{"created":"2025-01-19T01:44:46.534011+00:00","metadata":{"_oai":{"id":"oai:ipsj.ixsq.nii.ac.jp:00240532","sets":["1164:2036:11466:11785"]},"path":["11785"],"owner":"44499","recid":"240532","title":["CMOSイメージセンサに適したMAC回路に用いる軽量HASHの評価"],"pubdate":{"attribute_name":"公開日","attribute_value":"2024-11-05"},"_buckets":{"deposit":"70a8d6a5-dd72-49a5-8669-7aa3a3806b47"},"_deposit":{"id":"240532","pid":{"type":"depid","value":"240532","revision_id":0},"owners":[44499],"status":"published","created_by":44499},"item_title":"CMOSイメージセンサに適したMAC回路に用いる軽量HASHの評価","author_link":["660054","660053","660055","660052","660060","660059","660057","660056","660061","660058"],"item_titles":{"attribute_name":"タイトル","attribute_value_mlt":[{"subitem_title":"CMOSイメージセンサに適したMAC回路に用いる軽量HASHの評価"},{"subitem_title":"An Evaluation of Lightweight Hash for Message Authentication Code in CMOS Image Sensors","subitem_title_language":"en"}]},"item_type_id":"4","publish_date":"2024-11-05","item_4_text_3":{"attribute_name":"著者所属","attribute_value_mlt":[{"subitem_text_value":"立命館大学理工学研究科"},{"subitem_text_value":"立命館大学理工学部"},{"subitem_text_value":"立命館大学理工学研究科"},{"subitem_text_value":"立命館大学理工学部"},{"subitem_text_value":"立命館大学理工学部"}]},"item_4_text_4":{"attribute_name":"著者所属(英)","attribute_value_mlt":[{"subitem_text_value":"Research Organization of Science and Engineering Ritsumeikan University","subitem_text_language":"en"},{"subitem_text_value":"Department of Science and Engineering, Ritsumeikan University","subitem_text_language":"en"},{"subitem_text_value":"Research Organization of Science and Engineering Ritsumeikan University","subitem_text_language":"en"},{"subitem_text_value":"Department of Science and Engineering, Ritsumeikan University","subitem_text_language":"en"},{"subitem_text_value":"Department of Science and Engineering, Ritsumeikan University","subitem_text_language":"en"}]},"item_language":{"attribute_name":"言語","attribute_value_mlt":[{"subitem_language":"jpn"}]},"item_publisher":{"attribute_name":"出版者","attribute_value_mlt":[{"subitem_publisher":"情報処理学会","subitem_publisher_language":"ja"}]},"publish_status":"0","weko_shared_id":-1,"item_file_price":{"attribute_name":"Billing file","attribute_type":"file","attribute_value_mlt":[{"url":{"url":"https://ipsj.ixsq.nii.ac.jp/record/240532/files/IPSJ-SLDM24207050.pdf","label":"IPSJ-SLDM24207050.pdf"},"format":"application/pdf","billing":["billing_file"],"filename":"IPSJ-SLDM24207050.pdf","filesize":[{"value":"1.1 MB"}],"mimetype":"application/pdf","priceinfo":[{"tax":["include_tax"],"price":"0","billingrole":"10"},{"tax":["include_tax"],"price":"0","billingrole":"44"}],"accessrole":"open_login","version_id":"af1b9676-a704-4c05-beaf-84a821dfb2d9","displaytype":"detail","licensetype":"license_note","license_note":"Copyright (c) 2024 by the Institute of Electronics, Information and Communication Engineers This SIG report is only available to those in membership of the SIG."