


Остановите войну!
for scientists:


default search action
Kazuo Sakiyama
﨑山一男
Person information

- affiliation: University of Electro-Communications, Tokyo, Japan
- unicode name: 﨑山一男
Refine list

refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
showing all ?? records
2020 – today
- 2023
- [j33]Ryota Hira, Tomoaki Kitahara, Daiki Miyahara, Yuko Hara-Azumi, Yang Li, Kazuo Sakiyama:
Software Evaluation for Second Round Candidates in NIST Lightweight Cryptography. J. Inf. Process. 31: 205-219 (2023) - [c82]Saya Inagaki
, Mingyu Yang
, Yang Li, Kazuo Sakiyama
, Yuko Hara-Azumi
:
Power Side-channel Countermeasures for ARX Ciphers using High-level Synthesis. FPGA 2023: 52 - [i9]Yuiko Matsubara, Daiki Miyahara, Yohei Watanabe, Mitsugu Iwamoto, Kazuo Sakiyama:
Abstraction Model of Probing and DFA Attacks on Block Ciphers. IACR Cryptol. ePrint Arch. 2023: 443 (2023) - [i8]Haruka Hirata, Daiki Miyahara, Victor Arribas, Yang Li, Noriyuki Miura, Svetla Nikova, Kazuo Sakiyama:
All You Need Is Fault: Zero-Value Attacks on AES and a New λ-Detection M&M. IACR Cryptol. ePrint Arch. 2023: 1129 (2023) - 2022
- [j32]Go Takami, Takeshi Sugawara
, Kazuo Sakiyama, Yang Li:
Mixture-Based 5-Round Physical Attack against AES: Attack Proposal and Noise Evaluation. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 105-A(3): 289-299 (2022) - [c81]Tomoaki Kitahara, Ryota Hira, Yuko Hara-Azumi, Daiki Miyahara, Yang Li, Kazuo Sakiyama:
Optimized Software Implementations of Ascon, Grain-128AEAD, and TinyJambu on ARM Cortex-M0. CANDARW 2022: 316-322 - [c80]Saya Inagaki, Mingyu Yang, Yang Li, Kazuo Sakiyama, Yuko Hara-Azumi:
Examining Vulnerability of HLS-designed Chaskey-12 Circuits to Power Side-Channel Attacks. ISQED 2022: 1 - [c79]Yuichi Komano
, Mitsugu Iwamoto
, Kazuo Ohta
, Kazuo Sakiyama
:
Lightweight Authentication Using Noisy Key Derived from Physically Unclonable Function. SecITC 2022: 203-221 - [c78]Masahisa Shimano
, Kazuo Sakiyama
, Daiki Miyahara
:
Towards Verifying Physical Assumption in Card-Based Cryptography. SecITC 2022: 289-305 - [i7]Ryota Hira, Tomoaki Kitahara, Daiki Miyahara, Yuko Hara-Azumi, Yang Li, Kazuo Sakiyama:
Software Evaluation for Second Round Candidates in NIST Lightweight Cryptography. IACR Cryptol. ePrint Arch. 2022: 591 (2022) - 2021
- [c77]Rei Kudo, Takeshi Sugawara
, Kazuo Sakiyama, Yuko Hara-Azumi, Yang Li:
Revisiting System Noise in Side-Channel Attacks: Mutual Assistant SCA vs. Genetic Algorithm. AsianHOST 2021: 1-6 - [c76]Annjhih Hsiao, Takao Takenouchi, Hiroaki Kikuchi, Kazuo Sakiyama, Noriyuki Miura:
More Accurate and Robust PRNU-Based Source Camera Identification with 3-Step 3-Class Approach. IWDW 2021: 87-101 - 2020
- [j31]Kazuo Sakiyama
, Tatsuya Fujii, Kohei Matsuda
, Noriyuki Miura
:
