Volgen
Akira Ito
Akira Ito
NTT
Geverifieerd e-mailadres voor ntt.com - Homepage
Titel
Geciteerd door
Geciteerd door
Jaar
Curse of re-encryption: a generic power/EM analysis on post-quantum KEMs
R Ueno, K Xagawa, Y Tanaka, A Ito, J Takahashi, N Homma
IACR Transactions on Cryptographic Hardware and Embedded Systems, 296-322, 2022
812022
Fault-injection attacks against NIST’s post-quantum cryptography round 3 KEM candidates
K Xagawa, A Ito, R Ueno, J Takahashi, N Homma
Advances in Cryptology–ASIACRYPT 2021: 27th International Conference on the …, 2021
402021
Imbalanced data problems in deep learning-based side-channel attacks: Analysis and solution
A Ito, K Saito, R Ueno, N Homma
IEEE Transactions on Information Forensics and Security 16, 3790-3802, 2021
302021
Machine learning and hardware security: Challenges and opportunities
F Regazzoni, S Bhasin, AA Pour, I Alshaer, F Aydin, A Aysu, V Beroulle, ...
Proceedings of the 39th International Conference on Computer-Aided Design, 1-6, 2020
182020
Multiple-valued plaintext-checking side-channel attacks on post-quantum kems
Y Tanaka, R Ueno, K Xagawa, A Ito, J Takahashi, N Homma
IACR Transactions on Cryptographic Hardware and Embedded Systems 2023 (3 …, 2023
172023
On the success rate of side-channel attacks on masked implementations: information-theoretical bounds and their practical usage
A Ito, R Ueno, N Homma
Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications …, 2022
172022
Extraction of binarized neural network architecture and secret parameters using side-channel information
V Yli-Mäyry, A Ito, N Homma, S Bhasin, D Jap
2021 IEEE International Symposium on Circuits and Systems (ISCAS), 1-5, 2021
142021
Perceived information revisited: New metrics to evaluate success rate of side-channel attacks
A Ito, R Ueno, N Homma
IACR Transactions on Cryptographic Hardware and Embedded Systems, 228-254, 2022
82022
Practical side-channel based model extraction attack on tree-based machine learning algorithm
D Jap, V Yli-Mäyry, A Ito, R Ueno, S Bhasin, N Homma
Applied Cryptography and Network Security Workshops: ACNS 2020 Satellite …, 2020
82020
Toward optimal deep-learning based side-channel attacks: Probability concentration inequality loss and its usage
A Ito, R Ueno, N Homma
Cryptology ePrint Archive, 2021
72021
Efficient formal verification of galois-field arithmetic circuits using ZDD representation of Boolean polynomials
A Ito, R Ueno, N Homma
IEEE Transactions on Computer-Aided Design of Integrated Circuits and …, 2021
52021
One truth prevails: A deep-learning based single-trace power analysis on RSA–CRT with windowed exponentiation
K Saito, A Ito, R Ueno, N Homma
IACR Transactions on Cryptographic Hardware and Embedded Systems, 490-526, 2022
42022
A formal approach to identifying hardware Trojans in cryptographic hardware
A Ito, R Ueno, N Homma
2021 IEEE 51st International Symposium on Multiple-Valued Logic (ISMVL), 154-159, 2021
42021
Effective formal verification for galois-field arithmetic circuits with multiple-valued characteristics
A Ito, R Ueno, N Homma
2020 IEEE 50th International Symposium on Multiple-Valued Logic (ISMVL), 46-51, 2020
42020
Homomorphic encryption for stochastic computing
R Koseki, A Ito, R Ueno, M Tibouchi, N Homma
Journal of Cryptographic Engineering 13 (2), 251-263, 2023
22023
CycleGAN-based high-quality non-parallel voice conversion with spectrogram and WaveRNN
A Kanagaki, M Tanaka, T Nose, R Shimizu, A Ito, A Ito
2020 IEEE 9th Global Conference on Consumer Electronics (GCCE), 356-357, 2020
22020
Scyclone: High-Quality and Parallel-Data-Free Voice Conversion Using Spectrogram and Cycle-Consistent Adversarial Networks
M Tanaka, T Nose, A Kanagaki, R Shimizu, A Ito
arXiv preprint arXiv:2005.03334, 2020
22020
A Study on 2D photo-realistic facial animation generation using 3D facial feature points and deep neural networks
K Sato, T Nose, A Ito, Y Chiba, A Ito, T Shinozaki
Advances in Intelligent Information Hiding and Multimedia Signal Processing …, 2018
22018
On the detectability of hardware trojans embedded in parallel multipliers
A Ito, R Ueno, N Homma, T Aoki
2018 IEEE 48th International Symposium on Multiple-Valued Logic (ISMVL), 62-67, 2018
12018
Analysis of Linear Mode Connectivity via Permutation-Based Weight Matching
A Ito, M Yamada, A Kumagai
arXiv preprint arXiv:2402.04051, 2024
2024
Het systeem kan de bewerking nu niet uitvoeren. Probeer het later opnieuw.
Artikelen 1–20