Stop the war!
Остановите войну!
for scientists:
default search action
BibTeX records: Kazuo Sakiyama
@article{DBLP:journals/tches/HirataMALMNS24, author = {Haruka Hirata and Daiki Miyahara and Victor Arribas and Yang Li and Noriyuki Miura and Svetla Nikova and Kazuo Sakiyama}, title = {All You Need Is Fault: Zero-Value Attacks on {AES} and a New {\(\lambda\)}-Detection M{\&}M}, journal = {{IACR} Trans. Cryptogr. Hardw. Embed. Syst.}, volume = {2024}, number = {1}, pages = {133--156}, year = {2024}, url = {https://doi.org/10.46586/tches.v2024.i1.133-156}, doi = {10.46586/TCHES.V2024.I1.133-156}, timestamp = {Tue, 02 Jan 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tches/HirataMALMNS24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jip/HiraKMHLS23, author = {Ryota Hira and Tomoaki Kitahara and Daiki Miyahara and Yuko Hara{-}Azumi and Yang Li and Kazuo Sakiyama}, title = {Software Evaluation for Second Round Candidates in {NIST} Lightweight Cryptography}, journal = {J. Inf. Process.}, volume = {31}, pages = {205--219}, year = {2023}, url = {https://doi.org/10.2197/ipsjjip.31.205}, doi = {10.2197/IPSJJIP.31.205}, timestamp = {Thu, 20 Apr 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jip/HiraKMHLS23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tecs/InagakiYLSH23, author = {Saya Inagaki and Mingyu Yang and Yang Li and Kazuo Sakiyama and Yuko Hara{-}Azumi}, title = {Power Side-channel Attack Resistant Circuit Designs of {ARX} Ciphers Using High-level Synthesis}, journal = {{ACM} Trans. Embed. Comput. Syst.}, volume = {22}, number = {5}, pages = {85:1--85:17}, year = {2023}, url = {https://doi.org/10.1145/3609507}, doi = {10.1145/3609507}, timestamp = {Fri, 27 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tecs/InagakiYLSH23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/candar/KasuyaMYS23, author = {Momoka Kasuya and Nobuyoshi Morita and Hiroki Yamazaki and Kazuo Sakiyama}, title = {Automated Extraction for Vulnerability Management on {PSIRT:} {A} Case Study of Automotive Industry}, booktitle = {Eleventh International Symposium on Computing and Networking, {CANDAR} 2023 - Workshops, Matsue, Japan, November 27-30, 2023}, pages = {232--238}, publisher = {{IEEE}}, year = {2023}, url = {https://doi.org/10.1109/CANDARW60564.2023.00046}, doi = {10.1109/CANDARW60564.2023.00046}, timestamp = {Thu, 22 Feb 2024 20:44:52 +0100}, biburl = {https://dblp.org/rec/conf/candar/KasuyaMYS23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/candar/TsukaharaHYMLHS23, author = {Maki Tsukahara and Haruka Hirata and Mingyu Yang and Daiki Miyahara and Yang Li and Yuko Hara{-}Azumi and Kazuo Sakiyama}, title = {On the Practical Dependency of Fresh Randomness in {AES} S-box with Second-Order {TI}}, booktitle = {Eleventh International Symposium on Computing and Networking, {CANDAR} 2023 - Workshops, Matsue, Japan, November 27-30, 2023}, pages = {286--291}, publisher = {{IEEE}}, year = {2023}, url = {https://doi.org/10.1109/CANDARW60564.2023.00054}, doi = {10.1109/CANDARW60564.2023.00054}, timestamp = {Thu, 22 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/candar/TsukaharaHYMLHS23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fpga/InagakiYLSH23, author = {Saya Inagaki and Mingyu Yang and Yang Li and Kazuo Sakiyama and Yuko Hara{-}Azumi}, editor = {Paolo Ienne and Zhiru Zhang}, title = {Power Side-channel Countermeasures for {ARX} Ciphers using High-level Synthesis}, booktitle = {Proceedings of the 2023 {ACM/SIGDA} International Symposium on Field Programmable Gate Arrays, {FPGA} 2023, Monterey, CA, USA, February 12-14, 2023}, pages = {52}, publisher = {{ACM}}, year = {2023}, url = {https://doi.org/10.1145/3543622.3573167}, doi = {10.1145/3543622.3573167}, timestamp = {Tue, 09 May 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/fpga/InagakiYLSH23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/MatsubaraMWIS23, author = {Yuiko Matsubara and Daiki Miyahara and Yohei Watanabe and Mitsugu Iwamoto and Kazuo Sakiyama}, title = {Abstraction Model of Probing and {DFA} Attacks on Block Ciphers}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {443}, year = {2023}, url = {https://eprint.iacr.org/2023/443}, timestamp = {Fri, 31 Mar 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/MatsubaraMWIS23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/HirataMALMNS23, author = {Haruka Hirata and Daiki Miyahara and Victor Arribas and Yang Li and Noriyuki Miura and Svetla Nikova and Kazuo Sakiyama}, title = {All You Need Is Fault: Zero-Value Attacks on {AES} and a New {\(\lambda\)}-Detection M{\&}M}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1129}, year = {2023}, url = {https://eprint.iacr.org/2023/1129}, timestamp = {Fri, 04 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/HirataMALMNS23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieiceta/TakamiSSL22, author = {Go Takami and Takeshi Sugawara and Kazuo Sakiyama and Yang Li}, title = {Mixture-Based 5-Round Physical Attack against {AES:} Attack Proposal and Noise Evaluation}, journal = {{IEICE} Trans. Fundam. Electron. Commun. Comput. Sci.}, volume = {105-A}, number = {3}, pages = {289--299}, year = {2022}, url = {https://doi.org/10.1587/transfun.2021cip0016}, doi = {10.1587/TRANSFUN.2021CIP0016}, timestamp = {Fri, 26 Aug 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ieiceta/TakamiSSL22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ic-nc/KitaharaHHMLS22, author = {Tomoaki Kitahara and Ryota Hira and Yuko Hara{-}Azumi and Daiki Miyahara and Yang Li and Kazuo Sakiyama}, title = {Optimized Software Implementations of Ascon, Grain-128AEAD, and TinyJambu on {ARM} Cortex-M0}, booktitle = {2022 Tenth International Symposium on Computing and Networking, {CANDAR} 2022 - Workshops, Himeji, Japan, November 21-24, 2022}, pages = {316--322}, publisher = {{IEEE}}, year = {2022}, url = {https://doi.org/10.1109/CANDARW57323.2022.00030}, doi = {10.1109/CANDARW57323.2022.00030}, timestamp = {Thu, 23 Mar 2023 08:30:32 +0100}, biburl = {https://dblp.org/rec/conf/ic-nc/KitaharaHHMLS22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isqed/InagakiYLSH22, author = {Saya Inagaki and Mingyu Yang and Yang Li and Kazuo Sakiyama and Yuko Hara{-}Azumi}, title = {Examining Vulnerability of HLS-designed Chaskey-12 Circuits to Power Side-Channel Attacks}, booktitle = {23rd International Symposium on Quality Electronic Design, {ISQED} 2022, Santa Clara, CA, USA, April 6-7, 2022}, pages = {1}, publisher = {{IEEE}}, year = {2022}, url = {https://doi.org/10.1109/ISQED54688.2022.9806252}, doi = {10.1109/ISQED54688.2022.9806252}, timestamp = {Tue, 21 Feb 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/isqed/InagakiYLSH22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secitc/KomanoIOS22, author = {Yuichi Komano and Mitsugu Iwamoto and Kazuo Ohta and Kazuo Sakiyama}, editor = {Giampaolo Bella and Mihai Doinea and Helge Janicke}, title = {Lightweight Authentication Using Noisy Key Derived from Physically Unclonable Function}, booktitle = {Innovative Security Solutions for Information Technology and Communications - 15th International Conference, SecITC 2022, Virtual Event, December 8-9, 2022, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {13809}, pages = {203--221}, publisher = {Springer}, year = {2022}, url = {https://doi.org/10.1007/978-3-031-32636-3\_12}, doi = {10.1007/978-3-031-32636-3\_12}, timestamp = {Fri, 02 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/secitc/KomanoIOS22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secitc/ShimanoSM22, author = {Masahisa Shimano and Kazuo Sakiyama and Daiki Miyahara}, editor = {Giampaolo Bella and Mihai Doinea and Helge Janicke}, title = {Towards Verifying Physical Assumption in Card-Based Cryptography}, booktitle = {Innovative Security Solutions for Information Technology and Communications - 15th International Conference, SecITC 2022, Virtual Event, December 8-9, 2022, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {13809}, pages = {289--305}, publisher = {Springer}, year = {2022}, url = {https://doi.org/10.1007/978-3-031-32636-3\_17}, doi = {10.1007/978-3-031-32636-3\_17}, timestamp = {Fri, 02 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/secitc/ShimanoSM22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/HiraKMHLS22, author = {Ryota Hira and Tomoaki Kitahara and Daiki Miyahara and Yuko Hara{-}Azumi and Yang Li and Kazuo Sakiyama}, title = {Software Evaluation for Second Round Candidates in {NIST} Lightweight Cryptography}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {591}, year = {2022}, url = {https://eprint.iacr.org/2022/591}, timestamp = {Mon, 20 Jun 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/HiraKMHLS22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/asianhost/KudoSSHL21, author = {Rei Kudo and Takeshi Sugawara and Kazuo Sakiyama and Yuko Hara{-}Azumi and Yang Li}, title = {Revisiting System Noise in Side-Channel Attacks: Mutual Assistant {SCA} vs. Genetic Algorithm}, booktitle = {Asian Hardware Oriented Security and Trust Symposium, AsianHOST 2021, Shanghai, China, December 16-18, 2021}, pages = {1--6}, publisher = {{IEEE}}, year = {2021}, url = {https://doi.org/10.1109/AsianHOST53231.2021.9699725}, doi = {10.1109/ASIANHOST53231.2021.9699725}, timestamp = {Fri, 26 Aug 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/asianhost/KudoSSHL21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iwdw/HsiaoTKSM21, author = {Annjhih Hsiao and Takao Takenouchi and Hiroaki Kikuchi and Kazuo Sakiyama and Noriyuki Miura}, editor = {Xianfeng Zhao and Alessandro Piva and Pedro Comesa{\~{n}}a Alfaro}, title = {More Accurate and Robust PRNU-Based Source Camera Identification with 3-Step 3-Class Approach}, booktitle = {Digital Forensics and Watermarking - 20th International Workshop, {IWDW} 2021, Beijing, China, November 20-22, 2021, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {13180}, pages = {87--101}, publisher = {Springer}, year = {2021}, url = {https://doi.org/10.1007/978-3-030-95398-0\_7}, doi = {10.1007/978-3-030-95398-0\_7}, timestamp = {Fri, 22 Apr 2022 14:23:22 +0200}, biburl = {https://dblp.org/rec/conf/iwdw/HsiaoTKSM21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/esl/SakiyamaFMM20, author = {Kazuo Sakiyama and Tatsuya Fujii and Kohei Matsuda and Noriyuki Miura}, title = {Flush Code Eraser: Fast Attack Response Invalidating Cryptographic Sensitive Data}, journal = {{IEEE} Embed. Syst. Lett.