• Search Research Projects
  • Search Researchers
  • How to Use
  1. Back to previous page

Development of highly secure and reliable authentication system based on physically unclonable hardware identifier

Research Project

Project/Area Number 20K19765
Research Category

Grant-in-Aid for Early-Career Scientists

Allocation TypeMulti-year Fund
Review Section Basic Section 60040:Computer system-related
Research InstitutionTohoku University

Principal Investigator

Ueno Rei  東北大学, 電気通信研究所, 助教 (80826165)

Project Period (FY) 2020-04-01 – 2024-03-31
Project Status Completed (Fiscal Year 2023)
Budget Amount *help
¥4,160,000 (Direct Cost: ¥3,200,000、Indirect Cost: ¥960,000)
Fiscal Year 2023: ¥1,170,000 (Direct Cost: ¥900,000、Indirect Cost: ¥270,000)
Fiscal Year 2022: ¥1,560,000 (Direct Cost: ¥1,200,000、Indirect Cost: ¥360,000)
Fiscal Year 2021: ¥910,000 (Direct Cost: ¥700,000、Indirect Cost: ¥210,000)
Fiscal Year 2020: ¥520,000 (Direct Cost: ¥400,000、Indirect Cost: ¥120,000)
Keywords物理複製困難関数 (PUF) / hardware root-of-trust / 暗号 / 情報セキュリティ / 物理複製困難関数 / ハードウェアセキュリティ / 共通鍵暗号 / サイドチャネル攻撃 / 暗号実装 / 認証 / 深層学習 / ファジー抽出器 / 耐タンパー性暗号鍵生成・ストレージ
Outline of Research at the Start

本研究では,半導体で実現可能な物理複製困難関数 (PUF: Physically Unclonable Function) に基づく認証システムの実現を目指す.PUFから安全なハードウェアIDを効率的に抽出するためにPUFの出力に対して高効率に誤りを訂正する処理や乱数性を高める手法を新たに開発することで,高い安全性と信頼性を有する認証システムを開発する.

Outline of Final Research Achievements

Wwe developed multiple methods to extract hardware IDs from Physical Unclonable Functions (PUFs) with extremely high efficiency and reliability based on probabilistic techniques. Among these methods, the most recent proposal demonstrated significantly higher efficiency in extracting hardware IDs compared to existing methods in most standard scenarios, allowing for up to a 55% reduction in hardware implementation costs of PUFs while ensuring equivalent security. Furthermore, as cryptographic authentication modules based on PUFs can be vulnerable to various side-channel attacks, we evaluated side-channel attacks to extract secret and authentication keys generated by PUFs. Subsequently, we confirmed the effectiveness of countermeasures such as masking and cryptographic key transformation.

Academic Significance and Societal Importance of the Research Achievements

本研究成果は,確率的アルゴリズムの有効性をPUFに基づく認証システムの構築に応用することで,現実的コストで実装可能な手法の中で到達可能な効率性の解明に大きく貢献した.また,PUFは暗号アルゴリズム・プロトコルにおける「信頼の起点 (root-of-trust)」として扱うことで暗号アルゴリズム・プロトコルの信頼をハードウェアから保証するという重要な役割がある.本成果によりPUFを信頼の起点として扱うコストが大幅に削減したことで,ハードウェアroot-of-trustの普及,そしてより安全・高信頼な情報社会に貢献する.

