Kazuo SAKIYAMA

Department of InformaticsProfessor
Cluster II (Emerging Multi-interdisciplinary Engineering)Professor

Degree

  • B. Eng., Osaka University, Mar. 1993
  • M. Eng., Osaka University, Mar. 1996
  • M. Sc., University of California at Los Angeles, Jun. 2003
  • Doctor in de Ingenieurswetenschappen, Katholieke Universiteit Leuven, Dec. 2007

Research Keyword

  • Cyber-Physical Systems
  • Cryptosystems
  • Information Security
  • サイバーフィジカルシステム
  • 暗号実装
  • 情報セキュリティ

Field Of Study

  • Manufacturing technology (mechanical, electrical/electronic, chemical engineering), Electronic devices and equipment
  • Informatics, High-performance computing
  • Informatics, Computer systems
  • Informatics, Information security
  • Informatics, Information theory

Career

  • Apr. 2016
    電気通信大学 大学院情報理工学研究科 情報学専攻, 教授
  • Apr. 2013 - Mar. 2015
    電気通信大学 大学院情報理工学研究科 総合情報学専攻, 教授
  • Apr. 2010 - Mar. 2013
    電気通信大学 大学院情報理工学研究科 総合情報学専攻, 准教授
  • Apr. 2008 - Mar. 2010
    University of Electro-Communications, Associate Professor
  • Jan. 2008 - Mar. 2008
    Katholieke Universiteit Leuven, Post-doctoral researcher
  • Jan. 2005 - Dec. 2007
    Katholieke Universiteit Leuven, Research Assistant
  • Apr. 1996 - Dec. 2004
    Hitachi, Ltd. (Renesas Technology)

Educational Background

  • Jan. 2005 - Dec. 2007
    KU Leuven, Department of Electrical Engineering (Ph. D.), Belgium
  • Sep. 2001 - Jun. 2003
    University of California, Los Angeles, Department of Electrical Engineering (M. Sc.), United States
  • Apr. 1994 - Mar. 1996
    Osaka University, Graduate School of Engineering Science, 物理系電気工学分野(博士前期課程), Japan
  • Apr. 1990 - Mar. 1994
    Osaka University, School of Engineering Science, 電気工学科
  • Apr. 1987 - Mar. 1990
    兵庫県立川西北陵高等学校, 普通科

Award

  • Dec. 2024
    電子情報通信学会総合大会
    MLP のハミング距離モデルに基づくサイドチャネル攻撃に対する加算マスキング対策の提案
    若手優秀賞, 天野龍乃如;崎山一男;宮原大輝;李陽
  • May 2024
    [招待講演]All You Need Is Fault: Zero-Value Attacks on AES and a New $\lambda$-Detection M&M (from TCHES 2024)
    ISEC研究会活動貢献感謝状, Haruka Hirata;Daiki Miyahara;Victor Arribas;Yang Li;Noriyuki Miura;Svetla Nikova;Kazuo Sakiyama
  • Dec. 2023
    Exploring Leakage Characteristics and Attacks through Profiles of Screaming Channels
    KIISC Best Paper Award, Yuki Matsukawa;Daiki Miyahara;Takeshi Sugawara;Kazuo Sakiyama;Yang Li
  • Dec. 2023
    WICS2023@CANDAR
    On the Practical Dependency of Fresh Randomness in AES S-box with Second-Order TI
    Best Paper Award, Maki Tsukahara;Haruka Hirata;Mingyu Yang;Daiki Miyahara;Yang Li;Yuko Hara-Azumi;Kazuo Sakiyama
  • Sep. 2023
    DICOMO2023
    天秤ベース秘密計算に対する計算モデルの構築
    優秀論文賞, 金子尚平;李陽;崎山一男;宮原大輝
  • Dec. 2021
    Asiahost 2021 Best Paper Award, Rei Kudo;Takeshi Sugawara;Kazuo Sakiyama;Yuko Hara-Azumi;Yang Li
  • Sep. 2021
    電子情報通信学会 基礎・境界ソサイエティ
    2021年暗号と情報セキュリティシンポジウム(SCIS2021)での実行委員長としての貢献
    電子情報通信学会 功労賞
    Japan society, Japan
  • Mar. 2020
    電子情報通信学会, 2019年度に開催された総合大会及びソサイエティ大会で発表された2976件の中から、特に優秀な48件の発表に対して送られたものです。
    星野翔,椎名瞭,松村竜我,崎山一男, "レーザー光を使った音情報の漏洩に対する安全性評価"
    電子情報通信学会学術奨励賞(指導学生:星野翔の受賞)
    International society
  • Mar. 2019
    藤聡子, 菅原健, 崎山一男, “分光スペクトルを用いたLEDの個体識別に向けた電流変化の影響”
    サイバーセキュリティシンポジウム道後2019学生研究賞(指導学生:藤聡子の受賞)
    Japan society
  • Mar. 2019
    電子情報通信学会, 2018年3月に開催された総合大会及び9月に開催されたソサイエティ大会で発表された3351件の中から、特に優秀な50件の発表に対して送られたものです。
    羽田野 凌太, 庄司 奈津, 李 陽, 菅原 健, 崎山 一男, "AES暗号への故障差分攻撃のモデル化と攻撃回数の評価"
    電子情報通信学会学術奨励賞(指導学生:羽田野凌太の受賞)
    International society
  • Dec. 2018
    古川和祈, 羽田野凌太
    CODE BLUE CTF2018感謝状(指導学生:羽田野凌太の受賞)
    International society
  • Sep. 2018
    IWSEC Best Poster Award, Erina Tatsumi;Kazuo Sakiyama;Takeshi Sugawara
    International society
  • Mar. 2018
    庄司奈津, 菅原健, 岩本貢, 崎山一男, “ブロック暗号へのプロービング攻撃における鍵復元効率の正確な評価モデル”
    サイバーセキュリティシンポジウム道後2018学生研究賞(指導学生:庄司奈津の受賞)
    Japan society
  • Jan. 2018
    XORモデルを用いたサイドチャネル認証(粕谷桃伽,石原遼,崎山一男)
    SCIS論文賞(指導学生:粕谷桃伽の受賞)
    Japan society
  • Sep. 2017
    IWSEC Best Poster Award, Natsu Shoji;Ryuga Matsumura;Takeshi Sugawara;Kazuo Sakiyama
    International society
  • Feb. 2017
    Risa Yashiro, Takanori Machida, Mitsugu Iwamoto, and Kazuo Sakiyama, “Deep-Learning-Based Security Evaluation on Authentication Systems Using Arbiter PUF and Its Variants”
    サイバーセキュリティシンポジウム道後2017学生研究賞(指導学生:八代理沙の受賞)
    Japan society
  • May 2016
    Kazuo Sakiyama, Momoka Kasuya, Takanori Machida, Arisa Matsubara, Yunfeng Kuai, Yu-Ichi Hayashi, Takaaki Mizuki, Noriyuki Miura, and Makoto Nagata, “Physical Authentication Using Side-Channel Information”
    ICoICT2016 Best Presenter Award
    International society
  • Oct. 2015
    DE0-nanoを用いたサイドチャネル認証 藤井達哉,粕谷桃伽,町田卓謙,崎山一男
    CSS2015 優秀デモンストレーション賞
    Japan society
  • Jan. 2012
    Self-Template Fault Sensitivity Analysis (李陽、太田和夫、﨑山一男)
    SCIS論文賞(指導学生:李陽の受賞)
    Japan society

Paper

  • Secure Voting Protocol Using Balance Scale
    Shohei Kaneko; Pascal Lafourcade; Lola-Baie Mallordy; Daiki Miyahara; Maxime Puys; Kazuo Sakiyama
    Foundations & Practice of Security, 15532, ?-?, May 2025, Peer-reviwed, with international co-author(s)
    International conference proceedings
  • Parimutuel Betting on Blockchain: A Case Study on Horse Racing
    Hiroki Uedan; Yang Li; Kazuo Sakiyama; Daiki Miyahara
    Proc. The 39th International Conference on Advanced Information Networking and Applications (AINA-2025), Apr. 2025, Peer-reviwed
    International conference proceedings
  • Key-Recovery Attack Against Ascon Using 1-Bit Random Fault Model
    Soki Nakamura; Daiki Miyahara; Yang Li; Kazuo Sakiyama
    Last, Proc. The 39th International Conference on Advanced Information Networking and Applications (AINA-2025), Apr. 2025, Peer-reviwed
    International conference proceedings
  • Practical Randomness Effects on Physical Security in Second-Order Threshold Implementation of AES
    Maki Tsukahara; Yusaku Harada; Haruka Hirata; Daiki Miyahara; Yang Li; Yuko Hara-Azumi; Kazuo Sakiyama
    Last, IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 108, 3, Mar. 2025, Peer-reviwed
    Scientific journal, English
  • Secure Voting Protocol Using Balance Scale,” In Proc. Foundations and Practice of Security (FPS’24)
    Shohei Kaneko; Pascal Lafourcade; Lola Mallordy; Daiki Miyahara; Maxime Puys; Kazuo Sakiyama
    Jan. 2025, Peer-reviwed
    International conference proceedings
  • Multiplicative Masked M&M: An Attempt at Combined Countermeasures with Reduced Randomness
    Kaiyuan Li; Haruka Hirata; Daiki Miyahara; Kazuo Sakiyama; Yuko Hara; Yang Li
    2024 IEEE 23rd International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom), IEEE, 726-733, 17 Dec. 2024, Peer-reviwed
    International conference proceedings
  • Yet Another Physical Leakage Assessment with the Wasserstein Distance
    Haruka Hirata; Yusaku Harada; Yuko Hara; Kazuo Sakiyama; Yang Li
    2024 Asian Hardware Oriented Security and Trust Symposium (AsianHOST), IEEE, 1-6, 16 Dec. 2024, Peer-reviwed
    International conference proceedings
  • PRNG-Oriented Side-Channel Security Evaluation for TI-AES
    Yusaku Harada; Maki Tsukahara; Daiki Miyahara; Yang Li; Yuko Hara; Kazuo Sakiyama
    Last, The 8th International Conference on Mobile Internet Security (Mobisec 2024), Dec. 2024
  • LoS Trick: Countermeasure against CPA for DNN Models Using Loss of Significance in Multiply-Accumulate Operations
    Ryunosuke Amano; Kazuo Sakiyama; Daiki Miyahara; Yang Li
    2024 Twelfth International Symposium on Computing and Networking Workshops (CANDARW), IEEE, 240-246, 26 Nov. 2024, Peer-reviwed
    International conference proceedings
  • Balance-Based ZKP Protocols for Pencil-and-Paper Puzzles
    Shohei Kaneko; Pascal Lafourcade; Lola-Baie Mallordy; Daiki Miyahara; Maxime Puys; Kazuo Sakiyama
    Lecture Notes in Computer Science, Springer Nature Switzerland, 211-231, 17 Oct. 2024, Peer-reviwed
    In book
  • A Case Study of Side-Channel Authentication Using Screaming Channel
    Mayu Nomura; Daiki Miyahara; Yang Li; Kazuo Sakiyama
    2024 IEEE 21th International Conference on Mobile Ad Hoc and Smart Systems (MASS), Sep. 2024, Peer-reviwed
    International conference proceedings
  • Poster: Ascon-based Secure Physical Authentication with Relay-Attack Resistance
    Runa Sako; Daiki Miyahara; Yang Li; Kazuo Sakiyama
    2024 IEEE 21th International Conference on Mobile Ad Hoc and Smart Systems (MASS), Sep. 2024, Peer-reviwed
    International conference proceedings
  • Double-Sided Multimodal Attack Sensing and Partial Re-Keying in Shared Group Key System
    Yuki Ikemoto; Soichiro Fujii; Kotaro Naruse; Jun Shiomi; Yoshihiro Midoh; Yuki Yamashita; Makoto Nagata; Yuichi Komano; Mitsugu Iwamoto; Kazuo Sakiyama; Noriyuki Miura
    ESSERC, Sep. 2024, Peer-reviwed
    International conference proceedings
  • Hardware/Software Cooperative Design Against Power Side-Channel Attacks on IoT Devices
    Mingyu Yang; Tanvir Ahmed; Saya Inagaki; Kazuo Sakiyama; Yang Li; Yuko Hara-Azumi
    IEEE Internet of Things Journal, 2024, Peer-reviwed
    Scientific journal
  • All You Need Is Fault: Zero-Value Attacks on AES and a New λ-Detection M&M
    Haruka Hirata; Daiki Miyahara; Victor Arribas; Yang Li; Noriyuki Miura; Svetla Nikova; Kazuo Sakiyama
    IACR Transactions on Cryptographic Hardware and Embedded Systems, Universitatsbibliothek der Ruhr-Universitat Bochum, 2024, 1, 133-156, 04 Dec. 2023, Peer-reviwed, Deploying cryptography on embedded systems requires security against physical attacks. At CHES 2019, M&M was proposed as a combined countermeasure applying masking against SCAs and information-theoretic MAC tags against FAs. In this paper, we show that one of the protected AES implementations in the M&M paper is vulnerable to a zero-value SIFA2-like attack. A practical attack is demonstrated on an ASIC board. We propose two versions of the attack: the first follows the SIFA approach to inject faults in the last round, while the second one is an extension of SIFA and FTA but applied to the first round with chosen plaintext. The two versions work at the byte level, but the latter version considerably improves the efficiency of the attack. Moreover, we show that this zero-value SIFA2 attack is specific to the AES tower-field decomposed S-box design. Hence, such attacks are applicable to any implementation featuring this AES S-box architecture.Then, we propose a countermeasure that prevents these attacks. We extend M&M with a fine-grained detection-based feature capable of detecting the zero-value glitch attacks. In this effort, we also solve the problem of a combined attack on the ciphertext output check of M&M scheme by using Kronecker’s delta function. We deploy the countermeasure on FPGA and verify its security against both fault and side-channel analysis with practical experiments.
    Scientific journal
  • Exploring Leakage Characteristics and Attacks through Profiles of Screaming Channels
    Yuki Matsukawa; Daiki Miyahara; Takeshi Sugawara; Kazuo Sakiyama; Yang Li
    The 7th International Conference on Mobile Internet Security (MobiSec 2023), 152-164, Dec. 2023, Peer-reviwed
    Scientific journal, English
  • Fundamental Study for Acquiring Side-Channel Information Using Rolling Shutter Effect
    Yuichiro Shimano; Daiki Miyahara; Kazuo Sakiyama
    Last, IEEJ Transactions on Electronics, Information and Systems, 01 Dec. 2023, Peer-reviwed
    Scientific journal
  • Automated Extraction for Vulnerability Management on PSIRT: A Case Study of Automotive Industry
    Momoka Kasuya; Nobuyoshi Morita; Hiroki Yamazaki; Kazuo Sakiyama
    Last, Proc. International Symposium on Computing and Networking, CANDAR Workshops (CANDARW’23), 232-238, Nov. 2023, Peer-reviwed
    International conference proceedings
  • Power Side-channel Attack Resistant Circuit Designs of ARX Ciphers Using High-level Synthesis
    Saya Inagaki; Mingyu Yang; Yang Li; Kazuo Sakiyama; Yuko Hara-Azumi
    ACM Transactions on Embedded Computing Systems, Association for Computing Machinery (ACM), 22, 5, 1-17, 26 Sep. 2023, Peer-reviwed, In the Internet of Things (IoT) era, edge devices have been considerably diversified and are often designed using high-level synthesis (HLS) for improved design productivity. However, HLS tools were originally developed in a security-unaware manner, resulting in vulnerabilities to power side-channel attacks (PSCAs), which are a serious threat to IoT systems. Currently, the impact and applicability of existing methods to PSCA-resistant designs using HLS are limited. In this article, we propose an effective HLS-based design method for PSCA-resistant ciphers implemented in hardware. In particular, we focus on lightweight block ciphers composed of addition/rotation/XOR (ARX)-based permutations to study the effects of the threshold implementation (which is one of the provably secure countermeasures against PSCAs) to the behavioral descriptions of ciphers along with the changes in HLS scheduling. The results obtained using Welch’s t-test demonstrate that our proposed method can successfully improve the resistance against PSCAs for all ARX-based ciphers used as benchmarks.
    Scientific journal
  • Towards Verifying Physical Assumption in Card-Based Cryptography
    Masahisa Shimano; Kazuo Sakiyama; Daiki Miyahara
    Innovative Security Solutions for Information Technology and Communications, Springer Nature Switzerland, 289-305, 12 May 2023, Peer-reviwed
    In book
  • Lightweight Authentication Using Noisy Key Derived from Physically Unclonable Function
    Yuichi Komano; Mitsugu Iwamoto; Kazuo Ohta; Kazuo Sakiyama
    Innovative Security Solutions for Information Technology and Communications, Springer Nature Switzerland, 203-221, 12 May 2023
    In book
  • Software Evaluation for Second Round Candidates in NIST Lightweight Cryptography
    Ryota Hira; Tomoaki Kitahara; Daiki Miyahara; Yuko Hara-Azumi; Yang Li; Kazuo Sakiyama
    Journal of Information Processing, Information Processing Society of Japan, 31, 205-219, 15 Mar. 2023, Peer-reviwed
    Scientific journal
  • Abstraction Model of Probing and DFA Attacks on Block Ciphers.
    Yuiko Matsubara; Daiki Miyahara; Yohei Watanabe 0001; Mitsugu Iwamoto; Kazuo Sakiyama
    IACR Cryptol. ePrint Arch., 2023, 443-443, Mar. 2023
    Scientific journal
  • Power Side-channel Countermeasures for ARX Ciphers using High-level Synthesis
    Saya Inagaki; Mingyu Yang; Yang Li; Kazuo Sakiyama; Yuko Hara-Azumi
    Proceedings of the 2023 ACM/SIGDA International Symposium on Field Programmable Gate Arrays, ACM, 12 Feb. 2023
    International conference proceedings
  • On the Practical Dependency of Fresh Randomness in AES S-box with Second-Order TI.
    Maki Tsukahara; Haruka Hirata; Mingyu Yang; Daiki Miyahara; Yang Li; Yuko Hara-Azumi; Kazuo Sakiyama
    CANDARW, 286-291, 2023
    International conference proceedings
  • Optimized Software Implementations of Ascon, Grain-128AEAD, and TinyJambu on ARM Cortex-M
    Tomoaki Kitahara; Ryota Hira; Yuko Hara-Azumi; Daiki Miyahara; Yang Li; Kazuo Sakiyama
    International Symposium on Computing and Networking, CANDAR Workshops (CANDARW’22), IEEE, 316-322, Nov. 2022, Peer-reviwed
    International conference proceedings, English
  • Software Evaluation for Second Round Candidates in NIST Lightweight Cryptography.
    Ryota Hira; Tomoaki Kitahara; Daiki Miyahara; Yuko Hara-Azumi; Yang Li 0001; Kazuo Sakiyama
    IACR Cryptology ePrint Archive, 2022, 591-591, 17 May 2022
    Scientific journal
  • The Limits of SEMA on Distinguishing Similar Activation Functions of Embedded Deep Neural Networks
    Go Takatoi; Takeshi Sugawara; Kazuo Sakiyama; Yuko Hara-Azumi; Yang Li
    Applied Sciences, MDPI AG, 12, 9, 4135-4135, 20 Apr. 2022, Artificial intelligence (AI) is progressing rapidly, and in this trend, edge AI has been researched intensively. However, much less work has been performed around the security of edge AI. Machine learning models are a mass of intellectual property, and an optimized network is very valuable. Trained machine learning models need to be black boxes as well because they may give away information about the training data to the outside world. As selecting the appropriate activation functions to enable fast training of accurate deep neural networks is an active area of research, it is important to conceal the information of the activation functions used in a neural network architecture as well. There has been research on the use of physical attacks such as the side-channel attack (SCA) in areas other than cryptography. The SCA is highly effective against edge artificial intelligence due to its property of the device computing close to the user. We studied a previously proposed method to retrieve the activation functions of a black box neural network implemented on an edge device by using simple electromagnetic analysis (SEMA) and improved the signal processing procedure for further noisy measurements. The SEMA attack identifies activation functions by directly observing distinctive electromagnetic (EM) traces that correspond to the operations in the activation function. This method requires few executions and inputs and also has little implementation dependency on the activation functions. We distinguished eight similar activation functions with EM measurements and examined the versatility and limits of this attack. In this work, the machine learning architecture is a multilayer perceptron, evaluated on an Arduino Uno.
    Scientific journal
  • The Limits of Timing Analysis and SEMA on Distinguishing Similar Activation Functions of Embedded Deep Neural Networks
    Go Takatoi; Takeshi Sugawara; Kazuo Sakiyama; Yuko Hara-Azumi; Yang Li
    Appl. Sci., 12, 4135, 1-20, 20 Apr. 2022, Peer-reviwed
    Scientific journal, English
  • Examining Vulnerability of HLS-designed Chaskey-12 Circuits to Power Side-Channel Attacks
    Saya Inagaki; Mingyu Yang; Yang Li; Kazuo Sakiyama; Yuko Hara-Azumi
    2022 23rd International Symposium on Quality Electronic Design (ISQED), IEEE, 06 Apr. 2022
    International conference proceedings
  • Mixture-Based 5-Round Physical Attack against AES: Attack Proposal and Noise Evaluation
    Go Takami; Takeshi Sugawara; Kazuo Sakiyama; Yang Li
    IEICE Trans. Fundam. Electron. Commun. Comput. Sci., E105-A, 3, 289-299, 01 Mar. 2022, Peer-reviwed
    Scientific journal, English
  • More Accurate and Robust PRNU-Based Source Camera Identification with 3-Step 3-Class Approach
    Annjhih Hsiao; Takao Takenouchi; Hiroaki Kikuchi; Kazuo Sakiyama; Noriyuki Miura
    Digital Forensics and Watermarking, Springer International Publishing, 87-101, 21 Jan. 2022, Peer-reviwed
    In book
  • Revisiting System Noise in Side-Channel Attacks: Mutual Assistant SCA vs. Genetic Algorithm
    Rei Kudo; Takeshi Sugawara; Kazuo Sakiyama; Yuko Hara-Azumi; Yang Li
    2021 Asian Hardware Oriented Security and Trust Symposium (AsianHOST), IEEE, 16 Dec. 2021
    International conference proceedings
  • Evaluation of Side-Channel Attack Resistance on LFI Detection Circuits
    羽田野凌太; 平田 遼; 松田航平; 三浦典之; 李陽; 崎山一男
    電子情報通信学会論文誌(A), J104-A, 5, 118-126, 01 May 2021, Peer-reviwed
    Scientific journal, Japanese
  • Design and concept proof of an inductive impulse self-destructor in sense-and-react countermeasure against physical attacks
    Sho Tada; Yuki Yamashita; Kohei Matsuda; Makoto Nagata; Kazuo Sakiyama; Noriyuki Miura
    Japanese Journal of Applied Physics, IOP Publishing, 60, SB, SBBL01-SBBL01, 10 Feb. 2021, Abstract

