default search action
Rei Ueno
Person information
- affiliation: Tohoku University, Sendai, Japan
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
Journal Articles
- 2024
- [j30]Soichiro Kobayashi, Rei Ueno, Yosuke Todo, Naofumi Homma:
Side-Channel Linearization Attack on Unrolled Trivium Hardware. IACR Commun. Cryptol. 1(3): 14 (2024) - [j29]Rei Ueno, Naofumi Homma, Akiko Inoue, Kazuhiko Minematsu:
Fallen Sanctuary: A Higher-Order and Leakage-Resilient Rekeying Scheme. IACR Trans. Cryptogr. Hardw. Embed. Syst. 2024(1): 264-308 (2024) - 2023
- [j28]Ryusuke Koseki, Akira Ito, Rei Ueno, Mehdi Tibouchi, Naofumi Homma:
Homomorphic encryption for stochastic computing. J. Cryptogr. Eng. 13(2): 251-263 (2023) - [j27]Katsumi Ebina, Rei Ueno, Naofumi Homma:
Side-Channel Analysis Against SecOC-Compliant AES-CMAC. IEEE Trans. Circuits Syst. II Express Briefs 70(10): 3772-3776 (2023) - [j26]Rei Ueno, Naofumi Homma:
How Secure is Exponent-blinded RSA-CRT with Sliding Window Exponentiation? IACR Trans. Cryptogr. Hardw. Embed. Syst. 2023(2): 241-269 (2023) - [j25]Yutaro Tanaka, Rei Ueno, Keita Xagawa, Akira Ito, Junko Takahashi, Naofumi Homma:
Multiple-Valued Plaintext-Checking Side-Channel Attacks on Post-Quantum KEMs. IACR Trans. Cryptogr. Hardw. Embed. Syst. 2023(3): 473-503 (2023) - 2022
- [j24]Akira Ito, Rei Ueno, Naofumi Homma:
Efficient Formal Verification of Galois-Field Arithmetic Circuits Using ZDD Representation of Boolean Polynomials. IEEE Trans. Comput. Aided Des. Integr. Circuits Syst. 41(3): 794-798 (2022) - [j23]Ayano Nakashima, Rei Ueno, Naofumi Homma:
AES S-Box Hardware With Efficiency Improvement Based on Linear Mapping Optimization. IEEE Trans. Circuits Syst. II Express Briefs 69(10): 3978-3982 (2022) - [j22]Shoei Nashimoto, Daisuke Suzuki, Rei Ueno, Naofumi Homma:
Bypassing Isolated Execution on RISC-V using Side-Channel-Assisted Fault-Injection and Its Countermeasure. IACR Trans. Cryptogr. Hardw. Embed. Syst. 2022(1): 28-68 (2022) - [j21]Rei Ueno, Keita Xagawa, Yutaro Tanaka, Akira Ito, Junko Takahashi, Naofumi Homma:
Curse of Re-encryption: A Generic Power/EM Analysis on Post-Quantum KEMs. IACR Trans. Cryptogr. Hardw. Embed. Syst. 2022(1): 296-322 (2022) - [j20]Akira Ito, Rei Ueno, Naofumi Homma:
Perceived Information Revisited New Metrics to Evaluate Success Rate of Side-Channel Attacks. IACR Trans. Cryptogr. Hardw. Embed. Syst. 2022(4): 228-254 (2022) - [j19]Kotaro Saito, Akira Ito, Rei Ueno, Naofumi Homma:
One Truth Prevails: A Deep-learning Based Single-Trace Power Analysis on RSA-CRT with Windowed Exponentiation. IACR Trans. Cryptogr. Hardw. Embed. Syst. 2022(4): 490-526 (2022) - [j18]Akiko Inoue, Kazuhiko Minematsu, Maya Oda, Rei Ueno, Naofumi Homma:
ELM: A Low-Latency and Scalable Memory Encryption Scheme. IEEE Trans. Inf. Forensics Secur. 17: 2628-2643 (2022) - 2021
- [j17]Rei Ueno, Naofumi Homma, Sumio Morioka, Takafumi Aoki:
A Systematic Design Methodology of Formally Proven Side-Channel-Resistant Cryptographic Hardware. IEEE Des. Test 38(3): 84-92 (2021) - [j16]Akira Ito, Rei Ueno, Naofumi Homma:
An Algebraic Approach to Verifying Galois-Field Arithmetic Circuits with Multiple-Valued Characteristics. IEICE Trans. Inf. Syst. 104-D(8): 1083-1091 (2021) - [j15]Rei Ueno, Junko Takahashi, Yu-ichi Hayashi, Naofumi Homma:
A method for constructing sliding windows leak from noisy cache timing information. J. Cryptogr. Eng. 11(2): 161-170 (2021) - [j14]Ville Yli-Mäyry, Rei Ueno, Noriyuki Miura, Makoto Nagata, Shivam Bhasin, Yves Mathieu, Tarik Graba, Jean-Luc Danger, Naofumi Homma:
Diffusional Side-Channel Leakage From Unrolled Lightweight Block Ciphers: A Case Study of Power Analysis on PRINCE. IEEE Trans. Inf. Forensics Secur. 16: 1351-1364 (2021) - [j13]Akira Ito, Kotaro Saito, Rei Ueno, Naofumi Homma:
Imbalanced Data Problems in Deep Learning-Based Side-Channel Attacks: Analysis and Solution. IEEE Trans. Inf. Forensics Secur. 16: 3790-3802 (2021) - 2020
- [j12]Rei Ueno, Naofumi Homma, Sumio Morioka, Noriyuki Miura, Kohei Matsuda, Makoto Nagata, Shivam Bhasin, Yves Mathieu, Tarik Graba, Jean-Luc Danger:
High Throughput/Gate AES Hardware Architectures Based on Datapath Compression. IEEE Trans. Computers 69(4): 534-548 (2020) - [j11]Shotaro Sawataishi, Rei Ueno, Naofumi Homma:
Unified Hardware for High-Throughput AES-Based Authenticated Encryptions. IEEE Trans. Circuits Syst. II Express Briefs 67-II(9): 1604-1608 (2020) - [j10]Rei Ueno, Kohei Kazumori, Naofumi Homma:
Rejection Sampling Schemes for Extracting Uniform Distribution from Biased PUFs. IACR Trans. Cryptogr. Hardw. Embed. Syst. 2020(4): 86-128 (2020) - 2019
- [j9]Rei Ueno, Naofumi Homma, Yasuyuki Nogami, Takafumi Aoki:
Highly efficient GF(28) inversion circuit based on hybrid GF representations. J. Cryptogr. Eng. 9(2): 101-113 (2019) - [j8]Rei Ueno, Manami Suzuki, Naofumi Homma:
Tackling Biased PUFs Through Biased Masking: A Debiasing Method for Efficient Fuzzy Extractor. IEEE Trans. Computers 68(7): 1091-1104 (2019) - [j7]Manami Suzuki, Rei Ueno, Naofumi Homma, Takafumi Aoki:
Efficient Fuzzy Extractors Based on Ternary Debiasing Method for Biased Physically Unclonable Functions. IEEE Trans. Circuits Syst. I Regul. Pap. 66-I(2): 616-629 (2019) - 2018
- [j6]Akira Ito, Rei Ueno, Naofumi Homma, Takafumi Aoki:
Characterizing Parallel Multipliers for Detecting Hardware Trojans. FLAP 5(9): 1815-1832 (2018) - 2017
- [j5]Rei Ueno, Naofumi Homma, Takafumi Aoki, Sumio Morioka:
Hierarchical Formal Verification Combining Algebraic Transformation with PPRM Expansion and Its Application to Masked Cryptographic Processors. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 100-A(7): 1396-1408 (2017) - [j4]Rei Ueno, Naofumi Homma, Takafumi Aoki:
Automatic Generation System for Multiple-Valued Galois-Field Parallel Multipliers. IEICE Trans. Inf. Syst. 100-D(8): 1603-1610 (2017) - [j3]Rei Ueno, Naofumi Homma, Yukihiro Sugawara, Takafumi Aoki:
Formal Approach for Verifying Galois Field Arithmetic Circuits of Higher Degrees. IEEE Trans. Computers 66(3): 431-442 (2017) - 2016
- [j2]Rei Ueno, Naofumi Homma, Takafumi Aoki:
A Formal Verification Method of Error Correction Code Processors Over Galois-Field Arithmetic. J. Multiple Valued Log. Soft Comput. 26(1-2): 55-73 (2016) - 2015
- [j1]Rei Ueno, Naofumi Homma, Takafumi Aoki:
Efficient DFA on SPN-Based Block Ciphers and Its Application to the LED Block Cipher. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 98-A(1): 182-191 (2015)
Conference and Workshop Papers
- 2024
- [c32]Shoei Nashimoto, Rei Ueno, Naofumi Homma:
Comparative Analysis and Implementation of Jump Address Masking for Preventing TEE Bypassing Fault Attacks. ARES 2024: 26:1-26:12 - 2023
- [c31]Rei Ueno, Yusuke Yagyu, Naofumi Homma:
Efficient DFA-Resistant AES Hardware Based on Concurrent Fault Detection Scheme. ISMVL 2023: 196-201 - [c30]Federico Canale, Tim Güneysu, Gregor Leander, Jan Philipp Thoma, Yosuke Todo, Rei Ueno:
SCARF - A Low-Latency Block Cipher for Secure Cache-Randomization. USENIX Security Symposium 2023: 1937-1954 - 2022
- [c29]Akira Ito, Rei Ueno, Naofumi Homma:
On the Success Rate of Side-Channel Attacks on Masked Implementations: Information-Theoretical Bounds and Their Practical Usage. CCS 2022: 1521-1535 - [c28]Yuma Itabashi, Rei Ueno, Naofumi Homma:
Efficient Modular Polynomial Multiplier for NTT Accelerator of Crystals-Kyber. DSD 2022: 528-533 - [c27]Rei Ueno, Naofumi Homma:
High-Speed Hardware Architecture for Post-Quantum Diffie-Hellman Key Exchange Based on Residue Number System. ISCAS 2022: 2107-2111 - 2021
- [c26]Keita Xagawa, Akira Ito, Rei Ueno, Junko Takahashi, Naofumi Homma:
Fault-Injection Attacks Against NIST's Post-Quantum Cryptography Round 3 KEM Candidates. ASIACRYPT (2) 2021: 33-61 - [c25]Akira Ito, Rei Ueno, Naofumi Homma:
A Formal Approach to Identifying Hardware Trojans in Cryptographic Hardware. ISMVL 2021: 154-159 - 2020
- [c24]Dirmanto Jap, Ville Yli-Mäyry, Akira Ito, Rei Ueno, Shivam Bhasin, Naofumi Homma:
Practical Side-Channel Based Model Extraction Attack on Tree-Based Machine Learning Algorithm. ACNS Workshops 2020: 93-105 - [c23]Rei Ueno, Kazuhide Fukushima, Yuto Nakano, Shinsaku Kiyomoto, Naofumi Homma:
Single-Trace Side-Channel Analysis on Polynomial-Based MAC Schemes. COSADE 2020: 43-67 - [c22]Francesco Regazzoni, Shivam Bhasin, Amir Alipour, Ihab Alshaer, Furkan Aydin, Aydin Aysu, Vincent Beroulle, Giorgio Di Natale, Paul D. Franzon, David Hély, Naofumi Homma, Akira Ito, Dirmanto Jap, Priyank Kashyap, Ilia Polian, Seetal Potluri, Rei Ueno, Elena-Ioana Vatajelu, Ville Yli-Mäyry:
Machine Learning and Hardware security: Challenges and Opportunities -Invited Talk-. ICCAD 2020: 141:1-141:6 - [c21]Maya Oda, Rei Ueno, Akiko Inoue, Kazuhiko Minematsu, Naofumi Homma:
PMAC++: Incremental MAC Scheme Adaptable to Lightweight Block Ciphers. ISCAS 2020: 1-4 - [c20]Akira Ito, Rei Ueno, Naofumi Homma:
Effective Formal Verification for Galois-field Arithmetic Circuits with Multiple-Valued Characteristics. ISMVL 2020: 46-51 - [c19]Kohei Kazumori, Rei Ueno, Naofumi Homma:
Debiasing Method for Efficient Ternary Fuzzy Extractors and Ternary Physically Unclonable Functions. ISMVL 2020: 52-57 - 2019
- [c18]Rei Ueno, Naofumi Homma, Tomonori Iida, Kazuhiko Minematsu:
High Throughput/Gate FN-Based Hardware Architectures for AES-OTR. ISCAS 2019: 1-4 - [c17]Kohei Kazumori, Rei Ueno, Naofumi Homma:
A Ternary Fuzzy Extractor for Efficient Cryptographic Key Generation. ISMVL 2019: 49-54 - [c16]Rei Ueno, Junko Takahashi, Yu-ichi Hayashi, Naofumi Homma:
Constructing Sliding Windows Leak from Noisy Cache Timing Information of OSS-RSA. PROOFS 2019: 64-77 - 2018
- [c15]Akira Ito, Rei Ueno, Naofumi Homma, Takafumi Aoki:
A Non-Reversible Insertion Method for Hardware Trojans Based on Path Delay Faults. PROOFS 2018: 50-67 - [c14]Hirokazu Oshida, Rei Ueno, Naofumi Homma, Takafumi Aoki:
On Masked Galois-Field Multiplication for Authenticated Encryption Resistant to Side Channel Analysis. COSADE 2018: 44-57 - [c13]Manami Suzuki, Rei Ueno, Naofumi Homma, Takafumi Aoki:
Quaternary Debiasing for Physically Unclonable Functions. ISMVL 2018: 7-12 - [c12]Akira Ito, Rei Ueno, Naofumi Homma, Takafumi Aoki:
On the Detectability of Hardware Trojans Embedded in Parallel Multipliers. ISMVL 2018: 62-67 - 2017
- [c11]Rei Ueno, Naofumi Homma, Takafumi Aoki:
Toward More Efficient DPA-Resistant AES Hardware Architecture Based on Threshold Implementation. COSADE 2017: 50-64 - [c10]Manami Suzuki, Rei Ueno, Naofumi Homma, Takafumi Aoki:
Multiple-Valued Debiasing for Physically Unclonable Functions and Its Application to Fuzzy Extractors. COSADE 2017: 248-263 - [c9]Rei Ueno, Naofumi Homma, Sumio Morioka, Takafumi Aoki:
Automatic generation of formally-proven tamper-resistant Galois-field multipliers based on generalized masking scheme. DATE 2017: 978-983 - [c8]Wataru Kawai, Rei Ueno, Naofumi Homma, Takafumi Aoki, Kazuhide Fukushima, Shinsaku Kiyomoto:
Practical Power Analysis on KCipher-2 Software on Low-End Microcontrollers. EuroS&P Workshops 2017: 113-121 - [c7]Rei Ueno, Naofumi Homma, Takafumi Aoki:
A Systematic Design of Tamper-Resistant Galois-Field Arithmetic Circuits Based on Threshold Implementation with (d + 1) Input Shares. ISMVL 2017: 136-141 - 2016
- [c6]Rei Ueno, Sumio Morioka, Naofumi Homma, Takafumi Aoki:
A High Throughput/Gate AES Hardware Architecture by Compressing Encryption and Decryption Datapaths - Toward Efficient CBC-Mode Implementation. CHES 2016: 538-558 - [c5]Rei Ueno, Yukihiro Sugawara, Naofumi Homma, Takafumi Aoki:
Formal Design of Pipelined GF Arithmetic Circuits and Its Application to Cryptographic Processors. ISMVL 2016: 217-222 - 2015
- [c4]Rei Ueno, Naofumi Homma, Yukihiro Sugawara, Yasuyuki Nogami, Takafumi Aoki:
Highly Efficient GF(28) Inversion Circuit Based on Redundant GF Arithmetic and Its Application to AES Design. CHES 2015: 63-80 - [c3]Rei Ueno, Naofumi Homma, Yukihiro Sugawara, Takafumi Aoki:
Formal Design of Galois-Field Arithmetic Circuits Based on Polynomial Ring Representation. ISMVL 2015: 48-53 - [c2]Yukihiro Sugawara, Rei Ueno, Naofumi Homma, Takafumi Aoki:
System for Automatic Generation of Parallel Multipliers over Galois Fields. ISMVL 2015: 54-59 - 2014
- [c1]Rei Ueno, Kotaro Okamoto, Naofumi Homma, Takafumi Aoki:
An Efficient Approach to Verifying Galois-Field Arithmetic Circuits of Higher Degrees and Its Application to ECC Decoders. ISMVL 2014: 144-149
