Network


Latest external collaboration on country level. Dive into details by clicking on the dots.

Hotspot


Dive into the research topics where Hiroto Kagotani is active.

Publication


Featured researches published by Hiroto Kagotani.


field-programmable custom computing machines | 2003

Asynchronous PipeRench: architecture and performance evaluations

Hiroto Kagotani; Herman Schmit

PipeRench is a configurable architecture that has the unique ability to virtualize an application using dynamic reconfiguration. This paper investigates the potential benefits and costs of implementing this architecture using an asynchronous methodology. Since clock distribution and gating are relatively easy in the synchronous PipeRench, we focus on the benefit due to decreased timing pessimism in an asynchronous implementation. Two architectures for fully asynchronous implementation are considered. PE-based asynchronous implementation yields approximately 80% improvement in performance per stripe. This implementation, however, requires significant increases in configuration storage and wire count. A few particular features of the architecture, such as the crossbar interconnect structure within the stripe, are primarily responsible for this growth in configuration bits and wires. These features, however, are the primary aspects of the PipeRench architecture that make it a good compilation target.


international symposium on electromagnetic compatibility | 2014

Investigation in burst pulse injection method for fault based cryptanalysis

Kengo Iokibe; Kazuhiro Maeshima; Hiroto Kagotani; Yasuyuki Nogami; Yoshitaka Toyota; Tetsushi Watanabe

This paper investigated about introduction of the burst pulse injection method standardized for immunity tests to a cryptanalysis using faulty ciphertexts. We investigated the potential of the burst injection method to induce faulty ciphertexts experimentally. Firstly, the standard burst pulse was injected through the power cable to a cryptographic module implementing the Advanced Encryption Standard (AES) on a field programmable gate array (FPGA). As a result, it was confirmed that the burst pulse injection might cause clock glitches on the module. Secondly, the clock glitch was varied in magnitude and timing by use of two pulse generators and transmitted to the AES circuit to clarify what types of clock glitch induce critical faulty ciphertexts suited for recovering the crypto-key successfully. Results confirmed that the clock glitch had potential to induce faulty ciphertexts when it exceeded the threshold and produced a clock interval shorter than the critical path delay in the target round. The two experimental results suggested that burst pulse injection to cryptographic modules through their power cables is a possible scenario of fault analysis attacks.


asia and south pacific design automation conference | 2001

Synthesis of four-phase asynchronous control circuits from pipeline dependency graphs

Hiroto Kagotani; Takuji Okamoto; Takashi Nanya

We propose a method of synthesizing pipeline controllers as four-phase asynchronous circuits from specifications described as two-phase dependency graphs. Pipeline two-phase dependency graphs are transformed into four-phase ones by applying a transformation rule to each simple loop in the graphs. Four-phase dependency graphs are easily mapped onto four-phase asynchronous control circuits. We also discuss some simplification of four-phase dependency graphs.


Systems and Computers in Japan | 2000

A method of affine transformation for rectangular video image

Hiroto Kagotani; Yoichiro Sato; Yoshimichi Takahara; Takuji Okamoto

This paper proposes the 1-affine transformation for rectangular video images. In the proposed method, each frame of the input rectangular video images is partitioned into small square subimages, which are stored separately in memory. Then, by applying the 90° rotation and the one-dimensional geometrical transformations alternately for two times each, the affine transformation is realized. The affine transformer based on this principle is realized by two kinds of functional modules corresponding to the 90° rotation and the one-dimensional geometrical transformation, respectively. The block diagram for the affine transformation is shown combining those functional modules. Calculation of the adequate size for the subimage, as well as the reduction of the memory speed requirement by the partitioning, are discussed. The proposed method can easily be applied to video images with different sizes only by modifying the combination of the two kinds of functional modules.


international symposium on electromagnetic compatibility | 2014

Analysis on equivalent current source of AES-128 circuit for HD power model verification

Kengo Iokibe; Kazuhiro Maeshima; Hiroto Kagotani; Yasuyuki Nogami; Yoshitaka Toyota; Tetsushi Watanabe


Systems and Computers in Japan | 2004

Model analysis of coronary hemodynamics incorporating autoregulation

Mitsuyasu Kagiyama; Hiroyuki Michinishi; Hiroto Kagotani; Takuji Okamoto; Yasuo Ogasawara; Fumihiko Kajiya


Transactions of the Institute of electronics, information and communication engineers | 1998

Systematic Reducing of Metastable Operation Occurred in CMOS D Flip-Flops

Yoichiro Sato; Yoshinobu Yamasoto; Masanori Saito; Hiroto Kagotani; Takuji Okamoto; Masahiro Kawai


The IEICE transactions on information and systems | 2017

An Efficient Algorithm to Determine Equivalence of Pipelined Dependency Graphs for Their Simplification

Hiroto Kagotani; Yuji Sugiyama; Takuji Okamoto


Ieej Transactions on Fundamentals and Materials | 2016

Analysis of side-channel information leaking behavior in cryptographic circuit using internal current source

Kengo Iokibe; Nobuhiro Tai; Hiroto Kagotani; Hiroyuki Onishi; Yoshitaka Toyota; Tetsushi Watanabe


IEICE Transactions on Information and Systems | 2016

FPGA implementation of various elliptic curve pairings over odd characteristic field with non supersingular curves

Yasuyuki Nogami; Hiroto Kagotani; Kengo Iokibe; Hiroyuki Miyatake; Takashi Narita

Collaboration


Dive into the Hiroto Kagotani's collaboration.

Top Co-Authors

Avatar
Top Co-Authors

Avatar

Yoichiro Sato

Okayama Prefectural University

View shared research outputs
Top Co-Authors

Avatar
Top Co-Authors

Avatar

Masahiro Kawai

Tsuyama National College of Technology

View shared research outputs
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Researchain Logo
Decentralizing Knowledge