Rei Ueno
Kyoto University
Rei Ueno
Kyoto University
Researchmap: https://researchmap.jp/rei_ueno/?lang=en
June 5th 2025, publish of IACR TCHES paper
Our paper about "All You Need is XOR-Convolution: A Generalized Higher-Order Side-Channel Attack with Application to XEX/XE-based Encryptions" has beed published from IACR Transactions on Cryptographic Hardware and Embedded Systems (TCHES).
December 9th 2025, publish of IACR TCHES paper
Our paper about "Perceived Information Revisited II: Information-Theoretical Analysis of Deep-learning Based Side-Channel Attacks" has beed published from IACR Transactions on Cryptographic Hardware and Embedded Systems (TCHES).
November 14th 2024, ACM CCS presentation
I gave a presentation of our paper "Crystalor: Recoverable Memory Encryption Mechanism with Optimized Metadata Structure" at ACM SIGSAC Conference on Computer and Communications Security (ACM CCS).
Rei Ueno, Akira Ito, Yosuke Todo, Akiko Inoue, Kazuhiko Minematsu, Hibiki Ishikawa, and Naofumi Homma, “All You Need is XOR-Convolution: A Generalized Higher-Order Side-Channel Attack with Application to XEX/XE-based Encryptions,” IACR Transactions on Cryptographic Hardware and Embedded Systems, 2025(3), pp. 317–360, 2025.
Rei Ueno, Hiromichi Haneda, Naofumi Homma, Akiko Inoue, and Minematsu Kazuhiko, "Crystalor: Recoverable Memory Encryption Mechanism with Optimized Metadata Structure" ACM SIGSAC Conference on Computer and Communications Security (CCS 2024), 2024.
Rei Ueno, Naofumi Homma, Akiko Inoue, and Minematsu Kazuhiko, "Fallen Sanctuary: A Higher-Order and Leakage-Resilient Rekeying Scheme" IACR Transactions on Cryptographic Hardware and Embedded Systems, 2024(1), pp. 264–308, 2023.
Federico Canale, Tim Güneysu, Gregor Leander, Jan Philipp Thoma, Yosuke Todo, and Rei Ueno, “SCARF---A Low-Latency Block Cipher for Secure Cache-Randomization,” USENIX Security Synposium '23, pp.1937–1954, 2023.
Akira Ito, Rei Ueno, and Naofumi Homma, “On the Success Rate of Side-Channel Attacks on Masked Implementations: Information-Theoretical Bounds and Their Practical Usage,” ACM SIGSAC Conference on Computer and Communications Security (CCS 2022), pp.1521–1535, 2022.
Rei Ueno and Naofumi Homma, “How Secure is Exponent-blinded RSA–CRT with Sliding Window Exponentiation?,” IACR Transactions on Cryptographic Hardware and Embedded Systems, 2023(2), pp.241–269, 2023.
Rei Ueno, Keita Xagawa, Yutaro Tanaka, Akira Ito, Junko Takahashi, and Naofumi Homma, “Curse of Re-encryption: A Generic Power/EM Analysis on Post-Quantum KEMs,” IACR Transactions on Cryptographic Hardware and Embedded Systems, 2022(1), pp. 296–322, 2021.
Rei Ueno, Sumio Morioka, Noriyuki Miura, Kohei Matsuda, Makoto Nagata, Shivam Bhasin, Yves Mathieu, Tarik Graba, Jean-Luc Danger, and Naofumi Homma, “High Throughput/Gate AES Hardware Architectures Based on Datapath Compression,” IEEE Transactions on Computers, 69(4), pp. 534–548, 2020.