Zobrazeno 1 - 10
of 19
pro vyhledávání: '"Toru Akishita"'
Publikováno v:
2021 IEEE International Workshop on Information Forensics and Security (WIFS).
Autor:
Francesco Regazzoni, Subhadeep Banik, Harunaga Hiwatari, Toru Akishita, Takanori Isobe, Andrey Bogdanov
Publikováno v:
HOST
In this paper we explore the technique of “inverse gating” which is a significant improvement over the “round gating” technique introduced in HOST 2016. Round gating worked by generating timing signals to separate glitch propagation from one
Autor:
Francesco Regazzoni, Andrey Bogdanov, Subhadeep Banik, Takanori Isobe, Harunaga Hiwatari, Toru Akishita
Publikováno v:
HOST
Pushed by the pervasive diffusion of devices operated by battery or by the energy harvested, energy has become one of the most important parameter to be optimized for embedded systems. Particularly relevant would be to optimize the energy consumption
Autor:
Noboru Kunihiro, Toru Akishita
Publikováno v:
Constructive Side-Channel Analysis and Secure Design ISBN: 9783319432823
COSADE
COSADE
In this paper we propose improved Differential Fault Analysis (DFA) on the block cipher Camellia with a 128-bit key. Existing DFAs on Camellia-128 require several faults induced at multiple rounds, at least two of which must be induced at or after th
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::2243b99a86773e33ccd595a2b19261ef
https://doi.org/10.1007/978-3-319-43283-0_8
https://doi.org/10.1007/978-3-319-43283-0_8
Publikováno v:
IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences. :151-160
It has recently been reported that the performance of hyperelliptic curve cryptosystems (HECC) is competitive to that of elliptic curve cryptosystems (ECC). Concerning the security of HECC, the theta divisors play an important role. The scalar multip
Autor:
Tsuyoshi Takagi, Toru Akishita
Publikováno v:
IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences. :132-139
Differential power analysis (DPA) might break implementations of elliptic curve cryptosystem (ECC) on memory constraint devices. Goubin proposed a variant of DPA using a point (0, y), which is not randomized in Jacobian coordinates or in an isomorphi
Autor:
Subhadeep Banik, Francesco Regazzoni, Harunaga Hiwatari, Andrey Bogdanov, Takanori Isobe, Toru Akishita, Kyoji Shibutani
Publikováno v:
Advances in Cryptology – ASIACRYPT 2015 ISBN: 9783662487990
ASIACRYPT (2)
ASIACRYPT (2)
In the past few years, lightweight cryptography has become a popular research discipline with a number of ciphers and hash functions proposed. The designers' focus has been predominantly to minimize the hardware area, while other goals such as low la
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::4cedb5b373d74abc144d0b324c48eb4f
https://doi.org/10.1007/978-3-662-48800-3_17
https://doi.org/10.1007/978-3-662-48800-3_17
Publikováno v:
Progress of Theoretical Physics. 102:1057-1064
In the sine-circle map, the phase-locking structure on the parameter plane (Ω, K )i s known as Arnold’s tongue. The overlapping of two adjacent tongues implies the coexistence of two phase-locked attractors with different rotation numbers. The ph
Autor:
Toru Akishita, Harunaga Hiwatari
Publikováno v:
Selected Areas in Cryptography ISBN: 9783642284953
Selected Areas in Cryptography
Selected Areas in Cryptography
The 128-bit blockcipher CLEFIA is known to be highly efficient in hardware implementations. This paper proposes very compact hardware implementations of CLEFIA-128. Our implementations are based on novel serialized architectures in the data processin
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::2101a99ed3c0f334221a254d4a8b8534
https://doi.org/10.1007/978-3-642-28496-0_17
https://doi.org/10.1007/978-3-642-28496-0_17
Autor:
Takanori Isobe, Harunaga Hiwatari, Toru Akishita, Taizo Shirai, Kyoji Shibutani, Atsushi Mitsuda
Publikováno v:
Cryptographic Hardware and Embedded Systems – CHES 2011 ISBN: 9783642239502
CHES
CHES
We propose a new 64-bit blockcipher Piccolo supporting 80 and 128-bit keys. Adopting several novel design and implementation techniques, Piccolo achieves both high security and notably compact implementation in hardware. We show that Piccolo offers a
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::40e853e45f66a005d4eb4286ff751250
https://doi.org/10.1007/978-3-642-23951-9_23
https://doi.org/10.1007/978-3-642-23951-9_23