Research
Research Fields
Manufacturing Technology (Mechanical, Electrical, Electronic, Chemical Engineering) / Communication Engineering / Information Security
Major Research Themes
1. Cryptography
Research and development of cryptographic technologies that form the foundation of information security essential to modern society.
Elliptic Curve Cryptography (ECC)
- Public key cryptography based on elliptic curve discrete logarithm problem
- Development of fast computation algorithms
- Implementation optimization for embedded systems
Pairing-based Cryptography
- Advanced cryptography using bilinear maps
- Implementation of ID-based and attribute-based encryption
- Development of efficient pairing computation methods
- Search for optimal curve parameters
Homomorphic Encryption
- Cryptographic technology enabling computation on encrypted data
- Privacy protection in cloud computing
- Implementation and evaluation of practical homomorphic encryption
2. Post Quantum Cryptography (PQC)
Research on cryptographic technologies resistant to quantum computer attacks, preparing for the practical implementation of quantum computers.
- Lattice-based Cryptography
- Code-based Cryptography
- Multivariate Cryptography
- Correspondence with NIST standardization process
3. IoT Security
Aiming to realize secure communication and data protection in the IoT era.
- Design and implementation of lightweight cryptography
- Authentication protocols for IoT devices
- Security implementation for embedded systems
- Cryptographic processing optimization under resource constraints
- Security for CAN and MAVLink communications
4. AI Security
Research to ensure the safety and reliability of AI technologies.
- Attacks and defenses for machine learning models
- Privacy-preserving machine learning
- Side-channel attacks using deep learning
- AI-based intrusion detection systems
5. Random Number Generation
Research and development of high-quality random number generators that form the foundation of cryptographic technologies.
- True Random Number Generator (TRNG)
- RNG design using ring oscillators
- Evaluation of Pseudo Random Number Generators (PRNG)
- Statistical evaluation methods for random numbers
6. Hardware Security
Research on security evaluation and countermeasure technologies for cryptographic hardware.
- Side-channel attacks and countermeasures
- Resistance evaluation against Differential Power Analysis (DPA)
- Countermeasures for fault attacks
- Design of secure cryptographic processors
Major Research Projects
Grants-in-Aid for Scientific Research
- "Proposal of Attack Methods for Security Evaluation of Cryptographic Technologies Using Machine Learning and Deep Learning"
Grant-in-Aid for Scientific Research (C) (April 2021 - March 2024) - "Construction of Secure Medical Information Management System Using ICT and Cryptographic Technologies"
Grant-in-Aid for Challenging Research (Pioneering) (June 2019 - March 2023) - "Realization of Safe and Reliable Communication in Remote-Controlled and Autonomous Mobile Systems in the IoT Era"
Grant-in-Aid for Scientific Research (A) (April 2016 - March 2019) - "Development and Demonstration of Distributed Parallel Attack Method Using Conjugate Rational Point Norm for Elliptic Pairing Cryptography"
Grant-in-Aid for Scientific Research (B) (April 2013 - March 2016)
Industry-Academia Collaboration Projects
- Development of practical security technologies through joint research with companies
- Research on security technologies for automotive industry
- Security enhancement of medical information systems
- Security implementation for agricultural IoT systems
Laboratory Features
- Comprehensive research approach from theory to implementation and evaluation
- Active collaboration with domestic and international research institutions
- Close cooperation with industry for practical research
- Active support for students' presentations at international conferences
- Encouragement of participation in security competitions