Akira Ito

Orcid: 0000-0002-4602-7570

Affiliations:
  • NTT Social Informatics Laboratories, Tokyo, Japan
  • Tohoku University, Sendai, Japan (PhD 2022)


According to our database1, Akira Ito authored at least 30 papers between 2017 and 2025.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2025
Sparse-Autoencoder-Guided Internal Representation Unlearning for Large Language Models.
CoRR, September, 2025

All You Need is XOR-Convolution: A Generalized Higher-Order Side-Channel Attack with Application to XEX/XE-based Encryptions.
IACR Trans. Cryptogr. Hardw. Embed. Syst., 2025

Is the Hard-Label Cryptanalytic Model Extraction Really Polynomial?
IACR Cryptol. ePrint Arch., 2025

Analysis of Linear Mode Connectivity via Permutation-Based Weight Matching: With Insights into Other Permutation Search Methods.
Proceedings of the Thirteenth International Conference on Learning Representations, 2025

2024
Perceived Information Revisited II: Information-Theoretical Analysis of Deep-Learning Based Side-Channel Attacks.
IACR Cryptol. ePrint Arch., 2024

Analysis of Linear Mode Connectivity via Permutation-Based Weight Matching.
CoRR, 2024

2023
Homomorphic encryption for stochastic computing.
J. Cryptogr. Eng., June, 2023

Formal Analysis of Non-profiled Deep-learning Based Side-channel Attacks.
IACR Cryptol. ePrint Arch., 2023

Can Inputs' Reconstruction Information Be Coded into Machine Learning Model's Outputs?
Proceedings of the Computer Security. ESORICS 2023 International Workshops, 2023

2022
One Truth Prevails: A Deep-learning Based Single-Trace Power Analysis on RSA-CRT with Windowed Exponentiation.
IACR Trans. Cryptogr. Hardw. Embed. Syst., 2022

Perceived Information Revisited New Metrics to Evaluate Success Rate of Side-Channel Attacks.
IACR Trans. Cryptogr. Hardw. Embed. Syst., 2022

Efficient Formal Verification of Galois-Field Arithmetic Circuits Using ZDD Representation of Boolean Polynomials.
IEEE Trans. Comput. Aided Des. Integr. Circuits Syst., 2022

Multiple-Valued Plaintext-Checking Side-Channel Attacks on Post-Quantum KEMs.
IACR Cryptol. ePrint Arch., 2022

On the Success Rate of Side-Channel Attacks on Masked Implementations: Information-Theoretical Bounds and Their Practical Usage.
Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security, 2022

2021
Imbalanced Data Problems in Deep Learning-Based Side-Channel Attacks: Analysis and Solution.
IEEE Trans. Inf. Forensics Secur., 2021

An Algebraic Approach to Verifying Galois-Field Arithmetic Circuits with Multiple-Valued Characteristics.
IEICE Trans. Inf. Syst., 2021

Curse of Re-encryption: A Generic Power/EM Analysis on Post-Quantum KEMs.
IACR Cryptol. ePrint Arch., 2021

Toward Optimal Deep-Learning Based Side-Channel Attacks: Probability Concentration Inequality Loss and Its Usage.
IACR Cryptol. ePrint Arch., 2021

Machine-learning-based Quality-level-estimation System for Inspecting Steel Microstructures.
Proceedings of the 17th International Conference on Machine Vision and Applications, 2021

A Formal Approach to Identifying Hardware Trojans in Cryptographic Hardware.
Proceedings of the 51st IEEE International Symposium on Multiple-Valued Logic, 2021

Extraction of Binarized Neural Network Architecture and Secret Parameters Using Side-Channel Information.
Proceedings of the IEEE International Symposium on Circuits and Systems, 2021

Fault-Injection Attacks Against NIST's Post-Quantum Cryptography Round 3 KEM Candidates.
Proceedings of the Advances in Cryptology - ASIACRYPT 2021, 2021

2020
Effective Formal Verification for Galois-field Arithmetic Circuits with Multiple-Valued Characteristics.
Proceedings of the 50th IEEE International Symposium on Multiple-Valued Logic, 2020

Machine Learning and Hardware security: Challenges and Opportunities -Invited Talk-.
Proceedings of the IEEE/ACM International Conference On Computer Aided Design, 2020

CycleGAN-Based High-Quality Non-Parallel Voice Conversion with Spectrogram and WaveRNN.
Proceedings of the 9th IEEE Global Conference on Consumer Electronics, 2020

Practical Side-Channel Based Model Extraction Attack on Tree-Based Machine Learning Algorithm.
Proceedings of the Applied Cryptography and Network Security Workshops, 2020

2018
Characterizing Parallel Multipliers for Detecting Hardware Trojans.
FLAP, 2018

On the Detectability of Hardware Trojans Embedded in Parallel Multipliers.
Proceedings of the 48th IEEE International Symposium on Multiple-Valued Logic, 2018

A Non-Reversible Insertion Method for Hardware Trojans Based on Path Delay Faults.
Proceedings of the PROOFS 2018, 2018

2017
A Study on 2D Photo-Realistic Facial Animation Generation Using 3D Facial Feature Points and Deep Neural Networks.
Proceedings of the Advances in Intelligent Information Hiding and Multimedia Signal Processing, 2017


  Loading...