
Kazuo SAKIYAMA
Department of Informatics | Professor |
Cluster II (Emerging Multi-interdisciplinary Engineering) | Professor |
Researcher Information
Degree
Field Of Study
Career
- Apr. 2016
電気通信大学 大学院情報理工学研究科 情報学専攻, 教授 - Apr. 2013 - Mar. 2015
電気通信大学 大学院情報理工学研究科 総合情報学専攻, 教授 - Apr. 2010 - Mar. 2013
電気通信大学 大学院情報理工学研究科 総合情報学専攻, 准教授 - Apr. 2008 - Mar. 2010
University of Electro-Communications, Associate Professor - Jan. 2008 - Mar. 2008
Katholieke Universiteit Leuven, Post-doctoral researcher - Jan. 2005 - Dec. 2007
Katholieke Universiteit Leuven, Research Assistant - Apr. 1996 - Dec. 2004
Hitachi, Ltd. (Renesas Technology)
Educational Background
- Jan. 2005 - Dec. 2007
KU Leuven, Department of Electrical Engineering (Ph. D.), Belgium - Sep. 2001 - Jun. 2003
University of California, Los Angeles, Department of Electrical Engineering (M. Sc.), United States - Apr. 1994 - Mar. 1996
Osaka University, Graduate School of Engineering Science, 物理系電気工学分野(博士前期課程), Japan - Apr. 1990 - Mar. 1994
Osaka University, School of Engineering Science, 電気工学科 - Apr. 1987 - Mar. 1990
兵庫県立川西北陵高等学校, 普通科
Research Activity Information
Award
- Dec. 2024
電子情報通信学会総合大会
MLP のハミング距離モデルに基づくサイドチャネル攻撃に対する加算マスキング対策の提案
若手優秀賞, 天野龍乃如;崎山一男;宮原大輝;李陽 - May 2024
[招待講演]All You Need Is Fault: Zero-Value Attacks on AES and a New $\lambda$-Detection M&M (from TCHES 2024)
ISEC研究会活動貢献感謝状, Haruka Hirata;Daiki Miyahara;Victor Arribas;Yang Li;Noriyuki Miura;Svetla Nikova;Kazuo Sakiyama - Dec. 2023
Exploring Leakage Characteristics and Attacks through Profiles of Screaming Channels
KIISC Best Paper Award, Yuki Matsukawa;Daiki Miyahara;Takeshi Sugawara;Kazuo Sakiyama;Yang Li - Dec. 2023
WICS2023@CANDAR
On the Practical Dependency of Fresh Randomness in AES S-box with Second-Order TI
Best Paper Award, Maki Tsukahara;Haruka Hirata;Mingyu Yang;Daiki Miyahara;Yang Li;Yuko Hara-Azumi;Kazuo Sakiyama - Sep. 2023
DICOMO2023
天秤ベース秘密計算に対する計算モデルの構築
優秀論文賞, 金子尚平;李陽;崎山一男;宮原大輝 - Dec. 2021
Asiahost 2021 Best Paper Award, Rei Kudo;Takeshi Sugawara;Kazuo Sakiyama;Yuko Hara-Azumi;Yang Li - Sep. 2021
電子情報通信学会 基礎・境界ソサイエティ
2021年暗号と情報セキュリティシンポジウム(SCIS2021)での実行委員長としての貢献
電子情報通信学会 功労賞
Japan society, Japan - Mar. 2020
電子情報通信学会, 2019年度に開催された総合大会及びソサイエティ大会で発表された2976件の中から、特に優秀な48件の発表に対して送られたものです。
星野翔,椎名瞭,松村竜我,崎山一男, "レーザー光を使った音情報の漏洩に対する安全性評価"
電子情報通信学会学術奨励賞(指導学生:星野翔の受賞)
International society - Mar. 2019
藤聡子, 菅原健, 崎山一男, “分光スペクトルを用いたLEDの個体識別に向けた電流変化の影響”
サイバーセキュリティシンポジウム道後2019学生研究賞(指導学生:藤聡子の受賞)
Japan society - Mar. 2019
電子情報通信学会, 2018年3月に開催された総合大会及び9月に開催されたソサイエティ大会で発表された3351件の中から、特に優秀な50件の発表に対して送られたものです。
羽田野 凌太, 庄司 奈津, 李 陽, 菅原 健, 崎山 一男, "AES暗号への故障差分攻撃のモデル化と攻撃回数の評価"
電子情報通信学会学術奨励賞(指導学生:羽田野凌太の受賞)
International society - Dec. 2018
古川和祈, 羽田野凌太
CODE BLUE CTF2018感謝状(指導学生:羽田野凌太の受賞)
International society - Sep. 2018
IWSEC Best Poster Award, Erina Tatsumi;Kazuo Sakiyama;Takeshi Sugawara
International society - Mar. 2018
庄司奈津, 菅原健, 岩本貢, 崎山一男, “ブロック暗号へのプロービング攻撃における鍵復元効率の正確な評価モデル”
サイバーセキュリティシンポジウム道後2018学生研究賞(指導学生:庄司奈津の受賞)
Japan society - Jan. 2018
XORモデルを用いたサイドチャネル認証(粕谷桃伽,石原遼,崎山一男)
SCIS論文賞(指導学生:粕谷桃伽の受賞)
Japan society - Sep. 2017
IWSEC Best Poster Award, Natsu Shoji;Ryuga Matsumura;Takeshi Sugawara;Kazuo Sakiyama
International society - Feb. 2017
Risa Yashiro, Takanori Machida, Mitsugu Iwamoto, and Kazuo Sakiyama, “Deep-Learning-Based Security Evaluation on Authentication Systems Using Arbiter PUF and Its Variants”
サイバーセキュリティシンポジウム道後2017学生研究賞(指導学生:八代理沙の受賞)
Japan society - May 2016
Kazuo Sakiyama, Momoka Kasuya, Takanori Machida, Arisa Matsubara, Yunfeng Kuai, Yu-Ichi Hayashi, Takaaki Mizuki, Noriyuki Miura, and Makoto Nagata, “Physical Authentication Using Side-Channel Information”
ICoICT2016 Best Presenter Award
International society - Oct. 2015
DE0-nanoを用いたサイドチャネル認証 藤井達哉,粕谷桃伽,町田卓謙,崎山一男
CSS2015 優秀デモンストレーション賞
Japan society - Jan. 2012
Self-Template Fault Sensitivity Analysis (李陽、太田和夫、﨑山一男)
SCIS論文賞(指導学生:李陽の受賞)
Japan society
Paper
- Secure Voting Protocol Using Balance Scale
Shohei Kaneko; Pascal Lafourcade; Lola-Baie Mallordy; Daiki Miyahara; Maxime Puys; Kazuo Sakiyama
Foundations & Practice of Security, 15532, ?-?, May 2025, Peer-reviwed, with international co-author(s)
International conference proceedings - Parimutuel Betting on Blockchain: A Case Study on Horse Racing
Hiroki Uedan; Yang Li; Kazuo Sakiyama; Daiki Miyahara
Proc. The 39th International Conference on Advanced Information Networking and Applications (AINA-2025), Apr. 2025, Peer-reviwed
International conference proceedings - Key-Recovery Attack Against Ascon Using 1-Bit Random Fault Model
Soki Nakamura; Daiki Miyahara; Yang Li; Kazuo Sakiyama
Last, Proc. The 39th International Conference on Advanced Information Networking and Applications (AINA-2025), Apr. 2025, Peer-reviwed
International conference proceedings - Practical Randomness Effects on Physical Security in Second-Order Threshold Implementation of AES
Maki Tsukahara; Yusaku Harada; Haruka Hirata; Daiki Miyahara; Yang Li; Yuko Hara-Azumi; Kazuo Sakiyama
Last, IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 108, 3, Mar. 2025, Peer-reviwed
Scientific journal, English - Secure Voting Protocol Using Balance Scale,” In Proc. Foundations and Practice of Security (FPS’24)
Shohei Kaneko; Pascal Lafourcade; Lola Mallordy; Daiki Miyahara; Maxime Puys; Kazuo Sakiyama
Jan. 2025, Peer-reviwed
International conference proceedings - Multiplicative Masked M&M: An Attempt at Combined Countermeasures with Reduced Randomness
Kaiyuan Li; Haruka Hirata; Daiki Miyahara; Kazuo Sakiyama; Yuko Hara; Yang Li
2024 IEEE 23rd International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom), IEEE, 726-733, 17 Dec. 2024, Peer-reviwed
International conference proceedings - PRNG-Oriented Side-Channel Security Evaluation for TI-AES
Yusaku Harada; Maki Tsukahara; Daiki Miyahara; Yang Li; Yuko Hara; Kazuo Sakiyama
Last, The 8th International Conference on Mobile Internet Security (Mobisec 2024), Dec. 2024 - LoS Trick: Countermeasure against CPA for DNN Models Using Loss of Significance in Multiply-Accumulate Operations
Ryunosuke Amano; Kazuo Sakiyama; Daiki Miyahara; Yang Li
2024 Twelfth International Symposium on Computing and Networking Workshops (CANDARW), IEEE, 240-246, 26 Nov. 2024, Peer-reviwed
International conference proceedings - A Case Study of Side-Channel Authentication Using Screaming Channel
Mayu Nomura; Daiki Miyahara; Yang Li; Kazuo Sakiyama
2024 IEEE 21th International Conference on Mobile Ad Hoc and Smart Systems (MASS), Sep. 2024, Peer-reviwed
International conference proceedings - Poster: Ascon-based Secure Physical Authentication with Relay-Attack Resistance
Runa Sako; Daiki Miyahara; Yang Li; Kazuo Sakiyama
2024 IEEE 21th International Conference on Mobile Ad Hoc and Smart Systems (MASS), Sep. 2024, Peer-reviwed
International conference proceedings - Double-Sided Multimodal Attack Sensing and Partial Re-Keying in Shared Group Key System
Yuki Ikemoto; Soichiro Fujii; Kotaro Naruse; Jun Shiomi; Yoshihiro Midoh; Yuki Yamashita; Makoto Nagata; Yuichi Komano; Mitsugu Iwamoto; Kazuo Sakiyama; Noriyuki Miura
ESSERC, Sep. 2024, Peer-reviwed
International conference proceedings - Hardware/Software Cooperative Design Against Power Side-Channel Attacks on IoT Devices
Mingyu Yang; Tanvir Ahmed; Saya Inagaki; Kazuo Sakiyama; Yang Li; Yuko Hara-Azumi
IEEE Internet of Things Journal, 2024, Peer-reviwed
Scientific journal - All You Need Is Fault: Zero-Value Attacks on AES and a New λ-Detection M&M
Haruka Hirata; Daiki Miyahara; Victor Arribas; Yang Li; Noriyuki Miura; Svetla Nikova; Kazuo Sakiyama
IACR Transactions on Cryptographic Hardware and Embedded Systems, Universitatsbibliothek der Ruhr-Universitat Bochum, 2024, 1, 133-156, 04 Dec. 2023, Peer-reviwed, Deploying cryptography on embedded systems requires security against physical attacks. At CHES 2019, M&M was proposed as a combined countermeasure applying masking against SCAs and information-theoretic MAC tags against FAs. In this paper, we show that one of the protected AES implementations in the M&M paper is vulnerable to a zero-value SIFA2-like attack. A practical attack is demonstrated on an ASIC board. We propose two versions of the attack: the first follows the SIFA approach to inject faults in the last round, while the second one is an extension of SIFA and FTA but applied to the first round with chosen plaintext. The two versions work at the byte level, but the latter version considerably improves the efficiency of the attack. Moreover, we show that this zero-value SIFA2 attack is specific to the AES tower-field decomposed S-box design. Hence, such attacks are applicable to any implementation featuring this AES S-box architecture.Then, we propose a countermeasure that prevents these attacks. We extend M&M with a fine-grained detection-based feature capable of detecting the zero-value glitch attacks. In this effort, we also solve the problem of a combined attack on the ciphertext output check of M&M scheme by using Kronecker’s delta function. We deploy the countermeasure on FPGA and verify its security against both fault and side-channel analysis with practical experiments.
Scientific journal - Exploring Leakage Characteristics and Attacks through Profiles of Screaming Channels
Yuki Matsukawa; Daiki Miyahara; Takeshi Sugawara; Kazuo Sakiyama; Yang Li
The 7th International Conference on Mobile Internet Security (MobiSec 2023), 152-164, Dec. 2023, Peer-reviwed
Scientific journal, English - Fundamental Study for Acquiring Side-Channel Information Using Rolling Shutter Effect
Yuichiro Shimano; Daiki Miyahara; Kazuo Sakiyama
Last, IEEJ Transactions on Electronics, Information and Systems, 01 Dec. 2023, Peer-reviwed
Scientific journal - Automated Extraction for Vulnerability Management on PSIRT: A Case Study of Automotive Industry
Momoka Kasuya; Nobuyoshi Morita; Hiroki Yamazaki; Kazuo Sakiyama
Last, Proc. International Symposium on Computing and Networking, CANDAR Workshops (CANDARW’23), 232-238, Nov. 2023, Peer-reviwed
International conference proceedings - Power Side-channel Attack Resistant Circuit Designs of ARX Ciphers Using High-level Synthesis
Saya Inagaki; Mingyu Yang; Yang Li; Kazuo Sakiyama; Yuko Hara-Azumi
ACM Transactions on Embedded Computing Systems, Association for Computing Machinery (ACM), 22, 5, 1-17, 26 Sep. 2023, Peer-reviwed, In the Internet of Things (IoT) era, edge devices have been considerably diversified and are often designed using high-level synthesis (HLS) for improved design productivity. However, HLS tools were originally developed in a security-unaware manner, resulting in vulnerabilities to power side-channel attacks (PSCAs), which are a serious threat to IoT systems. Currently, the impact and applicability of existing methods to PSCA-resistant designs using HLS are limited. In this article, we propose an effective HLS-based design method for PSCA-resistant ciphers implemented in hardware. In particular, we focus on lightweight block ciphers composed of addition/rotation/XOR (ARX)-based permutations to study the effects of the threshold implementation (which is one of the provably secure countermeasures against PSCAs) to the behavioral descriptions of ciphers along with the changes in HLS scheduling. The results obtained using Welch’s t-test demonstrate that our proposed method can successfully improve the resistance against PSCAs for all ARX-based ciphers used as benchmarks.
Scientific journal - Software Evaluation for Second Round Candidates in NIST Lightweight Cryptography
Ryota Hira; Tomoaki Kitahara; Daiki Miyahara; Yuko Hara-Azumi; Yang Li; Kazuo Sakiyama
Journal of Information Processing, Information Processing Society of Japan, 31, 205-219, 15 Mar. 2023, Peer-reviwed
Scientific journal - Power Side-channel Countermeasures for ARX Ciphers using High-level Synthesis
Saya Inagaki; Mingyu Yang; Yang Li; Kazuo Sakiyama; Yuko Hara-Azumi
Proceedings of the 2023 ACM/SIGDA International Symposium on Field Programmable Gate Arrays, ACM, 12 Feb. 2023
International conference proceedings - Optimized Software Implementations of Ascon, Grain-128AEAD, and TinyJambu on ARM Cortex-M
Tomoaki Kitahara; Ryota Hira; Yuko Hara-Azumi; Daiki Miyahara; Yang Li; Kazuo Sakiyama
International Symposium on Computing and Networking, CANDAR Workshops (CANDARW’22), IEEE, 316-322, Nov. 2022, Peer-reviwed
International conference proceedings, English - The Limits of SEMA on Distinguishing Similar Activation Functions of Embedded Deep Neural Networks
Go Takatoi; Takeshi Sugawara; Kazuo Sakiyama; Yuko Hara-Azumi; Yang Li
Applied Sciences, MDPI AG, 12, 9, 4135-4135, 20 Apr. 2022, Artificial intelligence (AI) is progressing rapidly, and in this trend, edge AI has been researched intensively. However, much less work has been performed around the security of edge AI. Machine learning models are a mass of intellectual property, and an optimized network is very valuable. Trained machine learning models need to be black boxes as well because they may give away information about the training data to the outside world. As selecting the appropriate activation functions to enable fast training of accurate deep neural networks is an active area of research, it is important to conceal the information of the activation functions used in a neural network architecture as well. There has been research on the use of physical attacks such as the side-channel attack (SCA) in areas other than cryptography. The SCA is highly effective against edge artificial intelligence due to its property of the device computing close to the user. We studied a previously proposed method to retrieve the activation functions of a black box neural network implemented on an edge device by using simple electromagnetic analysis (SEMA) and improved the signal processing procedure for further noisy measurements. The SEMA attack identifies activation functions by directly observing distinctive electromagnetic (EM) traces that correspond to the operations in the activation function. This method requires few executions and inputs and also has little implementation dependency on the activation functions. We distinguished eight similar activation functions with EM measurements and examined the versatility and limits of this attack. In this work, the machine learning architecture is a multilayer perceptron, evaluated on an Arduino Uno.
Scientific journal - The Limits of Timing Analysis and SEMA on Distinguishing Similar Activation Functions of Embedded Deep Neural Networks
Go Takatoi; Takeshi Sugawara; Kazuo Sakiyama; Yuko Hara-Azumi; Yang Li
Appl. Sci., 12, 4135, 1-20, 20 Apr. 2022, Peer-reviwed
Scientific journal, English - Mixture-Based 5-Round Physical Attack against AES: Attack Proposal and Noise Evaluation
Go Takami; Takeshi Sugawara; Kazuo Sakiyama; Yang Li
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., E105-A, 3, 289-299, 01 Mar. 2022, Peer-reviwed
Scientific journal, English - Evaluation of Side-Channel Attack Resistance on LFI Detection Circuits
羽田野凌太; 平田 遼; 松田航平; 三浦典之; 李陽; 崎山一男
電子情報通信学会論文誌(A), J104-A, 5, 118-126, 01 May 2021, Peer-reviwed
Scientific journal, Japanese - Design and concept proof of an inductive impulse self-destructor in sense-and-react countermeasure against physical attacks
Sho Tada; Yuki Yamashita; Kohei Matsuda; Makoto Nagata; Kazuo Sakiyama; Noriyuki Miura
Japanese Journal of Applied Physics, IOP Publishing, 60, SB, SBBL01-SBBL01, 10 Feb. 2021, Abstract
This paper presents an inductive impulse self-destruction circuit utilized in a sense-and-react IC-level countermeasure against physical attacks on a cryptographic processor. Triggered upon an alarm signal assertion by an integrated attack sensor, the proposed circuit instantaneously generates >10 V high-voltage impulse to permanently destruct the cryptographic processor for enhancing tamper resiliency. A compact design with only a single on-chip inductor and a transistor significantly saves the hardware overhead. The inductor accumulates large electric energy in its magnetic field and the switch transistor suddenly opens the accumulated energy to boost the impulse voltage in an inertial manner. Since the inductor is drawn over the cryptographic core by existing on-chip IC interconnections, no extra area for the inductor and no any optional IC process steps are needed. This fully standard CMOS compatible, complete circuit solution, results in no fabrication cost penalty. A prototype implemented in both discrete components and a 0.18 μm standard CMOS process successfully demonstrated the-proof-of-concept.
Scientific journal - A Key Recovery Algorithm Using Random Key Leakage from AES Key Schedule
Tomoki Uemura; Yohei Watanabe; Yang Li; Noriyuki Miura; Iwamoto Mitsugu; Kazuo Sakiyama; Kazuo Ohta
The International Symposium on Information Theory and Its Applications, (ISITA’20), IEEE, 382-386, Oct. 2020, Peer-reviwed
International conference proceedings, English - An Optimized Implementation of AES-GCM for FPGA Acceleration Using High-Level Synthesis
Tsubasa Takaki; Yang Li; Kazuo Sakiyama; Shoei Nashimoto; Daisuke Suzuki; Takeshi Sugawara
Global Conference on Consumer Electronics (GCCE’20), 176-180, Oct. 2020, Peer-reviwed
International conference proceedings, English - Low-Memory Implementation of Authenticated Encryption Algorithm SAEAES on ARM Cortex-M0 Microcontroller
Marika Yabu; Kazuo Sakiyama; Takeshi Sugawara
Global Conference on Consumer Electronics (GCCE’20), 181-185, Oct. 2020, Peer-reviwed
International conference proceedings, English - Simple Electromagnetic Analysis Against Activation Functions of Deep Neural Networks
Go Takatoi; Takeshi Sugawara; Kazuo Sakiyama; Yang Li
Artificial Intelligence in Hardware Security (AIHWS’20), Springer-Verlag, LNCS, 12418, 181-197, Oct. 2020, Peer-reviwed
International conference proceedings, English - Flush Code Eraser: Fast Attack Response Invalidating Cryptographic Sensitive Data
Kazuo Sakiyama; Tatsuya Fujii; Kohei Matsuda; Noriyuki Miura
IEEE Embedded Systems Letters, 12, 2, 37-40, Jun. 2020, Peer-reviwed
Scientific journal, English - An IC-level countermeasure against laser fault injection attack by information leakage sensing based on laser-induced opto-electric bulk current density
Kohei Matsuda; Sho Tada; Makoto Nagata; Yuichi Komano; Yang Li; Takeshi Sugawara; Mitsugu Iwamoto; Kazuo Ohta; Kazuo Sakiyama; Noriyuki Miura
Japanese Journal of Applied Physics, IOP Publishing, 59, SG, SGGL02-SGGL02, 01 Apr. 2020, Peer-reviwed, Abstract
Laser fault injection (LFI) attacks on cryptographic processor ICs are a critical threat to information systems. This paper proposes an IC-level integrated countermeasure employing an information leakage sensor against an LFI attack. Distributed bulk current sensors monitor abnormal bulk current density caused by laser irradiation for LFI. Time-interleaved sensor operation and sensitivity tuning can obtain partial secret key leakage bit information with small layout area penalty. Based on the leakage information, the secret key can be securely updated to realize high-availability resilient systems. The test chip was designed and fabricated in a 0.18 μm standard CMOS, integrating a 128-bit advanced encryption standard cryptographic processor with the proposed information leakage sensor. This evaluation successfully demonstrated bulk current density and leakage bit monitoring.
Scientific journal - Deep Learning Attack against Large n-XOR PUFs on 180nm Silicon Chips
Risa Yashiro; Yohei Hori; Toshihiro Katashita; Kazuo Sakiyama
RISP International Workshop on Nonlinear Circuits, Communications and Signal Processing (NCSP’20), 598-601, Mar. 2020, Peer-reviwed
International conference proceedings, English - Countermeasure Against Deep Learning-Based Cloning Attack on Arbiter PUF by Using Intentional Errors
八代理紗; 堀洋平; 片下敏宏; 崎山一男
情報処理学会論文誌, 1871-1880, 2020, Peer-reviwed
Scientific journal, English - Validating the DFA Attack Resistance of AES (Short Paper)
Hakuei Sugimoto; Ryota Hatano; Natsu Shoji; Kazuo Sakiyama
International Symposium on Foundations & Practice of Security (FPS’19), IEEE, LNCS12056, 371-378, Nov. 2019, Peer-reviwed
International conference proceedings, English - A Deep Learning Attack Countermeasure with Intentional Noise for a PUF-based Authentication Scheme
Risa Yashiro; Yohei Hori; Toshihiro Katashita; Kazuo Sakiyama
International Conference on Security for Information Technology and Communications (SecITC’19), IEEE, LNCS, 12001, 78-94, Nov. 2019, Peer-reviwed
International conference proceedings, English - Side-Channel Leakage of Alarm Signal for a Bulk-Current-Based Laser Sensor
Yang Li; Ryota Hatano; Sho Tada; Kohei Matsuda; Noriyuki Miura; Takeshi Sugawara; Kazuo Sakiyama
International Conference on Information Security and Cryptology (Inscrypt’19), LNCS12020, 346-361, Nov. 2019, Peer-reviwed
International conference proceedings, English - An Information Leakage Sensor Based on Measurement of Laser-Induced Opto-Electric Bulk Current Density
Kohei Matsuda; Sho Tada; Makoto Nagata; Yang Li; Takeshi Sugawara; Mitsugu Iwamoto; Kazuo Ohta; Kazuo Sakiyama; Noriyuki Miura
International Conference on Solid State Devices and Materials (SSDM’19), IEEE, 501-502, Sep. 2019, Peer-reviwed
International conference proceedings, English - Side-channel leakage from sensor-based countermeasures against fault injection attack
Takeshi Sugawara; Natsu Shoji; Kazuo Sakiyama; Kohei Matsuda; Noriyuki Miura; Makoto Nagata
Microelectronics Journal, Elsevier BV, 90, 63-71, Aug. 2019, Peer-reviwed
Scientific journal, English - Oscillator without a Combinatorial Loop and its Threat to FPGA in Data Center
Takeshi Sugawara; Kazuo Sakiyama; Shoei Nashimoto; Daisuke Suzuki; Tomoyuki Nagatsuka
IET Electronics Letters, Institution of Engineering and Technology (IET), 55, 11, 640-642, 2019, Peer-reviwed
Scientific journal, English - A 286 F2/Cell Distributed Bulk-Current Sensor and Secure Flush Code Eraser against Laser Fault Injection Attack on Cryptographic Processor
Kohei Matsuda; Tatsuya Fujii; Natsu Shoji; Takeshi Sugawara; Kazuo Sakiyama; Yu-ichi Hayashi; Makoto Nagata; Noriyuki Miura
IEEE Journal of Solid-State Circuits, IEEE, 53, 11, 3174-3182, Nov. 2018, Peer-reviwed
Scientific journal, English - Recovering Memory Access Sequence with Differential Flush+Reload Attack
Zhiwei Yuan; Yang Li; Kazuo Sakiyama; Takeshi Sugawara; Jian Wang
International Conference on Information Security Practice and Experience (ISPEC’18), Springer-Verlag, 424-439, Sep. 2018, Peer-reviwed
International conference proceedings, English - A Secure LiDAR with Side-channel Fingerprinting
Ryuga Matsumura; Takeshi Sugawara; Kazuo Sakiyama
International Symposium on Computing and Networking, CANDAR Workshops (CANDARW’18), IEEE, 479-482, Aug. 2018, Peer-reviwed
International conference proceedings, English - Sensor CON-Fusion: Defeating Kalman Filter in Signal Injection Attack
Shoei Nashimoto; Daisuke Suzuki; Takeshi Sugawara; Kazuo Sakiyama
The 13th ACM ASIA Conference on Information, Computer and Communications Security (ACM ASIACCS 2018), 511-524, Jun. 2018, Peer-reviwed
International conference proceedings, English - A 286F2/cell distributed bulk-current sensor and secure flush code eraser against laser fault injection attack
Kohei Matsuda; Tatsuya Fujii; Natsu Shoji; Takeshi Sugawara; Kazuo Sakiyama; Yu-Ichi Hayashi; Makoto Nagata; Noriyuki Miura
Digest of Technical Papers - IEEE International Solid-State Circuits Conference, Institute of Electrical and Electronics Engineers Inc., 61, #21.5, 352-354, 08 Mar. 2018, Peer-reviwed
International conference proceedings, English - Analysis of Mixed PUF-TRNG Circuit Based on SR-Latches in FD-SOI Technology
Jean-Luc Danger; Risa Yashiro; Tarik Graba; Sylvain Guilley; Yves Mathieu; Noriyuki Miura; Abdelmalek Si-Merabet; Kazuo Sakiyama; Makoto Nagata
Euromicro Conference on Digita System Design(DSD'18), IEEE, 508-515, 2018, Peer-reviwed
International conference proceedings, English - Q-class authentication system for double arbiter PUF
Risa Yashiro; Takeshi Sugawara; Mitsugu Iwamoto; Kazuo Sakiyama
IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences, Institute of Electronics, Information and Communication, Engineers, IEICE, E101A, 1, 129-137, 01 Jan. 2018, Peer-reviwed
International conference proceedings, English - Exploiting Bitfip Detector for Non-Invasive Probing and its Application to Ineffective Fault Analysis
Takeshi Sugawara; Natsu Shoji; Kazuo Sakiyama; Kohei Matsuda; Noriyuki Miura; Makoto Nagata
Workshop on Fault Diagnosis and Tolerance in Cryptography(FDTC'17), IEEE, IEEE, 49-56, Sep. 2017, Peer-reviwed
International conference proceedings, English - Improved EM Side-Channel Authentication Using Profile-Based XOR Model
Momoka Kasuya; Kazuo Sakiyama
International Workshop on Information Security Applications(WISA'2017), LNCS 10763, Springer-Verlag, 173-183, Aug. 2017, Peer-reviwed
International conference proceedings, English - Efficient Software Implementation of Modular Multiplication in Prime Fields on TI's DSP TMS320C6678
Eito Miyamoto; Takeshi Sugawara; Kazuo Sakiyama
International Workshop on Information Security Applications(WISA'2017), LNCS 10763, Springer-Verlag, 261-273, Aug. 2017, Peer-reviwed
International conference proceedings, English - Protecting cryptographic integrated circuits with side-channel information
Makoto Nagata; Daisuke Fujimoto; Noriyuki Miura; Naofumi Homma; Yu-ichi Hayashi; Kazuo Sakiyama
IEICE ELECTRONICS EXPRESS, 14, 2, 20162005, Jan. 2017, Peer-reviwed
Scientific journal, English - Protecting cryptographic integrated circuits with side-channel information
Makoto Nagata; Daisuke Fujimoto; Noriyuki Miura; Naofumi Homma; Yu-ichi Hayashi; Kazuo Sakiyama
IEICE ELECTRONICS EXPRESS, 14, 2, 1-13, Jan. 2017, Peer-reviwed
Scientific journal, English - A Performance Evaluation of Cryptographic Algorithms on FPGA and ASIC on RFID Design Flow
Shugo Mikami; Dai Watanabe; Kazuo Sakiyama
2016 4TH INTERNATIONAL CONFERENCE ON INFORMATION AND COMMUNICATION TECHNOLOGY (ICOICT), 1-6, 2016, Peer-reviwed
International conference proceedings, English - Physical Authentication Using Side-Channel Information
Kazuo Sakiyama; Momoka Kasuya; Takanori Machida; Arisa Matsubara; Yunfeng Kuai; Yu-ichi Hayashi; Takaaki Mizuki; Noriyuki Miura; Makoto Nagata
2016 4TH INTERNATIONAL CONFERENCE ON INFORMATION AND COMMUNICATION TECHNOLOGY (ICOICT), 1-6, 2016, Peer-reviwed
International conference proceedings, English - Circuit-Level Information Leakage Prevention for Fault Detection
Kazuo Sakiyama; Rcina Yagasaki; Takanori Machida; Tatsuya Fujii; Noriyuki Miura; Yu-ichi Hayashi
2016 URSI ASIA-PACIFIC RADIO SCIENCE CONFERENCE (URSI AP-RASC), 1271-1274, 2016, Peer-reviwed
International conference proceedings, English - New Metric for Side-Channel Information Leakage: Case Study on KM Radiation from AES Hardware
Momoka Kasuya; Takanori Machida; Kazuo Sakiyama
2016 URSI ASIA-PACIFIC RADIO SCIENCE CONFERENCE (URSI AP-RASC), 1288-1291, 2016, Peer-reviwed
International conference proceedings, English - Deep-Learning-Based Security Evaluation on Authentication Systems Using Arbiter PUF and Its Variants
Risa Yashiro; Takanori Machida; Mitsugu Iwamoto; Kazuo Sakiyama
ADVANCES IN INFORMATION AND COMPUTER SECURITY, IWSEC 2016, 9836, Springer-Verlag, 267-285, 2016, Peer-reviwed
International conference proceedings, English - On-Chip Substrate-Bounce Monitoring for Laser-Fault Countermeasure
Kohei Matsuda; Noriyuki Miura; Makoto Nagata; Yu-ichi Hayashi; Tatsuya Fujii; Kazuo Sakiyama
PROCEEDINGS OF THE 2016 IEEE ASIAN HARDWARE ORIENTED SECURITY AND TRUST SYMPOSIUM (ASIANHOST 2016), IEEE, 1-6, 2016, Peer-reviwed
International conference proceedings, English - Advanced fault analysis techniques on AES
Kazuo Sakiyama; Takanori Machida; Arisa Matsubara
IEEE International Symposium on Electromagnetic Compatibility, Institute of Electrical and Electronics Engineers Inc., 2015-, 230-234, 10 Sep. 2015, Peer-reviwed
International conference proceedings, English - A new method for enhancing variety and maintaining reliability of PUF responses and its evaluation on ASICs Journal of Cryptographic Engineering
Dai Yamamoto; Kazuo Sakiyama; Mitsugu Iwamoto; Kazuo Ohta; Masahiko Takenaka; Kouichi Itoh; Naoya Torii
J. Cryptographic Engineering, 5, 3, 187-199, Sep. 2015, Peer-reviwed
Scientific journal, English - Implementation of Double Arbiter PUF and Its Performance Evaluation on FPGA
Takanori Machida; Dai Yamamoto; Mitsugu Iwamoto; Kazuo Sakiyama
2015 20TH ASIA AND SOUTH PACIFIC DESIGN AUTOMATION CONFERENCE (ASP-DAC), 6-9, 2015, Peer-reviwed
International conference proceedings, English - Advanced Fault Analysis Techniques on AES
Kazuo Sakiyama; Takanori Machida; Arisa Matsubara
2015 IEEE INTERNATIONAL SYMPOSIUM ON ELECTROMAGNETIC COMPATIBILITY (EMC), 230-234, 2015, Peer-reviwed
International conference proceedings, English - Artifact-Metric-Based Authentication for Bottles of Wine (Short Paper)
Reina Yagasaki; Kazuo Sakiyama
ADVANCES IN INFORMATION AND COMPUTER SECURITY (IWSEC 2015), 9241, Springer-Verlag, 335-344, 2015, Peer-reviwed
International conference proceedings, English - A New Arbiter PUF for Enhancing Unpredictability on FPGA
Takanori Machida; Dai Yamamoto; Mitsugu Iwamoto; Kazuo Sakiyama
Scientific World Journal, Hindawi Publishing Corporation, 2015, Article ID 864812, 13 pages, 2015, Peer-reviwed
Scientific journal, English - Fully integrated passive UHF RFID tag for hash-based mutual authentication protocol
Shugo Mikami; Dai Watanabe; Yang Li; Kazuo Sakiyama
Scientific World Journal, Hindawi Publishing Corporation, 2015, Article ID 498610, 11 pages, 2015, Peer-reviwed
Scientific journal, English - Correlation power analysis using bit-level biased activity plaintexts against AES cores with countermeasures
Daisuke Fujimoto; Noriyuki Miura; Makoto Nagata; Yuichi Hayashi; Naofumi Homma; Takafumi Aoki; Yohei Hori; Toshihiro Katashita; Kazuo Sakiyama; Thanh-Ha Le; Julien Bringer; Pirouz Bazargan-Sabet; Shivam Bhasin; Jean-Luc Danger
IEEE International Symposium on Electromagnetic Compatibility, Institute of Electrical and Electronics Engineers Inc., 2014-, 306-309, 23 Dec. 2014
International conference proceedings, English - New Side-Channel Analysis Using Clockwise Collision Leakage Model and Weak Keys on Parallelized AES Hardware
Toshiki Nakasone; Yang Li; Kazuo Ohta; Kazuo Sakiyama
電子情報通信学会論文誌(A), J97-A, 11, 695-703, Nov. 2014, Peer-reviwed
Scientific journal, Japanese - Software and hardware co-verification for privacy-enhanced passive UHF RFID tag
Yang Li; Toshiki Naksone; Kazuo Sakiyama
IEEE International Symposium on Electromagnetic Compatibility, Institute of Electrical and Electronics Engineers Inc., 2014-, September, 752-757, 15 Sep. 2014, Peer-reviwed
International conference proceedings, English - A Silicon-level Countermeasure against Fault Sensitivity Analysis and Its Evaluation
Sho Endo; Yang Li; Naofumi Homma; Kazuo Sakiyama; Kazuo Ohta; Daisuke Fujimoto; Makoto Nagata; Toshihiro Katashita; Jean-Luc Danger; Takafumi Aoki
IEEE Trans. Very Large Scale Integr. (VLSI) Syst., IEEE Trans., 23, 8, 1429-1438, Aug. 2014, Peer-reviwed
Scientific journal, English - Practical improvements of side-channel attacks on AES: feedback from the 2nd DPA contest
Christophe Clavier; Jean-Luc Danger; Guillaume Duc; M. Abdelaziz; Elaabid; Benoît Gérard; Sylvain Guilley; Annelie Heuser; Michael Kasper; Yang Li; Victor Lomné; Daisuke Nakatsu; Kazuo Ohta; Kazuo Sakiyama; Laurent Sauvage; Werner Schindler; Marc Stöttinger; Nicolas Veyrat-Charvillon; Matthieu Walle; Antoine Wurcker
J. Cryptographic Engineering, 4, 1, 1-16, Apr. 2014, Peer-reviwed
Scientific journal, English - Power Noise Measurements of Cryptographic VLSI Circuits Regarding Side-Channel Information Leakage
Daisuke Fujimoto; Noriyuki Miura; Makoto Nagata; Yuichi Hayashi; Naofumi Homma; Takafumi Aoki; Yohei Hori; Toshihiro Katashita; Kazuo Sakiyama; Thanh-Ho Le; Julien Bringer; Pirouz Bazargan-Sabet; Shivam Bhasin; Jean-Luc Danger
IEICE TRANSACTIONS ON ELECTRONICS, E97C, 4, 272-279, Apr. 2014, Peer-reviwed
Scientific journal, English - Practical improvements of side-channel attacks on AES: feedback from the 2nd DPA contest
Christophe Clavier; Jean-Luc Danger; Guillaume Duc; M. Abdelaziz Elaabid; Benoît Gérard; Sylvain Guilley; Annelie Heuser; Michael Kasper; Yang Li; Victor Lomné; Daisuke Nakatsu; Kazuo Ohta; Kazuo Sakiyama; Laurent Sauvage; Werner Schindler; Marc Stöttinger; Nicolas Veyrat-Charvillon; Matthieu Walle; Antoine Wurcker
Journal of Cryptographic Engineering, Springer Verlag, 4, 4, 259-274, 2014, Peer-reviwed
Scientific journal, English - Yet another fault-based leakage in non-uniform faulty ciphertexts
Yang Li; Yu-Ichi Hayashi; Arisa Matsubara; Naofumi Homma; Takafumi Aoki; Kazuo Ohta; Kazuo Sakiyama
Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), Springer Verlag, 8352, Springer-Verlag, 272-287, 2014, Peer-reviwed
International conference proceedings, English - Privacy-Mode Switching: Toward Flexible Privacy Protection for RFID Tags in Internet of Things
Yang Li; Toshiki Nakasone; Kazuo Ohta; Kazuo Sakiyama
2014 IEEE 11TH CONSUMER COMMUNICATIONS AND NETWORKING CONFERENCE (CCNC), 941-942, 2014, Peer-reviwed
International conference proceedings, English - Correlation Power Analysis using Bit-Level Biased Activity Plaintexts against AES Cores with Countermeasures
Daisuke Fujimoto; Noriyuki Miura; Makoto Nagata; Yuichi Hayashi; Naofumi Homma; Takafumi Aoki; Yohei Hori; Toshihiro Katashita; Kazuo Sakiyama; Thanh-Ha Le; Julien Bringer; Pirouz Bazargan-Sabet; Shivam Bhasin; Jean-Luc Danger
2014 INTERNATIONAL SYMPOSIUM ON ELECTROMAGNETIC COMPATIBILITY, TOKYO (EMC'14/TOKYO), 14P2-A3, 306-309, 2014, Peer-reviwed
International conference proceedings, English - Software and Hardware Co-Verification for Privacy-Enhanced Passive UHF RFID Tag
Yang Li; Toshiki Naksone; Kazuo Sakiyama
2014 IEEE INTERNATIONAL SYMPOSIUM ON ELECTROMAGNETIC COMPATIBILITY (EMC), 752-757, 2014, Peer-reviwed
International conference proceedings, English - A technique using PUFs for protecting circuit layout designs against reverse engineering
Dai Yamamoto; Masahiko Takenaka; Kazuo Sakiyama; Naoya Torii
Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), Springer Verlag, 8639, Springer-Verlag, 158-173, 2014, Peer-reviwed
International conference proceedings, English - Security Evaluation of Bistable Ring PUFs on FPGAs using Differential and Linear Analysis
Dai Yamamoto; Masahiko Takenaka; Kazuo Sakiyama; Naoya Torii
FEDERATED CONFERENCE ON COMPUTER SCIENCE AND INFORMATION SYSTEMS, 2014, 2, 911-918, 2014, Peer-reviwed
International conference proceedings, English - A New Mode of Operation for Arbiter PUF to Improve Uniqueness on FPGA
Takanori Machida; Dai Yamamoto; Mitsugu Iwamoto; Kazuo Sakiyama
FEDERATED CONFERENCE ON COMPUTER SCIENCE AND INFORMATION SYSTEMS, 2014, 2, 871-878, 2014, Peer-reviwed
International conference proceedings, English - Single-Chip Implementation and Evaluation of Passive UHF RFID Tag with Hash-Based Mutual Authentication
Yang Li; Shugo Mikami; Dai Watanabe; Kazuo Ohta; Kazuo Sakiyama
Cryptology and Information Security Series, IOS Press, 12, 3-15, 2014, Peer-reviwed
Scientific journal, English - Practical DFA strategy for AES under limited-access conditions
Kazuo Sakiyama; Yang Li; Shigeto Gomisawa; Yu-Ichi Hayashi; Mitsugu Iwamoto; Naofumi Homma; Takafumi Aoki; Kazuo Ohta
Journal of Information Processing, Information Processing Society of Japan, 22, 2, 142-151, 2014, Peer-reviwed
Scientific journal, English - Variety enhancement of PUF responses using the locations of random outputting RS latches
Dai Yamamoto; Kazuo Sakiyama; Mitsugu Iwamoto; Kazuo Ohta; Masahiko Takenaka; Kouichi Itoh
Journal of Cryptographic Engineering, 3, 4, 197-211, Nov. 2013, Peer-reviwed
Scientific journal, English - Exploration of the CC-EMA Attack Towards Efficient Evaluation of EM Information Leakage
Toshiki Nakasone; Kazuo Sakiyama; Yang Li; Kazuo Ohta
International Symposium on Electromagnetic Compatibility (EMC EUROPE) 2013, 411-414, Sep. 2013, Peer-reviwed
International conference proceedings, English - On-chip power noise measurements of cryptographic VLSI circuits and interpretation for side-channel analysis
Daisuke Fujimoto; Noriyuki Miura; Makoto Nagata; Yuichi Hayashi; Naofumi Homma; Yohei Hori; Toshihiro Katashita; Kazuo Sakiyama; Thanh-Ha Le; Julien Bringer; Pirouz Bazargan-Sabet; Jean-Luc Danger
International Symposium on Electromagnetic Compatibility (EMC EUROPE) 2013, 405-410, Sep. 2013, Peer-reviwed
International conference proceedings, English - Meet-in-the-Middle Preimage Attacks Revisited: New Results on MD5 and HAVAL
Yu Sasaki; Wataru Komatsubara; Lei Wang; Mitsugu Iwamoto; Kazuo Ohta; Kazuo Sakiyama
International Conference on Security and Cryptography (SECRYPT’13), SciTePress, SciTePress, 111-122, Jul. 2013, Peer-reviwed
International conference proceedings, English - Key-dependent weakness of AES-based ciphers under clockwise collision distinguisher
Toshiki Nakasone; Yang Li; Yu Sasaki; Mitsugu Iwamoto; Kazuo Ohta; Kazuo Sakiyama
Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), 7839, Springer-Verlag, 395-409, 2013, Peer-reviwed
International conference proceedings, English - An extension of fault sensitivity analysis based on clockwise collision
Yang Li; Kazuo Ohta; Kazuo Sakiyama
Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), 7763, Springer-Verlag, 46-59, 2013, Peer-reviwed
International conference proceedings, English - Exploring the relations between fault sensitivity and power consumption
Yang Li; Sho Endo; Nicolas Debande; Naofumi Homma; Takafumi Aoki; Thanh-Ha Le; Jean-Luc Danger; Kazuo Ohta; Kazuo Sakiyama
Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), 7864, Springer-Verlag, 137-153, 2013, Peer-reviwed
International conference proceedings, English - Coupon collector's problem for fault analysis against AES - High tolerance for noisy fault injections
Yu Sasaki; Yang Li; Hikaru Sakamoto; Kazuo Sakiyama
Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), 7859, Springer-Verlag, 213-220, 2013, Peer-reviwed
International conference proceedings, English - A comparative study of stream ciphers and hash functions for RFID authentications
Shugo Mikami; Dai Watanabe; Kazuo Sakiyama
Cryptology and Information Security Series, 11, 83-94, 2013, Peer-reviwed
Scientific journal, English - A New Type of Fault-Based Attack: Fault Behavior Analysis
Yang Li; Kazuo Ohta; Kazuo Sakiyama
IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES, E96A, 1, 177-184, Jan. 2013
Scientific journal, English - Correlation power analysis and countermeasure on the stream cipher enocoro-128v2
Shugo Mikami; Hirotaka Yoshida; Dai Watanabe; Kazuo Sakiyama
IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences, Institute of Electronics, Information and Communication, Engineers, IEICE, E96-A, 3, 697-704, 2013, Peer-reviwed
Scientific journal, English - Boomerang Distinguishers for Full HAS-160 Compression Function
Yu Sasaki; Lei Wang; Yasuhiro Takasaki; Kazuo Sakiyama; Kazuo Ohta
International Workshop on Security 2012 (IWSEC’12), LNCS 7631, Springer-Verlag, 170-181, Nov. 2012, Peer-reviwed
International conference proceedings, English - Fault Sensitivity Analysis Using Multiple Factors
Ayaka Koike; Yang Li; Daisuke Nakatsu; Kazuo Ohta; Kazuo Sakiyama
電子情報通信学会論文誌(A), The Institute of Electronics, Information and Communication Engineers, 95, 10, 751-755, Oct. 2012, Peer-reviwed, 暗号実装の耐タンパー性を確保するためには,故障発生時の評価が不可欠である.数ある故障誘発要因の中で,特に本論文では暗号デバイスに供給するクロック信号と電流及びデバイス動作時の環境温度を複合的に利用した故障感度解析を提案する.
Scientific journal, Japanese - Fair and Consistent Hardware Evaluation of Fourteen Round Two SHA-3 Candidates
Miroslav Knezevic; Kazuyuki Kobayashi; Jun Ikegami; Shin'ichiro Matsuo; Akashi Satoh; Uenal Kocabas; Junfeng Fan; Toshihiro Katashita; Takeshi Sugawara; Kazuo Sakiyama; Ingrid Verbauwhede; Kazuo Ohta; Naofumi Homma; Takafumi Aoki
IEEE TRANSACTIONS ON VERY LARGE SCALE INTEGRATION (VLSI) SYSTEMS, 20, 5, 827-840, May 2012, Peer-reviwed
Scientific journal, English - New Fault-Based Side-Channel Attack Using Fault Sensitivity
Yang Li; Kazuo Ohta; Kazuo Sakiyama
IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 7, 1, 88-97, Feb. 2012, Peer-reviwed
Scientific journal, English - Information-Theoretic Approach to Optimal Differential Fault Analysis
Kazuo Sakiyama; Yang Li; Mitsugu Iwamoto; Kazuo Ohta
IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 7, 1, 109-120, Feb. 2012, Peer-reviwed
Scientific journal, English - Fault injection and key retrieval experiments on an evaluation board
Junko Takahashi; Toshinori Fukunaga; Shigeto Gomisawa; Yang Li; Kazuo Sakiyama; Kazuo Ohta
Information Security and Cryptography, Springer International Publishing, 17, 313-331, 2012, Peer-reviwed
In book, English - Boomerang distinguishers for full HAS-160 compression function
Yu Sasaki; Lei Wang; Yasuhiro Takasaki; Kazuo Sakiyama; Kazuo Ohta
Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), 7631, 156-169, 2012, Peer-reviwed
International conference proceedings, English - A study on computational formal verification for practical cryptographic protocol: The case of synchronous RFID authentication
Yoshikazu Hanatanii; Miyako Ohkubo; Shin'Ichiro Matsuo; Kazuo Sakiyama; Kazuo Ohta
Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), 7126, Springer-Verlag, 70-87, 2012, Peer-reviwed
International conference proceedings, English - New truncated differential cryptanalysis on 3D block cipher
Takuma Koyama; Lei Wang; Yu Sasaki; Kazuo Sakiyama; Kazuo Ohta
Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), 7232, Springer-Verlag, 109-125, 2012, Peer-reviwed
International conference proceedings, English - Three-subset meet-in-the-middle attack on reduced XTEA
Yu Sasaki; Lei Wang; Yasuhide Sakai; Kazuo Sakiyama; Kazuo Ohta
Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), 7374, Springer-Verlag, 138-154, 2012, Peer-reviwed
International conference proceedings, English - Measurement of Side-Channel Information from Cryptographic Devices on Security Evaluation Platform: Demonstration of SPACES Project
Sho Endo; Yu-ichi Hayashi; Naofumi Homma; Takafumi Aoki; Toshihiro Katashita; Yohei Hori; Kazuo Sakiyama; Makoto Nagata; Jean-Luc Danger; Thanh-Ha Le; Pirouz Bazargan Sabet
2012 PROCEEDINGS OF SICE ANNUAL CONFERENCE (SICE), 313-316, 2012, Peer-reviwed
International conference proceedings, English - An Efficient Countermeasure against Fault Sensitivity Analysis Using Configurable Delay Blocks
Sho Endo; Yang Li; Naofumi Homma; Kazuo Sakiyama; Kazuo Ohta; Takafumi Aoki
2012 WORKSHOP ON FAULT DIAGNOSIS AND TOLERANCE IN CRYPTOGRAPHY (FDTC), 95-102, 2012, Peer-reviwed
International conference proceedings, English - Polynomial-advantage cryptanalysis of 3D cipher and 3D-based hash function
Lei Wang; Yu Sasaki; Kazuo Sakiyama; Kazuo Ohta
Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), 7631, Springer-Verlag, 170-181, 2012, Peer-reviwed
International conference proceedings, English - Meet-in-the-Middle (Second) Preimage Attacks on Two Double-Branch Hash Functions RIPEMD and RIPEMD-128
Lei Wang; Yu Sasaki; Wataru Komatsubara; Kazuo Sakiyama; Kazuo Ohta
IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES, E95A, 1, 100-110, Jan. 2012, Peer-reviwed
Scientific journal, English - Toward Effective Countermeasures against an Improved Fault Sensitivity Analysis
Yang Li; Kazuo Ohta; Kazuo Sakiyama
IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES, E95A, 1, 234-241, Jan. 2012, Peer-reviwed
Scientific journal, English - Differential Fault Analysis on Stream Cipher MUGI
Junko Takahashi; Toshinori Fukunaga; Kazuo Sakiyama
IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES, E95A, 1, 242-251, Jan. 2012, Peer-reviwed
Scientific journal, English - Intentional Electromagnetic Interference for Fault Analysis on AES Block Cipher IC
Yu-ichi Hayashi; Shigeto Gomisawa; Yang Li; Naofumi Homma; Kazuo Sakiyama; Takafumi Aoki; Kazuo Ohta
International Workshop on Electromagnetic Compatibility of Integrated Circuits (EMCCOMPO'11), 235-240, Nov. 2011, Peer-reviwed
International conference proceedings, English - First Experimental Results of Correlation-Enhanced EMA Collision Attack
Toshiki Nakasone; Daisuke Nakatsu; Yang Li; Kazuo Ohta; Kazuo Sakiyama
Poster Session, CHES2011, LNCS 6917, Springer-Verlag, XXX, Sep. 2011, Peer-reviwed
International conference proceedings, English - Tripartite modular multiplication
Kazuo Sakiyama; Miroslav Knezevic; Junfeng Fan; Bart Preneel; Ingrid Verbauwhede
INTEGRATION-THE VLSI JOURNAL, 44, 4, 259-269, Sep. 2011, Peer-reviwed
Scientific journal, English - Preimage Attacks on 5-Pass HAVAL Reduced to 158-Steps and One-Block 3-Pass HAVAL
Yasuhide Sakai; Yu Sasaki; Lei Wang; Kazuo Ohta; Kazuo Sakiyama
Industrial Track Session, ACNS2011, 14 pages, Jun. 2011, Peer-reviwed
International conference proceedings, English - Rebound attack on 3D block cipher
Takuma Koyama; Yu Sasaki; Kazuo Sakiyama; Kazuo Ohta
TriSAI 2011 - Proceedings of Triangle Symposium on Advanced ICT 2011, 220-224, 2011
International conference proceedings, English - Combination of SW Countermeasure and CPU Modification on FPGA against Power Analysis
Daisuke Nakatsu; Yang Li; Kazuo Sakiyama; Kazuo Ohta
INFORMATION SECURITY APPLICATIONS, 6513, Springer-Verlag, 258-272, 2011, Peer-reviwed
International conference proceedings, English - Fault Analysis on Stream Cipher MUGI
Junko Takahashi; Toshinori Fukunaga; Kazuo Sakiyama
INFORMATION SECURITY AND CRYPTOLOGY - ICISC 2010, 6829, Springer-Verlag, 420-+, 2011, Peer-reviwed
International conference proceedings, English - (Second) Preimage Attacks on Step-Reduced RIPEMD/RIPEMD-128 with a New Local-Collision Approach
Lei Wang; Yu Sasaki; Wataru Komatsubara; Kazuo Ohta; Kazuo Sakiyama
TOPICS IN CRYPTOLOGY - CT-RSA 2011, 6558, Springer-Verlag, 197-+, 2011, Peer-reviwed
International conference proceedings, English - Revisit fault sensitivity analysis on WDDL-AES
Yang Li; Kazuo Ohta; Kazuo Sakiyama
2011 IEEE International Symposium on Hardware-Oriented Security and Trust, HOST 2011, 148-153, 2011, Peer-reviwed
International conference proceedings, English - Fault sensitivity analysis against elliptic curve cryptosystems
Hikaru Sakamoto; Yang Li; Kazuo Ohta; Kazuo Sakiyama
Proceedings - 2011 Workshop on Fault Diagnosis and Tolerance in Cryptography, FDTC 2011, 11-20, 2011, Peer-reviwed
International conference proceedings, English - On the Power of Fault Sensitivity Analysis and Collision Side-Channel Attacks in a Combined Setting
Amir Moradi; Oliver Mischke; Christof Paar; Yang Li; Kazuo Ohta; Kazuo Sakiyama
CRYPTOGRAPHIC HARDWARE AND EMBEDDED SYSTEMS - CHES 2011, 6917, Springer-Verlag, 292-+, 2011, Peer-reviwed
International conference proceedings, English - Uniqueness Enhancement of PUF Responses Based on the Locations of Random Outputting RS Latches
Dai Yamamoto; Kazuo Sakiyama; Mitsugu Iwamoto; Kazuo Ohta; Takao Ochiai; Masahiko Takenaka; Kouichi Itoh
CRYPTOGRAPHIC HARDWARE AND EMBEDDED SYSTEMS - CHES 2011, 6917, Springer-Verlag, 390-+, 2011, Peer-reviwed
International conference proceedings, English - Experimental Verification of Super-Sbox Analysis - Confirmation of Detailed Attack Complexity
Yu Sasaki; Naoyuki Takayanagi; Kazuo Sakiyama; Kazuo Ohta
ADVANCES IN INFORMATION AND COMPUTER SECURITY, 7038, Springer-Verlag, 178-+, 2011, Peer-reviwed
International conference proceedings, English - An Efficient Authentication for Lightweight Devices by Perfecting Zero-Knowledgeness
Bagus Santoso; Kazuo Ohta; Kazuo Sakiyama; Goichiro Hanaoka
IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES, E94A, 1, 92-103, Jan. 2011, Peer-reviwed
Scientific journal, English - Power Analysis against a DPA-Resistant S-Box Implementation Based on the Fourier Transform
Yang Li; Kazuo Sakiyama; Shinichi Kawamura; Kazuo Ohta
IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES, E94A, 1, 191-199, Jan. 2011, Peer-reviwed
Scientific journal, English - New Approach of Super-Sbox Analysis on AES-Based Permutations: Applications to ECHO and Grøstl
Yu Sasaki; Li Yang; Lei Wang; Kazuo Sakiyama; Kazuo Ohta
Advances in Cryptology -- ASIACRYPT'10, LNCS 6477, Springer-Verlag, 38-55, Dec. 2010, Peer-reviwed
International conference proceedings, English - Cryptanalysis of Two MD5-Based Authentication Protocols: APOP and NMAC
Lei Wang; Kazuo Ohta; Yu Sasaki; Kazuo Sakiyama; Noboru Kunihiro
IEICE TRANSACTIONS ON INFORMATION AND SYSTEMS, E93D, 5, 1087-1095, May 2010, Peer-reviwed
Scientific journal, English - Effective verification for known-key distinguisher by using extended differential path
Naoyuki Takayanagi; Yang Li; Kazuo Sakiyama; Kazuo Ohta
TriSAI 2010 - Proceedings of Triangle Symposium on Advanced ICT 2010, 284-287, 2010
International conference proceedings, English - Another differential fault analysis on Trivium
Qi Li; Kazuo Sakiyama; Lei Wang; Kazuo Ohta
TriSAI 2010 - Proceedings of Triangle Symposium on Advanced ICT 2010, 247-252, 2010
International conference proceedings, English - Improving Efficiency of an 'On the Fly' Identification Scheme by Perfecting Zero-Knowledgeness
Bagus Santoso; Kazuo Ohta; Kazuo Sakiyama; Goichiro Hanaoka
TOPICS IN CRYPTOLOGY - CT-RSA 2010, PROCEEDINGS, 5985, Springer-Verlag, 284-+, 2010, Peer-reviwed
International conference proceedings, English - Improved Countermeasure against Address-bit DPA for ECC Scalar Multiplication
Masami Izumi; Jun Ikegami; Kazuo Sakiyama; Kazuo Ohta
2010 DESIGN, AUTOMATION & TEST IN EUROPE (DATE 2010), 981-984, 2010, Peer-reviwed
International conference proceedings, English - Power Variance Analysis Breaks a Masked ASIC Implementation of AES
Yang Li; Kazuo Sakiyama; Lejla Batina; Daisuke Nakatsu; Kazuo Ohta
2010 DESIGN, AUTOMATION & TEST IN EUROPE (DATE 2010), 1059-1064, 2010, Peer-reviwed
International conference proceedings, English - Prototyping platform for performance evaluation of SHA-3 candidates
Kazuyuki Kobayashi; Jun Ikegami; Miroslav Kneževíc; Eric Xu Guo; Shin'ichiro Matsuo; Sinan Huang; Leyla Nazhandali; Ünal Kocabaş; Junfeng Fan; Akashi Satoh; Ingrid Verbauwhede; Kazuo Sakiyama; Kazuo Ohta
Proceedings of the 2010 IEEE International Symposium on Hardware-Oriented Security and Trust, HOST 2010, 60-63, 2010, Peer-reviwed
International conference proceedings, English - Fault Sensitivity Analysis
Yang Li; Kazuo Sakiyama; Shigeto Gomisawa; Toshinori Fukunaga; Junko Takahashi; Kazuo Ohta
CRYPTOGRAPHIC HARDWARE AND EMBEDDED SYSTEMS - CHES 2010, 6225, Springer-Verlag, 320-+, 2010, Peer-reviwed
International conference proceedings, English - Non-full-active Super-Sbox Analysis: Applications to ECHO and Grostl
Yu Sasaki; Yang Li; Lei Wang; Kazuo Sakiyama; Kazuo Ohta
ADVANCES IN CRYPTOLOGY - ASIACRYPT 2010, 6477, Springer-Verlag, 38-+, 2010, Peer-reviwed
International conference proceedings, English - On Clock-Based Fault Analysis Attack for an AES Hardware Using RSL
Kazuo Sakiyama; Kazuo Ohta
IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES, E93A, 1, 172-179, Jan. 2010, Peer-reviwed
Scientific journal, English - An extension of differential fault analysis attack of AES
Shigeto Gomisawa; Masami Izumi; Kazuo Sakiyama; Kazuo Ota
TriSAI 2009 - Proceedings of Triangle Symposium on Advanced ICT 2009, 185-188, 2009
International conference proceedings, English - Cryptanalysis of Duc-Kim key exchange protocol proposed at TriSAI '08
Tomotaka Hanawa; Kazuo Sakiyama; Kazuo Ohta
TriSAI 2009 - Proceedings of Triangle Symposium on Advanced ICT 2009, 39-42, 2009
International conference proceedings, English - Visual secret sharing schemes allowing arbitrary rotation angles of shares
Yang Li; Mitsugu Iwamoto; Kazuo Ohta; Kazuo Sakiyama
TriSAI 2009 - Proceedings of Triangle Symposium on Advanced ICT 2009, 33-38, 2009
International conference proceedings, English - Comparison of masked S-boxes in hardware implementation
Daisuke Nakatsu; Yang Li; Kazuo Sakiyama; Kazuo Ohta
TriSAI 2009 - Proceedings of Triangle Symposium on Advanced ICT 2009, 176-181, 2009
International conference proceedings, English - A New Approach for Implementing the MPL Method toward Higher SPA Resistance
Masami Izumi; Kazuo Sakiyama; Kazuo Ohta
2009 INTERNATIONAL CONFERENCE ON AVAILABILITY, RELIABILITY, AND SECURITY (ARES), VOLS 1 AND 2, 181-186, 2009, Peer-reviwed
International conference proceedings, English - Fault Analysis Attack against an AES Prototype Chip Using RSL
Kazuo Sakiyama; Tatsuya Yagi; Kazuo Ohta
TOPICS IN CRYPTOLOGY - CT-RSA 2009, PROCEEDINGS, 5473, Springer-Verlag, 429-443, 2009, Peer-reviwed
International conference proceedings, English - Bit-Free Collision: Application to APOP Attack
Lei Wang; Yu Sasaki; Kazuo Sakiyama; Kazuo Ohta
ADVANCES IN INFORMATION AND COMPUTER SECURITY, PROCEEDINGS, 5824, Springer-Verlag, 3-21, 2009, Peer-reviwed
International conference proceedings, English - Security Evaluation of a DPA-Resistant S-Box Based on the Fourier Transform
Yang Li; Kazuo Sakiyama; Shinichi Kawamura; Yuichi Komano; Kazuo Ohta
INFORMATION AND COMMUNICATIONS SECURITY, PROCEEDINGS, 5927, Springer-Verlag, 3-+, 2009, Peer-reviwed
International conference proceedings, English - Elliptic-curve-based security processor for RFID
Yong Ki Lee; Kazuo Sakiyama; Lejla Batina; Ingrid Verbauwhede
IEEE TRANSACTIONS ON COMPUTERS, 57, 11, 1514-1527, Nov. 2008, Peer-reviwed
Scientific journal, English - Elliptic curve cryptography on embedded multicore systems
Junfeng Fan; Kazuo Sakiyama; Ingrid Verbauwhede
DESIGN AUTOMATION FOR EMBEDDED SYSTEMS, 12, 3, 231-242, Sep. 2008, Peer-reviwed
Scientific journal, English - Does The Montgomery Powering Ladder Method Really Offer SPA Resistance?
Masami Izumi; Kazuo Ohta; Kazuo Sakiyama
TriSAI 2008, 328-333, 2008
International conference proceedings, English - FPGA design for algebraic tori-based Public-Key Cryptography
Junfeng Fan; Lejla Batina; Kazuo Sakiyama; Ingrid Verbauwhede
2008 DESIGN, AUTOMATION AND TEST IN EUROPE, VOLS 1-3, 1134-1139, 2008, Peer-reviwed
International conference proceedings, English - On the High-Throughput Implementation of RIPEMD-160 Hash Algorithm
M. Knezevic; K. Sakiyama; Y. K. Lee; I. Verbauwhede
2008 INTERNATIONAL CONFERENCE ON APPLICATION-SPECIFIC SYSTEMS, ARCHITECTURES AND PROCESSORS, 85-+, 2008, Peer-reviwed
International conference proceedings, English - Modular reduction in GF(2(n)) without pre-computational phase
M. Knezevic; K. Sakiyama; J. Fan; I. Verbauwhede
ARITHMETIC OF FINITE FIELDS, PROCEEDINGS, 5130, Springer-Verlag, 77-87, 2008, Peer-reviwed
International conference proceedings, English - HW/SW co-design for public-key cryptosystems on the 8051 micro-controller
K. Sakiyama; L. Batina; B. Preneel; I. Verbauwhede
COMPUTERS & ELECTRICAL ENGINEERING, 33, 5-6, 324-332, Sep. 2007, Peer-reviwed
Scientific journal, English - Multicore curve-based cryptoprocessor with reconfigurable modular arithmetic logic units over GF (2(n))
Kazuo Sakiyama; Lejla Batina; Bart Preneel; Ingrid Verbauwhede
IEEE TRANSACTIONS ON COMPUTERS, 56, 9, 1269-1282, Sep. 2007, Peer-reviwed
Scientific journal, English - High-performance public-key cryptoprocessor for wireless mobile applications
Kazuo Sakiyama; Lejla Batina; Bart Preneel; Ingrid Verbauwhede
MOBILE NETWORKS & APPLICATIONS, 12, 4, 245-258, Aug. 2007, Peer-reviwed
Scientific journal, English - Reconfigurable modular arithmetic logic unit supporting high-performance RSA and ECC over GF(p)
K. Sakiyama; N. Mentens; L. Batina; B. Preneel; I. Verbauwhede
INTERNATIONAL JOURNAL OF ELECTRONICS, 94, 5, 501-514, May 2007, Peer-reviwed
Scientific journal, English - Efficient Pipelining for Modular Multiplication Architectures in Prime Fields
Nele Mentens; Kazuo Sakiyama; Bart Preneel; Ingrid Verbauwhede
GLSVLSI'07: PROCEEDINGS OF THE 2007 ACM GREAT LAKES SYMPOSIUM ON VLSI, 534-539, 2007, Peer-reviwed
International conference proceedings, English - Side-channel Resistant System-level Design Flow for Public-key Cryptography
Kazuo Sakiyama; Elke De Mulder; Bart Preneel; Ingrid Verbauwhede
GLSVLSI'07: PROCEEDINGS OF THE 2007 ACM GREAT LAKES SYMPOSIUM ON VLSI, 144-147, 2007, Peer-reviwed
International conference proceedings, English - Public-key cryptography on the top of a needle
Lejla Batina; Nele Mentens; Kazuo Sakiyarna; Bart Preneel; Ingrid Verbauwhede
2007 IEEE INTERNATIONAL SYMPOSIUM ON CIRCUITS AND SYSTEMS, VOLS 1-11, 1831-1834, 2007, Peer-reviwed
International conference proceedings, English - A side-channel attack resistant programmable PKC coprocessor for embedded applications
Nele Mentens; Kazuo Sakiyama; Lejla Batina; Bart Preneel; Ingrid Verbauwhede
IC-SAMOS: 2007 INTERNATIONAL CONFERENCE ON EMBEDDED COMPUTER SYSTEMS: ARCHITECTURES, MODELING AND SIMULATION, PROCEEDINGS, 194-+, 2007, Peer-reviwed
International conference proceedings, English - Montgomery modular multiplication algorithm on multi-core systems
Junfeng Fan; Kazuo Sakiyama; Ingrid Verbauwhede
2007 IEEE WORKSHOP ON SIGNAL PROCESSING SYSTEMS, VOLS 1 AND 2, 261-266, 2007, Peer-reviwed
International conference proceedings, English - HW/SW Co-design for Accelerating Public-key Cryptosystems over GF(p) on the 8051 μ-controller
Kazuo Sakiyama; Lejla Batina; Bart Preneel; Ingrid Verbauwhede
World Automation Congress (WAC'06), Special Session on Information Security and Hardware Implementations, 6 pages, Jul. 2006, Peer-reviwed
International conference proceedings, English - Reconfigurable modular arithmetic logic unit for high-performance Public-Key cryptosystems
K. Sakiyama; N. Mentens; L. Batina; B. Preneel; I. Verbauwhede
RECONFIGURABLE COMPUTING: ARCHITECTURES AND APPLICATIONS, 3985, Springer-Verlag, 347-357, 2006, Peer-reviwed
Scientific journal, English - Fast dual-field modular arithmetic logic unit and its hardware implementation
Kazuo Sakiyama; Bart Preneel; Ingrid Verbauwhede
2006 IEEE INTERNATIONAL SYMPOSIUM ON CIRCUITS AND SYSTEMS, VOLS 1-11, PROCEEDINGS, 787-+, 2006, Peer-reviwed
International conference proceedings, English - A parallel processing hardware architecture for Elliptic Curve Cryptosystems
Kazuo Sakiyama; Elke De Mulder; Bart Preneel; Ingrid Verbauwhede
2006 IEEE INTERNATIONAL CONFERENCE ON ACOUSTICS, SPEECH AND SIGNAL PROCESSING, VOLS 1-13, 3355-3358, 2006, Peer-reviwed
International conference proceedings, English - <bold>FPGA-ORIENTED SECURE DATA PATH DESIGN: IMPLEMENTATION OF A PUBLIC KEY COPROCESSOR</bold>
Nele Mentens; Kazuo Sakiyama; Lejla Batina; Ingrid Verbauwhede; Bart Preneel
2006 INTERNATIONAL CONFERENCE ON FIELD PROGRAMMABLE LOGIC AND APPLICATIONS, PROCEEDINGS, 133-138, 2006, Peer-reviwed
International conference proceedings, English - Reconfigurable architectures for curve-based cryptography on embedded micro-controllers
Leila Batina; Alireza Hodjat; David Hwang; Kazuo Sakiyama; Ingrid Verbauwhede
2006 INTERNATIONAL CONFERENCE ON FIELD PROGRAMMABLE LOGIC AND APPLICATIONS, PROCEEDINGS, 667-670, 2006, Peer-reviwed
International conference proceedings, English - Low-cost elliptic curve cryptography for wireless sensor networks
Lejla Batina; Nele Mentens; Kazuo Sakiyama; Bart Preneel; Ingrid Verbauwhede
SECURITY AND PRIVACY IN AD-HOC AND SENSOR NETWORKS, 4357, Springer-Verlag, 6-+, 2006, Peer-reviwed
International conference proceedings, English - Superscalar coprocessor for high-speed curve-based cryptography
K. Sakiyama; L. Batina; B. Preneel; I. Verbauwhede
CRYPTOGRAPHIC HARDWARE AND EMBEDDED SYSTEMS - CHES 2006, PROCEEDINGS, 4249, Springer-Verlag, 415-429, 2006, Peer-reviwed
Scientific journal, English - Efficient and secure fingerprint verification for embedded devices
Shenglin Yang; Kazuo Sakiyama; Ingrid Verbauwhede
EURASIP JOURNAL ON APPLIED SIGNAL PROCESSING, 2006, 1-11, 2006, Peer-reviwed
Scientific journal, English - Embedded Software Integration for Coarse-grain Reconfigurable Systems
Patrick Schaumont; Kazuo Sakiyama; Alireza Hodjat; Ingrid Verbauwhede
IEEE 18th International Parallel and Distributed Processing Symposium (IPDPS'04), 137-142, Apr. 2004, Peer-reviwed
International conference proceedings, English - Finding the best system design flow for a high-speed JPEG encoder
K Sakiyama; PR Schaumont; IM Verbauwhede
ASP-DAC 2003: PROCEEDINGS OF THE ASIA AND SOUTH PACIFIC DESIGN AUTOMATION CONFERENCE, 577-578, 2003, Peer-reviwed
International conference proceedings, English - Teaching trade-offs in system-level design methodologies
K Sakiyama; P Schaumont; D Hwang; Verbauwhede, I
2003 IEEE INTERNATIONAL CONFERENCE ON MICROELECTRONIC SYSTEMS EDUCATION, PROCEEDINGS, 62-63, 2003, Peer-reviwed
International conference proceedings, English - Design flow for HW/SW acceleration transparency in the thumbpod secure embedded system
D Hwang; P Schaumont; Y Fan; A Hodjat; BC Lai; K Sakiyama; SL Yang; Verbauwhede, I
40TH DESIGN AUTOMATION CONFERENCE, PROCEEDINGS 2003, 60-65, 2003, Peer-reviwed
International conference proceedings, English - Testing ThumbPod: Softcore bugs are hard to find
P Schaumont; K Sakiyama; Y Fan; D Hwang; S Yang; A Hodjat; B Lai; Verbauwhede, I
EIGHTH IEEE INTERNATIONAL HIGH-LEVEL DESIGN VALIDATION AND TEST WORKSHOP, PROCEEDINGS, 77-82, 2003, Peer-reviwed
International conference proceedings, English - A compact and efficient fingerprint verification system for secure embedded devices
SL Yang; K Sakiyama; IM Verbauwhede
CONFERENCE RECORD OF THE THIRTY-SEVENTH ASILOMAR CONFERENCE ON SIGNALS, SYSTEMS & COMPUTERS, VOLS 1 AND 2, 2058-2062, 2003, Peer-reviwed
International conference proceedings, English - ZnF2:Gd thin film electroluminescent device
YJ Cho; T Hirakawa; K Sakiyama; H Okamoto; Y Hamakawa
APPLIED SURFACE SCIENCE, 113, 1997, 705-708, Apr. 1997, Peer-reviwed
Scientific journal, English - ZnF2: Gd thin film electroluminescent device
Young-Jae Cho; Takasi Hirakawa; Kazuo Sakiyama; Hiroaki Okamoto; Yoshihiro Hamakawa
Applied Surface Science, Elsevier, 113-114, 705-708, 1997, Peer-reviwed
Scientific journal, English - EL/PL hybrid device enhanced by UV emission from ZnF2:Gd thin film electroluminescence
Young-Jae Cho; Takashi Hirakawa; Kazuo Sakiyama; Hiroaki Okamoto; Yoshihiro Hamakawa
Journal of the Korean Physical Society, 30, 1997, S65-S68, Jan. 1997, Peer-reviwed
Scientific journal, English - ZnF2:Gd UV Emitting Electroluminescent Device
Young-Jae Cho; Takashi Hirakawa; Kazuo Sakiyama; Hiroaki Okamoto; Yoshihiro Hamakawa
8th International Workshop on Electroluminescence; in "Inorganic and Organic Electroluminescence," eds. R. Mauch and H.-E. Gumlich (Wissenschaft und Technik Verlag, 347-350, Aug. 1996, Peer-reviwed
International conference proceedings, English
MISC
- 軽量暗号Asconの実装性能に関する調査及び評価
崎山 一男
Sep. 2023, CRYPTREC外部評価報告書, Japanese, Technical report - 軽量暗号の実装性能に関する調査及び評価(NIST軽量暗号コンペティションファイナリスト)
崎山 一男
Dec. 2022, CRYPTREC外部評価報告書, Technical report - 組込機器のセキュリティを脅かすレーザーフォールト攻撃
菅原健; 崎山一男
Jun. 2019, レーザー学会誌, 77, 6, 305-309, Japanese, Introduction other - レーザーフォールト攻撃対策である電源遮断回路実装時のサイドチャネル耐性評価
郡 義弘; 藤本大介; 林 優一; 三浦典之; 永田 真; 崎山一男
Mar. 2018, Summary national conference - A-7-13 Security Evaluation of Double Arbiter PUF Using Deep Learning
Yashiro Risa; Machida Takanori; Iwamoto Mitsugu; Sakiyama Kazuo
The Institute of Electronics, Information and Communication Engineers, 01 Mar. 2016, Proceedings of the IEICE Engineering Sciences Society/NOLTA Society Conference, 2016, 99-99, Japanese, 2189-700X, 110010023138, AA12732012 - Faster Implementation Idea of Pairing Hardware with Parallel RNS Architecture
Daisuke Fujimoto; Tadanori Teruya; Kazuo Sakiyama; Naofumi Homma; Makoto Ikeda; Makoto Nagata; Tsutomu Matsumoto
Jan. 2016, 2016 Symposium on Cryptography and Information Security, 2016, 2C4-3, Japanese - Security of Block Ciphers: From Algorithm Design to Hardware Implementation
Kazuo Sakiyama; Yu Sasaki; Yang Li
John Wiley and Sons Ltd, 24 Jul. 2015, Security of Block Ciphers: From Algorithm Design to Hardware Implementation, 1-295, English, Others, 84949883783 - Consideration on Side-Channel Information Toward Authentication
MATSUBARA Arisa; LI Yang; HAYASHI Yu-ichi; SAKIYAMA Kazuo
Recently, authentication using near field communication is widely spread for entrance and exit control and electronic money systems. However a threat of relay attack is often pointed out. Relay attack enables an attacker to camouflage the location by developing another communication channel instead of the legitimate one. In this paper, we propose an authentication method using side-channel information, and verify the usability of it based on fundamental experiments. When a cryptographic device is working, side-channel information is leaked as a power consumption and an electromagnetic wave, which is unique information depending on secret key. Utilizing such uniqueness for communication between prover and verifier, we aim at realizing an efficient distance bounding mechanism in the RFID-based authentication system., The Institute of Electronics, Information and Communication Engineers, 03 Jul. 2014, IEICE technical report. Social Implications of Technology and Information Ethics, 114, 116, 1-8, Japanese, 0913-5685, 110009945623, AA11651731 - Consideration on Side-Channel Information Toward Authentication
Arisa Matsubara; Yang LI; Yu-ichi Hayashi; Kazuo Sakiyama
Recently, authentication using near field communication is widely spread for entrance and exit control and electronic money systems. However a threat of relay attack is often pointed out. Relay attack enables an attacker to camouflage the location by developing another communication channel instead of the legitimate one. In this paper, we propose an authentication method using side-channel information, and verify the usability of it based on fundamental experiments. When a cryptographic device is working, side-channel information is leaked as a power consumption and an electromagnetic wave, which is unique information depending on secret key. Utilizing such uniqueness for communication between prover and verifier, we aim at realizing an efficient distance bounding mechanism in the RFID-based authentication system., Information Processing Society of Japan (IPSJ), 26 Jun. 2014, IPSJ SIG Notes, 2014, 1, 1-8, Japanese, 0919-6072, 110009804637, AA11235941 - Practical DFA Strategy for AES Under Limited-access Conditions
Kazuo Sakiyama; Yang Li; Shigeto Gomisawa; Yu-ichiHayashi; Mitsugu Iwamoto; Naofumi Homma; Takafumi Aoki; Kazuo Ohta
Secret data in embedded devices can be revealed by injecting computational faults using the fault analysis attacks. The fault analysis researches on a cryptographic implementation by far first assumed a certain fault model, and then discussed the key recovery method under some assumptions. We note that a new remote-fault injection method has emerged, which is threatening in practice. Due to its limited accessibility to cryptographic devices, the remote-fault injection, however, can only inject uncertain faults. In this surroundings, this paper gives a general strategy of the remote-fault attack on the AES block cipher with a data set of faulty ciphertexts generated by uncertain faults. Our method effectively utilizes all the information from various kinds of faults, which is more realistic than previous researches. As a result, we show that it can provide a decent success probability of key identification even when only a few intended faults are available among 32 millions fault injections.------------------------------This is a preprint of an article intended for publication Journal ofInformation Processing(JIP). This preprint should not be cited. Thisarticle should be cited as: Journal of Information Processing Vol.22(2014) No.2 (online)DOI http://dx.doi.org/10.2197/ipsjjip.22.142------------------------------Secret data in embedded devices can be revealed by injecting computational faults using the fault analysis attacks. The fault analysis researches on a cryptographic implementation by far first assumed a certain fault model, and then discussed the key recovery method under some assumptions. We note that a new remote-fault injection method has emerged, which is threatening in practice. Due to its limited accessibility to cryptographic devices, the remote-fault injection, however, can only inject uncertain faults. In this surroundings, this paper gives a general strategy of the remote-fault attack on the AES block cipher with a data set of faulty ciphertexts generated by uncertain faults. Our method effectively utilizes all the information from various kinds of faults, which is more realistic than previous researches. As a result, we show that it can provide a decent success probability of key identification even when only a few intended faults are available among 32 millions fault injections.------------------------------This is a preprint of an article intended for publication Journal ofInformation Processing(JIP). This preprint should not be cited. Thisarticle should be cited as: Journal of Information Processing Vol.22(2014) No.2 (online)DOI http://dx.doi.org/10.2197/ipsjjip.22.142------------------------------, 15 Feb. 2014, 情報処理学会論文誌, 55, 2, English, 1882-7764, 110009665014, AN00116647 - ハッシュ関数SHA-224, SHA-512/224, SHA-512/256 及び SHA-3 (Keccak) に関する実装評価
崎山 一男
Feb. 2014, CRYPTREC外部評価報告書, Technical report - チップ内外での電源電圧取得によるサイドチャネル漏洩情報の一考察
藤本 大介; 田中 大智; 三浦 典之; 永田 真; 林 優一; 本間 尚文; 青木 孝文; 堀 洋平; 片下 敏広; 﨑山 一男; Thanh-Ha Le; Julien Bringer; Pirouz Bazargan-Sabet; Shivam Bhasin; Jean-Luc Danger
Jan. 2014, 暗号と情報セキュリティシンポジウム, 2A3-3 - On Side-Channel Information Using Signal Toggles in AES Circuit
MATSUBARA Arisa; KUAI Yunfeng; LI Yang; NAKASONE Toshiki; OHTA Kazuo; SAKIYAMA Kazuo
Side-channel attack recovers secret information utilizing extraneous information that leaks from cryp-tographic devices. At COSADE 2013, it has been shown that power consumption and signal delay from two AES hardware implementations, AES-COMP and AES-PPRM1, have a high correlation. In the case of AES-PPRM1, this is because Hamming weight of input values of combinatorial circuit for S-box is considered to be a good model for both side-channel information. However, it is not clear the reason why power consumption and signal delay of AES-COMP has a high correlation. In this paper, we clarify the reason by reconsidering the behavior of signal toggles in the combinatorial circuit. As a result of simulation, we show that a high correlation between power consumption and signal delay stems from the number of signal toggles of output value for S-box circuits and clarify its mechanism., The Institute of Electronics, Information and Communication Engineers, 18 Jul. 2013, 電子情報通信学会技術研究報告 = IEICE technical report : 信学技報, 113, 138, 331-338, Japanese, 0913-5685, 110009773125, AA12526316 - On Side-Channel Information Using Signal Toggles in AES Circuit
松原 有沙; カイ 云峰; 李 陽; 中曽根 俊貴; 太田 和夫; 崎山 一男
11 Jul. 2013, 研究報告セキュリティ心理学とトラスト(SPT), 2013, 49, 1-8, Japanese, 170000077675 - On Side-Channel Information Using Signal Toggles in AES Circuit
松原 有沙; カイ 云峰; 李 陽; 中曽根 俊貴; 太田 和夫; 崎山 一男
サイドチャネル攻撃は,消費電力や電磁波などのデバイスから漏洩する副次的な情報を用いて秘密情報を復元する攻撃のことである.COSADE 2013 で,AES 暗号実装の一種である AES-COMP と AES-PPRM1 において,消費電力と故障感度の相関が高いことが示された.AES-PPRM1においては,S-box の組み合せ回路に対する入力値のハミング重みが,消費電力と信号遅延量の両方のサイドチャネル情報に対する良いモデルとなっていることが理由と考えられる.しかしながら,AES-COMPに関しては,消費電力と故障感度の相関が高い理由は明らかではない.そこで本稿では,組み合せ回路の信号遷移回数を再考し,消費電力と信号遅延量との相関を詳しく調査する.シミュレーションによる結果として,AES-COMPとAES-PPRM1の両方において,消費電力と信号遅延量の高相関が,S-box 回路の出力信号の遷移回数に起因することを示し,その理由を明らかとする.Side-channel attack recovers secret information utilizing extraneous information that leaks from cryp tographic devices. At COSADE 2013, it has been shown that power consumption and signal delay from two AES hardware implementations, AES-COMP and AES-PPRM1, have a high correlation. In the case of AES-PPRM1, this is because Hamming weight of input values of combinatorial circuit for S-box is considered to be a good model for both side-channel information. However, it is not clear the reason why power consumption and signal delay of AES-COMP has a high correlation. In this paper, we clarify the reason by reconsidering the behavior of signal toggles in the combinatorial circuit. As a result of simulation, we show that a high correlation between power consumption and signal delay stems from the number of signal toggles of output value for S-box circuits and clarify its mechanism., 11 Jul. 2013, 研究報告コンピュータセキュリティ(CSEC), 2013, 49, 1-8, Japanese, 170000077612, AA11235941 - D-19-13 Toward Flexible Privacy Protection for RFID Tags Using Privacy-Mode Switching
Li Yang; Sakamoto Hikaru; Nishikado Iwamasa; Saito Takafumi; Ohta Kazuo; Sakiyama Kazuo
The Institute of Electronics, Information and Communication Engineers, 05 Mar. 2013, Proceedings of the IEICE General Conference, 2013, 2, 216-216, English, 110009711965, AN10471452 - A-7-9 IMPROVED PATTERN MATCHING KEY GENERATION USING PUF
Komano Yuichi; Ohta Kazuo; Sakiyama Kazuo; Iwamoto Mitsugu
The Institute of Electronics, Information and Communication Engineers, 06 Mar. 2012, Proceedings of the IEICE General Conference, 2012, 177-177, Japanese, 110009460698, AN10471452 - Break Masked AES Implementations Using Fault Sensitivity and Faulty Ciphertext Review of Presentation at CHES2011
LI Yang; OHTA Kazuo; SAKIYAMA Kazuo
At CHES 2010, a novel side-channel analysis called fault sensitivity analysis (FSA) has been proposed. The essence of the FSA attack is the exploration of the relationship between the fault injection intensity and the occurrence of the faulty calculation. The originally proposed FSA attack is based on the dependency between the intermediate value and the delay timing for the combinational circuit, and can successfully recover the secret key of 128-bit AES. After that, the FSA attack has been improved from the following two directions, which have been presented at CHES 2011. 1) The break of all the AES cores for SASEBO-R by applying the FSA attack proposed at CHES 2010. 2) The enhancement of the FSA attack by additionally analyzing of the faulty ciphertext that have not been used in the original FSA attack. In this paper, the result of breaking all the AES cores on the SASEBO-R will be explained at first, and then the enhanced FSA attack using faulty ciphertext will be reported in detail especially. In 2), for the AES implementation with masking-based side-channel countermeasures, we successfully find the dependency between the unmasked S-box input and the distribution of the values for a byte of the faulty ciphertext. Based on this factor, we demonstrate how to successfully recover the difference between the secret key bytes for the Masked-AND AES implementation and the AES-Threshold on SASEBO-R., The Institute of Electronics, Information and Communication Engineers, 07 Dec. 2011, Technical report of IEICE. ISEC, 111, 337, 25-25, Japanese, 110009466595, AN10060811 - Uniqueness Enhancement of PUF Responses Based on the Locations of Random Outputting RS Latches
YAMAMOTO Dai; SAKIYAMA Kazuo; IWAMOTO Mitsugu; OTA Kazuo; OCHIAI Takao; TAKENAKA Masahiko; ITOH Kouichi
Physical Unclonable Functions (PUFs) are expected to represent an important solution for secure ID generation and authentication etc. In general, PUFs are considered to be more secure the larger their output entropy. However, the entropy of conventional PUFs is lower than the output bit length, because some output bits are random numbers, which are regarded as unnecessary for ID generation and discarded. We propose a novel PUF structure based on a Butterfly PUF with multiple RS latches, which generates larger entropy by utilizing location information of the RS latches generating random numbers. More specifically, while conventional PUFs generate binary values (0/1), the proposed PUF generates ternary values (0/1/random) in order to increase entropy. We estimate the entropy of the proposed PUF. According to our experiment with 40 FPGAs, a Butterfly PUF with 128 RS latches can improve entropy from 116 bits to 192.7 bits, this being maximized when the frequency of each ternary value is equal. We also show the appropriate RS latch structure for satisfying this condition, and validate it through an FPGA experiment., The Institute of Electronics, Information and Communication Engineers, 07 Dec. 2011, Technical report of IEICE. ISEC, 111, 337, 29-29, English, 110009466597, AN10060811 - Fault Sensitivity Analysis Against Elliptic Curve Cryptosystems Using Clockwise Collisions
SAKAMOTO Hikaru; LI Yang; OHTA Kazuo; SAKIYAMA Kazuo
In this paper, we propose a new fault analysis attack technique using Clockwise Collision. Generally, for the combinational circuit in a synchronous design, if signal states of consecutive two cycles are same, the delay time of the second cycle is zero. Focusing on this fact, for the fault attack using setup time violation, we find out that it is difficult for an attacker to induce a fault in the operation in which Clockwise Collision occurs. As a case study, we apply this technique to Elliptic Curve Cryptography (ECC) implementation using Lopez-Dahab algorithm. Consequently, we succeeded in identifying the secret key. Our proposed attack technique is valid even if the Z coordinate of the input point is randomized. Therefore, we show that this technique is more powerful than the previous attack technique using Fault Sensitivity Analysis., The Institute of Electronics, Information and Communication Engineers, 14 Nov. 2011, IEICE technical report. Life intelligence and office information systems, 111, 286, 101-108, Japanese, 0913-5685, 110009465967, AA1240564X - New Differential Fault Analysis on Trivium Based on Setup-Time Violations
LI Qi; GOMISAWA Shigeto; IWAMOTO Mitsugu; OHTA Kazuo; SAKIYAMA Kazuo
This paper presents new differential fault analysis (DFA) on a stream cipher Trivium based on setup-time violations. Trivium is a hardware-oriented synchronous stream cipher, designed by De Canniere and Preneel in 2005. In 2008, Hojsik and Rudolf first presented differential fault analysis of Trivium and proposed two types of DFA on Trivium. Setup-time violations are common fault injection methods for hardware implementations. We show that we have succeeded in injecting faults into FPGA on SASEBO-GII in which Trivium is implemented, and in obtaining 147 out of 288 secret bits with 93 fault injections at different rounds. According to our experiments, we found it is difficult to inject 1-bit errors into random positions of the registers of Trivium at a specific round that was proposed in the previous work of Hojsik and Rudolf., The Institute of Electronics, Information and Communication Engineers, 24 Feb. 2011, IEICE technical report, 110, 444, 333-339, English, 0913-5685, 110008688483, AA11840009 - New Differential Fault Analysis on Trivium Based on Setup-Time Violations
LI Qi; GOMISAWA Shigeto; IWAMOTO Mitsugu; OHTA Kazuo; SAKIYAMA Kazuo
This paper presents new differential fault analysis (DFA) on a stream cipher Trivium based on setup-time violations. Trivium is a hardware-oriented synchronous stream cipher, designed by De Canniere and Preneel in 2005. In 2008, Hojsik and Rudolf first presented differential fault analysis of Trivium and proposed two types of DFA on Trivium. Setup-time violations are common fault injection methods for hardware implementations. We show that we have succeeded in injecting faults into FPGA on SASEBO-GII in which Trivium is implemented, and in obtaining 147 out of 288 secret bits with 93 fault injections at different rounds. According to our experiments, we found it is difficult to inject 1-bit errors into random positions of the registers of Trivium at a specific round that was proposed in the previous work of Hojsik and Rudolf., The Institute of Electronics, Information and Communication Engineers, 24 Feb. 2011, IEICE technical report, 110, 443, 333-339, English, 0913-5685, 110008689715, AN10060811 - A general construction method of visual secret sharing scheme with share rotations
IWMAOTO Mitsugu; LI Yang; SAKIYAMA Kazuo; OHTA Kazuo
In this paper, we discuss a visual secret sharing scheme with multiple secret images including share rotation operations with arbitrary degrees, as an extension of the S-extended (n,n) visual secret sharing scheme proposed by Droste. As a result, it is pointed out that the proposed visual secret sharing scheme can be naturally derived from the S-extended (n,n) visual secret sharing scheme., The Institute of Electronics, Information and Communication Engineers, 03 Sep. 2010, Technical report of IEICE. ISEC, 110, 200, 67-74, English, 0913-5685, 110008108065, AN10060811 - CryptoVerifを用いたRFID向け相互認証プロトコルの安全性証明の検討
花谷嘉一; 花谷嘉一; 大久保美也子; 松尾真一郎; 太田和夫; 崎山一男
2010, 日本応用数理学会年会講演予稿集, 2010, 1345-3378, 201002280594575828 - A Novel Construction Method for Visual Secret Sharing Schemes Allowing Rotation of Shares
LI Yang; IWAMOTO Mitsugu; OHTA Kazuo; SAKIYAMA Kazuo
In 2006, Iwamoto et al. introduced a visual secret sharing (VSS) schemes that allows rotation operation for shares in decryption. However, the proposed construction method is complicated and it only deals with 180-degree rotation. In this paper, based on the change of the expression of subpixels, the rotation angle for shares is extended into degrees besides 180-degree. Especially, a new VSS scheme, in which two shares can decrypt multiple secret images with appropriate rotation angles, is proposed in this paper. The proposed construction approach overcomes the shortcomings of the one proposed by Li et al.. It satisfies the information theoretical security and is simpler than preview works. Besides, it is also possible to extend the proposed schemes into n shares., The Institute of Electronics, Information and Communication Engineers, 15 May 2009, IEICE technical report, 109, 42, 29-36, English, 0913-5685, 110007161998, AN10060811 - 暗号への脅威「サイドチャネル攻撃」とその対策
﨑山 一男; 太田 和夫
岩波書店, Oct. 2008, 「科学」報告・解説, 78, 10, ?-1083, Japanese, Introduction other, 0022-7625, 40016240456, AN00036810 - 現代暗号を脅かす「サイドチャネル攻撃」とは
Kazuo Sakiyama; Kazuo Ohta
Oct. 2008, Science Journal KAGAKU, 78, 10, 1080-1083, Japanese, Introduction other
Books and other publications
- Encyclopedia of Cryptography, Security and Privacy (S. Jajodia, P. Samarati, M. Yung editors)
Kazuo Sakiyama; Yang Li
Contributor, Fault Sensitivity Analysis, 1162, Springer, 12 Jul. 2024, 3030715205 - 電子情報通信学会 知識ベース
崎山一男
Contributor, 1群(信号・システム)- 3編(暗号理論)-14章(サイドチャネル攻撃と耐タンパー技術), 電子情報通信学会, Jul. 2019 - 暗号ハードウェアのセキュリティ
﨑山, 一男; 菅原, 健; 李, 陽
Japanese, Joint work, vii, 178p, コロナ社, Jun. 2019, 9784339028942 - IoT時代の電磁波セキュリティ : 21世紀の社会インフラを電磁波攻撃から守るには(電気学会電気システムセキュリティ特別技術委員会;電気学会スマートグリッドにおける電磁的セキュリティ特別調査専門委員会 編)
崎山一男; 林優一
Japanese, Contributor, 付録 電磁的情報漏えい: B 暗号モジュールを搭載したハードウェアからの情報漏えいの可能性の検討, xv, 346p, 科学情報出版, Apr. 2018, 9784904774663 - Security of block ciphers : from algorithm design to hardware implementation
Sakiyama, Kazuo; Sasaki, Yu; Li, Yang
English, Joint work, 320, John Wiley & Sons, 25 Apr. 2016, 9781118660010 - Advances in Information and Computer Security: 8th International Workshop on Security, IWSEC 2013, Okinawa, Japan, November 18-20, 2013, Proceedings (K. Sakiyama, and M.Terada editors)
English, Editor, 332, Springer, 09 Oct. 2013, 364241382X - ユニーク&エキサイティングサイエンス(梶谷 誠 監修)
崎山 一男
Japanese, Contributor, 第2章 暗号がつなぐ人と人工物とのコミュニケーション: 暗号とプライバシーとRFIDシステム, 3冊, 近代科学社, Apr. 2013, 9784764904422 - Fault Analysis in Cryptography (Marc Joye and Michael Tunstall editors)
Junko Takahashi; Toshinori Fukunaga; Shigeto Gomisawa; Yang Li; Kazuo Sakiyama; Kazuo Ohta
English, Contributor, Fault Injection and Key Retrieval Experiments on Evaluation Board, 372, Springer, 22 Jun. 2012, 9783642296550 - Secure integrated circuits and systems (Ingrid M.R. Verbauwhede editor)
Lejla Batina; Kazuo Sakiyama
English, Contributor, Compact Public-key Implementations for RFID and Sensor Nodes, x, 246 p., Springer, Feb. 2010, 9780387718279 - Secure integrated circuits and systems (Verbauwhede, Ingrid M. R. editor)
Kazuo Sakiyama; Lejla Batina
English, Contributor, Arithmetic for Public-key Cryptography, x, 246 p., Springer, Feb. 2010, 9780387718279 - Digital Systems and Applications (Oklobdzija, Vojin G. editor)
Lejla Batina; Kazuo Sakiyama; Ingrid Verbauwhede
English, Contributor, Architectures for Public-key Cryptography, 988, CRC Press, 26 Nov. 2007, 9780849386190
Lectures, oral presentations, etc.
- Screaming ChannelsとElectromagnetic Radiationのメモリアクセスにおける情報漏洩の調査
川名真弘; 崎山一男; 宮原大輝; 李陽
2025年暗号と情報セキュリティシンポジウム (SCIS’25)
Jan. 2025 - グループ共有鍵システムにおける軽量部分鍵更新のためのマルチモーダル物理攻撃センサ
池本龍生; 藤井聡一朗; 成瀬厚太郎; 塩見 準; 御堂義博; 山下憂記; 田口美里; 三木拓司; 永田 真; 駒野雄一; 岩本 貢; 﨑山一男; 三浦典之
ハードウェアセキュリティ研究会 (HWS’24)
Nov. 2024 - Impacts of Pseudo-Random Number Generator on Side-channel Attack Resistance of TI-AES
Yusaku Harada; Maki Tsukahara; Daiki Miyahara; Yang Li; Yuko Hara; Kazuo Sakiyama
Poster Session, IWSEC2024
Sep. 2024 - グループ共有鍵システムにおける軽量部分鍵更新のためのマルチモーダル物理攻撃センサ
池本龍生; 藤井聡一朗; 成瀬厚太郎; 塩見 準; 御堂義博; 山下憂記; 田口美里; 三木拓司; 永田 真; 駒野雄一; 岩本 貢; 﨑山一男; 三浦典之
Oral presentation
Sep. 2024 - シャッフル1回の非コミット型ANDプロトコルに関する一考察
飯野静流; 李陽; 崎山一男; 宮原大輝
Oral presentation, IEICE2024年ソサイエティ大会
Sep. 2024 - Logic Lockingで保護された近似回路に対する効率的安全性解析について
瀧野雄斗; 原田優咲; 宮原大輝; 李陽; 原祐子; 崎山一男
Oral presentation, IEICE2024年ソサイエティ大会
Sep. 2024 - Logic LockingへのSAT攻撃における鍵サイズと攻撃時間の関係
清水凜; 原田優咲; 宮原大輝; 李陽; 原祐子; 崎山一男
Oral presentation, IEICE2024年ソサイエティ大会
Sep. 2024 - Keynote: Physical assumption in hardware security from side-channel countermeasure to logic locking
Kazuo Sakiyama
Keynote oral presentation, English, 2024 International Workshop on Intelligent Embedded Security for Internet of Things Systems
23 Jul. 2024 - 招待講演]All You Need Is Fault: Zero-Value Attacks on AES and a New $\lambda$-Detection M&M (from TCHES 2024)
Haruka Hirata; Daiki Miyahara; Victor Arribas; Yang Li; Noriyuki Miura; Svetla Nikova; Kazuo Sakiyama
Japanese, ISEC研究会, Invited
15 May 2024 - コンポーザブルセキュリティによる暗号回路の高位合成
楊明宇; 比留間絃斗; 崎山一男; 李陽, 原祐子
Oral presentation, ハードウェアセキュリティ研究会, VLD2023-138, HWS2023-98 (2024-03)
Mar. 2024 - MLP のハミング距離モデルに基づくサイドチャネル攻撃に対する 加算マスキング対策の提案
天野龍乃如; 崎山一男; 宮原大輝; 李陽
Oral presentation, IEICE 総合大会
Mar. 2024 - n枚ANDプロトコルの不可能性
飯野静流; 李陽; 崎山一男; 宮原大輝
2025年暗号と情報セキュリティシンポジウム (SCIS’25)
Jan. 2024 - 天秤ベースゼロ知識証明の推進
金子尚平; 宮原大輝; 崎山一男
2025年暗号と情報セキュリティシンポジウム (SCIS’25)
Jan. 2024 - “2ビットランダムフォールトを用いたAsconに対する鍵復元攻撃モデルの提案と検証
中村早希; 宮原大輝; 李陽; 崎山一男
Jan. 2024 - LUT ベースのLogic Locking回路のSAT攻撃に対する簡易な安全性評価
瀧野雄斗; 原田優咲; 宮原大輝; 李陽; 原祐子; 崎山一男
2025年暗号と情報セキュリティシンポジウム (SCIS’25)
Jan. 2024 - ゼロ値攻撃対策による実装コストを低減する効率的なM&M-AESの設計
平田遼; 宮原大輝; 原祐子; 崎山一男; 李陽
Jan. 2024 - スクリーミングチャネルから漏洩した情報を用いた物理認証システムの提案
野村麻友; 迫琉奈; 松川侑生; 宮原大輝; 李陽; 崎山一男
Oral presentation, 2024年暗号と情報セキュリティシンポジウム (SCIS’24)
Jan. 2024 - TI-AES に使用する擬似乱数生成器の物理安全性への影響
原田優咲; 塚原麻輝; 宮原大輝; 李陽; 原祐子; 崎山一男
Oral presentation, 2024年暗号と情報セキュリティシンポジウム (SCIS’24)
Jan. 2024 - Implementation of Multiplicative Masked AES S-Box for M&M Scheme
Oral presentation, 2024年暗号と情報セキュリティシンポジウム (SCIS’24)
Jan. 2024 - 高シェア数状況下でのt検定による安全性評価の有効性について
胡宇暘; 宮原大輝; 崎山一男; 李陽
Oral presentation, Japanese, 2024年暗号と情報セキュリティシンポジウム (SCIS’24)
Jan. 2024 - 画面のスペクトル分布を用いた新たなQR コードの提案
須長淳也; 嶋野裕一郎; 宮原大輝; 李陽; 崎山一男
Oral presentation, 2024年暗号と情報セキュリティシンポジウム (SCIS’24)
Jan. 2024 - 故障感度情報を用いたt検定によるAESハードウェアの安全性評価
古野亨紀; 佐藤泰雅; 平田遼; 宮原大輝; 李陽; 崎山一男
Oral presentation, 2024年暗号と情報セキュリティシンポジウム (SCIS’24)
Jan. 2024 - トークンコントラクトを応用した競馬投票システムの検討
上段浩輝; 李陽; 崎山一男; 宮原大輝
Keynote oral presentation, 2024年暗号と情報セキュリティシンポジウム (SCIS’24)
Jan. 2024 - NFTを利用した競馬投票システムの一考察
上段浩輝; 李陽; 崎山一男; 宮原大輝
Oral presentation, IEICE2023年ソサイエティ大会
Sep. 2023 - ディスプレイが発するスペクトル分布を用いた認証方式の提案
須長淳也; 宮原大輝; 李陽; 崎山一男
Oral presentation, IEICE2023年ソサイエティ大会
Sep. 2023 - 乱数性に対するTI-AESの一様性に関する基礎評価
原田優咲; 塚原麻輝; 宮原大輝; 李陽; 原祐子; 崎山一男
Oral presentation, IEICE2023年ソサイエティ大会
Sep. 2023 - 軽量暗号Asconに対するスクリーミングチャネル解析実験
迫琉奈; 粕谷桃伽; 松川侑生; 宮原大輝; 李陽; 崎山一男
Oral presentation, IEICE2023年ソサイエティ大会
Sep. 2023 - スクリーミングチャネルを用いた認証システムの一考察
野村麻友; 粕谷桃伽; 松川侑生; 宮原大輝; 李陽; 崎山一男
Oral presentation, IEICE2023年ソサイエティ大会
Sep. 2023 - Towards Verifying Physical Assumption in Card-Based Cryptography (from SecITC 2022)
嶌野雅久; 﨑山一男; 宮原大輝
Oral presentation, 電子情報通信学会情報セキュリティ研究会
17 May 2023 - 天秤ベース秘密計算に対する計算モデルの構築
金子尚平; 李陽; 崎山一男; 宮原大輝
Oral presentation, マルチメディア、分散、協調とモバイル(DICOMO2023)シンポジウム
Jan. 2023 - Attention-Based Non-Profiled SCA on ASCAD Database
Enhao Xu; Takeshi Sugawara; Kazuo Sakiyama; Yuko Hara-Azumi; Yang Li
Oral presentation, 2023年暗号と情報セキュリティシンポジウム (SCIS’23)
Jan. 2023 - 電力サイドチャネル攻撃に対して堅牢なARX型暗号回路の高位合成
稲垣沙耶; 楊明宇; 李陽; 崎山一男; 原祐子
Oral presentation, 2023年暗号と情報セキュリティシンポジウム (SCIS’23)
Jan. 2023 - TI技術によりシェア化されたAES S-boxの故障感度解析手法
佐藤泰雅; 古野亨紀; 平田遼; 宮原大輝; 李陽; 崎山一男
Oral presentation, 2023年暗号と情報セキュリティシンポジウム (SCIS’23)
Jan. 2023 - 天秤とコインを使った秘密計算
吉田深月; 金子尚平; 李陽; 崎山一男; 宮原大輝
Oral presentation, 2023年暗号と情報セキュリティシンポジウム (SCIS’23)
Jan. 2023 - 相互補助相関電力解析の正解鍵順位と鍵復元率の調査
西澤慧悟; 崎山一男; 原祐子, 李陽
Oral presentation, 2023年暗号と情報セキュリティシンポジウム (SCIS’23)
Jan. 2023 - シミュレーションによるニューラルネットワークの乗算に対するサイドチャネル攻撃の考察
天野龍乃如; 崎山一男; 原祐子, 李陽
Oral presentation, 2023年暗号と情報セキュリティシンポジウム (SCIS’23)
Jan. 2023 - Screaming channelsの漏洩モデルの実験的検証
松川侑生; 崎山一男; 菅原健, 李陽
Oral presentation, 2023年暗号と情報セキュリティシンポジウム (SCIS’23)
Jan. 2023 - 軽量暗号の実装性能に関する調査及び評価(NIST軽量暗号コンペティションファイナリスト)
崎山 一男
CRYPTREC外部評価報告書
Dec. 2022
Dec. 2022 Dec. 2022 - Entropy-Based Fault Analysis on M&M AES Block Cipher
Haruka Hirata; Svetla Nikova; Li Yang; Kazuo Sakiyama
Poster presentation, English, Smart Card Research and Advanced Application Conference (CARDIS2022), International conference
Nov. 2022 - ハイパースペクトルカメラを用いた指紋の付着時期推定
工藤紗織; 嶌野雅久; 崎山一男; 宮原大輝
Invited oral presentation, Japanese, IEICE2022年ソサイエティ大会, Domestic conference
Sep. 2022 - TI技術を用いたAES S-boxの故障感度の評価
佐藤泰雅; 古野亨紀; 平田遼; 宮原大輝; 崎山一男
Invited oral presentation, Japanese, IEICE2022年ソサイエティ大会, Domestic conference
Sep. 2022 - AES暗号に対する非プロファイリング深層学習攻撃の再現実験
荻原実那; 李陽; 宮原大輝; 﨑山一男
Invited oral presentation, Japanese, IEICE2022年ソサイエティ大会, Domestic conference
Sep. 2022 - サイドチャネル攻撃と偽コイン問題の関連性
吉田深月; 宮原大輝; 崎山一男
Invited oral presentation, Japanese, IEICE2022年ソサイエティ大会, Domestic conference
Sep. 2022 - 少命令セット組込みプロセッサにおけるARX型暗号アルゴリズムの実装と評価
楊明宇; 卯木あゆ美; 李陽; 崎山一男; 原祐子
Oral presentation, Japanese, 2022年暗号と情報セキュリティシンポジウム(SCIS2022), Domestic conference
Jan. 2022 - 電磁波サイドチャネルとスクリーミングチャネルの同時収集攻撃の検証
松川侑生; 杉本悠馬; 菅原健; 崎山一男; 李陽
Oral presentation, Japanese, 2022年暗号と情報セキュリティシンポジウム(SCIS2022), Domestic conference
Jan. 2022 - 確率モデルと実験による増分故障解析の安全性評価
加藤光; 菅原健; 崎山一男; 李陽
Oral presentation, Japanese, 2022年暗号と情報セキュリティシンポジウム(SCIS2022), Domestic conference
Jan. 2022 - RISC−VとSubRISC+におけるLED暗号のBitslice実装の評価
渡辺陸; 楊明宇; 原祐子; 崎山一男; 李陽
Oral presentation, Japanese, 2022年暗号と情報セキュリティシンポジウム(SCIS2022), Domestic conference
Jan. 2022 - プロービング攻撃による漏洩情報を用いたAES鍵復元アルゴリズムの改良
植村友紀; 渡邉洋平; 李陽; 三浦典之; 岩本貢; 崎山一男; 太田和夫
Oral presentation, Japanese, 2022年暗号と情報セキュリティシンポジウム(SCIS2022), Domestic conference
Jan. 2022 - M&Mにより対策されたAES暗号ハードウェアの乱数依存性について
塚原麻輝; 平田遼; 宮原大輝; 李陽; 崎山一男
Oral presentation, Japanese, 2022年暗号と情報セキュリティシンポジウム(SCIS2022), Domestic conference
Jan. 2022 - ハイパースペクトルカメラによるカードベース暗号の安全性評価に向けた基礎的検討
嶌野雅久; 宮原大輝; 崎山一男
Oral presentation, Japanese, 2022年暗号と情報セキュリティシンポジウム(SCIS2022), Domestic conference
Jan. 2022 - NIST軽量暗号最終候補におけるソフトウェア実装性能の評価
北原知明; 日良僚太; 原祐子; 宮原大輝; 李陽; 崎山一男
Oral presentation, Japanese, 2022年暗号と情報セキュリティシンポジウム(SCIS2022), Domestic conference
Jan. 2022 - パイプライン化されたAES S-boxへのフォールト攻撃に対する安全性評価
平田遼; 宮原大輝; 李陽; 三浦典之; 崎山一男
Oral presentation, Japanese, 2022年暗号と情報セキュリティシンポジウム(SCIS2022), Domestic conference
Jan. 2022 - サイドチャネル攻撃の並列実装におけるシステムノイズの評価
工藤 黎; 菅原健; 崎山一男; 原祐子, 李陽
Poster presentation, Japanese, ハードウェアセキュリティフォーラム2021, Domestic conference
Dec. 2021 - ローリングシャッター効果を用いた音声情報復元とその評価
星野翔; 嶋野裕一郎; 崎山一男
Oral presentation, Japanese, コンピュータセキュリティシンポジウム2021(CSS2021), Domestic conference
Oct. 2021 - ミクスチャ差分を用いた暗号解析のLED64への適用
高見豪; 菅原健; 崎山一男; 李陽
Invited oral presentation, Japanese, IEICE2021年ソサイエティ大会, Domestic conference
Sep. 2021 - M&Mにより対策されたAES暗号ハードウェアへの故障利用解析に向けた基礎実験
古野亨紀; 平田遼; 李陽; 崎山一男
Invited oral presentation, Japanese, IEICE2021年ソサイエティ大会, Domestic conference
Sep. 2021 - M&Mにより対策されたAES暗号ハードウェアに対するt検定
塚原麻輝; 平田遼; 李陽; 崎山一男
Invited oral presentation, Japanese, IEICE2021年ソサイエティ大会, Domestic conference
Sep. 2021 - NIST軽量暗号最終候補におけるAD長と平文長に対するレイテンシの測定
北原知明; 日良僚太; 原祐子; 李陽; 崎山一男
Invited oral presentation, Japanese, IEICE2021年ソサイエティ大会, Domestic conference
Sep. 2021 - ローリングシャッター方式のカメラを用いた音声情報の復元実験
嶋野裕一郎; 星野翔; 崎山一男
Invited oral presentation, Japanese, IEICE2021年ソサイエティ大会, Domestic conference
Sep. 2021 - 高位合成による軽量暗号ChaskeyのFPGA実装およびサイドチャネル攻撃耐性の評価
稲垣 沙耶; 楊 明宇; 李 陽; 崎山 一男; 原 祐子
Oral presentation, Japanese, ハードウェアセキュリティ研究会, Domestic conference
Mar. 2021 - [招待講演]Simple Electromagnetic Analysis Against Activation Functions of Deep Neural Networks (from AIHWS 2020)
Go Takatoi; Takeshi Sugawara; Kazuo Sakiyama; Yuko Hara-Azumi; Yang Li
Invited oral presentation, Japanese, ISEC2021-9, Domestic conference
Mar. 2021 - M&Mにより対策されたAES暗号ハードウェアに対するサイドチャネル攻撃
平田遼; 羽田野凌太; 李陽; 三浦典之; 崎山一男
Oral presentation, Japanese, 2021年暗号と情報セキュリティシンポジウム(SCIS2021), Domestic conference
Jan. 2021 - NIST軽量暗号第2ラウンド候補のソフトウェア実装に向けた調査
日良僚太; 李陽; 原祐子; 崎山一男
Oral presentation, Japanese, 2021年暗号と情報セキュリティシンポジウム(SCIS2021), Domestic conference
Jan. 2021 - 塗布剤による個人情報の秘匿性評価
畑碧; 崎山一男
Oral presentation, Japanese, 2021年暗号と情報セキュリティシンポジウム(SCIS2021), Domestic conference
Jan. 2021 - ローリングシャッター効果を用いたLEDデバイスの物理指紋抽出に関する基礎的実験
星野翔; 崎山一男
Oral presentation, Japanese, 2021年暗号と情報セキュリティシンポジウム(SCIS2021), Domestic conference
Jan. 2021 - Pushing the Limits of Simple Electromagnetic Analysis Against Similar Activation Functions
Go Takatoi; Takeshi Sugawara; Kazuo Sakiyama; Yuko Hara-Azumi; Yang Li
Oral presentation, Japanese, 2021年暗号と情報セキュリティシンポジウム(SCIS2021), Domestic conference
Jan. 2021 - サイドチャネル攻撃の並列実装におけるシステムノイズの評価: 遺伝的アルゴリズムとの比較
工藤黎; 菅原健; 崎山一男; 原祐子, 李陽
Oral presentation, Japanese, 2021年暗号と情報セキュリティシンポジウム(SCIS2021), Domestic conference
Jan. 2021 - FPGAを用いた秘匿アクセラレーションの実装評価(II)
高木翼; 李陽; 崎山一男; 菅原健; 梨本翔永; 鈴木大輔
Oral presentation, Japanese, 2021年暗号と情報セキュリティシンポジウム(SCIS2021), Domestic conference
Jan. 2021 - AES鍵スケジュールからの固定ビット数漏洩を用いた鍵復元アルゴリズムの性能評価
植村友紀; 渡邉洋平; 李陽; 三浦典之; 岩本貢; 崎山一男; 太田和夫
Oral presentation, Japanese, 2021年暗号と情報セキュリティシンポジウム(SCIS2021), Domestic conference
Jan. 2021 - NIST軽量暗号の第2ラウンド候補の軽量実装に向けた分類と比較
日良僚太; 李陽; 原祐子; 崎山一男
Oral presentation, Japanese, IEICE2020年ソサイエティ大会, Domestic conference
Sep. 2020 - M&Mにより対策されたAESハードウェアの安全性評価について
平田遼; 羽田野凌太; 李陽; 三浦典之; Svetla Nikova
Oral presentation, Japanese, IEICE2020年ソサイエティ大会, Domestic conference
Sep. 2020 - LEDの個体識別における温度変化の影響
土屋彩夏; 藤聡子; 李陽; 崎山一男; 菅原健
Oral presentation, Japanese, ICSS2019-72, Domestic conference
Jul. 2020 - 順序回路への故障注入に起因した不均一な頻度分布を持つ誤り出力を用いた故障利用解析
岡本拓実; 藤本大介; 崎山一男; 李陽, 林優一
Oral presentation, Japanese, HWS2019-101, Domestic conference
May 2020 - 気泡検出器を用いたゼロ知識非破壊検査
品川和雅; 三浦典之; 岩本貢; 崎山一男; 太田和夫
Oral presentation, Japanese, 2020年暗号と情報セキュリティシンポジウム(SCIS2020), Domestic conference
Jan. 2020 - 鍵のランダムな漏洩に対する AES 鍵スケジュール復元アルゴリズム
植村友紀; 李陽; 三浦典之; 岩本貢; 崎山一男; 太田和夫
Oral presentation, Japanese, 2020年暗号と情報セキュリティシンポジウム(SCIS2020), Domestic conference
Jan. 2020 - RG-DTM PUFに対するDeep Learningを用いたクローニング攻撃
八代理紗; 堀洋平; 片下敏宏; 汐崎充; 崎山一男
Oral presentation, Japanese, 2020年暗号と情報セキュリティシンポジウム(SCIS2020), Domestic conference
Jan. 2020 - 調光機能のある LEDの個体識別
藤聡子; 土屋彩夏; 李陽; 崎山一男; 菅原健
Oral presentation, Japanese, 2020年暗号と情報セキュリティシンポジウム(SCIS2020), Domestic conference
Jan. 2020 - FPGAを用いた秘匿アクセラレーションの実装評価
高木翼; 李陽; 崎山一男; 菅原健; 梨本翔永; 鈴木大輔
Oral presentation, Japanese, 2020年暗号と情報セキュリティシンポジウム(SCIS2020), Domestic conference
Jan. 2020 - ARM Cortex-M0におけるSAEAESの小型実装
薮茉莉花; 崎山一男; 菅原健
Oral presentation, Japanese, 2020年暗号と情報セキュリティシンポジウム(SCIS2020), Domestic conference
Jan. 2020 - 無線通信から収集した電磁波を用いたテンプレート攻撃研究
杉本悠馬; 菅原健; 崎山一男; 李陽
Oral presentation, Japanese, 2020年暗号と情報セキュリティシンポジウム(SCIS2020), Domestic conference
Jan. 2020 - AESへの5ラウンドの物理攻撃の可能性の考察
高見豪; 菅原健; 崎山一男; 李陽
Oral presentation, Japanese, 2020年暗号と情報セキュリティシンポジウム(SCIS2020), Domestic conference
Jan. 2020 - レーザー検知回路から漏洩するサイドチャネル情報の考察
羽田野凌太; 平田遼; 松田航平; 三浦典之; 李陽; 崎山一男
Oral presentation, Japanese, 2020年暗号と情報セキュリティシンポジウム(SCIS2020), Domestic conference
Jan. 2020 - AESに対する5ラウンド攻撃の物理攻撃への応用検討
高見豪; 菅原健; 崎山一男; 李陽
Oral presentation, Japanese, IEICE2019年ソサイエティ大会, Domestic conference
Sep. 2019 - 積分球による光量の均一化に基づくLEDの個体識別
土屋彩夏; 藤聡子; 李陽; 崎山一男; 菅原健
Oral presentation, Japanese, IEICE2019年ソサイエティ大会, Domestic conference
Sep. 2019 - ARM Cortex-M0 におけるAES暗号化処理の小型実装
薮茉莉花; 崎山一男; 菅原健
Oral presentation, Japanese, IEICE2019年ソサイエティ大会, Domestic conference
Sep. 2019 - レーザー光を使った音情報の漏洩に対する安全性評価
星野翔; 椎名瞭; 松村竜我; 崎山一男
Oral presentation, Japanese, IEICE2019年ソサイエティ大会, Domestic conference
Sep. 2019 - AES暗号への9ラウンド差分故障解析の攻撃耐性の評価
杉本博英; 羽田野凌太; 庄司奈津; 崎山一男
Oral presentation, Japanese, IEICE2019年ソサイエティ大会, Domestic conference
Sep. 2019 - LED光源を用いた光サイドチャネル認証装置
椎名瞭; 菅原健; 松村竜我; 崎山一男
Oral presentation, Japanese, IEICE2019年ソサイエティ大会, Domestic conference
Sep. 2019 - レーザーフォールト注入攻撃への対策が施されたAES暗号チップの脆弱性評価
羽田野凌太; 李陽; 多田捷; 松田航平; 三浦典之; 菅原健; 崎山一男
Oral presentation, Japanese, IEICE2019年ソサイエティ大会, Domestic conference
Sep. 2019 - Invited Talk: Deep Learning for Security Evaluation of Physically Unclocable Function
Kazuo Sakiyama
Invited oral presentation, English, International Conference on Advanced Computing and Applications (ACOMP 2018), International conference
Jul. 2019 - Anti-tamper cryptographic hardware with analog electronics
Kazuo Sakiyama
Public discourse, English, Mini Symposium: Crypto for long-term security and privacy
22 Mar. 2019 - Investigation of Information Leakage from A Laser Fault Injection Sensor
Yang Li; Natsu Shoji; Takeshi Sugawara; Kazuo Sakiyama
Oral presentation, English, IEICE2019年総合大会, Domestic conference
Mar. 2019 - A TEG Chip of Arbiter PUF for Efficient Simulation Model
Risa Yashiro; Takeshi Sugawara; Mitsuru Shiozaki; Takeshi Fujino; Kazuo Sakiyama
Oral presentation, English, In Conference Record of International Conference on Computer and Communication Systems (ICCCS’19), International conference
Feb. 2019 - 分光スペクトルを用いたLEDの個体識別における電流変化の影響
藤聡子; 李陽; 崎山一男; 菅原健
Oral presentation, Japanese, 2019年暗号と情報セキュリティシンポジウム(SCIS2019), Domestic conference
Jan. 2019 - ハイパースペクトルカメラを用いた液晶ディスプレイの個体差に関する基礎的研究
堀越健太郎; 崎山一男
Oral presentation, Japanese, 2019年暗号と情報セキュリティシンポジウム(SCIS2019), Domestic conference
Jan. 2019 - FPGA搭載サーバにおける秘匿アクセラレーション
鈴木大輔; 梨本翔永; 永塚智之; 高木翼; 李陽; 崎山一男; 菅原健
Oral presentation, Japanese, 2019年暗号と情報セキュリティシンポジウム(SCIS2019), Domestic conference
Jan. 2019 - SDAccel環境を用いたAES暗号CTRモードの高性能実装
高木翼; 崎山一男; 菅原健; 梨本翔永; 鈴木大輔
Oral presentation, Japanese, 2019年暗号と情報セキュリティシンポジウム(SCIS2019), Domestic conference
Jan. 2019 - Keynote: Towards Resilient IoT System – How to Evaluate Information Leakage
Kazuo Sakiyama
Invited oral presentation, English, The First International Workshop on Hardware Oriented Cybersecurity (HwSec2018), Invited, International conference
19 Dec. 2018 - Keynote: Hardware Security and IoT Ecosystem
Kazuo Sakiyama
Keynote oral presentation, English, International Conference on Advanced Computing and Applications (ACOMP 2018), International conference
28 Nov. 2018 - Hardware Implementations of ECC
Kazuo Sakiyama
Public discourse, English, Autumn school, 22nd Workshop on Elliptic Curve Cryptography
17 Nov. 2018 - 分光器を用いたLEDの個体識別に向けた基礎的研究
藤聡子; 李陽; 﨑山一男; 菅原健
Oral presentation, Japanese, IEICE2018ソサイエティ大会, Domestic conference
Sep. 2018 - 様々な実験条件におけるジャイロセンサのセンサなりすまし攻撃に関する基礎的検討
西山優太; 李陽; 﨑山一男; 菅原健
Oral presentation, Japanese, IEICE2018ソサイエティ大会, Domestic conference
Sep. 2018 - Arbiter PUFへのサイドチャネルモデリング攻撃の実装と応用
八代理沙; 藤聡子; 菅原健; 﨑山一男
Oral presentation, Japanese, IEICE2018ソサイエティ大会, Domestic conference
Sep. 2018 - AES暗号への故障差分攻撃のモデル化と攻撃回数の評価
羽田野凌太; 庄司奈津; 李陽; 菅原健; 﨑山一男
Oral presentation, Japanese, IEICE2018ソサイエティ大会, Domestic conference
Sep. 2018 - AESの指定したラウンド間差分の平文探索アルゴリズムの改良
伊藤俊輔; 菅原健; 﨑山一男; 李陽
Oral presentation, Japanese, IEICE2018ソサイエティ大会, Domestic conference
Sep. 2018 - Arbiter PUFに対する攻撃手法に関する一考察
八代理沙; 菅原健; 﨑山一男
Invited oral presentation, Japanese, 情報処理学会DAシンポジウム2018, Domestic conference
Aug. 2018 - レーザー故障注入攻撃対策を備えた暗号ICの設計手法
松田航平; 藤井達哉; 庄司奈津; 菅原健; 﨑山一男; 林優一; 永田真; 三浦典之
Invited oral presentation, Japanese, 情報処理学会DAシンポジウム2018, Domestic conference
Aug. 2018 - A Case Study of Row Hammer under Different Refresh Rates
Erina Tatsumi; Kazuo Sakiyama; Takeshi Sugawara
Poster presentation, English, IWSEC2018, International conference
Aug. 2018 - 基盤電流センサと電源瞬断回路を利用した小面積レーザーフォールト注入攻撃対策
松田航平; 藤井達哉; 庄司奈津; 菅原健; 﨑山一男; 林優一; 永田真; 三浦典之
Oral presentation, Japanese, ハードウェアセキュリティ研究会(HWS), Domestic conference
Apr. 2018 - レーザーフォールト攻撃対策である電源遮断回路実装時のサイドチャネル耐性評価
郡義弘; 藤本大介; 林優一; 三浦典之; 永田真; 﨑山一男
Oral presentation, Japanese, ハードウェアセキュリティ研究会(HWS), Domestic conference
Mar. 2018 - IC内部の回路構成変更が秘密鍵の習得性に与える影響の評価
郡義弘; 藤本大介; 林優一; 﨑山一男; 三浦典之; 永田真
Poster presentation, Japanese, IEICE2018総合大会, Domestic conference
Mar. 2018 - センサフュージョンの攻撃耐性に関するセキュリティ評価
梨本翔永; 鈴木大輔; 菅原健; 﨑山一男
Oral presentation, Japanese, 2018年暗号と情報セキュリティシンポジウム(SCIS2018), Domestic conference
Jan. 2018 - ブロック暗号へのプロービング攻撃における鍵復元効率の正確な評価モデル
庄司奈津; 菅原健; 岩本貢; 﨑山一男
Oral presentation, Japanese, 2018年暗号と情報セキュリティシンポジウム(SCIS2018), Domestic conference
Jan. 2018 - フォルト検出センサを悪用した非侵襲プロービング攻撃
菅原健; 庄司奈津; 﨑山一男; 松田航平; 三浦典之; 永田真
Oral presentation, Japanese, 2018年暗号と情報セキュリティシンポジウム(SCIS2018), Domestic conference
Jan. 2018 - パブリッククラウド上のFPGAにおける悪性ハードウェア
菅原健; 﨑山一男; 梨本翔永; 永塚智之
Oral presentation, Japanese, 2018年暗号と情報セキュリティシンポジウム(SCIS2018), Domestic conference
Jan. 2018 - デバイスドライバを用いたRow Hammerのテストツール
辰巳恵里奈; 菅原健; 﨑山一男
Oral presentation, Japanese, 2018年暗号と情報セキュリティシンポジウム(SCIS2018), Domestic conference
Jan. 2018 - 光に重畳したサイドチャネル情報に関する基礎的な解析
松村竜我; 菅原健; 﨑山一男
Oral presentation, Japanese, 2018年暗号と情報セキュリティシンポジウム(SCIS2018), Domestic conference
Jan. 2018 - C66xDSPにおけるペアリングの高速実装
松原祐衣子; 宮元景冬; 菅原健; 﨑山一男
Oral presentation, Japanese, 2018年暗号と情報セキュリティシンポジウム(SCIS2018), Domestic conference
Jan. 2018 - PUF応用に向けた新たな物理仮定と端末認証方式への応用
駒野雄一; 岩本貢; 太田和夫; 﨑山一男
Oral presentation, Japanese, 2018年暗号と情報セキュリティシンポジウム(SCIS2018), Domestic conference
Jan. 2018 - WHO WILL FAULT SENSORS BE HELPFUL FOR?
Kazuo Sakiyama
Public discourse, English, COSIC Seminar
03 Nov. 2017 - An Evaluation of Ineffective Fault Analysis on AES using Single-Bit Bit-Set/Reset Faults
Natsu Shoji; Ryuga Matsumura; Takeshi Sugawara; Kazuo Sakiyama
Poster presentation, English, IWSEC2017, International conference
Aug. 2017 - 光を用いたサイドチャネル認証
松村竜我; 庄司奈津; 菅原健; 崎山一男
Oral presentation, Japanese, コンピュータセキュリティシンポジウム2017(CSS2017)デモンストレーション(ポスター)セッション, Domestic conference
Jan. 2017 - Raw Hammerの見える化
辰巳恵里奈; 菅原健; 崎山一男
Oral presentation, Japanese, コンピュータセキュリティシンポジウム2017(CSS2017)デモンストレーション(ポスター)セッション, Domestic conference
Jan. 2017 - TI社DSP TMS320C6678における高速な剰余乗算アルゴリズムの実装評価
宮元景冬; 﨑山一男
Oral presentation, Japanese, 2016年暗号と情報セキュリティシンポジウム(SCIS2017), Domestic conference
Jan. 2017 - XORモデルを用いたサイドチャネル認証
粕谷桃伽; 町田卓謙; 﨑山一男
Oral presentation, Japanese, 2016年暗号と情報セキュリティシンポジウム(SCIS2017), Domestic conference
Jan. 2017 - 基板電流検知回路を用いたレーザーフォールト注入攻撃対策のオーバーヘッド推定
松田航平; 三浦典之; 永田真; 林優一; 藤井達哉; 﨑山一男
Oral presentation, Japanese, 電子情報通信学会総合大会, Domestic conference
Jan. 2017 - RowHammerに関する基礎実験
辰巳恵里奈; 菅原健; 﨑山一男
Oral presentation, Japanese, ハードウェアセキュリティ研究会(HWS), Domestic conference
Jan. 2017 - ダイオードレーザーを用いた光によるサイドチャネル認証
松村竜我; 庄司奈津; 菅原健; 﨑山一男
Oral presentation, Japanese, ハードウェアセキュリティ研究会(HWS), Domestic conference
Jan. 2017 - 誤り暗号文を使わないAESへの故障利用攻撃
庄司奈津; 松村竜我; 菅原健; 﨑山一男
Oral presentation, Japanese, ハードウェアセキュリティ研究会(HWS), Domestic conference
Jan. 2017 - DSPC6678における剰余乗算の高速実装評価
宮元 景冬; 﨑山 一男
Poster presentation, Japanese, ハードウェアセキュリティフォーラム2016, Domestic conference
Dec. 2016 - Q-class Authentication System Using DAPUF
Risa Yashiro; Mitsugu Iwamoto; Kazuo Sakiyama
Poster presentation, English, AsianHOST2016, International conference
Dec. 2016 - Authentication Using Physical
Momoka Kasuya; Kauo Sakiyama
Poster presentation, English, AsianHOST2016, International conference
Dec. 2016 - 認証の枠組みを用いたサイドチャネル攻撃に必要な波形数の導出
粕谷 桃伽; 崎山一男
Oral presentation, Japanese, IEICE2016年ソサエティ大会, Domestic conference
Sep. 2016 - Deep Learningを用いたRSAに対する単純電磁波解析
八代理沙; 藤井達哉; 岩本貢; 崎山一男
Oral presentation, Japanese, IEICE2016年ソサエティ大会, Domestic conference
Sep. 2016 - 基板電位変動モニタリングによるレーザーフォールト注入攻撃対策
松田航平; 三浦典之; 永田真; 林優一; 藤井達哉; 崎山一男
Poster presentation, Japanese, IEICE2016年ソサエティ大会, Domestic conference
Sep. 2016 - 基板電位変動モニタリングによるレーザーフォールト注入攻撃対策
松田航平; 三浦典之; 永田 真; 林 優一; 藤井達哉; 矢ヶ崎玲奈; 崎山一男
Oral presentation, Japanese, LSIとシステムのワークショップ2016, Domestic conference
May 2016 - サイドチャネル情報における固有性解析
粕谷桃伽; 町田卓謙; 崎山一男
Poster presentation, Japanese, IEICE2016年総合大会, Domestic conference
Mar. 2016 - Deep Learningを用いたDouble Arbiter PUFの安全性評価
八代理沙; 町田卓謙; 岩本貢; 崎山一男
Oral presentation, Japanese, IEICE2016年総合大会, Domestic conference
Mar. 2016 - サイドチャネル認証におけえる識別可能なデバイス数
粕谷桃伽; 町田卓謙; 崎山一男
Oral presentation, Japanese, 2016年暗号と情報セキュリティシンポジウム(SCIS2016)
Jan. 2016 - レーザーフォールド注入時のIC基板電位変動のオンチップ測定
松田航平; 三浦典之; 永田真; 藤井達哉; 矢ヶ崎玲奈; 崎山一男
Oral presentation, Japanese, 2016年暗号と情報セキュリティシンポジウム(SCIS2016)
Jan. 2016 - 並列化RNSアーキテクチャによる高速ペアリング実装に関する検討
藤本大介; 照屋唯紀; 永田真; 本間尚文; 池田誠; 松本勉; 崎山一男
Oral presentation, Japanese, 2016年暗号と情報セキュリティシンポジウム(SCIS2016)
Jan. 2016 - AES暗号化回路からの全ラウンド漏洩電磁波を用いたサイドチャネル認証
粕谷桃伽; 藤井達哉; 町田卓謙; 崎山一男
Public symposium, Japanese, Hot Channel Workshop 2015, Invited, Tohoku Univ., Tokyo Japan, Domestic conference
09 Oct. 2015 - レーザーフォルト注入時のIC基板電位変動のオンチップ測定
松田 航平; 三浦 典之; 永田 真; 林 優一; 藤井 達哉; 崎山 一男
Public symposium, Japanese, Hot Channel Workshop 2015, Invited, Touhoku Univ., Tokyo Japan, Domestic conference
08 Oct. 2015 - DE0-nanoを用いたサイドチャネル認証
藤井達哉; 粕谷桃伽; 町田卓謙; 崎山一男
Oral presentation, Japanese, コンピュータセキュリティシンポジウム2015 (CSS2015), 長崎市, Domestic conference
Oct. 2015 - 漏洩電磁波を用いたサイドチャネル認証の基礎実験
粕谷桃伽; 町田卓謙; 崎山一男
Oral presentation, Japanese, IEICE2015年ソサイエティ大会, IEICE, 仙台市, Domestic conference
Sep. 2015 - Hardware Implementations of ECC
Kazuo Sakiyama
Oral presentation, English, Summer school on real-world crypto and privacy, Invited, Šibenik Croatia, International conference
04 Jun. 2015 - 暗号ハードウェアからの情報漏洩
崎山一男
Others, Japanese, 日本学術振興会シリコン超集積化システム第165委員会, Invited, Kyoto,Japan, Domestic conference
15 May 2015 - ランダム故障混入時のAES暗号回路への故障利用攻撃
松原有沙; 町田卓謙; 崎山一男
Poster presentation, Japanese, IEICE2015年総合大会(学生ポスターセッション), Kusatsu-shi,Shiga, Domestic conference
Mar. 2015 - 物理特性の変更が可能なRO-PUF
川述優; 崎山一男
Poster presentation, Japanese, IEICE2015年総合大会(学生ポスターセッション), Kusatsushi,Shiga, Domestic conference
Mar. 2015 - Android端末に向けた新たな認証システム
酒井芳章; 崎山一男
Poster presentation, Japanese, IEICE2015年総合大会(学生ポスターセッション), Kusatsushi,Shiga, Domestic conference
Mar. 2015 - ワイン瓶の透過光を用いた人工物メトリクスに関する研究
矢ヶ崎玲奈; 崎山一男
Poster presentation, Japanese, IEICE2015年総合大会, Domestic conference
Mar. 2015 - Fault Analysis for Cryptosystems: Introduction to Differential Fault Analysis and Fault Sensitivity Analysis
Kazuo Sakiyama
Public discourse, English, Tutorial-4: Hardware Trust in VLSI Design and Implementations, Asia and South Pacific Design Automation Conference (ASP-DAC’15), Invited, International conference
Jan. 2015 - AESハードウェア実装の任意ラウンドにおける消費電力制御
カイ 云峰; 李 陽; 町田 卓謙; 崎山 一男
Oral presentation, Japanese, 2015年暗号と情報セキュリティシンポジウム (SCIS2015), Kokura Kitakyuushu-shi, Domestic conference
Jan. 2015 - サイドチャネル認証の為の漏洩モデルに関する一考察
松原 有沙; 町田 卓謙; 林優一; 崎山 一男
Oral presentation, Japanese, 2015年暗号と情報セキュリティシンポジウム(SCIS2015)
Jan. 2015 - Single-Chip Implementation and Evaluation of Passive UHF RFID Tag with Hash-Based Mutual Authentication
李陽; 崎山一男
Oral presentation, Japanese, Hot Channel Workshop 2014, Invited, Chofu(UEC), Domestic conference
07 Oct. 2014 - ガラスのムラを用いた人工物メトリクスの研究
矢ヶ崎玲奈; 崎山一男
Oral presentation, Japanese, Hot Channel Workshop 2014, Invited, Chofu(UEC), Domestic conference
07 Oct. 2014 - サイドチャネル情報を用いた認証の実現に向けて
松原有沙; 町田卓謙; 崎山一男
Oral presentation, Japanese, Hot Channel Workshop 2014, Chofu(UEC), Domestic conference
06 Oct. 2014 - バッファを用いた軽量擬似乱数生成器のグリッチ削減方法とハードウェア実装評価
三上修吾; 渡辺大; 崎山一男
Oral presentation, Japanese, コンピュータセキュリティシンポジウム 2014(CSS2014), IWSEC, Sapporo, Domestic conference
Oct. 2014 - サイドチャネル認証に向けた基礎的考察
松原有沙; 李陽; 林優一; 崎山一男
Oral presentation, Japanese, ISEC2014, ISEC, Hakodate, Japan, Domestic conference
Jul. 2014 - Toward Practical Solution to Unsuccessful Write Operation on Non-Volatile Memory of Passive RFID Tags
Yang Li; Kazuo Sakiyama
Poster presentation, English, ASIACCS2014, Kyoto,Japan, International conference
Jun. 2014 - RFIDシステムにおけるリレー攻撃対策
李陽; 三上修吾; 渡辺大; 太田和夫; 崎山一男
Oral presentation, Japanese, Hot Channel Workshop 2014, Invited, Sendai(Tohoku Univ.), Domestic conference
23 Apr. 2014 - Single-Chip Implementation and Evaluation of A Privacy-Enhanced RFID Tag
李陽; 崎山一男
Oral presentation, English, Hot Channel Workshop 2014, Invited, 仙台, Domestic conference
22 Apr. 2014 - バッファを用いた軽量擬似乱数生成器のグリッチ削減方法と実装評価
三上修吾; 渡辺大; 崎山一男
Oral presentation, Japanese, Hot Channel Workshop 2014, Invited, Sendai(Tohoku Univ.), Domestic conference
22 Apr. 2014 - FPGA実装されたArbiter-based PUFのユニーク性向上に向けた実装法の検討
町田卓謙; 山本大; 岩本貢; 崎山一男
Oral presentation, Japanese, Hot Channel Workshop 2014, Invited, 仙台, Domestic conference
22 Apr. 2014 - ICT国際PBL(4):ディジタル信号処理
福井言葉; 船橋鴻志; 高橋謙三; 山尾泰; 小島年春; 崎山一男
Oral presentation, Japanese, IEICE2014年総合大会, 新潟, Domestic conference
Mar. 2014 - ICT国際PBL (3):ハッシュ関数SHA-256の高速実装
中曽根俊貴; 崎山一男
Oral presentation, Japanese, IEICE2014年総合大会, 新潟, Domestic conference
Mar. 2014 - ICT国際PBL (2):無線ネットワークによるロボットカー制御プロジェクト
大竹健太; 稲毛契; 戴競擇; 藤井威生; 山尾泰; 崎山一男
Oral presentation, Japanese, IEICE2014年総合大会, 新潟, Domestic conference
Mar. 2014 - ICT国際PBL (1):国際性と実践力に優れた高度専門人材育成
稲毛契; 藤井威生; 高橋謙三; 山尾泰; 崎山一男
Oral presentation, Japanese, IEICE2014年総合大会, 新潟, Domestic conference
Mar. 2014 - バッファを用いた軽量擬似乱数生成器のハードウェア実装と評価
三上修吾; 渡辺大; 崎山一男
Oral presentation, Japanese, 2014年 暗号と情報セキュリティシンポジウム (SCIS2014), Domestic conference
Jan. 2014 - FPGA実装されたArbiter PUFのユニーク性向上に向けた一考察
町田卓謙; 山本大; 岩本貢; 崎山一男
Oral presentation, Japanese, 2014年 暗号と情報セキュリティシンポジウム (SCIS2014), Domestic conference
Jan. 2014 - チップ内外での電源電圧取得によるサイドチャネル漏洩情報の一考察
藤本大介; 田中大智; 三浦典之; 永田真; 林優一; 本間尚文; 青木孝文; 堀洋平; 片下敏広; 崎山一男; Thanh-Ha Le; Julien Bringer; Pirouz Bazargan-Sabet; Shivam Bhasin; Jean-Luc Danger
Oral presentation, Japanese, 2014年 暗号と情報セキュリティシンポジウム (SCIS2014), Domestic conference
Jan. 2014 - FPGA上のArbiter PUFに対する機械学習攻撃の新たなモデル作成に向けて
町田卓謙; 中曽根俊貴; 岩本貢; 崎山一男
Oral presentation, Japanese, Hot Channel Workshop 2013, 神戸, Domestic conference
26 Nov. 2013 - Introduction to IAIK Demotag and Related Experiments on It
李陽; 崎山一男
Oral presentation, English, Hot Channel Workshop 2013, Kobe,Japan, Domestic conference
25 Nov. 2013 - Toward Applications of SRAM Retention Time as Battery-Less Timer for RFID Tags
Yang Li; Toshiki Nakasone; Kazuo Sakiyama
Poster presentation, English, IWSEC2013 (Nov., 2013), Okinawa,Japan, International conference
Nov. 2013 - A New Model of Modeling Attacks against Arbiter PUF on FPGA
Takanori Machida; Toshiki Nakasone; Mitsugu Iwamoto; Kazuo Sakiyama
Poster presentation, English, IWSEC2013, Okinawa,Japan, International conference
Nov. 2013 - 暗号システムへの故障利用解析
崎山一男
Oral presentation, Japanese, 2013年電子情報通信学会ソサイエティ大会, 福岡, Domestic conference
19 Sep. 2013 - 暗号システムへの故障利用解析
崎山一男
Oral presentation, Japanese, 2013年電子情報通信学会ソサイエティ大会, 電子情報通信学会, 福岡, Domestic conference
19 Sep. 2013 - AES暗号回路における信号遷移回数を用いたサイドチャネル情報に関する考察
松原有沙; 云峰, 李陽; 中曽根俊貴; 太田和夫; 崎山一男
Oral presentation, Japanese, ISEC2013-45(研究会),電子情報通信学会
Jul. 2013 - Arbiter PUFのFPGA実装における評価手法と脆弱性
町田卓謙; 中曽根俊貴; 崎山一男
Oral presentation, Japanese, ISEC2013-18(研究会),電子情報通信学会
Jul. 2013 - Toward Practically Secure and Flexible RFID Tags
李陽; 中曽根俊貴; 崎山一男
Public symposium, English, Hot Channel Workshop 2013 (2013年4月12日), Hot Channel Workshop 2013, 東京
Apr. 2013 - NU-FVAに基づく新たな鍵復元攻撃について,”
松原有沙; 李陽; 太田和夫; 崎山一男
Public symposium, Japanese, Hot Channel Workshop 2013 (2013年4月11日), Hot Channel Workshop 2013, 東京
Apr. 2013 - OSKプロトコル向け軽量暗号アルゴリズムの実装評価
三上修吾; 渡辺大; 崎山一男
Public symposium, Japanese, Hot Channel Workshop 2013 (2013年4月11日), Hot Channel Workshop 2013, 東京
Apr. 2013 - PUFを用いる鍵生成方法とその安全性
駒野雄一; 太田和夫; 崎山一男; 岩本貢
Public symposium, Japanese, Hot Channel Workshop 2013, (2013年4月11日)., Hot Channel Workshop 2013, 東京
Apr. 2013 - 故障混入時のAES暗号ハードウェアの脆弱性について
松原有沙; 李陽; 太田和夫; 崎山一男
Oral presentation, Japanese, IEICE2013年総合大会(学生ポスターセッション)
Mar. 2013 - クーポンコレクタ問題を利用したノイズに強い飽和フォールト攻撃
佐々木悠; 李陽; 阪本光; 崎山一男
Oral presentation, Japanese, IEICE2013年総合大会
Mar. 2013 - システム上にあるSRAMの電荷保持時間とPUF特性を利用したDoS攻撃対策
中曽根俊貴; 李陽; 崎山一男
Oral presentation, Japanese, IEICE2013年総合大会
Mar. 2013 - Toward Flexible Privacy Protection for RFID Tags Using Privacy-Mode Switching
Yang Li; Hikaru Sakamoto; Iwamasa Nishikado; Takafumi Saito; Kazuo Ohta; Kazuo Sakiyama
Oral presentation, English, IEICE2013年総合大会
Mar. 2013 - Two Topics in Cryptographic Hardware: Coupon DFA and Secure RFID
Yang Li; Kazuo Sakiyama
Public symposium, Japanese, Compview暗号理論ワークショップ2013, Compview暗号理論ワークショップ2013, 東京
Feb. 2013 - Mechanism Analysis for Non-Uniform Mapping of Faulty S-box –Case Study of AES-COMP–
松原有沙; 李陽; 太田和夫; 崎山一男
Oral presentation, Japanese, 2013年 暗号と情報セキュリティシンポジウム (SCIS'13)
Jan. 2013 - CC-EMAとCEMAの攻撃性能の比較
中曽根俊貴; 李陽; 佐々木悠; 岩本貢; 太田和夫; 崎山一男
Oral presentation, Japanese, 2013年 暗号と情報セキュリティシンポジウム (SCIS'13)
Jan. 2013 - Mechanism Analysis for Non-Uniform Mapping of Faulty S-box –Case Study of AES-COMP–
松原有沙; 李陽; 太田和夫; 崎山一男
Oral presentation, Japanese, 2013年 暗号と情報セキュリティシンポジウム (SCIS'13)
Jan. 2013 - 巡回シフトを用いたPUFに基づくパターン照合鍵生成システムの実装評価
岩井佑樹; 福島崇文; 森山大輔; 松尾真一郎; 駒野雄一; 岩本貢; 太田和夫; 崎山一男
Oral presentation, Japanese, 2013年 暗号と情報セキュリティシンポジウム (SCIS'13)
Jan. 2013 - レスポンス数の向上手法を適用したラッチPUFのASIC実装評価
山本大; 崎山一男; 岩本貢; 太田和夫; 武仲正彦; 伊藤孝一; 鳥居直哉
Oral presentation, Japanese, 2013年 暗号と情報セキュリティシンポジウム (SCIS'13)
Jan. 2013 - RFID認証プロトコル向け軽量暗号アルゴリズムの実装評価
三上修吾; 渡辺大; 本間尚文; 崎山一男
Oral presentation, Japanese, 2013年 暗号と情報セキュリティシンポジウム (SCIS'13)
Jan. 2013 - PUF出力の一部を用いるパターン照合鍵生成システム
駒野雄一; 太田和夫; 岩本貢; 崎山一男
Oral presentation, Japanese, 2013年 暗号と情報セキュリティシンポジウム (SCIS'13)
Jan. 2013 - 故障感度隠蔽のための効率的な対策とその評価
遠藤翔; 李陽; 本間尚文; 崎山一男; 藤本大介; 永田真; 太田和夫; 青木孝文
Oral presentation, Japanese, 2013年 暗号と情報セキュリティシンポジウム (SCIS'13)
Jan. 2013 - Key Recovery with Less Power Traces Using DPA Contest Data
Yang Li; Daisuke Nakatsu; Kazuo Ohta; Kazuo Sakiyama
Oral presentation, English, Poster Session, CHES2012
Sep. 2012 - Locality Randomization for EMA-Resistant AES Hardware
Toshiki Nakasone; Daisuke Nakatsu; Yang Li; Kazuo Ohta; Kazuo Sakiyama
Oral presentation, English, Triangle Symposium on Advanced ICT 2012 (TriSAI 2012)
Sep. 2012 - 故障感度解析とその応用について
Kazuo Sakiyama
Public symposium, Japanese, 16回情報科学研究科セミナー@JAIST, 16回情報科学研究科セミナー@JAIST, 東京
Mar. 2012 - Fault Behavior Analysis
Kazuo Sakiyama
Public symposium, Japanese, Compview暗号理論ワークショップ2012, Compview暗号理論ワークショップ2012, 東京
Feb. 2012 - PUFを用いる証明可能安全なパターン照合鍵生成方法
駒野雄一; 太田和夫; 﨑山一男; 岩本貢
Oral presentation, Japanese, 2012年 暗号と情報セキュリティシンポジウム (SCIS'12)
Jan. 2012 - 54ステップのSHA-0への原像攻撃
小松原航; 王磊; 佐々木悠; 﨑山一男; 太田和夫
Oral presentation, Japanese, 2012年 暗号と情報セキュリティシンポジウム (SCIS'12)
Jan. 2012 - Threshold Implementation を利用したストリーム暗号Enocoro-128 v2の相関電力解析対策
三上修吾; 吉田博隆; 渡辺大; 﨑山一男
Oral presentation, Japanese, 2012年 暗号と情報セキュリティシンポジウム (SCIS'12)
Jan. 2012 - Access-Driven Cache Attackの自動的な攻撃評価手法の提案
高橋順子; 阪本光; 福永利徳; 冨士仁; 﨑山一男
Oral presentation, Japanese, 2012年 暗号と情報セキュリティシンポジウム (SCIS'12)
Jan. 2012 - テンプレートを利用した時系列電力解析
中津大介; 李陽; 太田和夫; 﨑山一男
Oral presentation, Japanese, 2012年 暗号と情報セキュリティシンポジウム (SCIS'12)
Jan. 2012 - IRドロップを利用した故障感度解析と高温環境下における影響
小池彩歌; 李陽; 中津大介; 太田和夫; 﨑山一男
Oral presentation, Japanese, 2012年 暗号と情報セキュリティシンポジウム (SCIS'12)
Jan. 2012 - クロック間衝突を利用した電磁波解析
中曽根俊貴; 中津大介; 李陽; 太田和夫; 崎山一男
Oral presentation, Japanese, 2012年 暗号と情報セキュリティシンポジウム (SCIS'12)
Jan. 2012 - Sensitive-Data Dependency of Faulty Behavior and Its Application
李陽; 太田和夫; 崎山一男
Oral presentation, Japanese, 2012年 暗号と情報セキュリティシンポジウム (SCIS'12)
Jan. 2012 - 国際会議CHES2011 報告
伊豆哲也; 猪俣敦夫; 桶屋勝幸; 川端健; 駒野雄一; 﨑山一男; 酒見由美; 佐藤証; 須賀祐治; 高木剛; 高橋順子; 角尾幸保; 盛合志帆; 堀洋平; 本間尚文; 渡辺大
Oral presentation, English, ISEC2011-66,ISEC研究会
Dec. 2011 - [招待講演]マスク対策AESに対する誤り暗号文を用いた故障感度解析~CHES2011での発表のレビュー~
李陽; 太田和夫; 﨑山一男
Oral presentation, English, ISEC2011-66,ISEC研究会
Dec. 2011 - [招待講演]Uniquness Enhancement of PUF Responces Based on the Locations of Random Outputting RS Latches
山本大; 﨑山一男; 岩本貢; 太田和夫; 落合隆夫; 武仲正彦; 伊藤孝一
Oral presentation, English, ISEC2011-66,ISEC研究会
Dec. 2011 - クロック間衝突を用いた楕円曲線暗号実装に対する故障感度解析
阪本光; 李陽; 太田和夫; 﨑山一男
Oral presentation, English, ISEC2011-49
Nov. 2011 - First Experimental Results of Correlation-Enhanced EMA Collision Attack
Toshiki Nakasone; Daisuke Nakatsu; Yang Li; Kazuo Ohta; Kazuo Sakiyama
Oral presentation, English, Poster Session, CHES2011
Sep. 2011 - Rebound Attack on 3D Block Cipher,” In Proc. Triangle Symposium on Advanced ICT 2011 (TriSAI’11)
Takuma Koyama; Yu Sasaki; Kazuo Sakiyama; Kazuo Ohta
Oral presentation, English, Triangle Symposium on Advanced ICT 2010 (TriSAI 2011)
Aug. 2011 - Preimage Attacks on 5-Pass HAVAL Reduced to 158-Steps and One-Block 3-Pass HAVAL
Yasuhide Sakai; Yu Sasaki; Lei Wang; Kazuo Ohta; Kazuo Sakiyama
Oral presentation, English, Industrial Track Session, ACNS2011
Jun. 2011 - New Differential Fault Analysis on Trivium Based on Setup-Time Violations
Qi Li; Shigeto Gomisawa; Mitsugu Iwamoto; Kazuo Ohta; Kazuo Sakiyama
Oral presentation, English, ISEC2010-122
Mar. 2011 - Fault Sensitivity Analysis
Kazuo Sakiyama
Public symposium, Japanese, Compview暗号理論ワークショップ2011, Compview暗号理論ワークショップ2011, 東京
Feb. 2011 - Joux-Lucksの3-collisions探索アルゴリズムに関する計算量の詳細な検討
名渕大樹; 岩本貢; 﨑山一男; 太田和夫
Oral presentation, English, 2011年 暗号と情報セキュリティシンポジウム (SCIS'11)
Jan. 2011 - 158stepの5-pass HAVALと1-Block 3-pass HAVALへの原像攻撃
酒井靖英; 佐々木悠; 王磊; 﨑山一男; 太田和夫
Oral presentation, English, 2011年 暗号と情報セキュリティシンポジウム (SCIS'11)
Jan. 2011 - AES-128 に対する複数ラウンドCPA
中津大介; 太田和夫; 﨑山一男
Oral presentation, English, 2011年 暗号と情報セキュリティシンポジウム (SCIS'11)
Jan. 2011 - 再暗号化鍵匿名性を満たすIDベースプロキシ再暗号化方式
松田和也; 川合豊; 﨑山一男; 太田 和夫
Oral presentation, English, 2011年 暗号と情報セキュリティシンポジウム (SCIS'11)
Jan. 2011 - MAC-MD5へのフォールト解析攻撃
五味澤重友; 王磊; 太田和夫; 山口和彦; 﨑山一男
Oral presentation, English, 2011年 暗号と情報セキュリティシンポジウム (SCIS'11)
Jan. 2011 - 楕円曲線暗号実装に対するFault Sensitivity Analysis
阪本光; 李陽; 太田和夫; 﨑山一男
Oral presentation, English, 2011年 暗号と情報セキュリティシンポジウム (SCIS'11)
Jan. 2011 - Self-Template Fault Sensitivity Analysis
李陽; 太田和夫; 﨑山一男
Oral presentation, English, 2011年 暗号と情報セキュリティシンポジウム (SCIS'11)
Jan. 2011 - 電磁波解析における局所性と放射磁界方向について
落合隆夫; 山本大; 伊藤孝一; 武仲正彦; 鳥居直哉; 内田大輔; 永井利明; 若菜伸一; 岩本貢; 太田和夫; 﨑山一男
Oral presentation, English, 2011年 暗号と情報セキュリティシンポジウム (SCIS'11)
Jan. 2011 - 7 及び8 ラウンド既知鍵AES識別機の実装
高柳真如; 佐々木悠; 李陽; 太田和夫; 﨑山一男
Oral presentation, English, 2011年 暗号と情報セキュリティシンポジウム (SCIS'11)
Jan. 2011 - 故障感度解析を利用したPUFの実現について
岩井祐樹; 太田和夫; 﨑山一男
Oral presentation, English, 2011年 暗号と情報セキュリティシンポジウム (SCIS'11)
Jan. 2011 - ラッチの乱数出力位置を利用したPUFによるID生成/認証システムの信頼性向上手法
山本大; 﨑山一男; 岩本貢; 太田和夫; 落合隆夫; 武仲正彦; 伊藤孝一
Oral presentation, English, 2011年 暗号と情報セキュリティシンポジウム (SCIS'11)
Jan. 2011 - A New Fault Analysis Attack (joint work with Yang Li and Kazuo Ohta)
Kazuo Sakiyama
Public symposium, English, 2010 Japan-Taiwan Joint Research Symposium on Cryptography and Next IT-society, 2010 Japan-Taiwan Joint Research Symposium on Cryptography and Next IT-society, 東京
Nov. 2010 - Cryptanalysis and Side-channel Analysis - Approach to Optimal Differential Fault Analysis (joint work with Yang Li and Kazuo Ohta)
Kazuo Sakiyama
Public symposium, English, Forum Math-for-Industry 2010, Forum Math-for-Industry 2010, 東京
Oct. 2010 - Another Differential Fault Analysis on Trivium
Qi Li; Kazuo Sakiyama; Lei Wang; Kazuo Ohta
Oral presentation, English, Triangle Symposium on Advanced ICT 2010 (TriSAI 2010)
Oct. 2010 - Effective Verification for Known- Key Distinguisher by Using Extended Differential Path
Naoyuki Takayanagi; Yang Li; Kazuo Sakiyama; Kazuo Ohta
Oral presentation, English, Triangle Symposium on Advanced ICT 2010 (TriSAI’10)
Oct. 2010 - CryptoVerifを用いたRFID向け相互認証プロトコルの安全性証明の検討
花谷嘉一; 大久保美也子; 松尾真一郎; 太田和夫; 崎山一男
Oral presentation, English, 日本応用数理学会2010年度年会 FAISセッション
Sep. 2010 - 回転操作が可能な視覚復号型秘密分散法の一般的構成法
岩本貢; 李陽; 崎山一男; 太田和夫
Oral presentation, English, ISEC2010-49
Sep. 2010 - New Non-Ideal Properties of AES-Based Permutations: Applications to ECHO and Grøstl
Yu Sasaki; Yang Li; Lei Wang; Kazuo Sakiyama; Kazuo Ohta
Oral presentation, English, The Second SHA-3 Candidate Conference
Aug. 2010 - New Non-Ideal Properties of AES-Based Permutations: Applications to ECHO and Grøstl
Yu Sasaki; Yang Li; Lei Wang; Kazuo Sakiyama; Kazuo Ohta
Oral presentation, English, The Second SHA-3 Candidate Conference
Aug. 2010 - How Can We Conduct Fair and Consistent Hardware Evaluation for SHA-3 Candidate?
Shin'ichiro Matsuo; Miroslav Kne; i; Patrick Schaumont; Ingrid Verbauwhede; Akashi Satoh; Kazuo Sakiyama; Kazuo Ota
Oral presentation, English, The Second SHA-3 Candidate Conference
Aug. 2010 - SASEBO-GIIを用いたSHA-3候補のハードウェア性能評価
小林和幸; 池上淳; 松尾真一郎; 崎山一男; 太田和夫
Oral presentation, English, 第15回共同研究成果報告会
Jun. 2010 - 暗号技術の実装について
Kazuo Sakiyama
Public symposium, Japanese, CRYPTRECシンポジウム2010, CRYPTRECシンポジウム2010, 東京
Mar. 2010 - 強識別不可能性理論とSHA-3プロジェクト ~ハッシュ関数設計のための理論研究と実装研究の現状~
太田和夫; 王磊; 崎山一男
Oral presentation, English, ISEC2009-104
Mar. 2010 - 暗号理論に関する問題提起と討論
Kazuo Sakiyama
Public symposium, Japanese, Compview暗号理論ワークショップ2010, Compview暗号理論ワークショップ2010, 東京
Feb. 2010 - SASEBO-GIIを用いたSHA-3候補のハードウェア性能評価
池上淳; 小林和幸; 崎山一男; 太田和夫
Oral presentation, English, 2010年 暗号と情報セキュリティシンポジウム (SCIS'10)
Jan. 2010 - Katz らのLeakage Resilient t-time 署名の解析
松田和也; 坂井祐介; 太田和夫; 崎山一男
Oral presentation, English, 2010年 暗号と情報セキュリティシンポジウム (SCIS'10)
Jan. 2010 - 公開鍵暗号の SPA/DPA 耐性向上に向けた対策アルゴリズムの再考
泉雅巳; 崎山一男; 太田和夫; 佐藤証
Oral presentation, English, 2010年 暗号と情報セキュリティシンポジウム (SCIS'10)
Jan. 2010 - DPA耐性のあるソフトウェア実装のための安全なCPU
中津大介; 李陽; 崎山一男; 太田和夫
Oral presentation, English, 2010年 暗号と情報セキュリティシンポジウム (SCIS'10)
Jan. 2010 - PUF-HBプロトコルに対する中間者攻撃
長井大地; 塙知剛; 太田和夫; 崎山一男; 岩本貢
Oral presentation, English, 2010年 暗号と情報セキュリティシンポジウム (SCIS'10)
Jan. 2010 - An Information Theoretic Perspective on the Differential Fault Analysis against AES
Yang Li; Shigeto Gomisawa; Kazuo Sakiyama; Kazuo Ohta
Oral presentation, English, IEICE 2010 Symposium on Cryptography and Information Security (SCIS'10)
Jan. 2010 - AES暗号実装へのフォールト解析攻撃における適用範囲の拡大と解析効率の向上
五味澤重友; 泉雅巳; 李陽; 高橋順子; 福永利徳; 佐々木 悠; 崎山 一男; 太田 和夫
Oral presentation, English, 2010年 暗号と情報セキュリティシンポジウム (SCIS'10)
Jan. 2010 - HB-MAC 認証プロトコルに対する受動的攻撃
塙知剛; 川合豊; 崎山一男; 太田和夫
Oral presentation, English, 2010年 暗号と情報セキュリティシンポジウム (SCIS'10)
Jan. 2010 - Performance Comparison of Lightweight Public-Key Identification Schemes
Bagus Santoso; Kazuo Ohta; Kazuo Sakiyama; Goichiro Hanaoka
Oral presentation, English, WISP Summit - First workshop on Wirelessly Powered Sensor Networks and Computational RFID
Nov. 2009 - An Extension of Differential Fault Analysis Attack of AES
Shigeto Gomisawa; Masami Izumi; Kazuo Sakiyama; Kazuo Ohta
Oral presentation, English, Triangle Symposium on Advanced ICT 2009 (TriSAI 2009)
Oct. 2009 - Comparison of Masked S-boxes in Hardware Implementation
Daisuke Nakatsu; Yang Li; Kazuo Sakiyama; Kazuo Ohta
Oral presentation, English, Triangle Symposium on Advanced ICT 2009 (TriSAI 2009)
Oct. 2009 - Cryptoanalysis of Duc-Kim Key Exchange Protocol Proposed at TriSAI'08
Tomotaka Hanawa; Kazuo Sakiyama; Kazuo Ohta
Oral presentation, English, Triangle Symposium on Advanced ICT 2009 (TriSAI 2009)
Oct. 2009 - Visual Secret Sharing Schemes Allowing Arbitrary Rotation Angles of Shares
Yang Li; Mitsugu Iwamoto; Kazuo Ohta; Kazuo Sakiyama
Oral presentation, English, Triangle Symposium on Advanced ICT 2009 (TriSAI 2009)
Oct. 2009 - Improving Efficiency of an 'On the Fly' Identification Scheme by Perfecting Zero-Knowledgeness
Bagus Santoso; Kazuo Ohta; Kazuo Sakiyama; Goichiro Hanaoka
Oral presentation, English, ISEC2009-30
Jul. 2009 - Countermeasures Against Side-channel Attacks and Their Side Effects
Kazuo Sakiyama
Keynote oral presentation, Japanese, RSA Conference 2009, RSA Conference 2009, 千葉, International conference
Jun. 2009 - A Novel Construction Method for Visual Secret Sharing Schemes Allowing Rotation of Shares
Yang Li; Mitsugu Iwamoto; Kazuo Ohta; Kazuo Sakiyama
Oral presentation, English, ISEC2009-5
May 2009 - Yet Another New “On the Fly” Identification Scheme: Reducing Memory Cost by Improving Zero-Knowledgeness,
Bagus Santoso; Kazuo Ohta; Kazuo Sakiyama
Oral presentation, English, IEICE 2009 Symposium on Cryptography and Information Security (SCIS'09)
Jan. 2009 - フォールト混入時におけるRSL 技術による暗号回路モデルを用いた安全性解析
泉 雅巳; 崎山一男; 太田和夫
Oral presentation, English, 2009年暗号と情報セキュリティシンポジウム (SCIS'09)
Jan. 2009 - 高周波クロックによるRSL技術を用いたAESへのフォールト攻撃実験
八木達哉; 崎山一男; 太田和夫
Oral presentation, English, 2009年暗号と情報セキュリティシンポジウム (SCIS'09)
Jan. 2009 - MD5チャレンジ・レスポンスプロトコルへの速い攻撃
Lei Wang; Yu Sasaki; Kazuo Ohta; Kazuo Sakiyama
Oral presentation, English, IEICE 2009 Symposium on Cryptography and Information Security (SCIS'09)
Jan. 2009 - Visual Secret Sharing Schemes for Multiple Secret Images Allowing the 90-degree Rotation of Shares
Yang Li; Mengyu Zhu; Wang Lei; Kazuo Ohta; Kazuo Sakiyama
Oral presentation, English, IEICE 2009 Symposium on Cryptography and Information Security (SCIS'09)
Jan. 2009 - Does The Montgomery Powering Ladder Method Really Offer SPA Resistance?
Masami Izumi; Kazuo Sakiyama; Kazuo Ohta
Oral presentation, English, Triangle Symposium on Advanced ICT 2008 (TriSAI 2008)
Oct. 2008 - A Compact ECC Processor for Pervasive Computing
Yong Ki Lee; Kazuo Sakiyama; Lejla Batina; Ingrid Verbauwhede
Oral presentation, English, ECRYPT Workshop, Secure Component and System Identification (SECSI'08)
Mar. 2008 - Elliptic Curve Cryptography on Embedded Multicore Systems
Junfeng Fan; Kazuo Sakiyama; Ingrid Verbauwhede
Oral presentation, English, Workshop on Embedded Systems Security (WESS’07)
Oct. 2007 - Exploring Trade-offs between Area, Performance and Security in HW/SW Co-design of ECC
Caroline Vanderheyden; Junfeng Fan; Kazuo Sakiyama; Ingrid Verbauwhede
Oral presentation, English, Western European Workshop on Research in Cryptology (WeWoRC’07)
Jul. 2007 - Montgomery Modular Multiplication Algorithm for Multi-core Systems
Junfeng Fan; Kazuo Sakiyama; Ingrid Verbauwhede
Oral presentation, English, ECRYPT Workshop, Software Performance Enhancement for Encryption and Decryption (SPEED’07)
Jun. 2007 - Compact Implementations for RFID and Sensor Nodes
Lejla Batina; Kazuo Sakiyama
Public symposium, Japanese, Design, Automation and Test in Europe (DATE'07), Design, Automation and Test in Europe (DATE'07), Nice, France
Apr. 2007 - Small Footprint ALU for Public-key Processors for Pervasive Security
Kazuo Sakiyama; Lejla Batina; Nele Mentens; Bart Preneel; Ingrid Verbauwhede
Oral presentation, English, ECRYPT Workshop on RFID Security 2006
Jul. 2006 - Testing Framework for eSTREAM Profile II Candidates
Lejla Batina; Sandeep Kumar; Joseph Lano; Kerstin Lemke; Nele Mentens; Christoph Paar; Bart Preneel; Kazuo Sakiyama; Ingrid Verbauwhede
Oral presentation, English, ECRYPT Workshop, SASC - The State of the Art of Stream Ciphers
Feb. 2006 - HW/SW Co-design for TA/SPA-resistant Public-Key Cryptosystems
Kazuo Sakiyama; Lejla Batina; Patrick Schaumont; Ingrid Verbauwhede
Oral presentation, English, ECRYPT Workshop on CRyptographic Advances in Secure Hardware (CRASH’05)
Sep. 2005 - ZnF2:Gdを用いたEL-PL複合素子(II)
平川 孝; 崎山一男; 趙永載; 濱川圭弘
Oral presentation, Japanese, 第57回応用物理学会学術講演会講演予稿集,第57回応用物理学会学術講演会講演予稿集
Sep. 1996 - EL/PL Hybrid Device Enhanced by UV Emission from ZnF2:Gd Thin Film Electroluminescence
Young-Jae Cho; Takashi Hirakawa; Kazuo Sakiyama; Hiroaki Okamoto; Yoshihiro Hamakawa
Oral presentation, English, 8th Seoul International Symposium on the Physics of Semiconductors and Applications (ISPSA'96)
Sep. 1996 - ZnF2:Gdを用いたEL-PL複合素子
崎山一男; 趙永載; 濱川圭弘
Oral presentation, Japanese, 第56回応用物理学会学術講演会講演予稿集,第56回応用物理学会学術講演会講演予稿集
Aug. 1995 - a-Si:H層を用いたEL素子の低しきい電圧化
森田真太郎; 崎山一男; 趙永載; 濱川圭弘
Oral presentation, Japanese, 第55回応用物理学会学術講演会講演予稿集,第56回応用物理学会学術講演会講演予稿集
Sep. 1994
Courses
Research Themes
- 効率的で安全に利用可能な高機能暗号の数理基盤の構築と展開
Tsuyoshi Takagi; Mitsugu Iwamoto; Kazuo Sakiyama; Yang Li; Yohei Watanabe; Yuntao Wang; Daiki Miyahara
Japan Science and Technology Agency, K Program, The University of Electro-Communications, 個別研究型, 25-JPMJKP24U2-03
Apr. 2025 - Mar. 2030 - Trustworthy IoTシステム設計基盤の構築
原 祐子
科学技術振興機構, 戦略的な研究開発の推進 戦略的創造研究推進事業 CREST, 東京工業大学, 近年、IC製造工程に外部企業が関わることで、IC設計技術(IP)盗用や非正規品流通の問題が深刻化しています。本研究は、ICサプライチェーン全体の安全性要件を抽出・モデル化し、その要件を満たす新たな仕組みを高機能暗号を基盤として構築することで、ICのIP保護と真正性確認の一括した実現を目指します。この仕組みをIC設計時にby-Designで設計情報に組み込むための設計手法とその設計環境を開発します。
2023 - 2028 - センサーに内在する固有性の拡散と収縮に基づく非暗号学的計測セキュリティ
三浦 典之
日本学術振興会, 科学研究費助成事業 基盤研究(B), 大阪大学, 基盤研究(B), Coinvestigator, 23H03364
Apr. 2023 - Mar. 2026 - Construction of Provably Secure Countermeasures Against Physical Attacks on Symmetric Cryptography
崎山 一男
Japan Society for the Promotion of Science, Grants-in-Aid for Scientific Research, The University of Electro-Communications, Grant-in-Aid for Scientific Research (B), Principal investigator, 23H03393
Apr. 2023 - Mar. 2026 - スケーラブルな物理セキュリティを可能にする近似計算の設計基盤と理論の構築
冨山 宏之
IoTデバイスは、フィールドに配置される性質上、サイドチャネル攻撃などの物理攻撃にさらされやすい。一方、IoTデバイスは多種多様であり、セキュリティ対策に許容されるコストも様々である。本研究では、IoTデバイスを対象として、スケーラブルな物理セキュリティを実現する設計基盤と理論の構築を目的とする。この目的を達成するため、近似計算(Approximate Computing)技術をサイドチャネル攻撃対策に応用する。これにより、セキュリティの実装コストと安全性をトレードオフでき、多種多様なIoTデバイスを、それぞれ許容されるコストで保護することが可能となる。
01 Apr. 2020 - 31 Mar. 2024 - Resilience Enhancement of IoT Ecosystem by Cryptographic Technologies
崎山 一男; 廣瀬 勝一; 李 陽; 宮原 大輝; 渡邉 洋平; 岩本 貢; 駒野 雄一; 菅原 健; 三浦 典之; 太田 和夫
Japan Society for the Promotion of Science, Grants-in-Aid for Scientific Research Grant-in-Aid for Scientific Research (S), The University of Electro-Communications, Grant-in-Aid for Scientific Research (S), Principal investigator, リーク耐性暗号、リーク鍵の蒸留、及びリーク検知技術の3つの研究テーマの実績は以下の通りである。得られた成果は国内会議、国際会議、及び論文誌で発表した。 1)リーク耐性暗号: IDベース暗号について、マスター鍵が漏洩する場合でも安全となる構成法を提案した。また、復号鍵の漏洩に耐性のある鍵失効機能付きIDベース暗号の効率化に成功した。さらに、秘密鍵の盗難や紛失時の鍵漏洩耐性や秘密鍵自体の分散管理について検討した。カードベース暗号について、新しい物理道具を用いる秘密計算プロトコルを提案した。暗号利用モードについては、Lesamnta-LWの性能向上と応用について提案した。情報漏洩の形式的モデルへのフィードバックについては、演算器やマイクロアーキテクチャを精査し、新たな漏洩源を発見するとともに対策法を提案した。 2)リーク鍵の蒸留:AES暗号の秘密鍵復元において、検査フェイズを新たに導入し、従来0%の復元成功確率であった解析を約40%に向上することができた。プロービング攻撃への対策であるマスク実装について、あるブール関数を用いることで効率化できることを発見した。また、SHA-256圧縮関数の代数的故障利用解析やMAC関数chop-MDの偽造攻撃について、効率的な解析手法を考案した。チーム三浦/岩本との連携では、リキー方式の安全性と実装性を再考し、攻撃検知後に漏洩リスク下にある部分鍵を更新する新たな方式を構築した。この方式を搭載したAES暗号処理回路を設計した。 3)リーク検知技術:KU Leuven大と共同で作製したM&M技術により対策されたAES暗号ハードウェアの安全性評価を完了した。さらに連携を深めることで、リーケージセンサとアルゴリズムレベルでの対策技術の協調設計手法に着手できた。リーケージセンサについては、物理的なダイレクトプロービング攻撃の検知感度を高めた新たな回路を開発した。, 18H05289
Jun. 2018 - Mar. 2023 - Comprehensive study on anti-tamper techniques to prevent information leakage by laser fault injection attacks
Sakiyama Kazuo; VERBAUWHEDE Ingrid; DANGER Jean-Luc; BHASIN Shivam
Japan Society for the Promotion of Science, Grants-in-Aid for Scientific Research Grant-in-Aid for Scientific Research (A), The University of Electro-Communications, Grant-in-Aid for Scientific Research (A), Principal investigator, In this research, we have established fundamental countermeasure techniques against laser fault injection attacks, where an attacker intentionally induces soft errors in a cryptographic circuit to retrieve secret information. Specifically, we have conducted four research items; (1) construction of evaluation environment of laser fault injection attacks, (2) measurement of substrate potential fluctuation at laser irradiation and development of attack detection method, (3) development of countermeasure techniques for cryptographic-algorithm level based on detection, and (4) safety evaluation of countermeasure technology. We have deepened our understandings of the information leakage mechanism in the laser fault injection attack from physical and mathematical viewpoints and clarified the feasibility of countermeasure techniques using a prototype IC chip., 15H01688
Apr. 2015 - Mar. 2019 - Security Evaluation of Authentication Systems Using Side-Channel Information
Sakiyama Kazuo
Japan Society for the Promotion of Science, Grants-in-Aid for Scientific Research Grant-in-Aid for Challenging Exploratory Research, The University of Electro-Communications, Grant-in-Aid for Challenging Exploratory Research, Principal investigator, Previous work on side-channel information, physical information such as power leakage and electromagnetic waves leaked from a cryptographic system, focused on a case study of attacks that analyzed a part of side channel information and acquired a secret key. On the other hand, in this research project, we changed the way of thinking about side-channel information and set up a research framework that effectively utilizes all of the side-channel information. As an application, we proposed and constructed a new cryptosystem such as an authentication system, a ranging device, and an intrusion detection device using side-channel information, and demonstrated the enhancement of security. A series of efforts and understandings on this research topic has contributed to the development of side-channel analysis research., 15K12035
Apr. 2015 - Mar. 2018 - Development of Side-Channel Attack Sensing Techniques and Prototyping toward Electromagnetic Security of Cryptographic VLSI Circuits
Nagata Makoto; Danger Jean-Luc
Japan Society for the Promotion of Science, Grants-in-Aid for Scientific Research Grant-in-Aid for Scientific Research (A), Kobe University, Grant-in-Aid for Scientific Research (A), Coinvestigator, Cryptographic VLSI techniques have been established for assuring electromagnetic security with remarkably high tamper resistance against side-channel attacks. Three research items include: (1) On-chip detection of the proximate placement and approach of electromagnetic micro probes as the side-channel attack sensing technique, (2) integrated simulation techniques of electromagnetic coupling between the electromagnetic micro probe and on-chip side-channel sensors and also circuit operations, (3) positive usage of side-channel information for the authentication of cryptographic cores. These research items have been successfully completed and demonstrated with the fabricated integrated-circuit (IC) chips and prototype systems., 26240005
Apr. 2014 - Mar. 2017
Industrial Property Rights
- 二次元コード、二次元コード生成装置、二次元コード生成方法、二次元コード解読装置、 二次元コード解読方法、二次元コード生成解読システム、及び二次元コード生成解読方法
Patent right, 須長 淳也, 﨑山 一男, 宮原 大輝, 嶋野 裕一郎, 特願2024-005186, Date applied: 2024 - 認証システム及び認証方法
Patent right, 﨑山一男, 李陽, 特願2015-560958, Date applied: 29 Jan. 2015, 国立大学法人電気通信大学, 特許第6348914号, Date issued: 08 Jun. 2018 - 回路故障検出装置、回路故障検出方法
Patent right, 佐々木悠, 崎山一男, 太田和夫, 特願2010-275596, Date applied: 10 Dec. 2010, 東日本電信電話株式会社 、国立大学法人電気通信大学, 特開2012-122931, Date announced: 28 Jun. 2012, 特許第5637446号, Date issued: 31 Oct. 2014 - 電気錠システム
Patent right, 中谷浩茂, 梶山智史, 鍋嶋秀生, 太田和夫, 﨑山一男, 特願2010-168367, Date applied: 27 Jul. 2010, Panasonic Corporation, 特開2012-026225, Date announced: 09 Feb. 2012, 特許第5450303号, Date issued: 10 Jan. 2014 - 個体別情報生成装置及び個体別情報生成方法
Patent right, 山本大, 武仲正彦, 伊藤孝一, 落合隆夫, 岩本貢, 太田和夫, 崎山一男, 特願2011-278999, Date applied: 20 Dec. 2011, 富士通株式会社,国立大学法人電気通信大学, 特開2013-131867, Date announced: 04 Jul. 2013 - 温度センサ,暗号化装置,暗号化方法,及び個体別情報生成装置
Patent right, 山本大, 落合隆夫, 武仲正彦, 伊藤孝一, 崎山一男, 岩本貢, 太田和夫, 特願2011-279000, Date applied: 20 Dec. 2011, 富士通株式会社,国立大学法人電気通信大学, 特開2013-130434, Date announced: 04 Jul. 2013 - 温度センサ,暗号化装置,暗号化方法,及び個体別情報生成装置
Patent right, 山本大, 落合隆夫, 武仲正彦, 伊藤孝一, 崎山一男, 岩本貢, 太田和夫, 特願2011-279001, Date applied: 20 Dec. 2011, 富士通株式会社,国立大学法人電気通信大学, 特開2013-131868, Date announced: 04 Jul. 2013 - 個体別情報生成装置,暗号化装置,認証装置,及び個体別情報生成方法
Patent right, 山本大, 竹仲正彦, 伊藤孝一, 落合隆夫, 崎山一男, 岩本貢, 太田和夫, 特願2011-279002, Date applied: 20 Dec. 2011, 富士通株式会社,国立大学法人電気通信大学, 特開2013-131869, Date announced: 04 Jul. 2013 - 暗号化鍵生成装置およびプログラム
Patent right, 駒野雄一, 太田和夫, 崎山一男, 特願2011-275637, Date applied: 16 Dec. 2011, 株式会社東芝, 特開2013-126221, Date announced: 24 Jun. 2013 - 電源遮断時間判定装置及び無線タグ
Patent right, 﨑山一男, 李陽, 中曽根俊貴, 山本晃裕, 特願2013-038790, Date applied: 28 Feb. 2013, 国立大学法人電気通信大学 - 本人確認システム
Patent right, サントソバグス, 崎山一男, 太田和夫, 特願2008-289266, Date applied: 11 Nov. 2008, 国立大学法人電気通信大学, 特開2010-118796, Date announced: 27 May 2010