    This paper presents an inductive impulse self-destruction circuit utilized in a sense-and-react IC-level countermeasure against physical attacks on a cryptographic processor. Triggered upon an alarm signal assertion by an integrated attack sensor, the proposed circuit instantaneously generates >10 V high-voltage impulse to permanently destruct the cryptographic processor for enhancing tamper resiliency. A compact design with only a single on-chip inductor and a transistor significantly saves the hardware overhead. The inductor accumulates large electric energy in its magnetic field and the switch transistor suddenly opens the accumulated energy to boost the impulse voltage in an inertial manner. Since the inductor is drawn over the cryptographic core by existing on-chip IC interconnections, no extra area for the inductor and no any optional IC process steps are needed. This fully standard CMOS compatible, complete circuit solution, results in no fabrication cost penalty. A prototype implemented in both discrete components and a 0.18 μm standard CMOS process successfully demonstrated the-proof-of-concept.
    Scientific journal
  • A Key Recovery Algorithm Using Random Key Leakage from AES Key Schedule
    Tomoki Uemura; Yohei Watanabe; Yang Li; Noriyuki Miura; Iwamoto Mitsugu; Kazuo Sakiyama; Kazuo Ohta
    The International Symposium on Information Theory and Its Applications, (ISITA’20), IEEE, 382-386, Oct. 2020, Peer-reviwed
    International conference proceedings, English
  • An Optimized Implementation of AES-GCM for FPGA Acceleration Using High-Level Synthesis
    Tsubasa Takaki; Yang Li; Kazuo Sakiyama; Shoei Nashimoto; Daisuke Suzuki; Takeshi Sugawara
    Global Conference on Consumer Electronics (GCCE’20), 176-180, Oct. 2020, Peer-reviwed
    International conference proceedings, English
  • Low-Memory Implementation of Authenticated Encryption Algorithm SAEAES on ARM Cortex-M0 Microcontroller
    Marika Yabu; Kazuo Sakiyama; Takeshi Sugawara
    Global Conference on Consumer Electronics (GCCE’20), 181-185, Oct. 2020, Peer-reviwed
    International conference proceedings, English
  • Simple Electromagnetic Analysis Against Activation Functions of Deep Neural Networks
    Go Takatoi; Takeshi Sugawara; Kazuo Sakiyama; Yang Li
    Artificial Intelligence in Hardware Security (AIHWS’20), Springer-Verlag, LNCS, 12418, 181-197, Oct. 2020, Peer-reviwed
    International conference proceedings, English
  • Flush Code Eraser: Fast Attack Response Invalidating Cryptographic Sensitive Data
    Kazuo Sakiyama; Tatsuya Fujii; Kohei Matsuda; Noriyuki Miura
    IEEE Embedded Systems Letters, 12, 2, 37-40, Jun. 2020, Peer-reviwed
    Scientific journal, English
  • An IC-level countermeasure against laser fault injection attack by information leakage sensing based on laser-induced opto-electric bulk current density
    Kohei Matsuda; Sho Tada; Makoto Nagata; Yuichi Komano; Yang Li; Takeshi Sugawara; Mitsugu Iwamoto; Kazuo Ohta; Kazuo Sakiyama; Noriyuki Miura
    Japanese Journal of Applied Physics, IOP Publishing, 59, SG, SGGL02-SGGL02, 01 Apr. 2020, Peer-reviwed, Abstract