Flush Code Eraser: Fast Attack Response Invalidating Cryptographic Sensitive Data. IEEE Embed. Syst. Lett. 12(2): 37-40 (2020) - [c75]Go Takatoi, Takeshi Sugawara
, Kazuo Sakiyama, Yang Li:
Simple Electromagnetic Analysis Against Activation Functions of Deep Neural Networks. ACNS Workshops 2020: 181-197 - [c74]Tsubasa Takaki, Yang Li, Kazuo Sakiyama, Shoei Nashimoto, Daisuke Suzuki, Takeshi Sugawara
:
An Optimized Implementation of AES-GCM for FPGA Acceleration Using High-Level Synthesis. GCCE 2020: 176-180 - [c73]Marika Yabu, Kazuo Sakiyama, Takeshi Sugawara
:
Low-Memory Implementation of Authenticated Encryption Algorithm SAEAES on ARM Cortex-M0 Microcontroller. GCCE 2020: 181-185 - [c72]Tomoki Uemura, Yohei Watanabe, Yang Li, Noriyuki Miura, Mitsugu Iwamoto, Kazuo Sakiyama, Kazuo Ohta:
A Key Recovery Algorithm Using Random Key Leakage from AES Key Schedule. ISITA 2020: 382-386
2010 – 2019
- 2019
- [j30]Takeshi Sugawara
, Natsu Shoji, Kazuo Sakiyama
, Kohei Matsuda, Noriyuki Miura, Makoto Nagata
:
Side-channel leakage from sensor-based countermeasures against fault injection attack. Microelectron. J. 90: 63-71 (2019) - [j29]Yuichi Komano
, Kazuo Ohta, Kazuo Sakiyama, Mitsugu Iwamoto, Ingrid Verbauwhede
:
Single-Round Pattern Matching Key Generation Using Physically Unclonable Function. Secur. Commun. Networks 2019: 1719585:1-1719585:13 (2019) - [c71]Natsu Shoji, Takeshi Sugawara
, Mitsugu Iwamoto, Kazuo Sakiyama:
An Abstraction Model for 1-bit Probing Attack on Block Ciphers. ICCCS 2019: 502-506 - [c70]Yang Li, Ryota Hatano, Sho Tada, Kohei Matsuda, Noriyuki Miura, Takeshi Sugawara, Kazuo Sakiyama:
Side-Channel Leakage of Alarm Signal for a Bulk-Current-Based Laser Sensor. Inscrypt 2019: 346-361 - [c69]Hakuei Sugimoto, Ryota Hatano, Natsu Shoji, Kazuo Sakiyama:
Validating the DFA Attack Resistance of AES (Short Paper). FPS 2019: 371-378 - [c68]Risa Yashiro, Yohei Hori, Toshihiro Katashita, Kazuo Sakiyama:
A Deep Learning Attack Countermeasure with Intentional Noise for a PUF-Based Authentication Scheme. SECITC 2019: 78-94 - 2018
- [j28]Risa Yashiro, Takeshi Sugawara
, Mitsugu Iwamoto, Kazuo Sakiyama:
Q-Class Authentication System for Double Arbiter PUF. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 101-A(1): 129-137 (2018) - [j27]Kohei Matsuda
, Tatsuya Fujii, Natsu Shoji, Takeshi Sugawara
, Kazuo Sakiyama
, Yu-ichi Hayashi, Makoto Nagata
, Noriyuki Miura
:
A 286 F2/Cell Distributed Bulk-Current Sensor and Secure Flush Code Eraser Against Laser Fault Injection Attack on Cryptographic Processor. IEEE J. Solid State Circuits 53(11): 3174-3182 (2018) - [c67]Shoei Nashimoto, Daisuke Suzuki, Takeshi Sugawara
, Kazuo Sakiyama:
Sensor CON-Fusion: Defeating Kalman Filter in Signal Injection Attack. AsiaCCS 2018: 511-524 - [c66]Jean-Luc Danger, Risa Yashiro, Tarik Graba, Yves Mathieu, Abdelmalek Si-Merabet, Kazuo Sakiyama, Noriyuki Miura, Makoto Nagata
