Takeshi Sugawara
Orcid: 0000-0001-9356-534XAffiliations:
- The University of Electro-Communications, Tokyo, Japan
According to our database1,
Takeshi Sugawara
authored at least 78 papers
between 2007 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
-
on orcid.org
On csauthors.net:
Bibliography
2024
Simulation-based evaluation of bit-interaction side-channel leakage on RISC-V: extended version.
J. Cryptogr. Eng., April, 2024
IACR Cryptol. ePrint Arch., 2024
LightTouch: Harnessing Laser-Based Signal Injection to Manipulate Optical Human-Computer Interfaces.
IEEE Access, 2024
AquaSonic: Acoustic Manipulation of Underwater Data Center Operations and Resource Management.
Proceedings of the IEEE Symposium on Security and Privacy, 2024
Invisible Reflections: Leveraging Infrared Laser Reflections to Target Traffic Sign Perception.
Proceedings of the 31st Annual Network and Distributed System Security Symposium, 2024
The Exact Multi-user Security of (Tweakable) Key Alternating Ciphers with a Single Permutation.
Proceedings of the Advances in Cryptology - EUROCRYPT 2024, 2024
Proceedings of the Topics in Cryptology - CT-RSA 2024, 2024
Proceedings of the 2024 Workshop on Attacks and Solutions in Hardware Security, 2024
KIVR: Committing Authenticated Encryption Using Redundancy and Application to GCM, CCM, and More.
Proceedings of the Applied Cryptography and Network Security, 2024
2023
Exploring Effect of Residual Electric Charges on Cryptographic Circuits: Extended Version.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., March, 2023
IACR Trans. Symmetric Cryptol., 2023
IACR Trans. Cryptogr. Hardw. Embed. Syst., 2023
EMI-LiDAR: Uncovering Vulnerabilities of LiDAR Sensors in Autonomous Driving Setting using Electromagnetic Interference.
Proceedings of the 16th ACM Conference on Security and Privacy in Wireless and Mobile Networks, 2023
You Can't See Me: Physical Removal Attacks on LiDAR-based Autonomous Vehicles Driving Frameworks.
Proceedings of the 32nd USENIX Security Symposium, 2023
Position Paper: Space System Threat Models Must Account for Satellite Sensor Spoofing.
Proceedings of the 1st Workshop on Security of Space and Satellite Systems, SpaceSec 2023, 2023
Exploring Leakage Characteristics and Attacks Through Profiles of Screaming Channels.
Proceedings of the Mobile Internet Security - 7th International Conference, 2023
Proceedings of the Information Security - 26th International Conference, 2023
2022
IACR Trans. Cryptogr. Hardw. Embed. Syst., 2022
Mixture-Based 5-Round Physical Attack against AES: Attack Proposal and Noise Evaluation.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2022
IACR Cryptol. ePrint Arch., 2022
Proceedings of the 2022 IEEE Sensors, Dallas, TX, USA, October 30 - Nov. 2, 2022, 2022
Poster: Inaudible Acoustic Noise from Silicon Capacitors for Voice-Command Injection.
Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security, 2022
The Multi-User Security of Triple Encryption, Revisited: Exact Security, Strengthening, and Application to TDES.
Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security, 2022
2021
IACR Trans. Cryptogr. Hardw. Embed. Syst., 2021
Why Lasers Inject Perceived Sound Into MEMS Microphones: Indications and Contraindications of Photoacoustic and Photoelectric Effects.
Proceedings of the 2021 IEEE Sensors, Sydney, Australia, October 31 - Nov. 3, 2021, 2021
Revisiting System Noise in Side-Channel Attacks: Mutual Assistant SCA vs. Genetic Algorithm.
Proceedings of the Asian Hardware Oriented Security and Trust Symposium, 2021
Proceedings of the Advances in Cryptology - ASIACRYPT 2021, 2021
2020
IACR Trans. Symmetric Cryptol., 2020
IACR Trans. Cryptogr. Hardw. Embed. Syst., 2020
Signal Injection Attack on Time-to-Digital Converter and Its Application to Physically Unclonable Function.
IACR Cryptol. ePrint Arch., 2020
IACR Cryptol. ePrint Arch., 2020
Hardware Performance Evaluation of Authenticated Encryption SAEAES with Threshold Implementation.