    Laser fault injection (LFI) attacks on cryptographic processor ICs are a critical threat to information systems. This paper proposes an IC-level integrated countermeasure employing an information leakage sensor against an LFI attack. Distributed bulk current sensors monitor abnormal bulk current density caused by laser irradiation for LFI. Time-interleaved sensor operation and sensitivity tuning can obtain partial secret key leakage bit information with small layout area penalty. Based on the leakage information, the secret key can be securely updated to realize high-availability resilient systems. The test chip was designed and fabricated in a 0.18 μm standard CMOS, integrating a 128-bit advanced encryption standard cryptographic processor with the proposed information leakage sensor. This evaluation successfully demonstrated bulk current density and leakage bit monitoring.
    Scientific journal
  • Deep Learning Attack against Large n-XOR PUFs on 180nm Silicon Chips
    Risa Yashiro; Yohei Hori; Toshihiro Katashita; Kazuo Sakiyama
    RISP International Workshop on Nonlinear Circuits, Communications and Signal Processing (NCSP’20), 598-601, Mar. 2020, Peer-reviwed
    International conference proceedings, English
  • Countermeasure Against Deep Learning-Based Cloning Attack on Arbiter PUF by Using Intentional Errors
    八代理紗; 堀洋平; 片下敏宏; 崎山一男
    情報処理学会論文誌, 1871-1880, 2020, Peer-reviwed
    Scientific journal, English
  • Validating the DFA Attack Resistance of AES (Short Paper)
    Hakuei Sugimoto; Ryota Hatano; Natsu Shoji; Kazuo Sakiyama
    International Symposium on Foundations & Practice of Security (FPS’19), IEEE, LNCS12056, 371-378, Nov. 2019, Peer-reviwed
    International conference proceedings, English
  • A Deep Learning Attack Countermeasure with Intentional Noise for a PUF-based Authentication Scheme
    Risa Yashiro; Yohei Hori; Toshihiro Katashita; Kazuo Sakiyama
    International Conference on Security for Information Technology and Communications (SecITC’19), IEEE, LNCS, 12001, 78-94, Nov. 2019, Peer-reviwed
    International conference proceedings, English
  • Side-Channel Leakage of Alarm Signal for a Bulk-Current-Based Laser Sensor
    Yang Li; Ryota Hatano; Sho Tada; Kohei Matsuda; Noriyuki Miura; Takeshi Sugawara; Kazuo Sakiyama
    International Conference on Information Security and Cryptology (Inscrypt’19), LNCS12020, 346-361, Nov. 2019, Peer-reviwed
    International conference proceedings, English
  • An Information Leakage Sensor Based on Measurement of Laser-Induced Opto-Electric Bulk Current Density
    Kohei Matsuda; Sho Tada; Makoto Nagata; Yang Li; Takeshi Sugawara; Mitsugu Iwamoto; Kazuo Ohta; Kazuo Sakiyama; Noriyuki Miura
    International Conference on Solid State Devices and Materials (SSDM’19), IEEE, 501-502, Sep. 2019, Peer-reviwed
    International conference proceedings, English
  • Side-channel leakage from sensor-based countermeasures against fault injection attack
    Takeshi Sugawara; Natsu Shoji; Kazuo Sakiyama; Kohei Matsuda; Noriyuki Miura; Makoto Nagata
    Microelectronics Journal, Elsevier BV, 90, 63-71, Aug. 2019, Peer-reviwed
    Scientific journal, English
  • An Abstraction Model for 1-bit Probing Attack on Block Ciphers
    Natsu Shoji; Takeshi Sugawara; Mitsugu Iwamoto; Kazuo Sakiyama
    International Conference on Computer and Communication Systems (ICCCS’19), IEEE, 502-506, Feb. 2019, Peer-reviwed
    International conference proceedings, English
  • Fingerprinting Light Emitting Diodes Using Spectrometer,
    Akiko Toh; Yang Li; Kazuo Sakiyama; Takeshi Sugawara
    IET Electronics Letters, Institution of Engineering and Technology (IET), 55, 24, 1295-1297, 2019, Peer-reviwed
    Scientific journal, English
  • Single-Round Pattern Matching Key Generation Using Physically Unclonable Function
    Yuichi Komano; Kazuo Ohta; Kazuo Sakiyama; Mitsugu Iwamoto; Ingrid Verbauwhede
    Security and Communication Networks, Vol.2019, Article ID 1719585, 13pages-13, Jan. 2019, Peer-reviwed
    Scientific journal, English
  • Probing Attack of Share-Serial Threshold Implementation of AES
    Takeshi Sugawara; Yang Li; Kazuo Sakiyama
    IET Electronics Letters, Institution of Engineering and Technology (IET), 55, 9, 517-519, 2019, Peer-reviwed
    Scientific journal, English
  • Oscillator without a Combinatorial Loop and its Threat to FPGA in Data Center
    Takeshi Sugawara; Kazuo Sakiyama; Shoei Nashimoto; Daisuke Suzuki; Tomoyuki Nagatsuka
    IET Electronics Letters, Institution of Engineering and Technology (IET), 55, 11, 640-642, 2019, Peer-reviwed
    Scientific journal, English
  • A 286 F2/Cell Distributed Bulk-Current Sensor and Secure Flush Code Eraser against Laser Fault Injection Attack on Cryptographic Processor
    Kohei Matsuda; Tatsuya Fujii; Natsu Shoji; Takeshi Sugawara; Kazuo Sakiyama; Yu-ichi Hayashi; Makoto Nagata; Noriyuki Miura
    IEEE Journal of Solid-State Circuits, IEEE, 53, 11, 3174-3182, Nov. 2018, Peer-reviwed
    Scientific journal, English
  • Comprehensive Evaluation on an ID-Based Side-Channel Authentication with FPGA-Based AES
    Yang Li; Momoka Kasuya; Kazuo Sakiyama
    Applied Sciences, 8, 10, -, Oct. 2018, Peer-reviwed
    Scientific journal, English
  • Recovering Memory Access Sequence with Differential Flush+Reload Attack
    Zhiwei Yuan; Yang Li; Kazuo Sakiyama; Takeshi Sugawara; Jian Wang
    International Conference on Information Security Practice and Experience (ISPEC’18), Springer-Verlag, 424-439, Sep. 2018, Peer-reviwed
    International conference proceedings, English
  • A Secure LiDAR with Side-channel Fingerprinting
    Ryuga Matsumura; Takeshi Sugawara; Kazuo Sakiyama
    International Symposium on Computing and Networking, CANDAR Workshops (CANDARW’18), IEEE, 479-482, Aug. 2018, Peer-reviwed
    International conference proceedings, English
  • Sensor CON-Fusion: Defeating Kalman Filter in Signal Injection Attack
    Shoei Nashimoto; Daisuke Suzuki; Takeshi Sugawara; Kazuo Sakiyama
    The 13th ACM ASIA Conference on Information, Computer and Communications Security (ACM ASIACCS 2018), 511-524, Jun. 2018, Peer-reviwed
    International conference proceedings, English
  • Sensor CON-Fusion
    Shoei Nashimoto; Daisuke Suzuki; Takeshi Sugawara; Kazuo Sakiyama
    Proceedings of the 2018 on Asia Conference on Computer and Communications Security, ACM, 29 May 2018
    International conference proceedings
  • A 286F2/cell distributed bulk-current sensor and secure flush code eraser against laser fault injection attack
    Kohei Matsuda; Tatsuya Fujii; Natsu Shoji; Takeshi Sugawara; Kazuo Sakiyama; Yu-Ichi Hayashi; Makoto Nagata; Noriyuki Miura
    Digest of Technical Papers - IEEE International Solid-State Circuits Conference, Institute of Electrical and Electronics Engineers Inc., 61, #21.5, 352-354, 08 Mar. 2018, Peer-reviwed
    International conference proceedings, English
  • Analysis of Mixed PUF-TRNG Circuit Based on SR-Latches in FD-SOI Technology
    Jean-Luc Danger; Risa Yashiro; Tarik Graba; Sylvain Guilley; Yves Mathieu; Noriyuki Miura; Abdelmalek Si-Merabet; Kazuo Sakiyama; Makoto Nagata
    Euromicro Conference on Digita System Design(DSD'18), IEEE, 508-515, 2018, Peer-reviwed
    International conference proceedings, English
  • Q-class authentication system for double arbiter PUF
    Risa Yashiro; Takeshi Sugawara; Mitsugu Iwamoto; Kazuo Sakiyama
    IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences, Institute of Electronics, Information and Communication, Engineers, IEICE, E101A, 1, 129-137, 01 Jan. 2018, Peer-reviwed
    International conference proceedings, English
  • Exploiting Bitfip Detector for Non-Invasive Probing and its Application to Ineffective Fault Analysis
    Takeshi Sugawara; Natsu Shoji; Kazuo Sakiyama; Kohei Matsuda; Noriyuki Miura; Makoto Nagata
    Workshop on Fault Diagnosis and Tolerance in Cryptography(FDTC'17), IEEE, IEEE, 49-56, Sep. 2017, Peer-reviwed
    International conference proceedings, English
  • Improved EM Side-Channel Authentication Using Profile-Based XOR Model
    Momoka Kasuya; Kazuo Sakiyama
    International Workshop on Information Security Applications(WISA'2017), LNCS 10763, Springer-Verlag, 173-183, Aug. 2017, Peer-reviwed
    International conference proceedings, English
  • Efficient Software Implementation of Modular Multiplication in Prime Fields on TI's DSP TMS320C6678
    Eito Miyamoto; Takeshi Sugawara; Kazuo Sakiyama
    International Workshop on Information Security Applications(WISA'2017), LNCS 10763, Springer-Verlag, 261-273, Aug. 2017, Peer-reviwed
    International conference proceedings, English
  • Protecting cryptographic integrated circuits with side-channel information
    Makoto Nagata; Daisuke Fujimoto; Noriyuki Miura; Naofumi Homma; Yu-ichi Hayashi; Kazuo Sakiyama
    IEICE ELECTRONICS EXPRESS, 14, 2, 20162005, Jan. 2017, Peer-reviwed
    Scientific journal, English
  • Protecting cryptographic integrated circuits with side-channel information
    Makoto Nagata; Daisuke Fujimoto; Noriyuki Miura; Naofumi Homma; Yu-ichi Hayashi; Kazuo Sakiyama
    IEICE ELECTRONICS EXPRESS, 14, 2, 1-13, Jan. 2017, Peer-reviwed
    Scientific journal, English
  • A Performance Evaluation of Cryptographic Algorithms on FPGA and ASIC on RFID Design Flow
    Shugo Mikami; Dai Watanabe; Kazuo Sakiyama
    2016 4TH INTERNATIONAL CONFERENCE ON INFORMATION AND COMMUNICATION TECHNOLOGY (ICOICT), 1-6, 2016, Peer-reviwed
    International conference proceedings, English
  • Physical Authentication Using Side-Channel Information
    Kazuo Sakiyama; Momoka Kasuya; Takanori Machida; Arisa Matsubara; Yunfeng Kuai; Yu-ichi Hayashi; Takaaki Mizuki; Noriyuki Miura; Makoto Nagata
    2016 4TH INTERNATIONAL CONFERENCE ON INFORMATION AND COMMUNICATION TECHNOLOGY (ICOICT), 1-6, 2016, Peer-reviwed
    International conference proceedings, English
  • Circuit-Level Information Leakage Prevention for Fault Detection
    Kazuo Sakiyama; Rcina Yagasaki; Takanori Machida; Tatsuya Fujii; Noriyuki Miura; Yu-ichi Hayashi
    2016 URSI ASIA-PACIFIC RADIO SCIENCE CONFERENCE (URSI AP-RASC), 1271-1274, 2016, Peer-reviwed
    International conference proceedings, English
  • New Metric for Side-Channel Information Leakage: Case Study on KM Radiation from AES Hardware
    Momoka Kasuya; Takanori Machida; Kazuo Sakiyama
    2016 URSI ASIA-PACIFIC RADIO SCIENCE CONFERENCE (URSI AP-RASC), 1288-1291, 2016, Peer-reviwed
    International conference proceedings, English
  • Deep-Learning-Based Security Evaluation on Authentication Systems Using Arbiter PUF and Its Variants
    Risa Yashiro; Takanori Machida; Mitsugu Iwamoto; Kazuo Sakiyama
    ADVANCES IN INFORMATION AND COMPUTER SECURITY, IWSEC 2016, 9836, Springer-Verlag, 267-285, 2016, Peer-reviwed
    International conference proceedings, English
  • On-Chip Substrate-Bounce Monitoring for Laser-Fault Countermeasure
    Kohei Matsuda; Noriyuki Miura; Makoto Nagata; Yu-ichi Hayashi; Tatsuya Fujii; Kazuo Sakiyama
    PROCEEDINGS OF THE 2016 IEEE ASIAN HARDWARE ORIENTED SECURITY AND TRUST SYMPOSIUM (ASIANHOST 2016), IEEE, 1-6, 2016, Peer-reviwed
    International conference proceedings, English
  • Advanced fault analysis techniques on AES
    Kazuo Sakiyama; Takanori Machida; Arisa Matsubara
    IEEE International Symposium on Electromagnetic Compatibility, Institute of Electrical and Electronics Engineers Inc., 2015-, 230-234, 10 Sep. 2015, Peer-reviwed
    International conference proceedings, English
  • A new method for enhancing variety and maintaining reliability of PUF responses and its evaluation on ASICs Journal of Cryptographic Engineering
    Dai Yamamoto; Kazuo Sakiyama; Mitsugu Iwamoto; Kazuo Ohta; Masahiko Takenaka; Kouichi Itoh; Naoya Torii
    J. Cryptographic Engineering, 5, 3, 187-199, Sep. 2015, Peer-reviwed
    Scientific journal, English
  • Implementation of Double Arbiter PUF and Its Performance Evaluation on FPGA
    Takanori Machida; Dai Yamamoto; Mitsugu Iwamoto; Kazuo Sakiyama
    2015 20TH ASIA AND SOUTH PACIFIC DESIGN AUTOMATION CONFERENCE (ASP-DAC), 6-9, 2015, Peer-reviwed
    International conference proceedings, English
  • Advanced Fault Analysis Techniques on AES
    Kazuo Sakiyama; Takanori Machida; Arisa Matsubara
    2015 IEEE INTERNATIONAL SYMPOSIUM ON ELECTROMAGNETIC COMPATIBILITY (EMC), 230-234, 2015, Peer-reviwed
    International conference proceedings, English
  • Artifact-Metric-Based Authentication for Bottles of Wine (Short Paper)
    Reina Yagasaki; Kazuo Sakiyama
    ADVANCES IN INFORMATION AND COMPUTER SECURITY (IWSEC 2015), 9241, Springer-Verlag, 335-344, 2015, Peer-reviwed
    International conference proceedings, English
  • A New Arbiter PUF for Enhancing Unpredictability on FPGA
    Takanori Machida; Dai Yamamoto; Mitsugu Iwamoto; Kazuo Sakiyama
    Scientific World Journal, Hindawi Publishing Corporation, 2015, Article ID 864812, 13 pages, 2015, Peer-reviwed
    Scientific journal, English
  • Fully integrated passive UHF RFID tag for hash-based mutual authentication protocol
    Shugo Mikami; Dai Watanabe; Yang Li; Kazuo Sakiyama
    Scientific World Journal, Hindawi Publishing Corporation, 2015, Article ID 498610, 11 pages, 2015, Peer-reviwed
    Scientific journal, English
  • Correlation power analysis using bit-level biased activity plaintexts against AES cores with countermeasures
    Daisuke Fujimoto; Noriyuki Miura; Makoto Nagata; Yuichi Hayashi; Naofumi Homma; Takafumi Aoki; Yohei Hori; Toshihiro Katashita; Kazuo Sakiyama; Thanh-Ha Le; Julien Bringer; Pirouz Bazargan-Sabet; Shivam Bhasin; Jean-Luc Danger
    IEEE International Symposium on Electromagnetic Compatibility, Institute of Electrical and Electronics Engineers Inc., 2014-, 306-309, 23 Dec. 2014
    International conference proceedings, English
  • New Side-Channel Analysis Using Clockwise Collision Leakage Model and Weak Keys on Parallelized AES Hardware
    Toshiki Nakasone; Yang Li; Kazuo Ohta; Kazuo Sakiyama
    電子情報通信学会論文誌(A), J97-A, 11, 695-703, Nov. 2014, Peer-reviwed
    Scientific journal, Japanese
  • Software and hardware co-verification for privacy-enhanced passive UHF RFID tag
    Yang Li; Toshiki Naksone; Kazuo Sakiyama
    IEEE International Symposium on Electromagnetic Compatibility, Institute of Electrical and Electronics Engineers Inc., 2014-, September, 752-757, 15 Sep. 2014, Peer-reviwed
    International conference proceedings, English
  • A Silicon-level Countermeasure against Fault Sensitivity Analysis and Its Evaluation
    Sho Endo; Yang Li; Naofumi Homma; Kazuo Sakiyama; Kazuo Ohta; Daisuke Fujimoto; Makoto Nagata; Toshihiro Katashita; Jean-Luc Danger; Takafumi Aoki
    IEEE Trans. Very Large Scale Integr. (VLSI) Syst., IEEE Trans., 23, 8, 1429-1438, Aug. 2014, Peer-reviwed
    Scientific journal, English
  • Practical improvements of side-channel attacks on AES: feedback from the 2nd DPA contest
    Christophe Clavier; Jean-Luc Danger; Guillaume Duc; M. Abdelaziz; Elaabid; Benoît Gérard; Sylvain Guilley; Annelie Heuser; Michael Kasper; Yang Li; Victor Lomné; Daisuke Nakatsu; Kazuo Ohta; Kazuo Sakiyama; Laurent Sauvage; Werner Schindler; Marc Stöttinger; Nicolas Veyrat-Charvillon; Matthieu Walle; Antoine Wurcker
    J. Cryptographic Engineering, 4, 1, 1-16, Apr. 2014, Peer-reviwed
    Scientific journal, English
  • Power Noise Measurements of Cryptographic VLSI Circuits Regarding Side-Channel Information Leakage
    Daisuke Fujimoto; Noriyuki Miura; Makoto Nagata; Yuichi Hayashi; Naofumi Homma; Takafumi Aoki; Yohei Hori; Toshihiro Katashita; Kazuo Sakiyama; Thanh-Ho Le; Julien Bringer; Pirouz Bazargan-Sabet; Shivam Bhasin; Jean-Luc Danger
    IEICE TRANSACTIONS ON ELECTRONICS, E97C, 4, 272-279, Apr. 2014, Peer-reviwed
    Scientific journal, English
  • Practical improvements of side-channel attacks on AES: feedback from the 2nd DPA contest
    Christophe Clavier; Jean-Luc Danger; Guillaume Duc; M. Abdelaziz Elaabid; Benoît Gérard; Sylvain Guilley; Annelie Heuser; Michael Kasper; Yang Li; Victor Lomné; Daisuke Nakatsu; Kazuo Ohta; Kazuo Sakiyama; Laurent Sauvage; Werner Schindler; Marc Stöttinger; Nicolas Veyrat-Charvillon; Matthieu Walle; Antoine Wurcker
    Journal of Cryptographic Engineering, Springer Verlag, 4, 4, 259-274, 2014, Peer-reviwed
    Scientific journal, English
  • Yet another fault-based leakage in non-uniform faulty ciphertexts
    Yang Li; Yu-Ichi Hayashi; Arisa Matsubara; Naofumi Homma; Takafumi Aoki; Kazuo Ohta; Kazuo Sakiyama
    Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), Springer Verlag, 8352, Springer-Verlag, 272-287, 2014, Peer-reviwed
    International conference proceedings, English
  • Privacy-Mode Switching: Toward Flexible Privacy Protection for RFID Tags in Internet of Things
    Yang Li; Toshiki Nakasone; Kazuo Ohta; Kazuo Sakiyama
    2014 IEEE 11TH CONSUMER COMMUNICATIONS AND NETWORKING CONFERENCE (CCNC), 941-942, 2014, Peer-reviwed
    International conference proceedings, English
  • Correlation Power Analysis using Bit-Level Biased Activity Plaintexts against AES Cores with Countermeasures
    Daisuke Fujimoto; Noriyuki Miura; Makoto Nagata; Yuichi Hayashi; Naofumi Homma; Takafumi Aoki; Yohei Hori; Toshihiro Katashita; Kazuo Sakiyama; Thanh-Ha Le; Julien Bringer; Pirouz Bazargan-Sabet; Shivam Bhasin; Jean-Luc Danger
    2014 INTERNATIONAL SYMPOSIUM ON ELECTROMAGNETIC COMPATIBILITY, TOKYO (EMC'14/TOKYO), 14P2-A3, 306-309, 2014, Peer-reviwed
    International conference proceedings, English
  • Software and Hardware Co-Verification for Privacy-Enhanced Passive UHF RFID Tag
    Yang Li; Toshiki Naksone; Kazuo Sakiyama
    2014 IEEE INTERNATIONAL SYMPOSIUM ON ELECTROMAGNETIC COMPATIBILITY (EMC), 752-757, 2014, Peer-reviwed
    International conference proceedings, English
  • A technique using PUFs for protecting circuit layout designs against reverse engineering
    Dai Yamamoto; Masahiko Takenaka; Kazuo Sakiyama; Naoya Torii
    Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), Springer Verlag, 8639, Springer-Verlag, 158-173, 2014, Peer-reviwed
    International conference proceedings, English
  • Security Evaluation of Bistable Ring PUFs on FPGAs using Differential and Linear Analysis
    Dai Yamamoto; Masahiko Takenaka; Kazuo Sakiyama; Naoya Torii
    FEDERATED CONFERENCE ON COMPUTER SCIENCE AND INFORMATION SYSTEMS, 2014, 2, 911-918, 2014, Peer-reviwed
    International conference proceedings, English
  • A New Mode of Operation for Arbiter PUF to Improve Uniqueness on FPGA
    Takanori Machida; Dai Yamamoto; Mitsugu Iwamoto; Kazuo Sakiyama
    FEDERATED CONFERENCE ON COMPUTER SCIENCE AND INFORMATION SYSTEMS, 2014, 2, 871-878, 2014, Peer-reviwed
    International conference proceedings, English
  • Single-Chip Implementation and Evaluation of Passive UHF RFID Tag with Hash-Based Mutual Authentication
    Yang Li; Shugo Mikami; Dai Watanabe; Kazuo Ohta; Kazuo Sakiyama
    Cryptology and Information Security Series, IOS Press, 12, 3-15, 2014, Peer-reviwed
    Scientific journal, English
  • Practical DFA strategy for AES under limited-access conditions
    Kazuo Sakiyama; Yang Li; Shigeto Gomisawa; Yu-Ichi Hayashi; Mitsugu Iwamoto; Naofumi Homma; Takafumi Aoki; Kazuo Ohta
    Journal of Information Processing, Information Processing Society of Japan, 22, 2, 142-151, 2014, Peer-reviwed
    Scientific journal, English
  • Variety enhancement of PUF responses using the locations of random outputting RS latches
    Dai Yamamoto; Kazuo Sakiyama; Mitsugu Iwamoto; Kazuo Ohta; Masahiko Takenaka; Kouichi Itoh
    Journal of Cryptographic Engineering, 3, 4, 197-211, Nov. 2013, Peer-reviwed
    Scientific journal, English
  • Exploration of the CC-EMA Attack Towards Efficient Evaluation of EM Information Leakage
    Toshiki Nakasone; Kazuo Sakiyama; Yang Li; Kazuo Ohta
    International Symposium on Electromagnetic Compatibility (EMC EUROPE) 2013, 411-414, Sep. 2013, Peer-reviwed
    International conference proceedings, English
  • On-chip power noise measurements of cryptographic VLSI circuits and interpretation for side-channel analysis
    Daisuke Fujimoto; Noriyuki Miura; Makoto Nagata; Yuichi Hayashi; Naofumi Homma; Yohei Hori; Toshihiro Katashita; Kazuo Sakiyama; Thanh-Ha Le; Julien Bringer; Pirouz Bazargan-Sabet; Jean-Luc Danger
    International Symposium on Electromagnetic Compatibility (EMC EUROPE) 2013, 405-410, Sep. 2013, Peer-reviwed
    International conference proceedings, English
  • Meet-in-the-Middle Preimage Attacks Revisited: New Results on MD5 and HAVAL
    Yu Sasaki; Wataru Komatsubara; Lei Wang; Mitsugu Iwamoto; Kazuo Ohta; Kazuo Sakiyama
    International Conference on Security and Cryptography (SECRYPT’13), SciTePress, SciTePress, 111-122, Jul. 2013, Peer-reviwed
    International conference proceedings, English
  • Key-dependent weakness of AES-based ciphers under clockwise collision distinguisher
    Toshiki Nakasone; Yang Li; Yu Sasaki; Mitsugu Iwamoto; Kazuo Ohta; Kazuo Sakiyama
    Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), 7839, Springer-Verlag, 395-409, 2013, Peer-reviwed
    International conference proceedings, English
  • An extension of fault sensitivity analysis based on clockwise collision
    Yang Li; Kazuo Ohta; Kazuo Sakiyama
    Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), 7763, Springer-Verlag, 46-59, 2013, Peer-reviwed
    International conference proceedings, English
  • Exploring the relations between fault sensitivity and power consumption
    Yang Li; Sho Endo; Nicolas Debande; Naofumi Homma; Takafumi Aoki; Thanh-Ha Le; Jean-Luc Danger; Kazuo Ohta; Kazuo Sakiyama
    Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), 7864, Springer-Verlag, 137-153, 2013, Peer-reviwed
    International conference proceedings, English
  • Coupon collector's problem for fault analysis against AES - High tolerance for noisy fault injections
    Yu Sasaki; Yang Li; Hikaru Sakamoto; Kazuo Sakiyama
    Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), 7859, Springer-Verlag, 213-220, 2013, Peer-reviwed
    International conference proceedings, English
  • A comparative study of stream ciphers and hash functions for RFID authentications
    Shugo Mikami; Dai Watanabe; Kazuo Sakiyama
    Cryptology and Information Security Series, 11, 83-94, 2013, Peer-reviwed
    Scientific journal, English
  • A New Type of Fault-Based Attack: Fault Behavior Analysis
    Yang Li; Kazuo Ohta; Kazuo Sakiyama
    IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES, E96A, 1, 177-184, Jan. 2013
    Scientific journal, English
  • Correlation power analysis and countermeasure on the stream cipher enocoro-128v2
    Shugo Mikami; Hirotaka Yoshida; Dai Watanabe; Kazuo Sakiyama
    IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences, Institute of Electronics, Information and Communication, Engineers, IEICE, E96-A, 3, 697-704, 2013, Peer-reviwed
    Scientific journal, English
  • Boomerang Distinguishers for Full HAS-160 Compression Function
    Yu Sasaki; Lei Wang; Yasuhiro Takasaki; Kazuo Sakiyama; Kazuo Ohta
    International Workshop on Security 2012 (IWSEC’12), LNCS 7631, Springer-Verlag, 170-181, Nov. 2012, Peer-reviwed
    International conference proceedings, English
  • Fault Sensitivity Analysis Using Multiple Factors
    Ayaka Koike; Yang Li; Daisuke Nakatsu; Kazuo Ohta; Kazuo Sakiyama
    電子情報通信学会論文誌(A), The Institute of Electronics, Information and Communication Engineers, 95, 10, 751-755, Oct. 2012, Peer-reviwed, 暗号実装の耐タンパー性を確保するためには,故障発生時の評価が不可欠である.数ある故障誘発要因の中で,特に本論文では暗号デバイスに供給するクロック信号と電流及びデバイス動作時の環境温度を複合的に利用した故障感度解析を提案する.
    Scientific journal, Japanese
  • Fair and Consistent Hardware Evaluation of Fourteen Round Two SHA-3 Candidates
    Miroslav Knezevic; Kazuyuki Kobayashi; Jun Ikegami; Shin'ichiro Matsuo; Akashi Satoh; Uenal Kocabas; Junfeng Fan; Toshihiro Katashita; Takeshi Sugawara; Kazuo Sakiyama; Ingrid Verbauwhede; Kazuo Ohta; Naofumi Homma; Takafumi Aoki
    IEEE TRANSACTIONS ON VERY LARGE SCALE INTEGRATION (VLSI) SYSTEMS, 20, 5, 827-840, May 2012, Peer-reviwed
    Scientific journal, English
  • New Fault-Based Side-Channel Attack Using Fault Sensitivity
    Yang Li; Kazuo Ohta; Kazuo Sakiyama
    IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 7, 1, 88-97, Feb. 2012, Peer-reviwed
    Scientific journal, English
  • Information-Theoretic Approach to Optimal Differential Fault Analysis
    Kazuo Sakiyama; Yang Li; Mitsugu Iwamoto; Kazuo Ohta
    IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 7, 1, 109-120, Feb. 2012, Peer-reviwed
    Scientific journal, English
  • Fault injection and key retrieval experiments on an evaluation board
    Junko Takahashi; Toshinori Fukunaga; Shigeto Gomisawa; Yang Li; Kazuo Sakiyama; Kazuo Ohta
    Information Security and Cryptography, Springer International Publishing, 17, 313-331, 2012, Peer-reviwed
    In book, English
  • Boomerang distinguishers for full HAS-160 compression function
    Yu Sasaki; Lei Wang; Yasuhiro Takasaki; Kazuo Sakiyama; Kazuo Ohta
    Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), 7631, 156-169, 2012, Peer-reviwed
    International conference proceedings, English
  • A study on computational formal verification for practical cryptographic protocol: The case of synchronous RFID authentication
    Yoshikazu Hanatanii; Miyako Ohkubo; Shin'Ichiro Matsuo; Kazuo Sakiyama; Kazuo Ohta
    Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), 7126, Springer-Verlag, 70-87, 2012, Peer-reviwed
    International conference proceedings, English
  • New truncated differential cryptanalysis on 3D block cipher
    Takuma Koyama; Lei Wang; Yu Sasaki; Kazuo Sakiyama; Kazuo Ohta
    Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), 7232, Springer-Verlag, 109-125, 2012, Peer-reviwed
    International conference proceedings, English
  • Three-subset meet-in-the-middle attack on reduced XTEA
    Yu Sasaki; Lei Wang; Yasuhide Sakai; Kazuo Sakiyama; Kazuo Ohta
    Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), 7374, Springer-Verlag, 138-154, 2012, Peer-reviwed
    International conference proceedings, English
  • Measurement of Side-Channel Information from Cryptographic Devices on Security Evaluation Platform: Demonstration of SPACES Project
    Sho Endo; Yu-ichi Hayashi; Naofumi Homma; Takafumi Aoki; Toshihiro Katashita; Yohei Hori; Kazuo Sakiyama; Makoto Nagata; Jean-Luc Danger; Thanh-Ha Le; Pirouz Bazargan Sabet
    2012 PROCEEDINGS OF SICE ANNUAL CONFERENCE (SICE), 313-316, 2012, Peer-reviwed
    International conference proceedings, English
  • An Efficient Countermeasure against Fault Sensitivity Analysis Using Configurable Delay Blocks
    Sho Endo; Yang Li; Naofumi Homma; Kazuo Sakiyama; Kazuo Ohta; Takafumi Aoki
    2012 WORKSHOP ON FAULT DIAGNOSIS AND TOLERANCE IN CRYPTOGRAPHY (FDTC), 95-102, 2012, Peer-reviwed
    International conference proceedings, English
  • Polynomial-advantage cryptanalysis of 3D cipher and 3D-based hash function
    Lei Wang; Yu Sasaki; Kazuo Sakiyama; Kazuo Ohta
    Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), 7631, Springer-Verlag, 170-181, 2012, Peer-reviwed
    International conference proceedings, English
  • Meet-in-the-Middle (Second) Preimage Attacks on Two Double-Branch Hash Functions RIPEMD and RIPEMD-128
    Lei Wang; Yu Sasaki; Wataru Komatsubara; Kazuo Sakiyama; Kazuo Ohta
    IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES, E95A, 1, 100-110, Jan. 2012, Peer-reviwed
    Scientific journal, English
  • Toward Effective Countermeasures against an Improved Fault Sensitivity Analysis
    Yang Li; Kazuo Ohta; Kazuo Sakiyama
    IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES, E95A, 1, 234-241, Jan. 2012, Peer-reviwed
    Scientific journal, English
  • Differential Fault Analysis on Stream Cipher MUGI
    Junko Takahashi; Toshinori Fukunaga; Kazuo Sakiyama
    IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES, E95A, 1, 242-251, Jan. 2012, Peer-reviwed
    Scientific journal, English
  • Intentional Electromagnetic Interference for Fault Analysis on AES Block Cipher IC
    Yu-ichi Hayashi; Shigeto Gomisawa; Yang Li; Naofumi Homma; Kazuo Sakiyama; Takafumi Aoki; Kazuo Ohta
    International Workshop on Electromagnetic Compatibility of Integrated Circuits (EMCCOMPO'11), 235-240, Nov. 2011, Peer-reviwed
    International conference proceedings, English
  • First Experimental Results of Correlation-Enhanced EMA Collision Attack
    Toshiki Nakasone; Daisuke Nakatsu; Yang Li; Kazuo Ohta; Kazuo Sakiyama
    Poster Session, CHES2011, LNCS 6917, Springer-Verlag, XXX, Sep. 2011, Peer-reviwed
    International conference proceedings, English
  • Tripartite modular multiplication
    Kazuo Sakiyama; Miroslav Knezevic; Junfeng Fan; Bart Preneel; Ingrid Verbauwhede
    INTEGRATION-THE VLSI JOURNAL, 44, 4, 259-269, Sep. 2011, Peer-reviwed
    Scientific journal, English
  • Preimage Attacks on 5-Pass HAVAL Reduced to 158-Steps and One-Block 3-Pass HAVAL
    Yasuhide Sakai; Yu Sasaki; Lei Wang; Kazuo Ohta; Kazuo Sakiyama
    Industrial Track Session, ACNS2011, 14 pages, Jun. 2011, Peer-reviwed
    International conference proceedings, English
  • Rebound attack on 3D block cipher
    Takuma Koyama; Yu Sasaki; Kazuo Sakiyama; Kazuo Ohta
    TriSAI 2011 - Proceedings of Triangle Symposium on Advanced ICT 2011, 220-224, 2011
    International conference proceedings, English
  • Combination of SW Countermeasure and CPU Modification on FPGA against Power Analysis
    Daisuke Nakatsu; Yang Li; Kazuo Sakiyama; Kazuo Ohta
    INFORMATION SECURITY APPLICATIONS, 6513, Springer-Verlag, 258-272, 2011, Peer-reviwed
    International conference proceedings, English
  • Fault Analysis on Stream Cipher MUGI
    Junko Takahashi; Toshinori Fukunaga; Kazuo Sakiyama
    INFORMATION SECURITY AND CRYPTOLOGY - ICISC 2010, 6829, Springer-Verlag, 420-+, 2011, Peer-reviwed
    International conference proceedings, English
  • (Second) Preimage Attacks on Step-Reduced RIPEMD/RIPEMD-128 with a New Local-Collision Approach
    Lei Wang; Yu Sasaki; Wataru Komatsubara; Kazuo Ohta; Kazuo Sakiyama
    TOPICS IN CRYPTOLOGY - CT-RSA 2011, 6558, Springer-Verlag, 197-+, 2011, Peer-reviwed
    International conference proceedings, English
  • Revisit fault sensitivity analysis on WDDL-AES
    Yang Li; Kazuo Ohta; Kazuo Sakiyama
    2011 IEEE International Symposium on Hardware-Oriented Security and Trust, HOST 2011, 148-153, 2011, Peer-reviwed
    International conference proceedings, English
  • Fault sensitivity analysis against elliptic curve cryptosystems
    Hikaru Sakamoto; Yang Li; Kazuo Ohta; Kazuo Sakiyama
    Proceedings - 2011 Workshop on Fault Diagnosis and Tolerance in Cryptography, FDTC 2011, 11-20, 2011, Peer-reviwed
    International conference proceedings, English
  • On the Power of Fault Sensitivity Analysis and Collision Side-Channel Attacks in a Combined Setting
    Amir Moradi; Oliver Mischke; Christof Paar; Yang Li; Kazuo Ohta; Kazuo Sakiyama
    CRYPTOGRAPHIC HARDWARE AND EMBEDDED SYSTEMS - CHES 2011, 6917, Springer-Verlag, 292-+, 2011, Peer-reviwed
    International conference proceedings, English
  • Uniqueness Enhancement of PUF Responses Based on the Locations of Random Outputting RS Latches
    Dai Yamamoto; Kazuo Sakiyama; Mitsugu Iwamoto; Kazuo Ohta; Takao Ochiai; Masahiko Takenaka; Kouichi Itoh
    CRYPTOGRAPHIC HARDWARE AND EMBEDDED SYSTEMS - CHES 2011, 6917, Springer-Verlag, 390-+, 2011, Peer-reviwed
    International conference proceedings, English
  • Experimental Verification of Super-Sbox Analysis - Confirmation of Detailed Attack Complexity
    Yu Sasaki; Naoyuki Takayanagi; Kazuo Sakiyama; Kazuo Ohta
    ADVANCES IN INFORMATION AND COMPUTER SECURITY, 7038, Springer-Verlag, 178-+, 2011, Peer-reviwed
    International conference proceedings, English
  • An Efficient Authentication for Lightweight Devices by Perfecting Zero-Knowledgeness
    Bagus Santoso; Kazuo Ohta; Kazuo Sakiyama; Goichiro Hanaoka
    IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES, E94A, 1, 92-103, Jan. 2011, Peer-reviwed
    Scientific journal, English
  • Power Analysis against a DPA-Resistant S-Box Implementation Based on the Fourier Transform
    Yang Li; Kazuo Sakiyama; Shinichi Kawamura; Kazuo Ohta
    IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES, E94A, 1, 191-199, Jan. 2011, Peer-reviwed
    Scientific journal, English
  • New Approach of Super-Sbox Analysis on AES-Based Permutations: Applications to ECHO and Grøstl
    Yu Sasaki; Li Yang; Lei Wang; Kazuo Sakiyama; Kazuo Ohta
    Advances in Cryptology -- ASIACRYPT'10, LNCS 6477, Springer-Verlag, 38-55, Dec. 2010, Peer-reviwed
    International conference proceedings, English
  • Cryptanalysis of Two MD5-Based Authentication Protocols: APOP and NMAC
    Lei Wang; Kazuo Ohta; Yu Sasaki; Kazuo Sakiyama; Noboru Kunihiro
    IEICE TRANSACTIONS ON INFORMATION AND SYSTEMS, E93D, 5, 1087-1095, May 2010, Peer-reviwed
    Scientific journal, English
  • Effective verification for known-key distinguisher by using extended differential path
    Naoyuki Takayanagi; Yang Li; Kazuo Sakiyama; Kazuo Ohta
    TriSAI 2010 - Proceedings of Triangle Symposium on Advanced ICT 2010, 284-287, 2010
    International conference proceedings, English
  • Another differential fault analysis on Trivium
    Qi Li; Kazuo Sakiyama; Lei Wang; Kazuo Ohta
    TriSAI 2010 - Proceedings of Triangle Symposium on Advanced ICT 2010, 247-252, 2010
    International conference proceedings, English
  • Robust RFID Authentication Protocol with Formal Proof and Its Feasibility.
    Miyako Ohkubo; Shin'ichiro Matsuo; Yoshikazu Hanatani; Kazuo Sakiyama; Kazuo Ohta
    IACR Cryptol. ePrint Arch., 2010, 345-345, 2010
    Scientific journal
  • Improving Efficiency of an 'On the Fly' Identification Scheme by Perfecting Zero-Knowledgeness
    Bagus Santoso; Kazuo Ohta; Kazuo Sakiyama; Goichiro Hanaoka
    TOPICS IN CRYPTOLOGY - CT-RSA 2010, PROCEEDINGS, 5985, Springer-Verlag, 284-+, 2010, Peer-reviwed
    International conference proceedings, English
  • Improved Countermeasure against Address-bit DPA for ECC Scalar Multiplication
    Masami Izumi; Jun Ikegami; Kazuo Sakiyama; Kazuo Ohta
    2010 DESIGN, AUTOMATION & TEST IN EUROPE (DATE 2010), 981-984, 2010, Peer-reviwed
    International conference proceedings, English
  • Power Variance Analysis Breaks a Masked ASIC Implementation of AES
    Yang Li; Kazuo Sakiyama; Lejla Batina; Daisuke Nakatsu; Kazuo Ohta
    2010 DESIGN, AUTOMATION & TEST IN EUROPE (DATE 2010), 1059-1064, 2010, Peer-reviwed
    International conference proceedings, English
  • Prototyping platform for performance evaluation of SHA-3 candidates
    Kazuyuki Kobayashi; Jun Ikegami; Miroslav Kneževíc; Eric Xu Guo; Shin'ichiro Matsuo; Sinan Huang; Leyla Nazhandali; Ünal Kocabaş; Junfeng Fan; Akashi Satoh; Ingrid Verbauwhede; Kazuo Sakiyama; Kazuo Ohta
    Proceedings of the 2010 IEEE International Symposium on Hardware-Oriented Security and Trust, HOST 2010, 60-63, 2010, Peer-reviwed
    International conference proceedings, English
  • Fault Sensitivity Analysis
    Yang Li; Kazuo Sakiyama; Shigeto Gomisawa; Toshinori Fukunaga; Junko Takahashi; Kazuo Ohta
    CRYPTOGRAPHIC HARDWARE AND EMBEDDED SYSTEMS - CHES 2010, 6225, Springer-Verlag, 320-+, 2010, Peer-reviwed
    International conference proceedings, English
  • Non-full-active Super-Sbox Analysis: Applications to ECHO and Grostl
    Yu Sasaki; Yang Li; Lei Wang; Kazuo Sakiyama; Kazuo Ohta
    ADVANCES IN CRYPTOLOGY - ASIACRYPT 2010, 6477, Springer-Verlag, 38-+, 2010, Peer-reviwed
    International conference proceedings, English
  • On Clock-Based Fault Analysis Attack for an AES Hardware Using RSL
    Kazuo Sakiyama; Kazuo Ohta
    IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES, E93A, 1, 172-179, Jan. 2010, Peer-reviwed
    Scientific journal, English
  • An extension of differential fault analysis attack of AES
    Shigeto Gomisawa; Masami Izumi; Kazuo Sakiyama; Kazuo Ota
    TriSAI 2009 - Proceedings of Triangle Symposium on Advanced ICT 2009, 185-188, 2009
    International conference proceedings, English
  • Cryptanalysis of Duc-Kim key exchange protocol proposed at TriSAI '08
    Tomotaka Hanawa; Kazuo Sakiyama; Kazuo Ohta
    TriSAI 2009 - Proceedings of Triangle Symposium on Advanced ICT 2009, 39-42, 2009
    International conference proceedings, English
  • Visual secret sharing schemes allowing arbitrary rotation angles of shares
    Yang Li; Mitsugu Iwamoto; Kazuo Ohta; Kazuo Sakiyama
    TriSAI 2009 - Proceedings of Triangle Symposium on Advanced ICT 2009, 33-38, 2009
    International conference proceedings, English
  • Comparison of masked S-boxes in hardware implementation
    Daisuke Nakatsu; Yang Li; Kazuo Sakiyama; Kazuo Ohta
    TriSAI 2009 - Proceedings of Triangle Symposium on Advanced ICT 2009, 176-181, 2009
    International conference proceedings, English
  • A New Approach for Implementing the MPL Method toward Higher SPA Resistance
    Masami Izumi; Kazuo Sakiyama; Kazuo Ohta
    2009 INTERNATIONAL CONFERENCE ON AVAILABILITY, RELIABILITY, AND SECURITY (ARES), VOLS 1 AND 2, 181-186, 2009, Peer-reviwed
    International conference proceedings, English
  • Fault Analysis Attack against an AES Prototype Chip Using RSL
    Kazuo Sakiyama; Tatsuya Yagi; Kazuo Ohta
    TOPICS IN CRYPTOLOGY - CT-RSA 2009, PROCEEDINGS, 5473, Springer-Verlag, 429-443, 2009, Peer-reviwed
    International conference proceedings, English
  • Bit-Free Collision: Application to APOP Attack
    Lei Wang; Yu Sasaki; Kazuo Sakiyama; Kazuo Ohta
    ADVANCES IN INFORMATION AND COMPUTER SECURITY, PROCEEDINGS, 5824, Springer-Verlag, 3-21, 2009, Peer-reviwed
    International conference proceedings, English
  • Security Evaluation of a DPA-Resistant S-Box Based on the Fourier Transform
    Yang Li; Kazuo Sakiyama; Shinichi Kawamura; Yuichi Komano; Kazuo Ohta
    INFORMATION AND COMMUNICATIONS SECURITY, PROCEEDINGS, 5927, Springer-Verlag, 3-+, 2009, Peer-reviwed
    International conference proceedings, English
  • Elliptic-curve-based security processor for RFID
    Yong Ki Lee; Kazuo Sakiyama; Lejla Batina; Ingrid Verbauwhede
    IEEE TRANSACTIONS ON COMPUTERS, 57, 11, 1514-1527, Nov. 2008, Peer-reviwed
    Scientific journal, English
  • Elliptic curve cryptography on embedded multicore systems
    Junfeng Fan; Kazuo Sakiyama; Ingrid Verbauwhede
    DESIGN AUTOMATION FOR EMBEDDED SYSTEMS, 12, 3, 231-242, Sep. 2008, Peer-reviwed
    Scientific journal, English
  • Does The Montgomery Powering Ladder Method Really Offer SPA Resistance?
    Masami Izumi; Kazuo Ohta; Kazuo Sakiyama
    TriSAI 2008, 328-333, 2008
    International conference proceedings, English
  • FPGA design for algebraic tori-based Public-Key Cryptography
    Junfeng Fan; Lejla Batina; Kazuo Sakiyama; Ingrid Verbauwhede
    2008 DESIGN, AUTOMATION AND TEST IN EUROPE, VOLS 1-3, 1134-1139, 2008, Peer-reviwed
    International conference proceedings, English
  • On the High-Throughput Implementation of RIPEMD-160 Hash Algorithm
    M. Knezevic; K. Sakiyama; Y. K. Lee; I. Verbauwhede
    2008 INTERNATIONAL CONFERENCE ON APPLICATION-SPECIFIC SYSTEMS, ARCHITECTURES AND PROCESSORS, 85-+, 2008, Peer-reviwed
    International conference proceedings, English
  • Modular reduction in GF(2(n)) without pre-computational phase
    M. Knezevic; K. Sakiyama; J. Fan; I. Verbauwhede
    ARITHMETIC OF FINITE FIELDS, PROCEEDINGS, 5130, Springer-Verlag, 77-87, 2008, Peer-reviwed
    International conference proceedings, English
  • HW/SW co-design for public-key cryptosystems on the 8051 micro-controller
    K. Sakiyama; L. Batina; B. Preneel; I. Verbauwhede
    COMPUTERS & ELECTRICAL ENGINEERING, 33, 5-6, 324-332, Sep. 2007, Peer-reviwed
    Scientific journal, English
  • Multicore curve-based cryptoprocessor with reconfigurable modular arithmetic logic units over GF (2(n))
    Kazuo Sakiyama; Lejla Batina; Bart Preneel; Ingrid Verbauwhede
    IEEE TRANSACTIONS ON COMPUTERS, 56, 9, 1269-1282, Sep. 2007, Peer-reviwed
    Scientific journal, English
  • High-performance public-key cryptoprocessor for wireless mobile applications
    Kazuo Sakiyama; Lejla Batina; Bart Preneel; Ingrid Verbauwhede
    MOBILE NETWORKS & APPLICATIONS, 12, 4, 245-258, Aug. 2007, Peer-reviwed
    Scientific journal, English
  • Reconfigurable modular arithmetic logic unit supporting high-performance RSA and ECC over GF(p)
    K. Sakiyama; N. Mentens; L. Batina; B. Preneel; I. Verbauwhede
    INTERNATIONAL JOURNAL OF ELECTRONICS, 94, 5, 501-514, May 2007, Peer-reviwed
    Scientific journal, English
  • Efficient Pipelining for Modular Multiplication Architectures in Prime Fields
    Nele Mentens; Kazuo Sakiyama; Bart Preneel; Ingrid Verbauwhede
    GLSVLSI'07: PROCEEDINGS OF THE 2007 ACM GREAT LAKES SYMPOSIUM ON VLSI, 534-539, 2007, Peer-reviwed
    International conference proceedings, English
  • Side-channel Resistant System-level Design Flow for Public-key Cryptography
    Kazuo Sakiyama; Elke De Mulder; Bart Preneel; Ingrid Verbauwhede
    GLSVLSI'07: PROCEEDINGS OF THE 2007 ACM GREAT LAKES SYMPOSIUM ON VLSI, 144-147, 2007, Peer-reviwed
    International conference proceedings, English
  • Public-key cryptography on the top of a needle
    Lejla Batina; Nele Mentens; Kazuo Sakiyarna; Bart Preneel; Ingrid Verbauwhede
    2007 IEEE INTERNATIONAL SYMPOSIUM ON CIRCUITS AND SYSTEMS, VOLS 1-11, 1831-1834, 2007, Peer-reviwed
    International conference proceedings, English
  • A side-channel attack resistant programmable PKC coprocessor for embedded applications
    Nele Mentens; Kazuo Sakiyama; Lejla Batina; Bart Preneel; Ingrid Verbauwhede
    IC-SAMOS: 2007 INTERNATIONAL CONFERENCE ON EMBEDDED COMPUTER SYSTEMS: ARCHITECTURES, MODELING AND SIMULATION, PROCEEDINGS, 194-+, 2007, Peer-reviwed
    International conference proceedings, English
  • Montgomery modular multiplication algorithm on multi-core systems
    Junfeng Fan; Kazuo Sakiyama; Ingrid Verbauwhede
    2007 IEEE WORKSHOP ON SIGNAL PROCESSING SYSTEMS, VOLS 1 AND 2, 261-266, 2007, Peer-reviwed
    International conference proceedings, English
  • HW/SW Co-design for Accelerating Public-key Cryptosystems over GF(p) on the 8051 μ-controller
    Kazuo Sakiyama; Lejla Batina; Bart Preneel; Ingrid Verbauwhede
    World Automation Congress (WAC'06), Special Session on Information Security and Hardware Implementations, 6 pages, Jul. 2006, Peer-reviwed
    International conference proceedings, English
  • Reconfigurable modular arithmetic logic unit for high-performance Public-Key cryptosystems
    K. Sakiyama; N. Mentens; L. Batina; B. Preneel; I. Verbauwhede
    RECONFIGURABLE COMPUTING: ARCHITECTURES AND APPLICATIONS, 3985, Springer-Verlag, 347-357, 2006, Peer-reviwed
    Scientific journal, English
  • Fast dual-field modular arithmetic logic unit and its hardware implementation
    Kazuo Sakiyama; Bart Preneel; Ingrid Verbauwhede
    2006 IEEE INTERNATIONAL SYMPOSIUM ON CIRCUITS AND SYSTEMS, VOLS 1-11, PROCEEDINGS, 787-+, 2006, Peer-reviwed
    International conference proceedings, English
  • A parallel processing hardware architecture for Elliptic Curve Cryptosystems
    Kazuo Sakiyama; Elke De Mulder; Bart Preneel; Ingrid Verbauwhede
    2006 IEEE INTERNATIONAL CONFERENCE ON ACOUSTICS, SPEECH AND SIGNAL PROCESSING, VOLS 1-13, 3355-3358, 2006, Peer-reviwed
    International conference proceedings, English
  • <bold>FPGA-ORIENTED SECURE DATA PATH DESIGN: IMPLEMENTATION OF A PUBLIC KEY COPROCESSOR</bold>
    Nele Mentens; Kazuo Sakiyama; Lejla Batina; Ingrid Verbauwhede; Bart Preneel
    2006 INTERNATIONAL CONFERENCE ON FIELD PROGRAMMABLE LOGIC AND APPLICATIONS, PROCEEDINGS, 133-138, 2006, Peer-reviwed
    International conference proceedings, English
  • Reconfigurable architectures for curve-based cryptography on embedded micro-controllers
    Leila Batina; Alireza Hodjat; David Hwang; Kazuo Sakiyama; Ingrid Verbauwhede
    2006 INTERNATIONAL CONFERENCE ON FIELD PROGRAMMABLE LOGIC AND APPLICATIONS, PROCEEDINGS, 667-670, 2006, Peer-reviwed
    International conference proceedings, English
  • Low-cost elliptic curve cryptography for wireless sensor networks
    Lejla Batina; Nele Mentens; Kazuo Sakiyama; Bart Preneel; Ingrid Verbauwhede
    SECURITY AND PRIVACY IN AD-HOC AND SENSOR NETWORKS, 4357, Springer-Verlag, 6-+, 2006, Peer-reviwed
    International conference proceedings, English
  • Superscalar coprocessor for high-speed curve-based cryptography
    K. Sakiyama; L. Batina; B. Preneel; I. Verbauwhede
    CRYPTOGRAPHIC HARDWARE AND EMBEDDED SYSTEMS - CHES 2006, PROCEEDINGS, 4249, Springer-Verlag, 415-429, 2006, Peer-reviwed
    Scientific journal, English
  • Efficient and secure fingerprint verification for embedded devices
    Shenglin Yang; Kazuo Sakiyama; Ingrid Verbauwhede
    EURASIP JOURNAL ON APPLIED SIGNAL PROCESSING, 2006, 1-11, 2006, Peer-reviwed
    Scientific journal, English
  • Embedded Software Integration for Coarse-grain Reconfigurable Systems
    Patrick Schaumont; Kazuo Sakiyama; Alireza Hodjat; Ingrid Verbauwhede
    IEEE 18th International Parallel and Distributed Processing Symposium (IPDPS'04), 137-142, Apr. 2004, Peer-reviwed
    International conference proceedings, English
  • Finding the best system design flow for a high-speed JPEG encoder
    K Sakiyama; PR Schaumont; IM Verbauwhede
    ASP-DAC 2003: PROCEEDINGS OF THE ASIA AND SOUTH PACIFIC DESIGN AUTOMATION CONFERENCE, 577-578, 2003, Peer-reviwed
    International conference proceedings, English
  • Teaching trade-offs in system-level design methodologies
    K Sakiyama; P Schaumont; D Hwang; Verbauwhede, I
    2003 IEEE INTERNATIONAL CONFERENCE ON MICROELECTRONIC SYSTEMS EDUCATION, PROCEEDINGS, 62-63, 2003, Peer-reviwed
    International conference proceedings, English
  • Design flow for HW/SW acceleration transparency in the thumbpod secure embedded system
    D Hwang; P Schaumont; Y Fan; A Hodjat; BC Lai; K Sakiyama; SL Yang; Verbauwhede, I
    40TH DESIGN AUTOMATION CONFERENCE, PROCEEDINGS 2003, 60-65, 2003, Peer-reviwed
    International conference proceedings, English
  • Testing ThumbPod: Softcore bugs are hard to find
    P Schaumont; K Sakiyama; Y Fan; D Hwang; S Yang; A Hodjat; B Lai; Verbauwhede, I
    EIGHTH IEEE INTERNATIONAL HIGH-LEVEL DESIGN VALIDATION AND TEST WORKSHOP, PROCEEDINGS, 77-82, 2003, Peer-reviwed
    International conference proceedings, English
  • A compact and efficient fingerprint verification system for secure embedded devices
    SL Yang; K Sakiyama; IM Verbauwhede
    CONFERENCE RECORD OF THE THIRTY-SEVENTH ASILOMAR CONFERENCE ON SIGNALS, SYSTEMS & COMPUTERS, VOLS 1 AND 2, 2058-2062, 2003, Peer-reviwed
    International conference proceedings, English
  • ZnF2:Gd thin film electroluminescent device
    YJ Cho; T Hirakawa; K Sakiyama; H Okamoto; Y Hamakawa
    APPLIED SURFACE SCIENCE, 113, 1997, 705-708, Apr. 1997, Peer-reviwed
    Scientific journal, English
  • ZnF2: Gd thin film electroluminescent device
    Young-Jae Cho; Takasi Hirakawa; Kazuo Sakiyama; Hiroaki Okamoto; Yoshihiro Hamakawa
    Applied Surface Science, Elsevier, 113-114, 705-708, 1997, Peer-reviwed
    Scientific journal, English
  • EL/PL hybrid device enhanced by UV emission from ZnF2:Gd thin film electroluminescence
    Young-Jae Cho; Takashi Hirakawa; Kazuo Sakiyama; Hiroaki Okamoto; Yoshihiro Hamakawa
    Journal of the Korean Physical Society, 30, 1997, S65-S68, Jan. 1997, Peer-reviwed
    Scientific journal, English
  • ZnF2:Gd UV Emitting Electroluminescent Device
    Young-Jae Cho; Takashi Hirakawa; Kazuo Sakiyama; Hiroaki Okamoto; Yoshihiro Hamakawa
    8th International Workshop on Electroluminescence; in "Inorganic and Organic Electroluminescence," eds. R. Mauch and H.-E. Gumlich (Wissenschaft und Technik Verlag, 347-350, Aug. 1996, Peer-reviwed
    International conference proceedings, English

