Daisuke Fujimoto
YOU?
Author Swipe
View article: Preoperative MRI Assessment of Mesorectal Lymph Node Metastasis in Patients with Rectal Cancer: A Retrospective Study
Preoperative MRI Assessment of Mesorectal Lymph Node Metastasis in Patients with Rectal Cancer: A Retrospective Study Open
A preoperative long-axis diameter of ≥ 7 mm and a short-axis diameter of ≥ 5 mm were found to be reliable predictors of mesorectal lymph node metastasis in rectal cancer. Using a 5-mm short-axis cutoff improved diagnostic specificity. Thes…
View article: Capacitance Sensor-Based Board-Level PUF for Device Identification
Capacitance Sensor-Based Board-Level PUF for Device Identification Open
The proliferation of counterfeit and refurbished semiconductor devices has become a critical concern. Device identification techniques based on Physically Unclonable Functions (PUFs) have therefore attracted significant attention. Conventi…
View article: Effect of Hyperthermic Intraperitoneal Chemotherapy on Long Term Survival in Gastric Cancer with Peritoneal Metastasis Treated With Preoperative Intraperttoneal Chemotherapy plus Peritonectomy: The Phase III PM-GC-1 Trial
Effect of Hyperthermic Intraperitoneal Chemotherapy on Long Term Survival in Gastric Cancer with Peritoneal Metastasis Treated With Preoperative Intraperttoneal Chemotherapy plus Peritonectomy: The Phase III PM-GC-1 Trial Open
The presentation aims to describe the theory for Comprehensive Treatment (COMPT) in order to achieve cure of Colorectal Cancer (CRC)-patients with Peritoneal Metastasis (PM). Comprehensive Treatment (COMPT) consists of complete resection o…
View article: High-Throughput Bilinear Pairing Processor for Server-Side FPGA Applications
High-Throughput Bilinear Pairing Processor for Server-Side FPGA Applications Open
This study focuses on the acceleration of cryptographic pairing operations on field-programmable gate arrays (FPGAs) for server-side applications. Previous studies on FPGA pairing implementations focused on area efficiency for embedded dev…
View article: Effects of Hyperthermic Intraperitoneal Chemotherapy and Intraperitoneal Chemotherapy for Well-Differentiated Papillary Mesothelioma
Effects of Hyperthermic Intraperitoneal Chemotherapy and Intraperitoneal Chemotherapy for Well-Differentiated Papillary Mesothelioma Open
Objective: Well-Differentiated Papillary Mesothelioma (WDPM) is a rare disease, with no consensus recommendation for treatment. In the present article, we propose novel treatment options for the treatment of WDPM. Methods: From 2006 to 202…
View article: Remote Fault Injection Attack against Cryptographic Modules via Intentional Electromagnetic Interference from an Antenna
Remote Fault Injection Attack against Cryptographic Modules via Intentional Electromagnetic Interference from an Antenna Open
Fault injection attacks on cryptographic modules pose significant threats, yet conventional fault injection methods require physical access to the target device. This paper introduces a novel fault injection method using Intentional Electr…
View article: Theoretical Basis of Comprehensive Treatment for Colorectal Cancer Patients with Peritoneal Metastasis
Theoretical Basis of Comprehensive Treatment for Colorectal Cancer Patients with Peritoneal Metastasis Open
The aim of this article is to describe the theory underlying Comprehensive Treatment (COMPT) designed to Cure Colorectal Cancer (CRC) patients with peritoneal metastasis (PM). There are four curative scenarios following COMPT. Scenario A i…
View article: Efficient Noninvasive Fault Injection Method Utilizing Intentional Electromagnetic Interference
Efficient Noninvasive Fault Injection Method Utilizing Intentional Electromagnetic Interference Open
In the fault injection method, an electromagnetic (EM) wave is injected to temporarily cause a fault at a specific time of the encryption process, the faulty outputs are obtained from the cryptographic device, and the secret key is extract…
View article: Echo TEMPEST: EM Information Leakage Induced by IEMI for Electronic Devices
Echo TEMPEST: EM Information Leakage Induced by IEMI for Electronic Devices Open
Electromagnetic (EM) information leakage encourages attacks, wherein the attackers passively capture and analyze EM waves that are unintentionally generated by devices. Generally, devices with weak EM emission intensities are not targeted.…
View article: A Detection method of electromagnetic analysis attacks based on change in amplitude of noise around integrated circuits
A Detection method of electromagnetic analysis attacks based on change in amplitude of noise around integrated circuits Open
Electromagnetic analysis (EMA) attacks are a type of side-channel attacks that can be performed without opening or modifying a cryptographic module. In this study, we propose a detection method for the measurement of side-channel informati…
View article: Evaluation of Statistical Fault Analysis Using Input Timing Violation of Sequential Circuit on Cryptographic Module Under IEMI
Evaluation of Statistical Fault Analysis Using Input Timing Violation of Sequential Circuit on Cryptographic Module Under IEMI Open
In encryption circuits, the threat of fault injection analysis remains a considerable problem. More specifically, clock glitches generated by intentional electromagnetic (EM) irradiation cause faulty operations and estimate internal secret…
View article: A Novel Remote Visualization of Screen Images Against High-Resolution Display With Divided Screens Focusing on the Difference of Transfer Function of Multiple Emanations
A Novel Remote Visualization of Screen Images Against High-Resolution Display With Divided Screens Focusing on the Difference of Transfer Function of Multiple Emanations Open
Electromagnetic (EM) remote visualization of screen images attacks (RVSIAs) is among the most actively researched topics in hardware security. Target displays are being developed daily; for example, recently developed high-resolution displ…
View article: Electromagnetic Side-Channel Analysis Against TERO-Based TRNG
Electromagnetic Side-Channel Analysis Against TERO-Based TRNG Open
True random number generators (TRNGs) based on ring oscillators are employed in many devices because they can be constructed with logic gates only. Random numbers generated by TRNGs are used for various cryptographic systems as session key…
View article: Peritoneal mesothelioma
Peritoneal mesothelioma Open
This review provides an overview of articles about peritoneal mesothelioma (PM) to analyze the effect of treatment modalities on response rates, post-treatment side effects, morbidity and mortality, and survival. Median survival in months …
View article: Constructing software countermeasures against instruction manipulation attacks: an approach based on vulnerability evaluation using fault simulator
Constructing software countermeasures against instruction manipulation attacks: an approach based on vulnerability evaluation using fault simulator Open
Fault injection attacks (FIA), which cause information leakage by injecting intentional faults into the data or operations of devices, are one of the most powerful methods compromising the security of confidential data stored on these devi…
View article: A Study on Output Bit Tampering of True Random Number Generators Using Time-Varying EM Waves
A Study on Output Bit Tampering of True Random Number Generators Using Time-Varying EM Waves Open
True random number generators (TRNGs) based on ring oscillators are employed in many devices because they can be constructed with logic gates only. If the randomness is degraded by the attack, it may affect the security of the cryptographi…
View article: Efficient Algorithms for Sign Detection in RNS Using Approximate Reciprocals
Efficient Algorithms for Sign Detection in RNS Using Approximate Reciprocals Open
The residue number system (RNS) is a method for representing an integer x as an n-tuple of its residues with respect to a given set of moduli. In RNS, addition, subtraction, and multiplication can be carried out by independent operations w…
View article: Segmentation method based modeling and analysis of a glass package power distribution network (PDN)
Segmentation method based modeling and analysis of a glass package power distribution network (PDN) Open
In this paper, for the first time, an accurate glass package power distribution network (PDN) model is proposed for the PDN impedance estimation based on a segmentation method. To verify the proposed modeling method, glass package test veh…
View article: Laser-Induced Controllable Instruction Replacement Fault Attack
Laser-Induced Controllable Instruction Replacement Fault Attack Open
To develop countermeasures against fault attacks, it is important to model an attacker's ability. The instruction skip model is a well-studied practical model for fault attacks on software. Contrastingly, few studies have investigated the …
View article: A Security on the Sensing Process
A Security on the Sensing Process Open
近年,外界の情報を取得し,自身の制御を行う自動運転車などの開発・普及が進んでいる.このような機器においては,外界の情報を取得するセンサを用いる.その際,機器はセンサからの情報を信頼し動作するため,攻撃者によりセンサの情報が改ざんや妨害されるとその動作を不正に制御される可能性がある.このように外界の情報を取得し制御するような機器においてはセンサからのデータのセキュリティを考える必要がある.本稿ではセンサが外界から情報を取得する過程におけるセキュリティについて概観する.
View article: Electromagnetic Information Extortion from Electronic Devices Using Interceptor and Its Countermeasure
Electromagnetic Information Extortion from Electronic Devices Using Interceptor and Its Countermeasure Open
The problem of information leakage through electromagnetic waves for various devices has been extensively discussed in literature. Conventionally, devices that are under such a threat suffer from potential electromagnetic information leaka…
View article: Characteristics of Electrochemical Electrodes Containing Composite Films of Boron-doped Nanocrystalline Diamond and Amorphous Carbon Prepared using a Coaxial arc Plasma Deposition Method
Characteristics of Electrochemical Electrodes Containing Composite Films of Boron-doped Nanocrystalline Diamond and Amorphous Carbon Prepared using a Coaxial arc Plasma Deposition Method Open
Composite films of boron-doped nanocrystalline diamond and amorphous carbon (B-doped NCD/a-C) were prepared using a coaxial arc plasma deposition (CAPD) method at an unheated substrate temperature without using any reaction gases. Cyclic v…
View article: Initial results of reduced port laparoscopic gastrectomy for gastric cancer
Initial results of reduced port laparoscopic gastrectomy for gastric cancer Open
Reduced port laparoscopic gastrectomy (RPLG) for gastric cancer is started from some skilled surgeons in the selected cases. The procedures of RLPG have two ways that of using multi-channel-ports device and of using needle devices, reporte…
View article: Protecting cryptographic integrated circuits with side-channel information
Protecting cryptographic integrated circuits with side-channel information Open
Side-channel attacks have emerged as the nondestructive threats of security vulnerability in cryptographic hardware. This paper provides an overview of the protection techniques with counter ways of utilizing side-channel information leaka…
View article: Electrolytic Treatment Characteristics of Boron-doped Nanocrystalline Diamond/Amorphous Carbon Composite Films Prepared by Coaxial Arc Plasma Deposition
Electrolytic Treatment Characteristics of Boron-doped Nanocrystalline Diamond/Amorphous Carbon Composite Films Prepared by Coaxial Arc Plasma Deposition Open
Boron-doped nanocrystalline diamond amorphous carbon composite (NCD/a-C) films were fabricated by coaxial arc plasma deposition (CAPD). Electrical conductivity measurements and thermal analysis confirmed that the deposited films exhibited …