Cryptogr., 2020
Proceedings of the 29th USENIX Security Symposium, 2020
(Short Paper) Signal Injection Attack on Time-to-Digital Converter and Its Application to Physically Unclonable Function.
Proceedings of the Advances in Information and Computer Security, 2020
Low-Memory Implementation of Authenticated Encryption Algorithm SAEAES on ARM Cortex-M0 Microcontroller.
Proceedings of the 9th IEEE Global Conference on Consumer Electronics, 2020
An Optimized Implementation of AES-GCM for FPGA Acceleration Using High-Level Synthesis.
Proceedings of the 9th IEEE Global Conference on Consumer Electronics, 2020
Proceedings of the 4th ACM Workshop on Attacks and Solutions in Hardware Security Workshop, 2020
Simple Electromagnetic Analysis Against Activation Functions of Deep Neural Networks.
Proceedings of the Applied Cryptography and Network Security Workshops, 2020
2019
IACR Trans. Cryptogr. Hardw. Embed. Syst., 2019
Side-channel leakage from sensor-based countermeasures against fault injection attack.
Microelectron. J., 2019
Proceedings of the Information Security and Cryptology - 15th International Conference, 2019
Proceedings of the IEEE 4th International Conference on Computer and Communication Systems, 2019
2018
IACR Trans. Cryptogr. Hardw. Embed. Syst., 2018
A 286 F<sup>2</sup>/Cell Distributed Bulk-Current Sensor and Secure Flush Code Eraser Against Laser Fault Injection Attack on Cryptographic Processor.
IEEE J. Solid State Circuits, 2018
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2018
A 286F<sup>2</sup>/cell distributed bulk-current sensor and secure flush code eraser against laser fault injection attack.
Proceedings of the 2018 IEEE International Solid-State Circuits Conference, 2018
Proceedings of the Information Security Practice and Experience, 2018
Proceedings of the Sixth International Symposium on Computing and Networking, 2018
Proceedings of the 2018 on Asia Conference on Computer and Communications Security, 2018
2017
Efficient Software Implementation of Modular Multiplication in Prime Fields on TI's DSP TMS320C6678.
Proceedings of the Information Security Applications - 18th International Conference, 2017
Exploiting Bitflip Detector for Non-invasive Probing and its Application to Ineffective Fault Analysis.
Proceedings of the 2017 Workshop on Fault Diagnosis and Tolerance in Cryptography, 2017
2016
Asymmetric Leakage from Multiplier and Collision-Based Single-Shot Side-Channel Attack.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2016
Output Masking of Tweakable Even-Mansour Can Be Eliminated for Message Authentication Code.
Proceedings of the Selected Areas in Cryptography - SAC 2016, 2016
2015
Proceedings of the IEEE 4th Global Conference on Consumer Electronics, 2015
2014
J. Cryptogr. Eng., 2014
Unified Coprocessor Architecture for Secure Key Storage and Challenge-Response Authentication.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2014
2012
IEEE Trans. Very Large Scale Integr. Syst., 2012
Evaluation of Information Leakage from Cryptographic Hardware via Common-Mode Current.
IEICE Trans. Electron., 2012
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2012
Circuit Simulation for Fault Sensitivity Analysis and Its Application to Cryptographic LSI.
Proceedings of the 2012 Workshop on Fault Diagnosis and Tolerance in Cryptography, 2012
2011
J. Cryptogr. Eng., 2011
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2011
2010
IEICE Electron. Express, 2010
2009
IEEE Trans. Computers, 2009
Mechanism behind Information Leakage in Electromagnetic Analysis of Cryptographic Modules.
Proceedings of the Information Security Applications, 10th International Workshop, 2009
Proceedings of the 19th European Conference on Circuit Theory and Design, 2009
Proceedings of the 19th European Conference on Circuit Theory and Design, 2009
2008
A High-Resolution Phase-Based Waveform Matching and Its Application to Side-Channel Attacks.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2008
Proceedings of the Information Security Applications, 9th International Workshop, 2008
Proceedings of the ReConFig'08: 2008 International Conference on Reconfigurable Computing and FPGAs, 2008
Proceedings of the International Symposium on Circuits and Systems (ISCAS 2008), 2008
Proceedings of the Cryptographic Hardware and Embedded Systems, 2008
2007
Proceedings of the Information Security, 10th International Conference, 2007
Proceedings of the International Symposium on Circuits and Systems (ISCAS 2007), 2007