Report

(5 results)
  • 2023 Annual Research Report   Final Research Report ( PDF )
  • 2022 Research-status Report
  • 2021 Research-status Report
  • 2020 Research-status Report
  • Research Products

    (79 results)

All 2024 2023 2022 2021 2020

All Journal Article (25 results) (of which Peer Reviewed: 24 results,  Open Access: 22 results) Presentation (54 results) (of which Int'l Joint Research: 16 results,  Invited: 5 results)

  • [Journal Article] Fallen Sanctuary: A Higher-Order and Leakage-Resilient Rekeying Scheme2023

    • Author(s)
      Ueno Rei、Homma Naofumi、Inoue Akiko、Minematsu Kazuhiko
    • Journal Title

      IACR Transactions on Cryptographic Hardware and Embedded Systems

      Volume: 2024 Issue: 1 Pages: 264-308

    • DOI

      10.46586/tches.v2024.i1.264-308

    • Related Report
      2023 Annual Research Report
    • Peer Reviewed / Open Access
  • [Journal Article] Side-Channel Analysis Against SecOC-Compliant AES-CMAC2023

    • Author(s)
      Ebina Katsumi、Ueno Rei、Homma Naofumi
    • Journal Title

      IEEE Transactions on Circuits and Systems II: Express Briefs

      Volume: 70 Issue: 10 Pages: 3772-3776

    • DOI

      10.1109/tcsii.2023.3288278

    • Related Report
      2023 Annual Research Report
    • Peer Reviewed / Open Access
  • [Journal Article] Multiple-Valued Plaintext-Checking Side-Channel Attacks on Post-Quantum KEMs2023

    • Author(s)
      Tanaka Yutaro、Ueno Rei、Xagawa Keita、Ito Akira、Takahashi Junko、Homma Naofumi
    • Journal Title

      IACR Transactions on Cryptographic Hardware and Embedded Systems

      Volume: 4 Pages: 473-503

    • DOI

      10.46586/tches.v2023.i3.473-503

    • Related Report
      2023 Annual Research Report
    • Peer Reviewed / Open Access
  • [Journal Article] How Secure is Exponent-blinded RSA?CRT with Sliding Window Exponentiation?2023

    • Author(s)
      Ueno Rei、Homma Naofumi
    • Journal Title

      IACR Transactions on Cryptographic Hardware and Embedded Systems

      Volume: 4 Pages: 241-269

    • DOI

      10.46586/tches.v2023.i2.241-269

    • Related Report
      2022 Research-status Report
    • Peer Reviewed / Open Access
  • [Journal Article] On the Success Rate of Side-Channel Attacks on Masked Implementations2022

    • Author(s)
      Ito Akira、Ueno Rei、Homma Naofumi
    • Journal Title

      Proceedings on ACM SIGSAC Conference on Computer and Communications Security

      Volume: - Pages: 1521-1535

    • DOI

      10.1145/3548606.3560579

    • Related Report
      2022 Research-status Report
    • Peer Reviewed / Open Access
  • [Journal Article] One Truth Prevails: A Deep-learning Based Single-Trace Power Analysis on RSA?CRT with Windowed Exponentiation2022

    • Author(s)
      Saito Kotaro、Ito Akira、Ueno Rei、Homma Naofumi
    • Journal Title

      IACR Transactions on Cryptographic Hardware and Embedded Systems

      Volume: 4 Pages: 490-526

    • DOI

      10.46586/tches.v2022.i4.490-526

    • Related Report
      2022 Research-status Report
    • Peer Reviewed / Open Access
  • [Journal Article] Perceived Information Revisited2022

    • Author(s)
      Ito Akira、Ueno Rei、Homma Naofumi
    • Journal Title

      IACR Transactions on Cryptographic Hardware and Embedded Systems

      Volume: 4 Pages: 228-254

    • DOI

      10.46586/tches.v2022.i4.228-254

    • Related Report
      2022 Research-status Report
    • Peer Reviewed / Open Access
  • [Journal Article] ELM: A Low-Latency and Scalable Memory Encryption Scheme2022

    • Author(s)
      Inoue Akiko、Minematsu Kazuhiko、Oda Maya、Ueno Rei、Homma Naofumi
    • Journal Title

      IEEE Transactions on Information Forensics and Security

      Volume: 17 Pages: 2628-2643

    • DOI

      10.1109/tifs.2022.3188146

    • Related Report
      2022 Research-status Report
    • Peer Reviewed / Open Access
  • [Journal Article] AES S-Box Hardware With Efficiency Improvement Based on Linear Mapping Optimization2022

