Zobrazeno 1 - 10
of 221
pro vyhledávání: '"Takeshi SUGAWARA"'
Autor:
Shun Imai, Seiichiro Sakao, Jun Nagata, Akira Naito, Ayumi Sekine, Toshihiko Sugiura, Ayako Shigeta, Akira Nishiyama, Hajime Yokota, Norihiro Shimizu, Takeshi Sugawara, Toshiaki Nomi, Seiwa Honda, Keisuke Ogaki, Nobuhiro Tanabe, Takayuki Baba, Takuji Suzuki
Publikováno v:
BMC Pulmonary Medicine, Vol 24, Iss 1, Pp 1-7 (2024)
Abstract Background Pulmonary arterial hypertension is a serious medical condition. However, the condition is often misdiagnosed or a rather long delay occurs from symptom onset to diagnosis, associated with decreased 5-year survival. In this study,
Externí odkaz:
https://doaj.org/article/b3fd010195544205a3065e7685395f29
Publikováno v:
IEEE Access, Vol 12, Pp 84033-84045 (2024)
This paper studies the capability of light-based signal injection attacks to remotely inject fake inputs to modern optical sensor-based input devices. We demonstrate how an attacker can successfully inject malicious Character User Interface (CUI) com
Externí odkaz:
https://doaj.org/article/6cca5ac7234a464292c483dad5f00fc5
Publikováno v:
IACR Transactions on Symmetric Cryptology, Vol 2023, Iss 4 (2023)
Context-committing security of authenticated encryption (AE) that prevents ciphertexts from being decrypted with distinct decryption contexts, (K,N,A) comprising a key K, a nonce N, and associate data A is an active research field motivated by severa
Externí odkaz:
https://doaj.org/article/6815d36fede945d08e2444b0f2ae2bc9
Publikováno v:
Transactions on Cryptographic Hardware and Embedded Systems, Vol 2023, Iss 4 (2023)
We propose a new authenticated encryption (AE) mode MMM that achieves the minimum memory size with masking. Minimizing the secret state is the crucial challenge in the low-memory AE suitable for masking. Here, the minimum secret state is s + b bits,
Externí odkaz:
https://doaj.org/article/231ac46e518745f2b36c50b3723c2830
Autor:
Tomoaki Tatsumi, Yoko Takatsuna, Toshiyuki Oshitari, Tomomi Kaiho, Yohei Kawasaki, Yuki Shiko, Takeshi Sugawara, Takayuki Baba, Shuichi Yamamoto
Publikováno v:
Scientific Reports, Vol 12, Iss 1, Pp 1-13 (2022)
Abstract To compare the efficacy and safety of intravitreal aflibercept with three loading doses + pro re nata regimen combined with subthreshold laser application to that of IVA monotherapy on eyes with diabetic macular edema. This was a phase 4 cli
Externí odkaz:
https://doaj.org/article/1bb4896871bc43eba8a0d9f20949ffb9
Publikováno v:
Transactions on Cryptographic Hardware and Embedded Systems, Vol 2022, Iss 4 (2022)
We propose a new laser injection attack Redshift that manipulates signal propagation delay, allowing for precise control of oscillator frequencies and other behaviors in delay-sensitive circuits. The target circuits have a significant sensitivity to
Externí odkaz:
https://doaj.org/article/26524e0957fd48c9b5579e8f9cd7c250
Autor:
Takeshi Sugawara, Kunihiko Kaneko
Publikováno v:
PLoS Computational Biology, Vol 18, Iss 7, p e1010324 (2022)
Cell polarity regulates the orientation of the cytoskeleton members that directs intracellular transport for cargo-like organelles, using chemical gradients sustained by ATP or GTP hydrolysis. However, how cargo transports are directly mediated by ch
Externí odkaz:
https://doaj.org/article/6a02ced7519d4f0ab76dcfde786fc6d4
Publikováno v:
Transactions on Cryptographic Hardware and Embedded Systems, Vol 2021, Iss 3 (2021)
In this paper, a new lightweight authenticated encryption scheme AESLBBB is proposed, which was designed to provide backward compatibility with advanced encryption standard (AES) as well as high security and low memory. The primary design goal, backw
Externí odkaz:
https://doaj.org/article/ed6af4ef62f5415c9d55bb48aa01b500
Publikováno v:
IACR Transactions on Symmetric Cryptology, Vol 2020, Iss 4 (2020)
This paper proposes a new lightweight deterministic authenticated encryption (DAE) scheme providing 128-bit security. Lightweight DAE schemes are practically important because resource-restricted devices sometimes cannot afford to manage a nonce prop
Externí odkaz:
https://doaj.org/article/8cd90c24c1d44b9fa31b370daa084e5b
Publikováno v:
Applied Sciences, Vol 12, Iss 9, p 4135 (2022)
Artificial intelligence (AI) is progressing rapidly, and in this trend, edge AI has been researched intensively. However, much less work has been performed around the security of edge AI. Machine learning models are a mass of intellectual property, a
Externí odkaz:
https://doaj.org/article/dead16d12a6f4d2d91d1b72945acbc6d