{"id":2474,"date":"2024-09-27T15:53:00","date_gmt":"2024-09-27T06:53:00","guid":{"rendered":"https:\/\/www.elst.okayama-u.ac.jp\/en\/?page_id=2474"},"modified":"2025-06-09T14:54:02","modified_gmt":"2025-06-09T05:54:02","slug":"areas08_info","status":"publish","type":"page","link":"https:\/\/www.elst.okayama-u.ac.jp\/en\/education\/mc-suuri\/areas08_info\/","title":{"rendered":"Secure Hardware Design"},"content":{"rendered":"<h4>Secure Hardware Design<\/h4>\n<p><img loading=\"lazy\" decoding=\"async\" class=\" wp-image-69 aligncenter\" src=\"https:\/\/www.elst.okayama-u.ac.jp\/up_load_files\/areas\/areas08_info\/theme.jpg\" alt=\"\" width=\"386\" height=\"279\"><\/p>\n<p>In an era where various devices are connected to the internet, and data is exchanged and stored, information security technology is essential for using services with confidence. Our research lab focuses on studying hardware design technologies<\/p>\n<table class=\"el_table_responsive\" style=\"width: 100%\">\n<tbody>\n<tr>\n<th style=\"width: 20%\">&nbsp;<\/th>\n<td style=\"width: 80%\">\n<ul>\n<li style=\"list-style-type: none;font-size: 12px;margin-left: -20px\"><span style=\"font-size: 12pt\">Assoc Prof. IOKIBE Kengo<\/span><\/li>\n<li style=\"list-style-type: none;font-size: 12px;margin-left: -20px\"><span style=\"font-size: 12pt\">E-mail\uff1aiokibe-k <span style=\"color: #0000ff\">[at]<\/span> okayama-u.ac.jp&nbsp;<\/span><\/li>\n<li style=\"list-style-type: none;font-size: 12px;margin-left: -20px\"><span style=\"font-size: 12pt\">Hardware security \/ Electromagnetic information leakage \/ Electronics packaging \/ Modeling \/ IoT \/ Electromagnetic Compatibility \/ LiDAR<\/span><\/li>\n<\/ul>\n<p>&nbsp;<\/p>\n<p><span style=\"font-size: 12pt\"><a class=\"el_linkBtn\" href=\"https:\/\/soran.cc.okayama-u.ac.jp\/html\/d2433282ec3fd8d074506e4da22f6611_en.html\">Directory of Researchers<\/a> \u3000<a class=\"el_linkBtn\" href=\"https:\/\/www.cc.okayama-u.ac.jp\/~eng_oew\/index_en.html\">Link to Homepage<\/a><\/span><\/p>\n<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<p>&nbsp;<\/p>\n<p><a href=\"https:\/\/www.elst.okayama-u.ac.jp\/up_load_files\/areas\/areas08_info\/img_IOKIBE kengo.jpg\"><img loading=\"lazy\" decoding=\"async\" class=\"alignright\" src=\"https:\/\/www.elst.okayama-u.ac.jp\/up_load_files\/areas\/areas08_info\/img_IOKIBE kengo.jpg\" alt=\"\" width=\"266\" height=\"203\"><\/a><\/p>\n<p>We are developing simulation techniques for side-channel attacks against hardware implementations of cryptographic functions essential for information security. Using these techniques, we are also studying secure design methods for cryptographic hardware.<\/p>\n<p>&nbsp;<\/p>\n<p>&nbsp;<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Secure Hardware Design In an era where various devices are connected to the internet, and data is exchanged an [&hellip;]<\/p>\n","protected":false},"author":5,"featured_media":0,"parent":140,"menu_order":20,"comment_status":"closed","ping_status":"closed","template":"template-layout_single.php","meta":{"footnotes":""},"class_list":["post-2474","page","type-page","status-publish","hentry"],"aioseo_notices":[],"publishpress_future_action":{"enabled":false,"date":"2026-05-05 08:57:05","action":"change-status","newStatus":"draft","terms":[],"taxonomy":"","extraData":[]},"publishpress_future_workflow_manual_trigger":{"enabledWorkflows":[]},"_links":{"self":[{"href":"https:\/\/www.elst.okayama-u.ac.jp\/en\/wp-json\/wp\/v2\/pages\/2474","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.elst.okayama-u.ac.jp\/en\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/www.elst.okayama-u.ac.jp\/en\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/www.elst.okayama-u.ac.jp\/en\/wp-json\/wp\/v2\/users\/5"}],"replies":[{"embeddable":true,"href":"https:\/\/www.elst.okayama-u.ac.jp\/en\/wp-json\/wp\/v2\/comments?post=2474"}],"version-history":[{"count":11,"href":"https:\/\/www.elst.okayama-u.ac.jp\/en\/wp-json\/wp\/v2\/pages\/2474\/revisions"}],"predecessor-version":[{"id":3147,"href":"https:\/\/www.elst.okayama-u.ac.jp\/en\/wp-json\/wp\/v2\/pages\/2474\/revisions\/3147"}],"up":[{"embeddable":true,"href":"https:\/\/www.elst.okayama-u.ac.jp\/en\/wp-json\/wp\/v2\/pages\/140"}],"wp:attachment":[{"href":"https:\/\/www.elst.okayama-u.ac.jp\/en\/wp-json\/wp\/v2\/media?parent=2474"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}