Learn More
This paper presents a standard-cell-based semi-automatic design methodology of a new conceptual countermeasure against electromagnetic (EM) analysis and fault-injection attacks. The countermeasure namely EM attack sensor utilizes LC oscillators which detect variations in the EM field around a cryptographic LSI caused by a mi-cro probe brought near the LSI.(More)
BACKGROUND In addition to regulating platelet function, the G protein-coupled sub-family member Proteinase-activated receptor-1 (PAR1) has a proposed role in the development of various cancers, but its exact role and mechanism of action in the invasion, metastasis, and proliferation process in gastric cancer have yet to be completely elucidated. Here, we(More)
Power supply currents of CMOS digital circuits partly flow through a silicon substrate in their returning (ground) paths. The voltage bounce due to the substrate currents is seen wherever p+ substrate taps on a p-type die and regarded as a substrate noise. An on-chip waveform monitor confirms the side-channel leakage on the silicon substrate from an AES(More)
Fast power current analysis method using capacitor charging model was introduced to evaluate security of cryptographic hardware against side channel attacks before the circuit is fabricated as an LSI chip. The method was applied to CPA (Correlation Power Analysis) on various AES (Advanced Encryption Standard) circuits, which require more than 10,000 power(More)
The standard regimen of second-line chemotherapy for patients with unresectable gastric cancer has not been established. However, weekly paclitaxel (wPTX) has become the preferable second-line chemotherapy in Japan. Histone deacetylase (HDAC) inhibitors have been shown to have antiproliferative activity through cell-cycle arrest, differentiation, and(More)
A side-channel attack exploiting EM-field leakage from a cryptographic processor IC is an existing serious threat to our information society. EM radiation during the IC operation is captured by an EM probe and the correlation to the crypto processing is statistically analyzed to reveal the secret information although it is protected in a software(More)