}]},"item_4_creator_5":{"attribute_name":"著者名","attribute_type":"creator","attribute_value_mlt":[{"creatorNames":[{"creatorName":"萩嵜, 真波"}],"nameIdentifiers":[{}]},{"creatorNames":[{"creatorName":"小川, 広明"}],"nameIdentifiers":[{}]},{"creatorNames":[{"creatorName":"大山, 達哉"}],"nameIdentifiers":[{}]},{"creatorNames":[{"creatorName":"藤野, 毅"}],"nameIdentifiers":[{}]},{"creatorNames":[{"creatorName":"大倉, 俊介"}],"nameIdentifiers":[{}]}]},"item_4_creator_6":{"attribute_name":"著者名(英)","attribute_type":"creator","attribute_value_mlt":[{"creatorNames":[{"creatorName":"Manami, Hagizaki","creatorNameLang":"en"}],"nameIdentifiers":[{}]},{"creatorNames":[{"creatorName":"Hiroaki, Ogawa","creatorNameLang":"en"}],"nameIdentifiers":[{}]},{"creatorNames":[{"creatorName":"Tatsuya, Oyama","creatorNameLang":"en"}],"nameIdentifiers":[{}]},{"creatorNames":[{"creatorName":"Takeshi, Fujino","creatorNameLang":"en"}],"nameIdentifiers":[{}]},{"creatorNames":[{"creatorName":"Shunsuke, Okura","creatorNameLang":"en"}],"nameIdentifiers":[{}]}]},"item_4_source_id_9":{"attribute_name":"書誌レコードID","attribute_value_mlt":[{"subitem_source_identifier":"AA11451459","subitem_source_identifier_type":"NCID"}]},"item_4_textarea_12":{"attribute_name":"Notice","attribute_value_mlt":[{"subitem_textarea_value":"SIG Technical Reports are nonrefereed and hence may later appear in any journals, conferences, symposia, etc."}]},"item_resource_type":{"attribute_name":"資源タイプ","attribute_value_mlt":[{"resourceuri":"http://purl.org/coar/resource_type/c_18gh","resourcetype":"technical report"}]},"item_4_source_id_11":{"attribute_name":"ISSN","attribute_value_mlt":[{"subitem_source_identifier":"2188-8639","subitem_source_identifier_type":"ISSN"}]},"item_4_description_7":{"attribute_name":"論文抄録","attribute_value_mlt":[{"subitem_description":"エッジ AI では,センサで取得した情報をエッジで分類または認識するため,センサから送信されるデータの完全性保証がセキュリティ上の重要な課題となる.我々の研究チームでは CMOS イメージセンサ(CIS)から送信される画像を改ざんやなりすましから保護することを目的として,CIS-PUF(Physically Unclonable Functions)を用いて送信画像にメッセージ認証符号(MAC)を付与する画像保護システムを提案している.これまでは MAC 計算に SHA2 の利用を想定していたがスループットの観点から 3 個のハッシュ回路を実装する必要があった.本稿では,小面積化を目的とし,SHA2,SHA3,BLAKE2 及び軽量 Hash である PHOTON,Quark,SPONGENT について CIS-MAC に適用した際の計算速度と面積に関して比較を行った.さらに SHA-256,SHA3-512,BLAKE2s に関して実装面積を評価した.","subitem_description_type":"Other"}]},"item_4_description_8":{"attribute_name":"論文抄録(英)","attribute_value_mlt":[{"subitem_description":"In edge AI, since information acquired by sensors is classified and recognized at the edge, the integrity of data transmitted from the sensors is an important security concern. To protect images transmitted by CMOS image sensors (CIS) from tampering or spoofing, we proposed an image protection system that incorporates a message authentication code (MAC) into the transmitted image using Physically Unclonable Functions (PUF). Previous studies have assumed the use of SHA-256 for MAC calculation, which requires time-interleaving of three hash circuits to achieve sufficient throughput. In this paper, we compare the processing speed and area requirements of various hash functions, including SHA-2, SHA-3, Blake2, and lightweight hashes such as SPONGENT, Quark, and PHOTON, to reduce the area when applied to CIS-MAC. Additionally, we evaluate the implementation area of SHA-256, SHA3-512, and BLAKE2s.","subitem_description_type":"Other"}]},"item_4_biblio_info_10":{"attribute_name":"書誌情報","attribute_value_mlt":[{"bibliographicPageEnd":"6","bibliographic_titles":[{"bibliographic_title":"研究報告システムとLSIの設計技術(SLDM)"}],"bibliographicPageStart":"1","bibliographicIssueDates":{"bibliographicIssueDate":"2024-11-05","bibliographicIssueDateType":"Issued"},"bibliographicIssueNumber":"50","bibliographicVolumeNumber":"2024-SLDM-207"}]},"relation_version_is_last":true,"weko_creator_id":"44499"},"id":240532,"updated":"2025-01-19T07:57:00.942188+00:00","links":{}}