Akira Ito
Akira Ito
Verified email at - Homepage
Cited by
Cited by
Curse of re-encryption: A generic power/em analysis on post-quantum kems
R Ueno, K Xagawa, Y Tanaka, A Ito, J Takahashi, N Homma
IACR Transactions on Cryptographic Hardware and Embedded Systems, 296-322, 2022
Fault-injection attacks against NIST’s post-quantum cryptography round 3 KEM candidates
K Xagawa, A Ito, R Ueno, J Takahashi, N Homma
Advances in Cryptology–ASIACRYPT 2021: 27th International Conference on the …, 2021
Machine learning and hardware security: Challenges and opportunities
F Regazzoni, S Bhasin, AA Pour, I Alshaer, F Aydin, A Aysu, V Beroulle, ...
Proceedings of the 39th International Conference on Computer-Aided Design, 1-6, 2020
Imbalanced data problems in deep learning-based side-channel attacks: Analysis and solution
A Ito, K Saito, R Ueno, N Homma
IEEE Transactions on Information Forensics and Security 16, 3790-3802, 2021
On the success rate of side-channel attacks on masked implementations: Information-theoretical bounds and their practical usage
A Ito, R Ueno, N Homma
Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications …, 2022
Extraction of binarized neural network architecture and secret parameters using side-channel information
V Yli-Mäyry, A Ito, N Homma, S Bhasin, D Jap
2021 IEEE International Symposium on Circuits and Systems (ISCAS), 1-5, 2021
Practical side-channel based model extraction attack on tree-based machine learning algorithm
D Jap, V Yli-Mäyry, A Ito, R Ueno, S Bhasin, N Homma
Applied Cryptography and Network Security Workshops: ACNS 2020 Satellite …, 2020
Toward optimal deep-learning based side-channel attacks: Probability concentration inequality loss and its usage
A Ito, R Ueno, N Homma
Cryptology ePrint Archive, 2021
Multiple-Valued Plaintext-Checking Side-Channel Attacks on Post-Quantum KEMs
Y Tanaka, R Ueno, K Xagawa, A Ito, J Takahashi, N Homma
Cryptology ePrint Archive, 2022
A formal approach to identifying hardware Trojans in cryptographic hardware
A Ito, R Ueno, N Homma
2021 IEEE 51st International Symposium on Multiple-Valued Logic (ISMVL), 154-159, 2021
Efficient Formal Verification of Galois-Field Arithmetic Circuits Using ZDD Representation of Boolean Polynomials
A Ito, R Ueno, N Homma
IEEE Transactions on Computer-Aided Design of Integrated Circuits and …, 2021
Effective formal verification for galois-field arithmetic circuits with multiple-valued characteristics
A Ito, R Ueno, N Homma
2020 IEEE 50th International Symposium on Multiple-Valued Logic (ISMVL), 46-51, 2020
Perceived Information Revisited: New Metrics to Evaluate Success Rate of Side-Channel Attacks
A Ito, R Ueno, N Homma
IACR Transactions on Cryptographic Hardware and Embedded Systems, 228-254, 2022
Scyclone: High-Quality and Parallel-Data-Free Voice Conversion Using Spectrogram and Cycle-Consistent Adversarial Networks
M Tanaka, T Nose, A Kanagaki, R Shimizu, A Ito
arXiv preprint arXiv:2005.03334, 2020
A Study on 2D photo-realistic facial animation generation using 3D facial feature points and deep neural networks
K Sato, T Nose, A Ito, Y Chiba, A Ito, T Shinozaki
Advances in Intelligent Information Hiding and Multimedia Signal Processing …, 2018
A Deep-Learning Based Single-Trace Side-Channel Attack on Tamper-Resistant CRT-RSA Software
K Saito, A Ito, R Ueno, N Homma
IEICE Technical Report; IEICE Tech. Rep. 121 (206), 7-12, 2021
CycleGAN-based high-quality non-parallel voice conversion with spectrogram and WaveRNN
A Kanagaki, M Tanaka, T Nose, R Shimizu, A Ito, A Ito
2020 IEEE 9th Global Conference on Consumer Electronics (GCCE), 356-357, 2020
On the detectability of hardware trojans embedded in parallel multipliers
A Ito, R Ueno, N Homma, T Aoki
2018 IEEE 48th International Symposium on Multiple-Valued Logic (ISMVL), 62-67, 2018
Homomorphic encryption for stochastic computing
R Koseki, A Ito, R Ueno, M Tibouchi, N Homma
Journal of Cryptographic Engineering 13 (2), 251-263, 2023
田中裕太郎, 上野嶺, 草川恵太, 伊東燦, 高橋順子, 本間尚文
研究報告コンピュータセキュリティ (CSEC) 2022 (1), 1-6, 2022
The system can't perform the operation now. Try again later.
Articles 1–20