES S-boxへのフォールト攻撃に対する安全性評価2022

    • Author(s)
      平田遼, 宮原大輝, 李陽, 三浦典之, 崎山一男
    • Organizer
      暗号と情報セキュリティシンポジウム (SCIS)
    • Related Report
      2021 Annual Research Report
  • [Presentation] M&Mにより対策されたAES暗号ハードウェアの乱数依存性について2022

    • Author(s)
      塚原麻輝, 平田遼, 宮原大輝, 李陽, 崎山一男
    • Organizer
      暗号と情報セキュリティシンポジウム (SCIS)
    • Related Report
      2021 Annual Research Report
  • [Presentation] ハイパースペクトルカメラによるカードベース暗号の安全性評価に向けた基礎的検討2022

    • Author(s)
      嶌野雅久, 崎山一男, 宮原大輝
    • Organizer
      暗号と情報セキュリティシンポジウム (SCIS)
    • Related Report
      2021 Annual Research Report
  • [Presentation] 確率モデルと実験による増分故障解析の安全性評価2022

    • Author(s)
      加藤光, 菅原健, 崎山一男, 李陽
    • Organizer
      暗号と情報セキュリティシンポジウム (SCIS)
    • Related Report
      2021 Annual Research Report
  • [Presentation] 一様で閉じたシャッフルの効率的な実装2022

    • Author(s)
      岩成 慶太, 中井 雄士, 渡邉 洋平, 栃窪 孝也, 岩本 貢
    • Organizer
      暗号と情報セキュリティシンポジウム (SCIS)
    • Related Report
      2021 Annual Research Report
  • [Presentation] 効率的な漏洩耐性鍵隔離暗号2022

    • Author(s)
      淺野 京一, 岩本 貢, 渡邉 洋平
    • Organizer
      暗号と情報セキュリティシンポジウム (SCIS)
    • Related Report
      2021 Annual Research Report
  • [Presentation] 出力埋め込み可能な紛失擬似ランダム関数に基づく多者間秘匿積集合プロトコルの効率化2022

    • Author(s)
      清水 聖也, 中井 雄士, 渡邉 洋平, 岩本 貢
    • Organizer
      暗号と情報セキュリティシンポジウム (SCIS)
    • Related Report
      2021 Annual Research Report
  • [Presentation] プロービング攻撃による漏洩情報を用いたAES鍵復元アルゴリズムの改良2022

    • Author(s)
      植村 友紀, 渡邉 洋平, 李 陽, 三浦 典之, 岩本 貢, 崎山 一男, 太田 和夫
    • Organizer
      暗号と情報セキュリティシンポジウム (SCIS)
    • Related Report
      2021 Annual Research Report
  • [Presentation] Integrated Sense-and-React Countermeasures Against Physical Attacks2022

    • Author(s)
      Noriyuki Miura
    • Organizer
      International Solid-State Circuits Conferecne (ISSCC)
    • Related Report
      2021 Annual Research Report
    • Int'l Joint Research / Invited
  • [Presentation] Simulation Based Evaluation of Bit-Interaction Side-Channel Leakage on RISC-V Processor2021

    • Author(s)
      T. Asano and T. Sugawara
    • Organizer
      PROOFS 2021
    • Related Report
      2021 Annual Research Report
    • Int'l Joint Research
  • [Presentation] ローリングシャッター効果を用いた音声情報復元とその評価2021

    • Author(s)
      星野翔, 嶋野裕一郎, 崎山一男
    • Organizer
      コンピュータセキュリティシンポジウム(CSS)
    • Related Report
      2021 Annual Research Report
  • [Presentation] ローリングシャッター方式のカメラを用いた音声情報の復元実験2021

    • Author(s)
      嶋野裕一郎, 星野翔, 崎山一男
    • Organizer
      電子情報通信学会ソサイエティ大会
    • Related Report
      2021 Annual Research Report
  • [Presentation] M&Mにより対策されたAES暗号ハードウェアに対するt検定2021

    • Author(s)
      塚原麻輝, 平田遼, 李陽, 崎山一男
    • Organizer
      電子情報通信学会ソサイエティ大会
    • Related Report
      2021 Annual Research Report
  • [Presentation] M&Mにより対策されたAES暗号ハードウェアへの故障利用解析に向けた基礎実験2021

    • Author(s)
      古野亨紀, 平田遼, 李陽, 崎山一男
    • Organizer
      電子情報通信学会ソサイエティ大会
    • Related Report
      2021 Annual Research Report
  • [Presentation] ミクスチャ差分を用いた暗号解析の LED64 への適用2021

    • Author(s)
      高見豪, 菅原健, 崎山一男, 李陽
    • Organizer
      電子情報通信学会ソサイエティ大会
    • Related Report
      2021 Annual Research Report
  • [Presentation] カードを用いた秘匿共通集合プロトコル2021

    • Author(s)
      土井 アナスタシヤ, 中井 雄士, 品川 和雅, 渡邉 洋平, 岩本 貢
    • Organizer
      コンピュータセキュリティシンポジウム(CSS)
    • Related Report
      2021 Annual Research Report
  • [Presentation] 秘密鍵の漏洩耐性を有する鍵隔離暗号2021

    • Author(s)
      淺野 京一, 岩本 貢, 渡邉 洋平
    • Organizer
      コンピュータセキュリティシンポジウム(CSS)
    • Related Report
      2021 Annual Research Report
  • [Presentation] [基調講演]サイバー空間とフィジカル空間の接点:集積システムのあるべきカタチ2021

    • Author(s)
      三浦典之
    • Organizer
      システムとLSIの設計技術研究発表会(デザインガイア2021)
    • Related Report
      2021 Annual Research Report
    • Invited
  • [Presentation] Integrated Security Interface Against Cyber-Physical Attacks2021

    • Author(s)
      Noriyuki Miura
    • Organizer
      IEEE SSCS Japan Chapter/Seoul Chapter DL Technical Seminar
    • Related Report
      2021 Annual Research Report
    • Int'l Joint Research / Invited
  • [Presentation] AES鍵スケジュールからの固定ビット数漏洩を用いた鍵復元アルゴリズムの性能評価2021

    • Author(s)
      植村 友紀, 渡邉 洋平, 李 陽, 三浦 典之, 岩本 貢, 崎山 一男, 太田 和夫
    • Organizer
      暗号と情報セキュリティシンポジウム (SCIS)
    • Related Report
      2020 Annual Research Report
  • [Presentation] 視覚復号型秘密分散法における任意の改ざんを検知する手法2021

    • Author(s)
      根岸 奎人, 渡邉 洋平, 岩本 貢
    • Organizer
      暗号と情報セキュリティシンポジウム (SCIS)
    • Related Report
      2020 Annual Research Report
  • [Presentation] 時間ドロボー問題に対する健全性誤りのない物理的ゼロ知識証明2021

    • Author(s)
      初貝 恭祐, 安部 芳紀, 中井 雄士, 品川 和雅, 渡邉 洋平, 岩本 貢
    • Organizer
      暗号と情報セキュリティシンポジウム (SCIS)
    • Related Report
      2020 Annual Research Report
  • [Presentation] 秘匿置換を用いたカードベースしきい値関数プロトコル2021

    • Author(s)
      中井 雄士, 徳重 佑樹, 岩本 貢, 太田 和夫
    • Organizer
      暗号と情報セキュリティシンポジウム (SCIS)
    • Related Report
      2020 Annual Research Report
  • [Presentation] IoT クラウドサービスに対するローカル攻撃の安全性評価に関する研究2021

    • Author(s)
      石田真, 菅原健
    • Organizer
      ハードウェアセキュリティ研究会 (HWS)
    • Related Report
      2020 Annual Research Report
  • [Presentation] 樹脂へのホログラム転写によるチップ移植攻撃への対策2021

    • Author(s)
      須藤嵩, 菅原健
    • Organizer
      電子情報通信学会ハードウェアセキュリティ研究会 (HWS)
    • Related Report
      2020 Annual Research Report
  • [Presentation] ALU内部のビット非独立なリーケージのシミュレーション評価2021

    • Author(s)
      浅野多聞, 菅原健
    • Organizer
      暗号と情報セキュリティシンポジウム (SCIS)
    • Related Report
      2020 Annual Research Report
  • [Presentation] マスキングを行う実装のための代数的分解法について2021

    • Author(s)
      廣瀬勝一
    • Organizer
      暗号と情報セキュリティシンポジウム (SCIS)
    • Related Report
      2020 Annual Research Report
  • [Presentation] SHA-256圧縮関数に対する代数的故障利用解析とその応用について2021

    • Author(s)
      堀弘二, 廣瀬勝一
    • Organizer
      暗号と情報セキュリティシンポジウム (SCIS)
    • Related Report
      2020 Annual Research Report
  • [Presentation] サイドチャネル攻撃の並列実装におけるシステムノイズの評価: 遺伝的アルゴリズムとの比較2021

    • Author(s)
      工藤黎, 菅原健, 崎山一男, 原祐子, 李陽
    • Organizer
      暗号と情報セキュリティシンポジウム (SCIS)
    • Related Report
      2020 Annual Research Report
  • [Presentation] Pushing the Limits of Simple Electromagnetic Analysis Against Similar Activation Functions2021

    • Author(s)
      Go Takatoi, Takeshi Sugawara, Kazuo Sakiyama, Yuko Hara-Azumi, and Yang Li
    • Organizer
      暗号と情報セキュリティシンポジウム (SCIS)
    • Related Report
      2020 Annual Research Report
  • [Presentation] ローリングシャッター効果を用いたLEDデバイスの物理指紋抽出に関する基礎的実験2021

    • Author(s)
      星野翔, 崎山一男
    • Organizer
      暗号と情報セキュリティシンポジウム (SCIS)
    • Related Report
      2020 Annual Research Report
  • [Presentation] 塗布剤による個人情報の秘匿性評価2021

    • Author(s)
      畑碧, 崎山一男
    • Organizer
      暗号と情報セキュリティシンポジウム (SCIS)
    • Related Report
      2020 Annual Research Report
  • [Presentation] M&Mにより対策されたAES暗号ハードウェアに対するサイドチャネル攻撃2021

    • Author(s)
      平田遼, 羽田野凌太, 李陽, 三浦典之, 崎山一男
    • Organizer
      暗号と情報セキュリティシンポジウム (SCIS)
    • Related Report
      2020 Annual Research Report
  • [Presentation] An Inductive Impulse Self-Destructor in Sense-and-React Countermeasure Against Physical Attacks2020

    • Author(s)
      Sho Tada, Yuki Yamashita, Kohei Matsuda, Makoto Nagata, Kazuo Sakiyama, and Noriyuki Miura
    • Organizer
      International Conference on Solid State Devices and Materials (SSDM)
    • Related Report
      2020 Annual Research Report
    • Int'l Joint Research
  • [Presentation] Tutorial: Integrated Security Interface Against Cyber-Physica Attacks2020

    • Author(s)
      Noriyuki Miura
    • Organizer
      Asian Solid-State Circuits Conference (A-SSCC)
    • Related Report
      2020 Annual Research Report
    • Int'l Joint Research / Invited
  • [Presentation] より少ない漏洩の下で安全な動的検索可能暗号への変換手法2020

    • Author(s)
      渡邉 洋平, 大原 一真, 岩本 貢, 太田 和夫
    • Organizer
      コンピュータセキュリティシンポジウム (CSS)
    • Related Report
      2020 Annual Research Report
  • [Presentation] 対称関数を効率的に計算するPrivate PEZ プロトコル (from TCC 2019)2020

    • Author(s)
      安部 芳紀, 岩本 貢, 太田 和夫
    • Organizer
      電子情報通信学会情報セキュリティ研究会 (ISEC)
    • Related Report
      2020 Annual Research Report
    • Invited
  • [Presentation] シェアシリアル型 Threshold Implementation へのプロービング攻撃2020

    • Author(s)
      菅原健,李陽,﨑山一男
    • Organizer
      電子情報通信学会ハードウェアセキュリティ研究会 (HWS)
    • Related Report
      2020 Annual Research Report
  • [Presentation] Evaluation of an Algebraic Fault Attack on the SHA-256 Compression Function2020

    • Author(s)
      Koji Hori and Shoichi Hirose
    • Organizer
      The 15th International Workshop on Security (IWSEC)
    • Related Report
      2020 Annual Research Report
  • [Presentation] M&Mにより対策されたAESハードウェアの安全性評価について2020

    • Author(s)
      平田遼, 羽田野凌太, 李陽, 三浦典之, Svetla Nikova, 崎山一男
    • Organizer
      電子情報通信学会ソサイエティ大会
    • Related Report
      2020 Annual Research Report
  • [Presentation] コインベースプロトコルの初期配置誤りに関する考察2020

    • Author(s)
      駒野 雄一, 水木 敬明
    • Organizer
      コンピュータセキュリティシンポジウム (CSS)
    • Related Report
      2020 Annual Research Report
  • [Presentation] LED の個体識別における温度変化の影響2020

    • Author(s)
      土屋彩夏, 藤聡子, 李陽, 崎山一男, 菅原健
    • Organizer
      IEICE 情報通信 システムセキュリティ研究専門委員会・第 50 回合同研究会
    • Related Report
      2019 Annual Research Report
  • [Presentation] 暗号回路における基板電流検出型レーザー故障注入攻撃対策の軽量設計法2020

    • Author(s)
      山下憂記, 松田航平, 永田真, 三浦典之
    • Organizer
      電子情報通信学会ハードウェアセキュリティ研究会
    • Related Report
      2019 Annual Research Report
  • [Presentation] 誘導インパルス型の瞬時自己破壊回路を利用した検知後対処に基づく物理攻撃対策2020

    • Author(s)
      多田捷, 松田航平, 永田真, _山一男, 三浦典之
    • Organizer
      電子情報通信学会ハードウェアセキュリティ研究会
    • Related Report
      2019 Annual Research Report
  • [Presentation] 鍵のランダムな漏洩に対するAES鍵スケジュール復元アルゴリズム2020

    • Author(s)
      植村友紀, 李陽, 三浦典之, 岩本貢, 崎山一男, 太田和夫
    • Organizer
      暗号と情報セキュリティシンポジウム (SCIS) 2020
    • Related Report
      2019 Annual Research Report
  • [Presentation] 事前通信モデルにおけるペアリングを用いない集約署名2020

    • Author(s)
      竹牟禮薫, 坂井祐介, Bagus Santoso, 花岡悟一郎, 太田和夫
    • Organizer
      暗号と情報セキュリティシンポジウム (SCIS) 2020
    • Related Report
      2019 Annual Research Report
  • [Presentation] 気泡検出器を用いたゼロ知識非破壊検査2020

    • Author(s)
      品川和雅, 三浦典之, 岩本貢, 崎山一男, 太田和夫
    • Organizer
      暗号と情報セキュリティシンポジウム (SCIS) 2020
    • Related Report
      2019 Annual Research Report
  • [Presentation] 任意の始集合を持つ関数を計算するprivate PEZプロトコル2020

    • Author(s)
      安部芳紀, 岩本貢, 太田和夫
    • Organizer
      暗号と情報セキュリティシンポジウム (SCIS) 2020
    • Related Report
      2019 Annual Research Report
  • [Presentation] AESへの5ラウンドの物理攻撃の可能性の考察2020

    • Author(s)
      高見豪, 菅原健, 崎山一男, 李陽
    • Organizer
      暗号と情報セキュリティシンポジウム (SCIS) 2020
    • Related Report
      2019 Annual Research Report
  • [Presentation] 無線通信から収集した電磁波を用いたテンプレート攻撃研究2020

    • Author(s)
      杉本悠馬, 菅原健, 崎山一男, 李陽
    • Organizer
      暗号と情報セキュリティシンポジウム (SCIS) 2020
    • Related Report
      2019 Annual Research Report
  • [Presentation] Re-keying方式の高次サイドチャネル攻撃への耐性に関する検討2020

    • Author(s)
      駒野雄一, 廣瀬勝一
    • Organizer
      暗号と情報セキュリティシンポジウム (SCIS) 2020
    • Related Report
      2019 Annual Research Report
  • [Presentation] 調光機能のあるLEDの個体識別2020

    • Author(s)
      藤聡子, 土屋彩夏, 李陽, 崎山一男, 菅原健
    • Organizer
      暗号と情報セキュリティシンポジウム (SCIS) 2020
    • Related Report
      2019 Annual Research Report
  • [Presentation] レーザー検知回路から漏洩するサイドチャ ネル情報の考察2020

    • Author(s)
      羽田野凌太, 平田遼, 松田航平, 三浦典之, 李陽, 崎山一男
    • Organizer
      暗号と情報セキュリティシンポジウム (SCIS) 2020
    • Related Report
      2019 Annual Research Report
  • [Presentation] 小型・低電力セキュアモジュールのための暗号回路と物理攻撃対策の軽量実装に関する研究2020

    • Author(s)
      松田航平
    • Organizer
      電子情報通信学会集積回路研究会
    • Related Report
      2019 Annual Research Report
    • Invited
  • [Presentation] 任意の関数を計算するprivate PEZプロトコルの改善2019

    • Author(s)
      安部芳紀, 岩本貢, 太田和夫
    • Organizer
      コンピューターセキュリティシンポジウム 2019 (CSS 2019)
    • Related Report
      2019 Annual Research Report
  • [Presentation] (強)フォワード安全な動的検索可能暗号の効率的な構成2019

    • Author(s)
      渡邉洋平, 大原一真, 岩本貢, 太田和夫_
    • Organizer
      コンピューターセキュリティシンポジウム 2019 (CSS 2019)
    • Related Report
      2019 Annual Research Report
  • [Presentation] How to improve the private PEZ protocol for general functions2019

    • Author(s)
      Yoshiki Abe, Mitsugu Iwamoto, and Kazuo Ohta
    • Organizer
      International Workshop on Security (IWSEC2019)
    • Related Report
      2019 Annual Research Report
    • Int'l Joint Research
  • [Presentation] 積分球による光量の均一化に基づくLEDの個体識別2019

    • Author(s)
      土屋彩夏,藤聡子, 李陽, 崎山一男, 菅原健
    • Organizer
      IEICE2019年ソサイエティ大会
    • Related Report
      2019 Annual Research Report
  • [Presentation] AESに対する5ラウンド攻撃の物理攻撃への応用検討2019

    • Author(s)
      高見豪, 菅原健, 崎山一男, 李陽
    • Organizer
      IEICE2019年ソサイエティ大会
    • Related Report
      2019 Annual Research Report
  • [Presentation] レーザーフォールト注入攻撃への対 策が施された AES 暗号チップの脆弱性評価2019

    • Author(s)
      羽田野凌太, 李陽, 多田捷, 松田航平, 三浦典之, 菅原健, 崎山一男
    • Organizer
      IEICE2019年ソサイエティ大会
    • Related Report
      2019 Annual Research Report
  • [Presentation] LED 光源を用いた光サイドチャネル認証装置2019

    • Author(s)
      椎名瞭, 菅原健, 松村竜我, 崎山一男
    • Organizer
      IEICE2019年ソサイエティ大会
    • Related Report
      2019 Annual Research Report
  • [Presentation] AES 暗号への 9 ラウンド差分故障解析の攻撃耐性の評価2019

    • Author(s)
      杉本博英, 羽田野凌太, 庄司奈津, 崎山一男
    • Organizer
      IEICE2019年ソサイエティ大会
    • Related Report
      2019 Annual Research Report
  • [Presentation] レーザー光を使った音情報の漏洩に対する安全性評価2019

    • Author(s)
      星野翔, 椎名瞭, 松村竜我, 崎山一男
    • Organizer
      IEICE2019年ソサイエティ大会
    • Related Report
      2019 Annual Research Report
  • [Presentation] Card-based Majority Voting Protocols with Three Inputs Using Three Cards2019

    • Author(s)
      Kazuo Ohta
    • Organizer
      nternational Secure Multi-party Computation Forum (SMPS2019)
    • Related Report
      2019 Annual Research Report
    • Int'l Joint Research / Invited
  • [Presentation] Invited Talk: Deep Learning for Security Evaluation of Physically Unclonable Function2019

