Prof. Yasuyuki Nogami

Education & Laboratory

Human Resource Development Programs

FeaturedWAAP Curriculum

Wireless and Advanced Application Program

A practical education program for developing cybersecurity professionals. Through a curriculum combining theory and practice, we train security engineers who can immediately contribute in the field.

  • Hands-on practical exercises
  • Learning cutting-edge security technologies
  • Practice-oriented education through industry collaboration

FeaturedWhite Hacker Training Program

Developing professionals who can discover and address system vulnerabilities through ethical hacking techniques.

Major Programs

  • Practical AI & Security Course (Okayama University & Okayama Prefecture, April 2024 - )
    Education in cutting-edge technologies integrating AI and security
  • Professional Security Human Resource Development Course (Chugoku Bureau of Economy, Trade and Industry, 2020 - )
    Recurrent education program for working professionals
  • enpit-basicseccap (Ministry of Education, Culture, Sports, Science and Technology, April 2017 - )
    Development of basic security capabilities
  • enpit-everi (Society5.0 compatible, 2017 - )
    Advanced technology human resource development

Other Educational Programs

  • Web IoT Makers Challenge in Okayama (Ministry of Internal Affairs and Communications, 2020 - )
    Practical learning of IoT technologies
  • Donated Course "Okayama IoT・AI・Security Course" (2019 - 2024)
    Practical education in collaboration with regional companies

Courses Taught

Undergraduate & Graduate Level

  • Logic Circuits
    From basics to advanced digital circuit design
  • Security Implementation Practice A / B (September 2022 - )
    Practical exercises in security technology implementation
  • DX Tools, Secure Data Communication, and Data Analysis Practice (2022 - )
    Acquiring practical skills for the DX era
  • Agricultural DX Hackathon (2022 - )
    Promoting DX in agriculture
  • NoCode Workshop (2022 - )
    Development methods without programming
  • Creative Practice (August 2015 - )
    Developing creative problem-solving abilities
  • Hardware Security Practice
    Hardware-level security
  • Introduction to Security
    Fundamentals of information security
  • System Security Optimization
    Design of secure systems
  • Cryptographic Protocol Design
    Design and implementation of cryptographic protocols
  • Mathematical Cryptography
    Mathematical foundations of cryptographic theory
  • Network Programming Laboratory
    Development of network applications
  • Electrical and Telecommunication Systems Laboratory
    Communication systems experiments
  • C/C++ Programming Practice
    Programming fundamentals
  • Java Programming Practice
    Object-oriented programming

Laboratory Information

Laboratory Overview

Conducting a wide range of research centered on information security and cryptography theory, from theory to implementation.

Laboratory Features

  • Balanced approach combining theoretical and implementation research
  • Active collaboration with domestic and international research institutions
  • Close cooperation with industry
  • Active support for students' international conference presentations
  • Encouragement of participation in security competitions

Research Topics (Examples)

  • Development of next-generation cryptographic technologies (post-quantum cryptography, homomorphic encryption)
  • IoT/AI Security
  • Implementation and evaluation of lightweight cryptography
  • Hardware security
  • Blockchain technology
  • Development of random number generators

Laboratory Website

For detailed research content, member information, and latest updates, please visit the laboratory website.

Prospective Students

For Students Interested in Joining the Laboratory

We welcome students interested in information security and cryptography theory.

Ideal Student Profile

  • Strong interest in information security and cryptographic technologies
  • Motivation to work on both theory and implementation
  • Programming experience (or willingness to learn)
  • Willingness to read English research papers
  • Ability to communicate proactively

Skills to Acquire

  • Deep understanding of cryptographic theory
  • Ability to implement security technologies
  • Paper writing and presentation skills
  • International perspective
  • Problem-solving abilities

We are always available for consultation regarding laboratory assignment. If you are interested, please contact us via the Contact page.

Career Paths of Graduates

Laboratory alumni are active in various fields including information security companies, IT companies, telecommunications companies, automobile manufacturers, and public institutions.

  • Security Engineer
  • Security Consultant
  • System Engineer
  • Research & Development
  • University Faculty / Researcher