Cryptographic Hardware and Security Systems
We study the design of cryptographic implementation methods and the photonic circuits to achieve photonic cryptographic hardware using photonic logic gates, which is necessary to ensure the security of optical information processing infrastructure.
Awards
- 2008: IEICE SCIS Best Paper Award
- 2016: IPSJ Journal of Information Processing Specially Selected Paper Certificate
- 2020: ICICS 2020 Best Paper Award
Academic Activities
- 2011-2013: Cryptography Research and Evaluation Committees (CRYPTREC) Cryptographic Module Committee, Committee member
- 2011: Workshop on Fault Diagnosis and Tolerance in Cryptography (FDTC 2011) program co-chairs
- 2016- : IEICE Technical Committee on Hardware Security, Committee member
- 2020-2022: IEICE Technical Committee on Hardware Security, Secretary
- 2018-2020: IPSJ Special Interest Group on System Architecture, Committee member
Visiting Professor
- 2011: Institute of Information Security, Special Lecturer
- 2021- : Kyusyu University, Visiting Lecturer
- 2021-: The National Institute of Advanced Industrial Science and Technology, Cyber Physical Security Research Center, Invited Researcher
Publications
Books
- Fault Analysis in Cryptography (Information Security and Cryptography), Editors: Marc Joye, Michael Tunstall, 2012th edition (June 22, 2012), Chapter: Fault Injection and Key Retrieval Experiments on Evaluation Board, pp.313-331.
Papers
Selected Publications
- Junko Takahashi, Toshinori Fukunaga, Kimihiro Yamakoshi, DFA Mechanism on the AES Key Schedule. FDTC 2007: IEEE-CS pp. 62-74 (2007)
- Junko Takahashi, Toshinori Fukunaga, Differential Fault Analysis on CLEFIA with 128, 192, and 256-Bit Keys. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 93-A(1), pp. 136-143 (2010)
- Junko Takahashi, Toshinori Fukunaga, Implementation Attacks on an Immobilizer Protocol Stacks, The 11th Embedded Security in Cars (escar Europe) 2013
- Junko Takahashi, Yosuke Aragane, Toshiyuki Miyazawa, Hitoshi Fuji, Hirofumi Yamashita, Keita Hayakawa, Shintarou Ukai, Hiroshi Hayakawa: Automotive Attacks and Countermeasures on LIN-Bus. J. Inf. Process. Volume 25, pp. 220-228 (2017)
- Junko Takahashi, An Overview of Cyber Security for Connected Vehicles. IEICE Trans. Inf. Syst. 101-D(11), pp. 2561-2575 (2018)
- Junko Takahashi, Masashi Tanaka, Hitoshi Fuji, Toshio Narita, Shunsuke Matsumoto, Hiroki Sato: Automotive Security on Abnormal Vehicle Behavior Using Only Fabricated Informative CAN Messages. J. Inf. Process. Volume 27, pp. 159-167 (2019)
- Junko Takahashi, Makoto Iwamura, Masashi Tanaka: Security Threat Analysis of Automotive Infotainment Systems. The 2020 IEEE 92nd Vehicular Technology Conference (VTC Fall) 2020, pp.1-7 (2020)
- Junko Takahashi, Keiichi Okabe, Hiroki Itoh, Xuan Thuy Ngo, Sylvain Guilley, Ritu Ranjan Shrivastwa, Mushir Ahmed, Patrick Lejoly, Machine Learning Based Hardware Trojan Detection Using Electromagnetic Emanation, IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 105-A(3), pp. 311-325 (2022)
Keywords
Hardware Security, Embedded Security, Cryptographic Hardware, Hardware Implementations, Cryptographic Photonic Circuits