    • Author(s)
      Kazuo Sakiyama
    • Organizer
      ECTI UEC Workshop on AI and Application (ECTI-UEC2019)
    • Related Report
      2019 Annual Research Report
    • Int'l Joint Research / Invited
  • [Presentation] PUF出力からのID/暗号鍵の再現法2019

    • Author(s)
      駒野雄一
    • Organizer
      第2回PUF技術シンポジウム
    • Related Report
      2018 Annual Research Report
    • Invited
  • [Presentation] Anti-tamper cryptographic hardware with analog electronics2019

    • Author(s)
      Kazuo Sakiyama
    • Organizer
      Mini Symposium: Crypto for long-term security and privacy
    • Related Report
      2018 Annual Research Report
    • Invited
  • [Presentation] IoT端末へのサイドチャネル攻撃の脅威評価~攻撃環境の変遷と対策技術の展望~2019

    • Author(s)
      駒野雄一、清水秀夫、三宅秀享
    • Organizer
      暗号と情報セキュリティシンポジウム (SCIS2019)
    • Related Report
      2018 Annual Research Report
  • [Presentation] PRINCEファミリ暗号プロセッサの超軽量実装2019

    • Author(s)
      松田航平, 永田真, 三浦典之
    • Organizer
      電子情報通信学会 ハードウェアセキュリティ研究会
    • Related Report
      2018 Annual Research Report
  • [Presentation] 分光スペクトルを用いたLEDの個体識別における電流変化の影響2019

    • Author(s)
      藤聡子, 李陽, 崎山一男, 菅原健
    • Organizer
      暗号と情報セキュリティシンポジウム (SCIS2019)
    • Related Report
      2018 Annual Research Report
  • [Presentation] 分光スペクトルを用いたLEDの個体識別における電流変化の影響2019

    • Author(s)
      藤聡子, 李陽, 崎山一男, 菅原健
    • Organizer
      サイバーセキュリティシンポジウム道後2019(SEC道後2019学生研究賞受賞研究発表会)
    • Related Report
      2018 Annual Research Report
    • Invited
  • [Presentation] Changing of the Guards の一般化2019

    • Author(s)
      菅原健
    • Organizer
      暗号と情報セキュリティシンポジウム (SCIS2019)
    • Related Report
      2018 Annual Research Report
  • [Presentation] Investigation of Information Leakage from A Laser Fault Injection Sensor2019

    • Author(s)
      Yang Li, Natsu Shoji, Takeshi Sugawara, Kazuo Sakiyama
    • Organizer
      IEICE2019年総合大会
    • Related Report
      2018 Annual Research Report
  • [Presentation] サイドチャネル攻撃への耐性を有する認証暗号方式について2019

    • Author(s)
      廣瀬勝一, 菅原健, 駒野雄一
    • Organizer
      電子情報通信学会 情報セキュリティ研究会
    • Related Report
      2018 Annual Research Report
  • [Presentation] 現代暗号研究の事始め ~ 1つのケーススタディ ~2019

    • Author(s)
      太田和夫
    • Organizer
      情報理論・情報セキュリティ・ワイドバンドシステム合同研究会
    • Related Report
      2018 Annual Research Report
    • Invited
  • [Presentation] 初期文字列が29 文字の4 入力多数決Private PEZプロトコル2019

    • Author(s)
      安部 芳紀, 山本 翔太, 岩本 貢, 太田 和夫
    • Organizer
      情報理論・情報セキュリティ・ワイドバンドシステム合同研究会
    • Related Report
      2018 Annual Research Report
  • [Presentation] 効率的でフォワード安全な動的検索可能暗号2019

    • Author(s)
      渡邉洋平, 岩本貢, 太田 和夫
    • Organizer
      暗号と情報セキュリティシンポジウム (SCIS2019)
    • Related Report
      2018 Annual Research Report
  • [Presentation] 不正検知可能な3入力多数決カードプロトコル2019

    • Author(s)
      安部 芳紀, 山本 翔太, 岩本 貢, 太田 和夫
    • Organizer
      暗号と情報セキュリティシンポジウム (SCIS2019)
    • Related Report
      2018 Annual Research Report
  • [Presentation] 4入力多数決を計算する効率的なPrivate PEZプロトコル2019

    • Author(s)
      山本 翔太, 安部 芳紀, 岩本 貢, 太田 和夫
    • Organizer
      暗号と情報セキュリティシンポジウム (SCIS2019)
    • Related Report
      2018 Annual Research Report
  • [Presentation] Three-Party Private Set Operation Protocols Using Polynomials and OPPRF2019

    • Author(s)
      Wenjia Wang, Yoshiki Abe, Mitsugu Iwamoto, and Kazuo Ohta,
    • Organizer
      暗号と情報セキュリティシンポジウム (SCIS2019)
    • Related Report
      2018 Annual Research Report
  • [Presentation] Another Look at One-More Discrete Logarithm Problem in Generic Model2019

    • Author(s)
      Bagus Santoso and Kazuo Ohta
    • Organizer
      暗号と情報セキュリティシンポジウム (SCIS2019)
    • Related Report
      2018 Annual Research Report
  • [Presentation] AES暗号への故障差分攻撃のモデル化と攻撃回数の評価2018

    • Author(s)
      羽田野凌太, 庄司奈津, 李陽, 菅原健, 崎山一男
    • Organizer
      IEICE2018年ソサイエティ大会
    • Related Report
      2018 Annual Research Report
  • [Presentation] Keynote: Hardware Security and IoT Ecosystem2018

    • Author(s)
      Kazuo Sakiyama
    • Organizer
      International Conference on Advanced Computing and Applications (ACOMP2018)
    • Related Report
      2018 Annual Research Report
    • Int'l Joint Research / Invited
  • [Presentation] Keynote: Towards Resilient IoT System - How to Evaluate Information Leakage2018

    • Author(s)
      Kazuo Sakiyama
    • Organizer
      The First International Workshop on Hardware Oriented Cybersecurity (HwSec2018)
    • Related Report
      2018 Annual Research Report
    • Int'l Joint Research / Invited
  • [Presentation] An Abstraction Model for Differential Fault Analysis on AES2018

    • Author(s)
      Ryota Hatano and Kazuo Sakiyama
    • Organizer
      The First International Workshop on Hardware Oriented Cybersecurity (HwSec2019)
    • Related Report
      2018 Annual Research Report
    • Int'l Joint Research
  • [Presentation] Modeling 1-bit Probing Attack on Block Ciphers2018

    • Author(s)
      Shoji Natsu and Kazuo Sakiyama
    • Organizer
      The First International Workshop on Hardware Oriented Cybersecurity (HwSec2020)
    • Related Report
      2018 Annual Research Report
    • Int'l Joint Research
  • [Presentation] ハイパースペクトルカメラを用いた液晶ディスプレイの個体差に関する基礎的研究2018

    • Author(s)
      堀越健太郎, 崎山一男
    • Organizer
      暗号と情報セキュリティシンポジウム (SCIS2019)
    • Related Report
      2018 Annual Research Report
  • [Presentation] Arbiter PUFへのサイドチャネルモデリング攻撃の実装と応用2018

    • Author(s)
      八代理紗, 藤聡子, 菅原健, 崎山一男
    • Organizer
      IEICE2018年ソサイエティ大会
    • Related Report
      2018 Annual Research Report
  • [Presentation] Arbiter PUFに対する攻撃手法に関する一考察2018

    • Author(s)
      八代理紗, 菅原健, 崎山一男
    • Organizer
      情報処理学会 DAシンポジウム2018 (特別セッション)
    • Related Report
      2018 Annual Research Report
    • Invited
  • [Presentation] 基板電流センサと電源瞬断回路を利用した小面積レーザーフォールト注入攻撃対策2018

    • Author(s)
      松田航平, 藤井達哉, 庄司奈津, 菅原健, 崎山一男, 林優一, 永田真, 三浦典之
    • Organizer
      電子情報通信学会 ハードウェアセキュリティ研究会
    • Related Report
      2018 Annual Research Report
  • [Presentation] レーザー故障注入攻撃対策を備えた暗号ICの設計手法2018

    • Author(s)
      松田航平, 藤井達哉, 庄司奈津, 菅原健, 崎山一男, 林優一, 永田真, 三浦典之
    • Organizer
      情報処理学会 DAシンポジウム2018 (特別セッション)
    • Related Report
      2018 Annual Research Report
  • [Presentation] 分光器を用いたLEDの個体識別に向けた基礎的研究2018

    • Author(s)
      藤聡子, 李陽, 崎山一男, 菅原健
    • Organizer
      IEICE2018年ソサイエティ大会
    • Related Report
      2018 Annual Research Report
  • [Presentation] A Case Study of Row Hammer under Different Refresh Rates2018

    • Author(s)
      Erina Tatsumi, Kazuo Sakiyama, and Takeshi Sugawara
    • Organizer
      The 13th International Workshop on Security (IWSEC2018)
    • Related Report
      2018 Annual Research Report
    • Int'l Joint Research
  • [Presentation] AESの指定したラウンド間差分の平文探索アルゴリズムの改良2018

    • Author(s)
      伊藤駿輔, 菅原健, 崎山一男, 李陽
    • Organizer
      IEICE2018年ソサイエティ大会
    • Related Report
      2018 Annual Research Report
  • [Presentation] 秘密計算の安全性~プライバシーを保ちつつどこまで計算できるか2018

    • Author(s)
      岩本貢
    • Organizer
      第8回バイオメトリクスと認識・認証シンポジウム(SBRA)
    • Related Report
      2018 Annual Research Report
    • Invited
  • [Presentation] いくつかの理想的な秘密分散法を用いた最適な複数割り当て法2018

    • Author(s)
      江利口礼央, 國廣昇, 岩本貢
    • Organizer
      情報理論とその応用シンポジウム (SITA2018)
    • Related Report
      2018 Annual Research Report
  • [Book] “Fault Sensitivity Analysis,” Chapter in Sushil Jajodia, Pierangela Samarati, and Moti Yung editors, Encyclopedia of Cryptography, Security and Privacy, Third Edition2024

    • Author(s)
      Kazuo Sakiyama and Yang Li
    • Publisher
      Springer
    • ISBN
      9783030715205
    • Related Report
      2022 Annual Research Report
  • [Book] ニュートン別冊 数学の世界 現代編 増補第2版,暗号 個人情報を守る数学2021

    • Author(s)
      太田 和夫, 岩本 貢, 渡邉 洋平 (取材協力)
    • Total Pages
      28
    • Publisher
      Newton Press
    • ISBN
      9784315523508
    • Related Report
      2020 Annual Research Report
  • [Book] PRIVATE PERMUTATIONS IN CARD-BASED CRYPTOGRAPHY2021

    • Author(s)
      Takeshi Nakai
    • Total Pages
      96
    • Publisher
      The University of Electro-Communications
    • Related Report
      2020 Annual Research Report
  • [Book] 小型・低電力セキュアモジュールのための暗号回路と物理攻撃対策の軽量実装に関する研究2020

    • Author(s)
      松田航平
    • Total Pages
      89
    • Publisher
      神戸大学学位論文
    • Related Report
      2019 Annual Research Report
  • [Book] 電子情報通信学会 知識ベース 1群(信号・システム)- 3編(暗号理論)-14章(サイドチャネル攻撃と耐タンパー技術)2019

    • Author(s)
      崎山一男
    • Total Pages
      9
    • Publisher
      電子情報通信学会
    • Related Report
      2019 Annual Research Report
  • [Book] 暗号ハードウェアのセキュリティ2019

    • Author(s)
      崎山一男,菅原健,李陽
    • Total Pages
      174
    • Publisher
      コロナ社
    • ISBN
      9784339028942
    • Related Report
      2019 Annual Research Report
  • [Remarks] https://sakiyama-lab.jp/study/

    • Related Report
      2022 Annual Research Report
  • [Remarks] 研究業績一覧

    • URL

      https://sakiyama-lab.jp/study/

    • Related Report
      2019 Annual Research Report
  • [Remarks] 研究業績一覧

    • URL

      http://sakiyama-lab.jp/study/

    • Related Report
      2018 Annual Research Report

URL: 

Published: 2018-06-12   Modified: 2024-03-28  

Information User Guide FAQ News Terms of Use Attribution of KAKENHI

Powered by NII kakenhi