• Search Research Projects
  • Search Researchers
  • How to Use
  1. Back to previous page

Ueno Rei  上野 嶺

ORCIDConnect your ORCID iD *help
Researcher Number 80826165
Other IDs
Affiliation (Current) 2023: 東北大学, 電気通信研究所, 助教
Affiliation (based on the past Project Information) *help 2018 – 2022: 東北大学, 電気通信研究所, 助教
Review Section/Research Field
Principal Investigator
1001:Information science, computer engineering, and related fields / Basic Section 60040:Computer system-related
Except Principal Investigator
Medium-sized Section 60:Information science, computer engineering, and related fields
Keywords
Principal Investigator
ハードウェアセキュリティ / 暗号実装 / 情報セキュリティ / 算術演算回路 / VLSI / ソフトエラー / 故障注入攻撃 / 暗号ハードウェア / 誤り訂正 / ガロア体算術 … More / メッセージ認証コード / ガロア体算術演算回路 / 物理複製困難関数 / 認証 / サイドチャネル攻撃 / 深層学習 / ファジー抽出器 / 耐タンパー性暗号鍵生成・ストレージ … More
Except Principal Investigator
計算機システム / 情報セキュリティ Less
  • Research Projects

    (3 results)
  • Research Products

    (44 results)
  • Co-Researchers

    (1 People)
  •  セキュリティハードウェアの形式的設計・検証理論の深化と展開

    • Principal Investigator
      本間 尚文
    • Project Period (FY)
      2021 – 2025
    • Research Category
      Grant-in-Aid for Scientific Research (A)
    • Review Section
      Medium-sized Section 60:Information science, computer engineering, and related fields
    • Research Institution
      Tohoku University
  •  Development of highly secure and reliable authentication system based on physically unclonable hardware identifierPrincipal Investigator

    • Principal Investigator
      上野 嶺
    • Project Period (FY)
      2020 – 2023
    • Research Category
      Grant-in-Aid for Early-Career Scientists
    • Review Section
      Basic Section 60040:Computer system-related
    • Research Institution
      Tohoku University
  •  Development of cryptographic hardware with concurrent error-correcting schemePrincipal Investigator

    • Principal Investigator
      Ueno Rei
    • Project Period (FY)
      2019
    • Research Category
      Grant-in-Aid for Research Activity Start-up
    • Review Section
      1001:Information science, computer engineering, and related fields
    • Research Institution
      Tohoku University

All 2022 2021 2020 2019 2018

All Journal Article Presentation

  • [Journal Article] Efficient Formal Verification of Galois-Field Arithmetic Circuits Using ZDD Representation of Boolean Polynomials2022

    • Author(s)
      Ito Akira、Ueno Rei、Homma Naofumi
    • Journal Title

      IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems

      Volume: 41 Pages: 794-798

    • DOI

      10.1109/tcad.2021.3059924

    • Peer Reviewed / Open Access
    • Data Source
      KAKENHI-PROJECT-21H04867, KAKENHI-PROJECT-20J12887, KAKENHI-PROJECT-20K19765
  • [Journal Article] A Formal Approach to Identifying Hardware Trojans in Cryptographic Hardware2021

    • Author(s)
      Ito Akira、Ueno Rei、Homma Naofumi
    • Journal Title

      IEEE 51th International Symposium on Multiple-Valued Logic

      Volume: 1 Pages: 154-159

    • DOI

      10.1109/ismvl51352.2021.00034

    • Peer Reviewed
    • Data Source
      KAKENHI-PROJECT-21H04867
  • [Journal Article] Bypassing Isolated Execution on RISC-V using Side-Channel-Assisted Fault-Injection and Its Countermeasure2021

    • Author(s)
      Nashimoto Shoei、Suzuki Daisuke、Ueno Rei、Homma Naofumi
    • Journal Title

      IACR Transactions on Cryptographic Hardware and Embedded Systems

      Volume: 1 Pages: 28-68

    • DOI

      10.46586/tches.v2022.i1.28-68

    • Peer Reviewed / Open Access
    • Data Source
      KAKENHI-PROJECT-20K19765
  • [Journal Article] A Systematic Design Methodology of Formally-Proven Side-Channel-Resistant Cryptographic Hardware2021

    • Author(s)
      Rei Ueno, Naofumi Homma, Sumio Morioka, and Takafumi Aoki
    • Journal Title

      IEEE Design & Test Magazine

      Volume: 38 Pages: 84-92

    • Peer Reviewed
    • Data Source
      KAKENHI-PROJECT-20K19765
  • [Journal Article] Fault-Injection Attacks Against NIST’s Post-Quantum Cryptography Round 3 KEM Candidates2021

    • Author(s)
      Xagawa Keita、Ito Akira、Ueno Rei、Takahashi Junko、Homma Naofumi
    • Journal Title

      nternational Conference on the Theory and Application of Cryptology and Information Security (ASIACRYPT2021)

      Volume: 1 Pages: 33-61

    • DOI

      10.1007/978-3-030-92075-3_2

    • Peer Reviewed
    • Data Source
      KAKENHI-PROJECT-20K19765
  • [Journal Article] Curse of Re-encryption: A Generic Power/EM Analysis on Post-Quantum KEMs2021

    • Author(s)
      Ueno Rei、Xagawa Keita、Tanaka Yutaro、Ito Akira、Takahashi Junko、Homma Naofumi
    • Journal Title

      IACR Transactions on Cryptographic Hardware and Embedded Systems

      Volume: 1 Pages: 296-322

    • DOI

      10.46586/tches.v2022.i1.296-322

    • Peer Reviewed / Open Access
    • Data Source
      KAKENHI-PROJECT-20K19765
  • [Journal Article] A Systematic Design Methodology of Formally Proven Side-Channel-Resistant Cryptographic Hardware2021

    • Author(s)
      Ueno Rei、Homma Naofumi、Morioka Sumio、Aoki Takafumi
    • Journal Title

      IEEE Design & Test

      Volume: - Pages: 1-1

    • DOI

      10.1109/mdat.2021.3063337

    • Peer Reviewed / Open Access
    • Data Source
      KAKENHI-PROJECT-20K19765, KAKENHI-PROJECT-21H04867
  • [Journal Article] 物理複製困難関数を用いたハードウェア認証技術2021

    • Author(s)
      上野嶺、本間尚文
    • Journal Title

      月刊自動認識

      Volume: 34 Pages: 36-43

    • NAID

      40022486444

    • Data Source
      KAKENHI-PROJECT-20K19765
  • [Journal Article] An Algebraic Approach to Verifying Galois-Field Arithmetic Circuits with Multiple-Valued Characteristics2021

    • Author(s)
      ITO Akira、UENO Rei、HOMMA Naofumi
    • Journal Title

      IEICE Transactions on Information and Systems

      Volume: E104.D Issue: 8 Pages: 1083-1091

    • DOI

      10.1587/transinf.2020lop0004

      10.1587/transinf.2020LOP0004

    • NAID

      130008070385

    • ISSN
      0916-8532, 1745-1361
    • Language
      English
    • Peer Reviewed / Open Access
    • Data Source
      KAKENHI-PROJECT-21H04867, KAKENHI-PROJECT-20J12887, KAKENHI-PROJECT-20K19765
  • [Journal Article] Imbalanced Data Problems in Deep Learning-Based Side-Channel Attacks: Analysis and Solution2021

    • Author(s)
      Ito Akira、Saito Kotaro、Ueno Rei、Homma Naofumi
    • Journal Title

      IEEE Transactions on Information Forensics and Security

      Volume: 16 Pages: 3790-3802

    • DOI

      10.1109/tifs.2021.3092050

    • Peer Reviewed / Open Access
    • Data Source
      KAKENHI-PROJECT-20J12887, KAKENHI-PROJECT-20K19765
  • [Journal Article] Unified Hardware for High-Throughput AES-Based Authenticated Encryptions2020

    • Author(s)
      Sawataishi Shotaro、Ueno Rei、Homma Naofumi
    • Journal Title

      IEEE Transactions on Circuits and Systems II: Express Briefs

      Volume: 67 Pages: 1604-1608

    • DOI

      10.1109/tcsii.2020.3013415

    • Peer Reviewed / Open Access
    • Data Source
      KAKENHI-PROJECT-20K19765, KAKENHI-PROJECT-17H00729
  • [Journal Article] A method for constructing sliding windows leak from noisy cache timing information2020

    • Author(s)
      Ueno Rei、Takahashi Junko、Hayashi Yu-ichi、Homma Naofumi
    • Journal Title

      Journal of Cryptographic Engineering

      Volume: - Pages: 1-10

    • DOI

      10.1007/s13389-020-00230-x

    • Peer Reviewed / Open Access
    • Data Source
      KAKENHI-PROJECT-20K19765, KAKENHI-PROJECT-17H00729
  • [Journal Article] High Throughput/Gate AES Hardware Architectures Based on Datapath Compression2020

    • Author(s)
      Ueno Rei、Homma Naofumi、Morioka Sumio、Miura Noriyuki、Matsuda Kohei、Nagata Makoto、Bhasin Shivam、Mathieu Yves、Graba Tarik、Danger Jean-Luc
    • Journal Title

      IEEE Transactions on Computers

      Volume: 69 Pages: 534-548

    • DOI

      10.1109/tc.2019.2957355

    • Peer Reviewed / Open Access / Int'l Joint Research
    • Data Source
      KAKENHI-PROJECT-19K21526, KAKENHI-PROJECT-17H00729
  • [Journal Article] Rejection Sampling Schemes for Extracting Uniform Distribution from Biased PUFs2020

    • Author(s)
      Rei Ueno、Kohei Kazumori、Naofumi Homma
    • Journal Title

      IACR Transactions on Cryptographic Hardware and Embedded Systems

      Volume: 4 Pages: 86-128

    • Peer Reviewed / Open Access
    • Data Source
      KAKENHI-PROJECT-20K19765
  • [Journal Article] Debiasing Method for Efficient Ternary Fuzzy Extractors and Ternary Physically Unclonable Functions2020

    • Author(s)
      Kazumori Kohei、Ueno Rei、Homma Naofumi
    • Journal Title

      IEEE 50th International Symposium on Multiple-Valued Logic

      Volume: - Pages: 52-57

    • DOI

      10.1109/ismvl49045.2020.00-30

    • Peer Reviewed / Open Access
    • Data Source
      KAKENHI-PROJECT-20K19765, KAKENHI-PROJECT-17H00729
  • [Journal Article] A Ternary Fuzzy Extractor for Efficient Cryptographic Key Generation2019

    • Author(s)
      Kohei Kazumori, Rei Ueno, Naofumi Homma
    • Journal Title

      IEEE 49th International Symposium on Multiple-Valued Logic (ISMVL)

      Volume: 1 Pages: 49-54

    • DOI

      10.1109/ismvl.2019.00017

    • Peer Reviewed
    • Data Source
      KAKENHI-PROJECT-17H00729, KAKENHI-PROJECT-19K21526
  • [Journal Article] High Throughput/Gate FN-Based Hardware Architectures for AES-OTR2019

    • Author(s)
      Ueno Rei、Homma Naofumi、Iida Tomonori、Minematsu Kazuhiko
    • Journal Title

      IEEE International Symposium on Circuits and Systems (ISCAS)

      Volume: -

    • Peer Reviewed
    • Data Source
      KAKENHI-PROJECT-19K21526
  • [Journal Article] Constructing Sliding Windows Leak from Noisy Cache Timing Information of OSS-RSA2019

    • Author(s)
      Rei Ueno, Junko Takahashi, Yu-ichi Hayashi, Naofumi Homma
    • Journal Title

      PROOFS2019

      Volume: 11 Pages: 64-77

    • DOI

      10.29007/ws8z

    • Peer Reviewed / Open Access
    • Data Source
      KAKENHI-PROJECT-17H00729, KAKENHI-PROJECT-19K21526
  • [Journal Article] Collision-Based EM Analysis on ECDSA Hardware and a Countermeasure2019

    • Author(s)
      Koiwa Kosuke, Ueno Rei, Fujimoto Daisuke, Hayashi Yuichi, Nagata Makoto, Ikeda Makoto, Matsumoto Tsutomu, Homma Naofumi
    • Journal Title

      Joint International Symposium on Electromagnetic Compatibility and Asia-Pacific International Symposium on Electromagnetic Compatibility (Joint IEEE EMC & APEMC 2019)

      Volume: - Pages: 793-796

    • Peer Reviewed
    • Data Source
      KAKENHI-PROJECT-19K21526
  • [Journal Article] Tackling Biased PUFs Through Biased Masking: A Debiasing Method for Efficient Fuzzy Extractor2019

    • Author(s)
      Rei Ueno, Manami Suzuki, Naofumi Homma
    • Journal Title

      IEEE Transactions on Computers

      Volume: 68 Pages: 1091-1104

    • DOI

      10.1109/tc.2019.2897996

    • Peer Reviewed / Open Access
    • Data Source
      KAKENHI-PROJECT-17H00729, KAKENHI-PROJECT-19K21526
  • [Journal Article] Highly Efficient GF(2^8) Inversion Circuit Based on Hybrid GF Representations2019

    • Author(s)
      Rei Ueno, Naofumi Homma, Yasuyuki Nogami, Takafumi Aoki
    • Journal Title

      Journal of Cryptographic Engineering

      Volume: 9 Pages: 101-113

    • DOI

      10.1007/s13389-018-0187-8

    • Peer Reviewed / Open Access
    • Data Source
      KAKENHI-PROJECT-17H00729, KAKENHI-PROJECT-19K21526
  • [Journal Article] Characterizing Parallel Multipliers for Detecting Hardware Trojans2018

    • Author(s)
      Akira Ito, Rei Ueno, Naofumi Homma, Takafumi Aoki
    • Journal Title

      Journal of Applied Logics

      Volume: 9 Pages: 1815-1832

    • Data Source
      KAKENHI-PROJECT-19K21526
  • [Presentation] Curse of Re-encryption: A Generic Power/EM Analysis on Post-Quantum KEMs2022

    • Author(s)
      Rei Ueno
    • Organizer
      International Conference on Cryptographic Hardware and Embedded Systems
    • Int'l Joint Research
    • Data Source
      KAKENHI-PROJECT-20K19765
  • [Presentation] 耐量子鍵カプセル化メカニズムに対する一般化サイドチャネル攻撃2022

    • Author(s)
      上野嶺
    • Organizer
      2022年暗号と情報セキュリティシンポジウム
    • Data Source
      KAKENHI-PROJECT-20K19765
  • [Presentation] 招待講演]バイアスを有するPUFからの棄却サンプリングを用いた一様乱数の抽出法(CHES2020より)2021

    • Author(s)
      上野嶺
    • Organizer
      ハードウェアセキュリティ研究会
    • Invited
    • Data Source
      KAKENHI-PROJECT-20K19765
  • [Presentation] 剰余数系を用いた同種写像暗号の高速ハードウェア実装2021

    • Author(s)
      上野嶺
    • Organizer
      ハードウェアセキュリティ研究会
    • Data Source
      KAKENHI-PROJECT-20K19765
  • [Presentation] 剰余数系を用いた同種写像暗号の高速ハードウェア実装2021

    • Author(s)
      上野 嶺
    • Organizer
      電子情報通信学会ハードウェアセキュリティ研究会
    • Data Source
      KAKENHI-PROJECT-21H04867
  • [Presentation] 並列化Quotient Pipeliningモンゴメリ乗算に基づくFp2乗算器データパスの設計とその同種写像暗号への応用に関する検討2021

    • Author(s)
      上野嶺
    • Organizer
      ハードウェアセキュリティ研究会
    • Data Source
      KAKENHI-PROJECT-20K19765
  • [Presentation] バイアスを有するPUFからの棄却サンプリングを用いた一様乱数の抽出法(CHES2020より)2021

    • Author(s)
      上野嶺
    • Organizer
      ハードウェアセキュリティ研究会
    • Invited
    • Data Source
      KAKENHI-PROJECT-20K19765
  • [Presentation] 確率的計算手法を用いた秘密計算に関する検討2020

    • Author(s)
      上野嶺
    • Organizer
      第33回多値論理とその応用研究会
    • Data Source
      KAKENHI-PROJECT-19K21526
  • [Presentation] Rejection Sampling Schemes for Extracting Uniform Distribution from Biased PUFs2020

    • Author(s)
      Rei Ueno
    • Organizer
      International Conference on Cryptographic Hardware and Embedded Systems
    • Int'l Joint Research
    • Data Source
      KAKENHI-PROJECT-20K19765
  • [Presentation] 物理複製困難関数が実現する情報セキュリティとその方法2020

    • Author(s)
      上野嶺
    • Organizer
      第12回暗号及び情報セキュリティと数学の相関ワークショップ (CRISMATH 2020)
    • Invited
    • Data Source
      KAKENHI-PROJECT-20K19765
  • [Presentation] Constructing Sliding Windows Leak from Noisy Cache Timing Information of OSS-RSA2020

    • Author(s)
      Rei Ueno
    • Organizer
      8th International Workshop on Security Proofs for Embedded Systems (PROOFS 2019)
    • Int'l Joint Research
    • Data Source
      KAKENHI-PROJECT-19K21526
  • [Presentation] ストカスティック計算に基づく確率的準同型暗号の構成に関する検討2020

    • Author(s)
      上野嶺
    • Organizer
      2020年暗号と情報セキュリティシンポジウム (SCIS 2020)
    • Data Source
      KAKENHI-PROJECT-19K21526
  • [Presentation] 情報理論的安全性を有する鍵長可変MACハードウェアアーキテクチャの設計2019

    • Author(s)
      上野嶺
    • Organizer
      2019年暗号と情報セキュリティシンポジウム (SCIS 2019)
    • Data Source
      KAKENHI-PROJECT-19K21526
  • [Presentation] 乗法的オフセットに基づく高効率AESハードウェアアーキテクチャの設計2019

    • Author(s)
      上野嶺
    • Organizer
      セキュリティサマーサミット2019
    • Data Source
      KAKENHI-PROJECT-19K21526
  • [Presentation] Hardware Implementation of Block Cipher: Case Study Using AES2019

    • Author(s)
      Rei Ueno
    • Organizer
      The 9-th Asian-workshop on Symmetric Key Cryptography (ASK2019)
    • Invited / Int'l Joint Research
    • Data Source
      KAKENHI-PROJECT-19K21526
  • [Presentation] Collision-Based EM Analysis on ECDSA Hardware and a Countermeasure2019

    • Author(s)
      Rei Ueno
    • Organizer
      oint International Symposium on Electromagnetic Compatibility and Asia-Pacific International Symposium on Electromagnetic Compatibility (Joint IEEE EMC & APEMC 2019)
    • Int'l Joint Research
    • Data Source
      KAKENHI-PROJECT-19K21526
  • [Presentation] High Throughput/Gate FN-Based Hardware Architectures for AES-OTR2019

    • Author(s)
      Rei Ueno
    • Organizer
      IEEE International Symposium on Circuits and Systems (ISCAS)
    • Int'l Joint Research
    • Data Source
      KAKENHI-PROJECT-19K21526
  • [Presentation] Automatic Generation of Formally-Proven Tamper-Resistant Galois-Field Multipliers Based on Generalized Masking Scheme2019

    • Author(s)
      Rei Ueno
    • Organizer
      Workshop on Top Picks in Hardware and Embedded Security, November 2019
    • Int'l Joint Research
    • Data Source
      KAKENHI-PROJECT-19K21526
  • [Presentation] ガロア体ハードウェアアルゴリズムの形式的トロイフリー性検証手法2019

    • Author(s)
      上野嶺
    • Organizer
      2019年暗号と情報セキュリティシンポジウム (SCIS 2019)
    • Data Source
      KAKENHI-PROJECT-19K21526
  • [Presentation] 偏位マスキングの多値化PUFへの拡張とその暗号鍵生成への応用2019

    • Author(s)
      上野嶺
    • Organizer
      第32回多値論理とその応用研究会
    • Data Source
      KAKENHI-PROJECT-19K21526
  • [Presentation] Poly1305への単一波形を用いたサイドチャネル攻撃とその実現可能性の評価2019

    • Author(s)
      上野嶺
    • Organizer
      2019年暗号と情報セキュリティシンポジウム (SCIS 2019)
    • Data Source
      KAKENHI-PROJECT-19K21526
  • [Presentation] Weak PUFを用いた耐タンパー性暗号鍵ストレージの構成法2018

    • Author(s)
      上野嶺
    • Organizer
      ハードウェアセキュリティフォーラム2018
    • Data Source
      KAKENHI-PROJECT-19K21526
  • 1.  本間 尚文 (00343062)
    # of Collaborated Projects: 1 results
    # of Collaborated Products: 12 results

URL: 

Are you sure that you want to connect your ORCID iD to this researcher?
* This action can be performed only by the researcher themselves.

この研究者とORCID iDの連携を行いますか?
※ この処理は、研究者本人だけが実行できます。

Information User Guide FAQ News Terms of Use Attribution of KAKENHI

Powered by NII kakenhi