Takeshi Sugawara

Orcid: 0000-0001-9356-534X

Affiliations:
  • The University of Electro-Communications, Tokyo, Japan


According to our database1, Takeshi Sugawara authored at least 77 papers between 2007 and 2024.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
Simulation-based evaluation of bit-interaction side-channel leakage on RISC-V: extended version.
J. Cryptogr. Eng., April, 2024

Committing Wide Encryption Mode with Minimum Ciphertext Expansion.
IACR Cryptol. ePrint Arch., 2024

LightTouch: Harnessing Laser-Based Signal Injection to Manipulate Optical Human-Computer Interfaces.
IEEE Access, 2024

AquaSonic: Acoustic Manipulation of Underwater Data Center Operations and Resource Management.
Proceedings of the IEEE Symposium on Security and Privacy, 2024

Invisible Reflections: Leveraging Infrared Laser Reflections to Target Traffic Sign Perception.
Proceedings of the 31st Annual Network and Distributed System Security Symposium, 2024

The Exact Multi-user Security of (Tweakable) Key Alternating Ciphers with a Single Permutation.
Proceedings of the Advances in Cryptology - EUROCRYPT 2024, 2024

The Exact Multi-user Security of 2-Key Triple DES.
Proceedings of the Topics in Cryptology - CT-RSA 2024, 2024

KIVR: Committing Authenticated Encryption Using Redundancy and Application to GCM, CCM, and More.
Proceedings of the Applied Cryptography and Network Security, 2024

2023
Exploring Effect of Residual Electric Charges on Cryptographic Circuits: Extended Version.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., March, 2023

Committing Security of Ascon: Cryptanalysis on Primitive and Proof on Mode.
IACR Trans. Symmetric Cryptol., 2023

MMM: Authenticated Encryption with Minimum Secret State for Masking.
IACR Trans. Cryptogr. Hardw. Embed. Syst., 2023

EMI-LiDAR: Uncovering Vulnerabilities of LiDAR Sensors in Autonomous Driving Setting using Electromagnetic Interference.
Proceedings of the 16th ACM Conference on Security and Privacy in Wireless and Mobile Networks, 2023

You Can't See Me: Physical Removal Attacks on LiDAR-based Autonomous Vehicles Driving Frameworks.
Proceedings of the 32nd USENIX Security Symposium, 2023

Position Paper: Space System Threat Models Must Account for Satellite Sensor Spoofing.
Proceedings of the 1st Workshop on Security of Space and Satellite Systems, SpaceSec 2023, 2023

Exploring Leakage Characteristics and Attacks Through Profiles of Screaming Channels.
Proceedings of the Mobile Internet Security - 7th International Conference, 2023

Permutation-Based Deterministic Authenticated Encryption with Minimum Memory Size.
Proceedings of the Information Security - 26th International Conference, 2023

2022
Redshift: Manipulating Signal Propagation Delay via Continuous-Wave Lasers.
IACR Trans. Cryptogr. Hardw. Embed. Syst., 2022

Mixture-Based 5-Round Physical Attack against AES: Attack Proposal and Noise Evaluation.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2022

Secret Can Be Public: Low-Memory AEAD Mode for High-Order Masking.
IACR Cryptol. ePrint Arch., 2022

Laser-Based Signal-Injection Attack on Piezoresistive MEMS Pressure Sensors.
Proceedings of the 2022 IEEE Sensors, Dallas, TX, USA, October 30 - Nov. 2, 2022, 2022

Poster: Inaudible Acoustic Noise from Silicon Capacitors for Voice-Command Injection.
Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security, 2022

The Multi-User Security of Triple Encryption, Revisited: Exact Security, Strengthening, and Application to TDES.
Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security, 2022

2021
AES-LBBB: AES Mode for Lightweight and BBB-Secure Authenticated Encryption.
IACR Trans. Cryptogr. Hardw. Embed. Syst., 2021

Application of Adversarial Examples to Physical ECG Signals.
CoRR, 2021

Why Lasers Inject Perceived Sound Into MEMS Microphones: Indications and Contraindications of Photoacoustic and Photoelectric Effects.
Proceedings of the 2021 IEEE Sensors, Sydney, Australia, October 31 - Nov. 3, 2021, 2021

Revisiting System Noise in Side-Channel Attacks: Mutual Assistant SCA vs. Genetic Algorithm.
Proceedings of the Asian Hardware Oriented Security and Trust Symposium, 2021

Double-Block-Length Hash Function for Minimum Memory Size.
Proceedings of the Advances in Cryptology - ASIACRYPT 2021, 2021

2020
LM-DAE: Low-Memory Deterministic Authenticated Encryption for 128-bit Security.
IACR Trans. Symmetric Cryptol., 2020

Lightweight Authenticated Encryption Mode of Operation for Tweakable Block Ciphers.
IACR Trans. Cryptogr. Hardw. Embed. Syst., 2020

Signal Injection Attack on Time-to-Digital Converter and Its Application to Physically Unclonable Function.
IACR Cryptol. ePrint Arch., 2020

Lightweight Authenticated Encryption Mode Suitable for Threshold Implementation.
IACR Cryptol. ePrint Arch., 2020

Hardware Performance Evaluation of Authenticated Encryption SAEAES with Threshold Implementation.
Cryptogr., 2020

Light Commands: Laser-Based Audio Injection Attacks on Voice-Controllable Systems.
Proceedings of the 29th USENIX Security Symposium, 2020

(Short Paper) Signal Injection Attack on Time-to-Digital Converter and Its Application to Physically Unclonable Function.
Proceedings of the Advances in Information and Computer Security, 2020

Low-Memory Implementation of Authenticated Encryption Algorithm SAEAES on ARM Cortex-M0 Microcontroller.
Proceedings of the 9th IEEE Global Conference on Consumer Electronics, 2020

An Optimized Implementation of AES-GCM for FPGA Acceleration Using High-Level Synthesis.
Proceedings of the 9th IEEE Global Conference on Consumer Electronics, 2020

Exploring Effect of Residual Electric Charges on Cryptographic Circuits.
Proceedings of the 4th ACM Workshop on Attacks and Solutions in Hardware Security Workshop, 2020

Simple Electromagnetic Analysis Against Activation Functions of Deep Neural Networks.
Proceedings of the Applied Cryptography and Network Security Workshops, 2020

2019
3-Share Threshold Implementation of AES S-box without Fresh Randomness.
IACR Trans. Cryptogr. Hardw. Embed. Syst., 2019

Side-channel leakage from sensor-based countermeasures against fault injection attack.
Microelectron. J., 2019

Side-Channel Leakage of Alarm Signal for a Bulk-Current-Based Laser Sensor.
Proceedings of the Information Security and Cryptology - 15th International Conference, 2019

An Abstraction Model for 1-bit Probing Attack on Block Ciphers.
Proceedings of the IEEE 4th International Conference on Computer and Communication Systems, 2019

2018
SAEB: A Lightweight Blockcipher-Based AEAD Mode of Operation.
IACR Trans. Cryptogr. Hardw. Embed. Syst., 2018

A 286 F<sup>2</sup>/Cell Distributed Bulk-Current Sensor and Secure Flush Code Eraser Against Laser Fault Injection Attack on Cryptographic Processor.
IEEE J. Solid State Circuits, 2018

<i>Q</i>-Class Authentication System for Double Arbiter PUF.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2018

A 286F<sup>2</sup>/cell distributed bulk-current sensor and secure flush code eraser against laser fault injection attack.
Proceedings of the 2018 IEEE International Solid-State Circuits Conference, 2018

Recovering Memory Access Sequence with Differential Flush+Reload Attack.
Proceedings of the Information Security Practice and Experience, 2018

A Secure LiDAR with AES-Based Side-Channel Fingerprinting.
Proceedings of the Sixth International Symposium on Computing and Networking, 2018

