{"created":"2023-07-25T10:24:28.126673+00:00","id":1782,"links":{},"metadata":{"_buckets":{"deposit":"9220ae64-9dc0-420e-bb44-48a8d29fa231"},"_deposit":{"created_by":1,"id":"1782","owners":[1],"pid":{"revision_id":0,"type":"depid","value":"1782"},"status":"published"},"_oai":{"id":"oai:hiroshima-cu.repo.nii.ac.jp:00001782","sets":["54:383:402"]},"author_link":["10266","10267","10268","10270","10271","10269"],"item_3_biblio_info_7":{"attribute_name":"書誌情報","attribute_value_mlt":[{"bibliographicIssueDates":{"bibliographicIssueDate":"2006-11-28","bibliographicIssueDateType":"Issued"},"bibliographicIssueNumber":"127","bibliographicPageEnd":"24","bibliographicPageStart":"19","bibliographicVolumeNumber":"2006","bibliographic_titles":[{"bibliographic_title":"情報処理学会研究報告. 計算機アーキテクチャ研究会報告"}]}]},"item_3_description_19":{"attribute_name":"フォーマット","attribute_value_mlt":[{"subitem_description":"application/pdf","subitem_description_type":"Other"}]},"item_3_description_5":{"attribute_name":"抄録","attribute_value_mlt":[{"subitem_description":"近年,プログラムを暗号化し,復号をプロセッサチップ内で行うことで,プログラムをリバースエンジニアリングから保護する機能を持ったセキュアプロセッサが各種研究されている.その中で,我々は暗号化されたプログラムとそれを復号する鍵との対応付けに,仮想記憶の枠組みを利用したプログラム保護システムを提案している.これまでの評価では,提案システムにおける公開鍵暗号ハードウェアの評価が含まれていなかった.そこで本稿では,RSA暗号を用いた公開鍵暗号ハードウェアを設計し,提案システムをプロセッサチップに搭載した際の評価を行なった.その結果,提案システムを搭載する前と比べて,約29%の面積増加でおさまることがわかった. ","subitem_description_type":"Abstract"},{"subitem_description":"Recently, the secure processor has been researched actively. It protects the program from reverse engineering by encrypting programs and decrypting it inside the processor. We propose the program protection system which has the mechanism of correspondence between the program and the decryption key using virtual memory system. In the former evaluation, the public key cryptosystem hardware was not included. Therefore, we designed RSA decryption unit and evaluated the proposal program protection system including RSA decryption unit. As a result, the amount of all area increased by about 29% compared with a processor without the proposed protection system.","subitem_description_type":"Abstract"}]},"item_3_publisher_8":{"attribute_name":"出版者","attribute_value_mlt":[{"subitem_publisher":"情報処理学会"}]},"item_3_relation_12":{"attribute_name":"論文ID(NAID)","attribute_value_mlt":[{"subitem_relation_type":"isIdenticalTo","subitem_relation_type_id":{"subitem_relation_type_id_text":"110005717698","subitem_relation_type_select":"NAID"}}]},"item_3_relation_17":{"attribute_name":"関連サイト","attribute_value_mlt":[{"subitem_relation_name":[{"subitem_relation_name_text":"http://www.ipsj.or.jp/"}],"subitem_relation_type_id":{"subitem_relation_type_id_text":"http://www.ipsj.or.jp/","subitem_relation_type_select":"URI"}}]},"item_3_rights_15":{"attribute_name":"権利","attribute_value_mlt":[{"subitem_rights":"ここに掲載した著作物の利用に関する注意:本著作物の著作権は(社)情報処理学会に帰属します。本著作物は著作権者である情報処理学会の許可のもとに掲載するものです。ご利用に当たっては「著作権法」ならびに「情報処理学会倫理綱領」に従うことをお願いいたします。 "},{"subitem_rights":"The copyright of this material is retained by the Information Processing Society of Japan (IPSJ). This material is published on this web site with the agreement of the author (s) and the IPSJ. Please be complied with Copyright Law of Japan and the Code of Ethics of the IPSJ if any users wish to reproduce, make derivative work, distribute or make available to the public any part or whole thereof. All Rights Reserved, Copyright (C) Information Processing Society of Japan."}]},"item_3_source_id_11":{"attribute_name":"書誌レコードID","attribute_value_mlt":[{"subitem_source_identifier":"AN10096105","subitem_source_identifier_type":"NCID"}]},"item_3_source_id_9":{"attribute_name":"ISSN","attribute_value_mlt":[{"subitem_source_identifier":"0919-6072","subitem_source_identifier_type":"ISSN"}]},"item_3_version_type_20":{"attribute_name":"著者版フラグ","attribute_value_mlt":[{"subitem_version_resource":"http://purl.org/coar/version/c_970fb48d4fbd8a85","subitem_version_type":"VoR"}]},"item_creator":{"attribute_name":"著者","attribute_type":"creator","attribute_value_mlt":[{"creatorNames":[{"creatorName":"酒井, 智也"},{"creatorName":"サカイ, トモヤ","creatorNameLang":"ja-Kana"}],"nameIdentifiers":[{"nameIdentifier":"10266","nameIdentifierScheme":"WEKO"}]},{"creatorNames":[{"creatorName":"田端, 猛一"},{"creatorName":"タバタ, タケカズ","creatorNameLang":"ja-Kana"}],"nameIdentifiers":[{"nameIdentifier":"10267","nameIdentifierScheme":"WEKO"}]},{"creatorNames":[{"creatorName":"北村, 俊明"},{"creatorName":"キタムラ, トシアキ","creatorNameLang":"ja-Kana"}],"nameIdentifiers":[{"nameIdentifier":"10268","nameIdentifierScheme":"WEKO"}]},{"creatorNames":[{"creatorName":"SAKAI, Tomoya","creatorNameLang":"en"}],"nameIdentifiers":[{"nameIdentifier":"10269","nameIdentifierScheme":"WEKO"}]},{"creatorNames":[{"creatorName":"TABATA, Takekazu","creatorNameLang":"en"}],"nameIdentifiers":[{"nameIdentifier":"10270","nameIdentifierScheme":"WEKO"}]},{"creatorNames":[{"creatorName":"KITAMURA, Toshiaki","creatorNameLang":"en"}],"nameIdentifiers":[{"nameIdentifier":"10271","nameIdentifierScheme":"WEKO"}]}]},"item_files":{"attribute_name":"ファイル情報","attribute_type":"file","attribute_value_mlt":[{"accessrole":"open_date","date":[{"dateType":"Available","dateValue":"2023-05-26"}],"displaytype":"detail","filename":"IPSJ-ARC06170004.pdf","filesize":[{"value":"887.9 kB"}],"format":"application/pdf","licensetype":"license_note","mimetype":"application/pdf","url":{"label":"IPSJ-ARC06170004.pdf","url":"https://hiroshima-cu.repo.nii.ac.jp/record/1782/files/IPSJ-ARC06170004.pdf"},"version_id":"8baa31c8-aba5-4de0-aa56-bd6e5cff6bef"}]},"item_language":{"attribute_name":"言語","attribute_value_mlt":[{"subitem_language":"jpn"}]},"item_resource_type":{"attribute_name":"資源タイプ","attribute_value_mlt":[{"resourcetype":"technical report","resourceuri":"http://purl.org/coar/resource_type/c_18gh"}]},"item_title":"プログラム保護を行うプロセッサの公開鍵暗号ハードウェアの評価","item_titles":{"attribute_name":"タイトル","attribute_value_mlt":[{"subitem_title":"プログラム保護を行うプロセッサの公開鍵暗号ハードウェアの評価"},{"subitem_title":"Evaluation of Public Key Cryptosystem Hardware of Processor that has Program Protection Feature","subitem_title_language":"en"}]},"item_type_id":"3","owner":"1","path":["402"],"pubdate":{"attribute_name":"公開日","attribute_value":"2023-05-26"},"publish_date":"2023-05-26","publish_status":"0","recid":"1782","relation_version_is_last":true,"title":["プログラム保護を行うプロセッサの公開鍵暗号ハードウェアの評価"],"weko_creator_id":"1","weko_shared_id":1},"updated":"2023-07-25T10:38:24.920668+00:00"}