    • Author(s)
      Nakashima Ayano、Ueno Rei、Homma Naofumi
    • Journal Title

      IEEE Transactions on Circuits and Systems II: Express Briefs

      Volume: 69 Issue: 10 Pages: 3978-3982

    • DOI

      10.1109/tcsii.2022.3185632

    • Related Report
      2022 Research-status Report
    • Peer Reviewed / Open Access
  • [Journal Article] Homomorphic encryption for stochastic computing2022

    • Author(s)
      Koseki Ryusuke、Ito Akira、Ueno Rei、Tibouchi Mehdi、Homma Naofumi
    • Journal Title

      Journal of Cryptographic Engineering

      Volume: - Issue: 2 Pages: 251-263

    • DOI

      10.1007/s13389-022-00299-6

    • Related Report
      2022 Research-status Report
    • Peer Reviewed / Open Access
  • [Journal Article] Efficient Modular Polynomial Multiplier for NTT Accelerator of Crystals-Kyber2022

    • Author(s)
      Itabashi Yuma、Ueno Rei、Homma Naofumi
    • Journal Title

      Proceedings on Euromicro Conference on Digital System Design

      Volume: - Pages: 528-533

    • DOI

      10.1109/dsd57027.2022.00076

    • Related Report
      2022 Research-status Report
    • Peer Reviewed / Open Access
  • [Journal Article] High-Speed Hardware Architecture for Post-Quantum Diffie?Hellman Key Exchange Based on Residue Number System2022

    • Author(s)
      Ueno Rei、Homma Naofumi
    • Journal Title

      Proceedings on IEEE International Symposium on Circuits and Systems

      Volume: - Pages: 2107-2111

    • DOI

      10.1109/iscas48785.2022.9937804

    • Related Report
      2022 Research-status Report
    • Peer Reviewed / Open Access
  • [Journal Article] Efficient Formal Verification of Galois-Field Arithmetic Circuits Using ZDD Representation of Boolean Polynomials2022

    • Author(s)
      Ito Akira、Ueno Rei、Homma Naofumi
    • Journal Title

      IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems

      Volume: 41 Issue: 3 Pages: 794-798

    • DOI

      10.1109/tcad.2021.3059924

    • Related Report
      2021 Research-status Report
    • Peer Reviewed / Open Access
  • [Journal Article] An Algebraic Approach to Verifying Galois-Field Arithmetic Circuits with Multiple-Valued Characteristics2021

    • Author(s)
      ITO Akira、UENO Rei、HOMMA Naofumi
    • Journal Title

      IEICE Transactions on Information and Systems

      Volume: E104.D Issue: 8 Pages: 1083-1091

    • DOI

      10.1587/transinf.2020LOP0004

    • NAID

      130008070385

    • ISSN
      0916-8532, 1745-1361
    • Year and Date
      2021-08-01
    • Related Report
      2021 Research-status Report
    • Peer Reviewed / Open Access
  • [Journal Article] A Systematic Design Methodology of Formally-Proven Side-Channel-Resistant Cryptographic Hardware2021

    • Author(s)
      Rei Ueno, Naofumi Homma, Sumio Morioka, and Takafumi Aoki
    • Journal Title

      IEEE Design & Test Magazine

      Volume: 38 Pages: 84-92

    • Related Report
      2021 Research-status Report
    • Peer Reviewed
  • [Journal Article] Imbalanced Data Problems in Deep Learning-Based Side-Channel Attacks: Analysis and Solution2021

    • Author(s)
      Ito Akira、Saito Kotaro、Ueno Rei、Homma Naofumi
    • Journal Title

      IEEE Transactions on Information Forensics and Security

      Volume: 16 Pages: 3790-3802

    • DOI

      10.1109/tifs.2021.3092050

    • Related Report
      2021 Research-status Report
    • Peer Reviewed / Open Access
  • [Journal Article] Bypassing Isolated Execution on RISC-V using Side-Channel-Assisted Fault-Injection and Its Countermeasure2021

    • Author(s)
      Nashimoto Shoei、Suzuki Daisuke、Ueno Rei、Homma Naofumi
    • Journal Title

      IACR Transactions on Cryptographic Hardware and Embedded Systems

      Volume: 1 Pages: 28-68

    • DOI

      10.46586/tches.v2022.i1.28-68

    • Related Report
      2021 Research-status Report
    • Peer Reviewed / Open Access
  • [Journal Article] Curse of Re-encryption: A Generic Power/EM Analysis on Post-Quantum KEMs2021

    • Author(s)
      Ueno Rei、Xagawa Keita、Tanaka Yutaro、Ito Akira、Takahashi Junko、Homma Naofumi
    • Journal Title

      IACR Transactions on Cryptographic Hardware and Embedded Systems

      Volume: 1 Pages: 296-322

    • DOI

      10.46586/tches.v2022.i1.296-322

    • Related Report
      2021 Research-status Report
    • Peer Reviewed / Open Access
  • [Journal Article] Fault-Injection Attacks Against NIST’s Post-Quantum Cryptography Round 3 KEM Candidates2021

    • Author(s)
      Xagawa Keita、Ito Akira、Ueno Rei、Takahashi Junko、Homma Naofumi
    • Journal Title

      nternational Conference on the Theory and Application of Cryptology and Information Security (ASIACRYPT2021)

      Volume: 1 Pages: 33-61

    • DOI

      10.1007/978-3-030-92075-3_2

    • ISBN
      9783030920746, 9783030920753
    • Related Report
      2021 Research-status Report
    • Peer Reviewed
  • [Journal Article] A Systematic Design Methodology of Formally-Proven Side-Channel-Resistant Cryptographic Hardware2021

    • Author(s)
      Ueno Rei、Homma Naofumi、Morioka Sumio、Aoki Takafumi
    • Journal Title

      IEEE Design & Test

      Volume: - Issue: 3 Pages: 1-1

    • DOI

      10.1109/mdat.2021.3063337

    • Related Report
      2020 Research-status Report
    • Peer Reviewed / Open Access
  • [Journal Article] 物理複製困難関数を用いたハードウェア認証技術2021

    • Author(s)
      上野嶺、本間尚文
    • Journal Title

      月刊自動認識

      Volume: 34 Pages: 36-43

    • NAID

      40022486444

    • Related Report
      2020 Research-status Report
  • [Journal Article] A method for constructing sliding windows leak from noisy cache timing information2020

    • Author(s)
      Ueno Rei、Takahashi Junko、Hayashi Yu-ichi、Homma Naofumi
    • Journal Title

      Journal of Cryptographic Engineering

      Volume: - Issue: 2 Pages: 1-10

    • DOI

      10.1007/s13389-020-00230-x

    • Related Report
      2020 Research-status Report
    • Peer Reviewed / Open Access
  • [Journal Article] Unified Hardware for High-Throughput AES-Based Authenticated Encryptions2020

    • Author(s)
      Sawataishi Shotaro、Ueno Rei、Homma Naofumi
    • Journal Title

      IEEE Transactions on Circuits and Systems II: Express Briefs

      Volume: 67 Issue: 9 Pages: 1604-1608

    • DOI

      10.1109/tcsii.2020.3013415

    • Related Report
      2020 Research-status Report
    • Peer Reviewed / Open Access
  • [Journal Article] Rejection Sampling Schemes for Extracting Uniform Distribution from Biased PUFs2020

    • Author(s)
      Rei Ueno、Kohei Kazumori、Naofumi Homma
    • Journal Title

      IACR Transactions on Cryptographic Hardware and Embedded Systems

      Volume: 4 Pages: 86-128

    • Related Report
      2020 Research-status Report
    • Peer Reviewed / Open Access
  • [Journal Article] Debiasing Method for Efficient Ternary Fuzzy Extractors and Ternary Physically Unclonable Functions2020

    • Author(s)
      Kazumori Kohei、Ueno Rei、Homma Naofumi
    • Journal Title

      Proceedings of International Symposium on Multiple-Value Logic

      Volume: - Pages: 52-57

    • DOI

      10.1109/ismvl49045.2020.00-30

    • Related Report
      2020 Research-status Report
    • Peer Reviewed / Open Access
  • [Presentation] 多値決定木に基づく暗号鍵変換とそのサイドチャネル攻撃対策への応用2024

    • Author(s)
      上野 嶺
    • Organizer
      多値論理研究会
    • Related Report
      2023 Annual Research Report
  • [Presentation] 漏えい耐性を有する高次暗号鍵変換スキームの提案とその評価2024

    • Author(s)
      上野 嶺
    • Organizer
      暗号と情報セキュリティシンポジウム
    • Related Report
      2023 Annual Research Report
  • [Presentation] Side-Channel Analysis Against SecOC-Compliant AES-CMAC2023

    • Author(s)
      Rei Ueno
    • Organizer
      ISICAS
    • Related Report
      2023 Annual Research Report
    • Int'l Joint Research
  • [Presentation] Multiple-Valued Plaintext-Checking Side-Channel Attacks on Post-Quantum KEMs2023

    • Author(s)
      Rei Ueno
    • Organizer
      CHES
    • Related Report
      2023 Annual Research Report
    • Int'l Joint Research
  • [Presentation] Efficient DFA-Resistant AES Hardware Based on Concurrent Fault Detection Scheme2023

    • Author(s)
      Rei Ueno
    • Organizer
      ISMVL
    • Related Report
      2023 Annual Research Report
    • Int'l Joint Research
  • [Presentation] Secure Implementation of Post-Quantum Cryptography: Challenges and Opportunities2023

    • Author(s)
      Rei Ueno
    • Organizer
      ICISC
    • Related Report
      2023 Annual Research Report
    • Int'l Joint Research / Invited
  • [Presentation] 多重部分鍵差分推定に基づく高効率ノンプロファイリング型深層学習サイドチャネル攻撃の検討2023

    • Author(s)
      田中 陸真
    • Organizer
      ハードウェアセキュリティ研究会
    • Related Report
      2023 Annual Research Report
  • [Presentation] Triviumのアンロールド実装に対するサイドチャネル攻撃の検討2023

    • Author(s)
      小林 蒼一郎
    • Organizer
      ハードウェアセキュリティ研究会
    • Related Report
      2023 Annual Research Report
  • [Presentation] アンロールド実装されたブロック暗号に対するサイドチャネル攻撃と差分解読の関係性の検討2023

    • Author(s)
      東 哲平
    • Organizer
      情報セキュリティ研究会
    • Related Report
      2023 Annual Research Report
  • [Presentation] ASCONへのサイドチャネル攻撃における選択関数に関する検討2023

    • Author(s)
      岩佐 大将
    • Organizer
      情報セキュリティ研究会
    • Related Report
      2023 Annual Research Report
  • [Presentation] 耐量子計算機暗号に対する多値ニューラルネットワークを用いたサイドチャネル解析2023

    • Author(s)
      田中祐太郎
    • Organizer
      第36回多値論理とその応用研究会
    • Related Report
      2022 Research-status Report
  • [Presentation] 確率的暗号化状態処理ハードウェアの設計と評価2023

    • Author(s)
      田村佑樹
    • Organizer
      第36回多値論理とその応用研究会
    • Related Report
      2022 Research-status Report
  • [Presentation] TEEバイパス攻撃対策のRISC-V Keystone実装評価2023

    • Author(s)
      梨本翔永
    • Organizer
      2023年暗号と情報セキュリティシンポジウム
    • Related Report
      2022 Research-status Report
  • [Presentation] 部分鍵差分推測を用いたノンプロファイリング型深層学習サイドチャネル攻撃に関する検討2023

