Akira Ito

Orcid: 0000-0002-4602-7570

Affiliations:
  • NTT Social Informatics Laboratories, Tokyo, Japan
  • Tohoku University, Sendai, Japan (PhD 2022)


According to our database1, Akira Ito authored at least 26 papers between 2017 and 2025.

Collaborative distances:

Timeline

2017
2018
2019
2020
2021
2022
2023
2024
2025
0
1
2
3
4
5
6
7
8
1
1
3
5
4
1
1
3
4
2
1

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2025
Perceived Information Revisited II Information-Theoretical Analysis of Deep-Learning Based Side-Channel Attacks.
IACR Trans. Cryptogr. Hardw. Embed. Syst., 2025

2024
Analysis of Linear Mode Connectivity via Permutation-Based Weight Matching.
CoRR, 2024

2023
Homomorphic encryption for stochastic computing.
J. Cryptogr. Eng., June, 2023

Multiple-Valued Plaintext-Checking Side-Channel Attacks on Post-Quantum KEMs.
IACR Trans. Cryptogr. Hardw. Embed. Syst., 2023

Formal Analysis of Non-profiled Deep-learning Based Side-channel Attacks.
IACR Cryptol. ePrint Arch., 2023

Can Inputs' Reconstruction Information Be Coded into Machine Learning Model's Outputs?
Proceedings of the Computer Security. ESORICS 2023 International Workshops, 2023

2022
Curse of Re-encryption: A Generic Power/EM Analysis on Post-Quantum KEMs.
IACR Trans. Cryptogr. Hardw. Embed. Syst., 2022

One Truth Prevails: A Deep-learning Based Single-Trace Power Analysis on RSA-CRT with Windowed Exponentiation.
IACR Trans. Cryptogr. Hardw. Embed. Syst., 2022

Perceived Information Revisited New Metrics to Evaluate Success Rate of Side-Channel Attacks.
IACR Trans. Cryptogr. Hardw. Embed. Syst., 2022

Efficient Formal Verification of Galois-Field Arithmetic Circuits Using ZDD Representation of Boolean Polynomials.
IEEE Trans. Comput. Aided Des. Integr. Circuits Syst., 2022

On the Success Rate of Side-Channel Attacks on Masked Implementations: Information-Theoretical Bounds and Their Practical Usage.
IACR Cryptol. ePrint Arch., 2022

2021
Imbalanced Data Problems in Deep Learning-Based Side-Channel Attacks: Analysis and Solution.
IEEE Trans. Inf. Forensics Secur., 2021

An Algebraic Approach to Verifying Galois-Field Arithmetic Circuits with Multiple-Valued Characteristics.
IEICE Trans. Inf. Syst., 2021

Fault-Injection Attacks against NIST's Post-Quantum Cryptography Round 3 KEM Candidates.
IACR Cryptol. ePrint Arch., 2021

Toward Optimal Deep-Learning Based Side-Channel Attacks: Probability Concentration Inequality Loss and Its Usage.
IACR Cryptol. ePrint Arch., 2021

Machine-learning-based Quality-level-estimation System for Inspecting Steel Microstructures.
Proceedings of the 17th International Conference on Machine Vision and Applications, 2021

A Formal Approach to Identifying Hardware Trojans in Cryptographic Hardware.
Proceedings of the 51st IEEE International Symposium on Multiple-Valued Logic, 2021

Extraction of Binarized Neural Network Architecture and Secret Parameters Using Side-Channel Information.
Proceedings of the IEEE International Symposium on Circuits and Systems, 2021

2020
Effective Formal Verification for Galois-field Arithmetic Circuits with Multiple-Valued Characteristics.
Proceedings of the 50th IEEE International Symposium on Multiple-Valued Logic, 2020

Machine Learning and Hardware security: Challenges and Opportunities -Invited Talk-.
Proceedings of the IEEE/ACM International Conference On Computer Aided Design, 2020

CycleGAN-Based High-Quality Non-Parallel Voice Conversion with Spectrogram and WaveRNN.
Proceedings of the 9th IEEE Global Conference on Consumer Electronics, 2020

Practical Side-Channel Based Model Extraction Attack on Tree-Based Machine Learning Algorithm.
Proceedings of the Applied Cryptography and Network Security Workshops, 2020

2018
Characterizing Parallel Multipliers for Detecting Hardware Trojans.
FLAP, 2018

On the Detectability of Hardware Trojans Embedded in Parallel Multipliers.
Proceedings of the 48th IEEE International Symposium on Multiple-Valued Logic, 2018

A Non-Reversible Insertion Method for Hardware Trojans Based on Path Delay Faults.
Proceedings of the PROOFS 2018, 2018

2017
A Study on 2D Photo-Realistic Facial Animation Generation Using 3D Facial Feature Points and Deep Neural Networks.
Proceedings of the Advances in Intelligent Information Hiding and Multimedia Signal Processing, 2017


  Loading...