Sensor CON-Fusion: Defeating Kalman Filter in Signal Injection Attack.
Proceedings of the 2018 on Asia Conference on Computer and Communications Security, 2018

2017
Efficient Software Implementation of Modular Multiplication in Prime Fields on TI's DSP TMS320C6678.
Proceedings of the Information Security Applications - 18th International Conference, 2017

Exploiting Bitflip Detector for Non-invasive Probing and its Application to Ineffective Fault Analysis.
Proceedings of the 2017 Workshop on Fault Diagnosis and Tolerance in Cryptography, 2017

2016
Asymmetric Leakage from Multiplier and Collision-Based Single-Shot Side-Channel Attack.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2016

Output Masking of Tweakable Even-Mansour Can Be Eliminated for Message Authentication Code.
Proceedings of the Selected Areas in Cryptography - SAC 2016, 2016

2015
Reversing stealthy dopant-level circuits.
J. Cryptogr. Eng., 2015

Two Operands of Multipliers in Side-Channel Attack.
IACR Cryptol. ePrint Arch., 2015

PUF as a sensor.
Proceedings of the IEEE 4th Global Conference on Consumer Electronics, 2015

2014
On measurable side-channel leaks inside ASIC design primitives.
J. Cryptogr. Eng., 2014

Unified Coprocessor Architecture for Secure Key Storage and Challenge-Response Authentication.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2014

2012
Fair and Consistent Hardware Evaluation of Fourteen Round Two SHA-3 Candidates.
IEEE Trans. Very Large Scale Integr. Syst., 2012

Evaluation of Information Leakage from Cryptographic Hardware via Common-Mode Current.
IEICE Trans. Electron., 2012

A Configurable On-Chip Glitchy-Clock Generator for Fault Injection Experiments.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2012

Circuit Simulation for Fault Sensitivity Analysis and Its Application to Cryptographic LSI.
Proceedings of the 2012 Workshop on Fault Diagnosis and Tolerance in Cryptography, 2012

2011
An on-chip glitchy-clock generator for testing fault injection attacks.
J. Cryptogr. Eng., 2011

High-Performance Architecture for Concurrent Error Detection for AES Processors.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2011

2010
Profiling attack using multivariate regression analysis.
IEICE Electron. Express, 2010

Hardware Implementations of Hash Function Luffa.
Proceedings of the HOST 2010, 2010

2009
High-Performance Hardware Architectures for Galois Counter Mode.
IEEE Trans. Computers, 2009

Mechanism behind Information Leakage in Electromagnetic Analysis of Cryptographic Modules.
Proceedings of the Information Security Applications, 10th International Workshop, 2009

Differential power analysis of AES ASIC implementations with various S-box circuits.
Proceedings of the 19th European Conference on Circuit Theory and Design, 2009

Development of side-channel attack standard evaluation environment.
Proceedings of the 19th European Conference on Circuit Theory and Design, 2009

2008
A High-Resolution Phase-Based Waveform Matching and Its Application to Side-Channel Attacks.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2008

Compact ASIC Architectures for the 512-Bit Hash Function Whirlpool.
Proceedings of the Information Security Applications, 9th International Workshop, 2008

Enhanced Correlation Power Analysis Using Key Screening Technique.
Proceedings of the ReConFig'08: 2008 International Conference on Reconfigurable Computing and FPGAs, 2008

High-performance ASIC implementations of the 128-bit block cipher CLEFIA.
Proceedings of the International Symposium on Circuits and Systems (ISCAS 2008), 2008

High-Performance Concurrent Error Detection Scheme for AES Hardware.
Proceedings of the Cryptographic Hardware and Embedded Systems, 2008

2007
High-Speed Pipelined Hardware Architecture for Galois Counter Mode.
Proceedings of the Information Security, 10th International Conference, 2007

A High-Performance ASIC Implementation of the 64-bit Block Cipher CAST-128.
Proceedings of the International Symposium on Circuits and Systems (ISCAS 2007), 2007


  Loading...