}, volume = {12}, number = {2}, pages = {37--40}, year = {2020}, url = {https://doi.org/10.1109/LES.2019.2949788}, doi = {10.1109/LES.2019.2949788}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/esl/SakiyamaFMM20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acns/TakatoiSS020, author = {Go Takatoi and Takeshi Sugawara and Kazuo Sakiyama and Yang Li}, editor = {Jianying Zhou and Mauro Conti and Chuadhry Mujeeb Ahmed and Man Ho Au and Lejla Batina and Zhou Li and Jingqiang Lin and Eleonora Losiouk and Bo Luo and Suryadipta Majumdar and Weizhi Meng and Mart{\'{\i}}n Ochoa and Stjepan Picek and Georgios Portokalidis and Cong Wang and Kehuan Zhang}, title = {Simple Electromagnetic Analysis Against Activation Functions of Deep Neural Networks}, booktitle = {Applied Cryptography and Network Security Workshops - {ACNS} 2020 Satellite Workshops, AIBlock, AIHWS, AIoTS, Cloud S{\&}P, SCI, SecMT, and SiMLA, Rome, Italy, October 19-22, 2020, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {12418}, pages = {181--197}, publisher = {Springer}, year = {2020}, url = {https://doi.org/10.1007/978-3-030-61638-0\_11}, doi = {10.1007/978-3-030-61638-0\_11}, timestamp = {Tue, 21 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acns/TakatoiSS020.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/gcce/TakakiLSNSS20, author = {Tsubasa Takaki and Yang Li and Kazuo Sakiyama and Shoei Nashimoto and Daisuke Suzuki and Takeshi Sugawara}, title = {An Optimized Implementation of {AES-GCM} for {FPGA} Acceleration Using High-Level Synthesis}, booktitle = {9th {IEEE} Global Conference on Consumer Electronics, {GCCE} 2020, Kobe, Japan, October 13-16, 2020}, pages = {176--180}, publisher = {{IEEE}}, year = {2020}, url = {https://doi.org/10.1109/GCCE50665.2020.9291973}, doi = {10.1109/GCCE50665.2020.9291973}, timestamp = {Tue, 21 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/gcce/TakakiLSNSS20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/gcce/YabuSS20, author = {Marika Yabu and Kazuo Sakiyama and Takeshi Sugawara}, title = {Low-Memory Implementation of Authenticated Encryption Algorithm {SAEAES} on {ARM} Cortex-M0 Microcontroller}, booktitle = {9th {IEEE} Global Conference on Consumer Electronics, {GCCE} 2020, Kobe, Japan, October 13-16, 2020}, pages = {181--185}, publisher = {{IEEE}}, year = {2020}, url = {https://doi.org/10.1109/GCCE50665.2020.9291948}, doi = {10.1109/GCCE50665.2020.9291948}, timestamp = {Tue, 21 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/gcce/YabuSS20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isita/UemuraWLMISO20, author = {Tomoki Uemura and Yohei Watanabe and Yang Li and Noriyuki Miura and Mitsugu Iwamoto and Kazuo Sakiyama and Kazuo Ohta}, title = {A Key Recovery Algorithm Using Random Key Leakage from {AES} Key Schedule}, booktitle = {International Symposium on Information Theory and Its Applications, {ISITA} 2020, Kapolei, HI, USA, October 24-27, 2020}, pages = {382--386}, publisher = {{IEEE}}, year = {2020}, url = {https://ieeexplore.ieee.org/document/9366106}, timestamp = {Fri, 17 Jun 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/isita/UemuraWLMISO20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/mj/SugawaraSSMMN19, author = {Takeshi Sugawara and Natsu Shoji and Kazuo Sakiyama and Kohei Matsuda and Noriyuki Miura and Makoto Nagata}, title = {Side-channel leakage from sensor-based countermeasures against fault injection attack}, journal = {Microelectron. J.}, volume = {90}, pages = {63--71}, year = {2019}, url = {https://doi.org/10.1016/j.mejo.2019.05.017}, doi = {10.1016/J.MEJO.2019.05.017}, timestamp = {Fri, 26 Aug 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/mj/SugawaraSSMMN19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/scn/KomanoOSIV19, author = {Yuichi Komano and Kazuo Ohta and Kazuo Sakiyama and Mitsugu Iwamoto and Ingrid Verbauwhede}, title = {Single-Round Pattern Matching Key Generation Using Physically Unclonable Function}, journal = {Secur. Commun. Networks}, volume = {2019}, pages = {1719585:1--1719585:13}, year = {2019}, url = {https://doi.org/10.1155/2019/1719585}, doi = {10.1155/2019/1719585}, timestamp = {Thu, 10 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/scn/KomanoOSIV19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccoms/ShojiSIS19, author = {Natsu Shoji and Takeshi Sugawara and Mitsugu Iwamoto and Kazuo Sakiyama}, title = {An Abstraction Model for 1-bit Probing Attack on Block Ciphers}, booktitle = {{IEEE} 4th International Conference on Computer and Communication Systems, {ICCCS} 2019, Singapore, February 23-25, 2019}, pages = {502--506}, publisher = {{IEEE}}, year = {2019}, url = {https://doi.org/10.1109/CCOMS.2019.8821754}, doi = {10.1109/CCOMS.2019.8821754}, timestamp = {Tue, 21 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccoms/ShojiSIS19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cisc/0001HTMMSS19, author = {Yang Li and Ryota Hatano and Sho Tada and Kohei Matsuda and Noriyuki Miura and Takeshi Sugawara and Kazuo Sakiyama}, editor = {Zhe Liu and Moti Yung}, title = {Side-Channel Leakage of Alarm Signal for a Bulk-Current-Based Laser Sensor}, booktitle = {Information Security and Cryptology - 15th International Conference, Inscrypt 2019, Nanjing, China, December 6-8, 2019, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {12020}, pages = {346--361}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-3-030-42921-8\_20}, doi = {10.1007/978-3-030-42921-8\_20}, timestamp = {Fri, 26 Aug 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cisc/0001HTMMSS19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fps/SugimotoHSS19, author = {Hakuei Sugimoto and Ryota Hatano and Natsu Shoji and Kazuo Sakiyama}, editor = {Abdelmalek Benzekri and Michel Barbeau and Guang Gong and Romain Laborde and Joaqu{\'{\i}}n Garc{\'{\i}}a{-}Alfaro}, title = {Validating the {DFA} Attack Resistance of {AES} (Short Paper)}, booktitle = {Foundations and Practice of Security - 12th International Symposium, {FPS} 2019, Toulouse, France, November 5-7, 2019, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {12056}, pages = {371--378}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-3-030-45371-8\_25}, doi = {10.1007/978-3-030-45371-8\_25}, timestamp = {Wed, 07 Dec 2022 23:10:28 +0100}, biburl = {https://dblp.org/rec/conf/fps/SugimotoHSS19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secitc/YashiroHKS19, author = {Risa Yashiro and Yohei Hori and Toshihiro Katashita and Kazuo Sakiyama}, editor = {Emil Simion and R{\'{e}}mi G{\'{e}}raud{-}Stewart}, title = {A Deep Learning Attack Countermeasure with Intentional Noise for a PUF-Based Authentication Scheme}, booktitle = {Innovative Security Solutions for Information Technology and Communications - 12th International Conference, SecITC 2019, Bucharest, Romania, November 14-15, 2019, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {12001}, pages = {78--94}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-3-030-41025-4\_6}, doi = {10.1007/978-3-030-41025-4\_6}, timestamp = {Fri, 06 Mar 2020 14:27:55 +0100}, biburl = {https://dblp.org/rec/conf/secitc/YashiroHKS19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieicet/YashiroSIS18, author = {Risa Yashiro and Takeshi Sugawara and Mitsugu Iwamoto and Kazuo Sakiyama}, title = {\emph{Q}-Class Authentication System for Double Arbiter {PUF}}, journal = {{IEICE} Trans. Fundam. Electron. Commun. Comput. Sci.}, volume = {101-A}, number = {1}, pages = {129--137}, year = {2018}, url = {https://doi.org/10.1587/transfun.E101.A.129}, doi = {10.1587/TRANSFUN.E101.A.129}, timestamp = {Fri, 26 Aug 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ieicet/YashiroSIS18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jssc/MatsudaFSSSHNM18, author = {Kohei Matsuda and Tatsuya Fujii and Natsu Shoji and Takeshi Sugawara and Kazuo Sakiyama and Yu{-}ichi Hayashi and Makoto Nagata and Noriyuki Miura}, title = {A 286 F\({}^{\mbox{2}}\)/Cell Distributed Bulk-Current Sensor and Secure Flush Code Eraser Against Laser Fault Injection Attack on Cryptographic Processor}, journal = {{IEEE} J. Solid State Circuits}, volume = {53}, number = {11}, pages = {3174--3182}, year = {2018}, url = {https://doi.org/10.1109/JSSC.2018.2869142}, doi = {10.1109/JSSC.2018.2869142}, timestamp = {Fri, 26 Aug 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jssc/MatsudaFSSSHNM18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/NashimotoSSS18, author = {Shoei Nashimoto and Daisuke Suzuki and Takeshi Sugawara and Kazuo Sakiyama}, editor = {Jong Kim and Gail{-}Joon Ahn and Seungjoo Kim and Yongdae Kim and Javier L{\'{o}}pez and Taesoo Kim}, title = {Sensor CON-Fusion: Defeating Kalman Filter in Signal Injection Attack}, booktitle = {Proceedings of the 2018 on Asia Conference on Computer and Communications Security, AsiaCCS 2018, Incheon, Republic of Korea, June 04-08, 2018}, pages = {511--524}, publisher = {{ACM}}, year = {2018}, url = {https://doi.org/10.1145/3196494.3196506}, doi = {10.1145/3196494.3196506}, timestamp = {Fri, 26 Aug 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ccs/NashimotoSSS18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/dsd/DangerYGMSSMN18, author = {Jean{-}Luc Danger and Risa Yashiro and Tarik Graba and Yves Mathieu and Abdelmalek Si{-}Merabet and Kazuo Sakiyama and Noriyuki Miura and Makoto Nagata}, editor = {Martin Novotn{\'{y}} and Nikos Konofaos and Amund Skavhaug}, title = {Analysis of Mixed {PUF-TRNG} Circuit Based on SR-Latches in {FD-SOI} Technology}, booktitle = {21st Euromicro Conference on Digital System Design, {DSD} 2018, Prague, Czech Republic, August 29-31, 2018}, pages = {508--515}, publisher = {{IEEE} Computer Society}, year = {2018}, url = {https://doi.org/10.1109/DSD.2018.00090}, doi = {10.1109/DSD.2018.00090}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/dsd/DangerYGMSSMN18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ic-nc/MatsumuraSS18, author = {Ryuga Matsumura and Takeshi Sugawara and Kazuo Sakiyama}, title = {A Secure LiDAR with AES-Based Side-Channel Fingerprinting}, booktitle = {Sixth International Symposium on Computing and Networking, {CANDAR} Workshops 2018, Takayama, Japan, November 27-30, 2018}, pages = {479--482}, publisher = {{IEEE} Computer Society}, year = {2018}, url = {https://doi.org/10.1109/CANDARW.2018.00092}, doi = {10.1109/CANDARW.2018.00092}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ic-nc/MatsumuraSS18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ispec/YuanLSSW18, author = {Zhiwei Yuan and Yang Li and Kazuo Sakiyama and Takeshi Sugawara and Jian Wang}, editor = {Chunhua Su and Hiroaki Kikuchi}, title = {Recovering Memory Access Sequence with Differential Flush+Reload Attack}, booktitle = {Information Security Practice and Experience - 14th International Conference, {ISPEC} 2018, Tokyo, Japan, September 25-27, 2018, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {11125}, pages = {424--439}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-319-99807-7\_26}, doi = {10.1007/978-3-319-99807-7\_26}, timestamp = {Tue, 21 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ispec/YuanLSSW18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isscc/MatsudaFSSSHNM18, author = {Kohei Matsuda and Tatsuya Fujii and Natsu Shoji and Takeshi Sugawara and Kazuo Sakiyama and Yu{-}ichi Hayashi and Makoto Nagata and Noriyuki Miura}, title = {A 286F\({}^{\mbox{2}}\)/cell distributed bulk-current sensor and secure flush code eraser against laser fault injection attack}, booktitle = {2018 {IEEE} International Solid-State Circuits Conference, {ISSCC} 2018, San Francisco, CA, USA, February 11-15, 2018}, pages = {352--354}, publisher = {{IEEE}}, year = {2018}, url = {https://doi.org/10.1109/ISSCC.2018.8310329}, doi = {10.1109/ISSCC.2018.8310329}, timestamp = {Fri, 26 Aug 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/isscc/MatsudaFSSSHNM18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieiceee/NagataFMHHS17, author = {Makoto Nagata and Daisuke Fujimoto and Noriyuki Miura and Naofumi Homma and Yu{-}ichi Hayashi and Kazuo Sakiyama}, title = {Protecting cryptographic integrated circuits with side-channel information}, journal = {{IEICE} Electron. Express}, volume = {14}, number = {2}, pages = {20162005}, year = {2017}, url = {https://doi.org/10.1587/elex.14.20162005}, doi = {10.1587/ELEX.14.20162005}, timestamp = {Fri, 12 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ieiceee/NagataFMHHS17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fdtc/SugawaraSSMMN17, author = {Takeshi Sugawara and Natsu Shoji and Kazuo Sakiyama and Kohei Matsuda and Noriyuki Miura and Makoto Nagata}, title = {Exploiting Bitflip Detector for Non-invasive Probing and its Application to Ineffective Fault Analysis}, booktitle = {2017 Workshop on Fault Diagnosis and Tolerance in Cryptography, {FDTC} 2017, Taipei, Taiwan, September 25, 2017}, pages = {49--56}, publisher = {{IEEE} Computer Society}, year = {2017}, url = {https://doi.org/10.1109/FDTC.2017.17}, doi = {10.1109/FDTC.2017.17}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/fdtc/SugawaraSSMMN17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisa/KasuyaS17, author = {Momoka Kasuya and Kazuo Sakiyama}, editor = {Brent ByungHoon Kang and Taesoo Kim}, title = {Improved {EM} Side-Channel Authentication Using Profile-Based {XOR} Model}, booktitle = {Information Security Applications - 18th International Conference, {WISA} 2017, Jeju Island, Korea, August 24-26, 2017, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {10763}, pages = {173--183}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-93563-8\_15}, doi = {10.1007/978-3-319-93563-8\_15}, timestamp = {Tue, 14 May 2019 10:00:35 +0200}, biburl = {https://dblp.org/rec/conf/wisa/KasuyaS17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisa/MiyamotoSS17, author = {Eito Miyamoto and Takeshi Sugawara and Kazuo Sakiyama}, editor = {Brent ByungHoon Kang and Taesoo Kim}, title = {Efficient Software Implementation of Modular Multiplication in Prime Fields on TI's {DSP} {TMS320C6678}}, booktitle = {Information Security Applications - 18th International Conference, {WISA} 2017, Jeju Island, Korea, August 24-26, 2017, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {10763}, pages = {261--273}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-93563-8\_22}, doi = {10.1007/978-3-319-93563-8\_22}, timestamp = {Tue, 21 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/wisa/MiyamotoSS17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/host/MatsudaMNHFS16, author = {Kohei Matsuda and Noriyuki Miura and Makoto Nagata and Yu{-}ichi Hayashi and Tatsuya Fujii and Kazuo Sakiyama}, title = {On-chip substrate-bounce monitoring for laser-fault countermeasure}, booktitle = {2016 {IEEE} Asian Hardware-Oriented Security and Trust, AsianHOST 2016, Yilan, Taiwan, December 19-20, 2016}, pages = {1--6}, publisher = {{IEEE} Computer Society}, year = {2016}, url = {https://doi.org/10.1109/AsianHOST.2016.7835565}, doi = {10.1109/ASIANHOST.2016.7835565}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/host/MatsudaMNHFS16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iwsec/YashiroMIS16, author = {Risa Yashiro and Takanori Machida and Mitsugu Iwamoto and Kazuo Sakiyama}, editor = {Kazuto Ogawa and Katsunari Yoshioka}, title = {Deep-Learning-Based Security Evaluation on Authentication Systems Using Arbiter {PUF} and Its Variants}, booktitle = {Advances in Information and Computer Security - 11th International Workshop on Security, {IWSEC} 2016, Tokyo, Japan, September 12-14, 2016, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {9836}, pages = {267--285}, publisher = {Springer}, year = {2016}, url = {https://doi.org/10.1007/978-3-319-44524-3\_16}, doi = {10.1007/978-3-319-44524-3\_16}, timestamp = {Tue, 14 May 2019 10:00:52 +0200}, biburl = {https://dblp.org/rec/conf/iwsec/YashiroMIS16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@book{DBLP:books/daglib/0036974, author = {Kazuo Sakiyama and Yu Sasaki and Yang Li}, title = {Security of Block Ciphers - From Algorithm Design to Hardware Implementation}, publisher = {Wiley}, year = {2015}, url = {http://eu.wiley.com/WileyCDA/WileyTitle/productCd-1118660013.html}, isbn = {978-1-118-66001-0}, timestamp = {Fri, 23 Jun 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/books/daglib/0036974.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jce/YamamotoSIOTIT15, author = {Dai Yamamoto and Kazuo Sakiyama and Mitsugu Iwamoto and Kazuo Ohta and Masahiko Takenaka and Kouichi Itoh and Naoya Torii}, title = {A new method for enhancing variety and maintaining reliability of {PUF} responses and its evaluation on ASICs}, journal = {J. Cryptogr. Eng.}, volume = {5}, number = {3}, pages = {187--199}, year = {2015}, url = {https://doi.org/10.1007/s13389-014-0091-9}, doi = {10.1007/S13389-014-0091-9}, timestamp = {Thu, 09 Jul 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jce/YamamotoSIOTIT15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tvlsi/EndoLHSOFNKDA15, author = {Sho Endo and Yang Li and Naofumi Homma and Kazuo Sakiyama and Kazuo Ohta and Daisuke Fujimoto and Makoto Nagata and Toshihiro Katashita and Jean{-}Luc Danger and Takafumi Aoki}, title = {A Silicon-Level Countermeasure Against Fault Sensitivity Analysis and Its Evaluation}, journal = {{IEEE} Trans. Very Large Scale Integr. Syst.}, volume = {23}, number = {8}, pages = {1429--1438}, year = {2015}, url = {https://doi.org/10.1109/TVLSI.2014.2339892}, doi = {10.1109/TVLSI.2014.2339892}, timestamp = {Wed, 11 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tvlsi/EndoLHSOFNKDA15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/aspdac/MachidaYIS15, author = {Takanori Machida and Dai Yamamoto and Mitsugu Iwamoto and Kazuo Sakiyama}, title = {Implementation of double arbiter {PUF} and its performance evaluation on {FPGA}}, booktitle = {The 20th Asia and South Pacific Design Automation Conference, {ASP-DAC} 2015, Chiba, Japan, January 19-22, 2015}, pages = {6--7}, publisher = {{IEEE}}, year = {2015}, url = {https://doi.org/10.1109/ASPDAC.2015.7058919}, doi = {10.1109/ASPDAC.2015.7058919}, timestamp = {Wed, 16 Oct 2019 14:14:52 +0200}, biburl = {https://dblp.org/rec/conf/aspdac/MachidaYIS15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iwsec/YagasakiS15, author = {Reina Yagasaki and Kazuo Sakiyama}, editor = {Keisuke Tanaka and Yuji Suga}, title = {Artifact-Metric-Based Authentication for Bottles of Wine (Short Paper)}, booktitle = {Advances in Information and Computer Security - 10th International Workshop on Security, {IWSEC} 2015, Nara, Japan, August 26-28, 2015, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {9241}, pages = {335--344}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-319-22425-1\_20}, doi = {10.1007/978-3-319-22425-1\_20}, timestamp = {Tue, 14 May 2019 10:00:52 +0200}, biburl = {https://dblp.org/rec/conf/iwsec/YagasakiS15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieicet/FujimotoMNHHAHKSLBBBD14, author = {Daisuke Fujimoto and Noriyuki Miura and Makoto Nagata and Yu{-}ichi Hayashi and Naofumi Homma and Takafumi Aoki and Yohei Hori and Toshihiro Katashita and Kazuo Sakiyama and Thanh{-}Ha Le and Julien Bringer and Pirouz Bazargan{-}Sabet and Shivam Bhasin and Jean{-}Luc Danger}, title = {Power Noise Measurements of Cryptographic {VLSI} Circuits Regarding Side-Channel Information Leakage}, journal = {{IEICE} Trans. Electron.}, volume = {97-C}, number = {4}, pages = {272--279}, year = {2014}, url = {https://doi.org/10.1587/transele.E97.C.272}, doi = {10.1587/TRANSELE.E97.C.272}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ieicet/FujimotoMNHHAHKSLBBBD14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jce/ClavierDDEGGHKLLNOSSSSVWW14, author = {Christophe Clavier and Jean{-}Luc Danger and Guillaume Duc and M. Abdelaziz Elaabid and Beno{\^{\i}}t G{\'{e}}rard and Sylvain Guilley and Annelie Heuser and Michael Kasper and Yang Li and Victor Lomn{\'{e}} and Daisuke Nakatsu and Kazuo Ohta and Kazuo Sakiyama and Laurent Sauvage and Werner Schindler and Marc St{\"{o}}ttinger and Nicolas Veyrat{-}Charvillon and Matthieu Walle and Antoine Wurcker}, title = {Practical improvements of side-channel attacks on {AES:} feedback from the 2nd {DPA} contest}, journal = {J. Cryptogr. Eng.}, volume = {4}, number = {4}, pages = {259--274}, year = {2014}, url = {https://doi.org/10.1007/s13389-014-0075-9}, doi = {10.1007/S13389-014-0075-9}, timestamp = {Thu, 23 Jun 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jce/ClavierDDEGGHKLLNOSSSSVWW14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jip/SakiyamaLGHIHAO14, author = {Kazuo Sakiyama and Yang Li and Shigeto Gomisawa and Yu{-}ichi Hayashi and Mitsugu Iwamoto and Naofumi Homma and Takafumi Aoki and Kazuo Ohta}, title = {Practical {DFA} Strategy for {AES} Under Limited-access Conditions}, journal = {J. Inf. Process.}, volume = {22}, number = {2}, pages = {142--151}, year = {2014}, url = {https://doi.org/10.2197/ipsjjip.22.142}, doi = {10.2197/IPSJJIP.22.142}, timestamp = {Tue, 16 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jip/SakiyamaLGHIHAO14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fedcsis/MachidaYIS14, author = {Takanori Machida and Dai Yamamoto and Mitsugu Iwamoto and Kazuo Sakiyama}, editor = {Maria Ganzha and Leszek A. Maciaszek and Marcin Paprzycki}, title = {A New Mode of Operation for Arbiter {PUF} to Improve Uniqueness on {FPGA}}, booktitle = {Proceedings of the 2014 Federated Conference on Computer Science and Information Systems, Warsaw, Poland, September 7-10, 2014}, series = {Annals of Computer Science and Information Systems}, volume = {2}, pages = {871--878}, year = {2014}, url = {https://doi.org/10.15439/2014F140}, doi = {10.15439/2014F140}, timestamp = {Mon, 07 Aug 2023 11:27:16 +0200}, biburl = {https://dblp.org/rec/conf/fedcsis/MachidaYIS14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fedcsis/YamamotoTST14, author = {Dai Yamamoto and Masahiko Takenaka and Kazuo Sakiyama and Naoya Torii}, editor = {Maria Ganzha and Leszek A. Maciaszek and Marcin Paprzycki}, title = {Security Evaluation of Bistable Ring PUFs on FPGAs using Differential and Linear Analysis}, booktitle = {Proceedings of the 2014 Federated Conference on Computer Science and Information Systems, Warsaw, Poland, September 7-10, 2014}, series = {Annals of Computer Science and Information Systems}, volume = {2}, pages = {911--918}, year = {2014}, url = {https://doi.org/10.15439/2014F122}, doi = {10.15439/2014F122}, timestamp = {Mon, 07 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/fedcsis/YamamotoTST14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iwsec/YamamotoTST14, author = {Dai Yamamoto and Masahiko Takenaka and Kazuo Sakiyama and Naoya Torii}, editor = {Maki Yoshida and Koichi Mouri}, title = {A Technique Using PUFs for Protecting Circuit Layout Designs against Reverse Engineering}, booktitle = {Advances in Information and Computer Security - 9th International Workshop on Security, {IWSEC} 2014, Hirosaki, Japan, August 27-29, 2014. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {8639}, pages = {158--173}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-319-09843-2\_13}, doi = {10.1007/978-3-319-09843-2\_13}, timestamp = {Tue, 14 May 2019 10:00:52 +0200}, biburl = {https://dblp.org/rec/conf/iwsec/YamamotoTST14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/rfidsec/LiMWOS14, author = {Yang Li and Shugo Mikami and Dai Watanabe and Kazuo Ohta and Kazuo Sakiyama}, editor = {Nai{-}Wei Lo and Yingjiu Li and Kuo{-}Hui Yeh}, title = {Single-Chip Implementation and Evaluation of Passive {UHF} {RFID} Tag with Hash-Based Mutual Authentication}, booktitle = {Radio Frequency Identification System Security - RFIDsec'14 Asia Workshop Proceedings, Hualien, Taiwan, November 27-28, 2014}, series = {Cryptology and Information Security Series}, volume = {12}, pages = {3--15}, publisher = {{IOS} Press}, year = {2014}, url = {https://doi.org/10.3233/978-1-61499-462-6-3}, doi = {10.3233/978-1-61499-462-6-3}, timestamp = {Thu, 22 Jun 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/rfidsec/LiMWOS14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/shonan-reports/SakiyamaSV14, author = {Kazuo Sakiyama and Patrick Schaumont and Ingrid Verbauwhede}, title = {Design Methods for Secure Hardware {(NII} Shonan Meeting 2014-11)}, journal = {{NII} Shonan Meet. Rep.}, volume = {2014}, year = {2014}, url = {https://shonan.nii.ac.jp/seminars/028/}, timestamp = {Thu, 04 Mar 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/shonan-reports/SakiyamaSV14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieicet/LiOS13, author = {Yang Li and Kazuo Ohta and Kazuo Sakiyama}, title = {A New Type of Fault-Based Attack: Fault Behavior Analysis}, journal = {{IEICE} Trans. Fundam. Electron. Commun. Comput. Sci.}, volume = {96-A}, number = {1}, pages = {177--184}, year = {2013}, url = {https://doi.org/10.1587/transfun.E96.A.177}, doi = {10.1587/TRANSFUN.E96.A.177}, timestamp = {Sat, 11 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ieicet/LiOS13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieicet/MikamiYWS13, author = {Shugo Mikami and Hirotaka Yoshida and Dai Watanabe and Kazuo Sakiyama}, title = {Correlation Power Analysis and Countermeasure on the Stream Cipher Enocoro-128v2}, journal = {{IEICE} Trans. Fundam. Electron. Commun. Comput. Sci.}, volume = {96-A}, number = {3}, pages = {697--704}, year = {2013}, url = {https://doi.org/10.1587/transfun.E96.A.697}, doi = {10.1587/TRANSFUN.E96.A.697}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ieicet/MikamiYWS13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jce/YamamotoSIOTI13, author = {Dai Yamamoto and Kazuo Sakiyama and Mitsugu Iwamoto and Kazuo Ohta and Masahiko Takenaka and Kouichi Itoh}, title = {Variety enhancement of {PUF} responses using the locations of random outputting {RS} latches}, journal = {J. Cryptogr. Eng.}, volume = {3}, number = {4}, pages = {197--211}, year = {2013}, url = {https://doi.org/10.1007/s13389-012-0044-0}, doi = {10.1007/S13389-012-0044-0}, timestamp = {Thu, 09 Jul 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jce/YamamotoSIOTI13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cosade/LiEDHALDOS13, author = {Yang Li and Sho Endo and Nicolas Debande and Naofumi Homma and Takafumi Aoki and Thanh{-}Ha Le and Jean{-}Luc Danger and Kazuo Ohta and Kazuo Sakiyama}, editor = {Emmanuel Prouff}, title = {Exploring the Relations between Fault Sensitivity and Power Consumption}, booktitle = {Constructive Side-Channel Analysis and Secure Design - 4th International Workshop, {COSADE} 2013, Paris, France, March 6-8, 2013, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {7864}, pages = {137--153}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-642-40026-1\_9}, doi = {10.1007/978-3-642-40026-1\_9}, timestamp = {Tue, 14 May 2019 10:00:39 +0200}, biburl = {https://dblp.org/rec/conf/cosade/LiEDHALDOS13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fc/SasakiLSS13, author = {Yu Sasaki and Yang Li and Hikaru Sakamoto and Kazuo Sakiyama}, editor = {Ahmad{-}Reza Sadeghi}, title = {Coupon Collector's Problem for Fault Analysis against {AES} - High Tolerance for Noisy Fault Injections}, booktitle = {Financial Cryptography and Data Security - 17th International Conference, {FC} 2013, Okinawa, Japan, April 1-5, 2013, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {7859}, pages = {213--220}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-642-39884-1\_18}, doi = {10.1007/978-3-642-39884-1\_18}, timestamp = {Tue, 14 May 2019 10:00:38 +0200}, biburl = {https://dblp.org/rec/conf/fc/SasakiLSS13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fps/LiHMHAOS13, author = {Yang Li and Yu{-}ichi Hayashi and Arisa Matsubara and Naofumi Homma and Takafumi Aoki and Kazuo Ohta and Kazuo Sakiyama}, editor = {Jean{-}Luc Danger and Mourad Debbabi and Jean{-}Yves Marion and Joaqu{\'{\i}}n Garc{\'{\i}}a{-}Alfaro and Nur Zincir{-}Heywood}, title = {Yet Another Fault-Based Leakage in Non-uniform Faulty Ciphertexts}, booktitle = {Foundations and Practice of Security - 6th International Symposium, {FPS} 2013, La Rochelle, France, October 21-22, 2013, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {8352}, pages = {272--287}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-319-05302-8\_17}, doi = {10.1007/978-3-319-05302-8\_17}, timestamp = {Fri, 08 Dec 2023 07:53:07 +0100}, biburl = {https://dblp.org/rec/conf/fps/LiHMHAOS13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/rfidsec/MikamiWS13, author = {Shugo Mikami and Dai Watanabe and Kazuo Sakiyama}, editor = {Changshe Ma and Jian Weng}, title = {A Comparative Study of Stream Ciphers and Hash Functions for {RFID} Authentications}, booktitle = {Radio Frequency Identification System Security - RFIDsec'13 Asia Workshop Proceedings, Guangzhou, China, November 27, 2013}, series = {Cryptology and Information Security Series}, volume = {11}, pages = {83--94}, publisher = {{IOS} Press}, year = {2013}, url = {https://doi.org/10.3233/978-1-61499-328-5-83}, doi = {10.3233/978-1-61499-328-5-83}, timestamp = {Wed, 13 May 2020 07:48:31 +0200}, biburl = {https://dblp.org/rec/conf/rfidsec/MikamiWS13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secrypt/SasakiKSWISO13, author = {Yu Sasaki and Wataru Komatsubara and Yasuhide Sakai and Lei Wang and Mitsugu Iwamoto and Kazuo Sakiyama and Kazuo Ohta}, editor = {Pierangela Samarati}, title = {Meet-in-the-Middle Preimage Attacks Revisited - New Results on {MD5} and {HAVAL}}, booktitle = {{SECRYPT} 2013 - Proceedings of the 10th International Conference on Security and Cryptography, Reykjav{\'{\i}}k, Iceland, 29-31 July, 2013}, pages = {111--122}, publisher = {SciTePress}, year = {2013}, url = {https://ieeexplore.ieee.org/document/7223160/}, timestamp = {Wed, 11 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/secrypt/SasakiKSWISO13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/iwsec/2013, editor = {Kazuo Sakiyama and Masayuki Terada}, title = {Advances in Information and Computer Security - 8th International Workshop on Security, {IWSEC} 2013, Okinawa, Japan, November 18-20, 2013, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {8231}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-642-41383-4}, doi = {10.1007/978-3-642-41383-4}, isbn = {978-3-642-41382-7}, timestamp = {Tue, 14 May 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/iwsec/2013.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieicet/WangSKSO12, author = {Lei Wang and Yu Sasaki and Wataru Komatsubara and Kazuo Sakiyama and Kazuo Ohta}, title = {Meet-in-the-Middle (Second) Preimage Attacks on Two Double-Branch Hash Functions {RIPEMD} and {RIPEMD-128}}, journal = {{IEICE} Trans. Fundam. Electron. Commun. Comput. Sci.}, volume = {95-A}, number = {1}, pages = {100--110}, year = {2012}, url = {https://doi.org/10.1587/transfun.E95.A.100}, doi = {10.1587/TRANSFUN.E95.A.100}, timestamp = {Sat, 11 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ieicet/WangSKSO12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieicet/LiOS12, author = {Yang Li and Kazuo Ohta and Kazuo Sakiyama}, title = {Toward Effective Countermeasures against an Improved Fault Sensitivity Analysis}, journal = {{IEICE} Trans. Fundam. Electron. Commun. Comput. Sci.}, volume = {95-A}, number = {1}, pages = {234--241}, year = {2012}, url = {https://doi.org/10.1587/transfun.E95.A.234}, doi = {10.1587/TRANSFUN.E95.A.234}, timestamp = {Sat, 11 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ieicet/LiOS12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieicet/TakahashiFS12, author = {Junko Takahashi and Toshinori Fukunaga and Kazuo Sakiyama}, title = {Differential Fault Analysis on Stream Cipher {MUGI}}, journal = {{IEICE} Trans. Fundam. Electron. Commun. Comput. Sci.}, volume = {95-A}, number = {1}, pages = {242--251}, year = {2012}, url = {https://doi.org/10.1587/transfun.E95.A.242}, doi = {10.1587/TRANSFUN.E95.A.242}, timestamp = {Sun, 22 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ieicet/TakahashiFS12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/LiOS12, author = {Yang Li and Kazuo Ohta and Kazuo Sakiyama}, title = {New Fault-Based Side-Channel Attack Using Fault Sensitivity}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {7}, number = {1}, pages = {88--97}, year = {2012}, url = {https://doi.org/10.1109/TIFS.2011.2169666}, doi = {10.1109/TIFS.2011.2169666}, timestamp = {Thu, 06 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/LiOS12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/SakiyamaLIO12, author = {Kazuo Sakiyama and Yang Li and Mitsugu Iwamoto and Kazuo Ohta}, title = {Information-Theoretic Approach to Optimal Differential Fault Analysis}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {7}, number = {1}, pages = {109--120}, year = {2012}, url = {https://doi.org/10.1109/TIFS.2011.2174984}, doi = {10.1109/TIFS.2011.2174984}, timestamp = {Thu, 06 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/SakiyamaLIO12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tvlsi/KnezevicKIMSKFKSSVOHA12, author = {Miroslav Knezevic and Kazuyuki Kobayashi and Jun Ikegami and Shin'ichiro Matsuo and Akashi Satoh and {\"{U}}nal Ko{\c{c}}abas and Junfeng Fan and Toshihiro Katashita and Takeshi Sugawara and Kazuo Sakiyama and Ingrid Verbauwhede and Kazuo Ohta and Naofumi Homma and Takafumi Aoki}, title = {Fair and Consistent Hardware Evaluation of Fourteen Round Two {SHA-3} Candidates}, journal = {{IEEE} Trans. Very Large Scale Integr. Syst.}, volume = {20}, number = {5}, pages = {827--840}, year = {2012}, url = {https://doi.org/10.1109/TVLSI.2011.2128353}, doi = {10.1109/TVLSI.2011.2128353}, timestamp = {Fri, 26 Aug 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tvlsi/KnezevicKIMSKFKSSVOHA12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/africacrypt/SasakiWSSO12, author = {Yu Sasaki and Lei Wang and Yasuhide Sakai and Kazuo Sakiyama and Kazuo Ohta}, editor = {Aikaterini Mitrokotsa and Serge Vaudenay}, title = {Three-Subset Meet-in-the-Middle Attack on Reduced {XTEA}}, booktitle = {Progress in Cryptology - {AFRICACRYPT} 2012 - 5th International Conference on Cryptology in Africa, Ifrance, Morocco, July 10-12, 2012. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7374}, pages = {138--154}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-31410-0\_9}, doi = {10.1007/978-3-642-31410-0\_9}, timestamp = {Sun, 02 Jun 2019 21:14:37 +0200}, biburl = {https://dblp.org/rec/conf/africacrypt/SasakiWSSO12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cisc/LiOS12, author = {Yang Li and Kazuo Ohta and Kazuo Sakiyama}, editor = {Miroslaw Kutylowski and Moti Yung}, title = {An Extension of Fault Sensitivity Analysis Based on Clockwise Collision}, booktitle = {Information Security and Cryptology - 8th International Conference, Inscrypt 2012, Beijing, China, November 28-30, 2012, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {7763}, pages = {46--59}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-38519-3\_4}, doi = {10.1007/978-3-642-38519-3\_4}, timestamp = {Tue, 14 May 2019 10:00:52 +0200}, biburl = {https://dblp.org/rec/conf/cisc/LiOS12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fdtc/EndoLHSOA12, author = {Sho Endo and Yang Li and Naofumi Homma and Kazuo Sakiyama and Kazuo Ohta and Takafumi Aoki}, editor = {Guido Bertoni and Benedikt Gierlichs}, title = {An Efficient Countermeasure against Fault Sensitivity Analysis Using Configurable Delay Blocks}, booktitle = {2012 Workshop on Fault Diagnosis and Tolerance in Cryptography, Leuven, Belgium, September 9, 2012}, pages = {95--102}, publisher = {{IEEE} Computer Society}, year = {2012}, url = {https://doi.org/10.1109/FDTC.2012.12}, doi = {10.1109/FDTC.2012.12}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/fdtc/EndoLHSOA12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icisc/NakasoneLSIOS12, author = {Toshiki Nakasone and Yang Li and Yu Sasaki and Mitsugu Iwamoto and Kazuo Ohta and Kazuo Sakiyama}, editor = {Taekyoung Kwon and Mun{-}Kyu Lee and Daesung Kwon}, title = {Key-Dependent Weakness of AES-Based Ciphers under Clockwise Collision Distinguisher}, booktitle = {Information Security and Cryptology - {ICISC} 2012 - 15th International Conference, Seoul, Korea, November 28-30, 2012, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {7839}, pages = {395--409}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-37682-5\_28}, doi = {10.1007/978-3-642-37682-5\_28}, timestamp = {Thu, 12 Nov 2020 16:27:41 +0100}, biburl = {https://dblp.org/rec/conf/icisc/NakasoneLSIOS12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ispec/KoyamaWSSO12, author = {Takuma Koyama and Lei Wang and Yu Sasaki and Kazuo Sakiyama and Kazuo Ohta}, editor = {Mark Dermot Ryan and Ben Smyth and Guilin Wang}, title = {New Truncated Differential Cryptanalysis on 3D Block Cipher}, booktitle = {Information Security Practice and Experience - 8th International Conference, {ISPEC} 2012, Hangzhou, China, April 9-12, 2012. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7232}, pages = {109--125}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-29101-2\_8}, doi = {10.1007/978-3-642-29101-2\_8}, timestamp = {Fri, 22 Mar 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ispec/KoyamaWSSO12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iwsec/Sasaki0TSO12, author = {Yu Sasaki and Lei Wang and Yasuhiro Takasaki and Kazuo Sakiyama and Kazuo Ohta}, editor = {Goichiro Hanaoka and Toshihiro Yamauchi}, title = {Boomerang Distinguishers for Full {HAS-160} Compression Function}, booktitle = {Advances in Information and Computer Security - 7th International Workshop on Security, {IWSEC} 2012, Fukuoka, Japan, November 7-9, 2012. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7631}, pages = {156--169}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-34117-5\_10}, doi = {10.1007/978-3-642-34117-5\_10}, timestamp = {Tue, 14 May 2019 10:00:52 +0200}, biburl = {https://dblp.org/rec/conf/iwsec/Sasaki0TSO12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iwsec/0007SSO12, author = {Lei Wang and Yu Sasaki and Kazuo Sakiyama and Kazuo Ohta}, editor = {Goichiro Hanaoka and Toshihiro Yamauchi}, title = {Polynomial-Advantage Cryptanalysis of 3D Cipher and 3D-Based Hash Function}, booktitle = {Advances in Information and Computer Security - 7th International Workshop on Security, {IWSEC} 2012, Fukuoka, Japan, November 7-9, 2012. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7631}, pages = {170--181}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-34117-5\_11}, doi = {10.1007/978-3-642-34117-5\_11}, timestamp = {Tue, 02 Oct 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/iwsec/0007SSO12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:series/isc/TakahashiFGLSO12, author = {Junko Takahashi and Toshinori Fukunaga and Shigeto Gomisawa and Yang Li and Kazuo Sakiyama and Kazuo Ohta}, editor = {Marc Joye and Michael Tunstall}, title = {Fault Injection and Key Retrieval Experiments on an Evaluation Board}, booktitle = {Fault Analysis in Cryptography}, series = {Information Security and Cryptography}, pages = {313--331}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-29656-7\_18}, doi = {10.1007/978-3-642-29656-7\_18}, timestamp = {Fri, 27 Mar 2020 08:31:50 +0100}, biburl = {https://dblp.org/rec/series/isc/TakahashiFGLSO12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieicet/SantosoOSH11, author = {Bagus Santoso and Kazuo Ohta and Kazuo Sakiyama and Goichiro Hanaoka}, title = {An Efficient Authentication for Lightweight Devices by Perfecting Zero-Knowledgeness}, journal = {{IEICE} Trans. Fundam. Electron. Commun. Comput. Sci.}, volume = {94-A}, number = {1}, pages = {92--103}, year = {2011}, url = {https://doi.org/10.1587/transfun.E94.A.92}, doi = {10.1587/TRANSFUN.E94.A.92}, timestamp = {Mon, 03 Jan 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ieicet/SantosoOSH11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieicet/LiSKO11, author = {Yang Li and Kazuo Sakiyama and Shin{-}ichi Kawamura and Kazuo Ohta}, title = {Power Analysis against a DPA-Resistant S-Box Implementation Based on the Fourier Transform}, journal = {{IEICE} Trans. Fundam. Electron. Commun. Comput. Sci.}, volume = {94-A}, number = {1}, pages = {191--199}, year = {2011}, url = {https://doi.org/10.1587/transfun.E94.A.191}, doi = {10.1587/TRANSFUN.E94.A.191}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ieicet/LiSKO11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/integration/SakiyamaKFPV11, author = {Kazuo Sakiyama and Miroslav Knezevic and Junfeng Fan and Bart Preneel and Ingrid Verbauwhede}, title = {Tripartite modular multiplication}, journal = {Integr.}, volume = {44}, number = {4}, pages = {259--269}, year = {2011}, url = {https://doi.org/10.1016/j.vlsi.2011.03.008}, doi = {10.1016/J.VLSI.2011.03.008}, timestamp = {Thu, 20 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/integration/SakiyamaKFPV11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ches/MoradiMPLOS11, author = {Amir Moradi and Oliver Mischke and Christof Paar and Yang Li and Kazuo Ohta and Kazuo Sakiyama}, editor = {Bart Preneel and Tsuyoshi Takagi}, title = {On the Power of Fault Sensitivity Analysis and Collision Side-Channel Attacks in a Combined Setting}, booktitle = {Cryptographic Hardware and Embedded Systems - {CHES} 2011 - 13th International Workshop, Nara, Japan, September 28 - October 1, 2011. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6917}, pages = {292--311}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-3-642-23951-9\_20}, doi = {10.1007/978-3-642-23951-9\_20}, timestamp = {Sat, 19 Oct 2019 20:26:25 +0200}, biburl = {https://dblp.org/rec/conf/ches/MoradiMPLOS11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ches/YamamotoSIOOTI11, author = {Dai Yamamoto and Kazuo Sakiyama and Mitsugu Iwamoto and Kazuo Ohta and Takao Ochiai and Masahiko Takenaka and Kouichi Itoh}, editor = {Bart Preneel and Tsuyoshi Takagi}, title = {Uniqueness Enhancement of {PUF} Responses Based on the Locations of Random Outputting {RS} Latches}, booktitle = {Cryptographic Hardware and Embedded Systems - {CHES} 2011 - 13th International Workshop, Nara, Japan, September 28 - October 1, 2011. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6917}, pages = {390--406}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-3-642-23951-9\_26}, doi = {10.1007/978-3-642-23951-9\_26}, timestamp = {Tue, 26 Jun 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ches/YamamotoSIOOTI11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ctrsa/WangSKOS11, author = {Lei Wang and Yu Sasaki and Wataru Komatsubara and Kazuo Ohta and Kazuo Sakiyama}, editor = {Aggelos Kiayias}, title = {(Second) Preimage Attacks on Step-Reduced {RIPEMD/RIPEMD-128} with a New Local-Collision Approach}, booktitle = {Topics in Cryptology - {CT-RSA} 2011 - The Cryptographers' Track at the {RSA} Conference 2011, San Francisco, CA, USA, February 14-18, 2011. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6558}, pages = {197--212}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-3-642-19074-2\_14}, doi = {10.1007/978-3-642-19074-2\_14}, timestamp = {Tue, 14 May 2019 10:00:52 +0200}, biburl = {https://dblp.org/rec/conf/ctrsa/WangSKOS11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fc/HanataniOMSO11, author = {Yoshikazu Hanatani and Miyako Ohkubo and Shin'ichiro Matsuo and Kazuo Sakiyama and Kazuo Ohta}, editor = {George Danezis and Sven Dietrich and Kazue Sako}, title = {A Study on Computational Formal Verification for Practical Cryptographic Protocol: The Case of Synchronous {RFID} Authentication}, booktitle = {Financial Cryptography and Data Security - {FC} 2011 Workshops, {RLCPS} and {WECSR} 2011, Rodney Bay, St. Lucia, February 28 - March 4, 2011, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {7126}, pages = {70--87}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-3-642-29889-9\_7}, doi = {10.1007/978-3-642-29889-9\_7}, timestamp = {Tue, 14 May 2019 10:00:38 +0200}, biburl = {https://dblp.org/rec/conf/fc/HanataniOMSO11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fdtc/SakamotoLOS11, author = {Hikaru Sakamoto and Yang Li and Kazuo Ohta and Kazuo Sakiyama}, editor = {Luca Breveglieri and Sylvain Guilley and Israel Koren and David Naccache and Junko Takahashi}, title = {Fault Sensitivity Analysis Against Elliptic Curve Cryptosystems}, booktitle = {2011 Workshop on Fault Diagnosis and Tolerance in Cryptography, {FDTC} 2011, Tokyo, Japan, September 29, 2011}, pages = {11--20}, publisher = {{IEEE} Computer Society}, year = {2011}, url = {https://doi.org/10.1109/FDTC.2011.17}, doi = {10.1109/FDTC.2011.17}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/fdtc/SakamotoLOS11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/host/LiOS11, author = {Yang Li and Kazuo Ohta and Kazuo Sakiyama}, title = {Revisit fault sensitivity analysis on {WDDL-AES}}, booktitle = {{HOST} 2011, Proceedings of the 2011 {IEEE} International Symposium on Hardware-Oriented Security and Trust (HOST), 5-6 June 2011, San Diego, California, {USA}}, pages = {148--153}, publisher = {{IEEE} Computer Society}, year = {2011}, url = {https://doi.org/10.1109/HST.2011.5955013}, doi = {10.1109/HST.2011.5955013}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/host/LiOS11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iwsec/SasakiTSO11, author = {Yu Sasaki and Naoyuki Takayanagi and Kazuo Sakiyama and Kazuo Ohta}, editor = {Tetsu Iwata and Masakatsu Nishigaki}, title = {Experimental Verification of Super-Sbox Analysis - Confirmation of Detailed Attack Complexity}, booktitle = {Advances in Information and Computer Security - 6th International Workshop, {IWSEC} 2011, Tokyo, Japan, November 8-10, 2011. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7038}, pages = {178--192}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-3-642-25141-2\_12}, doi = {10.1007/978-3-642-25141-2\_12}, timestamp = {Tue, 14 May 2019 10:00:52 +0200}, biburl = {https://dblp.org/rec/conf/iwsec/SasakiTSO11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/LiNLOS11, author = {Yang Li and Daisuke Nakatsu and Qi Li and Kazuo Ohta and Kazuo Sakiyama}, title = {Clockwise Collision Analysis - Overlooked Side-Channel Leakage Inside Your Measurements}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {579}, year = {2011}, url = {http://eprint.iacr.org/2011/579}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/LiNLOS11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieicet/SakiyamaO10, author = {Kazuo Sakiyama and Kazuo Ohta}, title = {On Clock-Based Fault Analysis Attack for an {AES} Hardware Using {RSL}}, journal = {{IEICE} Trans. Fundam. Electron. Commun. Comput. Sci.}, volume = {93-A}, number = {1}, pages = {172--179}, year = {2010}, url = {https://doi.org/10.1587/transfun.E93.A.172}, doi = {10.1587/TRANSFUN.E93.A.172}, timestamp = {Sat, 11 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ieicet/SakiyamaO10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieicet/WangOSSK10, author = {Lei Wang and Kazuo Ohta and Yu Sasaki and Kazuo Sakiyama and Noboru Kunihiro}, title = {Cryptanalysis of Two MD5-Based Authentication Protocols: {APOP} and {NMAC}}, journal = {{IEICE} Trans. Inf. Syst.}, volume = {93-D}, number = {5}, pages = {1087--1095}, year = {2010}, url = {https://doi.org/10.1587/transinf.E93.D.1087}, doi = {10.1587/TRANSINF.E93.D.1087}, timestamp = {Mon, 15 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ieicet/WangOSSK10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/asiacrypt/SasakiLWSO10, author = {Yu Sasaki and Yang Li and Lei Wang and Kazuo Sakiyama and Kazuo Ohta}, editor = {Masayuki Abe}, title = {Non-full-active Super-Sbox Analysis: Applications to {ECHO} and Gr{\o}stl}, booktitle = {Advances in Cryptology - {ASIACRYPT} 2010 - 16th International Conference on the Theory and Application of Cryptology and Information Security, Singapore, December 5-9, 2010. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6477}, pages = {38--55}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-17373-8\_3}, doi = {10.1007/978-3-642-17373-8\_3}, timestamp = {Tue, 14 May 2019 10:00:40 +0200}, biburl = {https://dblp.org/rec/conf/asiacrypt/SasakiLWSO10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ches/LiSGFTO10, author = {Yang Li and Kazuo Sakiyama and Shigeto Gomisawa and Toshinori Fukunaga and Junko Takahashi and Kazuo Ohta}, editor = {Stefan Mangard and Fran{\c{c}}ois{-}Xavier Standaert}, title = {Fault Sensitivity Analysis}, booktitle = {Cryptographic Hardware and Embedded Systems, {CHES} 2010, 12th International Workshop, Santa Barbara, CA, USA, August 17-20, 2010. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6225}, pages = {320--334}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-15031-9\_22}, doi = {10.1007/978-3-642-15031-9\_22}, timestamp = {Tue, 14 May 2019 10:00:47 +0200}, biburl = {https://dblp.org/rec/conf/ches/LiSGFTO10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ctrsa/SantosoOSH10, author = {Bagus Santoso and Kazuo Ohta and Kazuo Sakiyama and Goichiro Hanaoka}, editor = {Josef Pieprzyk}, title = {Improving Efficiency of an `On the Fly' Identification Scheme by Perfecting Zero-Knowledgeness}, booktitle = {Topics in Cryptology - {CT-RSA} 2010, The Cryptographers' Track at the {RSA} Conference 2010, San Francisco, CA, USA, March 1-5, 2010. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5985}, pages = {284--301}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-11925-5\_20}, doi = {10.1007/978-3-642-11925-5\_20}, timestamp = {Mon, 03 Jan 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ctrsa/SantosoOSH10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/date/IzumiISO10, author = {Masami Izumi and Jun Ikegami and Kazuo Sakiyama and Kazuo Ohta}, editor = {Giovanni De Micheli and Bashir M. Al{-}Hashimi and Wolfgang M{\"{u}}ller and Enrico Macii}, title = {Improved countermeasure against Address-bit {DPA} for {ECC} scalar multiplication}, booktitle = {Design, Automation and Test in Europe, {DATE} 2010, Dresden, Germany, March 8-12, 2010}, pages = {981--984}, publisher = {{IEEE} Computer Society}, year = {2010}, url = {https://doi.org/10.1109/DATE.2010.5456907}, doi = {10.1109/DATE.2010.5456907}, timestamp = {Wed, 16 Oct 2019 14:14:53 +0200}, biburl = {https://dblp.org/rec/conf/date/IzumiISO10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/date/LiSBNO10, author = {Yang Li and Kazuo Sakiyama and Lejla Batina and Daisuke Nakatsu and Kazuo Ohta}, editor = {Giovanni De Micheli and Bashir M. Al{-}Hashimi and Wolfgang M{\"{u}}ller and Enrico Macii}, title = {Power Variance Analysis breaks a masked {ASIC} implementation of {AES}}, booktitle = {Design, Automation and Test in Europe, {DATE} 2010, Dresden, Germany, March 8-12, 2010}, pages = {1059--1064}, publisher = {{IEEE} Computer Society}, year = {2010}, url = {https://doi.org/10.1109/DATE.2010.5456966}, doi = {10.1109/DATE.2010.5456966}, timestamp = {Thu, 22 Jun 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/date/LiSBNO10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/host/KobayashiISOKKFVGMHNS10, author = {Kazuyuki Kobayashi and Jun Ikegami and Kazuo Sakiyama and Kazuo Ohta and Miroslav Knezevic and {\"{U}}nal Ko{\c{c}}abas and Junfeng Fan and Ingrid Verbauwhede and Eric Xu Guo and Shin'ichiro Matsuo and Sinan Huang and Leyla Nazhandali and Akashi Satoh}, editor = {Jim Plusquellic and Ken Mai}, title = {Prototyping Platform for Performance Evaluation of {SHA-3} Candidates}, booktitle = {{HOST} 2010, Proceedings of the 2010 {IEEE} International Symposium on Hardware-Oriented Security and Trust (HOST), 13-14 June 2010, Anaheim Convention Center, California, {USA}}, pages = {60--63}, publisher = {{IEEE} Computer Society}, year = {2010}, url = {https://doi.org/10.1109/HST.2010.5513111}, doi = {10.1109/HST.2010.5513111}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/host/KobayashiISOKKFVGMHNS10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icisc/TakahashiFS10, author = {Junko Takahashi and Toshinori Fukunaga and Kazuo Sakiyama}, editor = {Kyung Hyune Rhee and DaeHun Nyang}, title = {Fault Analysis on Stream Cipher {MUGI}}, booktitle = {Information Security and Cryptology - {ICISC} 2010 - 13th International Conference, Seoul, Korea, December 1-3, 2010, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {6829}, pages = {420--434}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-24209-0\_28}, doi = {10.1007/978-3-642-24209-0\_28}, timestamp = {Tue, 14 May 2019 10:00:36 +0200}, biburl = {https://dblp.org/rec/conf/icisc/TakahashiFS10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisa/NakatsuLSO10, author = {Daisuke Nakatsu and Yang Li and Kazuo Sakiyama and Kazuo Ohta}, editor = {Yongwha Chung and Moti Yung}, title = {Combination of {SW} Countermeasure and {CPU} Modification on {FPGA} against Power Analysis}, booktitle = {Information Security Applications - 11th International Workshop, {WISA} 2010, Jeju Island, Korea, August 24-26, 2010, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {6513}, pages = {258--272}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-17955-6\_19}, doi = {10.1007/978-3-642-17955-6\_19}, timestamp = {Tue, 14 May 2019 10:00:35 +0200}, biburl = {https://dblp.org/rec/conf/wisa/NakatsuLSO10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:books/sp/10/SakiyamaB10, author = {Kazuo Sakiyama and Lejla Batina}, editor = {Ingrid M. R. Verbauwhede}, title = {Arithmetic for Public-Key Cryptography}, booktitle = {Secure Integrated Circuits and Systems}, series = {Integrated Circuits and Systems}, pages = {63--78}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-0-387-71829-3\_4}, doi = {10.1007/978-0-387-71829-3\_4}, timestamp = {Wed, 26 Jun 2019 18:00:01 +0200}, biburl = {https://dblp.org/rec/books/sp/10/SakiyamaB10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:books/sp/10/BatinaSV10, author = {Lejla Batina and Kazuo Sakiyama and Ingrid M. R. Verbauwhede}, editor = {Ingrid M. R. Verbauwhede}, title = {Compact Public-Key Implementations for {RFID} and Sensor Nodes}, booktitle = {Secure Integrated Circuits and Systems}, series = {Integrated Circuits and Systems}, pages = {179--195}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-0-387-71829-3\_10}, doi = {10.1007/978-0-387-71829-3\_10}, timestamp = {Fri, 02 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/books/sp/10/BatinaSV10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/KobayashiIMSO10, author = {Kazuyuki Kobayashi and Jun Ikegami and Shin'ichiro Matsuo and Kazuo Sakiyama and Kazuo Ohta}, title = {Evaluation of Hardware Performance for the {SHA-3} Candidates Using {SASEBO-GII}}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {10}, year = {2010}, url = {http://eprint.iacr.org/2010/010}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/KobayashiIMSO10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/LiGSO10, author = {Yang Li and Shigeto Gomisawa and Kazuo Sakiyama and Kazuo Ohta}, title = {An Information Theoretic Perspective on the Differential Fault Analysis against {AES}}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {32}, year = {2010}, url = {http://eprint.iacr.org/2010/032}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/LiGSO10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/GomisawaLTFSSO10, author = {Shigeto Gomisawa and Yang Li and Junko Takahashi and Toshinori Fukunaga and Yu Sasaki and Kazuo Sakiyama and Kazuo Ohta}, title = {Efficient Differential Fault Analysis for {AES}}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {336}, year = {2010}, url = {http://eprint.iacr.org/2010/336}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/GomisawaLTFSSO10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/OhkuboMHSO10, author = {Miyako Ohkubo and Shin'ichiro Matsuo and Yoshikazu Hanatani and Kazuo Sakiyama and Kazuo Ohta}, title = {Robust {RFID} Authentication Protocol with Formal Proof and Its Feasibility}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {345}, year = {2010}, url = {http://eprint.iacr.org/2010/345}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/OhkuboMHSO10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/IEEEares/IzumiSO09, author = {Masami Izumi and Kazuo Sakiyama and Kazuo Ohta}, title = {A New Approach for Implementing the {MPL} Method toward Higher {SPA} Resistance}, booktitle = {Proceedings of the The Forth International Conference on Availability, Reliability and Security, {ARES} 2009, March 16-19, 2009, Fukuoka, Japan}, pages = {181--186}, publisher = {{IEEE} Computer Society}, year = {2009}, url = {https://doi.org/10.1109/ARES.2009.61}, doi = {10.1109/ARES.2009.61}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/IEEEares/IzumiSO09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ctrsa/SakiyamaYO09, author = {Kazuo Sakiyama and Tatsuya Yagi and Kazuo Ohta}, editor = {Marc Fischlin}, title = {Fault Analysis Attack against an {AES} Prototype Chip Using {RSL}}, booktitle = {Topics in Cryptology - {CT-RSA} 2009, The Cryptographers' Track at the {RSA} Conference 2009, San Francisco, CA, USA, April 20-24, 2009. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5473}, pages = {429--443}, publisher = {Springer}, year = {2009}, url = {https://doi.org/10.1007/978-3-642-00862-7\_29}, doi = {10.1007/978-3-642-00862-7\_29}, timestamp = {Tue, 14 May 2019 10:00:52 +0200}, biburl = {https://dblp.org/rec/conf/ctrsa/SakiyamaYO09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icics/LiSKKO09, author = {Yang Li and Kazuo Sakiyama and Shin{-}ichi Kawamura and Yuichi Komano and Kazuo Ohta}, editor = {Sihan Qing and Chris J. Mitchell and Guilin Wang}, title = {Security Evaluation of a DPA-Resistant S-Box Based on the Fourier Transform}, booktitle = {Information and Communications Security, 11th International Conference, {ICICS} 2009, Beijing, China, December 14-17, 2009. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5927}, pages = {3--16}, publisher = {Springer}, year = {2009}, url = {https://doi.org/10.1007/978-3-642-11145-7\_3}, doi = {10.1007/978-3-642-11145-7\_3}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icics/LiSKKO09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iwsec/WangSSO09, author = {Lei Wang and Yu Sasaki and Kazuo Sakiyama and Kazuo Ohta}, editor = {Tsuyoshi Takagi and Masahiro Mambo}, title = {Bit-Free Collision: Application to {APOP} Attack}, booktitle = {Advances in Information and Computer Security, 4th International Workshop on Security, {IWSEC} 2009, Toyama, Japan, October 28-30, 2009, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5824}, pages = {3--21}, publisher = {Springer}, year = {2009}, url = {https://doi.org/10.1007/978-3-642-04846-3\_2}, doi = {10.1007/978-3-642-04846-3\_2}, timestamp = {Tue, 14 May 2019 10:00:52 +0200}, biburl = {https://dblp.org/rec/conf/iwsec/WangSSO09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dafes/FanSV08, author = {Junfeng Fan and Kazuo Sakiyama and Ingrid Verbauwhede}, title = {Elliptic curve cryptography on embedded multicore systems}, journal = {Des. Autom. Embed. Syst.}, volume = {12}, number = {3}, pages = {231--242}, year = {2008}, url = {https://doi.org/10.1007/s10617-008-9021-3}, doi = {10.1007/S10617-008-9021-3}, timestamp = {Fri, 02 Oct 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dafes/FanSV08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tc/LeeSBV08, author = {Yong Ki Lee and Kazuo Sakiyama and Lejla Batina and Ingrid Verbauwhede}, title = {Elliptic-Curve-Based Security Processor for {RFID}}, journal = {{IEEE} Trans. Computers}, volume = {57}, number = {11}, pages = {1514--1527}, year = {2008}, url = {https://doi.org/10.1109/TC.2008.148}, doi = {10.1109/TC.2008.148}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tc/LeeSBV08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/asap/KnezzevicSLV08, author = {Miroslav Knezevic and Kazuo Sakiyama and Yong Ki Lee and Ingrid Verbauwhede}, title = {On the high-throughput implementation of {RIPEMD-160} hash algorithm}, booktitle = {19th {IEEE} International Conference on Application-Specific Systems, Architectures and Processors, {ASAP} 2008, July 2-4, 2008, Leuven, Belgium}, pages = {85--90}, publisher = {{IEEE} Computer Society}, year = {2008}, url = {https://doi.org/10.1109/ASAP.2008.4580159}, doi = {10.1109/ASAP.2008.4580159}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/asap/KnezzevicSLV08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/date/FanBSV08, author = {Junfeng Fan and Lejla Batina and Kazuo Sakiyama and Ingrid Verbauwhede}, editor = {Donatella Sciuto}, title = {{FPGA} Design for Algebraic Tori-Based Public-Key Cryptography}, booktitle = {Design, Automation and Test in Europe, {DATE} 2008, Munich, Germany, March 10-14, 2008}, pages = {1292--1297}, publisher = {{ACM}}, year = {2008}, url = {https://doi.org/10.1109/DATE.2008.4484857}, doi = {10.1109/DATE.2008.4484857}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/date/FanBSV08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/waifi/KnezevicSFV08, author = {Miroslav Knezevic and Kazuo Sakiyama and Junfeng Fan and Ingrid Verbauwhede}, editor = {Joachim von zur Gathen and Jos{\'{e}} Luis Ima{\~{n}}a and {\c{C}}etin Kaya Ko{\c{c}}}, title = {Modular Reduction in GF(2\({}^{\mbox{n}}\)) without Pre-computational Phase}, booktitle = {Arithmetic of Finite Fields, 2nd International Workshop, {WAIFI} 2008, Siena, Italy, July 6-9, 2008, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5130}, pages = {77--87}, publisher = {Springer}, year = {2008}, url = {https://doi.org/10.1007/978-3-540-69499-1\_7}, doi = {10.1007/978-3-540-69499-1\_7}, timestamp = {Wed, 25 Sep 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/waifi/KnezevicSFV08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cee/SakiyamaBPV07, author = {Kazuo Sakiyama and Lejla Batina and Bart Preneel and Ingrid Verbauwhede}, title = {{HW/SW} co-design for public-key cryptosystems on the 8051 micro-controller}, journal = {Comput. Electr. Eng.}, volume = {33}, number = {5-6}, pages = {324--332}, year = {2007}, url = {https://doi.org/10.1016/j.compeleceng.2007.05.005}, doi = {10.1016/J.COMPELECENG.2007.05.005}, timestamp = {Wed, 19 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cee/SakiyamaBPV07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/monet/SakiyamaBPV07, author = {Kazuo Sakiyama and Lejla Batina and Bart Preneel and Ingrid Verbauwhede}, title = {High-performance Public-key Cryptoprocessor for Wireless Mobile Applications}, journal = {Mob. Networks Appl.}, volume = {12}, number = {4}, pages = {245--258}, year = {2007}, url = {https://doi.org/10.1007/s11036-007-0020-6}, doi = {10.1007/S11036-007-0020-6}, timestamp = {Thu, 24 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/monet/SakiyamaBPV07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tc/SakiyamaBPV07, author = {Kazuo Sakiyama and Lejla Batina and Bart Preneel and Ingrid Verbauwhede}, title = {Multicore Curve-Based Cryptoprocessor with Reconfigurable Modular Arithmetic Logic Units over GF(2\({}^{\mbox{n}}\))}, journal = {{IEEE} Trans. Computers}, volume = {56}, number = {9}, pages = {1269--1282}, year = {2007}, url = {https://doi.org/10.1109/TC.2007.1071}, doi = {10.1109/TC.2007.1071}, timestamp = {Mon, 13 Jun 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tc/SakiyamaBPV07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/glvlsi/SakiyamaMPV07, author = {Kazuo Sakiyama and Elke De Mulder and Bart Preneel and Ingrid Verbauwhede}, editor = {Hai Zhou and Enrico Macii and Zhiyuan Yan and Yehia Massoud}, title = {Side-channel resistant system-level design flow for public-key cryptography}, booktitle = {Proceedings of the 17th {ACM} Great Lakes Symposium on {VLSI} 2007, Stresa, Lago Maggiore, Italy, March 11-13, 2007}, pages = {144--147}, publisher = {{ACM}}, year = {2007}, url = {https://doi.org/10.1145/1228784.1228822}, doi = {10.1145/1228784.1228822}, timestamp = {Wed, 16 Aug 2023 21:16:32 +0200}, biburl = {https://dblp.org/rec/conf/glvlsi/SakiyamaMPV07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/glvlsi/MentensSPV07, author = {Nele Mentens and Kazuo Sakiyama and Bart Preneel and Ingrid Verbauwhede}, editor = {Hai Zhou and Enrico Macii and Zhiyuan Yan and Yehia Massoud}, title = {Efficient pipelining for modular multiplication architectures in prime fields}, booktitle = {Proceedings of the 17th {ACM} Great Lakes Symposium on {VLSI} 2007, Stresa, Lago Maggiore, Italy, March 11-13, 2007}, pages = {534--539}, publisher = {{ACM}}, year = {2007}, url = {https://doi.org/10.1145/1228784.1228911}, doi = {10.1145/1228784.1228911}, timestamp = {Fri, 09 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/glvlsi/MentensSPV07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iscas/BatinaMSPV07, author = {Lejla Batina and Nele Mentens and Kazuo Sakiyama and Bart Preneel and Ingrid Verbauwhede}, title = {Public-Key Cryptography on the Top of a Needle}, booktitle = {International Symposium on Circuits and Systems {(ISCAS} 2007), 27-20 May 2007, New Orleans, Louisiana, {USA}}, pages = {1831--1834}, publisher = {{IEEE}}, year = {2007}, url = {https://doi.org/10.1109/ISCAS.2007.378270}, doi = {10.1109/ISCAS.2007.378270}, timestamp = {Fri, 09 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/iscas/BatinaMSPV07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/samos/MentensSBPV07, author = {Nele Mentens and Kazuo Sakiyama and Lejla Batina and Bart Preneel and Ingrid Verbauwhede}, editor = {Holger Blume and Georgi Gaydadjiev and C. John Glossner and Peter M. W. Knijnenburg}, title = {A Side-channel Attack Resistant Programmable {PKC} Coprocessor for Embedded Applications}, booktitle = {Proceedings of the 2007 International Conference on Embedded Computer Systems: Architectures, Modeling and Simulation {(IC-SAMOS} 2007), Samos, Greece, July 16-19, 2007}, pages = {194--200}, publisher = {{IEEE}}, year = {2007}, url = {https://doi.org/10.1109/ICSAMOS.2007.4285751}, doi = {10.1109/ICSAMOS.2007.4285751}, timestamp = {Fri, 09 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/samos/MentensSBPV07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sips/FanSV07, author = {Junfeng Fan and Kazuo Sakiyama and Ingrid Verbauwhede}, title = {Montgomery Modular Multiplication Algorithm on Multi-Core Systems}, booktitle = {Proceedings of the {IEEE} Workshop on Signal Processing Systems, SiPS 2007, Proceedings, October 17-19, 2007, Eton Hotel, Shanghai, China}, pages = {261--266}, publisher = {{IEEE}}, year = {2007}, url = {https://doi.org/10.1109/SIPS.2007.4387555}, doi = {10.1109/SIPS.2007.4387555}, timestamp = {Fri, 30 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/sips/FanSV07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ejasp/YangSV06, author = {Shenglin Yang and Kazuo Sakiyama and Ingrid Verbauwhede}, title = {Efficient and Secure Fingerprint Verification for Embedded Devices}, journal = {{EURASIP} J. Adv. Signal Process.}, volume = {2006}, year = {2006}, url = {https://doi.org/10.1155/ASP/2006/58263}, doi = {10.1155/ASP/2006/58263}, timestamp = {Thu, 12 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ejasp/YangSV06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/arc/SakiyamaMBPV06, author = {Kazuo Sakiyama and Nele Mentens and Lejla Batina and Bart Preneel and Ingrid Verbauwhede}, editor = {Koen Bertels and Jo{\~{a}}o M. P. Cardoso and Stamatis Vassiliadis}, title = {Reconfigurable Modular Arithmetic Logic Unit for High-Performance Public-Key Cryptosystems}, booktitle = {Reconfigurable Computing: Architectures and Applications, Second International Workshop, {ARC} 2006, Delft, The Netherlands, March 1-3, 2006, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {3985}, pages = {347--357}, publisher = {Springer}, year = {2006}, url = {https://doi.org/10.1007/11802839\_43}, doi = {10.1007/11802839\_43}, timestamp = {Fri, 09 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/arc/SakiyamaMBPV06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ches/SakiyamaBPV06, author = {Kazuo Sakiyama and Lejla Batina and Bart Preneel and Ingrid Verbauwhede}, editor = {Louis Goubin and Mitsuru Matsui}, title = {Superscalar Coprocessor for High-Speed Curve-Based Cryptography}, booktitle = {Cryptographic Hardware and Embedded Systems - {CHES} 2006, 8th International Workshop, Yokohama, Japan, October 10-13, 2006, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4249}, pages = {415--429}, publisher = {Springer}, year = {2006}, url = {https://doi.org/10.1007/11894063\_33}, doi = {10.1007/11894063\_33}, timestamp = {Tue, 14 May 2019 10:00:47 +0200}, biburl = {https://dblp.org/rec/conf/ches/SakiyamaBPV06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/esas/BatinaMSPV06, author = {Lejla Batina and Nele Mentens and Kazuo Sakiyama and Bart Preneel and Ingrid Verbauwhede}, editor = {Levente Butty{\'{a}}n and Virgil D. Gligor and Dirk Westhoff}, title = {Low-Cost Elliptic Curve Cryptography for Wireless Sensor Networks}, booktitle = {Security and Privacy in Ad-Hoc and Sensor Networks, Third European Workshop, {ESAS} 2006, Hamburg, Germany, September 20-21, 2006, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {4357}, pages = {6--17}, publisher = {Springer}, year = {2006}, url = {https://doi.org/10.1007/11964254\_3}, doi = {10.1007/11964254\_3}, timestamp = {Fri, 09 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/esas/BatinaMSPV06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fpl/BatinaHHSV06, author = {Lejla Batina and Alireza Hodjat and David Hwang and Kazuo Sakiyama and Ingrid Verbauwhede}, title = {Reconfigurable Architectures for Curve-Based Cryptography on Embedded Micro-Controllers}, booktitle = {Proceedings of the 2006 International Conference on Field Programmable Logic and Applications (FPL), Madrid, Spain, August 28-30, 2006}, pages = {1--4}, publisher = {{IEEE}}, year = {2006}, url = {https://doi.org/10.1109/FPL.2006.311286}, doi = {10.1109/FPL.2006.311286}, timestamp = {Tue, 12 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/fpl/BatinaHHSV06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fpl/MentensSBVP06, author = {Nele Mentens and Kazuo Sakiyama and Lejla Batina and Ingrid Verbauwhede and Bart Preneel}, title = {Fpga-Oriented Secure Data Path Design: Implementation of a Public Key Coprocessor}, booktitle = {Proceedings of the 2006 International Conference on Field Programmable Logic and Applications (FPL), Madrid, Spain, August 28-30, 2006}, pages = {1--6}, publisher = {{IEEE}}, year = {2006}, url = {https://doi.org/10.1109/FPL.2006.311205}, doi = {10.1109/FPL.2006.311205}, timestamp = {Fri, 09 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/fpl/MentensSBVP06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icassp/SakiyamaMPV06, author = {Kazuo Sakiyama and Elke De Mulder and Bart Preneel and Ingrid Verbauwhede}, title = {A Parallel Processing Hardware Architecture for Elliptic Curve Cryptosystems}, booktitle = {2006 {IEEE} International Conference on Acoustics Speech and Signal Processing, {ICASSP} 2006, Toulouse, France, May 14-19, 2006}, pages = {904--907}, publisher = {{IEEE}}, year = {2006}, url = {https://doi.org/10.1109/ICASSP.2006.1660801}, doi = {10.1109/ICASSP.2006.1660801}, timestamp = {Mon, 22 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icassp/SakiyamaMPV06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iscas/SakiyamaPV06, author = {Kazuo Sakiyama and Bart Preneel and Ingrid Verbauwhede}, title = {A fast dual-field modular arithmetic logic unit and its hardware implementation}, booktitle = {International Symposium on Circuits and Systems {(ISCAS} 2006), 21-24 May 2006, Island of Kos, Greece}, publisher = {{IEEE}}, year = {2006}, url = {https://doi.org/10.1109/ISCAS.2006.1692703}, doi = {10.1109/ISCAS.2006.1692703}, timestamp = {Wed, 16 Oct 2019 14:14:49 +0200}, biburl = {https://dblp.org/rec/conf/iscas/SakiyamaPV06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ipps/SchaumontSHV04, author = {Patrick Schaumont and Kazuo Sakiyama and Alireza Hodjat and Ingrid Verbauwhede}, title = {Embedded Software Integration for Coarse-Grain Reconfigurable Systems}, booktitle = {18th International Parallel and Distributed Processing Symposium {(IPDPS} 2004), {CD-ROM} / Abstracts Proceedings, 26-30 April 2004, Santa Fe, New Mexico, {USA}}, publisher = {{IEEE} Computer Society}, year = {2004}, url = {https://doi.org/10.1109/IPDPS.2004.1303110}, doi = {10.1109/IPDPS.2004.1303110}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ipps/SchaumontSHV04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/aspdac/SakiyamaSV03, author = {Kazuo Sakiyama and Patrick Schaumont and Ingrid Verbauwhede}, editor = {Hiroto Yasuura}, title = {Finding the best system design flow for a high-speed {JPEG} encoder}, booktitle = {Proceedings of the 2003 Asia and South Pacific Design Automation Conference, {ASP-DAC} '03, Kitakyushu, Japan, January 21-24, 2003}, pages = {577--578}, publisher = {{ACM}}, year = {2003}, url = {https://doi.org/10.1145/1119772.1119899}, doi = {10.1145/1119772.1119899}, timestamp = {Thu, 11 Mar 2021 17:04:51 +0100}, biburl = {https://dblp.org/rec/conf/aspdac/SakiyamaSV03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/dac/HwangLSSFYHV03, author = {David D. Hwang and Bo{-}Cheng Lai and Patrick Schaumont and Kazuo Sakiyama and Yi Fan and Shenglin Yang and Alireza Hodjat and Ingrid Verbauwhede}, title = {Design flow for {HW} / {SW} acceleration transparency in the thumbpod secure embedded system}, booktitle = {Proceedings of the 40th Design Automation Conference, {DAC} 2003, Anaheim, CA, USA, June 2-6, 2003}, pages = {60--65}, publisher = {{ACM}}, year = {2003}, url = {https://doi.org/10.1145/775832.775850}, doi = {10.1145/775832.775850}, timestamp = {Mon, 15 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/dac/HwangLSSFYHV03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/hldvt/SchaumontSFHYHLV03, author = {Patrick Schaumont and Kazuo Sakiyama and Yi Fan and David D. Hwang and Shenglin Yang and Alireza Hodjat and Bo{-}Cheng Lai and Ingrid Verbauwhede}, title = {Testing ThumbPod: Softcore bugs are hard to find}, booktitle = {Eighth {IEEE} International High-Level Design Validation and Test Workshop 2003, San Francisco, CA, USA, November 12-14, 2003}, pages = {77--82}, publisher = {{IEEE} Computer Society}, year = {2003}, url = {https://doi.org/10.1109/HLDVT.2003.1252478}, doi = {10.1109/HLDVT.2003.1252478}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/hldvt/SchaumontSFHYHLV03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/mse/SakiyamaSHV03, author = {Kazuo Sakiyama and Patrick Schaumont and David Hwang and Ingrid Verbauwhede}, title = {Teaching Trade-offs in System-level Design Methodologies}, booktitle = {2003 International Conference on Microelectronics Systems Education, {MSE} 2003, Educating Tomorrow's Microsystems Designers, Anaheim, CA, USA, June 1-2, 2003}, pages = {62--53}, publisher = {{IEEE} Computer Society}, year = {2003}, url = {https://doi.org/10.1109/MSE.2003.1205256}, doi = {10.1109/MSE.2003.1205256}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/mse/SakiyamaSHV03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.