Mingyu Yang

ORCID: 0000-0003-3722-7009
Publications
Citations
Views
---
Saved
---
About
Contact & Profiles
Research Areas
  • Physical Unclonable Functions (PUFs) and Hardware Security
  • Cryptographic Implementations and Security
  • Chaos-based Image/Signal Encryption
  • Advanced Malware Detection Techniques
  • Semiconductor materials and devices
  • Augmented Reality Applications
  • Embedded Systems Design Techniques
  • Advanced Memory and Neural Computing
  • Radiation Effects in Electronics
  • EEG and Brain-Computer Interfaces
  • Simulation and Modeling Applications
  • ECG Monitoring and Analysis

Tokyo Institute of Technology
2020-2024

National Institute of Information and Communications Technology
2020

With the growth of Internet Things (IoT) era, protection secret information on IoT devices is becoming increasingly important. For devices, attacks that target leakage through physical side-channels (e.g., a power side-channel) are major threat in many use cases because can be accessed easily by hostile third party. However, securing resource-constrained against side-channel challenging issue. Generally, it difficult to satisfy requirements while maintaining low-power and real-time...

10.1109/jiot.2024.3355417 article EN cc-by IEEE Internet of Things Journal 2024-01-18

The rapid development of Internet Things (IoT) has opened new opportunities for healthcare systems through so-called eHealth systems. With the help monitoring using portable IoT devices with biomedical sensors, disease diagnoses can be conducted in real time. However, there is a challenge that an always-on activity requires constant power supply and are battery-powered face heavy resource constraints. This work addresses realistic implementation low-power device both hardware software...

10.1109/access.2020.3006901 article EN cc-by IEEE Access 2020-01-01

In the Internet of Things (IoT) era, edge devices have been considerably diversified and are often designed using high-level synthesis (HLS) for improved design productivity. However, HLS tools were originally developed in a security-unaware manner, resulting vulnerabilities to power side-channel attacks (PSCAs), which serious threat IoT systems. Currently, impact applicability existing methods PSCA-resistant designs limited. this article, we propose an effective HLS-based method ciphers...

10.1145/3609507 article EN other-oa ACM Transactions on Embedded Computing Systems 2023-07-17

In this paper, four different versions of FPGA-based hardware implementation for Chaskey-12, a lightweight message authentication code algorithm suitable resource-constrained devices, were generated using high-level synthesis (HLS) with optimizations memory and operation parallelization to examine the effects not only on circuit area execution time but also vulnerability power side-channel attacks. Through evaluation Welch's t-test, we disclosed how each optimization would contribute...

10.1109/isqed54688.2022.9806252 article EN 2022 23rd International Symposium on Quality Electronic Design (ISQED) 2022-04-06

In the era of Internet Things (IoT), edge devices are considerably diversified and often designed using high-level synthesis (HLS) to improve design-productivity. A problem here is that HLS tools were originally developed in a security-unaware fashion, inducing vulnerabilities power side-channel attacks (PSCA), which serious threat IoT. Although PSCA induced by recently started be discussed, effects applicability existing methods for PSCA-resistant designs limited so far. this paper, we...

10.1145/3543622.3573167 article EN 2023-02-10

Physical attacks on cryptographic hardware have become a significant threat in recent years. For example, side-channel exploit information leakage, such as power consumption or processing time during encryption, to recover the secret key. Threshold implementation (TI) is widely-used countermeasure against attacks. In conventional of TI, process for ensuring an important property called uniformity refreshing, which re-masks intermediate values using many random bits. this study, we...

10.1109/candarw60564.2023.00054 article EN 2023-11-27
Coming Soon ...