:
Analysis of Mixed PUF-TRNG Circuit Based on SR-Latches in FD-SOI Technology. DSD 2018: 508-515 - [c65]Ryuga Matsumura, Takeshi Sugawara
, Kazuo Sakiyama:
A Secure LiDAR with AES-Based Side-Channel Fingerprinting. CANDAR Workshops 2018: 479-482 - [c64]Zhiwei Yuan, Yang Li, Kazuo Sakiyama, Takeshi Sugawara
, Jian Wang:
Recovering Memory Access Sequence with Differential Flush+Reload Attack. ISPEC 2018: 424-439 - [c63]Kohei Matsuda, Tatsuya Fujii, Natsu Shoji, Takeshi Sugawara
, Kazuo Sakiyama, Yu-ichi Hayashi, Makoto Nagata
, Noriyuki Miura:
A 286F2/cell distributed bulk-current sensor and secure flush code eraser against laser fault injection attack. ISSCC 2018: 352-354 - 2017
- [j26]Makoto Nagata
, Daisuke Fujimoto, Noriyuki Miura, Naofumi Homma, Yu-ichi Hayashi, Kazuo Sakiyama:
Protecting cryptographic integrated circuits with side-channel information. IEICE Electron. Express 14(2): 20162005 (2017) - [c62]Takeshi Sugawara
, Natsu Shoji, Kazuo Sakiyama, Kohei Matsuda, Noriyuki Miura, Makoto Nagata
:
Exploiting Bitflip Detector for Non-invasive Probing and its Application to Ineffective Fault Analysis. FDTC 2017: 49-56 - [c61]Momoka Kasuya, Kazuo Sakiyama:
Improved EM Side-Channel Authentication Using Profile-Based XOR Model. WISA 2017: 173-183 - [c60]Eito Miyamoto, Takeshi Sugawara
, Kazuo Sakiyama:
Efficient Software Implementation of Modular Multiplication in Prime Fields on TI's DSP TMS320C6678. WISA 2017: 261-273 - 2016
- [c59]Kohei Matsuda, Noriyuki Miura, Makoto Nagata
, Yu-ichi Hayashi, Tatsuya Fujii, Kazuo Sakiyama:
On-chip substrate-bounce monitoring for laser-fault countermeasure. AsianHOST 2016: 1-6 - [c58]Risa Yashiro, Takanori Machida, Mitsugu Iwamoto, Kazuo Sakiyama:
Deep-Learning-Based Security Evaluation on Authentication Systems Using Arbiter PUF and Its Variants. IWSEC 2016: 267-285 - 2015
- [b1]Kazuo Sakiyama, Yu Sasaki, Yang Li:
Security of Block Ciphers - From Algorithm Design to Hardware Implementation. Wiley 2015, ISBN 978-1-118-66001-0, pp. I-XII, 1-295 - [j25]Dai Yamamoto, Kazuo Sakiyama, Mitsugu Iwamoto, Kazuo Ohta, Masahiko Takenaka, Kouichi Itoh, Naoya Torii:
A new method for enhancing variety and maintaining reliability of PUF responses and its evaluation on ASICs. J. Cryptogr. Eng. 5(3): 187-199 (2015) - [j24]Sho Endo, Yang Li, Naofumi Homma, Kazuo Sakiyama, Kazuo Ohta, Daisuke Fujimoto, Makoto Nagata
, Toshihiro Katashita
, Jean-Luc Danger, Takafumi Aoki:
A Silicon-Level Countermeasure Against Fault Sensitivity Analysis and Its Evaluation. IEEE Trans. Very Large Scale Integr. Syst. 23(8): 1429-1438 (2015) - [c57]Takanori Machida, Dai Yamamoto, Mitsugu Iwamoto, Kazuo Sakiyama:
Implementation of double arbiter PUF and its performance evaluation on FPGA. ASP-DAC 2015: 6-7 - [c56]Reina Yagasaki, Kazuo Sakiyama:
Artifact-Metric-Based Authentication for Bottles of Wine (Short Paper). IWSEC 2015: 335-344 - 2014
- [j23]Daisuke Fujimoto, Noriyuki Miura, Makoto Nagata
, Yu-ichi Hayashi, Naofumi Homma, Takafumi Aoki, Yohei Hori
, Toshihiro Katashita
, Kazuo Sakiyama, Thanh-Ha Le, Julien Bringer, Pirouz Bazargan-Sabet, Shivam Bhasin, Jean-Luc Danger:
Power Noise Measurements of Cryptographic VLSI Circuits Regarding Side-Channel Information Leakage. IEICE Trans. Electron. 97-C(4): 272-279 (2014) - [j22]Christophe Clavier, Jean-Luc Danger, Guillaume Duc, M. Abdelaziz Elaabid, Benoît Gérard, Sylvain Guilley, Annelie Heuser, Michael Kasper, Yang Li, Victor Lomné, Daisuke Nakatsu, Kazuo Ohta, Kazuo Sakiyama, Laurent Sauvage, Werner Schindler
, Marc Stöttinger, Nicolas Veyrat-Charvillon, Matthieu Walle, Antoine Wurcker:
Practical improvements of side-channel attacks on AES: feedback from the 2nd DPA contest. J. Cryptogr. Eng. 4(4): 259-274 (2014) - [j21]Kazuo Sakiyama, Yang Li, Shigeto Gomisawa, Yu-ichi Hayashi, Mitsugu Iwamoto, Naofumi Homma, Takafumi Aoki, Kazuo Ohta:
Practical DFA Strategy for AES Under Limited-access Conditions. J. Inf. Process. 22(2): 142-151 (2014) - [c55]Takanori Machida, Dai Yamamoto, Mitsugu Iwamoto, Kazuo Sakiyama:
A New Mode of Operation for Arbiter PUF to Improve Uniqueness on FPGA. FedCSIS 2014: 871-878 - [c54]Dai Yamamoto, Masahiko Takenaka, Kazuo Sakiyama, Naoya Torii:
Security Evaluation of Bistable Ring PUFs on FPGAs using Differential and Linear Analysis. FedCSIS 2014: 911-918 - [c53]Dai Yamamoto, Masahiko Takenaka, Kazuo Sakiyama, Naoya Torii:
A Technique Using PUFs for Protecting Circuit Layout Designs against Reverse Engineering. IWSEC 2014: 158-173 - [c52]Yang Li, Shugo Mikami, Dai Watanabe, Kazuo Ohta, Kazuo Sakiyama:
Single-Chip Implementation and Evaluation of Passive UHF RFID Tag with Hash-Based Mutual Authentication. RFIDSec Asia 2014: 3-15 - [i6]Kazuo Sakiyama, Patrick Schaumont
, Ingrid Verbauwhede:
Design Methods for Secure Hardware (NII Shonan Meeting 2014-11). NII Shonan Meet. Rep. 2014 (2014) - 2013
- [j20]Yang Li, Kazuo Ohta, Kazuo Sakiyama:
A New Type of Fault-Based Attack: Fault Behavior Analysis. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 96-A(1): 177-184 (2013) - [j19]Shugo Mikami, Hirotaka Yoshida, Dai Watanabe, Kazuo Sakiyama:
Correlation Power Analysis and Countermeasure on the Stream Cipher Enocoro-128v2. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 96-A(3): 697-704 (2013) - [j18]Dai Yamamoto, Kazuo Sakiyama, Mitsugu Iwamoto, Kazuo Ohta, Masahiko Takenaka, Kouichi Itoh:
Variety enhancement of PUF responses using the locations of random outputting RS latches. J. Cryptogr. Eng. 3(4): 197-211 (2013) - [c51]Yang Li, Sho Endo, Nicolas Debande, Naofumi Homma, Takafumi Aoki, Thanh-Ha Le, Jean-Luc Danger, Kazuo Ohta, Kazuo Sakiyama:
Exploring the Relations between Fault Sensitivity and Power Consumption. COSADE 2013: 137-153 - [c50]Yu Sasaki, Yang Li, Hikaru Sakamoto, Kazuo Sakiyama:
Coupon Collector's Problem for Fault Analysis against AES - High Tolerance for Noisy Fault Injections. Financial Cryptography 2013: 213-220 - [c49]Yang Li, Yu-ichi Hayashi, Arisa Matsubara, Naofumi Homma, Takafumi Aoki, Kazuo Ohta, Kazuo Sakiyama:
Yet Another Fault-Based Leakage in Non-uniform Faulty Ciphertexts. FPS 2013: 272-287 - [c48]Shugo Mikami, Dai Watanabe, Kazuo Sakiyama:
A Comparative Study of Stream Ciphers and Hash Functions for RFID Authentications. RFIDSec Asia 2013: 83-94 - [c47]Yu Sasaki, Wataru Komatsubara, Yasuhide Sakai, Lei Wang, Mitsugu Iwamoto, Kazuo Sakiyama, Kazuo Ohta:
Meet-in-the-Middle Preimage Attacks Revisited - New Results on MD5 and HAVAL. SECRYPT 2013: 111-122 - [e1]Kazuo Sakiyama, Masayuki Terada:
Advances in Information and Computer Security - 8th International Workshop on Security, IWSEC 2013, Okinawa, Japan, November 18-20, 2013, Proceedings. Lecture Notes in Computer Science 8231, Springer 2013, ISBN 978-3-642-41382-7 [contents] - 2012
- [j17]Lei Wang, Yu Sasaki, Wataru Komatsubara, Kazuo Sakiyama, Kazuo Ohta:
Meet-in-the-Middle (Second) Preimage Attacks on Two Double-Branch Hash Functions RIPEMD and RIPEMD-128. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 95-A(1): 100-110 (2012) - [j16]Yang Li, Kazuo Ohta, Kazuo Sakiyama:
Toward Effective Countermeasures against an Improved Fault Sensitivity Analysis. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 95-A(1): 234-241 (2012) - [j15]Junko Takahashi, Toshinori Fukunaga, Kazuo Sakiyama:
Differential Fault Analysis on Stream Cipher MUGI. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 95-A(1): 242-251 (2012) - [j14]Yang Li, Kazuo Ohta, Kazuo Sakiyama:
New Fault-Based Side-Channel Attack Using Fault Sensitivity. IEEE Trans. Inf. Forensics Secur. 7(1): 88-97 (2012) - [j13]Kazuo Sakiyama, Yang Li, Mitsugu Iwamoto, Kazuo Ohta:
Information-Theoretic Approach to Optimal Differential Fault Analysis. IEEE Trans. Inf. Forensics Secur. 7(1): 109-120 (2012) - [j12]Miroslav Knezevic, Kazuyuki Kobayashi, Jun Ikegami, Shin'ichiro Matsuo, Akashi Satoh, Ünal Koçabas, Junfeng Fan, Toshihiro Katashita
, Takeshi Sugawara
, Kazuo Sakiyama, Ingrid Verbauwhede
, Kazuo Ohta, Naofumi Homma, Takafumi Aoki:
Fair and Consistent Hardware Evaluation of Fourteen Round Two SHA-3 Candidates. IEEE Trans. Very Large Scale Integr. Syst. 20(5): 827-840 (2012) - [c46]Yu Sasaki, Lei Wang, Yasuhide Sakai, Kazuo Sakiyama, Kazuo Ohta:
Three-Subset Meet-in-the-Middle Attack on Reduced XTEA. AFRICACRYPT 2012: 138-154 - [c45]Yang Li, Kazuo Ohta, Kazuo Sakiyama:
An Extension of Fault Sensitivity Analysis Based on Clockwise Collision. Inscrypt 2012: 46-59 - [c44]Sho Endo, Yang Li, Naofumi Homma, Kazuo Sakiyama, Kazuo Ohta, Takafumi Aoki:
An Efficient Countermeasure against Fault Sensitivity Analysis Using Configurable Delay Blocks. FDTC 2012: 95-102 - [c43]Toshiki Nakasone, Yang Li, Yu Sasaki, Mitsugu Iwamoto, Kazuo Ohta, Kazuo Sakiyama:
Key-Dependent Weakness of AES-Based Ciphers under Clockwise Collision Distinguisher. ICISC 2012: 395-409 - [c42]Takuma Koyama, Lei Wang, Yu Sasaki, Kazuo Sakiyama, Kazuo Ohta:
New Truncated Differential Cryptanalysis on 3D Block Cipher. ISPEC 2012: 109-125 - [c41]Yu Sasaki, Lei Wang, Yasuhiro Takasaki, Kazuo Sakiyama, Kazuo Ohta:
Boomerang Distinguishers for Full HAS-160 Compression Function. IWSEC 2012: 156-169 - [c40]Lei Wang, Yu Sasaki, Kazuo Sakiyama, Kazuo Ohta:
Polynomial-Advantage Cryptanalysis of 3D Cipher and 3D-Based Hash Function. IWSEC 2012: 170-181 - [p3]Junko Takahashi, Toshinori Fukunaga, Shigeto Gomisawa, Yang Li, Kazuo Sakiyama, Kazuo Ohta:
Fault Injection and Key Retrieval Experiments on an Evaluation Board. Fault Analysis in Cryptography 2012: 313-331 - 2011
- [j11]Bagus Santoso
, Kazuo Ohta, Kazuo Sakiyama, Goichiro Hanaoka
:
An Efficient Authentication for Lightweight Devices by Perfecting Zero-Knowledgeness. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 94-A(1): 92-103 (2011) - [j10]Yang Li, Kazuo Sakiyama, Shin-ichi Kawamura
, Kazuo Ohta:
Power Analysis against a DPA-Resistant S-Box Implementation Based on the Fourier Transform. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 94-A(1): 191-199 (2011) - [j9]Kazuo Sakiyama, Miroslav Knezevic, Junfeng Fan, Bart Preneel
, Ingrid Verbauwhede
:
Tripartite modular multiplication. Integr. 44(4): 259-269 (2011) - [c39]Amir Moradi
, Oliver Mischke, Christof Paar, Yang Li, Kazuo Ohta, Kazuo Sakiyama:
On the Power of Fault Sensitivity Analysis and Collision Side-Channel Attacks in a Combined Setting. CHES 2011: 292-311 - [c38]Dai Yamamoto, Kazuo Sakiyama, Mitsugu Iwamoto, Kazuo Ohta, Takao Ochiai, Masahiko Takenaka, Kouichi Itoh:
Uniqueness Enhancement of PUF Responses Based on the Locations of Random Outputting RS Latches. CHES 2011: 390-406 - [c37]Lei Wang, Yu Sasaki, Wataru Komatsubara, Kazuo Ohta, Kazuo Sakiyama:
(Second) Preimage Attacks on Step-Reduced RIPEMD/RIPEMD-128 with a New Local-Collision Approach. CT-RSA 2011: 197-212 - [c36]Yoshikazu Hanatani, Miyako Ohkubo, Shin'ichiro Matsuo, Kazuo Sakiyama, Kazuo Ohta:
A Study on Computational Formal Verification for Practical Cryptographic Protocol: The Case of Synchronous RFID Authentication. Financial Cryptography Workshops 2011: 70-87 - [c35]Hikaru Sakamoto, Yang Li, Kazuo Ohta, Kazuo Sakiyama:
Fault Sensitivity Analysis Against Elliptic Curve Cryptosystems. FDTC 2011: 11-20 - [c34]Yang Li, Kazuo Ohta, Kazuo Sakiyama:
Revisit fault sensitivity analysis on WDDL-AES. HOST 2011: 148-153 - [c33]Yu Sasaki, Naoyuki Takayanagi, Kazuo Sakiyama, Kazuo Ohta:
Experimental Verification of Super-Sbox Analysis - Confirmation of Detailed Attack Complexity. IWSEC 2011: 178-192 - [i5]Yang Li, Daisuke Nakatsu, Qi Li, Kazuo Ohta, Kazuo Sakiyama:
Clockwise Collision Analysis - Overlooked Side-Channel Leakage Inside Your Measurements. IACR Cryptol. ePrint Arch. 2011: 579 (2011) - 2010
- [j8]Kazuo Sakiyama, Kazuo Ohta:
On Clock-Based Fault Analysis Attack for an AES Hardware Using RSL. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 93-A(1): 172-179 (2010) - [j7]Lei Wang, Kazuo Ohta, Yu Sasaki, Kazuo Sakiyama, Noboru Kunihiro
:
Cryptanalysis of Two MD5-Based Authentication Protocols: APOP and NMAC. IEICE Trans. Inf. Syst. 93-D(5): 1087-1095 (2010) - [c32]Yu Sasaki, Yang Li, Lei Wang, Kazuo Sakiyama, Kazuo Ohta:
Non-full-active Super-Sbox Analysis: Applications to ECHO and Grøstl. ASIACRYPT 2010: 38-55 - [c31]Yang Li, Kazuo Sakiyama, Shigeto Gomisawa, Toshinori Fukunaga, Junko Takahashi, Kazuo Ohta:
Fault Sensitivity Analysis. CHES 2010: 320-334 - [c30]Bagus Santoso
, Kazuo Ohta, Kazuo Sakiyama, Goichiro Hanaoka:
Improving Efficiency of an ‘On the Fly' Identification Scheme by Perfecting Zero-Knowledgeness. CT-RSA 2010: 284-301 - [c29]Masami Izumi, Jun Ikegami, Kazuo Sakiyama, Kazuo Ohta:
Improved countermeasure against Address-bit DPA for ECC scalar multiplication. DATE 2010: 981-984 - [c28]Yang Li, Kazuo Sakiyama, Lejla Batina, Daisuke Nakatsu, Kazuo Ohta:
Power Variance Analysis breaks a masked ASIC implementation of AES. DATE 2010: 1059-1064 - [c27]Kazuyuki Kobayashi, Jun Ikegami, Kazuo Sakiyama, Kazuo Ohta, Miroslav Knezevic, Ünal Koçabas, Junfeng Fan, Ingrid Verbauwhede
, Eric Xu Guo, Shin'ichiro Matsuo, Sinan Huang, Leyla Nazhandali, Akashi Satoh:
Prototyping Platform for Performance Evaluation of SHA-3 Candidates. HOST 2010: 60-63 - [c26]Junko Takahashi, Toshinori Fukunaga, Kazuo Sakiyama:
Fault Analysis on Stream Cipher MUGI. ICISC 2010: 420-434 - [c25]Daisuke Nakatsu, Yang Li, Kazuo Sakiyama, Kazuo Ohta:
Combination of SW Countermeasure and CPU Modification on FPGA against Power Analysis. WISA 2010: 258-272 - [p2]Kazuo Sakiyama, Lejla Batina:
Arithmetic for Public-Key Cryptography. Secure Integrated Circuits and Systems 2010: 63-78 - [p1]Lejla Batina, Kazuo Sakiyama, Ingrid M. R. Verbauwhede
:
Compact Public-Key Implementations for RFID and Sensor Nodes. Secure Integrated Circuits and Systems 2010: 179-195 - [i4]Kazuyuki Kobayashi, Jun Ikegami, Shin'ichiro Matsuo, Kazuo Sakiyama, Kazuo Ohta:
Evaluation of Hardware Performance for the SHA-3 Candidates Using SASEBO-GII. IACR Cryptol. ePrint Arch. 2010: 10 (2010) - [i3]Yang Li, Shigeto Gomisawa, Kazuo Sakiyama, Kazuo Ohta:
An Information Theoretic Perspective on the Differential Fault Analysis against AES. IACR Cryptol. ePrint Arch. 2010: 32 (2010) - [i2]Shigeto Gomisawa, Yang Li, Junko Takahashi, Toshinori Fukunaga, Yu Sasaki, Kazuo Sakiyama, Kazuo Ohta:
Efficient Differential Fault Analysis for AES. IACR Cryptol. ePrint Arch. 2010: 336 (2010) - [i1]Miyako Ohkubo, Shin'ichiro Matsuo, Yoshikazu Hanatani, Kazuo Sakiyama, Kazuo Ohta:
Robust RFID Authentication Protocol with Formal Proof and Its Feasibility. IACR Cryptol. ePrint Arch. 2010: 345 (2010)
2000 – 2009
- 2009
- [c24]Masami Izumi, Kazuo Sakiyama, Kazuo Ohta:
A New Approach for Implementing the MPL Method toward Higher SPA Resistance. ARES 2009: 181-186 - [c23]Kazuo Sakiyama, Tatsuya Yagi, Kazuo Ohta:
Fault Analysis Attack against an AES Prototype Chip Using RSL. CT-RSA 2009: 429-443 - [c22]Yang Li, Kazuo Sakiyama, Shin-ichi Kawamura
, Yuichi Komano
, Kazuo Ohta:
Security Evaluation of a DPA-Resistant S-Box Based on the Fourier Transform. ICICS 2009: 3-16 - [c21]Lei Wang, Yu Sasaki, Kazuo Sakiyama, Kazuo Ohta:
Bit-Free Collision: Application to APOP Attack. IWSEC 2009: 3-21 - 2008
- [j6]Junfeng Fan, Kazuo Sakiyama, Ingrid Verbauwhede
:
Elliptic curve cryptography on embedded multicore systems. Des. Autom. Embed. Syst. 12(3): 231-242 (2008) - [j5]Yong Ki Lee, Kazuo Sakiyama, Lejla Batina, Ingrid Verbauwhede
:
Elliptic-Curve-Based Security Processor for RFID. IEEE Trans. Computers 57(11): 1514-1527 (2008) - [c20]Miroslav Knezevic, Kazuo Sakiyama, Yong Ki Lee, Ingrid Verbauwhede
:
On the high-throughput implementation of RIPEMD-160 hash algorithm. ASAP 2008: 85-90 - [c19]Junfeng Fan, Lejla Batina, Kazuo Sakiyama, Ingrid Verbauwhede
:
FPGA Design for Algebraic Tori-Based Public-Key Cryptography. DATE 2008: 1292-1297 - [c18]Miroslav Knezevic, Kazuo Sakiyama, Junfeng Fan, Ingrid Verbauwhede
:
Modular Reduction in GF(2n) without Pre-computational Phase. WAIFI 2008: 77-87 - 2007
- [j4]Kazuo Sakiyama, Lejla Batina, Bart Preneel, Ingrid Verbauwhede
:
HW/SW co-design for public-key cryptosystems on the 8051 micro-controller. Comput. Electr. Eng. 33(5-6): 324-332 (2007) - [j3]Kazuo Sakiyama, Lejla Batina, Bart Preneel, Ingrid Verbauwhede
:
High-performance Public-key Cryptoprocessor for Wireless Mobile Applications. Mob. Networks Appl. 12(4): 245-258 (2007) - [j2]Kazuo Sakiyama, Lejla Batina, Bart Preneel, Ingrid Verbauwhede
:
Multicore Curve-Based Cryptoprocessor with Reconfigurable Modular Arithmetic Logic Units over GF(2n). IEEE Trans. Computers 56(9): 1269-1282 (2007) - [c17]