Kazuo Sakiyama

ORCID: 0000-0002-4414-815X
Publications
Citations
Views
---
Saved
---
About
Contact & Profiles
Research Areas
  • Cryptographic Implementations and Security
  • Physical Unclonable Functions (PUFs) and Hardware Security
  • Chaos-based Image/Signal Encryption
  • Advanced Malware Detection Techniques
  • Cryptography and Residue Arithmetic
  • Coding theory and cryptography
  • Cryptography and Data Security
  • Integrated Circuits and Semiconductor Failure Analysis
  • Security and Verification in Computing
  • RFID technology advancements
  • Advanced Authentication Protocols Security
  • Neuroscience and Neural Engineering
  • Advanced Memory and Neural Computing
  • Smart Grid Security and Resilience
  • Parallel Computing and Optimization Techniques
  • Embedded Systems Design Techniques
  • Biometric Identification and Security
  • Digital Media Forensic Detection
  • Muscle Physiology and Disorders
  • Cell Image Analysis Techniques
  • Advanced Steganography and Watermarking Techniques
  • User Authentication and Security Systems
  • VLSI and Analog Circuit Testing
  • Cardiomyopathy and Myosin Studies
  • DNA and Biological Computing

University of Electro-Communications
2015-2024

Kobe University
2016

KU Leuven
2006-2011

Meikai University
2009

Tokyo Dental College
2004-2005

University of California, Los Angeles
2003-2004

UCLA Health
2003

RFID (Radio Frequency IDentification) tags need to include security functions, yet at the same time their resources are extremely limited. Moreover, provide privacy, authentication and protection against tracking of without loosing system scalability, a public-key based approach is inevitable, which shown by M. Burmester et al. In this paper, we present an architecture state-of-the-art processor for with Elliptic Curve (EC) over GF(2^163). It shows plausibility meeting both efficiency...

10.1109/tc.2008.148 article EN IEEE Transactions on Computers 2008-08-28

In general, conventional Arbiter-based Physically Unclonable Functions (PUFs) generate responses with low unpredictability. The N-XOR Arbiter PUF, proposed in 2007, is a well-known technique for improving this paper, we propose novel design called Double to enhance the unpredictability on field programmable gate arrays (FPGAs), and compare our PUFs. One metric judging of measure their tolerance machine-learning attacks. Although previous work showed superiority PUFs regarding...

10.1155/2015/864812 article EN cc-by The Scientific World JOURNAL 2015-01-01

Virtual field‐programmable gate array (FPGA) is an emerging technology to put multiple users in the same FPGA fabric with logical isolation. Security researchers have studied new threats virtual and proposed attacks on isolation by exploiting analogue natures of FPGA. These use oscillator comprising a combinatorial loop access domain using digital components only. Interestingly, system field prohibits design rule check. In this Letter, authors study if prohibiting sufficient thwart...

10.1049/el.2019.0163 article EN cc-by Electronics Letters 2019-04-05

Arbiter-based Physically Unclonable Function (PUF) is one kind of the delay-based PUFs that use time difference two delay-line signals.One previous work suggests Arbiter implemented on Xilinx Virtex-5 FPGAs generate responses with almost no difference, i.e. low uniqueness.In order to overcome this problem, Double PUF was proposed, which based a novel technique for generating high uniqueness from duplicated FPGAs.It needs same costs as 2-XOR XORs outputs PUFs.Double different in terms mode...

10.15439/2014f140 article EN cc-by Annals of Computer Science and Information Systems 2014-09-29

With the growth of Internet Things (IoT) era, protection secret information on IoT devices is becoming increasingly important. For devices, attacks that target leakage through physical side-channels (e.g., a power side-channel) are major threat in many use cases because can be accessed easily by hostile third party. However, securing resource-constrained against side-channel challenging issue. Generally, it difficult to satisfy requirements while maintaining low-power and real-time...

10.1109/jiot.2024.3355417 article EN cc-by IEEE Internet of Things Journal 2024-01-18

This paper presents a comprehensive analysis of differential fault (DFA) attacks on the Advanced Encryption Standard (AES) from an information-theoretic perspective. Injecting faults into cryptosystems is categorized as active at tack where attackers induce error in operations to retrieve secret internal information, e.g., key ciphers. Here, we consider DFA equivalent special kind passive attack can obtain leaked information without measurement noise. The are regarded conversion process key....

10.1109/tifs.2011.2174984 article EN IEEE Transactions on Information Forensics and Security 2011-11-07

Low uniqueness and vulnerability to machine-learning attacks are known as two major problems of Arbiter-Based Physically Unclonable Function (APUF) implemented on FPGAs. In this paper, we implement Double APUF (DAPUF) that duplicates the original in order overcome problems. From experimental results Xilinx Virtex-5, show DAPUF becomes almost ideal, prediction rate attack decreases from 86% 57%.

10.1109/aspdac.2015.7058919 article EN 2015-01-01

This paper presents a reconfigurable curve-based cryptoprocessor that accelerates scalar multiplication of Elliptic Curve Cryptography (ECC) and HyperElliptic (HECC) genus 2 over GF(2 <sup xmlns:mml="http://www.w3.org/1998/Math/MathML" xmlns:xlink="http://www.w3.org/1999/xlink">n</sup> ). By allocating copies processing cores embed Modular Arithmetic Logic Units (MALUs) ), the ECC/HECC can be accelerated by exploiting Instruction-Level Parallelism (ILP). The supported field size arbitrary up...

10.1109/tc.2007.1071 article EN IEEE Transactions on Computers 2007-08-22

The first contribution of our paper is that we propose a platform, design strategy, and evaluation criteria for fair consistent hardware the second-round SHA-3 candidates. Using SASEBO-GII field-programmable gate array (FPGA) board as common combined with well defined software interfaces, compare all 256-bit version candidates respect to area, throughput, latency, power, energy consumption. Our approach defines standard testing harness candidates, including interface specification module on...

10.1109/tvlsi.2011.2128353 article EN IEEE Transactions on Very Large Scale Integration (VLSI) Systems 2011-05-03

Physical Unclonable Functions (PUFs) are expected to represent an important solution for secure ID generation and authentication etc. In general, manufactured PUFs considered be more when the pattern of outputs (the variety responses) is larger, i.e., response bit length longer (e.g., 192-bit than 128-bit one). However, actual reduced because some bits inconsistent (random) repeated measurements, which regarded as unnecessary discarded. Latch-based with $$N$$ RS latches, example, generate...

10.1007/s13389-012-0044-0 article EN cc-by Journal of Cryptographic Engineering 2012-10-22

Laser fault injection (LFI) attack on cryptographic processors is a serious threat to information security. This paper proposes sense-and-react countermeasure against LFI. A distributed bulk-current sensor monitors the abnormal current conduction caused by laser irradiation silicon substrate. The single occupies only 286 F <sup xmlns:mml="http://www.w3.org/1998/Math/MathML" xmlns:xlink="http://www.w3.org/1999/xlink">2</sup> /Cell and it across entire core for 100% detection coverage. Upon of...

10.1109/jssc.2018.2869142 article EN IEEE Journal of Solid-State Circuits 2018-09-27

This paper proposes a new fault-based attack called fault sensitivity analysis (FSA) attack. In the FSA attack, injections are used to test out sensitive information leakage sensitivity. Fault means critical injection intensity that corresponds threshold between devices' normal and abnormal behaviors. We demonstrate without using values of faulty outputs, attackers can obtain secret key based on data-dependency collected data. explains successful attacks against three Advanced Encryption...

10.1109/tifs.2011.2169666 article EN IEEE Transactions on Information Forensics and Security 2011-10-03

In recent years, information systems have become increasingly able to interact with the real world by using relatively cheap connected embedded devices. such systems, sensors are crucial components because can observe only through sensors. Recently, there been emerging threats sensors, which involve injection of false in physical/analog domain. To counter attacks, sensor fusion is considered a promising approach robustness measurement be improved combining data from redundant However,...

10.1145/3196494.3196506 article EN 2018-05-29

We propose a parallel processing crypto-processor for elliptic curve cryptography (ECC) to speed up EC point multiplication. The processor consists of controller that dynamically checks instruction-level parallelism (ILP) and multiple sets modular arithmetic logic units accelerating operations. A case study HW design with the proposed architecture shows multiplication over GF(p) GF(2 <sup xmlns:mml="http://www.w3.org/1998/Math/MathML" xmlns:xlink="http://www.w3.org/1999/xlink">m</sup> ) can...

10.1109/icassp.2006.1660801 article EN 2006-08-02
Coming Soon ...