Network


Latest external collaboration on country level. Dive into details by clicking on the dots.

Hotspot


Dive into the research topics where Arimitsu Shikoda is active.

Publication


Featured researches published by Arimitsu Shikoda.


IEEE Transactions on Magnetics | 2011

Magnetic Actuator Group of Globular Type Capable of Free Movement in a Complex Pipe

Hiroyuki Yaguchi; Noriaki Sato; Arimitsu Shikoda

Finding damage inside pipes is important for the inspection of complex pipes used in nuclear power plants and chemical plants. A number of studies have investigated the mechanisms of an actuator with an electric cable to provide locomotion through various devices in complex pipes. An in-pipe robot capable of movement in narrow complex pipes has not yet been developed. In the present paper, we propose a globular magnetic actuator group that exhibits a very high thrust force and is capable of free reversible motion in complex pipes. Two actuators of the same size and characteristics are coupled by the magnetic connection method, which generates almost no mechanical loss. The globular magnetic actuator group capable of reversible motion through elongation and contraction of eight shape-memory-alloy (SMA) coils was fabricated. Experimental results indicate that the prototype actuator group is able to climb at a rate of 29 mm/s in a straight pipe while pulling a load mass of 48 g.


IEICE Electronics Express | 2011

Development and evaluation of a microstep DFA vulnerability estimation method

Masahiro Kaminaga; Arimitsu Shikoda; Hideki Yoshikawa

Recently, various studies of attack methods of round reduction differential fault analysis (DFA) using fault injection in block cipher-implemented microcontrollers have been reported. However, few studies have focused on the quantitative evaluation method of round reduction DFA vulnerability using detailed fault injection timing dependency of attack success rate. This is required to improve microcontroller security. Hence, we propose a quantitative evaluation method against round reduction DFA using a micro step DFA vulnerability chart and a vulnerability estimator (VE) that consists of pairs of fault injection timing and attack success rate.


international congress on mathematical software | 2006

KNOPPIX/Math: portable and distributable collection of mathematical software and free documents

Tatsuyoshi Hamada; Kuniyasu Suzaki; Kengo Iijima; Arimitsu Shikoda

We propose a new computer environment for mathematicians that can be set up easily and quickly.


ieee global conference on consumer electronics | 2013

Round addition DFA for microcontroller implemented the triple DES

Hideki Yoshikawa; Masahiro Kaminaga; Arimitsu Shikoda; Toshinori Suzuki

This article presents a method of round addition attack on triple DES block ciphers using differential fault analysis(DFA). For single DES, the secret key can be easily extracted using one correct ciphertext and two faulty ciphertexts. Even for triple DES, it is shown that the secret key can also extracted, similarly to single DES.


IEEE Transactions on Dependable and Secure Computing | 2016

Crashing Modulus Attack on Modular Squaring for Rabin Cryptosystem

Masahiro Kaminaga; Hideki Yoshikawa; Arimitsu Shikoda; Toshinori Suzuki

The Rabin cryptosystem has been proposed protect the unique ID (UID) in radio-frequency identification tags. The Rabin cryptosystem is a type of lightweight public key system that is theoretically quite secure; however it is vulnerable to several side-channel attacks. In this paper, a crashing modulus attack is presented as a new fault attack on modular squaring during Rabin encryption. This attack requires only one fault in the public key if its perturbed public key can be factored. Our simulation results indicate that the attack is more than 50 percent successful with several faults in practical time. A complicated situation arises when reconstructing the message, including the UID, from ciphertext, i.e., the message and the perturbed public key are not relatively prime. We present a complete and mathematically rigorous message reconstruction algorithm for such a case. Moreover, we propose an exact formula to obtain a number of candidate messages. We show that the number is not generally equal to a power of two.


Archive | 2009

Effect of visual image features on neural activities: An fMRI study

Kazuo Kato; Osamu Miura; Arimitsu Shikoda; K. Sugawara; Tomohiro Kuroki; Atsuo Ishikawa; Tetsuo Kobayashi

There are various elements in visual images, such as luminance, edge, color, movement, and shape, that may affect mental activity. In an attempt to explore the neural processes associated with image features, we extracted the edge and spatial frequency characteristics from images of two movies having completely differential features. Using the fMRI technique, we measured the effects of the movies on the physiology of subjects viewing them. It was found that an outdoor movie contains higher-frequency components than an indoor movie. Further, the outdoor movie activates the frontal regions, and this may affect higher-order brain functions such as display of emotions and conscious awareness.


IEICE Transactions on Information and Systems | 2013

Round Addition Using Faults for Generalized Feistel Network

Hideki Yoshikawa; Masahiro Kaminaga; Arimitsu Shikoda


Ieej Transactions on Electronics, Information and Systems | 2011

Characteristics of Image Properties Inducing Eye Movement

Kazuo Kato; Arimitsu Shikoda; Megumi Nishida; Tomohiro Kuroki; Atsuo Ishikawa; Tetsuo Kobayashi


IEICE Transactions on Information and Systems | 2013

Round Addition DFA on 80-bit Piccolo and TWINE

Hideki Yoshikawa; Masahiro Kaminaga; Arimitsu Shikoda; Toshinori Suzuki


information technology based higher education and training | 2005

A practicable educational contents sharing system utilizing Knoppix Edu Series the 1 CD bootable Linux teaching tools

Arimitsu Shikoda; Takashi Ono; Masaaki Kumagai; Masami Ishikawa; Daisaku Chiba; Kuniyasu Suzaki; Kenichi Kato; Tatsuyoshi Hamada

Collaboration


Dive into the Arimitsu Shikoda's collaboration.

Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar

Kazuo Kato

Tohoku Gakuin University

View shared research outputs
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar

Kuniyasu Suzaki

National Institute of Advanced Industrial Science and Technology

View shared research outputs
Top Co-Authors

Avatar

Noriaki Sato

Tohoku Gakuin University

View shared research outputs
Researchain Logo
Decentralizing Knowledge