Follow
Akira Ito
Akira Ito
Verified email at hco.ntt.co.jp - Homepage
Title
Cited by
Cited by
Year
Curse of re-encryption: A generic power/em analysis on post-quantum kems
R Ueno, K Xagawa, Y Tanaka, A Ito, J Takahashi, N Homma
IACR Transactions on Cryptographic Hardware and Embedded Systems, 296-322, 2022
252022
Fault-injection attacks against NIST’s post-quantum cryptography round 3 KEM candidates
K Xagawa, A Ito, R Ueno, J Takahashi, N Homma
International Conference on the Theory and Application of Cryptology and …, 2021
162021
Machine learning and hardware security: Challenges and opportunities-invited talk
F Regazzoni, S Bhasin, AA Pour, I Alshaer, F Aydin, A Aysu, V Beroulle, ...
2020 IEEE/ACM International Conference On Computer Aided Design (ICCAD), 1-6, 2020
102020
Imbalanced data problems in deep learning-based side-channel attacks: analysis and solution
A Ito, K Saito, R Ueno, N Homma
IEEE Transactions on Information Forensics and Security 16, 3790-3802, 2021
92021
Extraction of binarized neural network architecture and secret parameters using side-channel information
V Yli-Mäyry, A Ito, N Homma, S Bhasin, D Jap
2021 IEEE International Symposium on Circuits and Systems (ISCAS), 1-5, 2021
42021
Toward Optimal Deep-Learning Based Side-Channel Attacks: Probability Concentration Inequality Loss and Its Usage
A Ito, R Ueno, N Homma
Cryptology ePrint Archive, 2021
42021
Practical side-channel based model extraction attack on tree-based machine learning algorithm
D Jap, V Yli-Mäyry, A Ito, R Ueno, S Bhasin, N Homma
International Conference on Applied Cryptography and Network Security, 93-105, 2020
42020
Efficient Formal Verification of Galois-Field Arithmetic Circuits Using ZDD Representation of Boolean Polynomials
A Ito, R Ueno, N Homma
IEEE Transactions on Computer-Aided Design of Integrated Circuits and …, 2021
32021
On the Success Rate of Side-Channel Attacks on Masked Implementations: Information-Theoretical Bounds and Their Practical Usage
A Ito, R Ueno, N Homma
Cryptology ePrint Archive, 2022
22022
A formal approach to identifying hardware trojans in cryptographic hardware
A Ito, R Ueno, N Homma
2021 IEEE 51st International Symposium on Multiple-Valued Logic (ISMVL), 154-159, 2021
22021
Effective Formal Verification for Galois-field Arithmetic Circuits with Multiple-Valued Characteristics
A Ito, R Ueno, N Homma
2020 IEEE 50th International Symposium on Multiple-Valued Logic (ISMVL), 46-51, 2020
22020
Scyclone: High-Quality and Parallel-Data-Free Voice Conversion Using Spectrogram and Cycle-Consistent Adversarial Networks
M Tanaka, T Nose, A Kanagaki, R Shimizu, A Ito
arXiv preprint arXiv:2005.03334, 2020
22020
A Study on 2D photo-realistic facial animation generation using 3D facial feature points and deep neural networks
K Sato, T Nose, A Ito, Y Chiba, A Ito, T Shinozaki
International Conference on Intelligent Information Hiding and Multimedia …, 2017
22017
CycleGAN-Based High-Quality Non-Parallel Voice Conversion with Spectrogram and WaveRNN
A Kanagaki, M Tanaka, T Nose, R Shimizu, A Ito, A Ito
2020 IEEE 9th Global Conference on Consumer Electronics (GCCE), 356-357, 2020
12020
On the detectability of hardware trojans embedded in parallel multipliers
A Ito, R Ueno, N Homma, T Aoki
2018 IEEE 48th International Symposium on Multiple-Valued Logic (ISMVL), 62-67, 2018
12018
Perceived Information Revisited: New Metrics to Evaluate Success Rate of Side-Channel Attacks
A Ito, R Ueno, N Homma
IACR Transactions on Cryptographic Hardware and Embedded Systems, 228-254, 2022
2022
耐量子鍵カプセル化メカニズムに対する多クラス分類ニューラルネットワークを用いたサイドチャネル攻撃の検討
田中裕太郎, 上野嶺, 草川恵太, 伊東燦, 高橋順子, 本間尚文
研究報告コンピュータセキュリティ (CSEC) 2022 (1), 1-6, 2022
2022
Multiple-Valued Plaintext-Checking Side-Channel Attacks on Post-Quantum KEMs
Y Tanaka, R Ueno, K Xagawa, A Ito, J Takahashi, N Homma
Cryptology ePrint Archive, 2022
2022
軽量暗号 GIMLI-AEAD に対する深層学習を用いたサイドチャネル解析の検討
伊藤圭吾, 伊東燦, 上野嶺, 福島和英, 清本晋作, 本間尚文
電子情報通信学会技術研究報告; 信学技報 121 (239), 20-25, 2021
2021
耐タンパー性を有する CRT-RSA ソフトウェアに対する深層学習に基づく単一波形サイドチャネル攻撃
齋藤宏太郎, 伊東燦, 上野嶺, 本間尚文
電子情報通信学会技術研究報告; 信学技報 121 (206), 7-12, 2021
2021
The system can't perform the operation now. Try again later.
Articles 1–20