    • Author(s)
      上野嶺
    • Organizer
      2023年暗号と情報セキュリティシンポジウム
    • Related Report
      2022 Research-status Report
  • [Presentation] 分離カウンタを用いたセキュアNVMの効率的な復旧保証2023

    • Author(s)
      上野嶺
    • Organizer
      ETNET2023
    • Related Report
      2022 Research-status Report
  • [Presentation] High-Speed Hardware Architecture for Post-Quantum Diffe–Hellman Key Exchange Based on Residue Number Systems2022

    • Author(s)
      Rei Ueno
    • Organizer
      IEEE International Symposium on Circuits and Systems
    • Related Report
      2022 Research-status Report
    • Int'l Joint Research
  • [Presentation] AES S-Box Hardware with Efficiency Improvement Based on Linear Mapping Optimization2022

    • Author(s)
      Rei Ueno
    • Organizer
      IEEE International Symposium on Integrated Circuits and Systems
    • Related Report
      2022 Research-status Report
    • Int'l Joint Research
  • [Presentation] Perceived Information Revisited: New Metrics to Evaluate Success Rate of Side-Channel Attacks2022

    • Author(s)
      Akira Ito
    • Organizer
      International Conference on Cryptographic Hardware and Embedded Systems
    • Related Report
      2022 Research-status Report
    • Int'l Joint Research
  • [Presentation] ne Truth Prevails: A Deep-learning Based Single-Trance Power Analysis on RSA--CRT with Windowed Exponentiation2022

    • Author(s)
      Rei Ueno
    • Organizer
      International Conference on Cryptographic Hardware and Embedded Systems
    • Related Report
      2022 Research-status Report
    • Int'l Joint Research
  • [Presentation] Curse of Re-encryption: A Generic Power/EM Analysis on Post-Quantum KEMs2022

    • Author(s)
      Rei Ueno
    • Organizer
      International Conference on Cryptographic Hardware and Embedded Systems
    • Related Report
      2022 Research-status Report 2021 Research-status Report
    • Int'l Joint Research
  • [Presentation] Bypassing Isolated Execution on RISC-V using Side-Channel-Assisted Fault-Injection and Its Countermeasure2022

    • Author(s)
      Shoe Nashimoto
    • Organizer
      International Conference on Cryptographic Hardware and Embedded Systems
    • Related Report
      2022 Research-status Report
    • Int'l Joint Research
  • [Presentation] PoC TEE: Proof-of-Concept Implementation of RISC-V Trusted Execution Environment for Embedded Devices2022

    • Author(s)
      Shoe Nashimoto
    • Organizer
      Topics in hArdware SEcurity and RISC-V
    • Related Report
      2022 Research-status Report
    • Int'l Joint Research
  • [Presentation] On the Success Rate of Side-Channel Attacks on Masked Implementations: Information-Theoretical Bounds and Their Practical Usage2022

    • Author(s)
      Akira Ito
    • Organizer
      ACM SIGSAC Conference on Computer and Communications Security
    • Related Report
      2022 Research-status Report
    • Int'l Joint Research
  • [Presentation] 層学習サイドチャネル攻撃における交差エントロピー損失関数と攻撃性能の関係に関する考察2022

    • Author(s)
      上野嶺
    • Organizer
      ハードウェアセキュリティ研究会
    • Related Report
      2022 Research-status Report
  • [Presentation] Gem5を用いたメモリ暗号化認証スキームELMのシステムレベル性能評価2022

    • Author(s)
      羽田大倫
    • Organizer
      LSIとシステムのワークショップ
    • Related Report
      2022 Research-status Report
  • [Presentation] 耐量子鍵カプセル化メカニズムに対する多クラスニューラルネットワークを用いたサイドチャネル攻撃の検討2022

    • Author(s)
      田中祐太郎
    • Organizer
      ハードウェアセキュリティ研究会
    • Related Report
      2022 Research-status Report
  • [Presentation] 更新並列化可能認証木に基づく高速なセキュア不揮発性メモリの実現2022

    • Author(s)
      羽田大倫
    • Organizer
      ARC研究会
    • Related Report
      2022 Research-status Report
  • [Presentation] AES-CTRに対するプロファイリングサイドチャネル解析の検討2022

    • Author(s)
      蛯名克海
    • Organizer
      ハードウェアセキュリティ研究会
    • Related Report
      2022 Research-status Report
  • [Presentation] AES-CTRに対するプロファイリングサイドチャネル解析の検討2022

    • Author(s)
      田村佑樹
    • Organizer
      ハードウェアセキュリティ研究会
    • Related Report
      2022 Research-status Report
  • [Presentation] 耐ソフトエラー性浮動小数点数値表現の提案とその実機評価2022

    • Author(s)
      上野嶺
    • Organizer
      第66回宇宙科学技術連合講演会
    • Related Report
      2022 Research-status Report
  • [Presentation] ハードウェアセキュリティに関する主要な国際学術会議の動向2022

    • Author(s)
      上野嶺
    • Organizer
      ハードウェアセキュリティフォーラム
    • Related Report
      2022 Research-status Report
    • Invited
  • [Presentation] Bypassing Isolated Execution on RISC-V using Side-Channel-Assisted Fault-Injection and Its Countermeasure2022

    • Author(s)
      Shoei Nashimoto
    • Organizer
      International Conference on Cryptographic Hardware and Embedded Systems
    • Related Report
      2021 Research-status Report
    • Int'l Joint Research
  • [Presentation] 耐量子鍵カプセル化メカニズムに対する一般化サイドチャネル攻撃2022

    • Author(s)
      上野嶺
    • Organizer
      2022年暗号と情報セキュリティシンポジウム
    • Related Report
      2021 Research-status Report
  • [Presentation] NIST PQC Round3候補の鍵カプセル化方式への故障注入攻撃2022

    • Author(s)
      草川恵太
    • Organizer
      2022年暗号と情報セキュリティシンポジウム
    • Related Report
      2021 Research-status Report
  • [Presentation] マスキング対策実装に対するサイドチャネル攻撃成功確率の情報理論的解析,2022

    • Author(s)
      伊東燦
    • Organizer
      2022年暗号と情報セキュリティシンポジウム
    • Related Report
      2021 Research-status Report
  • [Presentation] 確率的準同型暗号の高効率化とその性能評価2022

    • Author(s)
      小関隆介
    • Organizer
      ハードウェアセキュリティ研究会
    • Related Report
      2021 Research-status Report
  • [Presentation] アンロールド実装されたAESハードウェア特有のサイドチャネル情報漏洩の評価2022

    • Author(s)
      中嶋彩乃
    • Organizer
      ハードウェアセキュリティ研究会
    • Related Report
      2021 Research-status Report
  • [Presentation] RISC-V Keystoneへの故障注入に基づく隔離実行バイパス攻撃2022

    • Author(s)
      梨本翔永
    • Organizer
      ハードウェアセキュリティ研究会
    • Related Report
      2021 Research-status Report
  • [Presentation] A Formal Approach to Identifying Hardware Trojans in Cryptographic Hardware2021

    • Author(s)
      Akira Ito
    • Organizer
      IEEE 51th International Symposium on Multiple-Valued Logic (ISMVL)
    • Related Report
      2021 Research-status Report
    • Int'l Joint Research
  • [Presentation] Fault-Injection Attacks against NIST’s Post-Quantum Cryptography Round 3 KEM Candidates2021

    • Author(s)
      Keita Xagawa
    • Organizer
      International Conference on the Theory and Application of Cryptology and Information Security (ASIACRYPT2021)
    • Related Report
      2021 Research-status Report
    • Int'l Joint Research
  • [Presentation] 招待講演]バイアスを有するPUFからの棄却サンプリングを用いた一様乱数の抽出法(CHES2020より)2021

    • Author(s)
      上野嶺
    • Organizer
      ハードウェアセキュリティ研究会
    • Related Report
      2021 Research-status Report
    • Invited
  • [Presentation] 深層学習を用いたサイドチャネル攻撃の性能評価手法に関する検討2021

    • Author(s)
      伊東燦
    • Organizer
      ハードウェアセキュリティ研究会
    • Related Report
      2021 Research-status Report
  • [Presentation] 剰余数系を用いた同種写像暗号の高速ハードウェア実装2021

    • Author(s)
      上野嶺
    • Organizer
      ハードウェアセキュリティ研究会
    • Related Report
      2021 Research-status Report
  • [Presentation] 並列化Quotient Pipeliningモンゴメリ乗算に基づくFp2乗算器データパスの設計とその同種写像暗号への応用に関する検討2021

    • Author(s)
      上野嶺
    • Organizer
      ハードウェアセキュリティ研究会
    • Related Report
      2021 Research-status Report
  • [Presentation] マスキング対策された暗号ハードウェアへの深層学習を用いたサイドチャネル解析2021

    • Author(s)
      伊東燦
    • Organizer
      ハードウェアセキュリティ研究会
    • Related Report
      2021 Research-status Report
  • [Presentation] 軽量暗号GIMLIに対するサイドチャネル解析の検討2021

    • Author(s)
      伊藤圭吾
    • Organizer
      34回回路とシステムワークショップ
    • Related Report
      2021 Research-status Report
  • [Presentation] 格子暗号向け数論変換ハードウェアの設計2021

    • Author(s)
      板橋由磨
    • Organizer
      第44回多値論理フォーラム
    • Related Report
      2021 Research-status Report
  • [Presentation] 耐タンパー性を有するCRT-RSAソフトウェアに対する深層学習に基づく単一波形サイドチャネル攻撃2021

    • Author(s)
      齋藤宏太郎
    • Organizer
      ハードウェアセキュリティ研究会
    • Related Report
      2021 Research-status Report
  • [Presentation] 格子暗号向けKリダクションに基づく数論変換ハードウェアの検討2021

    • Author(s)
      板橋由磨
    • Organizer
      ハードウェアセキュリティ研究会
    • Related Report
      2021 Research-status Report
  • [Presentation] 軽量暗号GIMLI-AEADに対する深層学習を用いたサイドチャネル解析の検討2021

    • Author(s)
      伊藤圭吾
    • Organizer
      情報セキュリティ研究会
    • Related Report
      2021 Research-status Report
  • [Presentation] アンロールドアーキテクチャに基づく AESハードウェア特有のサイドチャネル情報漏洩の評価2021

    • Author(s)
      中嶋彩乃
    • Organizer
      ハードウェアセキュリティフォーラム
    • Related Report
      2021 Research-status Report
  • [Presentation] バイアスを有するPUFからの棄却サンプリングを用いた一様乱数の抽出法(CHES2020より)2021

    • Author(s)
      上野嶺
    • Organizer
      ハードウェアセキュリティ研究会
    • Related Report
      2020 Research-status Report
    • Invited
  • [Presentation] Rejection Sampling Schemes for Extracting Uniform Distribution from Biased PUFs2020

    • Author(s)
      Rei Ueno
    • Organizer
      International Conference on Cryptographic Hardware and Embedded Systems
    • Related Report
      2020 Research-status Report
    • Int'l Joint Research
  • [Presentation] 物理複製困難関数が実現する情報セキュリティとその方法2020

    • Author(s)
      上野嶺
    • Organizer
      第12回暗号及び情報セキュリティと数学の相関ワークショップ (CRISMATH 2020)
    • Related Report
      2020 Research-status Report
    • Invited

URL: 

Published: 2020-04-28   Modified: 2025-01-30  

Information User Guide FAQ News Terms of Use Attribution of KAKENHI

Powered by NII kakenhi