MISC

  • 軽量暗号Asconの実装性能に関する調査及び評価
    崎山 一男
    Sep. 2023, CRYPTREC外部評価報告書, Japanese, Technical report
  • 軽量暗号の実装性能に関する調査及び評価(NIST軽量暗号コンペティションファイナリスト)
    崎山 一男
    Dec. 2022, CRYPTREC外部評価報告書, Technical report
  • 組込機器のセキュリティを脅かすレーザーフォールト攻撃
    菅原健; 崎山一男
    Jun. 2019, レーザー学会誌, 77, 6, 305-309, Japanese, Introduction other
  • レーザーフォールト攻撃対策である電源遮断回路実装時のサイドチャネル耐性評価
    郡 義弘; 藤本大介; 林 優一; 三浦典之; 永田 真; 崎山一男
    Mar. 2018, Summary national conference
  • A-7-13 Security Evaluation of Double Arbiter PUF Using Deep Learning
    Yashiro Risa; Machida Takanori; Iwamoto Mitsugu; Sakiyama Kazuo
    The Institute of Electronics, Information and Communication Engineers, 01 Mar. 2016, Proceedings of the IEICE Engineering Sciences Society/NOLTA Society Conference, 2016, 99-99, Japanese, 2189-700X, 110010023138, AA12732012
  • Faster Implementation Idea of Pairing Hardware with Parallel RNS Architecture
    Daisuke Fujimoto; Tadanori Teruya; Kazuo Sakiyama; Naofumi Homma; Makoto Ikeda; Makoto Nagata; Tsutomu Matsumoto
    Jan. 2016, 2016 Symposium on Cryptography and Information Security, 2016, 2C4-3, Japanese
  • Security of Block Ciphers: From Algorithm Design to Hardware Implementation
    Kazuo Sakiyama; Yu Sasaki; Yang Li
    John Wiley and Sons Ltd, 24 Jul. 2015, Security of Block Ciphers: From Algorithm Design to Hardware Implementation, 1-295, English, Others, 84949883783
  • Consideration on Side-Channel Information Toward Authentication
    MATSUBARA Arisa; LI Yang; HAYASHI Yu-ichi; SAKIYAMA Kazuo
    Recently, authentication using near field communication is widely spread for entrance and exit control and electronic money systems. However a threat of relay attack is often pointed out. Relay attack enables an attacker to camouflage the location by developing another communication channel instead of the legitimate one. In this paper, we propose an authentication method using side-channel information, and verify the usability of it based on fundamental experiments. When a cryptographic device is working, side-channel information is leaked as a power consumption and an electromagnetic wave, which is unique information depending on secret key. Utilizing such uniqueness for communication between prover and verifier, we aim at realizing an efficient distance bounding mechanism in the RFID-based authentication system., The Institute of Electronics, Information and Communication Engineers, 03 Jul. 2014, IEICE technical report. Social Implications of Technology and Information Ethics, 114, 116, 1-8, Japanese, 0913-5685, 110009945623, AA11651731
  • Consideration on Side-Channel Information Toward Authentication
    Arisa Matsubara; Yang LI; Yu-ichi Hayashi; Kazuo Sakiyama
    Recently, authentication using near field communication is widely spread for entrance and exit control and electronic money systems. However a threat of relay attack is often pointed out. Relay attack enables an attacker to camouflage the location by developing another communication channel instead of the legitimate one. In this paper, we propose an authentication method using side-channel information, and verify the usability of it based on fundamental experiments. When a cryptographic device is working, side-channel information is leaked as a power consumption and an electromagnetic wave, which is unique information depending on secret key. Utilizing such uniqueness for communication between prover and verifier, we aim at realizing an efficient distance bounding mechanism in the RFID-based authentication system., Information Processing Society of Japan (IPSJ), 26 Jun. 2014, IPSJ SIG Notes, 2014, 1, 1-8, Japanese, 0919-6072, 110009804637, AA11235941
  • Practical DFA Strategy for AES Under Limited-access Conditions
    Kazuo Sakiyama; Yang Li; Shigeto Gomisawa; Yu-ichiHayashi; Mitsugu Iwamoto; Naofumi Homma; Takafumi Aoki; Kazuo Ohta
    Secret data in embedded devices can be revealed by injecting computational faults using the fault analysis attacks. The fault analysis researches on a cryptographic implementation by far first assumed a certain fault model, and then discussed the key recovery method under some assumptions. We note that a new remote-fault injection method has emerged, which is threatening in practice. Due to its limited accessibility to cryptographic devices, the remote-fault injection, however, can only inject uncertain faults. In this surroundings, this paper gives a general strategy of the remote-fault attack on the AES block cipher with a data set of faulty ciphertexts generated by uncertain faults. Our method effectively utilizes all the information from various kinds of faults, which is more realistic than previous researches. As a result, we show that it can provide a decent success probability of key identification even when only a few intended faults are available among 32 millions fault injections.------------------------------This is a preprint of an article intended for publication Journal ofInformation Processing(JIP). This preprint should not be cited. Thisarticle should be cited as: Journal of Information Processing Vol.22(2014) No.2 (online)DOI http://dx.doi.org/10.2197/ipsjjip.22.142------------------------------Secret data in embedded devices can be revealed by injecting computational faults using the fault analysis attacks. The fault analysis researches on a cryptographic implementation by far first assumed a certain fault model, and then discussed the key recovery method under some assumptions. We note that a new remote-fault injection method has emerged, which is threatening in practice. Due to its limited accessibility to cryptographic devices, the remote-fault injection, however, can only inject uncertain faults. In this surroundings, this paper gives a general strategy of the remote-fault attack on the AES block cipher with a data set of faulty ciphertexts generated by uncertain faults. Our method effectively utilizes all the information from various kinds of faults, which is more realistic than previous researches. As a result, we show that it can provide a decent success probability of key identification even when only a few intended faults are available among 32 millions fault injections.------------------------------This is a preprint of an article intended for publication Journal ofInformation Processing(JIP). This preprint should not be cited. Thisarticle should be cited as: Journal of Information Processing Vol.22(2014) No.2 (online)DOI http://dx.doi.org/10.2197/ipsjjip.22.142------------------------------, 15 Feb. 2014, 情報処理学会論文誌, 55, 2, English, 1882-7764, 110009665014, AN00116647
  • ハッシュ関数SHA-224, SHA-512/224, SHA-512/256 及び SHA-3 (Keccak) に関する実装評価
    崎山 一男
    Feb. 2014, CRYPTREC外部評価報告書, Technical report
  • チップ内外での電源電圧取得によるサイドチャネル漏洩情報の一考察
    藤本 大介; 田中 大智; 三浦 典之; 永田 真; 林 優一; 本間 尚文; 青木 孝文; 堀 洋平; 片下 敏広; 﨑山 一男; Thanh-Ha Le; Julien Bringer; Pirouz Bazargan-Sabet; Shivam Bhasin; Jean-Luc Danger
    Jan. 2014, 暗号と情報セキュリティシンポジウム, 2A3-3
  • On Side-Channel Information Using Signal Toggles in AES Circuit
    MATSUBARA Arisa; KUAI Yunfeng; LI Yang; NAKASONE Toshiki; OHTA Kazuo; SAKIYAMA Kazuo
    Side-channel attack recovers secret information utilizing extraneous information that leaks from cryp-tographic devices. At COSADE 2013, it has been shown that power consumption and signal delay from two AES hardware implementations, AES-COMP and AES-PPRM1, have a high correlation. In the case of AES-PPRM1, this is because Hamming weight of input values of combinatorial circuit for S-box is considered to be a good model for both side-channel information. However, it is not clear the reason why power consumption and signal delay of AES-COMP has a high correlation. In this paper, we clarify the reason by reconsidering the behavior of signal toggles in the combinatorial circuit. As a result of simulation, we show that a high correlation between power consumption and signal delay stems from the number of signal toggles of output value for S-box circuits and clarify its mechanism., The Institute of Electronics, Information and Communication Engineers, 18 Jul. 2013, 電子情報通信学会技術研究報告 = IEICE technical report : 信学技報, 113, 138, 331-338, Japanese, 0913-5685, 110009773125, AA12526316
  • On Side-Channel Information Using Signal Toggles in AES Circuit
    松原 有沙; カイ 云峰; 李 陽; 中曽根 俊貴; 太田 和夫; 崎山 一男
    11 Jul. 2013, 研究報告セキュリティ心理学とトラスト(SPT), 2013, 49, 1-8, Japanese, 170000077675
  • On Side-Channel Information Using Signal Toggles in AES Circuit
    松原 有沙; カイ 云峰; 李 陽; 中曽根 俊貴; 太田 和夫; 崎山 一男
    サイドチャネル攻撃は,消費電力や電磁波などのデバイスから漏洩する副次的な情報を用いて秘密情報を復元する攻撃のことである.COSADE 2013 で,AES 暗号実装の一種である AES-COMP と AES-PPRM1 において,消費電力と故障感度の相関が高いことが示された.AES-PPRM1においては,S-box の組み合せ回路に対する入力値のハミング重みが,消費電力と信号遅延量の両方のサイドチャネル情報に対する良いモデルとなっていることが理由と考えられる.しかしながら,AES-COMPに関しては,消費電力と故障感度の相関が高い理由は明らかではない.そこで本稿では,組み合せ回路の信号遷移回数を再考し,消費電力と信号遅延量との相関を詳しく調査する.シミュレーションによる結果として,AES-COMPとAES-PPRM1の両方において,消費電力と信号遅延量の高相関が,S-box 回路の出力信号の遷移回数に起因することを示し,その理由を明らかとする.Side-channel attack recovers secret information utilizing extraneous information that leaks from cryp tographic devices. At COSADE 2013, it has been shown that power consumption and signal delay from two AES hardware implementations, AES-COMP and AES-PPRM1, have a high correlation. In the case of AES-PPRM1, this is because Hamming weight of input values of combinatorial circuit for S-box is considered to be a good model for both side-channel information. However, it is not clear the reason why power consumption and signal delay of AES-COMP has a high correlation. In this paper, we clarify the reason by reconsidering the behavior of signal toggles in the combinatorial circuit. As a result of simulation, we show that a high correlation between power consumption and signal delay stems from the number of signal toggles of output value for S-box circuits and clarify its mechanism., 11 Jul. 2013, 研究報告コンピュータセキュリティ(CSEC), 2013, 49, 1-8, Japanese, 170000077612, AA11235941
  • D-19-13 Toward Flexible Privacy Protection for RFID Tags Using Privacy-Mode Switching
    Li Yang; Sakamoto Hikaru; Nishikado Iwamasa; Saito Takafumi; Ohta Kazuo; Sakiyama Kazuo
    The Institute of Electronics, Information and Communication Engineers, 05 Mar. 2013, Proceedings of the IEICE General Conference, 2013, 2, 216-216, English, 110009711965, AN10471452
  • A-7-9 IMPROVED PATTERN MATCHING KEY GENERATION USING PUF
    Komano Yuichi; Ohta Kazuo; Sakiyama Kazuo; Iwamoto Mitsugu
    The Institute of Electronics, Information and Communication Engineers, 06 Mar. 2012, Proceedings of the IEICE General Conference, 2012, 177-177, Japanese, 110009460698, AN10471452
  • Break Masked AES Implementations Using Fault Sensitivity and Faulty Ciphertext Review of Presentation at CHES2011
    LI Yang; OHTA Kazuo; SAKIYAMA Kazuo
    At CHES 2010, a novel side-channel analysis called fault sensitivity analysis (FSA) has been proposed. The essence of the FSA attack is the exploration of the relationship between the fault injection intensity and the occurrence of the faulty calculation. The originally proposed FSA attack is based on the dependency between the intermediate value and the delay timing for the combinational circuit, and can successfully recover the secret key of 128-bit AES. After that, the FSA attack has been improved from the following two directions, which have been presented at CHES 2011. 1) The break of all the AES cores for SASEBO-R by applying the FSA attack proposed at CHES 2010. 2) The enhancement of the FSA attack by additionally analyzing of the faulty ciphertext that have not been used in the original FSA attack. In this paper, the result of breaking all the AES cores on the SASEBO-R will be explained at first, and then the enhanced FSA attack using faulty ciphertext will be reported in detail especially. In 2), for the AES implementation with masking-based side-channel countermeasures, we successfully find the dependency between the unmasked S-box input and the distribution of the values for a byte of the faulty ciphertext. Based on this factor, we demonstrate how to successfully recover the difference between the secret key bytes for the Masked-AND AES implementation and the AES-Threshold on SASEBO-R., The Institute of Electronics, Information and Communication Engineers, 07 Dec. 2011, Technical report of IEICE. ISEC, 111, 337, 25-25, Japanese, 110009466595, AN10060811
  • Uniqueness Enhancement of PUF Responses Based on the Locations of Random Outputting RS Latches
    YAMAMOTO Dai; SAKIYAMA Kazuo; IWAMOTO Mitsugu; OTA Kazuo; OCHIAI Takao; TAKENAKA Masahiko; ITOH Kouichi
    Physical Unclonable Functions (PUFs) are expected to represent an important solution for secure ID generation and authentication etc. In general, PUFs are considered to be more secure the larger their output entropy. However, the entropy of conventional PUFs is lower than the output bit length, because some output bits are random numbers, which are regarded as unnecessary for ID generation and discarded. We propose a novel PUF structure based on a Butterfly PUF with multiple RS latches, which generates larger entropy by utilizing location information of the RS latches generating random numbers. More specifically, while conventional PUFs generate binary values (0/1), the proposed PUF generates ternary values (0/1/random) in order to increase entropy. We estimate the entropy of the proposed PUF. According to our experiment with 40 FPGAs, a Butterfly PUF with 128 RS latches can improve entropy from 116 bits to 192.7 bits, this being maximized when the frequency of each ternary value is equal. We also show the appropriate RS latch structure for satisfying this condition, and validate it through an FPGA experiment., The Institute of Electronics, Information and Communication Engineers, 07 Dec. 2011, Technical report of IEICE. ISEC, 111, 337, 29-29, English, 110009466597, AN10060811
  • Fault Sensitivity Analysis Against Elliptic Curve Cryptosystems Using Clockwise Collisions
    SAKAMOTO Hikaru; LI Yang; OHTA Kazuo; SAKIYAMA Kazuo
    In this paper, we propose a new fault analysis attack technique using Clockwise Collision. Generally, for the combinational circuit in a synchronous design, if signal states of consecutive two cycles are same, the delay time of the second cycle is zero. Focusing on this fact, for the fault attack using setup time violation, we find out that it is difficult for an attacker to induce a fault in the operation in which Clockwise Collision occurs. As a case study, we apply this technique to Elliptic Curve Cryptography (ECC) implementation using Lopez-Dahab algorithm. Consequently, we succeeded in identifying the secret key. Our proposed attack technique is valid even if the Z coordinate of the input point is randomized. Therefore, we show that this technique is more powerful than the previous attack technique using Fault Sensitivity Analysis., The Institute of Electronics, Information and Communication Engineers, 14 Nov. 2011, IEICE technical report. Life intelligence and office information systems, 111, 286, 101-108, Japanese, 0913-5685, 110009465967, AA1240564X
  • New Differential Fault Analysis on Trivium Based on Setup-Time Violations
    LI Qi; GOMISAWA Shigeto; IWAMOTO Mitsugu; OHTA Kazuo; SAKIYAMA Kazuo
    This paper presents new differential fault analysis (DFA) on a stream cipher Trivium based on setup-time violations. Trivium is a hardware-oriented synchronous stream cipher, designed by De Canniere and Preneel in 2005. In 2008, Hojsik and Rudolf first presented differential fault analysis of Trivium and proposed two types of DFA on Trivium. Setup-time violations are common fault injection methods for hardware implementations. We show that we have succeeded in injecting faults into FPGA on SASEBO-GII in which Trivium is implemented, and in obtaining 147 out of 288 secret bits with 93 fault injections at different rounds. According to our experiments, we found it is difficult to inject 1-bit errors into random positions of the registers of Trivium at a specific round that was proposed in the previous work of Hojsik and Rudolf., The Institute of Electronics, Information and Communication Engineers, 24 Feb. 2011, IEICE technical report, 110, 444, 333-339, English, 0913-5685, 110008688483, AA11840009
  • New Differential Fault Analysis on Trivium Based on Setup-Time Violations
    LI Qi; GOMISAWA Shigeto; IWAMOTO Mitsugu; OHTA Kazuo; SAKIYAMA Kazuo
    This paper presents new differential fault analysis (DFA) on a stream cipher Trivium based on setup-time violations. Trivium is a hardware-oriented synchronous stream cipher, designed by De Canniere and Preneel in 2005. In 2008, Hojsik and Rudolf first presented differential fault analysis of Trivium and proposed two types of DFA on Trivium. Setup-time violations are common fault injection methods for hardware implementations. We show that we have succeeded in injecting faults into FPGA on SASEBO-GII in which Trivium is implemented, and in obtaining 147 out of 288 secret bits with 93 fault injections at different rounds. According to our experiments, we found it is difficult to inject 1-bit errors into random positions of the registers of Trivium at a specific round that was proposed in the previous work of Hojsik and Rudolf., The Institute of Electronics, Information and Communication Engineers, 24 Feb. 2011, IEICE technical report, 110, 443, 333-339, English, 0913-5685, 110008689715, AN10060811
  • A general construction method of visual secret sharing scheme with share rotations
    IWMAOTO Mitsugu; LI Yang; SAKIYAMA Kazuo; OHTA Kazuo
    In this paper, we discuss a visual secret sharing scheme with multiple secret images including share rotation operations with arbitrary degrees, as an extension of the S-extended (n,n) visual secret sharing scheme proposed by Droste. As a result, it is pointed out that the proposed visual secret sharing scheme can be naturally derived from the S-extended (n,n) visual secret sharing scheme., The Institute of Electronics, Information and Communication Engineers, 03 Sep. 2010, Technical report of IEICE. ISEC, 110, 200, 67-74, English, 0913-5685, 110008108065, AN10060811
  • CryptoVerifを用いたRFID向け相互認証プロトコルの安全性証明の検討
    花谷嘉一; 花谷嘉一; 大久保美也子; 松尾真一郎; 太田和夫; 崎山一男
    2010, 日本応用数理学会年会講演予稿集, 2010, 1345-3378, 201002280594575828
  • A Novel Construction Method for Visual Secret Sharing Schemes Allowing Rotation of Shares
    LI Yang; IWAMOTO Mitsugu; OHTA Kazuo; SAKIYAMA Kazuo
    In 2006, Iwamoto et al. introduced a visual secret sharing (VSS) schemes that allows rotation operation for shares in decryption. However, the proposed construction method is complicated and it only deals with 180-degree rotation. In this paper, based on the change of the expression of subpixels, the rotation angle for shares is extended into degrees besides 180-degree. Especially, a new VSS scheme, in which two shares can decrypt multiple secret images with appropriate rotation angles, is proposed in this paper. The proposed construction approach overcomes the shortcomings of the one proposed by Li et al.. It satisfies the information theoretical security and is simpler than preview works. Besides, it is also possible to extend the proposed schemes into n shares., The Institute of Electronics, Information and Communication Engineers, 15 May 2009, IEICE technical report, 109, 42, 29-36, English, 0913-5685, 110007161998, AN10060811
  • 暗号への脅威「サイドチャネル攻撃」とその対策
    﨑山 一男; 太田 和夫
    岩波書店, Oct. 2008, 「科学」報告・解説, 78, 10, ?-1083, Japanese, Introduction other, 0022-7625, 40016240456, AN00036810
  • 現代暗号を脅かす「サイドチャネル攻撃」とは
    Kazuo Sakiyama; Kazuo Ohta
    Oct. 2008, Science Journal KAGAKU, 78, 10, 1080-1083, Japanese, Introduction other

Books and other publications

  • Encyclopedia of Cryptography, Security and Privacy (S. Jajodia, P. Samarati, M. Yung editors)
    Kazuo Sakiyama; Yang Li
    Contributor, Fault Sensitivity Analysis, 1162, Springer, 12 Jul. 2024, 3030715205
  • 電子情報通信学会 知識ベース
    崎山一男
    Contributor, 1群(信号・システム)- 3編(暗号理論)-14章(サイドチャネル攻撃と耐タンパー技術), 電子情報通信学会, Jul. 2019
  • 暗号ハードウェアのセキュリティ
    﨑山, 一男; 菅原, 健; 李, 陽
    Japanese, Joint work, vii, 178p, コロナ社, Jun. 2019, 9784339028942
  • IoT時代の電磁波セキュリティ : 21世紀の社会インフラを電磁波攻撃から守るには(電気学会電気システムセキュリティ特別技術委員会;電気学会スマートグリッドにおける電磁的セキュリティ特別調査専門委員会 編)
    崎山一男; 林優一
    Japanese, Contributor, 付録 電磁的情報漏えい: B 暗号モジュールを搭載したハードウェアからの情報漏えいの可能性の検討, xv, 346p, 科学情報出版, Apr. 2018, 9784904774663
  • Security of block ciphers : from algorithm design to hardware implementation
    Sakiyama, Kazuo; Sasaki, Yu; Li, Yang
    English, Joint work, 320, John Wiley & Sons, 25 Apr. 2016, 9781118660010
  • Advances in Information and Computer Security: 8th International Workshop on Security, IWSEC 2013, Okinawa, Japan, November 18-20, 2013, Proceedings (K. Sakiyama, and M.Terada editors)
    English, Editor, 332, Springer, 09 Oct. 2013, 364241382X
  • ユニーク&エキサイティングサイエンス(梶谷 誠 監修)
    崎山 一男
    Japanese, Contributor, 第2章 暗号がつなぐ人と人工物とのコミュニケーション: 暗号とプライバシーとRFIDシステム, 3冊, 近代科学社, Apr. 2013, 9784764904422
  • Fault Analysis in Cryptography (Marc Joye and Michael Tunstall editors)
    Junko Takahashi; Toshinori Fukunaga; Shigeto Gomisawa; Yang Li; Kazuo Sakiyama; Kazuo Ohta
    English, Contributor, Fault Injection and Key Retrieval Experiments on Evaluation Board, 372, Springer, 22 Jun. 2012, 9783642296550
  • Secure integrated circuits and systems (Ingrid M.R. Verbauwhede editor)
    Lejla Batina; Kazuo Sakiyama
    English, Contributor, Compact Public-key Implementations for RFID and Sensor Nodes, x, 246 p., Springer, Feb. 2010, 9780387718279
  • Secure integrated circuits and systems (Verbauwhede, Ingrid M. R. editor)
    Kazuo Sakiyama; Lejla Batina
    English, Contributor, Arithmetic for Public-key Cryptography, x, 246 p., Springer, Feb. 2010, 9780387718279
  • Digital Systems and Applications (Oklobdzija, Vojin G. editor)
    Lejla Batina; Kazuo Sakiyama; Ingrid Verbauwhede
    English, Contributor, Architectures for Public-key Cryptography, 988, CRC Press, 26 Nov. 2007, 9780849386190

Lectures, oral presentations, etc.

  • Screaming ChannelsとElectromagnetic Radiationのメモリアクセスにおける情報漏洩の調査
    川名真弘; 崎山一男; 宮原大輝; 李陽
    2025年暗号と情報セキュリティシンポジウム (SCIS’25)
    Jan. 2025
  • グループ共有鍵システムにおける軽量部分鍵更新のためのマルチモーダル物理攻撃センサ
    池本龍生; 藤井聡一朗; 成瀬厚太郎; 塩見 準; 御堂義博; 山下憂記; 田口美里; 三木拓司; 永田 真; 駒野雄一; 岩本 貢; 﨑山一男; 三浦典之
    ハードウェアセキュリティ研究会 (HWS’24)
    Nov. 2024
  • Impacts of Pseudo-Random Number Generator on Side-channel Attack Resistance of TI-AES
    Yusaku Harada; Maki Tsukahara; Daiki Miyahara; Yang Li; Yuko Hara; Kazuo Sakiyama
    Poster Session, IWSEC2024
    Sep. 2024
  • グループ共有鍵システムにおける軽量部分鍵更新のためのマルチモーダル物理攻撃センサ
    池本龍生; 藤井聡一朗; 成瀬厚太郎; 塩見 準; 御堂義博; 山下憂記; 田口美里; 三木拓司; 永田 真; 駒野雄一; 岩本 貢; 﨑山一男; 三浦典之
    Oral presentation
    Sep. 2024
  • シャッフル1回の非コミット型ANDプロトコルに関する一考察
    飯野静流; 李陽; 崎山一男; 宮原大輝
    Oral presentation, IEICE2024年ソサイエティ大会
    Sep. 2024
  • Logic Lockingで保護された近似回路に対する効率的安全性解析について
    瀧野雄斗; 原田優咲; 宮原大輝; 李陽; 原祐子; 崎山一男
    Oral presentation, IEICE2024年ソサイエティ大会
    Sep. 2024
  • Logic LockingへのSAT攻撃における鍵サイズと攻撃時間の関係
    清水凜; 原田優咲; 宮原大輝; 李陽; 原祐子; 崎山一男
    Oral presentation, IEICE2024年ソサイエティ大会
    Sep. 2024
  • Keynote: Physical assumption in hardware security from side-channel countermeasure to logic locking
    Kazuo Sakiyama
    Keynote oral presentation, English, 2024 International Workshop on Intelligent Embedded Security for Internet of Things Systems
    23 Jul. 2024
  • 招待講演]All You Need Is Fault: Zero-Value Attacks on AES and a New $\lambda$-Detection M&M (from TCHES 2024)
    Haruka Hirata; Daiki Miyahara; Victor Arribas; Yang Li; Noriyuki Miura; Svetla Nikova; Kazuo Sakiyama
    Japanese, ISEC研究会, Invited
    15 May 2024
  • コンポーザブルセキュリティによる暗号回路の高位合成
    楊明宇; 比留間絃斗; 崎山一男; 李陽, 原祐子
    Oral presentation, ハードウェアセキュリティ研究会, VLD2023-138, HWS2023-98 (2024-03)
    Mar. 2024
  • MLP のハミング距離モデルに基づくサイドチャネル攻撃に対する 加算マスキング対策の提案
    天野龍乃如; 崎山一男; 宮原大輝; 李陽
    Oral presentation, IEICE 総合大会
    Mar. 2024
  • n枚ANDプロトコルの不可能性
    飯野静流; 李陽; 崎山一男; 宮原大輝
    2025年暗号と情報セキュリティシンポジウム (SCIS’25)
    Jan. 2024
  • 天秤ベースゼロ知識証明の推進
    金子尚平; 宮原大輝; 崎山一男
    2025年暗号と情報セキュリティシンポジウム (SCIS’25)
    Jan. 2024
  • “2ビットランダムフォールトを用いたAsconに対する鍵復元攻撃モデルの提案と検証
    中村早希; 宮原大輝; 李陽; 崎山一男
    Jan. 2024
  • LUT ベースのLogic Locking回路のSAT攻撃に対する簡易な安全性評価
    瀧野雄斗; 原田優咲; 宮原大輝; 李陽; 原祐子; 崎山一男
    2025年暗号と情報セキュリティシンポジウム (SCIS’25)
    Jan. 2024
  • ゼロ値攻撃対策による実装コストを低減する効率的なM&M-AESの設計
    平田遼; 宮原大輝; 原祐子; 崎山一男; 李陽
    Jan. 2024
  • スクリーミングチャネルから漏洩した情報を用いた物理認証システムの提案
    野村麻友; 迫琉奈; 松川侑生; 宮原大輝; 李陽; 崎山一男
    Oral presentation, 2024年暗号と情報セキュリティシンポジウム (SCIS’24)
    Jan. 2024
  • TI-AES に使用する擬似乱数生成器の物理安全性への影響
    原田優咲; 塚原麻輝; 宮原大輝; 李陽; 原祐子; 崎山一男
    Oral presentation, 2024年暗号と情報セキュリティシンポジウム (SCIS’24)
    Jan. 2024
  • Implementation of Multiplicative Masked AES S-Box for M&M Scheme
    Oral presentation, 2024年暗号と情報セキュリティシンポジウム (SCIS’24)
    Jan. 2024
  • 高シェア数状況下でのt検定による安全性評価の有効性について
    胡宇暘; 宮原大輝; 崎山一男; 李陽
    Oral presentation, Japanese, 2024年暗号と情報セキュリティシンポジウム (SCIS’24)
    Jan. 2024
  • 画面のスペクトル分布を用いた新たなQR コードの提案
    須長淳也; 嶋野裕一郎; 宮原大輝; 李陽; 崎山一男
    Oral presentation, 2024年暗号と情報セキュリティシンポジウム (SCIS’24)
    Jan. 2024
  • 故障感度情報を用いたt検定によるAESハードウェアの安全性評価
    古野亨紀; 佐藤泰雅; 平田遼; 宮原大輝; 李陽; 崎山一男
    Oral presentation, 2024年暗号と情報セキュリティシンポジウム (SCIS’24)
    Jan. 2024
  • トークンコントラクトを応用した競馬投票システムの検討
    上段浩輝; 李陽; 崎山一男; 宮原大輝
    Keynote oral presentation, 2024年暗号と情報セキュリティシンポジウム (SCIS’24)
    Jan. 2024
  • NFTを利用した競馬投票システムの一考察
    上段浩輝; 李陽; 崎山一男; 宮原大輝
    Oral presentation, IEICE2023年ソサイエティ大会
    Sep. 2023
  • ディスプレイが発するスペクトル分布を用いた認証方式の提案
    須長淳也; 宮原大輝; 李陽; 崎山一男
    Oral presentation, IEICE2023年ソサイエティ大会
    Sep. 2023
  • 乱数性に対するTI-AESの一様性に関する基礎評価
    原田優咲; 塚原麻輝; 宮原大輝; 李陽; 原祐子; 崎山一男
    Oral presentation, IEICE2023年ソサイエティ大会
    Sep. 2023
  • 軽量暗号Asconに対するスクリーミングチャネル解析実験
    迫琉奈; 粕谷桃伽; 松川侑生; 宮原大輝; 李陽; 崎山一男
    Oral presentation, IEICE2023年ソサイエティ大会
    Sep. 2023
  • スクリーミングチャネルを用いた認証システムの一考察
    野村麻友; 粕谷桃伽; 松川侑生; 宮原大輝; 李陽; 崎山一男
    Oral presentation, IEICE2023年ソサイエティ大会
    Sep. 2023
  • Towards Verifying Physical Assumption in Card-Based Cryptography (from SecITC 2022)
    嶌野雅久; 﨑山一男; 宮原大輝
    Oral presentation, 電子情報通信学会情報セキュリティ研究会
    17 May 2023
  • 天秤ベース秘密計算に対する計算モデルの構築
    金子尚平; 李陽; 崎山一男; 宮原大輝
    Oral presentation, マルチメディア、分散、協調とモバイル(DICOMO2023)シンポジウム
    Jan. 2023
  • Attention-Based Non-Profiled SCA on ASCAD Database
    Enhao Xu; Takeshi Sugawara; Kazuo Sakiyama; Yuko Hara-Azumi; Yang Li
    Oral presentation, 2023年暗号と情報セキュリティシンポジウム (SCIS’23)
    Jan. 2023
  • 電力サイドチャネル攻撃に対して堅牢なARX型暗号回路の高位合成
    稲垣沙耶; 楊明宇; 李陽; 崎山一男; 原祐子
    Oral presentation, 2023年暗号と情報セキュリティシンポジウム (SCIS’23)
    Jan. 2023
  • TI技術によりシェア化されたAES S-boxの故障感度解析手法
    佐藤泰雅; 古野亨紀; 平田遼; 宮原大輝; 李陽; 崎山一男
    Oral presentation, 2023年暗号と情報セキュリティシンポジウム (SCIS’23)
    Jan. 2023
  • 天秤とコインを使った秘密計算
    吉田深月; 金子尚平; 李陽; 崎山一男; 宮原大輝
    Oral presentation, 2023年暗号と情報セキュリティシンポジウム (SCIS’23)
    Jan. 2023
  • 相互補助相関電力解析の正解鍵順位と鍵復元率の調査
    西澤慧悟; 崎山一男; 原祐子, 李陽
    Oral presentation, 2023年暗号と情報セキュリティシンポジウム (SCIS’23)
    Jan. 2023
  • シミュレーションによるニューラルネットワークの乗算に対するサイドチャネル攻撃の考察
    天野龍乃如; 崎山一男; 原祐子, 李陽
    Oral presentation, 2023年暗号と情報セキュリティシンポジウム (SCIS’23)
    Jan. 2023
  • Screaming channelsの漏洩モデルの実験的検証
    松川侑生; 崎山一男; 菅原健, 李陽
    Oral presentation, 2023年暗号と情報セキュリティシンポジウム (SCIS’23)
    Jan. 2023
  • 軽量暗号の実装性能に関する調査及び評価(NIST軽量暗号コンペティションファイナリスト)
    崎山 一男
    CRYPTREC外部評価報告書
    Dec. 2022
    Dec. 2022 Dec. 2022
  • Entropy-Based Fault Analysis on M&M AES Block Cipher
    Haruka Hirata; Svetla Nikova; Li Yang; Kazuo Sakiyama
    Poster presentation, English, Smart Card Research and Advanced Application Conference (CARDIS2022), International conference
    Nov. 2022
  • ハイパースペクトルカメラを用いた指紋の付着時期推定
    工藤紗織; 嶌野雅久; 崎山一男; 宮原大輝
    Invited oral presentation, Japanese, IEICE2022年ソサイエティ大会, Domestic conference
    Sep. 2022
  • TI技術を用いたAES S-boxの故障感度の評価
    佐藤泰雅; 古野亨紀; 平田遼; 宮原大輝; 崎山一男
    Invited oral presentation, Japanese, IEICE2022年ソサイエティ大会, Domestic conference
    Sep. 2022
  • AES暗号に対する非プロファイリング深層学習攻撃の再現実験
    荻原実那; 李陽; 宮原大輝; 﨑山一男
    Invited oral presentation, Japanese, IEICE2022年ソサイエティ大会, Domestic conference
    Sep. 2022
  • サイドチャネル攻撃と偽コイン問題の関連性
    吉田深月; 宮原大輝; 崎山一男
    Invited oral presentation, Japanese, IEICE2022年ソサイエティ大会, Domestic conference
    Sep. 2022
  • 少命令セット組込みプロセッサにおけるARX型暗号アルゴリズムの実装と評価
    楊明宇; 卯木あゆ美; 李陽; 崎山一男; 原祐子
    Oral presentation, Japanese, 2022年暗号と情報セキュリティシンポジウム(SCIS2022), Domestic conference
    Jan. 2022
  • 電磁波サイドチャネルとスクリーミングチャネルの同時収集攻撃の検証
    松川侑生; 杉本悠馬; 菅原健; 崎山一男; 李陽
    Oral presentation, Japanese, 2022年暗号と情報セキュリティシンポジウム(SCIS2022), Domestic conference
    Jan. 2022
  • 確率モデルと実験による増分故障解析の安全性評価
    加藤光; 菅原健; 崎山一男; 李陽
    Oral presentation, Japanese, 2022年暗号と情報セキュリティシンポジウム(SCIS2022), Domestic conference
    Jan. 2022
  • RISC−VとSubRISC+におけるLED暗号のBitslice実装の評価
    渡辺陸; 楊明宇; 原祐子; 崎山一男; 李陽
    Oral presentation, Japanese, 2022年暗号と情報セキュリティシンポジウム(SCIS2022), Domestic conference
    Jan. 2022
  • プロービング攻撃による漏洩情報を用いたAES鍵復元アルゴリズムの改良
    植村友紀; 渡邉洋平; 李陽; 三浦典之; 岩本貢; 崎山一男; 太田和夫
    Oral presentation, Japanese, 2022年暗号と情報セキュリティシンポジウム(SCIS2022), Domestic conference
    Jan. 2022
  • M&Mにより対策されたAES暗号ハードウェアの乱数依存性について
    塚原麻輝; 平田遼; 宮原大輝; 李陽; 崎山一男
    Oral presentation, Japanese, 2022年暗号と情報セキュリティシンポジウム(SCIS2022), Domestic conference
    Jan. 2022
  • ハイパースペクトルカメラによるカードベース暗号の安全性評価に向けた基礎的検討
    嶌野雅久; 宮原大輝; 崎山一男
    Oral presentation, Japanese, 2022年暗号と情報セキュリティシンポジウム(SCIS2022), Domestic conference
    Jan. 2022
  • NIST軽量暗号最終候補におけるソフトウェア実装性能の評価
    北原知明; 日良僚太; 原祐子; 宮原大輝; 李陽; 崎山一男
    Oral presentation, Japanese, 2022年暗号と情報セキュリティシンポジウム(SCIS2022), Domestic conference
    Jan. 2022
  • パイプライン化されたAES S-boxへのフォールト攻撃に対する安全性評価
    平田遼; 宮原大輝; 李陽; 三浦典之; 崎山一男
    Oral presentation, Japanese, 2022年暗号と情報セキュリティシンポジウム(SCIS2022), Domestic conference
    Jan. 2022
  • サイドチャネル攻撃の並列実装におけるシステムノイズの評価
    工藤 黎; 菅原健; 崎山一男; 原祐子, 李陽
    Poster presentation, Japanese, ハードウェアセキュリティフォーラム2021, Domestic conference
    Dec. 2021
  • ローリングシャッター効果を用いた音声情報復元とその評価
    星野翔; 嶋野裕一郎; 崎山一男
    Oral presentation, Japanese, コンピュータセキュリティシンポジウム2021(CSS2021), Domestic conference
    Oct. 2021
  • ミクスチャ差分を用いた暗号解析のLED64への適用
    高見豪; 菅原健; 崎山一男; 李陽
    Invited oral presentation, Japanese, IEICE2021年ソサイエティ大会, Domestic conference
    Sep. 2021
  • M&Mにより対策されたAES暗号ハードウェアへの故障利用解析に向けた基礎実験
    古野亨紀; 平田遼; 李陽; 崎山一男
    Invited oral presentation, Japanese, IEICE2021年ソサイエティ大会, Domestic conference
    Sep. 2021
  • M&Mにより対策されたAES暗号ハードウェアに対するt検定
    塚原麻輝; 平田遼; 李陽; 崎山一男
    Invited oral presentation, Japanese, IEICE2021年ソサイエティ大会, Domestic conference
    Sep. 2021
  • NIST軽量暗号最終候補におけるAD長と平文長に対するレイテンシの測定
    北原知明; 日良僚太; 原祐子; 李陽; 崎山一男
    Invited oral presentation, Japanese, IEICE2021年ソサイエティ大会, Domestic conference
    Sep. 2021
  • ローリングシャッター方式のカメラを用いた音声情報の復元実験
    嶋野裕一郎; 星野翔; 崎山一男
    Invited oral presentation, Japanese, IEICE2021年ソサイエティ大会, Domestic conference
    Sep. 2021
  • 高位合成による軽量暗号ChaskeyのFPGA実装およびサイドチャネル攻撃耐性の評価
    稲垣 沙耶; 楊 明宇; 李 陽; 崎山 一男; 原 祐子
    Oral presentation, Japanese, ハードウェアセキュリティ研究会, Domestic conference
    Mar. 2021
  • [招待講演]Simple Electromagnetic Analysis Against Activation Functions of Deep Neural Networks (from AIHWS 2020)
    Go Takatoi; Takeshi Sugawara; Kazuo Sakiyama; Yuko Hara-Azumi; Yang Li
    Invited oral presentation, Japanese, ISEC2021-9, Domestic conference
    Mar. 2021
  • M&Mにより対策されたAES暗号ハードウェアに対するサイドチャネル攻撃
    平田遼; 羽田野凌太; 李陽; 三浦典之; 崎山一男
    Oral presentation, Japanese, 2021年暗号と情報セキュリティシンポジウム(SCIS2021), Domestic conference
    Jan. 2021
  • NIST軽量暗号第2ラウンド候補のソフトウェア実装に向けた調査
    日良僚太; 李陽; 原祐子; 崎山一男
    Oral presentation, Japanese, 2021年暗号と情報セキュリティシンポジウム(SCIS2021), Domestic conference
    Jan. 2021
  • 塗布剤による個人情報の秘匿性評価
    畑碧; 崎山一男
    Oral presentation, Japanese, 2021年暗号と情報セキュリティシンポジウム(SCIS2021), Domestic conference
    Jan. 2021
  • ローリングシャッター効果を用いたLEDデバイスの物理指紋抽出に関する基礎的実験
    星野翔; 崎山一男
    Oral presentation, Japanese, 2021年暗号と情報セキュリティシンポジウム(SCIS2021), Domestic conference
    Jan. 2021
  • Pushing the Limits of Simple Electromagnetic Analysis Against Similar Activation Functions
    Go Takatoi; Takeshi Sugawara; Kazuo Sakiyama; Yuko Hara-Azumi; Yang Li
    Oral presentation, Japanese, 2021年暗号と情報セキュリティシンポジウム(SCIS2021), Domestic conference
    Jan. 2021
  • サイドチャネル攻撃の並列実装におけるシステムノイズの評価: 遺伝的アルゴリズムとの比較
    工藤黎; 菅原健; 崎山一男; 原祐子, 李陽
    Oral presentation, Japanese, 2021年暗号と情報セキュリティシンポジウム(SCIS2021), Domestic conference
    Jan. 2021
  • FPGAを用いた秘匿アクセラレーションの実装評価(II)
    高木翼; 李陽; 崎山一男; 菅原健; 梨本翔永; 鈴木大輔
    Oral presentation, Japanese, 2021年暗号と情報セキュリティシンポジウム(SCIS2021), Domestic conference
    Jan. 2021
  • AES鍵スケジュールからの固定ビット数漏洩を用いた鍵復元アルゴリズムの性能評価
    植村友紀; 渡邉洋平; 李陽; 三浦典之; 岩本貢; 崎山一男; 太田和夫
    Oral presentation, Japanese, 2021年暗号と情報セキュリティシンポジウム(SCIS2021), Domestic conference
    Jan. 2021
  • NIST軽量暗号の第2ラウンド候補の軽量実装に向けた分類と比較
    日良僚太; 李陽; 原祐子; 崎山一男
    Oral presentation, Japanese, IEICE2020年ソサイエティ大会, Domestic conference
    Sep. 2020
  • M&Mにより対策されたAESハードウェアの安全性評価について
    平田遼; 羽田野凌太; 李陽; 三浦典之; Svetla Nikova
    Oral presentation, Japanese, IEICE2020年ソサイエティ大会, Domestic conference
    Sep. 2020
  • LEDの個体識別における温度変化の影響
    土屋彩夏; 藤聡子; 李陽; 崎山一男; 菅原健
    Oral presentation, Japanese, ICSS2019-72, Domestic conference
    Jul. 2020
  • 順序回路への故障注入に起因した不均一な頻度分布を持つ誤り出力を用いた故障利用解析
    岡本拓実; 藤本大介; 崎山一男; 李陽, 林優一
    Oral presentation, Japanese, HWS2019-101, Domestic conference
    May 2020
  • 気泡検出器を用いたゼロ知識非破壊検査
    品川和雅; 三浦典之; 岩本貢; 崎山一男; 太田和夫
    Oral presentation, Japanese, 2020年暗号と情報セキュリティシンポジウム(SCIS2020), Domestic conference
    Jan. 2020
  • 鍵のランダムな漏洩に対する AES 鍵スケジュール復元アルゴリズム
    植村友紀; 李陽; 三浦典之; 岩本貢; 崎山一男; 太田和夫
    Oral presentation, Japanese, 2020年暗号と情報セキュリティシンポジウム(SCIS2020), Domestic conference
    Jan. 2020
  • RG-DTM PUFに対するDeep Learningを用いたクローニング攻撃
    八代理紗; 堀洋平; 片下敏宏; 汐崎充; 崎山一男
    Oral presentation, Japanese, 2020年暗号と情報セキュリティシンポジウム(SCIS2020), Domestic conference
    Jan. 2020
  • 調光機能のある LEDの個体識別
    藤聡子; 土屋彩夏; 李陽; 崎山一男; 菅原健
    Oral presentation, Japanese, 2020年暗号と情報セキュリティシンポジウム(SCIS2020), Domestic conference
    Jan. 2020
  • FPGAを用いた秘匿アクセラレーションの実装評価
    高木翼; 李陽; 崎山一男; 菅原健; 梨本翔永; 鈴木大輔
    Oral presentation, Japanese, 2020年暗号と情報セキュリティシンポジウム(SCIS2020), Domestic conference
    Jan. 2020
  • ARM Cortex-M0におけるSAEAESの小型実装
    薮茉莉花; 崎山一男; 菅原健
    Oral presentation, Japanese, 2020年暗号と情報セキュリティシンポジウム(SCIS2020), Domestic conference
    Jan. 2020
  • 無線通信から収集した電磁波を用いたテンプレート攻撃研究
    杉本悠馬; 菅原健; 崎山一男; 李陽
    Oral presentation, Japanese, 2020年暗号と情報セキュリティシンポジウム(SCIS2020), Domestic conference
    Jan. 2020
  • AESへの5ラウンドの物理攻撃の可能性の考察
    高見豪; 菅原健; 崎山一男; 李陽
    Oral presentation, Japanese, 2020年暗号と情報セキュリティシンポジウム(SCIS2020), Domestic conference
    Jan. 2020
  • レーザー検知回路から漏洩するサイドチャネル情報の考察
    羽田野凌太; 平田遼; 松田航平; 三浦典之; 李陽; 崎山一男
    Oral presentation, Japanese, 2020年暗号と情報セキュリティシンポジウム(SCIS2020), Domestic conference
    Jan. 2020
  • AESに対する5ラウンド攻撃の物理攻撃への応用検討
    高見豪; 菅原健; 崎山一男; 李陽
    Oral presentation, Japanese, IEICE2019年ソサイエティ大会, Domestic conference
    Sep. 2019
  • 積分球による光量の均一化に基づくLEDの個体識別
    土屋彩夏; 藤聡子; 李陽; 崎山一男; 菅原健
    Oral presentation, Japanese, IEICE2019年ソサイエティ大会, Domestic conference
    Sep. 2019
  • ARM Cortex-M0 におけるAES暗号化処理の小型実装
    薮茉莉花; 崎山一男; 菅原健
    Oral presentation, Japanese, IEICE2019年ソサイエティ大会, Domestic conference
    Sep. 2019
  • レーザー光を使った音情報の漏洩に対する安全性評価
    星野翔; 椎名瞭; 松村竜我; 崎山一男
    Oral presentation, Japanese, IEICE2019年ソサイエティ大会, Domestic conference
    Sep. 2019
  • AES暗号への9ラウンド差分故障解析の攻撃耐性の評価
    杉本博英; 羽田野凌太; 庄司奈津; 崎山一男
    Oral presentation, Japanese, IEICE2019年ソサイエティ大会, Domestic conference
    Sep. 2019
  • LED光源を用いた光サイドチャネル認証装置
    椎名瞭; 菅原健; 松村竜我; 崎山一男
    Oral presentation, Japanese, IEICE2019年ソサイエティ大会, Domestic conference
    Sep. 2019
  • レーザーフォールト注入攻撃への対策が施されたAES暗号チップの脆弱性評価
    羽田野凌太; 李陽; 多田捷; 松田航平; 三浦典之; 菅原健; 崎山一男
    Oral presentation, Japanese, IEICE2019年ソサイエティ大会, Domestic conference
    Sep. 2019
  • Invited Talk: Deep Learning for Security Evaluation of Physically Unclocable Function
    Kazuo Sakiyama
    Invited oral presentation, English, International Conference on Advanced Computing and Applications (ACOMP 2018), International conference
    Jul. 2019
  • Anti-tamper cryptographic hardware with analog electronics
    Kazuo Sakiyama
    Public discourse, English, Mini Symposium: Crypto for long-term security and privacy
    22 Mar. 2019
  • Investigation of Information Leakage from A Laser Fault Injection Sensor
    Yang Li; Natsu Shoji; Takeshi Sugawara; Kazuo Sakiyama
    Oral presentation, English, IEICE2019年総合大会, Domestic conference
    Mar. 2019
  • A TEG Chip of Arbiter PUF for Efficient Simulation Model
    Risa Yashiro; Takeshi Sugawara; Mitsuru Shiozaki; Takeshi Fujino; Kazuo Sakiyama
    Oral presentation, English, In Conference Record of International Conference on Computer and Communication Systems (ICCCS’19), International conference
    Feb. 2019
  • 分光スペクトルを用いたLEDの個体識別における電流変化の影響
    藤聡子; 李陽; 崎山一男; 菅原健
    Oral presentation, Japanese, 2019年暗号と情報セキュリティシンポジウム(SCIS2019), Domestic conference
    Jan. 2019
  • ハイパースペクトルカメラを用いた液晶ディスプレイの個体差に関する基礎的研究
    堀越健太郎; 崎山一男
    Oral presentation, Japanese, 2019年暗号と情報セキュリティシンポジウム(SCIS2019), Domestic conference
    Jan. 2019
  • FPGA搭載サーバにおける秘匿アクセラレーション
    鈴木大輔; 梨本翔永; 永塚智之; 高木翼; 李陽; 崎山一男; 菅原健
    Oral presentation, Japanese, 2019年暗号と情報セキュリティシンポジウム(SCIS2019), Domestic conference
    Jan. 2019
  • SDAccel環境を用いたAES暗号CTRモードの高性能実装
    高木翼; 崎山一男; 菅原健; 梨本翔永; 鈴木大輔
    Oral presentation, Japanese, 2019年暗号と情報セキュリティシンポジウム(SCIS2019), Domestic conference
    Jan. 2019
  • Keynote: Towards Resilient IoT System – How to Evaluate Information Leakage
    Kazuo Sakiyama
    Invited oral presentation, English, The First International Workshop on Hardware Oriented Cybersecurity (HwSec2018), Invited, International conference
    19 Dec. 2018
  • Keynote: Hardware Security and IoT Ecosystem
    Kazuo Sakiyama
    Keynote oral presentation, English, International Conference on Advanced Computing and Applications (ACOMP 2018), International conference
    28 Nov. 2018
  • Hardware Implementations of ECC
    Kazuo Sakiyama
    Public discourse, English, Autumn school, 22nd Workshop on Elliptic Curve Cryptography
    17 Nov. 2018
  • 分光器を用いたLEDの個体識別に向けた基礎的研究
    藤聡子; 李陽; 﨑山一男; 菅原健
    Oral presentation, Japanese, IEICE2018ソサイエティ大会, Domestic conference
    Sep. 2018
  • 様々な実験条件におけるジャイロセンサのセンサなりすまし攻撃に関する基礎的検討
    西山優太; 李陽; 﨑山一男; 菅原健
    Oral presentation, Japanese, IEICE2018ソサイエティ大会, Domestic conference
    Sep. 2018
  • Arbiter PUFへのサイドチャネルモデリング攻撃の実装と応用
    八代理沙; 藤聡子; 菅原健; 﨑山一男
    Oral presentation, Japanese, IEICE2018ソサイエティ大会, Domestic conference
    Sep. 2018
  • AES暗号への故障差分攻撃のモデル化と攻撃回数の評価
    羽田野凌太; 庄司奈津; 李陽; 菅原健; 﨑山一男
    Oral presentation, Japanese, IEICE2018ソサイエティ大会, Domestic conference
    Sep. 2018
  • AESの指定したラウンド間差分の平文探索アルゴリズムの改良
    伊藤俊輔; 菅原健; 﨑山一男; 李陽
    Oral presentation, Japanese, IEICE2018ソサイエティ大会, Domestic conference
    Sep. 2018
  • Arbiter PUFに対する攻撃手法に関する一考察
    八代理沙; 菅原健; 﨑山一男
    Invited oral presentation, Japanese, 情報処理学会DAシンポジウム2018, Domestic conference
    Aug. 2018
  • レーザー故障注入攻撃対策を備えた暗号ICの設計手法
    松田航平; 藤井達哉; 庄司奈津; 菅原健; 﨑山一男; 林優一; 永田真; 三浦典之
    Invited oral presentation, Japanese, 情報処理学会DAシンポジウム2018, Domestic conference
    Aug. 2018
  • A Case Study of Row Hammer under Different Refresh Rates
    Erina Tatsumi; Kazuo Sakiyama; Takeshi Sugawara
    Poster presentation, English, IWSEC2018, International conference
    Aug. 2018
  • 基盤電流センサと電源瞬断回路を利用した小面積レーザーフォールト注入攻撃対策
    松田航平; 藤井達哉; 庄司奈津; 菅原健; 﨑山一男; 林優一; 永田真; 三浦典之
    Oral presentation, Japanese, ハードウェアセキュリティ研究会(HWS), Domestic conference
    Apr. 2018
  • レーザーフォールト攻撃対策である電源遮断回路実装時のサイドチャネル耐性評価
    郡義弘; 藤本大介; 林優一; 三浦典之; 永田真; 﨑山一男
    Oral presentation, Japanese, ハードウェアセキュリティ研究会(HWS), Domestic conference
    Mar. 2018
  • IC内部の回路構成変更が秘密鍵の習得性に与える影響の評価
    郡義弘; 藤本大介; 林優一; 﨑山一男; 三浦典之; 永田真
    Poster presentation, Japanese, IEICE2018総合大会, Domestic conference
    Mar. 2018
  • センサフュージョンの攻撃耐性に関するセキュリティ評価
    梨本翔永; 鈴木大輔; 菅原健; 﨑山一男
    Oral presentation, Japanese, 2018年暗号と情報セキュリティシンポジウム(SCIS2018), Domestic conference
    Jan. 2018
  • ブロック暗号へのプロービング攻撃における鍵復元効率の正確な評価モデル
    庄司奈津; 菅原健; 岩本貢; 﨑山一男
    Oral presentation, Japanese, 2018年暗号と情報セキュリティシンポジウム(SCIS2018), Domestic conference
    Jan. 2018
  • フォルト検出センサを悪用した非侵襲プロービング攻撃
    菅原健; 庄司奈津; 﨑山一男; 松田航平; 三浦典之; 永田真
    Oral presentation, Japanese, 2018年暗号と情報セキュリティシンポジウム(SCIS2018), Domestic conference
    Jan. 2018
  • パブリッククラウド上のFPGAにおける悪性ハードウェア
    菅原健; 﨑山一男; 梨本翔永; 永塚智之
    Oral presentation, Japanese, 2018年暗号と情報セキュリティシンポジウム(SCIS2018), Domestic conference
    Jan. 2018
  • デバイスドライバを用いたRow Hammerのテストツール
    辰巳恵里奈; 菅原健; 﨑山一男
    Oral presentation, Japanese, 2018年暗号と情報セキュリティシンポジウム(SCIS2018), Domestic conference
    Jan. 2018
  • 光に重畳したサイドチャネル情報に関する基礎的な解析
    松村竜我; 菅原健; 﨑山一男
    Oral presentation, Japanese, 2018年暗号と情報セキュリティシンポジウム(SCIS2018), Domestic conference
    Jan. 2018
  • C66xDSPにおけるペアリングの高速実装
    松原祐衣子; 宮元景冬; 菅原健; 﨑山一男
    Oral presentation, Japanese, 2018年暗号と情報セキュリティシンポジウム(SCIS2018), Domestic conference
    Jan. 2018
  • PUF応用に向けた新たな物理仮定と端末認証方式への応用
    駒野雄一; 岩本貢; 太田和夫; 﨑山一男
    Oral presentation, Japanese, 2018年暗号と情報セキュリティシンポジウム(SCIS2018), Domestic conference
    Jan. 2018
  • WHO WILL FAULT SENSORS BE HELPFUL FOR?
    Kazuo Sakiyama
    Public discourse, English, COSIC Seminar
    03 Nov. 2017
  • An Evaluation of Ineffective Fault Analysis on AES using Single-Bit Bit-Set/Reset Faults
    Natsu Shoji; Ryuga Matsumura; Takeshi Sugawara; Kazuo Sakiyama
    Poster presentation, English, IWSEC2017, International conference
    Aug. 2017
  • 光を用いたサイドチャネル認証
    松村竜我; 庄司奈津; 菅原健; 崎山一男
    Oral presentation, Japanese, コンピュータセキュリティシンポジウム2017(CSS2017)デモンストレーション(ポスター)セッション, Domestic conference
    Jan. 2017
  • Raw Hammerの見える化
    辰巳恵里奈; 菅原健; 崎山一男
    Oral presentation, Japanese, コンピュータセキュリティシンポジウム2017(CSS2017)デモンストレーション(ポスター)セッション, Domestic conference
    Jan. 2017
  • TI社DSP TMS320C6678における高速な剰余乗算アルゴリズムの実装評価
    宮元景冬; 﨑山一男
    Oral presentation, Japanese, 2016年暗号と情報セキュリティシンポジウム(SCIS2017), Domestic conference
    Jan. 2017
  • XORモデルを用いたサイドチャネル認証
    粕谷桃伽; 町田卓謙; 﨑山一男
    Oral presentation, Japanese, 2016年暗号と情報セキュリティシンポジウム(SCIS2017), Domestic conference
    Jan. 2017
  • 基板電流検知回路を用いたレーザーフォールト注入攻撃対策のオーバーヘッド推定
    松田航平; 三浦典之; 永田真; 林優一; 藤井達哉; 﨑山一男
    Oral presentation, Japanese, 電子情報通信学会総合大会, Domestic conference
    Jan. 2017
  • RowHammerに関する基礎実験
    辰巳恵里奈; 菅原健; 﨑山一男
    Oral presentation, Japanese, ハードウェアセキュリティ研究会(HWS), Domestic conference
    Jan. 2017
  • ダイオードレーザーを用いた光によるサイドチャネル認証
    松村竜我; 庄司奈津; 菅原健; 﨑山一男
    Oral presentation, Japanese, ハードウェアセキュリティ研究会(HWS), Domestic conference
    Jan. 2017
  • 誤り暗号文を使わないAESへの故障利用攻撃
    庄司奈津; 松村竜我; 菅原健; 﨑山一男
    Oral presentation, Japanese, ハードウェアセキュリティ研究会(HWS), Domestic conference
    Jan. 2017
  • DSPC6678における剰余乗算の高速実装評価
    宮元 景冬; 﨑山 一男
    Poster presentation, Japanese, ハードウェアセキュリティフォーラム2016, Domestic conference
    Dec. 2016
  • Q-class Authentication System Using DAPUF
    Risa Yashiro; Mitsugu Iwamoto; Kazuo Sakiyama
    Poster presentation, English, AsianHOST2016, International conference
    Dec. 2016
  • Authentication Using Physical
    Momoka Kasuya; Kauo Sakiyama
    Poster presentation, English, AsianHOST2016, International conference
    Dec. 2016
  • 認証の枠組みを用いたサイドチャネル攻撃に必要な波形数の導出
    粕谷 桃伽; 崎山一男
    Oral presentation, Japanese, IEICE2016年ソサエティ大会, Domestic conference
    Sep. 2016
  • Deep Learningを用いたRSAに対する単純電磁波解析
    八代理沙; 藤井達哉; 岩本貢; 崎山一男
    Oral presentation, Japanese, IEICE2016年ソサエティ大会, Domestic conference
    Sep. 2016
  • 基板電位変動モニタリングによるレーザーフォールト注入攻撃対策
    松田航平; 三浦典之; 永田真; 林優一; 藤井達哉; 崎山一男
    Poster presentation, Japanese, IEICE2016年ソサエティ大会, Domestic conference
    Sep. 2016
  • 基板電位変動モニタリングによるレーザーフォールト注入攻撃対策
    松田航平; 三浦典之; 永田 真; 林 優一; 藤井達哉; 矢ヶ崎玲奈; 崎山一男
    Oral presentation, Japanese, LSIとシステムのワークショップ2016, Domestic conference
    May 2016
  • サイドチャネル情報における固有性解析
    粕谷桃伽; 町田卓謙; 崎山一男
    Poster presentation, Japanese, IEICE2016年総合大会, Domestic conference
    Mar. 2016
  • Deep Learningを用いたDouble Arbiter PUFの安全性評価
    八代理沙; 町田卓謙; 岩本貢; 崎山一男
    Oral presentation, Japanese, IEICE2016年総合大会, Domestic conference
    Mar. 2016
  • サイドチャネル認証におけえる識別可能なデバイス数
    粕谷桃伽; 町田卓謙; 崎山一男
    Oral presentation, Japanese, 2016年暗号と情報セキュリティシンポジウム(SCIS2016)
    Jan. 2016
  • レーザーフォールド注入時のIC基板電位変動のオンチップ測定
    松田航平; 三浦典之; 永田真; 藤井達哉; 矢ヶ崎玲奈; 崎山一男
    Oral presentation, Japanese, 2016年暗号と情報セキュリティシンポジウム(SCIS2016)
    Jan. 2016
  • 並列化RNSアーキテクチャによる高速ペアリング実装に関する検討
    藤本大介; 照屋唯紀; 永田真; 本間尚文; 池田誠; 松本勉; 崎山一男
    Oral presentation, Japanese, 2016年暗号と情報セキュリティシンポジウム(SCIS2016)
    Jan. 2016
  • AES暗号化回路からの全ラウンド漏洩電磁波を用いたサイドチャネル認証
    粕谷桃伽; 藤井達哉; 町田卓謙; 崎山一男
    Public symposium, Japanese, Hot Channel Workshop 2015, Invited, Tohoku Univ., Tokyo Japan, Domestic conference
    09 Oct. 2015
  • レーザーフォルト注入時のIC基板電位変動のオンチップ測定
    松田 航平; 三浦 典之; 永田 真; 林 優一; 藤井 達哉; 崎山 一男
    Public symposium, Japanese, Hot Channel Workshop 2015, Invited, Touhoku Univ., Tokyo Japan, Domestic conference
    08 Oct. 2015
  • DE0-nanoを用いたサイドチャネル認証
    藤井達哉; 粕谷桃伽; 町田卓謙; 崎山一男
    Oral presentation, Japanese, コンピュータセキュリティシンポジウム2015 (CSS2015), 長崎市, Domestic conference
    Oct. 2015
  • 漏洩電磁波を用いたサイドチャネル認証の基礎実験
    粕谷桃伽; 町田卓謙; 崎山一男
    Oral presentation, Japanese, IEICE2015年ソサイエティ大会, IEICE, 仙台市, Domestic conference
    Sep. 2015
  • Hardware Implementations of ECC
    Kazuo Sakiyama
    Oral presentation, English, Summer school on real-world crypto and privacy, Invited, Šibenik Croatia, International conference
    04 Jun. 2015
  • 暗号ハードウェアからの情報漏洩
    崎山一男
    Others, Japanese, 日本学術振興会シリコン超集積化システム第165委員会, Invited, Kyoto,Japan, Domestic conference
    15 May 2015
  • ランダム故障混入時のAES暗号回路への故障利用攻撃
    松原有沙; 町田卓謙; 崎山一男
    Poster presentation, Japanese, IEICE2015年総合大会(学生ポスターセッション), Kusatsu-shi,Shiga, Domestic conference
    Mar. 2015
  • 物理特性の変更が可能なRO-PUF
    川述優; 崎山一男
    Poster presentation, Japanese, IEICE2015年総合大会(学生ポスターセッション), Kusatsushi,Shiga, Domestic conference
    Mar. 2015
  • Android端末に向けた新たな認証システム
    酒井芳章; 崎山一男
    Poster presentation, Japanese, IEICE2015年総合大会(学生ポスターセッション), Kusatsushi,Shiga, Domestic conference
    Mar. 2015
  • ワイン瓶の透過光を用いた人工物メトリクスに関する研究
    矢ヶ崎玲奈; 崎山一男
    Poster presentation, Japanese, IEICE2015年総合大会, Domestic conference
    Mar. 2015
  • Fault Analysis for Cryptosystems: Introduction to Differential Fault Analysis and Fault Sensitivity Analysis
    Kazuo Sakiyama
    Public discourse, English, Tutorial-4: Hardware Trust in VLSI Design and Implementations, Asia and South Pacific Design Automation Conference (ASP-DAC’15), Invited, International conference
    Jan. 2015
  • AESハードウェア実装の任意ラウンドにおける消費電力制御
    カイ 云峰; 李 陽; 町田 卓謙; 崎山 一男
    Oral presentation, Japanese, 2015年暗号と情報セキュリティシンポジウム (SCIS2015), Kokura Kitakyuushu-shi, Domestic conference
    Jan. 2015
  • サイドチャネル認証の為の漏洩モデルに関する一考察
    松原 有沙; 町田 卓謙; 林優一; 崎山 一男
    Oral presentation, Japanese, 2015年暗号と情報セキュリティシンポジウム(SCIS2015)
    Jan. 2015
  • Single-Chip Implementation and Evaluation of Passive UHF RFID Tag with Hash-Based Mutual Authentication
    李陽; 崎山一男
    Oral presentation, Japanese, Hot Channel Workshop 2014, Invited, Chofu(UEC), Domestic conference
    07 Oct. 2014
  • ガラスのムラを用いた人工物メトリクスの研究
    矢ヶ崎玲奈; 崎山一男
    Oral presentation, Japanese, Hot Channel Workshop 2014, Invited, Chofu(UEC), Domestic conference
    07 Oct. 2014
  • サイドチャネル情報を用いた認証の実現に向けて
    松原有沙; 町田卓謙; 崎山一男
    Oral presentation, Japanese, Hot Channel Workshop 2014, Chofu(UEC), Domestic conference
    06 Oct. 2014
  • バッファを用いた軽量擬似乱数生成器のグリッチ削減方法とハードウェア実装評価
    三上修吾; 渡辺大; 崎山一男
    Oral presentation, Japanese, コンピュータセキュリティシンポジウム 2014(CSS2014), IWSEC, Sapporo, Domestic conference
    Oct. 2014
  • サイドチャネル認証に向けた基礎的考察
    松原有沙; 李陽; 林優一; 崎山一男
    Oral presentation, Japanese, ISEC2014, ISEC, Hakodate, Japan, Domestic conference
    Jul. 2014
  • Toward Practical Solution to Unsuccessful Write Operation on Non-Volatile Memory of Passive RFID Tags
    Yang Li; Kazuo Sakiyama
    Poster presentation, English, ASIACCS2014, Kyoto,Japan, International conference
    Jun. 2014
  • RFIDシステムにおけるリレー攻撃対策
    李陽; 三上修吾; 渡辺大; 太田和夫; 崎山一男
    Oral presentation, Japanese, Hot Channel Workshop 2014, Invited, Sendai(Tohoku Univ.), Domestic conference
    23 Apr. 2014
  • Single-Chip Implementation and Evaluation of A Privacy-Enhanced RFID Tag
    李陽; 崎山一男
    Oral presentation, English, Hot Channel Workshop 2014, Invited, 仙台, Domestic conference
    22 Apr. 2014
  • バッファを用いた軽量擬似乱数生成器のグリッチ削減方法と実装評価
    三上修吾; 渡辺大; 崎山一男
    Oral presentation, Japanese, Hot Channel Workshop 2014, Invited, Sendai(Tohoku Univ.), Domestic conference
    22 Apr. 2014
  • FPGA実装されたArbiter-based PUFのユニーク性向上に向けた実装法の検討
    町田卓謙; 山本大; 岩本貢; 崎山一男
    Oral presentation, Japanese, Hot Channel Workshop 2014, Invited, 仙台, Domestic conference
    22 Apr. 2014
  • ICT国際PBL(4):ディジタル信号処理
    福井言葉; 船橋鴻志; 高橋謙三; 山尾泰; 小島年春; 崎山一男
    Oral presentation, Japanese, IEICE2014年総合大会, 新潟, Domestic conference
    Mar. 2014
  • ICT国際PBL (3):ハッシュ関数SHA-256の高速実装
    中曽根俊貴; 崎山一男
    Oral presentation, Japanese, IEICE2014年総合大会, 新潟, Domestic conference
    Mar. 2014
  • ICT国際PBL (2):無線ネットワークによるロボットカー制御プロジェクト
    大竹健太; 稲毛契; 戴競擇; 藤井威生; 山尾泰; 崎山一男
    Oral presentation, Japanese, IEICE2014年総合大会, 新潟, Domestic conference
    Mar. 2014
  • ICT国際PBL (1):国際性と実践力に優れた高度専門人材育成
    稲毛契; 藤井威生; 高橋謙三; 山尾泰; 崎山一男
    Oral presentation, Japanese, IEICE2014年総合大会, 新潟, Domestic conference
    Mar. 2014
  • バッファを用いた軽量擬似乱数生成器のハードウェア実装と評価
    三上修吾; 渡辺大; 崎山一男
    Oral presentation, Japanese, 2014年 暗号と情報セキュリティシンポジウム (SCIS2014), Domestic conference
    Jan. 2014
  • FPGA実装されたArbiter PUFのユニーク性向上に向けた一考察
    町田卓謙; 山本大; 岩本貢; 崎山一男
    Oral presentation, Japanese, 2014年 暗号と情報セキュリティシンポジウム (SCIS2014), Domestic conference
    Jan. 2014
  • チップ内外での電源電圧取得によるサイドチャネル漏洩情報の一考察
    藤本大介; 田中大智; 三浦典之; 永田真; 林優一; 本間尚文; 青木孝文; 堀洋平; 片下敏広; 崎山一男; Thanh-Ha Le; Julien Bringer; Pirouz Bazargan-Sabet; Shivam Bhasin; Jean-Luc Danger
    Oral presentation, Japanese, 2014年 暗号と情報セキュリティシンポジウム (SCIS2014), Domestic conference
    Jan. 2014
  • FPGA上のArbiter PUFに対する機械学習攻撃の新たなモデル作成に向けて
    町田卓謙; 中曽根俊貴; 岩本貢; 崎山一男
    Oral presentation, Japanese, Hot Channel Workshop 2013, 神戸, Domestic conference
    26 Nov. 2013
  • Introduction to IAIK Demotag and Related Experiments on It
    李陽; 崎山一男
    Oral presentation, English, Hot Channel Workshop 2013, Kobe,Japan, Domestic conference
    25 Nov. 2013
  • Toward Applications of SRAM Retention Time as Battery-Less Timer for RFID Tags
    Yang Li; Toshiki Nakasone; Kazuo Sakiyama
    Poster presentation, English, IWSEC2013 (Nov., 2013), Okinawa,Japan, International conference
    Nov. 2013
  • A New Model of Modeling Attacks against Arbiter PUF on FPGA
    Takanori Machida; Toshiki Nakasone; Mitsugu Iwamoto; Kazuo Sakiyama
    Poster presentation, English, IWSEC2013, Okinawa,Japan, International conference
    Nov. 2013
  • 暗号システムへの故障利用解析
    崎山一男
    Oral presentation, Japanese, 2013年電子情報通信学会ソサイエティ大会, 福岡, Domestic conference
    19 Sep. 2013
  • 暗号システムへの故障利用解析
    崎山一男
    Oral presentation, Japanese, 2013年電子情報通信学会ソサイエティ大会, 電子情報通信学会, 福岡, Domestic conference
    19 Sep. 2013
  • AES暗号回路における信号遷移回数を用いたサイドチャネル情報に関する考察
    松原有沙; 云峰, 李陽; 中曽根俊貴; 太田和夫; 崎山一男
    Oral presentation, Japanese, ISEC2013-45(研究会),電子情報通信学会
    Jul. 2013
  • Arbiter PUFのFPGA実装における評価手法と脆弱性
    町田卓謙; 中曽根俊貴; 崎山一男
    Oral presentation, Japanese, ISEC2013-18(研究会),電子情報通信学会
    Jul. 2013
  • Toward Practically Secure and Flexible RFID Tags
    李陽; 中曽根俊貴; 崎山一男
    Public symposium, English, Hot Channel Workshop 2013 (2013年4月12日), Hot Channel Workshop 2013, 東京
    Apr. 2013
  • NU-FVAに基づく新たな鍵復元攻撃について,”
    松原有沙; 李陽; 太田和夫; 崎山一男
    Public symposium, Japanese, Hot Channel Workshop 2013 (2013年4月11日), Hot Channel Workshop 2013, 東京
    Apr. 2013
  • OSKプロトコル向け軽量暗号アルゴリズムの実装評価
    三上修吾; 渡辺大; 崎山一男
    Public symposium, Japanese, Hot Channel Workshop 2013 (2013年4月11日), Hot Channel Workshop 2013, 東京
    Apr. 2013
  • PUFを用いる鍵生成方法とその安全性
    駒野雄一; 太田和夫; 崎山一男; 岩本貢
    Public symposium, Japanese, Hot Channel Workshop 2013, (2013年4月11日)., Hot Channel Workshop 2013, 東京
    Apr. 2013
  • 故障混入時のAES暗号ハードウェアの脆弱性について
    松原有沙; 李陽; 太田和夫; 崎山一男
    Oral presentation, Japanese, IEICE2013年総合大会(学生ポスターセッション)
    Mar. 2013
  • クーポンコレクタ問題を利用したノイズに強い飽和フォールト攻撃
    佐々木悠; 李陽; 阪本光; 崎山一男
    Oral presentation, Japanese, IEICE2013年総合大会
    Mar. 2013
  • システム上にあるSRAMの電荷保持時間とPUF特性を利用したDoS攻撃対策
    中曽根俊貴; 李陽; 崎山一男
    Oral presentation, Japanese, IEICE2013年総合大会
    Mar. 2013
  • Toward Flexible Privacy Protection for RFID Tags Using Privacy-Mode Switching
    Yang Li; Hikaru Sakamoto; Iwamasa Nishikado; Takafumi Saito; Kazuo Ohta; Kazuo Sakiyama
    Oral presentation, English, IEICE2013年総合大会
    Mar. 2013
  • Two Topics in Cryptographic Hardware: Coupon DFA and Secure RFID
    Yang Li; Kazuo Sakiyama
    Public symposium, Japanese, Compview暗号理論ワークショップ2013, Compview暗号理論ワークショップ2013, 東京
    Feb. 2013
  • Mechanism Analysis for Non-Uniform Mapping of Faulty S-box –Case Study of AES-COMP–
    松原有沙; 李陽; 太田和夫; 崎山一男
    Oral presentation, Japanese, 2013年 暗号と情報セキュリティシンポジウム (SCIS'13)
    Jan. 2013
  • CC-EMAとCEMAの攻撃性能の比較
    中曽根俊貴; 李陽; 佐々木悠; 岩本貢; 太田和夫; 崎山一男
    Oral presentation, Japanese, 2013年 暗号と情報セキュリティシンポジウム (SCIS'13)
    Jan. 2013
  • Mechanism Analysis for Non-Uniform Mapping of Faulty S-box –Case Study of AES-COMP–
    松原有沙; 李陽; 太田和夫; 崎山一男
    Oral presentation, Japanese, 2013年 暗号と情報セキュリティシンポジウム (SCIS'13)
    Jan. 2013
  • 巡回シフトを用いたPUFに基づくパターン照合鍵生成システムの実装評価
    岩井佑樹; 福島崇文; 森山大輔; 松尾真一郎; 駒野雄一; 岩本貢; 太田和夫; 崎山一男
    Oral presentation, Japanese, 2013年 暗号と情報セキュリティシンポジウム (SCIS'13)
    Jan. 2013
  • レスポンス数の向上手法を適用したラッチPUFのASIC実装評価
    山本大; 崎山一男; 岩本貢; 太田和夫; 武仲正彦; 伊藤孝一; 鳥居直哉
    Oral presentation, Japanese, 2013年 暗号と情報セキュリティシンポジウム (SCIS'13)
    Jan. 2013
  • RFID認証プロトコル向け軽量暗号アルゴリズムの実装評価
    三上修吾; 渡辺大; 本間尚文; 崎山一男
    Oral presentation, Japanese, 2013年 暗号と情報セキュリティシンポジウム (SCIS'13)
    Jan. 2013
  • PUF出力の一部を用いるパターン照合鍵生成システム
    駒野雄一; 太田和夫; 岩本貢; 崎山一男
    Oral presentation, Japanese, 2013年 暗号と情報セキュリティシンポジウム (SCIS'13)
    Jan. 2013
  • 故障感度隠蔽のための効率的な対策とその評価
    遠藤翔; 李陽; 本間尚文; 崎山一男; 藤本大介; 永田真; 太田和夫; 青木孝文
    Oral presentation, Japanese, 2013年 暗号と情報セキュリティシンポジウム (SCIS'13)
    Jan. 2013
  • Key Recovery with Less Power Traces Using DPA Contest Data
    Yang Li; Daisuke Nakatsu; Kazuo Ohta; Kazuo Sakiyama
    Oral presentation, English, Poster Session, CHES2012
    Sep. 2012
  • Locality Randomization for EMA-Resistant AES Hardware
    Toshiki Nakasone; Daisuke Nakatsu; Yang Li; Kazuo Ohta; Kazuo Sakiyama
    Oral presentation, English, Triangle Symposium on Advanced ICT 2012 (TriSAI 2012)
    Sep. 2012
  • 故障感度解析とその応用について
    Kazuo Sakiyama
    Public symposium, Japanese, 16回情報科学研究科セミナー@JAIST, 16回情報科学研究科セミナー@JAIST, 東京
    Mar. 2012
  • Fault Behavior Analysis
    Kazuo Sakiyama
    Public symposium, Japanese, Compview暗号理論ワークショップ2012, Compview暗号理論ワークショップ2012, 東京
    Feb. 2012
  • PUFを用いる証明可能安全なパターン照合鍵生成方法
    駒野雄一; 太田和夫; 﨑山一男; 岩本貢
    Oral presentation, Japanese, 2012年 暗号と情報セキュリティシンポジウム (SCIS'12)
    Jan. 2012
  • 54ステップのSHA-0への原像攻撃
    小松原航; 王磊; 佐々木悠; 﨑山一男; 太田和夫
    Oral presentation, Japanese, 2012年 暗号と情報セキュリティシンポジウム (SCIS'12)
    Jan. 2012
  • Threshold Implementation を利用したストリーム暗号Enocoro-128 v2の相関電力解析対策
    三上修吾; 吉田博隆; 渡辺大; 﨑山一男
    Oral presentation, Japanese, 2012年 暗号と情報セキュリティシンポジウム (SCIS'12)
    Jan. 2012
  • Access-Driven Cache Attackの自動的な攻撃評価手法の提案
    高橋順子; 阪本光; 福永利徳; 冨士仁; 﨑山一男
    Oral presentation, Japanese, 2012年 暗号と情報セキュリティシンポジウム (SCIS'12)
    Jan. 2012
  • テンプレートを利用した時系列電力解析
    中津大介; 李陽; 太田和夫; 﨑山一男
    Oral presentation, Japanese, 2012年 暗号と情報セキュリティシンポジウム (SCIS'12)
    Jan. 2012
  • IRドロップを利用した故障感度解析と高温環境下における影響
    小池彩歌; 李陽; 中津大介; 太田和夫; 﨑山一男
    Oral presentation, Japanese, 2012年 暗号と情報セキュリティシンポジウム (SCIS'12)
    Jan. 2012
  • クロック間衝突を利用した電磁波解析
    中曽根俊貴; 中津大介; 李陽; 太田和夫; 崎山一男
    Oral presentation, Japanese, 2012年 暗号と情報セキュリティシンポジウム (SCIS'12)
    Jan. 2012
  • Sensitive-Data Dependency of Faulty Behavior and Its Application
    李陽; 太田和夫; 崎山一男
    Oral presentation, Japanese, 2012年 暗号と情報セキュリティシンポジウム (SCIS'12)
    Jan. 2012
  • 国際会議CHES2011 報告
    伊豆哲也; 猪俣敦夫; 桶屋勝幸; 川端健; 駒野雄一; 﨑山一男; 酒見由美; 佐藤証; 須賀祐治; 高木剛; 高橋順子; 角尾幸保; 盛合志帆; 堀洋平; 本間尚文; 渡辺大
    Oral presentation, English, ISEC2011-66,ISEC研究会
    Dec. 2011
  • [招待講演]マスク対策AESに対する誤り暗号文を用いた故障感度解析~CHES2011での発表のレビュー~
    李陽; 太田和夫; 﨑山一男
    Oral presentation, English, ISEC2011-66,ISEC研究会
    Dec. 2011
  • [招待講演]Uniquness Enhancement of PUF Responces Based on the Locations of Random Outputting RS Latches
    山本大; 﨑山一男; 岩本貢; 太田和夫; 落合隆夫; 武仲正彦; 伊藤孝一
    Oral presentation, English, ISEC2011-66,ISEC研究会
    Dec. 2011
  • クロック間衝突を用いた楕円曲線暗号実装に対する故障感度解析
    阪本光; 李陽; 太田和夫; 﨑山一男
    Oral presentation, English, ISEC2011-49
    Nov. 2011
  • First Experimental Results of Correlation-Enhanced EMA Collision Attack
    Toshiki Nakasone; Daisuke Nakatsu; Yang Li; Kazuo Ohta; Kazuo Sakiyama
    Oral presentation, English, Poster Session, CHES2011
    Sep. 2011
  • Rebound Attack on 3D Block Cipher,” In Proc. Triangle Symposium on Advanced ICT 2011 (TriSAI’11)
    Takuma Koyama; Yu Sasaki; Kazuo Sakiyama; Kazuo Ohta
    Oral presentation, English, Triangle Symposium on Advanced ICT 2010 (TriSAI 2011)
    Aug. 2011
  • Preimage Attacks on 5-Pass HAVAL Reduced to 158-Steps and One-Block 3-Pass HAVAL
    Yasuhide Sakai; Yu Sasaki; Lei Wang; Kazuo Ohta; Kazuo Sakiyama
    Oral presentation, English, Industrial Track Session, ACNS2011
    Jun. 2011
  • New Differential Fault Analysis on Trivium Based on Setup-Time Violations
    Qi Li; Shigeto Gomisawa; Mitsugu Iwamoto; Kazuo Ohta; Kazuo Sakiyama
    Oral presentation, English, ISEC2010-122
    Mar. 2011
  • Fault Sensitivity Analysis
    Kazuo Sakiyama
    Public symposium, Japanese, Compview暗号理論ワークショップ2011, Compview暗号理論ワークショップ2011, 東京
    Feb. 2011
  • Joux-Lucksの3-collisions探索アルゴリズムに関する計算量の詳細な検討
    名渕大樹; 岩本貢; 﨑山一男; 太田和夫
    Oral presentation, English, 2011年 暗号と情報セキュリティシンポジウム (SCIS'11)
    Jan. 2011
  • 158stepの5-pass HAVALと1-Block 3-pass HAVALへの原像攻撃
    酒井靖英; 佐々木悠; 王磊; 﨑山一男; 太田和夫
    Oral presentation, English, 2011年 暗号と情報セキュリティシンポジウム (SCIS'11)
    Jan. 2011
  • AES-128 に対する複数ラウンドCPA
    中津大介; 太田和夫; 﨑山一男
    Oral presentation, English, 2011年 暗号と情報セキュリティシンポジウム (SCIS'11)
    Jan. 2011
  • 再暗号化鍵匿名性を満たすIDベースプロキシ再暗号化方式
    松田和也; 川合豊; 﨑山一男; 太田 和夫
    Oral presentation, English, 2011年 暗号と情報セキュリティシンポジウム (SCIS'11)
    Jan. 2011
  • MAC-MD5へのフォールト解析攻撃
    五味澤重友; 王磊; 太田和夫; 山口和彦; 﨑山一男
    Oral presentation, English, 2011年 暗号と情報セキュリティシンポジウム (SCIS'11)
    Jan. 2011
  • 楕円曲線暗号実装に対するFault Sensitivity Analysis
    阪本光; 李陽; 太田和夫; 﨑山一男
    Oral presentation, English, 2011年 暗号と情報セキュリティシンポジウム (SCIS'11)
    Jan. 2011
  • Self-Template Fault Sensitivity Analysis
    李陽; 太田和夫; 﨑山一男
    Oral presentation, English, 2011年 暗号と情報セキュリティシンポジウム (SCIS'11)
    Jan. 2011
  • 電磁波解析における局所性と放射磁界方向について
    落合隆夫; 山本大; 伊藤孝一; 武仲正彦; 鳥居直哉; 内田大輔; 永井利明; 若菜伸一; 岩本貢; 太田和夫; 﨑山一男
    Oral presentation, English, 2011年 暗号と情報セキュリティシンポジウム (SCIS'11)
    Jan. 2011
  • 7 及び8 ラウンド既知鍵AES識別機の実装
    高柳真如; 佐々木悠; 李陽; 太田和夫; 﨑山一男
    Oral presentation, English, 2011年 暗号と情報セキュリティシンポジウム (SCIS'11)
    Jan. 2011
  • 故障感度解析を利用したPUFの実現について
    岩井祐樹; 太田和夫; 﨑山一男
    Oral presentation, English, 2011年 暗号と情報セキュリティシンポジウム (SCIS'11)
    Jan. 2011
  • ラッチの乱数出力位置を利用したPUFによるID生成/認証システムの信頼性向上手法
    山本大; 﨑山一男; 岩本貢; 太田和夫; 落合隆夫; 武仲正彦; 伊藤孝一
    Oral presentation, English, 2011年 暗号と情報セキュリティシンポジウム (SCIS'11)
    Jan. 2011
  • A New Fault Analysis Attack (joint work with Yang Li and Kazuo Ohta)
    Kazuo Sakiyama
    Public symposium, English, 2010 Japan-Taiwan Joint Research Symposium on Cryptography and Next IT-society, 2010 Japan-Taiwan Joint Research Symposium on Cryptography and Next IT-society, 東京
    Nov. 2010
  • Cryptanalysis and Side-channel Analysis - Approach to Optimal Differential Fault Analysis (joint work with Yang Li and Kazuo Ohta)
    Kazuo Sakiyama
    Public symposium, English, Forum Math-for-Industry 2010, Forum Math-for-Industry 2010, 東京
    Oct. 2010
  • Another Differential Fault Analysis on Trivium
    Qi Li; Kazuo Sakiyama; Lei Wang; Kazuo Ohta
    Oral presentation, English, Triangle Symposium on Advanced ICT 2010 (TriSAI 2010)
    Oct. 2010
  • Effective Verification for Known- Key Distinguisher by Using Extended Differential Path
    Naoyuki Takayanagi; Yang Li; Kazuo Sakiyama; Kazuo Ohta
    Oral presentation, English, Triangle Symposium on Advanced ICT 2010 (TriSAI’10)
    Oct. 2010
  • CryptoVerifを用いたRFID向け相互認証プロトコルの安全性証明の検討
    花谷嘉一; 大久保美也子; 松尾真一郎; 太田和夫; 崎山一男
    Oral presentation, English, 日本応用数理学会2010年度年会 FAISセッション
    Sep. 2010
  • 回転操作が可能な視覚復号型秘密分散法の一般的構成法
    岩本貢; 李陽; 崎山一男; 太田和夫
    Oral presentation, English, ISEC2010-49
    Sep. 2010
  • New Non-Ideal Properties of AES-Based Permutations: Applications to ECHO and Grøstl
    Yu Sasaki; Yang Li; Lei Wang; Kazuo Sakiyama; Kazuo Ohta
    Oral presentation, English, The Second SHA-3 Candidate Conference
    Aug. 2010
  • New Non-Ideal Properties of AES-Based Permutations: Applications to ECHO and Grøstl
    Yu Sasaki; Yang Li; Lei Wang; Kazuo Sakiyama; Kazuo Ohta
    Oral presentation, English, The Second SHA-3 Candidate Conference
    Aug. 2010
  • How Can We Conduct Fair and Consistent Hardware Evaluation for SHA-3 Candidate?
    Shin'ichiro Matsuo; Miroslav Kne; i; Patrick Schaumont; Ingrid Verbauwhede; Akashi Satoh; Kazuo Sakiyama; Kazuo Ota
    Oral presentation, English, The Second SHA-3 Candidate Conference
    Aug. 2010
  • SASEBO-GIIを用いたSHA-3候補のハードウェア性能評価
    小林和幸; 池上淳; 松尾真一郎; 崎山一男; 太田和夫
    Oral presentation, English, 第15回共同研究成果報告会
    Jun. 2010
  • 暗号技術の実装について
    Kazuo Sakiyama
    Public symposium, Japanese, CRYPTRECシンポジウム2010, CRYPTRECシンポジウム2010, 東京
    Mar. 2010
  • 強識別不可能性理論とSHA-3プロジェクト ~ハッシュ関数設計のための理論研究と実装研究の現状~
    太田和夫; 王磊; 崎山一男
    Oral presentation, English, ISEC2009-104
    Mar. 2010
  • 暗号理論に関する問題提起と討論
    Kazuo Sakiyama
    Public symposium, Japanese, Compview暗号理論ワークショップ2010, Compview暗号理論ワークショップ2010, 東京
    Feb. 2010
  • SASEBO-GIIを用いたSHA-3候補のハードウェア性能評価
    池上淳; 小林和幸; 崎山一男; 太田和夫
    Oral presentation, English, 2010年 暗号と情報セキュリティシンポジウム (SCIS'10)
    Jan. 2010
  • Katz らのLeakage Resilient t-time 署名の解析
    松田和也; 坂井祐介; 太田和夫; 崎山一男
    Oral presentation, English, 2010年 暗号と情報セキュリティシンポジウム (SCIS'10)
    Jan. 2010
  • 公開鍵暗号の SPA/DPA 耐性向上に向けた対策アルゴリズムの再考
    泉雅巳; 崎山一男; 太田和夫; 佐藤証
    Oral presentation, English, 2010年 暗号と情報セキュリティシンポジウム (SCIS'10)
    Jan. 2010
  • DPA耐性のあるソフトウェア実装のための安全なCPU
    中津大介; 李陽; 崎山一男; 太田和夫
    Oral presentation, English, 2010年 暗号と情報セキュリティシンポジウム (SCIS'10)
    Jan. 2010
  • PUF-HBプロトコルに対する中間者攻撃
    長井大地; 塙知剛; 太田和夫; 崎山一男; 岩本貢
    Oral presentation, English, 2010年 暗号と情報セキュリティシンポジウム (SCIS'10)
    Jan. 2010
  • An Information Theoretic Perspective on the Differential Fault Analysis against AES
    Yang Li; Shigeto Gomisawa; Kazuo Sakiyama; Kazuo Ohta
    Oral presentation, English, IEICE 2010 Symposium on Cryptography and Information Security (SCIS'10)
    Jan. 2010
  • AES暗号実装へのフォールト解析攻撃における適用範囲の拡大と解析効率の向上
    五味澤重友; 泉雅巳; 李陽; 高橋順子; 福永利徳; 佐々木 悠; 崎山 一男; 太田 和夫
    Oral presentation, English, 2010年 暗号と情報セキュリティシンポジウム (SCIS'10)
    Jan. 2010
  • HB-MAC 認証プロトコルに対する受動的攻撃
    塙知剛; 川合豊; 崎山一男; 太田和夫
    Oral presentation, English, 2010年 暗号と情報セキュリティシンポジウム (SCIS'10)
    Jan. 2010
  • Performance Comparison of Lightweight Public-Key Identification Schemes
    Bagus Santoso; Kazuo Ohta; Kazuo Sakiyama; Goichiro Hanaoka
    Oral presentation, English, WISP Summit - First workshop on Wirelessly Powered Sensor Networks and Computational RFID
    Nov. 2009
  • An Extension of Differential Fault Analysis Attack of AES
    Shigeto Gomisawa; Masami Izumi; Kazuo Sakiyama; Kazuo Ohta
    Oral presentation, English, Triangle Symposium on Advanced ICT 2009 (TriSAI 2009)
    Oct. 2009
  • Comparison of Masked S-boxes in Hardware Implementation
    Daisuke Nakatsu; Yang Li; Kazuo Sakiyama; Kazuo Ohta
    Oral presentation, English, Triangle Symposium on Advanced ICT 2009 (TriSAI 2009)
    Oct. 2009
  • Cryptoanalysis of Duc-Kim Key Exchange Protocol Proposed at TriSAI'08
    Tomotaka Hanawa; Kazuo Sakiyama; Kazuo Ohta
    Oral presentation, English, Triangle Symposium on Advanced ICT 2009 (TriSAI 2009)
    Oct. 2009
  • Visual Secret Sharing Schemes Allowing Arbitrary Rotation Angles of Shares
    Yang Li; Mitsugu Iwamoto; Kazuo Ohta; Kazuo Sakiyama
    Oral presentation, English, Triangle Symposium on Advanced ICT 2009 (TriSAI 2009)
    Oct. 2009
  • Improving Efficiency of an 'On the Fly' Identification Scheme by Perfecting Zero-Knowledgeness
    Bagus Santoso; Kazuo Ohta; Kazuo Sakiyama; Goichiro Hanaoka
    Oral presentation, English, ISEC2009-30
    Jul. 2009
  • Countermeasures Against Side-channel Attacks and Their Side Effects
    Kazuo Sakiyama
    Keynote oral presentation, Japanese, RSA Conference 2009, RSA Conference 2009, 千葉, International conference
    Jun. 2009
  • A Novel Construction Method for Visual Secret Sharing Schemes Allowing Rotation of Shares
    Yang Li; Mitsugu Iwamoto; Kazuo Ohta; Kazuo Sakiyama
    Oral presentation, English, ISEC2009-5
    May 2009
  • Yet Another New “On the Fly” Identification Scheme: Reducing Memory Cost by Improving Zero-Knowledgeness,
    Bagus Santoso; Kazuo Ohta; Kazuo Sakiyama
    Oral presentation, English, IEICE 2009 Symposium on Cryptography and Information Security (SCIS'09)
    Jan. 2009
  • フォールト混入時におけるRSL 技術による暗号回路モデルを用いた安全性解析
    泉 雅巳; 崎山一男; 太田和夫
    Oral presentation, English, 2009年暗号と情報セキュリティシンポジウム (SCIS'09)
    Jan. 2009
  • 高周波クロックによるRSL技術を用いたAESへのフォールト攻撃実験
    八木達哉; 崎山一男; 太田和夫
    Oral presentation, English, 2009年暗号と情報セキュリティシンポジウム (SCIS'09)
    Jan. 2009
  • MD5チャレンジ・レスポンスプロトコルへの速い攻撃
    Lei Wang; Yu Sasaki; Kazuo Ohta; Kazuo Sakiyama
    Oral presentation, English, IEICE 2009 Symposium on Cryptography and Information Security (SCIS'09)
    Jan. 2009
  • Visual Secret Sharing Schemes for Multiple Secret Images Allowing the 90-degree Rotation of Shares
    Yang Li; Mengyu Zhu; Wang Lei; Kazuo Ohta; Kazuo Sakiyama
    Oral presentation, English, IEICE 2009 Symposium on Cryptography and Information Security (SCIS'09)
    Jan. 2009
  • Does The Montgomery Powering Ladder Method Really Offer SPA Resistance?
    Masami Izumi; Kazuo Sakiyama; Kazuo Ohta
    Oral presentation, English, Triangle Symposium on Advanced ICT 2008 (TriSAI 2008)
    Oct. 2008
  • A Compact ECC Processor for Pervasive Computing
    Yong Ki Lee; Kazuo Sakiyama; Lejla Batina; Ingrid Verbauwhede
    Oral presentation, English, ECRYPT Workshop, Secure Component and System Identification (SECSI'08)
    Mar. 2008
  • Elliptic Curve Cryptography on Embedded Multicore Systems
    Junfeng Fan; Kazuo Sakiyama; Ingrid Verbauwhede
    Oral presentation, English, Workshop on Embedded Systems Security (WESS’07)
    Oct. 2007
  • Exploring Trade-offs between Area, Performance and Security in HW/SW Co-design of ECC
    Caroline Vanderheyden; Junfeng Fan; Kazuo Sakiyama; Ingrid Verbauwhede
    Oral presentation, English, Western European Workshop on Research in Cryptology (WeWoRC’07)
    Jul. 2007
  • Montgomery Modular Multiplication Algorithm for Multi-core Systems
    Junfeng Fan; Kazuo Sakiyama; Ingrid Verbauwhede
    Oral presentation, English, ECRYPT Workshop, Software Performance Enhancement for Encryption and Decryption (SPEED’07)
    Jun. 2007
  • Compact Implementations for RFID and Sensor Nodes
    Lejla Batina; Kazuo Sakiyama
    Public symposium, Japanese, Design, Automation and Test in Europe (DATE'07), Design, Automation and Test in Europe (DATE'07), Nice, France
    Apr. 2007
  • Small Footprint ALU for Public-key Processors for Pervasive Security
    Kazuo Sakiyama; Lejla Batina; Nele Mentens; Bart Preneel; Ingrid Verbauwhede
    Oral presentation, English, ECRYPT Workshop on RFID Security 2006
    Jul. 2006
  • Testing Framework for eSTREAM Profile II Candidates
    Lejla Batina; Sandeep Kumar; Joseph Lano; Kerstin Lemke; Nele Mentens; Christoph Paar; Bart Preneel; Kazuo Sakiyama; Ingrid Verbauwhede
    Oral presentation, English, ECRYPT Workshop, SASC - The State of the Art of Stream Ciphers
    Feb. 2006
  • HW/SW Co-design for TA/SPA-resistant Public-Key Cryptosystems
    Kazuo Sakiyama; Lejla Batina; Patrick Schaumont; Ingrid Verbauwhede
    Oral presentation, English, ECRYPT Workshop on CRyptographic Advances in Secure Hardware (CRASH’05)
    Sep. 2005
  • ZnF2:Gdを用いたEL-PL複合素子(II)
    平川 孝; 崎山一男; 趙永載; 濱川圭弘
    Oral presentation, Japanese, 第57回応用物理学会学術講演会講演予稿集,第57回応用物理学会学術講演会講演予稿集
    Sep. 1996
  • EL/PL Hybrid Device Enhanced by UV Emission from ZnF2:Gd Thin Film Electroluminescence
    Young-Jae Cho; Takashi Hirakawa; Kazuo Sakiyama; Hiroaki Okamoto; Yoshihiro Hamakawa
    Oral presentation, English, 8th Seoul International Symposium on the Physics of Semiconductors and Applications (ISPSA'96)
    Sep. 1996
  • ZnF2:Gdを用いたEL-PL複合素子
    崎山一男; 趙永載; 濱川圭弘
    Oral presentation, Japanese, 第56回応用物理学会学術講演会講演予稿集,第56回応用物理学会学術講演会講演予稿集
    Aug. 1995
  • a-Si:H層を用いたEL素子の低しきい電圧化
    森田真太郎; 崎山一男; 趙永載; 濱川圭弘
    Oral presentation, Japanese, 第55回応用物理学会学術講演会講演予稿集,第56回応用物理学会学術講演会講演予稿集
    Sep. 1994

Courses

  • セキュリティ情報学実験(ハードウェアセキュリティ)
    Apr. 2015
  • 暗号情報セキュリティ
    The University of Electro-Communications
  • 暗号情報セキュリティ
    電気通信大学

Affiliated academic society

  • 応用物理学会
  • IEEE
  • IACR
  • IEICE
  • IPSJ
  • 電気学会

Research Themes

  • 効率的で安全に利用可能な高機能暗号の数理基盤の構築と展開
    Tsuyoshi Takagi; Mitsugu Iwamoto; Kazuo Sakiyama; Yang Li; Yohei Watanabe; Yuntao Wang; Daiki Miyahara
    Japan Science and Technology Agency, K Program, The University of Electro-Communications, 個別研究型, 25-JPMJKP24U2-03
    Apr. 2025 - Mar. 2030
  • Trustworthy IoTシステム設計基盤の構築
    原 祐子
    科学技術振興機構, 戦略的な研究開発の推進 戦略的創造研究推進事業 CREST, 東京工業大学, 近年、IC製造工程に外部企業が関わることで、IC設計技術(IP)盗用や非正規品流通の問題が深刻化しています。本研究は、ICサプライチェーン全体の安全性要件を抽出・モデル化し、その要件を満たす新たな仕組みを高機能暗号を基盤として構築することで、ICのIP保護と真正性確認の一括した実現を目指します。この仕組みをIC設計時にby-Designで設計情報に組み込むための設計手法とその設計環境を開発します。
    2023 - 2028
  • センサーに内在する固有性の拡散と収縮に基づく非暗号学的計測セキュリティ
    三浦 典之
    日本学術振興会, 科学研究費助成事業 基盤研究(B), 大阪大学, 基盤研究(B), Coinvestigator, 23H03364
    Apr. 2023 - Mar. 2026
  • Construction of Provably Secure Countermeasures Against Physical Attacks on Symmetric Cryptography
    崎山 一男
    Japan Society for the Promotion of Science, Grants-in-Aid for Scientific Research, The University of Electro-Communications, Grant-in-Aid for Scientific Research (B), Principal investigator, 23H03393
    Apr. 2023 - Mar. 2026
  • スケーラブルな物理セキュリティを可能にする近似計算の設計基盤と理論の構築
    冨山 宏之
    IoTデバイスは、フィールドに配置される性質上、サイドチャネル攻撃などの物理攻撃にさらされやすい。一方、IoTデバイスは多種多様であり、セキュリティ対策に許容されるコストも様々である。本研究では、IoTデバイスを対象として、スケーラブルな物理セキュリティを実現する設計基盤と理論の構築を目的とする。この目的を達成するため、近似計算(Approximate Computing)技術をサイドチャネル攻撃対策に応用する。これにより、セキュリティの実装コストと安全性をトレードオフでき、多種多様なIoTデバイスを、それぞれ許容されるコストで保護することが可能となる。
    01 Apr. 2020 - 31 Mar. 2024
  • Resilience Enhancement of IoT Ecosystem by Cryptographic Technologies
    崎山 一男; 廣瀬 勝一; 李 陽; 宮原 大輝; 渡邉 洋平; 岩本 貢; 駒野 雄一; 菅原 健; 三浦 典之; 太田 和夫
    Japan Society for the Promotion of Science, Grants-in-Aid for Scientific Research Grant-in-Aid for Scientific Research (S), The University of Electro-Communications, Grant-in-Aid for Scientific Research (S), Principal investigator, リーク耐性暗号、リーク鍵の蒸留、及びリーク検知技術の3つの研究テーマの実績は以下の通りである。得られた成果は国内会議、国際会議、及び論文誌で発表した。 1)リーク耐性暗号: IDベース暗号について、マスター鍵が漏洩する場合でも安全となる構成法を提案した。また、復号鍵の漏洩に耐性のある鍵失効機能付きIDベース暗号の効率化に成功した。さらに、秘密鍵の盗難や紛失時の鍵漏洩耐性や秘密鍵自体の分散管理について検討した。カードベース暗号について、新しい物理道具を用いる秘密計算プロトコルを提案した。暗号利用モードについては、Lesamnta-LWの性能向上と応用について提案した。情報漏洩の形式的モデルへのフィードバックについては、演算器やマイクロアーキテクチャを精査し、新たな漏洩源を発見するとともに対策法を提案した。 2)リーク鍵の蒸留:AES暗号の秘密鍵復元において、検査フェイズを新たに導入し、従来0%の復元成功確率であった解析を約40%に向上することができた。プロービング攻撃への対策であるマスク実装について、あるブール関数を用いることで効率化できることを発見した。また、SHA-256圧縮関数の代数的故障利用解析やMAC関数chop-MDの偽造攻撃について、効率的な解析手法を考案した。チーム三浦/岩本との連携では、リキー方式の安全性と実装性を再考し、攻撃検知後に漏洩リスク下にある部分鍵を更新する新たな方式を構築した。この方式を搭載したAES暗号処理回路を設計した。 3)リーク検知技術:KU Leuven大と共同で作製したM&M技術により対策されたAES暗号ハードウェアの安全性評価を完了した。さらに連携を深めることで、リーケージセンサとアルゴリズムレベルでの対策技術の協調設計手法に着手できた。リーケージセンサについては、物理的なダイレクトプロービング攻撃の検知感度を高めた新たな回路を開発した。, 18H05289
    Jun. 2018 - Mar. 2023
  • Comprehensive study on anti-tamper techniques to prevent information leakage by laser fault injection attacks
    Sakiyama Kazuo; VERBAUWHEDE Ingrid; DANGER Jean-Luc; BHASIN Shivam
    Japan Society for the Promotion of Science, Grants-in-Aid for Scientific Research Grant-in-Aid for Scientific Research (A), The University of Electro-Communications, Grant-in-Aid for Scientific Research (A), Principal investigator, In this research, we have established fundamental countermeasure techniques against laser fault injection attacks, where an attacker intentionally induces soft errors in a cryptographic circuit to retrieve secret information. Specifically, we have conducted four research items; (1) construction of evaluation environment of laser fault injection attacks, (2) measurement of substrate potential fluctuation at laser irradiation and development of attack detection method, (3) development of countermeasure techniques for cryptographic-algorithm level based on detection, and (4) safety evaluation of countermeasure technology. We have deepened our understandings of the information leakage mechanism in the laser fault injection attack from physical and mathematical viewpoints and clarified the feasibility of countermeasure techniques using a prototype IC chip., 15H01688
    Apr. 2015 - Mar. 2019
  • Security Evaluation of Authentication Systems Using Side-Channel Information
    Sakiyama Kazuo
    Japan Society for the Promotion of Science, Grants-in-Aid for Scientific Research Grant-in-Aid for Challenging Exploratory Research, The University of Electro-Communications, Grant-in-Aid for Challenging Exploratory Research, Principal investigator, Previous work on side-channel information, physical information such as power leakage and electromagnetic waves leaked from a cryptographic system, focused on a case study of attacks that analyzed a part of side channel information and acquired a secret key. On the other hand, in this research project, we changed the way of thinking about side-channel information and set up a research framework that effectively utilizes all of the side-channel information. As an application, we proposed and constructed a new cryptosystem such as an authentication system, a ranging device, and an intrusion detection device using side-channel information, and demonstrated the enhancement of security. A series of efforts and understandings on this research topic has contributed to the development of side-channel analysis research., 15K12035
    Apr. 2015 - Mar. 2018
  • Development of Side-Channel Attack Sensing Techniques and Prototyping toward Electromagnetic Security of Cryptographic VLSI Circuits
    Nagata Makoto; Danger Jean-Luc
    Japan Society for the Promotion of Science, Grants-in-Aid for Scientific Research Grant-in-Aid for Scientific Research (A), Kobe University, Grant-in-Aid for Scientific Research (A), Coinvestigator, Cryptographic VLSI techniques have been established for assuring electromagnetic security with remarkably high tamper resistance against side-channel attacks. Three research items include: (1) On-chip detection of the proximate placement and approach of electromagnetic micro probes as the side-channel attack sensing technique, (2) integrated simulation techniques of electromagnetic coupling between the electromagnetic micro probe and on-chip side-channel sensors and also circuit operations, (3) positive usage of side-channel information for the authentication of cryptographic cores. These research items have been successfully completed and demonstrated with the fabricated integrated-circuit (IC) chips and prototype systems., 26240005
    Apr. 2014 - Mar. 2017

Industrial Property Rights

  • 二次元コード、二次元コード生成装置、二次元コード生成方法、二次元コード解読装置、 二次元コード解読方法、二次元コード生成解読システム、及び二次元コード生成解読方法
    Patent right, 須長 淳也, 﨑山 一男, 宮原 大輝, 嶋野 裕一郎, 特願2024-005186, Date applied: 2024
  • 認証システム及び認証方法
    Patent right, 﨑山一男, 李陽, 特願2015-560958, Date applied: 29 Jan. 2015, 国立大学法人電気通信大学, 特許第6348914号, Date issued: 08 Jun. 2018
  • 回路故障検出装置、回路故障検出方法
    Patent right, 佐々木悠, 崎山一男, 太田和夫, 特願2010-275596, Date applied: 10 Dec. 2010, 東日本電信電話株式会社 、国立大学法人電気通信大学, 特開2012-122931, Date announced: 28 Jun. 2012, 特許第5637446号, Date issued: 31 Oct. 2014
  • 電気錠システム
    Patent right, 中谷浩茂, 梶山智史, 鍋嶋秀生, 太田和夫, 﨑山一男, 特願2010-168367, Date applied: 27 Jul. 2010, Panasonic Corporation, 特開2012-026225, Date announced: 09 Feb. 2012, 特許第5450303号, Date issued: 10 Jan. 2014
  • 個体別情報生成装置及び個体別情報生成方法
    Patent right, 山本大, 武仲正彦, 伊藤孝一, 落合隆夫, 岩本貢, 太田和夫, 崎山一男, 特願2011-278999, Date applied: 20 Dec. 2011, 富士通株式会社,国立大学法人電気通信大学, 特開2013-131867, Date announced: 04 Jul. 2013
  • 温度センサ,暗号化装置,暗号化方法,及び個体別情報生成装置
    Patent right, 山本大, 落合隆夫, 武仲正彦, 伊藤孝一, 崎山一男, 岩本貢, 太田和夫, 特願2011-279000, Date applied: 20 Dec. 2011, 富士通株式会社,国立大学法人電気通信大学, 特開2013-130434, Date announced: 04 Jul. 2013
  • 温度センサ,暗号化装置,暗号化方法,及び個体別情報生成装置
    Patent right, 山本大, 落合隆夫, 武仲正彦, 伊藤孝一, 崎山一男, 岩本貢, 太田和夫, 特願2011-279001, Date applied: 20 Dec. 2011, 富士通株式会社,国立大学法人電気通信大学, 特開2013-131868, Date announced: 04 Jul. 2013
  • 個体別情報生成装置,暗号化装置,認証装置,及び個体別情報生成方法
    Patent right, 山本大, 竹仲正彦, 伊藤孝一, 落合隆夫, 崎山一男, 岩本貢, 太田和夫, 特願2011-279002, Date applied: 20 Dec. 2011, 富士通株式会社,国立大学法人電気通信大学, 特開2013-131869, Date announced: 04 Jul. 2013
  • 暗号化鍵生成装置およびプログラム
    Patent right, 駒野雄一, 太田和夫, 崎山一男, 特願2011-275637, Date applied: 16 Dec. 2011, 株式会社東芝, 特開2013-126221, Date announced: 24 Jun. 2013
  • 電源遮断時間判定装置及び無線タグ
    Patent right, 﨑山一男, 李陽, 中曽根俊貴, 山本晃裕, 特願2013-038790, Date applied: 28 Feb. 2013, 国立大学法人電気通信大学
  • 本人確認システム
    Patent right, サントソバグス, 崎山一男, 太田和夫, 特願2008-289266, Date applied: 11 Nov. 2008, 国立大学法人電気通信大学, 特開2010-118796, Date announced: 27 May 2010