Informal and Other Publications
- 2024
- [i14]Akira Ito, Rei Ueno, Naofumi Homma:
Perceived Information Revisited II: Information-Theoretical Analysis of Deep-Learning Based Side-Channel Attacks. IACR Cryptol. ePrint Arch. 2024: 124 (2024) - 2023
- [i13]Rei Ueno, Naofumi Homma, Akiko Inoue, Kazuhiko Minematsu:
Fallen Sanctuary: A Higher-Order and Leakage-Resilient Rekeying Scheme. IACR Cryptol. ePrint Arch. 2023: 1213 (2023) - [i12]Akira Ito, Rei Ueno, Rikuma Tanaka, Naofumi Homma:
Formal Analysis of Non-profiled Deep-learning Based Side-channel Attacks. IACR Cryptol. ePrint Arch. 2023: 1563 (2023) - [i11]Rei Ueno, Hiromichi Haneda, Naofumi Homma, Akiko Inoue, Kazuhiko Minematsu:
Crystalor: Persistent Memory Encryption Mechanism with Optimized Metadata Structure and Fast Crash Recovery. IACR Cryptol. ePrint Arch. 2023: 1630 (2023) - 2022
- [i10]Akira Ito, Rei Ueno, Naofumi Homma:
On the Success Rate of Side-Channel Attacks on Masked Implementations: Information-Theoretical Bounds and Their Practical Usage. IACR Cryptol. ePrint Arch. 2022: 576 (2022) - [i9]Yutaro Tanaka, Rei Ueno, Keita Xagawa, Akira Ito, Junko Takahashi, Naofumi Homma:
Multiple-Valued Plaintext-Checking Side-Channel Attacks on Post-Quantum KEMs. IACR Cryptol. ePrint Arch. 2022: 940 (2022) - [i8]Federico Canale, Tim Güneysu, Gregor Leander, Jan Philipp Thoma, Yosuke Todo, Rei Ueno:
SCARF: A Low-Latency Block Cipher for Secure Cache-Randomization. IACR Cryptol. ePrint Arch. 2022: 1228 (2022) - 2021
- [i7]Keita Xagawa, Akira Ito, Rei Ueno, Junko Takahashi, Naofumi Homma:
Fault-Injection Attacks against NIST's Post-Quantum Cryptography Round 3 KEM Candidates. IACR Cryptol. ePrint Arch. 2021: 840 (2021) - [i6]Rei Ueno, Keita Xagawa, Yutaro Tanaka, Akira Ito, Junko Takahashi, Naofumi Homma:
Curse of Re-encryption: A Generic Power/EM Analysis on Post-Quantum KEMs. IACR Cryptol. ePrint Arch. 2021: 849 (2021) - [i5]Akira Ito, Rei Ueno, Naofumi Homma:
Toward Optimal Deep-Learning Based Side-Channel Attacks: Probability Concentration Inequality Loss and Its Usage. IACR Cryptol. ePrint Arch. 2021: 1216 (2021) - 2020
- [i4]Shoei Nashimoto, Daisuke Suzuki, Rei Ueno, Naofumi Homma:
Bypassing Isolated Execution on RISC-V with Fault Injection. IACR Cryptol. ePrint Arch. 2020: 1193 (2020) - [i3]Akiko Inoue, Kazuhiko Minematsu, Maya Oda, Rei Ueno, Naofumi Homma:
ELM : A Low-Latency and Scalable Memory Encryption Scheme. IACR Cryptol. ePrint Arch. 2020: 1374 (2020) - 2016
- [i2]Rei Ueno, Sumio Morioka, Naofumi Homma, Takafumi Aoki:
A High Throughput/Gate AES Hardware Architecture by Compressing Encryption and Decryption Datapaths - Toward Efficient CBC-Mode Implementation. IACR Cryptol. ePrint Arch. 2016: 595 (2016) - 2015
- [i1]Rei Ueno, Naofumi Homma, Yukihiro Sugawara, Yasuyuki Nogami, Takafumi Aoki:
Highly Efficient GF(28) Inversion Circuit Based on Redundant GF Arithmetic and Its Application to AES Design. IACR Cryptol. ePrint Arch. 2015: 763 (2015)
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-11-11 21:25 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint