BibTeX records: Kazuo Sakiyama

download as .bib file

@article{DBLP:journals/tches/HirataMALMNS24,
  author       = {Haruka Hirata and
                  Daiki Miyahara and
                  Victor Arribas and
                  Yang Li and
                  Noriyuki Miura and
                  Svetla Nikova and
                  Kazuo Sakiyama},
  title        = {All You Need Is Fault: Zero-Value Attacks on {AES} and a New {\(\lambda\)}-Detection
                  M{\&}M},
  journal      = {{IACR} Trans. Cryptogr. Hardw. Embed. Syst.},
  volume       = {2024},
  number       = {1},
  pages        = {133--156},
  year         = {2024},
  url          = {https://doi.org/10.46586/tches.v2024.i1.133-156},
  doi          = {10.46586/TCHES.V2024.I1.133-156},
  timestamp    = {Tue, 02 Jan 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tches/HirataMALMNS24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jip/HiraKMHLS23,
  author       = {Ryota Hira and
                  Tomoaki Kitahara and
                  Daiki Miyahara and
                  Yuko Hara{-}Azumi and
                  Yang Li and
                  Kazuo Sakiyama},
  title        = {Software Evaluation for Second Round Candidates in {NIST} Lightweight
                  Cryptography},
  journal      = {J. Inf. Process.},
  volume       = {31},
  pages        = {205--219},
  year         = {2023},
  url          = {https://doi.org/10.2197/ipsjjip.31.205},
  doi          = {10.2197/IPSJJIP.31.205},
  timestamp    = {Thu, 20 Apr 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jip/HiraKMHLS23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tecs/InagakiYLSH23,
  author       = {Saya Inagaki and
                  Mingyu Yang and
                  Yang Li and
                  Kazuo Sakiyama and
                  Yuko Hara{-}Azumi},
  title        = {Power Side-channel Attack Resistant Circuit Designs of {ARX} Ciphers
                  Using High-level Synthesis},
  journal      = {{ACM} Trans. Embed. Comput. Syst.},
  volume       = {22},
  number       = {5},
  pages        = {85:1--85:17},
  year         = {2023},
  url          = {https://doi.org/10.1145/3609507},
  doi          = {10.1145/3609507},
  timestamp    = {Fri, 27 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tecs/InagakiYLSH23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/candar/KasuyaMYS23,
  author       = {Momoka Kasuya and
                  Nobuyoshi Morita and
                  Hiroki Yamazaki and
                  Kazuo Sakiyama},
  title        = {Automated Extraction for Vulnerability Management on {PSIRT:} {A}
                  Case Study of Automotive Industry},
  booktitle    = {Eleventh International Symposium on Computing and Networking, {CANDAR}
                  2023 - Workshops, Matsue, Japan, November 27-30, 2023},
  pages        = {232--238},
  publisher    = {{IEEE}},
  year         = {2023},
  url          = {https://doi.org/10.1109/CANDARW60564.2023.00046},
  doi          = {10.1109/CANDARW60564.2023.00046},
  timestamp    = {Thu, 22 Feb 2024 20:44:52 +0100},
  biburl       = {https://dblp.org/rec/conf/candar/KasuyaMYS23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/candar/TsukaharaHYMLHS23,
  author       = {Maki Tsukahara and
                  Haruka Hirata and
                  Mingyu Yang and
                  Daiki Miyahara and
                  Yang Li and
                  Yuko Hara{-}Azumi and
                  Kazuo Sakiyama},
  title        = {On the Practical Dependency of Fresh Randomness in {AES} S-box with
                  Second-Order {TI}},
  booktitle    = {Eleventh International Symposium on Computing and Networking, {CANDAR}
                  2023 - Workshops, Matsue, Japan, November 27-30, 2023},
  pages        = {286--291},
  publisher    = {{IEEE}},
  year         = {2023},
  url          = {https://doi.org/10.1109/CANDARW60564.2023.00054},
  doi          = {10.1109/CANDARW60564.2023.00054},
  timestamp    = {Thu, 22 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/candar/TsukaharaHYMLHS23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fpga/InagakiYLSH23,
  author       = {Saya Inagaki and
                  Mingyu Yang and
                  Yang Li and
                  Kazuo Sakiyama and
                  Yuko Hara{-}Azumi},
  editor       = {Paolo Ienne and
                  Zhiru Zhang},
  title        = {Power Side-channel Countermeasures for {ARX} Ciphers using High-level
                  Synthesis},
  booktitle    = {Proceedings of the 2023 {ACM/SIGDA} International Symposium on Field
                  Programmable Gate Arrays, {FPGA} 2023, Monterey, CA, USA, February
                  12-14, 2023},
  pages        = {52},
  publisher    = {{ACM}},
  year         = {2023},
  url          = {https://doi.org/10.1145/3543622.3573167},
  doi          = {10.1145/3543622.3573167},
  timestamp    = {Tue, 09 May 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/fpga/InagakiYLSH23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/MatsubaraMWIS23,
  author       = {Yuiko Matsubara and
                  Daiki Miyahara and
                  Yohei Watanabe and
                  Mitsugu Iwamoto and
                  Kazuo Sakiyama},
  title        = {Abstraction Model of Probing and {DFA} Attacks on Block Ciphers},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {443},
  year         = {2023},
  url          = {https://eprint.iacr.org/2023/443},
  timestamp    = {Fri, 31 Mar 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/MatsubaraMWIS23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/HirataMALMNS23,
  author       = {Haruka Hirata and
                  Daiki Miyahara and
                  Victor Arribas and
                  Yang Li and
                  Noriyuki Miura and
                  Svetla Nikova and
                  Kazuo Sakiyama},
  title        = {All You Need Is Fault: Zero-Value Attacks on {AES} and a New {\(\lambda\)}-Detection
                  M{\&}M},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1129},
  year         = {2023},
  url          = {https://eprint.iacr.org/2023/1129},
  timestamp    = {Fri, 04 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/HirataMALMNS23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieiceta/TakamiSSL22,
  author       = {Go Takami and
                  Takeshi Sugawara and
                  Kazuo Sakiyama and
                  Yang Li},
  title        = {Mixture-Based 5-Round Physical Attack against {AES:} Attack Proposal
                  and Noise Evaluation},
  journal      = {{IEICE} Trans. Fundam. Electron. Commun. Comput. Sci.},
  volume       = {105-A},
  number       = {3},
  pages        = {289--299},
  year         = {2022},
  url          = {https://doi.org/10.1587/transfun.2021cip0016},
  doi          = {10.1587/TRANSFUN.2021CIP0016},
  timestamp    = {Fri, 26 Aug 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ieiceta/TakamiSSL22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ic-nc/KitaharaHHMLS22,
  author       = {Tomoaki Kitahara and
                  Ryota Hira and
                  Yuko Hara{-}Azumi and
                  Daiki Miyahara and
                  Yang Li and
                  Kazuo Sakiyama},
  title        = {Optimized Software Implementations of Ascon, Grain-128AEAD, and TinyJambu
                  on {ARM} Cortex-M0},
  booktitle    = {2022 Tenth International Symposium on Computing and Networking, {CANDAR}
                  2022 - Workshops, Himeji, Japan, November 21-24, 2022},
  pages        = {316--322},
  publisher    = {{IEEE}},
  year         = {2022},
  url          = {https://doi.org/10.1109/CANDARW57323.2022.00030},
  doi          = {10.1109/CANDARW57323.2022.00030},
  timestamp    = {Thu, 23 Mar 2023 08:30:32 +0100},
  biburl       = {https://dblp.org/rec/conf/ic-nc/KitaharaHHMLS22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isqed/InagakiYLSH22,
  author       = {Saya Inagaki and
                  Mingyu Yang and
                  Yang Li and
                  Kazuo Sakiyama and
                  Yuko Hara{-}Azumi},
  title        = {Examining Vulnerability of HLS-designed Chaskey-12 Circuits to Power
                  Side-Channel Attacks},
  booktitle    = {23rd International Symposium on Quality Electronic Design, {ISQED}
                  2022, Santa Clara, CA, USA, April 6-7, 2022},
  pages        = {1},
  publisher    = {{IEEE}},
  year         = {2022},
  url          = {https://doi.org/10.1109/ISQED54688.2022.9806252},
  doi          = {10.1109/ISQED54688.2022.9806252},
  timestamp    = {Tue, 21 Feb 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/isqed/InagakiYLSH22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secitc/KomanoIOS22,
  author       = {Yuichi Komano and
                  Mitsugu Iwamoto and
                  Kazuo Ohta and
                  Kazuo Sakiyama},
  editor       = {Giampaolo Bella and
                  Mihai Doinea and
                  Helge Janicke},
  title        = {Lightweight Authentication Using Noisy Key Derived from Physically
                  Unclonable Function},
  booktitle    = {Innovative Security Solutions for Information Technology and Communications
                  - 15th International Conference, SecITC 2022, Virtual Event, December
                  8-9, 2022, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {13809},
  pages        = {203--221},
  publisher    = {Springer},
  year         = {2022},
  url          = {https://doi.org/10.1007/978-3-031-32636-3\_12},
  doi          = {10.1007/978-3-031-32636-3\_12},
  timestamp    = {Fri, 02 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/secitc/KomanoIOS22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secitc/ShimanoSM22,
  author       = {Masahisa Shimano and
                  Kazuo Sakiyama and
                  Daiki Miyahara},
  editor       = {Giampaolo Bella and
                  Mihai Doinea and
                  Helge Janicke},
  title        = {Towards Verifying Physical Assumption in Card-Based Cryptography},
  booktitle    = {Innovative Security Solutions for Information Technology and Communications
                  - 15th International Conference, SecITC 2022, Virtual Event, December
                  8-9, 2022, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {13809},
  pages        = {289--305},
  publisher    = {Springer},
  year         = {2022},
  url          = {https://doi.org/10.1007/978-3-031-32636-3\_17},
  doi          = {10.1007/978-3-031-32636-3\_17},
  timestamp    = {Fri, 02 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/secitc/ShimanoSM22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/HiraKMHLS22,
  author       = {Ryota Hira and
                  Tomoaki Kitahara and
                  Daiki Miyahara and
                  Yuko Hara{-}Azumi and
                  Yang Li and
                  Kazuo Sakiyama},
  title        = {Software Evaluation for Second Round Candidates in {NIST} Lightweight
                  Cryptography},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {591},
  year         = {2022},
  url          = {https://eprint.iacr.org/2022/591},
  timestamp    = {Mon, 20 Jun 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/HiraKMHLS22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/asianhost/KudoSSHL21,
  author       = {Rei Kudo and
                  Takeshi Sugawara and
                  Kazuo Sakiyama and
                  Yuko Hara{-}Azumi and
                  Yang Li},
  title        = {Revisiting System Noise in Side-Channel Attacks: Mutual Assistant
                  {SCA} vs. Genetic Algorithm},
  booktitle    = {Asian Hardware Oriented Security and Trust Symposium, AsianHOST 2021,
                  Shanghai, China, December 16-18, 2021},
  pages        = {1--6},
  publisher    = {{IEEE}},
  year         = {2021},
  url          = {https://doi.org/10.1109/AsianHOST53231.2021.9699725},
  doi          = {10.1109/ASIANHOST53231.2021.9699725},
  timestamp    = {Fri, 26 Aug 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/asianhost/KudoSSHL21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwdw/HsiaoTKSM21,
  author       = {Annjhih Hsiao and
                  Takao Takenouchi and
                  Hiroaki Kikuchi and
                  Kazuo Sakiyama and
                  Noriyuki Miura},
  editor       = {Xianfeng Zhao and
                  Alessandro Piva and
                  Pedro Comesa{\~{n}}a Alfaro},
  title        = {More Accurate and Robust PRNU-Based Source Camera Identification with
                  3-Step 3-Class Approach},
  booktitle    = {Digital Forensics and Watermarking - 20th International Workshop,
                  {IWDW} 2021, Beijing, China, November 20-22, 2021, Revised Selected
                  Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {13180},
  pages        = {87--101},
  publisher    = {Springer},
  year         = {2021},
  url          = {https://doi.org/10.1007/978-3-030-95398-0\_7},
  doi          = {10.1007/978-3-030-95398-0\_7},
  timestamp    = {Fri, 22 Apr 2022 14:23:22 +0200},
  biburl       = {https://dblp.org/rec/conf/iwdw/HsiaoTKSM21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/esl/SakiyamaFMM20,
  author       = {Kazuo Sakiyama and
                  Tatsuya Fujii and
                  Kohei Matsuda and
                  Noriyuki Miura},
  title        = {Flush Code Eraser: Fast Attack Response Invalidating Cryptographic
                  Sensitive Data},
  journal      = {{IEEE} Embed. Syst. Lett.},
  volume       = {12},
  number       = {2},
  pages        = {37--40},
  year         = {2020},
  url          = {https://doi.org/10.1109/LES.2019.2949788},
  doi          = {10.1109/LES.2019.2949788},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/esl/SakiyamaFMM20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acns/TakatoiSS020,
  author       = {Go Takatoi and
                  Takeshi Sugawara and
                  Kazuo Sakiyama and
                  Yang Li},
  editor       = {Jianying Zhou and
                  Mauro Conti and
                  Chuadhry Mujeeb Ahmed and
                  Man Ho Au and
                  Lejla Batina and
                  Zhou Li and
                  Jingqiang Lin and
                  Eleonora Losiouk and
                  Bo Luo and
                  Suryadipta Majumdar and
                  Weizhi Meng and
                  Mart{\'{\i}}n Ochoa and
                  Stjepan Picek and
                  Georgios Portokalidis and
                  Cong Wang and
                  Kehuan Zhang},
  title        = {Simple Electromagnetic Analysis Against Activation Functions of Deep
                  Neural Networks},
  booktitle    = {Applied Cryptography and Network Security Workshops - {ACNS} 2020
                  Satellite Workshops, AIBlock, AIHWS, AIoTS, Cloud S{\&}P, SCI,
                  SecMT, and SiMLA, Rome, Italy, October 19-22, 2020, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {12418},
  pages        = {181--197},
  publisher    = {Springer},
  year         = {2020},
  url          = {https://doi.org/10.1007/978-3-030-61638-0\_11},
  doi          = {10.1007/978-3-030-61638-0\_11},
  timestamp    = {Tue, 21 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acns/TakatoiSS020.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/gcce/TakakiLSNSS20,
  author       = {Tsubasa Takaki and
                  Yang Li and
                  Kazuo Sakiyama and
                  Shoei Nashimoto and
                  Daisuke Suzuki and
                  Takeshi Sugawara},
  title        = {An Optimized Implementation of {AES-GCM} for {FPGA} Acceleration Using
                  High-Level Synthesis},
  booktitle    = {9th {IEEE} Global Conference on Consumer Electronics, {GCCE} 2020,
                  Kobe, Japan, October 13-16, 2020},
  pages        = {176--180},
  publisher    = {{IEEE}},
  year         = {2020},
  url          = {https://doi.org/10.1109/GCCE50665.2020.9291973},
  doi          = {10.1109/GCCE50665.2020.9291973},
  timestamp    = {Tue, 21 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/gcce/TakakiLSNSS20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/gcce/YabuSS20,
  author       = {Marika Yabu and
                  Kazuo Sakiyama and
                  Takeshi Sugawara},
  title        = {Low-Memory Implementation of Authenticated Encryption Algorithm {SAEAES}
                  on {ARM} Cortex-M0 Microcontroller},
  booktitle    = {9th {IEEE} Global Conference on Consumer Electronics, {GCCE} 2020,
                  Kobe, Japan, October 13-16, 2020},
  pages        = {181--185},
  publisher    = {{IEEE}},
  year         = {2020},
  url          = {https://doi.org/10.1109/GCCE50665.2020.9291948},
  doi          = {10.1109/GCCE50665.2020.9291948},
  timestamp    = {Tue, 21 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/gcce/YabuSS20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isita/UemuraWLMISO20,
  author       = {Tomoki Uemura and
                  Yohei Watanabe and
                  Yang Li and
                  Noriyuki Miura and
                  Mitsugu Iwamoto and
                  Kazuo Sakiyama and
                  Kazuo Ohta},
  title        = {A Key Recovery Algorithm Using Random Key Leakage from {AES} Key Schedule},
  booktitle    = {International Symposium on Information Theory and Its Applications,
                  {ISITA} 2020, Kapolei, HI, USA, October 24-27, 2020},
  pages        = {382--386},
  publisher    = {{IEEE}},
  year         = {2020},
  url          = {https://ieeexplore.ieee.org/document/9366106},
  timestamp    = {Fri, 17 Jun 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/isita/UemuraWLMISO20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/mj/SugawaraSSMMN19,
  author       = {Takeshi Sugawara and
                  Natsu Shoji and
                  Kazuo Sakiyama and
                  Kohei Matsuda and
                  Noriyuki Miura and
                  Makoto Nagata},
  title        = {Side-channel leakage from sensor-based countermeasures against fault
                  injection attack},
  journal      = {Microelectron. J.},
  volume       = {90},
  pages        = {63--71},
  year         = {2019},
  url          = {https://doi.org/10.1016/j.mejo.2019.05.017},
  doi          = {10.1016/J.MEJO.2019.05.017},
  timestamp    = {Fri, 26 Aug 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/mj/SugawaraSSMMN19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/scn/KomanoOSIV19,
  author       = {Yuichi Komano and
                  Kazuo Ohta and
                  Kazuo Sakiyama and
                  Mitsugu Iwamoto and
                  Ingrid Verbauwhede},
  title        = {Single-Round Pattern Matching Key Generation Using Physically Unclonable
                  Function},
  journal      = {Secur. Commun. Networks},
  volume       = {2019},
  pages        = {1719585:1--1719585:13},
  year         = {2019},
  url          = {https://doi.org/10.1155/2019/1719585},
  doi          = {10.1155/2019/1719585},
  timestamp    = {Thu, 10 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/scn/KomanoOSIV19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccoms/ShojiSIS19,
  author       = {Natsu Shoji and
                  Takeshi Sugawara and
                  Mitsugu Iwamoto and
                  Kazuo Sakiyama},
  title        = {An Abstraction Model for 1-bit Probing Attack on Block Ciphers},
  booktitle    = {{IEEE} 4th International Conference on Computer and Communication
                  Systems, {ICCCS} 2019, Singapore, February 23-25, 2019},
  pages        = {502--506},
  publisher    = {{IEEE}},
  year         = {2019},
  url          = {https://doi.org/10.1109/CCOMS.2019.8821754},
  doi          = {10.1109/CCOMS.2019.8821754},
  timestamp    = {Tue, 21 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ccoms/ShojiSIS19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cisc/0001HTMMSS19,
  author       = {Yang Li and
                  Ryota Hatano and
                  Sho Tada and
                  Kohei Matsuda and
                  Noriyuki Miura and
                  Takeshi Sugawara and
                  Kazuo Sakiyama},
  editor       = {Zhe Liu and
                  Moti Yung},
  title        = {Side-Channel Leakage of Alarm Signal for a Bulk-Current-Based Laser
                  Sensor},
  booktitle    = {Information Security and Cryptology - 15th International Conference,
                  Inscrypt 2019, Nanjing, China, December 6-8, 2019, Revised Selected
                  Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {12020},
  pages        = {346--361},
  publisher    = {Springer},
  year         = {2019},
  url          = {https://doi.org/10.1007/978-3-030-42921-8\_20},
  doi          = {10.1007/978-3-030-42921-8\_20},
  timestamp    = {Fri, 26 Aug 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cisc/0001HTMMSS19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fps/SugimotoHSS19,
  author       = {Hakuei Sugimoto and
                  Ryota Hatano and
                  Natsu Shoji and
                  Kazuo Sakiyama},
  editor       = {Abdelmalek Benzekri and
                  Michel Barbeau and
                  Guang Gong and
                  Romain Laborde and
                  Joaqu{\'{\i}}n Garc{\'{\i}}a{-}Alfaro},
  title        = {Validating the {DFA} Attack Resistance of {AES} (Short Paper)},
  booktitle    = {Foundations and Practice of Security - 12th International Symposium,
                  {FPS} 2019, Toulouse, France, November 5-7, 2019, Revised Selected
                  Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {12056},
  pages        = {371--378},
  publisher    = {Springer},
  year         = {2019},
  url          = {https://doi.org/10.1007/978-3-030-45371-8\_25},
  doi          = {10.1007/978-3-030-45371-8\_25},
  timestamp    = {Wed, 07 Dec 2022 23:10:28 +0100},
  biburl       = {https://dblp.org/rec/conf/fps/SugimotoHSS19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secitc/YashiroHKS19,
  author       = {Risa Yashiro and
                  Yohei Hori and
                  Toshihiro Katashita and
                  Kazuo Sakiyama},
  editor       = {Emil Simion and
                  R{\'{e}}mi G{\'{e}}raud{-}Stewart},
  title        = {A Deep Learning Attack Countermeasure with Intentional Noise for a
                  PUF-Based Authentication Scheme},
  booktitle    = {Innovative Security Solutions for Information Technology and Communications
                  - 12th International Conference, SecITC 2019, Bucharest, Romania,
                  November 14-15, 2019, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {12001},
  pages        = {78--94},
  publisher    = {Springer},
  year         = {2019},
  url          = {https://doi.org/10.1007/978-3-030-41025-4\_6},
  doi          = {10.1007/978-3-030-41025-4\_6},
  timestamp    = {Fri, 06 Mar 2020 14:27:55 +0100},
  biburl       = {https://dblp.org/rec/conf/secitc/YashiroHKS19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieicet/YashiroSIS18,
  author       = {Risa Yashiro and
                  Takeshi Sugawara and
                  Mitsugu Iwamoto and
                  Kazuo Sakiyama},
  title        = {\emph{Q}-Class Authentication System for Double Arbiter {PUF}},
  journal      = {{IEICE} Trans. Fundam. Electron. Commun. Comput. Sci.},
  volume       = {101-A},
  number       = {1},
  pages        = {129--137},
  year         = {2018},
  url          = {https://doi.org/10.1587/transfun.E101.A.129},
  doi          = {10.1587/TRANSFUN.E101.A.129},
  timestamp    = {Fri, 26 Aug 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ieicet/YashiroSIS18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jssc/MatsudaFSSSHNM18,
  author       = {Kohei Matsuda and
                  Tatsuya Fujii and
                  Natsu Shoji and
                  Takeshi Sugawara and
                  Kazuo Sakiyama and
                  Yu{-}ichi Hayashi and
                  Makoto Nagata and
                  Noriyuki Miura},
  title        = {A 286 F\({}^{\mbox{2}}\)/Cell Distributed Bulk-Current Sensor and
                  Secure Flush Code Eraser Against Laser Fault Injection Attack on Cryptographic
                  Processor},
  journal      = {{IEEE} J. Solid State Circuits},
  volume       = {53},
  number       = {11},
  pages        = {3174--3182},
  year         = {2018},
  url          = {https://doi.org/10.1109/JSSC.2018.2869142},
  doi          = {10.1109/JSSC.2018.2869142},
  timestamp    = {Fri, 26 Aug 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jssc/MatsudaFSSSHNM18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/NashimotoSSS18,
  author       = {Shoei Nashimoto and
                  Daisuke Suzuki and
                  Takeshi Sugawara and
                  Kazuo Sakiyama},
  editor       = {Jong Kim and
                  Gail{-}Joon Ahn and
                  Seungjoo Kim and
                  Yongdae Kim and
                  Javier L{\'{o}}pez and
                  Taesoo Kim},
  title        = {Sensor CON-Fusion: Defeating Kalman Filter in Signal Injection Attack},
  booktitle    = {Proceedings of the 2018 on Asia Conference on Computer and Communications
                  Security, AsiaCCS 2018, Incheon, Republic of Korea, June 04-08, 2018},
  pages        = {511--524},
  publisher    = {{ACM}},
  year         = {2018},
  url          = {https://doi.org/10.1145/3196494.3196506},
  doi          = {10.1145/3196494.3196506},
  timestamp    = {Fri, 26 Aug 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ccs/NashimotoSSS18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/dsd/DangerYGMSSMN18,
  author       = {Jean{-}Luc Danger and
                  Risa Yashiro and
                  Tarik Graba and
                  Yves Mathieu and
                  Abdelmalek Si{-}Merabet and
                  Kazuo Sakiyama and
                  Noriyuki Miura and
                  Makoto Nagata},
  editor       = {Martin Novotn{\'{y}} and
                  Nikos Konofaos and
                  Amund Skavhaug},
  title        = {Analysis of Mixed {PUF-TRNG} Circuit Based on SR-Latches in {FD-SOI}
                  Technology},
  booktitle    = {21st Euromicro Conference on Digital System Design, {DSD} 2018, Prague,
                  Czech Republic, August 29-31, 2018},
  pages        = {508--515},
  publisher    = {{IEEE} Computer Society},
  year         = {2018},
  url          = {https://doi.org/10.1109/DSD.2018.00090},
  doi          = {10.1109/DSD.2018.00090},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/dsd/DangerYGMSSMN18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ic-nc/MatsumuraSS18,
  author       = {Ryuga Matsumura and
                  Takeshi Sugawara and
                  Kazuo Sakiyama},
  title        = {A Secure LiDAR with AES-Based Side-Channel Fingerprinting},
  booktitle    = {Sixth International Symposium on Computing and Networking, {CANDAR}
                  Workshops 2018, Takayama, Japan, November 27-30, 2018},
  pages        = {479--482},
  publisher    = {{IEEE} Computer Society},
  year         = {2018},
  url          = {https://doi.org/10.1109/CANDARW.2018.00092},
  doi          = {10.1109/CANDARW.2018.00092},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ic-nc/MatsumuraSS18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ispec/YuanLSSW18,
  author       = {Zhiwei Yuan and
                  Yang Li and
                  Kazuo Sakiyama and
                  Takeshi Sugawara and
                  Jian Wang},
  editor       = {Chunhua Su and
                  Hiroaki Kikuchi},
  title        = {Recovering Memory Access Sequence with Differential Flush+Reload Attack},
  booktitle    = {Information Security Practice and Experience - 14th International
                  Conference, {ISPEC} 2018, Tokyo, Japan, September 25-27, 2018, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {11125},
  pages        = {424--439},
  publisher    = {Springer},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-3-319-99807-7\_26},
  doi          = {10.1007/978-3-319-99807-7\_26},
  timestamp    = {Tue, 21 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ispec/YuanLSSW18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isscc/MatsudaFSSSHNM18,
  author       = {Kohei Matsuda and
                  Tatsuya Fujii and
                  Natsu Shoji and
                  Takeshi Sugawara and
                  Kazuo Sakiyama and
                  Yu{-}ichi Hayashi and
                  Makoto Nagata and
                  Noriyuki Miura},
  title        = {A 286F\({}^{\mbox{2}}\)/cell distributed bulk-current sensor and secure
                  flush code eraser against laser fault injection attack},
  booktitle    = {2018 {IEEE} International Solid-State Circuits Conference, {ISSCC}
                  2018, San Francisco, CA, USA, February 11-15, 2018},
  pages        = {352--354},
  publisher    = {{IEEE}},
  year         = {2018},
  url          = {https://doi.org/10.1109/ISSCC.2018.8310329},
  doi          = {10.1109/ISSCC.2018.8310329},
  timestamp    = {Fri, 26 Aug 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/isscc/MatsudaFSSSHNM18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieiceee/NagataFMHHS17,
  author       = {Makoto Nagata and
                  Daisuke Fujimoto and
                  Noriyuki Miura and
                  Naofumi Homma and
                  Yu{-}ichi Hayashi and
                  Kazuo Sakiyama},
  title        = {Protecting cryptographic integrated circuits with side-channel information},
  journal      = {{IEICE} Electron. Express},
  volume       = {14},
  number       = {2},
  pages        = {20162005},
  year         = {2017},
  url          = {https://doi.org/10.1587/elex.14.20162005},
  doi          = {10.1587/ELEX.14.20162005},
  timestamp    = {Fri, 12 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ieiceee/NagataFMHHS17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fdtc/SugawaraSSMMN17,
  author       = {Takeshi Sugawara and
                  Natsu Shoji and
                  Kazuo Sakiyama and
                  Kohei Matsuda and
                  Noriyuki Miura and
                  Makoto Nagata},
  title        = {Exploiting Bitflip Detector for Non-invasive Probing and its Application
                  to Ineffective Fault Analysis},
  booktitle    = {2017 Workshop on Fault Diagnosis and Tolerance in Cryptography, {FDTC}
                  2017, Taipei, Taiwan, September 25, 2017},
  pages        = {49--56},
  publisher    = {{IEEE} Computer Society},
  year         = {2017},
  url          = {https://doi.org/10.1109/FDTC.2017.17},
  doi          = {10.1109/FDTC.2017.17},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/fdtc/SugawaraSSMMN17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wisa/KasuyaS17,
  author       = {Momoka Kasuya and
                  Kazuo Sakiyama},
  editor       = {Brent ByungHoon Kang and
                  Taesoo Kim},
  title        = {Improved {EM} Side-Channel Authentication Using Profile-Based {XOR}
                  Model},
  booktitle    = {Information Security Applications - 18th International Conference,
                  {WISA} 2017, Jeju Island, Korea, August 24-26, 2017, Revised Selected
                  Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {10763},
  pages        = {173--183},
  publisher    = {Springer},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-319-93563-8\_15},
  doi          = {10.1007/978-3-319-93563-8\_15},
  timestamp    = {Tue, 14 May 2019 10:00:35 +0200},
  biburl       = {https://dblp.org/rec/conf/wisa/KasuyaS17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wisa/MiyamotoSS17,
  author       = {Eito Miyamoto and
                  Takeshi Sugawara and
                  Kazuo Sakiyama},
  editor       = {Brent ByungHoon Kang and
                  Taesoo Kim},
  title        = {Efficient Software Implementation of Modular Multiplication in Prime
                  Fields on TI's {DSP} {TMS320C6678}},
  booktitle    = {Information Security Applications - 18th International Conference,
                  {WISA} 2017, Jeju Island, Korea, August 24-26, 2017, Revised Selected
                  Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {10763},
  pages        = {261--273},
  publisher    = {Springer},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-319-93563-8\_22},
  doi          = {10.1007/978-3-319-93563-8\_22},
  timestamp    = {Tue, 21 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/wisa/MiyamotoSS17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/host/MatsudaMNHFS16,
  author       = {Kohei Matsuda and
                  Noriyuki Miura and
                  Makoto Nagata and
                  Yu{-}ichi Hayashi and
                  Tatsuya Fujii and
                  Kazuo Sakiyama},
  title        = {On-chip substrate-bounce monitoring for laser-fault countermeasure},
  booktitle    = {2016 {IEEE} Asian Hardware-Oriented Security and Trust, AsianHOST
                  2016, Yilan, Taiwan, December 19-20, 2016},
  pages        = {1--6},
  publisher    = {{IEEE} Computer Society},
  year         = {2016},
  url          = {https://doi.org/10.1109/AsianHOST.2016.7835565},
  doi          = {10.1109/ASIANHOST.2016.7835565},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/host/MatsudaMNHFS16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwsec/YashiroMIS16,
  author       = {Risa Yashiro and
                  Takanori Machida and
                  Mitsugu Iwamoto and
                  Kazuo Sakiyama},
  editor       = {Kazuto Ogawa and
                  Katsunari Yoshioka},
  title        = {Deep-Learning-Based Security Evaluation on Authentication Systems
                  Using Arbiter {PUF} and Its Variants},
  booktitle    = {Advances in Information and Computer Security - 11th International
                  Workshop on Security, {IWSEC} 2016, Tokyo, Japan, September 12-14,
                  2016, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {9836},
  pages        = {267--285},
  publisher    = {Springer},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-319-44524-3\_16},
  doi          = {10.1007/978-3-319-44524-3\_16},
  timestamp    = {Tue, 14 May 2019 10:00:52 +0200},
  biburl       = {https://dblp.org/rec/conf/iwsec/YashiroMIS16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@book{DBLP:books/daglib/0036974,
  author       = {Kazuo Sakiyama and
                  Yu Sasaki and
                  Yang Li},
  title        = {Security of Block Ciphers - From Algorithm Design to Hardware Implementation},
  publisher    = {Wiley},
  year         = {2015},
  url          = {http://eu.wiley.com/WileyCDA/WileyTitle/productCd-1118660013.html},
  isbn         = {978-1-118-66001-0},
  timestamp    = {Fri, 23 Jun 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/books/daglib/0036974.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jce/YamamotoSIOTIT15,
  author       = {Dai Yamamoto and
                  Kazuo Sakiyama and
                  Mitsugu Iwamoto and
                  Kazuo Ohta and
                  Masahiko Takenaka and
                  Kouichi Itoh and
                  Naoya Torii},
  title        = {A new method for enhancing variety and maintaining reliability of
                  {PUF} responses and its evaluation on ASICs},
  journal      = {J. Cryptogr. Eng.},
  volume       = {5},
  number       = {3},
  pages        = {187--199},
  year         = {2015},
  url          = {https://doi.org/10.1007/s13389-014-0091-9},
  doi          = {10.1007/S13389-014-0091-9},
  timestamp    = {Thu, 09 Jul 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jce/YamamotoSIOTIT15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tvlsi/EndoLHSOFNKDA15,
  author       = {Sho Endo and
                  Yang Li and
                  Naofumi Homma and
                  Kazuo Sakiyama and
                  Kazuo Ohta and
                  Daisuke Fujimoto and
                  Makoto Nagata and
                  Toshihiro Katashita and
                  Jean{-}Luc Danger and
                  Takafumi Aoki},
  title        = {A Silicon-Level Countermeasure Against Fault Sensitivity Analysis
                  and Its Evaluation},
  journal      = {{IEEE} Trans. Very Large Scale Integr. Syst.},
  volume       = {23},
  number       = {8},
  pages        = {1429--1438},
  year         = {2015},
  url          = {https://doi.org/10.1109/TVLSI.2014.2339892},
  doi          = {10.1109/TVLSI.2014.2339892},
  timestamp    = {Wed, 11 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tvlsi/EndoLHSOFNKDA15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/aspdac/MachidaYIS15,
  author       = {Takanori Machida and
                  Dai Yamamoto and
                  Mitsugu Iwamoto and
                  Kazuo Sakiyama},
  title        = {Implementation of double arbiter {PUF} and its performance evaluation
                  on {FPGA}},
  booktitle    = {The 20th Asia and South Pacific Design Automation Conference, {ASP-DAC}
                  2015, Chiba, Japan, January 19-22, 2015},
  pages        = {6--7},
  publisher    = {{IEEE}},
  year         = {2015},
  url          = {https://doi.org/10.1109/ASPDAC.2015.7058919},
  doi          = {10.1109/ASPDAC.2015.7058919},
  timestamp    = {Wed, 16 Oct 2019 14:14:52 +0200},
  biburl       = {https://dblp.org/rec/conf/aspdac/MachidaYIS15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwsec/YagasakiS15,
  author       = {Reina Yagasaki and
                  Kazuo Sakiyama},
  editor       = {Keisuke Tanaka and
                  Yuji Suga},
  title        = {Artifact-Metric-Based Authentication for Bottles of Wine (Short Paper)},
  booktitle    = {Advances in Information and Computer Security - 10th International
                  Workshop on Security, {IWSEC} 2015, Nara, Japan, August 26-28, 2015,
                  Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {9241},
  pages        = {335--344},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-319-22425-1\_20},
  doi          = {10.1007/978-3-319-22425-1\_20},
  timestamp    = {Tue, 14 May 2019 10:00:52 +0200},
  biburl       = {https://dblp.org/rec/conf/iwsec/YagasakiS15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieicet/FujimotoMNHHAHKSLBBBD14,
  author       = {Daisuke Fujimoto and
                  Noriyuki Miura and
                  Makoto Nagata and
                  Yu{-}ichi Hayashi and
                  Naofumi Homma and
                  Takafumi Aoki and
                  Yohei Hori and
                  Toshihiro Katashita and
                  Kazuo Sakiyama and
                  Thanh{-}Ha Le and
                  Julien Bringer and
                  Pirouz Bazargan{-}Sabet and
                  Shivam Bhasin and
                  Jean{-}Luc Danger},
  title        = {Power Noise Measurements of Cryptographic {VLSI} Circuits Regarding
                  Side-Channel Information Leakage},
  journal      = {{IEICE} Trans. Electron.},
  volume       = {97-C},
  number       = {4},
  pages        = {272--279},
  year         = {2014},
  url          = {https://doi.org/10.1587/transele.E97.C.272},
  doi          = {10.1587/TRANSELE.E97.C.272},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ieicet/FujimotoMNHHAHKSLBBBD14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jce/ClavierDDEGGHKLLNOSSSSVWW14,
  author       = {Christophe Clavier and
                  Jean{-}Luc Danger and
                  Guillaume Duc and
                  M. Abdelaziz Elaabid and
                  Beno{\^{\i}}t G{\'{e}}rard and
                  Sylvain Guilley and
                  Annelie Heuser and
                  Michael Kasper and
                  Yang Li and
                  Victor Lomn{\'{e}} and
                  Daisuke Nakatsu and
                  Kazuo Ohta and
                  Kazuo Sakiyama and
                  Laurent Sauvage and
                  Werner Schindler and
                  Marc St{\"{o}}ttinger and
                  Nicolas Veyrat{-}Charvillon and
                  Matthieu Walle and
                  Antoine Wurcker},
  title        = {Practical improvements of side-channel attacks on {AES:} feedback
                  from the 2nd {DPA} contest},
  journal      = {J. Cryptogr. Eng.},
  volume       = {4},
  number       = {4},
  pages        = {259--274},
  year         = {2014},
  url          = {https://doi.org/10.1007/s13389-014-0075-9},
  doi          = {10.1007/S13389-014-0075-9},
  timestamp    = {Thu, 23 Jun 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jce/ClavierDDEGGHKLLNOSSSSVWW14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jip/SakiyamaLGHIHAO14,
  author       = {Kazuo Sakiyama and
                  Yang Li and
                  Shigeto Gomisawa and
                  Yu{-}ichi Hayashi and
                  Mitsugu Iwamoto and
                  Naofumi Homma and
                  Takafumi Aoki and
                  Kazuo Ohta},
  title        = {Practical {DFA} Strategy for {AES} Under Limited-access Conditions},
  journal      = {J. Inf. Process.},
  volume       = {22},
  number       = {2},
  pages        = {142--151},
  year         = {2014},
  url          = {https://doi.org/10.2197/ipsjjip.22.142},
  doi          = {10.2197/IPSJJIP.22.142},
  timestamp    = {Tue, 16 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jip/SakiyamaLGHIHAO14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fedcsis/MachidaYIS14,
  author       = {Takanori Machida and
                  Dai Yamamoto and
                  Mitsugu Iwamoto and
                  Kazuo Sakiyama},
  editor       = {Maria Ganzha and
                  Leszek A. Maciaszek and
                  Marcin Paprzycki},
  title        = {A New Mode of Operation for Arbiter {PUF} to Improve Uniqueness on
                  {FPGA}},
  booktitle    = {Proceedings of the 2014 Federated Conference on Computer Science and
                  Information Systems, Warsaw, Poland, September 7-10, 2014},
  series       = {Annals of Computer Science and Information Systems},
  volume       = {2},
  pages        = {871--878},
  year         = {2014},
  url          = {https://doi.org/10.15439/2014F140},
  doi          = {10.15439/2014F140},
  timestamp    = {Mon, 07 Aug 2023 11:27:16 +0200},
  biburl       = {https://dblp.org/rec/conf/fedcsis/MachidaYIS14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fedcsis/YamamotoTST14,
  author       = {Dai Yamamoto and
                  Masahiko Takenaka and
                  Kazuo Sakiyama and
                  Naoya Torii},
  editor       = {Maria Ganzha and
                  Leszek A. Maciaszek and
                  Marcin Paprzycki},
  title        = {Security Evaluation of Bistable Ring PUFs on FPGAs using Differential
                  and Linear Analysis},
  booktitle    = {Proceedings of the 2014 Federated Conference on Computer Science and
                  Information Systems, Warsaw, Poland, September 7-10, 2014},
  series       = {Annals of Computer Science and Information Systems},
  volume       = {2},
  pages        = {911--918},
  year         = {2014},
  url          = {https://doi.org/10.15439/2014F122},
  doi          = {10.15439/2014F122},
  timestamp    = {Mon, 07 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/fedcsis/YamamotoTST14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwsec/YamamotoTST14,
  author       = {Dai Yamamoto and
                  Masahiko Takenaka and
                  Kazuo Sakiyama and
                  Naoya Torii},
  editor       = {Maki Yoshida and
                  Koichi Mouri},
  title        = {A Technique Using PUFs for Protecting Circuit Layout Designs against
                  Reverse Engineering},
  booktitle    = {Advances in Information and Computer Security - 9th International
                  Workshop on Security, {IWSEC} 2014, Hirosaki, Japan, August 27-29,
                  2014. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {8639},
  pages        = {158--173},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-319-09843-2\_13},
  doi          = {10.1007/978-3-319-09843-2\_13},
  timestamp    = {Tue, 14 May 2019 10:00:52 +0200},
  biburl       = {https://dblp.org/rec/conf/iwsec/YamamotoTST14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/rfidsec/LiMWOS14,
  author       = {Yang Li and
                  Shugo Mikami and
                  Dai Watanabe and
                  Kazuo Ohta and
                  Kazuo Sakiyama},
  editor       = {Nai{-}Wei Lo and
                  Yingjiu Li and
                  Kuo{-}Hui Yeh},
  title        = {Single-Chip Implementation and Evaluation of Passive {UHF} {RFID}
                  Tag with Hash-Based Mutual Authentication},
  booktitle    = {Radio Frequency Identification System Security - RFIDsec'14 Asia Workshop
                  Proceedings, Hualien, Taiwan, November 27-28, 2014},
  series       = {Cryptology and Information Security Series},
  volume       = {12},
  pages        = {3--15},
  publisher    = {{IOS} Press},
  year         = {2014},
  url          = {https://doi.org/10.3233/978-1-61499-462-6-3},
  doi          = {10.3233/978-1-61499-462-6-3},
  timestamp    = {Thu, 22 Jun 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/rfidsec/LiMWOS14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/shonan-reports/SakiyamaSV14,
  author       = {Kazuo Sakiyama and
                  Patrick Schaumont and
                  Ingrid Verbauwhede},
  title        = {Design Methods for Secure Hardware {(NII} Shonan Meeting 2014-11)},
  journal      = {{NII} Shonan Meet. Rep.},
  volume       = {2014},
  year         = {2014},
  url          = {https://shonan.nii.ac.jp/seminars/028/},
  timestamp    = {Thu, 04 Mar 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/shonan-reports/SakiyamaSV14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieicet/LiOS13,
  author       = {Yang Li and
                  Kazuo Ohta and
                  Kazuo Sakiyama},
  title        = {A New Type of Fault-Based Attack: Fault Behavior Analysis},
  journal      = {{IEICE} Trans. Fundam. Electron. Commun. Comput. Sci.},
  volume       = {96-A},
  number       = {1},
  pages        = {177--184},
  year         = {2013},
  url          = {https://doi.org/10.1587/transfun.E96.A.177},
  doi          = {10.1587/TRANSFUN.E96.A.177},
  timestamp    = {Sat, 11 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ieicet/LiOS13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieicet/MikamiYWS13,
  author       = {Shugo Mikami and
                  Hirotaka Yoshida and
                  Dai Watanabe and
                  Kazuo Sakiyama},
  title        = {Correlation Power Analysis and Countermeasure on the Stream Cipher
                  Enocoro-128v2},
  journal      = {{IEICE} Trans. Fundam. Electron. Commun. Comput. Sci.},
  volume       = {96-A},
  number       = {3},
  pages        = {697--704},
  year         = {2013},
  url          = {https://doi.org/10.1587/transfun.E96.A.697},
  doi          = {10.1587/TRANSFUN.E96.A.697},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ieicet/MikamiYWS13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jce/YamamotoSIOTI13,
  author       = {Dai Yamamoto and
                  Kazuo Sakiyama and
                  Mitsugu Iwamoto and
                  Kazuo Ohta and
                  Masahiko Takenaka and
                  Kouichi Itoh},
  title        = {Variety enhancement of {PUF} responses using the locations of random
                  outputting {RS} latches},
  journal      = {J. Cryptogr. Eng.},
  volume       = {3},
  number       = {4},
  pages        = {197--211},
  year         = {2013},
  url          = {https://doi.org/10.1007/s13389-012-0044-0},
  doi          = {10.1007/S13389-012-0044-0},
  timestamp    = {Thu, 09 Jul 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jce/YamamotoSIOTI13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cosade/LiEDHALDOS13,
  author       = {Yang Li and
                  Sho Endo and
                  Nicolas Debande and
                  Naofumi Homma and
                  Takafumi Aoki and
                  Thanh{-}Ha Le and
                  Jean{-}Luc Danger and
                  Kazuo Ohta and
                  Kazuo Sakiyama},
  editor       = {Emmanuel Prouff},
  title        = {Exploring the Relations between Fault Sensitivity and Power Consumption},
  booktitle    = {Constructive Side-Channel Analysis and Secure Design - 4th International
                  Workshop, {COSADE} 2013, Paris, France, March 6-8, 2013, Revised Selected
                  Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {7864},
  pages        = {137--153},
  publisher    = {Springer},
  year         = {2013},
  url          = {https://doi.org/10.1007/978-3-642-40026-1\_9},
  doi          = {10.1007/978-3-642-40026-1\_9},
  timestamp    = {Tue, 14 May 2019 10:00:39 +0200},
  biburl       = {https://dblp.org/rec/conf/cosade/LiEDHALDOS13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fc/SasakiLSS13,
  author       = {Yu Sasaki and
                  Yang Li and
                  Hikaru Sakamoto and
                  Kazuo Sakiyama},
  editor       = {Ahmad{-}Reza Sadeghi},
  title        = {Coupon Collector's Problem for Fault Analysis against {AES} - High
                  Tolerance for Noisy Fault Injections},
  booktitle    = {Financial Cryptography and Data Security - 17th International Conference,
                  {FC} 2013, Okinawa, Japan, April 1-5, 2013, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {7859},
  pages        = {213--220},
  publisher    = {Springer},
  year         = {2013},
  url          = {https://doi.org/10.1007/978-3-642-39884-1\_18},
  doi          = {10.1007/978-3-642-39884-1\_18},
  timestamp    = {Tue, 14 May 2019 10:00:38 +0200},
  biburl       = {https://dblp.org/rec/conf/fc/SasakiLSS13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fps/LiHMHAOS13,
  author       = {Yang Li and
                  Yu{-}ichi Hayashi and
                  Arisa Matsubara and
                  Naofumi Homma and
                  Takafumi Aoki and
                  Kazuo Ohta and
                  Kazuo Sakiyama},
  editor       = {Jean{-}Luc Danger and
                  Mourad Debbabi and
                  Jean{-}Yves Marion and
                  Joaqu{\'{\i}}n Garc{\'{\i}}a{-}Alfaro and
                  Nur Zincir{-}Heywood},
  title        = {Yet Another Fault-Based Leakage in Non-uniform Faulty Ciphertexts},
  booktitle    = {Foundations and Practice of Security - 6th International Symposium,
                  {FPS} 2013, La Rochelle, France, October 21-22, 2013, Revised Selected
                  Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {8352},
  pages        = {272--287},
  publisher    = {Springer},
  year         = {2013},
  url          = {https://doi.org/10.1007/978-3-319-05302-8\_17},
  doi          = {10.1007/978-3-319-05302-8\_17},
  timestamp    = {Fri, 08 Dec 2023 07:53:07 +0100},
  biburl       = {https://dblp.org/rec/conf/fps/LiHMHAOS13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/rfidsec/MikamiWS13,
  author       = {Shugo Mikami and
                  Dai Watanabe and
                  Kazuo Sakiyama},
  editor       = {Changshe Ma and
                  Jian Weng},
  title        = {A Comparative Study of Stream Ciphers and Hash Functions for {RFID}
                  Authentications},
  booktitle    = {Radio Frequency Identification System Security - RFIDsec'13 Asia Workshop
                  Proceedings, Guangzhou, China, November 27, 2013},
  series       = {Cryptology and Information Security Series},
  volume       = {11},
  pages        = {83--94},
  publisher    = {{IOS} Press},
  year         = {2013},
  url          = {https://doi.org/10.3233/978-1-61499-328-5-83},
  doi          = {10.3233/978-1-61499-328-5-83},
  timestamp    = {Wed, 13 May 2020 07:48:31 +0200},
  biburl       = {https://dblp.org/rec/conf/rfidsec/MikamiWS13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secrypt/SasakiKSWISO13,
  author       = {Yu Sasaki and
                  Wataru Komatsubara and
                  Yasuhide Sakai and
                  Lei Wang and
                  Mitsugu Iwamoto and
                  Kazuo Sakiyama and
                  Kazuo Ohta},
  editor       = {Pierangela Samarati},
  title        = {Meet-in-the-Middle Preimage Attacks Revisited - New Results on {MD5}
                  and {HAVAL}},
  booktitle    = {{SECRYPT} 2013 - Proceedings of the 10th International Conference
                  on Security and Cryptography, Reykjav{\'{\i}}k, Iceland, 29-31
                  July, 2013},
  pages        = {111--122},
  publisher    = {SciTePress},
  year         = {2013},
  url          = {https://ieeexplore.ieee.org/document/7223160/},
  timestamp    = {Wed, 11 Aug 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/secrypt/SasakiKSWISO13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/iwsec/2013,
  editor       = {Kazuo Sakiyama and
                  Masayuki Terada},
  title        = {Advances in Information and Computer Security - 8th International
                  Workshop on Security, {IWSEC} 2013, Okinawa, Japan, November 18-20,
                  2013, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {8231},
  publisher    = {Springer},
  year         = {2013},
  url          = {https://doi.org/10.1007/978-3-642-41383-4},
  doi          = {10.1007/978-3-642-41383-4},
  isbn         = {978-3-642-41382-7},
  timestamp    = {Tue, 14 May 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iwsec/2013.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieicet/WangSKSO12,
  author       = {Lei Wang and
                  Yu Sasaki and
                  Wataru Komatsubara and
                  Kazuo Sakiyama and
                  Kazuo Ohta},
  title        = {Meet-in-the-Middle (Second) Preimage Attacks on Two Double-Branch
                  Hash Functions {RIPEMD} and {RIPEMD-128}},
  journal      = {{IEICE} Trans. Fundam. Electron. Commun. Comput. Sci.},
  volume       = {95-A},
  number       = {1},
  pages        = {100--110},
  year         = {2012},
  url          = {https://doi.org/10.1587/transfun.E95.A.100},
  doi          = {10.1587/TRANSFUN.E95.A.100},
  timestamp    = {Sat, 11 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ieicet/WangSKSO12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieicet/LiOS12,
  author       = {Yang Li and
                  Kazuo Ohta and
                  Kazuo Sakiyama},
  title        = {Toward Effective Countermeasures against an Improved Fault Sensitivity
                  Analysis},
  journal      = {{IEICE} Trans. Fundam. Electron. Commun. Comput. Sci.},
  volume       = {95-A},
  number       = {1},
  pages        = {234--241},
  year         = {2012},
  url          = {https://doi.org/10.1587/transfun.E95.A.234},
  doi          = {10.1587/TRANSFUN.E95.A.234},
  timestamp    = {Sat, 11 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ieicet/LiOS12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieicet/TakahashiFS12,
  author       = {Junko Takahashi and
                  Toshinori Fukunaga and
                  Kazuo Sakiyama},
  title        = {Differential Fault Analysis on Stream Cipher {MUGI}},
  journal      = {{IEICE} Trans. Fundam. Electron. Commun. Comput. Sci.},
  volume       = {95-A},
  number       = {1},
  pages        = {242--251},
  year         = {2012},
  url          = {https://doi.org/10.1587/transfun.E95.A.242},
  doi          = {10.1587/TRANSFUN.E95.A.242},
  timestamp    = {Sun, 22 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ieicet/TakahashiFS12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/LiOS12,
  author       = {Yang Li and
                  Kazuo Ohta and
                  Kazuo Sakiyama},
  title        = {New Fault-Based Side-Channel Attack Using Fault Sensitivity},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {7},
  number       = {1},
  pages        = {88--97},
  year         = {2012},
  url          = {https://doi.org/10.1109/TIFS.2011.2169666},
  doi          = {10.1109/TIFS.2011.2169666},
  timestamp    = {Thu, 06 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/LiOS12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/SakiyamaLIO12,
  author       = {Kazuo Sakiyama and
                  Yang Li and
                  Mitsugu Iwamoto and
                  Kazuo Ohta},
  title        = {Information-Theoretic Approach to Optimal Differential Fault Analysis},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {7},
  number       = {1},
  pages        = {109--120},
  year         = {2012},
  url          = {https://doi.org/10.1109/TIFS.2011.2174984},
  doi          = {10.1109/TIFS.2011.2174984},
  timestamp    = {Thu, 06 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/SakiyamaLIO12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tvlsi/KnezevicKIMSKFKSSVOHA12,
  author       = {Miroslav Knezevic and
                  Kazuyuki Kobayashi and
                  Jun Ikegami and
                  Shin'ichiro Matsuo and
                  Akashi Satoh and
                  {\"{U}}nal Ko{\c{c}}abas and
                  Junfeng Fan and
                  Toshihiro Katashita and
                  Takeshi Sugawara and
                  Kazuo Sakiyama and
                  Ingrid Verbauwhede and
                  Kazuo Ohta and
                  Naofumi Homma and
                  Takafumi Aoki},
  title        = {Fair and Consistent Hardware Evaluation of Fourteen Round Two {SHA-3}
                  Candidates},
  journal      = {{IEEE} Trans. Very Large Scale Integr. Syst.},
  volume       = {20},
  number       = {5},
  pages        = {827--840},
  year         = {2012},
  url          = {https://doi.org/10.1109/TVLSI.2011.2128353},
  doi          = {10.1109/TVLSI.2011.2128353},
  timestamp    = {Fri, 26 Aug 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tvlsi/KnezevicKIMSKFKSSVOHA12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/africacrypt/SasakiWSSO12,
  author       = {Yu Sasaki and
                  Lei Wang and
                  Yasuhide Sakai and
                  Kazuo Sakiyama and
                  Kazuo Ohta},
  editor       = {Aikaterini Mitrokotsa and
                  Serge Vaudenay},
  title        = {Three-Subset Meet-in-the-Middle Attack on Reduced {XTEA}},
  booktitle    = {Progress in Cryptology - {AFRICACRYPT} 2012 - 5th International Conference
                  on Cryptology in Africa, Ifrance, Morocco, July 10-12, 2012. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7374},
  pages        = {138--154},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-31410-0\_9},
  doi          = {10.1007/978-3-642-31410-0\_9},
  timestamp    = {Sun, 02 Jun 2019 21:14:37 +0200},
  biburl       = {https://dblp.org/rec/conf/africacrypt/SasakiWSSO12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cisc/LiOS12,
  author       = {Yang Li and
                  Kazuo Ohta and
                  Kazuo Sakiyama},
  editor       = {Miroslaw Kutylowski and
                  Moti Yung},
  title        = {An Extension of Fault Sensitivity Analysis Based on Clockwise Collision},
  booktitle    = {Information Security and Cryptology - 8th International Conference,
                  Inscrypt 2012, Beijing, China, November 28-30, 2012, Revised Selected
                  Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {7763},
  pages        = {46--59},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-38519-3\_4},
  doi          = {10.1007/978-3-642-38519-3\_4},
  timestamp    = {Tue, 14 May 2019 10:00:52 +0200},
  biburl       = {https://dblp.org/rec/conf/cisc/LiOS12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fdtc/EndoLHSOA12,
  author       = {Sho Endo and
                  Yang Li and
                  Naofumi Homma and
                  Kazuo Sakiyama and
                  Kazuo Ohta and
                  Takafumi Aoki},
  editor       = {Guido Bertoni and
                  Benedikt Gierlichs},
  title        = {An Efficient Countermeasure against Fault Sensitivity Analysis Using
                  Configurable Delay Blocks},
  booktitle    = {2012 Workshop on Fault Diagnosis and Tolerance in Cryptography, Leuven,
                  Belgium, September 9, 2012},
  pages        = {95--102},
  publisher    = {{IEEE} Computer Society},
  year         = {2012},
  url          = {https://doi.org/10.1109/FDTC.2012.12},
  doi          = {10.1109/FDTC.2012.12},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/fdtc/EndoLHSOA12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icisc/NakasoneLSIOS12,
  author       = {Toshiki Nakasone and
                  Yang Li and
                  Yu Sasaki and
                  Mitsugu Iwamoto and
                  Kazuo Ohta and
                  Kazuo Sakiyama},
  editor       = {Taekyoung Kwon and
                  Mun{-}Kyu Lee and
                  Daesung Kwon},
  title        = {Key-Dependent Weakness of AES-Based Ciphers under Clockwise Collision
                  Distinguisher},
  booktitle    = {Information Security and Cryptology - {ICISC} 2012 - 15th International
                  Conference, Seoul, Korea, November 28-30, 2012, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {7839},
  pages        = {395--409},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-37682-5\_28},
  doi          = {10.1007/978-3-642-37682-5\_28},
  timestamp    = {Thu, 12 Nov 2020 16:27:41 +0100},
  biburl       = {https://dblp.org/rec/conf/icisc/NakasoneLSIOS12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ispec/KoyamaWSSO12,
  author       = {Takuma Koyama and
                  Lei Wang and
                  Yu Sasaki and
                  Kazuo Sakiyama and
                  Kazuo Ohta},
  editor       = {Mark Dermot Ryan and
                  Ben Smyth and
                  Guilin Wang},
  title        = {New Truncated Differential Cryptanalysis on 3D Block Cipher},
  booktitle    = {Information Security Practice and Experience - 8th International Conference,
                  {ISPEC} 2012, Hangzhou, China, April 9-12, 2012. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7232},
  pages        = {109--125},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-29101-2\_8},
  doi          = {10.1007/978-3-642-29101-2\_8},
  timestamp    = {Fri, 22 Mar 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ispec/KoyamaWSSO12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwsec/Sasaki0TSO12,
  author       = {Yu Sasaki and
                  Lei Wang and
                  Yasuhiro Takasaki and
                  Kazuo Sakiyama and
                  Kazuo Ohta},
  editor       = {Goichiro Hanaoka and
                  Toshihiro Yamauchi},
  title        = {Boomerang Distinguishers for Full {HAS-160} Compression Function},
  booktitle    = {Advances in Information and Computer Security - 7th International
                  Workshop on Security, {IWSEC} 2012, Fukuoka, Japan, November 7-9,
                  2012. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7631},
  pages        = {156--169},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-34117-5\_10},
  doi          = {10.1007/978-3-642-34117-5\_10},
  timestamp    = {Tue, 14 May 2019 10:00:52 +0200},
  biburl       = {https://dblp.org/rec/conf/iwsec/Sasaki0TSO12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwsec/0007SSO12,
  author       = {Lei Wang and
                  Yu Sasaki and
                  Kazuo Sakiyama and
                  Kazuo Ohta},
  editor       = {Goichiro Hanaoka and
                  Toshihiro Yamauchi},
  title        = {Polynomial-Advantage Cryptanalysis of 3D Cipher and 3D-Based Hash
                  Function},
  booktitle    = {Advances in Information and Computer Security - 7th International
                  Workshop on Security, {IWSEC} 2012, Fukuoka, Japan, November 7-9,
                  2012. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7631},
  pages        = {170--181},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-34117-5\_11},
  doi          = {10.1007/978-3-642-34117-5\_11},
  timestamp    = {Tue, 02 Oct 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iwsec/0007SSO12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:series/isc/TakahashiFGLSO12,
  author       = {Junko Takahashi and
                  Toshinori Fukunaga and
                  Shigeto Gomisawa and
                  Yang Li and
                  Kazuo Sakiyama and
                  Kazuo Ohta},
  editor       = {Marc Joye and
                  Michael Tunstall},
  title        = {Fault Injection and Key Retrieval Experiments on an Evaluation Board},
  booktitle    = {Fault Analysis in Cryptography},
  series       = {Information Security and Cryptography},
  pages        = {313--331},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-29656-7\_18},
  doi          = {10.1007/978-3-642-29656-7\_18},
  timestamp    = {Fri, 27 Mar 2020 08:31:50 +0100},
  biburl       = {https://dblp.org/rec/series/isc/TakahashiFGLSO12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieicet/SantosoOSH11,
  author       = {Bagus Santoso and
                  Kazuo Ohta and
                  Kazuo Sakiyama and
                  Goichiro Hanaoka},
  title        = {An Efficient Authentication for Lightweight Devices by Perfecting
                  Zero-Knowledgeness},
  journal      = {{IEICE} Trans. Fundam. Electron. Commun. Comput. Sci.},
  volume       = {94-A},
  number       = {1},
  pages        = {92--103},
  year         = {2011},
  url          = {https://doi.org/10.1587/transfun.E94.A.92},
  doi          = {10.1587/TRANSFUN.E94.A.92},
  timestamp    = {Mon, 03 Jan 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ieicet/SantosoOSH11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieicet/LiSKO11,
  author       = {Yang Li and
                  Kazuo Sakiyama and
                  Shin{-}ichi Kawamura and
                  Kazuo Ohta},
  title        = {Power Analysis against a DPA-Resistant S-Box Implementation Based
                  on the Fourier Transform},
  journal      = {{IEICE} Trans. Fundam. Electron. Commun. Comput. Sci.},
  volume       = {94-A},
  number       = {1},
  pages        = {191--199},
  year         = {2011},
  url          = {https://doi.org/10.1587/transfun.E94.A.191},
  doi          = {10.1587/TRANSFUN.E94.A.191},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ieicet/LiSKO11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/integration/SakiyamaKFPV11,
  author       = {Kazuo Sakiyama and
                  Miroslav Knezevic and
                  Junfeng Fan and
                  Bart Preneel and
                  Ingrid Verbauwhede},
  title        = {Tripartite modular multiplication},
  journal      = {Integr.},
  volume       = {44},
  number       = {4},
  pages        = {259--269},
  year         = {2011},
  url          = {https://doi.org/10.1016/j.vlsi.2011.03.008},
  doi          = {10.1016/J.VLSI.2011.03.008},
  timestamp    = {Thu, 20 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/integration/SakiyamaKFPV11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ches/MoradiMPLOS11,
  author       = {Amir Moradi and
                  Oliver Mischke and
                  Christof Paar and
                  Yang Li and
                  Kazuo Ohta and
                  Kazuo Sakiyama},
  editor       = {Bart Preneel and
                  Tsuyoshi Takagi},
  title        = {On the Power of Fault Sensitivity Analysis and Collision Side-Channel
                  Attacks in a Combined Setting},
  booktitle    = {Cryptographic Hardware and Embedded Systems - {CHES} 2011 - 13th International
                  Workshop, Nara, Japan, September 28 - October 1, 2011. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6917},
  pages        = {292--311},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-3-642-23951-9\_20},
  doi          = {10.1007/978-3-642-23951-9\_20},
  timestamp    = {Sat, 19 Oct 2019 20:26:25 +0200},
  biburl       = {https://dblp.org/rec/conf/ches/MoradiMPLOS11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ches/YamamotoSIOOTI11,
  author       = {Dai Yamamoto and
                  Kazuo Sakiyama and
                  Mitsugu Iwamoto and
                  Kazuo Ohta and
                  Takao Ochiai and
                  Masahiko Takenaka and
                  Kouichi Itoh},
  editor       = {Bart Preneel and
                  Tsuyoshi Takagi},
  title        = {Uniqueness Enhancement of {PUF} Responses Based on the Locations of
                  Random Outputting {RS} Latches},
  booktitle    = {Cryptographic Hardware and Embedded Systems - {CHES} 2011 - 13th International
                  Workshop, Nara, Japan, September 28 - October 1, 2011. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6917},
  pages        = {390--406},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-3-642-23951-9\_26},
  doi          = {10.1007/978-3-642-23951-9\_26},
  timestamp    = {Tue, 26 Jun 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ches/YamamotoSIOOTI11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ctrsa/WangSKOS11,
  author       = {Lei Wang and
                  Yu Sasaki and
                  Wataru Komatsubara and
                  Kazuo Ohta and
                  Kazuo Sakiyama},
  editor       = {Aggelos Kiayias},
  title        = {(Second) Preimage Attacks on Step-Reduced {RIPEMD/RIPEMD-128} with
                  a New Local-Collision Approach},
  booktitle    = {Topics in Cryptology - {CT-RSA} 2011 - The Cryptographers' Track at
                  the {RSA} Conference 2011, San Francisco, CA, USA, February 14-18,
                  2011. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6558},
  pages        = {197--212},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-3-642-19074-2\_14},
  doi          = {10.1007/978-3-642-19074-2\_14},
  timestamp    = {Tue, 14 May 2019 10:00:52 +0200},
  biburl       = {https://dblp.org/rec/conf/ctrsa/WangSKOS11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fc/HanataniOMSO11,
  author       = {Yoshikazu Hanatani and
                  Miyako Ohkubo and
                  Shin'ichiro Matsuo and
                  Kazuo Sakiyama and
                  Kazuo Ohta},
  editor       = {George Danezis and
                  Sven Dietrich and
                  Kazue Sako},
  title        = {A Study on Computational Formal Verification for Practical Cryptographic
                  Protocol: The Case of Synchronous {RFID} Authentication},
  booktitle    = {Financial Cryptography and Data Security - {FC} 2011 Workshops, {RLCPS}
                  and {WECSR} 2011, Rodney Bay, St. Lucia, February 28 - March 4, 2011,
                  Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {7126},
  pages        = {70--87},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-3-642-29889-9\_7},
  doi          = {10.1007/978-3-642-29889-9\_7},
  timestamp    = {Tue, 14 May 2019 10:00:38 +0200},
  biburl       = {https://dblp.org/rec/conf/fc/HanataniOMSO11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fdtc/SakamotoLOS11,
  author       = {Hikaru Sakamoto and
                  Yang Li and
                  Kazuo Ohta and
                  Kazuo Sakiyama},
  editor       = {Luca Breveglieri and
                  Sylvain Guilley and
                  Israel Koren and
                  David Naccache and
                  Junko Takahashi},
  title        = {Fault Sensitivity Analysis Against Elliptic Curve Cryptosystems},
  booktitle    = {2011 Workshop on Fault Diagnosis and Tolerance in Cryptography, {FDTC}
                  2011, Tokyo, Japan, September 29, 2011},
  pages        = {11--20},
  publisher    = {{IEEE} Computer Society},
  year         = {2011},
  url          = {https://doi.org/10.1109/FDTC.2011.17},
  doi          = {10.1109/FDTC.2011.17},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/fdtc/SakamotoLOS11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/host/LiOS11,
  author       = {Yang Li and
                  Kazuo Ohta and
                  Kazuo Sakiyama},
  title        = {Revisit fault sensitivity analysis on {WDDL-AES}},
  booktitle    = {{HOST} 2011, Proceedings of the 2011 {IEEE} International Symposium
                  on Hardware-Oriented Security and Trust (HOST), 5-6 June 2011, San
                  Diego, California, {USA}},
  pages        = {148--153},
  publisher    = {{IEEE} Computer Society},
  year         = {2011},
  url          = {https://doi.org/10.1109/HST.2011.5955013},
  doi          = {10.1109/HST.2011.5955013},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/host/LiOS11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwsec/SasakiTSO11,
  author       = {Yu Sasaki and
                  Naoyuki Takayanagi and
                  Kazuo Sakiyama and
                  Kazuo Ohta},
  editor       = {Tetsu Iwata and
                  Masakatsu Nishigaki},
  title        = {Experimental Verification of Super-Sbox Analysis - Confirmation of
                  Detailed Attack Complexity},
  booktitle    = {Advances in Information and Computer Security - 6th International
                  Workshop, {IWSEC} 2011, Tokyo, Japan, November 8-10, 2011. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7038},
  pages        = {178--192},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-3-642-25141-2\_12},
  doi          = {10.1007/978-3-642-25141-2\_12},
  timestamp    = {Tue, 14 May 2019 10:00:52 +0200},
  biburl       = {https://dblp.org/rec/conf/iwsec/SasakiTSO11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/LiNLOS11,
  author       = {Yang Li and
                  Daisuke Nakatsu and
                  Qi Li and
                  Kazuo Ohta and
                  Kazuo Sakiyama},
  title        = {Clockwise Collision Analysis - Overlooked Side-Channel Leakage Inside
                  Your Measurements},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {579},
  year         = {2011},
  url          = {http://eprint.iacr.org/2011/579},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/LiNLOS11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieicet/SakiyamaO10,
  author       = {Kazuo Sakiyama and
                  Kazuo Ohta},
  title        = {On Clock-Based Fault Analysis Attack for an {AES} Hardware Using {RSL}},
  journal      = {{IEICE} Trans. Fundam. Electron. Commun. Comput. Sci.},
  volume       = {93-A},
  number       = {1},
  pages        = {172--179},
  year         = {2010},
  url          = {https://doi.org/10.1587/transfun.E93.A.172},
  doi          = {10.1587/TRANSFUN.E93.A.172},
  timestamp    = {Sat, 11 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ieicet/SakiyamaO10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieicet/WangOSSK10,
  author       = {Lei Wang and
                  Kazuo Ohta and
                  Yu Sasaki and
                  Kazuo Sakiyama and
                  Noboru Kunihiro},
  title        = {Cryptanalysis of Two MD5-Based Authentication Protocols: {APOP} and
                  {NMAC}},
  journal      = {{IEICE} Trans. Inf. Syst.},
  volume       = {93-D},
  number       = {5},
  pages        = {1087--1095},
  year         = {2010},
  url          = {https://doi.org/10.1587/transinf.E93.D.1087},
  doi          = {10.1587/TRANSINF.E93.D.1087},
  timestamp    = {Mon, 15 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ieicet/WangOSSK10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/asiacrypt/SasakiLWSO10,
  author       = {Yu Sasaki and
                  Yang Li and
                  Lei Wang and
                  Kazuo Sakiyama and
                  Kazuo Ohta},
  editor       = {Masayuki Abe},
  title        = {Non-full-active Super-Sbox Analysis: Applications to {ECHO} and Gr{\o}stl},
  booktitle    = {Advances in Cryptology - {ASIACRYPT} 2010 - 16th International Conference
                  on the Theory and Application of Cryptology and Information Security,
                  Singapore, December 5-9, 2010. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6477},
  pages        = {38--55},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-17373-8\_3},
  doi          = {10.1007/978-3-642-17373-8\_3},
  timestamp    = {Tue, 14 May 2019 10:00:40 +0200},
  biburl       = {https://dblp.org/rec/conf/asiacrypt/SasakiLWSO10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ches/LiSGFTO10,
  author       = {Yang Li and
                  Kazuo Sakiyama and
                  Shigeto Gomisawa and
                  Toshinori Fukunaga and
                  Junko Takahashi and
                  Kazuo Ohta},
  editor       = {Stefan Mangard and
                  Fran{\c{c}}ois{-}Xavier Standaert},
  title        = {Fault Sensitivity Analysis},
  booktitle    = {Cryptographic Hardware and Embedded Systems, {CHES} 2010, 12th International
                  Workshop, Santa Barbara, CA, USA, August 17-20, 2010. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6225},
  pages        = {320--334},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-15031-9\_22},
  doi          = {10.1007/978-3-642-15031-9\_22},
  timestamp    = {Tue, 14 May 2019 10:00:47 +0200},
  biburl       = {https://dblp.org/rec/conf/ches/LiSGFTO10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ctrsa/SantosoOSH10,
  author       = {Bagus Santoso and
                  Kazuo Ohta and
                  Kazuo Sakiyama and
                  Goichiro Hanaoka},
  editor       = {Josef Pieprzyk},
  title        = {Improving Efficiency of an `On the Fly' Identification Scheme by Perfecting
                  Zero-Knowledgeness},
  booktitle    = {Topics in Cryptology - {CT-RSA} 2010, The Cryptographers' Track at
                  the {RSA} Conference 2010, San Francisco, CA, USA, March 1-5, 2010.
                  Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5985},
  pages        = {284--301},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-11925-5\_20},
  doi          = {10.1007/978-3-642-11925-5\_20},
  timestamp    = {Mon, 03 Jan 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ctrsa/SantosoOSH10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/date/IzumiISO10,
  author       = {Masami Izumi and
                  Jun Ikegami and
                  Kazuo Sakiyama and
                  Kazuo Ohta},
  editor       = {Giovanni De Micheli and
                  Bashir M. Al{-}Hashimi and
                  Wolfgang M{\"{u}}ller and
                  Enrico Macii},
  title        = {Improved countermeasure against Address-bit {DPA} for {ECC} scalar
                  multiplication},
  booktitle    = {Design, Automation and Test in Europe, {DATE} 2010, Dresden, Germany,
                  March 8-12, 2010},
  pages        = {981--984},
  publisher    = {{IEEE} Computer Society},
  year         = {2010},
  url          = {https://doi.org/10.1109/DATE.2010.5456907},
  doi          = {10.1109/DATE.2010.5456907},
  timestamp    = {Wed, 16 Oct 2019 14:14:53 +0200},
  biburl       = {https://dblp.org/rec/conf/date/IzumiISO10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/date/LiSBNO10,
  author       = {Yang Li and
                  Kazuo Sakiyama and
                  Lejla Batina and
                  Daisuke Nakatsu and
                  Kazuo Ohta},
  editor       = {Giovanni De Micheli and
                  Bashir M. Al{-}Hashimi and
                  Wolfgang M{\"{u}}ller and
                  Enrico Macii},
  title        = {Power Variance Analysis breaks a masked {ASIC} implementation of {AES}},
  booktitle    = {Design, Automation and Test in Europe, {DATE} 2010, Dresden, Germany,
                  March 8-12, 2010},
  pages        = {1059--1064},
  publisher    = {{IEEE} Computer Society},
  year         = {2010},
  url          = {https://doi.org/10.1109/DATE.2010.5456966},
  doi          = {10.1109/DATE.2010.5456966},
  timestamp    = {Thu, 22 Jun 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/date/LiSBNO10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/host/KobayashiISOKKFVGMHNS10,
  author       = {Kazuyuki Kobayashi and
                  Jun Ikegami and
                  Kazuo Sakiyama and
                  Kazuo Ohta and
                  Miroslav Knezevic and
                  {\"{U}}nal Ko{\c{c}}abas and
                  Junfeng Fan and
                  Ingrid Verbauwhede and
                  Eric Xu Guo and
                  Shin'ichiro Matsuo and
                  Sinan Huang and
                  Leyla Nazhandali and
                  Akashi Satoh},
  editor       = {Jim Plusquellic and
                  Ken Mai},
  title        = {Prototyping Platform for Performance Evaluation of {SHA-3} Candidates},
  booktitle    = {{HOST} 2010, Proceedings of the 2010 {IEEE} International Symposium
                  on Hardware-Oriented Security and Trust (HOST), 13-14 June 2010, Anaheim
                  Convention Center, California, {USA}},
  pages        = {60--63},
  publisher    = {{IEEE} Computer Society},
  year         = {2010},
  url          = {https://doi.org/10.1109/HST.2010.5513111},
  doi          = {10.1109/HST.2010.5513111},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/host/KobayashiISOKKFVGMHNS10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icisc/TakahashiFS10,
  author       = {Junko Takahashi and
                  Toshinori Fukunaga and
                  Kazuo Sakiyama},
  editor       = {Kyung Hyune Rhee and
                  DaeHun Nyang},
  title        = {Fault Analysis on Stream Cipher {MUGI}},
  booktitle    = {Information Security and Cryptology - {ICISC} 2010 - 13th International
                  Conference, Seoul, Korea, December 1-3, 2010, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {6829},
  pages        = {420--434},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-24209-0\_28},
  doi          = {10.1007/978-3-642-24209-0\_28},
  timestamp    = {Tue, 14 May 2019 10:00:36 +0200},
  biburl       = {https://dblp.org/rec/conf/icisc/TakahashiFS10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wisa/NakatsuLSO10,
  author       = {Daisuke Nakatsu and
                  Yang Li and
                  Kazuo Sakiyama and
                  Kazuo Ohta},
  editor       = {Yongwha Chung and
                  Moti Yung},
  title        = {Combination of {SW} Countermeasure and {CPU} Modification on {FPGA}
                  against Power Analysis},
  booktitle    = {Information Security Applications - 11th International Workshop, {WISA}
                  2010, Jeju Island, Korea, August 24-26, 2010, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {6513},
  pages        = {258--272},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-17955-6\_19},
  doi          = {10.1007/978-3-642-17955-6\_19},
  timestamp    = {Tue, 14 May 2019 10:00:35 +0200},
  biburl       = {https://dblp.org/rec/conf/wisa/NakatsuLSO10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:books/sp/10/SakiyamaB10,
  author       = {Kazuo Sakiyama and
                  Lejla Batina},
  editor       = {Ingrid M. R. Verbauwhede},
  title        = {Arithmetic for Public-Key Cryptography},
  booktitle    = {Secure Integrated Circuits and Systems},
  series       = {Integrated Circuits and Systems},
  pages        = {63--78},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-0-387-71829-3\_4},
  doi          = {10.1007/978-0-387-71829-3\_4},
  timestamp    = {Wed, 26 Jun 2019 18:00:01 +0200},
  biburl       = {https://dblp.org/rec/books/sp/10/SakiyamaB10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:books/sp/10/BatinaSV10,
  author       = {Lejla Batina and
                  Kazuo Sakiyama and
                  Ingrid M. R. Verbauwhede},
  editor       = {Ingrid M. R. Verbauwhede},
  title        = {Compact Public-Key Implementations for {RFID} and Sensor Nodes},
  booktitle    = {Secure Integrated Circuits and Systems},
  series       = {Integrated Circuits and Systems},
  pages        = {179--195},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-0-387-71829-3\_10},
  doi          = {10.1007/978-0-387-71829-3\_10},
  timestamp    = {Fri, 02 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/books/sp/10/BatinaSV10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/KobayashiIMSO10,
  author       = {Kazuyuki Kobayashi and
                  Jun Ikegami and
                  Shin'ichiro Matsuo and
                  Kazuo Sakiyama and
                  Kazuo Ohta},
  title        = {Evaluation of Hardware Performance for the {SHA-3} Candidates Using
                  {SASEBO-GII}},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {10},
  year         = {2010},
  url          = {http://eprint.iacr.org/2010/010},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/KobayashiIMSO10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/LiGSO10,
  author       = {Yang Li and
                  Shigeto Gomisawa and
                  Kazuo Sakiyama and
                  Kazuo Ohta},
  title        = {An Information Theoretic Perspective on the Differential Fault Analysis
                  against {AES}},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {32},
  year         = {2010},
  url          = {http://eprint.iacr.org/2010/032},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/LiGSO10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/GomisawaLTFSSO10,
  author       = {Shigeto Gomisawa and
                  Yang Li and
                  Junko Takahashi and
                  Toshinori Fukunaga and
                  Yu Sasaki and
                  Kazuo Sakiyama and
                  Kazuo Ohta},
  title        = {Efficient Differential Fault Analysis for {AES}},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {336},
  year         = {2010},
  url          = {http://eprint.iacr.org/2010/336},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/GomisawaLTFSSO10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/OhkuboMHSO10,
  author       = {Miyako Ohkubo and
                  Shin'ichiro Matsuo and
                  Yoshikazu Hanatani and
                  Kazuo Sakiyama and
                  Kazuo Ohta},
  title        = {Robust {RFID} Authentication Protocol with Formal Proof and Its Feasibility},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {345},
  year         = {2010},
  url          = {http://eprint.iacr.org/2010/345},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/OhkuboMHSO10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/IEEEares/IzumiSO09,
  author       = {Masami Izumi and
                  Kazuo Sakiyama and
                  Kazuo Ohta},
  title        = {A New Approach for Implementing the {MPL} Method toward Higher {SPA}
                  Resistance},
  booktitle    = {Proceedings of the The Forth International Conference on Availability,
                  Reliability and Security, {ARES} 2009, March 16-19, 2009, Fukuoka,
                  Japan},
  pages        = {181--186},
  publisher    = {{IEEE} Computer Society},
  year         = {2009},
  url          = {https://doi.org/10.1109/ARES.2009.61},
  doi          = {10.1109/ARES.2009.61},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/IEEEares/IzumiSO09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ctrsa/SakiyamaYO09,
  author       = {Kazuo Sakiyama and
                  Tatsuya Yagi and
                  Kazuo Ohta},
  editor       = {Marc Fischlin},
  title        = {Fault Analysis Attack against an {AES} Prototype Chip Using {RSL}},
  booktitle    = {Topics in Cryptology - {CT-RSA} 2009, The Cryptographers' Track at
                  the {RSA} Conference 2009, San Francisco, CA, USA, April 20-24, 2009.
                  Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5473},
  pages        = {429--443},
  publisher    = {Springer},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-3-642-00862-7\_29},
  doi          = {10.1007/978-3-642-00862-7\_29},
  timestamp    = {Tue, 14 May 2019 10:00:52 +0200},
  biburl       = {https://dblp.org/rec/conf/ctrsa/SakiyamaYO09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icics/LiSKKO09,
  author       = {Yang Li and
                  Kazuo Sakiyama and
                  Shin{-}ichi Kawamura and
                  Yuichi Komano and
                  Kazuo Ohta},
  editor       = {Sihan Qing and
                  Chris J. Mitchell and
                  Guilin Wang},
  title        = {Security Evaluation of a DPA-Resistant S-Box Based on the Fourier
                  Transform},
  booktitle    = {Information and Communications Security, 11th International Conference,
                  {ICICS} 2009, Beijing, China, December 14-17, 2009. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5927},
  pages        = {3--16},
  publisher    = {Springer},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-3-642-11145-7\_3},
  doi          = {10.1007/978-3-642-11145-7\_3},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icics/LiSKKO09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwsec/WangSSO09,
  author       = {Lei Wang and
                  Yu Sasaki and
                  Kazuo Sakiyama and
                  Kazuo Ohta},
  editor       = {Tsuyoshi Takagi and
                  Masahiro Mambo},
  title        = {Bit-Free Collision: Application to {APOP} Attack},
  booktitle    = {Advances in Information and Computer Security, 4th International Workshop
                  on Security, {IWSEC} 2009, Toyama, Japan, October 28-30, 2009, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5824},
  pages        = {3--21},
  publisher    = {Springer},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-3-642-04846-3\_2},
  doi          = {10.1007/978-3-642-04846-3\_2},
  timestamp    = {Tue, 14 May 2019 10:00:52 +0200},
  biburl       = {https://dblp.org/rec/conf/iwsec/WangSSO09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dafes/FanSV08,
  author       = {Junfeng Fan and
                  Kazuo Sakiyama and
                  Ingrid Verbauwhede},
  title        = {Elliptic curve cryptography on embedded multicore systems},
  journal      = {Des. Autom. Embed. Syst.},
  volume       = {12},
  number       = {3},
  pages        = {231--242},
  year         = {2008},
  url          = {https://doi.org/10.1007/s10617-008-9021-3},
  doi          = {10.1007/S10617-008-9021-3},
  timestamp    = {Fri, 02 Oct 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dafes/FanSV08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tc/LeeSBV08,
  author       = {Yong Ki Lee and
                  Kazuo Sakiyama and
                  Lejla Batina and
                  Ingrid Verbauwhede},
  title        = {Elliptic-Curve-Based Security Processor for {RFID}},
  journal      = {{IEEE} Trans. Computers},
  volume       = {57},
  number       = {11},
  pages        = {1514--1527},
  year         = {2008},
  url          = {https://doi.org/10.1109/TC.2008.148},
  doi          = {10.1109/TC.2008.148},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tc/LeeSBV08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/asap/KnezzevicSLV08,
  author       = {Miroslav Knezevic and
                  Kazuo Sakiyama and
                  Yong Ki Lee and
                  Ingrid Verbauwhede},
  title        = {On the high-throughput implementation of {RIPEMD-160} hash algorithm},
  booktitle    = {19th {IEEE} International Conference on Application-Specific Systems,
                  Architectures and Processors, {ASAP} 2008, July 2-4, 2008, Leuven,
                  Belgium},
  pages        = {85--90},
  publisher    = {{IEEE} Computer Society},
  year         = {2008},
  url          = {https://doi.org/10.1109/ASAP.2008.4580159},
  doi          = {10.1109/ASAP.2008.4580159},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/asap/KnezzevicSLV08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/date/FanBSV08,
  author       = {Junfeng Fan and
                  Lejla Batina and
                  Kazuo Sakiyama and
                  Ingrid Verbauwhede},
  editor       = {Donatella Sciuto},
  title        = {{FPGA} Design for Algebraic Tori-Based Public-Key Cryptography},
  booktitle    = {Design, Automation and Test in Europe, {DATE} 2008, Munich, Germany,
                  March 10-14, 2008},
  pages        = {1292--1297},
  publisher    = {{ACM}},
  year         = {2008},
  url          = {https://doi.org/10.1109/DATE.2008.4484857},
  doi          = {10.1109/DATE.2008.4484857},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/date/FanBSV08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/waifi/KnezevicSFV08,
  author       = {Miroslav Knezevic and
                  Kazuo Sakiyama and
                  Junfeng Fan and
                  Ingrid Verbauwhede},
  editor       = {Joachim von zur Gathen and
                  Jos{\'{e}} Luis Ima{\~{n}}a and
                  {\c{C}}etin Kaya Ko{\c{c}}},
  title        = {Modular Reduction in GF(2\({}^{\mbox{n}}\)) without Pre-computational
                  Phase},
  booktitle    = {Arithmetic of Finite Fields, 2nd International Workshop, {WAIFI} 2008,
                  Siena, Italy, July 6-9, 2008, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5130},
  pages        = {77--87},
  publisher    = {Springer},
  year         = {2008},
  url          = {https://doi.org/10.1007/978-3-540-69499-1\_7},
  doi          = {10.1007/978-3-540-69499-1\_7},
  timestamp    = {Wed, 25 Sep 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/waifi/KnezevicSFV08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cee/SakiyamaBPV07,
  author       = {Kazuo Sakiyama and
                  Lejla Batina and
                  Bart Preneel and
                  Ingrid Verbauwhede},
  title        = {{HW/SW} co-design for public-key cryptosystems on the 8051 micro-controller},
  journal      = {Comput. Electr. Eng.},
  volume       = {33},
  number       = {5-6},
  pages        = {324--332},
  year         = {2007},
  url          = {https://doi.org/10.1016/j.compeleceng.2007.05.005},
  doi          = {10.1016/J.COMPELECENG.2007.05.005},
  timestamp    = {Wed, 19 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/cee/SakiyamaBPV07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/monet/SakiyamaBPV07,
  author       = {Kazuo Sakiyama and
                  Lejla Batina and
                  Bart Preneel and
                  Ingrid Verbauwhede},
  title        = {High-performance Public-key Cryptoprocessor for Wireless Mobile Applications},
  journal      = {Mob. Networks Appl.},
  volume       = {12},
  number       = {4},
  pages        = {245--258},
  year         = {2007},
  url          = {https://doi.org/10.1007/s11036-007-0020-6},
  doi          = {10.1007/S11036-007-0020-6},
  timestamp    = {Thu, 24 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/monet/SakiyamaBPV07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tc/SakiyamaBPV07,
  author       = {Kazuo Sakiyama and
                  Lejla Batina and
                  Bart Preneel and
                  Ingrid Verbauwhede},
  title        = {Multicore Curve-Based Cryptoprocessor with Reconfigurable Modular
                  Arithmetic Logic Units over GF(2\({}^{\mbox{n}}\))},
  journal      = {{IEEE} Trans. Computers},
  volume       = {56},
  number       = {9},
  pages        = {1269--1282},
  year         = {2007},
  url          = {https://doi.org/10.1109/TC.2007.1071},
  doi          = {10.1109/TC.2007.1071},
  timestamp    = {Mon, 13 Jun 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tc/SakiyamaBPV07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/glvlsi/SakiyamaMPV07,
  author       = {Kazuo Sakiyama and
                  Elke De Mulder and
                  Bart Preneel and
                  Ingrid Verbauwhede},
  editor       = {Hai Zhou and
                  Enrico Macii and
                  Zhiyuan Yan and
                  Yehia Massoud},
  title        = {Side-channel resistant system-level design flow for public-key cryptography},
  booktitle    = {Proceedings of the 17th {ACM} Great Lakes Symposium on {VLSI} 2007,
                  Stresa, Lago Maggiore, Italy, March 11-13, 2007},
  pages        = {144--147},
  publisher    = {{ACM}},
  year         = {2007},
  url          = {https://doi.org/10.1145/1228784.1228822},
  doi          = {10.1145/1228784.1228822},
  timestamp    = {Wed, 16 Aug 2023 21:16:32 +0200},
  biburl       = {https://dblp.org/rec/conf/glvlsi/SakiyamaMPV07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/glvlsi/MentensSPV07,
  author       = {Nele Mentens and
                  Kazuo Sakiyama and
                  Bart Preneel and
                  Ingrid Verbauwhede},
  editor       = {Hai Zhou and
                  Enrico Macii and
                  Zhiyuan Yan and
                  Yehia Massoud},
  title        = {Efficient pipelining for modular multiplication architectures in prime
                  fields},
  booktitle    = {Proceedings of the 17th {ACM} Great Lakes Symposium on {VLSI} 2007,
                  Stresa, Lago Maggiore, Italy, March 11-13, 2007},
  pages        = {534--539},
  publisher    = {{ACM}},
  year         = {2007},
  url          = {https://doi.org/10.1145/1228784.1228911},
  doi          = {10.1145/1228784.1228911},
  timestamp    = {Fri, 09 Apr 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/glvlsi/MentensSPV07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iscas/BatinaMSPV07,
  author       = {Lejla Batina and
                  Nele Mentens and
                  Kazuo Sakiyama and
                  Bart Preneel and
                  Ingrid Verbauwhede},
  title        = {Public-Key Cryptography on the Top of a Needle},
  booktitle    = {International Symposium on Circuits and Systems {(ISCAS} 2007), 27-20
                  May 2007, New Orleans, Louisiana, {USA}},
  pages        = {1831--1834},
  publisher    = {{IEEE}},
  year         = {2007},
  url          = {https://doi.org/10.1109/ISCAS.2007.378270},
  doi          = {10.1109/ISCAS.2007.378270},
  timestamp    = {Fri, 09 Apr 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iscas/BatinaMSPV07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/samos/MentensSBPV07,
  author       = {Nele Mentens and
                  Kazuo Sakiyama and
                  Lejla Batina and
                  Bart Preneel and
                  Ingrid Verbauwhede},
  editor       = {Holger Blume and
                  Georgi Gaydadjiev and
                  C. John Glossner and
                  Peter M. W. Knijnenburg},
  title        = {A Side-channel Attack Resistant Programmable {PKC} Coprocessor for
                  Embedded Applications},
  booktitle    = {Proceedings of the 2007 International Conference on Embedded Computer
                  Systems: Architectures, Modeling and Simulation {(IC-SAMOS} 2007),
                  Samos, Greece, July 16-19, 2007},
  pages        = {194--200},
  publisher    = {{IEEE}},
  year         = {2007},
  url          = {https://doi.org/10.1109/ICSAMOS.2007.4285751},
  doi          = {10.1109/ICSAMOS.2007.4285751},
  timestamp    = {Fri, 09 Apr 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/samos/MentensSBPV07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sips/FanSV07,
  author       = {Junfeng Fan and
                  Kazuo Sakiyama and
                  Ingrid Verbauwhede},
  title        = {Montgomery Modular Multiplication Algorithm on Multi-Core Systems},
  booktitle    = {Proceedings of the {IEEE} Workshop on Signal Processing Systems, SiPS
                  2007, Proceedings, October 17-19, 2007, Eton Hotel, Shanghai, China},
  pages        = {261--266},
  publisher    = {{IEEE}},
  year         = {2007},
  url          = {https://doi.org/10.1109/SIPS.2007.4387555},
  doi          = {10.1109/SIPS.2007.4387555},
  timestamp    = {Fri, 30 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/sips/FanSV07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ejasp/YangSV06,
  author       = {Shenglin Yang and
                  Kazuo Sakiyama and
                  Ingrid Verbauwhede},
  title        = {Efficient and Secure Fingerprint Verification for Embedded Devices},
  journal      = {{EURASIP} J. Adv. Signal Process.},
  volume       = {2006},
  year         = {2006},
  url          = {https://doi.org/10.1155/ASP/2006/58263},
  doi          = {10.1155/ASP/2006/58263},
  timestamp    = {Thu, 12 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ejasp/YangSV06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/arc/SakiyamaMBPV06,
  author       = {Kazuo Sakiyama and
                  Nele Mentens and
                  Lejla Batina and
                  Bart Preneel and
                  Ingrid Verbauwhede},
  editor       = {Koen Bertels and
                  Jo{\~{a}}o M. P. Cardoso and
                  Stamatis Vassiliadis},
  title        = {Reconfigurable Modular Arithmetic Logic Unit for High-Performance
                  Public-Key Cryptosystems},
  booktitle    = {Reconfigurable Computing: Architectures and Applications, Second International
                  Workshop, {ARC} 2006, Delft, The Netherlands, March 1-3, 2006, Revised
                  Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {3985},
  pages        = {347--357},
  publisher    = {Springer},
  year         = {2006},
  url          = {https://doi.org/10.1007/11802839\_43},
  doi          = {10.1007/11802839\_43},
  timestamp    = {Fri, 09 Apr 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/arc/SakiyamaMBPV06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ches/SakiyamaBPV06,
  author       = {Kazuo Sakiyama and
                  Lejla Batina and
                  Bart Preneel and
                  Ingrid Verbauwhede},
  editor       = {Louis Goubin and
                  Mitsuru Matsui},
  title        = {Superscalar Coprocessor for High-Speed Curve-Based Cryptography},
  booktitle    = {Cryptographic Hardware and Embedded Systems - {CHES} 2006, 8th International
                  Workshop, Yokohama, Japan, October 10-13, 2006, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4249},
  pages        = {415--429},
  publisher    = {Springer},
  year         = {2006},
  url          = {https://doi.org/10.1007/11894063\_33},
  doi          = {10.1007/11894063\_33},
  timestamp    = {Tue, 14 May 2019 10:00:47 +0200},
  biburl       = {https://dblp.org/rec/conf/ches/SakiyamaBPV06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/esas/BatinaMSPV06,
  author       = {Lejla Batina and
                  Nele Mentens and
                  Kazuo Sakiyama and
                  Bart Preneel and
                  Ingrid Verbauwhede},
  editor       = {Levente Butty{\'{a}}n and
                  Virgil D. Gligor and
                  Dirk Westhoff},
  title        = {Low-Cost Elliptic Curve Cryptography for Wireless Sensor Networks},
  booktitle    = {Security and Privacy in Ad-Hoc and Sensor Networks, Third European
                  Workshop, {ESAS} 2006, Hamburg, Germany, September 20-21, 2006, Revised
                  Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {4357},
  pages        = {6--17},
  publisher    = {Springer},
  year         = {2006},
  url          = {https://doi.org/10.1007/11964254\_3},
  doi          = {10.1007/11964254\_3},
  timestamp    = {Fri, 09 Apr 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/esas/BatinaMSPV06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fpl/BatinaHHSV06,
  author       = {Lejla Batina and
                  Alireza Hodjat and
                  David Hwang and
                  Kazuo Sakiyama and
                  Ingrid Verbauwhede},
  title        = {Reconfigurable Architectures for Curve-Based Cryptography on Embedded
                  Micro-Controllers},
  booktitle    = {Proceedings of the 2006 International Conference on Field Programmable
                  Logic and Applications (FPL), Madrid, Spain, August 28-30, 2006},
  pages        = {1--4},
  publisher    = {{IEEE}},
  year         = {2006},
  url          = {https://doi.org/10.1109/FPL.2006.311286},
  doi          = {10.1109/FPL.2006.311286},
  timestamp    = {Tue, 12 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/fpl/BatinaHHSV06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fpl/MentensSBVP06,
  author       = {Nele Mentens and
                  Kazuo Sakiyama and
                  Lejla Batina and
                  Ingrid Verbauwhede and
                  Bart Preneel},
  title        = {Fpga-Oriented Secure Data Path Design: Implementation of a Public
                  Key Coprocessor},
  booktitle    = {Proceedings of the 2006 International Conference on Field Programmable
                  Logic and Applications (FPL), Madrid, Spain, August 28-30, 2006},
  pages        = {1--6},
  publisher    = {{IEEE}},
  year         = {2006},
  url          = {https://doi.org/10.1109/FPL.2006.311205},
  doi          = {10.1109/FPL.2006.311205},
  timestamp    = {Fri, 09 Apr 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/fpl/MentensSBVP06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icassp/SakiyamaMPV06,
  author       = {Kazuo Sakiyama and
                  Elke De Mulder and
                  Bart Preneel and
                  Ingrid Verbauwhede},
  title        = {A Parallel Processing Hardware Architecture for Elliptic Curve Cryptosystems},
  booktitle    = {2006 {IEEE} International Conference on Acoustics Speech and Signal
                  Processing, {ICASSP} 2006, Toulouse, France, May 14-19, 2006},
  pages        = {904--907},
  publisher    = {{IEEE}},
  year         = {2006},
  url          = {https://doi.org/10.1109/ICASSP.2006.1660801},
  doi          = {10.1109/ICASSP.2006.1660801},
  timestamp    = {Mon, 22 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icassp/SakiyamaMPV06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iscas/SakiyamaPV06,
  author       = {Kazuo Sakiyama and
                  Bart Preneel and
                  Ingrid Verbauwhede},
  title        = {A fast dual-field modular arithmetic logic unit and its hardware implementation},
  booktitle    = {International Symposium on Circuits and Systems {(ISCAS} 2006), 21-24
                  May 2006, Island of Kos, Greece},
  publisher    = {{IEEE}},
  year         = {2006},
  url          = {https://doi.org/10.1109/ISCAS.2006.1692703},
  doi          = {10.1109/ISCAS.2006.1692703},
  timestamp    = {Wed, 16 Oct 2019 14:14:49 +0200},
  biburl       = {https://dblp.org/rec/conf/iscas/SakiyamaPV06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ipps/SchaumontSHV04,
  author       = {Patrick Schaumont and
                  Kazuo Sakiyama and
                  Alireza Hodjat and
                  Ingrid Verbauwhede},
  title        = {Embedded Software Integration for Coarse-Grain Reconfigurable Systems},
  booktitle    = {18th International Parallel and Distributed Processing Symposium {(IPDPS}
                  2004), {CD-ROM} / Abstracts Proceedings, 26-30 April 2004, Santa Fe,
                  New Mexico, {USA}},
  publisher    = {{IEEE} Computer Society},
  year         = {2004},
  url          = {https://doi.org/10.1109/IPDPS.2004.1303110},
  doi          = {10.1109/IPDPS.2004.1303110},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ipps/SchaumontSHV04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/aspdac/SakiyamaSV03,
  author       = {Kazuo Sakiyama and
                  Patrick Schaumont and
                  Ingrid Verbauwhede},
  editor       = {Hiroto Yasuura},
  title        = {Finding the best system design flow for a high-speed {JPEG} encoder},
  booktitle    = {Proceedings of the 2003 Asia and South Pacific Design Automation Conference,
                  {ASP-DAC} '03, Kitakyushu, Japan, January 21-24, 2003},
  pages        = {577--578},
  publisher    = {{ACM}},
  year         = {2003},
  url          = {https://doi.org/10.1145/1119772.1119899},
  doi          = {10.1145/1119772.1119899},
  timestamp    = {Thu, 11 Mar 2021 17:04:51 +0100},
  biburl       = {https://dblp.org/rec/conf/aspdac/SakiyamaSV03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/dac/HwangLSSFYHV03,
  author       = {David D. Hwang and
                  Bo{-}Cheng Lai and
                  Patrick Schaumont and
                  Kazuo Sakiyama and
                  Yi Fan and
                  Shenglin Yang and
                  Alireza Hodjat and
                  Ingrid Verbauwhede},
  title        = {Design flow for {HW} / {SW} acceleration transparency in the thumbpod
                  secure embedded system},
  booktitle    = {Proceedings of the 40th Design Automation Conference, {DAC} 2003,
                  Anaheim, CA, USA, June 2-6, 2003},
  pages        = {60--65},
  publisher    = {{ACM}},
  year         = {2003},
  url          = {https://doi.org/10.1145/775832.775850},
  doi          = {10.1145/775832.775850},
  timestamp    = {Mon, 15 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/dac/HwangLSSFYHV03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/hldvt/SchaumontSFHYHLV03,
  author       = {Patrick Schaumont and
                  Kazuo Sakiyama and
                  Yi Fan and
                  David D. Hwang and
                  Shenglin Yang and
                  Alireza Hodjat and
                  Bo{-}Cheng Lai and
                  Ingrid Verbauwhede},
  title        = {Testing ThumbPod: Softcore bugs are hard to find},
  booktitle    = {Eighth {IEEE} International High-Level Design Validation and Test
                  Workshop 2003, San Francisco, CA, USA, November 12-14, 2003},
  pages        = {77--82},
  publisher    = {{IEEE} Computer Society},
  year         = {2003},
  url          = {https://doi.org/10.1109/HLDVT.2003.1252478},
  doi          = {10.1109/HLDVT.2003.1252478},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/hldvt/SchaumontSFHYHLV03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/mse/SakiyamaSHV03,
  author       = {Kazuo Sakiyama and
                  Patrick Schaumont and
                  David Hwang and
                  Ingrid Verbauwhede},
  title        = {Teaching Trade-offs in System-level Design Methodologies},
  booktitle    = {2003 International Conference on Microelectronics Systems Education,
                  {MSE} 2003, Educating Tomorrow's Microsystems Designers, Anaheim,
                  CA, USA, June 1-2, 2003},
  pages        = {62--53},
  publisher    = {{IEEE} Computer Society},
  year         = {2003},
  url          = {https://doi.org/10.1109/MSE.2003.1205256},
  doi          = {10.1109/MSE.2003.1205256},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/mse/SakiyamaSHV03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
a service of  Schloss Dagstuhl - Leibniz Center for Informatics