Остановите войну!
for scientists:
default search action
Kazuo Ohta
- > Home > Persons > Kazuo Ohta
Publications
- 2020
- [c117]Tomoki Uemura, Yohei Watanabe, Yang Li, Noriyuki Miura, Mitsugu Iwamoto, Kazuo Sakiyama, Kazuo Ohta:
A Key Recovery Algorithm Using Random Key Leakage from AES Key Schedule. ISITA 2020: 382-386 - 2015
- [j47]Sho Endo, Yang Li, Naofumi Homma, Kazuo Sakiyama, Kazuo Ohta, Daisuke Fujimoto, Makoto Nagata, Toshihiro Katashita, Jean-Luc Danger, Takafumi Aoki:
A Silicon-Level Countermeasure Against Fault Sensitivity Analysis and Its Evaluation. IEEE Trans. Very Large Scale Integr. Syst. 23(8): 1429-1438 (2015) - 2014
- [j46]Christophe Clavier, Jean-Luc Danger, Guillaume Duc, M. Abdelaziz Elaabid, Benoît Gérard, Sylvain Guilley, Annelie Heuser, Michael Kasper, Yang Li, Victor Lomné, Daisuke Nakatsu, Kazuo Ohta, Kazuo Sakiyama, Laurent Sauvage, Werner Schindler, Marc Stöttinger, Nicolas Veyrat-Charvillon, Matthieu Walle, Antoine Wurcker:
Practical improvements of side-channel attacks on AES: feedback from the 2nd DPA contest. J. Cryptogr. Eng. 4(4): 259-274 (2014) - [j45]Kazuo Sakiyama, Yang Li, Shigeto Gomisawa, Yu-ichi Hayashi, Mitsugu Iwamoto, Naofumi Homma, Takafumi Aoki, Kazuo Ohta:
Practical DFA Strategy for AES Under Limited-access Conditions. J. Inf. Process. 22(2): 142-151 (2014) - [c101]Yang Li, Shugo Mikami, Dai Watanabe, Kazuo Ohta, Kazuo Sakiyama:
Single-Chip Implementation and Evaluation of Passive UHF RFID Tag with Hash-Based Mutual Authentication. RFIDSec Asia 2014: 3-15 - 2013
- [j43]Yang Li, Kazuo Ohta, Kazuo Sakiyama:
A New Type of Fault-Based Attack: Fault Behavior Analysis. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 96-A(1): 177-184 (2013) - [c99]Yang Li, Sho Endo, Nicolas Debande, Naofumi Homma, Takafumi Aoki, Thanh-Ha Le, Jean-Luc Danger, Kazuo Ohta, Kazuo Sakiyama:
Exploring the Relations between Fault Sensitivity and Power Consumption. COSADE 2013: 137-153 - [c98]Yang Li, Yu-ichi Hayashi, Arisa Matsubara, Naofumi Homma, Takafumi Aoki, Kazuo Ohta, Kazuo Sakiyama:
Yet Another Fault-Based Leakage in Non-uniform Faulty Ciphertexts. FPS 2013: 272-287 - 2012
- [j40]Yang Li, Kazuo Ohta, Kazuo Sakiyama:
Toward Effective Countermeasures against an Improved Fault Sensitivity Analysis. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 95-A(1): 234-241 (2012) - [j39]Yang Li, Kazuo Ohta, Kazuo Sakiyama:
New Fault-Based Side-Channel Attack Using Fault Sensitivity. IEEE Trans. Inf. Forensics Secur. 7(1): 88-97 (2012) - [j38]Kazuo Sakiyama, Yang Li, Mitsugu Iwamoto, Kazuo Ohta:
Information-Theoretic Approach to Optimal Differential Fault Analysis. IEEE Trans. Inf. Forensics Secur. 7(1): 109-120 (2012) - [c95]Yang Li, Kazuo Ohta, Kazuo Sakiyama:
An Extension of Fault Sensitivity Analysis Based on Clockwise Collision. Inscrypt 2012: 46-59 - [c94]Sho Endo, Yang Li, Naofumi Homma, Kazuo Sakiyama, Kazuo Ohta, Takafumi Aoki:
An Efficient Countermeasure against Fault Sensitivity Analysis Using Configurable Delay Blocks. FDTC 2012: 95-102 - [c93]Toshiki Nakasone, Yang Li, Yu Sasaki, Mitsugu Iwamoto, Kazuo Ohta, Kazuo Sakiyama:
Key-Dependent Weakness of AES-Based Ciphers under Clockwise Collision Distinguisher. ICISC 2012: 395-409 - [p1]Junko Takahashi, Toshinori Fukunaga, Shigeto Gomisawa, Yang Li, Kazuo Sakiyama, Kazuo Ohta:
Fault Injection and Key Retrieval Experiments on an Evaluation Board. Fault Analysis in Cryptography 2012: 313-331 - 2011
- [j34]Yang Li, Kazuo Sakiyama, Shin-ichi Kawamura, Kazuo Ohta:
Power Analysis against a DPA-Resistant S-Box Implementation Based on the Fourier Transform. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 94-A(1): 191-199 (2011) - [c87]Amir Moradi, Oliver Mischke, Christof Paar, Yang Li, Kazuo Ohta, Kazuo Sakiyama:
On the Power of Fault Sensitivity Analysis and Collision Side-Channel Attacks in a Combined Setting. CHES 2011: 292-311 - [c83]Hikaru Sakamoto, Yang Li, Kazuo Ohta, Kazuo Sakiyama:
Fault Sensitivity Analysis Against Elliptic Curve Cryptosystems. FDTC 2011: 11-20 - [c82]Yang Li, Kazuo Ohta, Kazuo Sakiyama:
Revisit fault sensitivity analysis on WDDL-AES. HOST 2011: 148-153 - [i14]Yang Li, Daisuke Nakatsu, Qi Li, Kazuo Ohta, Kazuo Sakiyama:
Clockwise Collision Analysis - Overlooked Side-Channel Leakage Inside Your Measurements. IACR Cryptol. ePrint Arch. 2011: 579 (2011) - 2010
- [c76]Yu Sasaki, Yang Li, Lei Wang, Kazuo Sakiyama, Kazuo Ohta:
Non-full-active Super-Sbox Analysis: Applications to ECHO and Grøstl. ASIACRYPT 2010: 38-55 - [c75]Yang Li, Kazuo Sakiyama, Shigeto Gomisawa, Toshinori Fukunaga, Junko Takahashi, Kazuo Ohta:
Fault Sensitivity Analysis. CHES 2010: 320-334 - [c71]Yang Li, Kazuo Sakiyama, Lejla Batina, Daisuke Nakatsu, Kazuo Ohta:
Power Variance Analysis breaks a masked ASIC implementation of AES. DATE 2010: 1059-1064 - [c64]Daisuke Nakatsu, Yang Li, Kazuo Sakiyama, Kazuo Ohta:
Combination of SW Countermeasure and CPU Modification on FPGA against Power Analysis. WISA 2010: 258-272 - [i12]Yang Li, Shigeto Gomisawa, Kazuo Sakiyama, Kazuo Ohta:
An Information Theoretic Perspective on the Differential Fault Analysis against AES. IACR Cryptol. ePrint Arch. 2010: 32 (2010) - [i11]Shigeto Gomisawa, Yang Li, Junko Takahashi, Toshinori Fukunaga, Yu Sasaki, Kazuo Sakiyama, Kazuo Ohta:
Efficient Differential Fault Analysis for AES. IACR Cryptol. ePrint Arch. 2010: 336 (2010) - 2009
- [c58]Yang Li, Kazuo Sakiyama, Shin-ichi Kawamura, Yuichi Komano, Kazuo Ohta:
Security Evaluation of a DPA-Resistant S-Box Based on the Fourier Transform. ICICS 2009: 3-16
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-04-25 02:10 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint