default search action
Kazuo Sakiyama
Person information
- affiliation: University of Electro-Communications, Tokyo, Japan
- unicode name: 﨑山一男
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j36]Mingyu Yang, Tanvir Ahmed, Saya Inagaki, Kazuo Sakiyama, Yang Li, Yuko Hara-Azumi:
Hardware/Software Cooperative Design Against Power Side-Channel Attacks on IoT Devices. IEEE Internet Things J. 11(9): 16758-16768 (2024) - [j35]Haruka Hirata, Daiki Miyahara, Victor Arribas, Yang Li, Noriyuki Miura, Svetla Nikova, Kazuo Sakiyama:
All You Need Is Fault: Zero-Value Attacks on AES and a New λ-Detection M&M. IACR Trans. Cryptogr. Hardw. Embed. Syst. 2024(1): 133-156 (2024) - [c87]Gento Hiruma, Mingyu Yang, Yang Li, Kazuo Sakiyama, Yuko Hara-Azumi:
High-Level Synthesis Countermeasure Using Threshold Implementation with Mixed Number of Shares. HEART 2024: 18-26 - [c86]Shohei Kaneko, Pascal Lafourcade, Lola-Baie Mallordy, Daiki Miyahara, Maxime Puys, Kazuo Sakiyama:
Balance-Based ZKP Protocols for Pencil-and-Paper Puzzles. ISC (1) 2024: 211-231 - 2023
- [j34]Ryota Hira, Tomoaki Kitahara, Daiki Miyahara, Yuko Hara-Azumi, Yang Li, Kazuo Sakiyama:
Software Evaluation for Second Round Candidates in NIST Lightweight Cryptography. J. Inf. Process. 31: 205-219 (2023) - [j33]Saya Inagaki, Mingyu Yang, Yang Li, Kazuo Sakiyama, Yuko Hara-Azumi:
Power Side-channel Attack Resistant Circuit Designs of ARX Ciphers Using High-level Synthesis. ACM Trans. Embed. Comput. Syst. 22(5): 85:1-85:17 (2023) - [c85]Momoka Kasuya, Nobuyoshi Morita, Hiroki Yamazaki, Kazuo Sakiyama:
Automated Extraction for Vulnerability Management on PSIRT: A Case Study of Automotive Industry. CANDARW 2023: 232-238 - [c84]Maki Tsukahara, Haruka Hirata, Mingyu Yang, Daiki Miyahara, Yang Li, Yuko Hara-Azumi, Kazuo Sakiyama:
On the Practical Dependency of Fresh Randomness in AES S-box with Second-Order TI. CANDARW 2023: 286-291 - [c83]Saya Inagaki, Mingyu Yang, Yang Li, Kazuo Sakiyama, Yuko Hara-Azumi:
Power Side-channel Countermeasures for ARX Ciphers using High-level Synthesis. FPGA 2023: 52 - [c82]Yuki Matsukawa, Daiki Miyahara, Takeshi Sugawara, Kazuo Sakiyama, Yang Li:
Exploring Leakage Characteristics and Attacks Through Profiles of Screaming Channels. MobiSec 2023: 152-166 - [i9]Yuiko Matsubara, Daiki Miyahara, Yohei Watanabe, Mitsugu Iwamoto, Kazuo Sakiyama:
Abstraction Model of Probing and DFA Attacks on Block Ciphers. IACR Cryptol. ePrint Arch. 2023: 443 (2023) - [i8]Haruka Hirata, Daiki Miyahara, Victor Arribas, Yang Li, Noriyuki Miura, Svetla Nikova, Kazuo Sakiyama:
All You Need Is Fault: Zero-Value Attacks on AES and a New λ-Detection M&M. IACR Cryptol. ePrint Arch. 2023: 1129 (2023) - 2022
- [j32]Go Takami, Takeshi Sugawara, Kazuo Sakiyama, Yang Li:
Mixture-Based 5-Round Physical Attack against AES: Attack Proposal and Noise Evaluation. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 105-A(3): 289-299 (2022) - [c81]Tomoaki Kitahara, Ryota Hira, Yuko Hara-Azumi, Daiki Miyahara, Yang Li, Kazuo Sakiyama:
Optimized Software Implementations of Ascon, Grain-128AEAD, and TinyJambu on ARM Cortex-M0. CANDARW 2022: 316-322 - [c80]Saya Inagaki, Mingyu Yang, Yang Li, Kazuo Sakiyama, Yuko Hara-Azumi:
Examining Vulnerability of HLS-designed Chaskey-12 Circuits to Power Side-Channel Attacks. ISQED 2022: 1 - [c79]Yuichi Komano, Mitsugu Iwamoto, Kazuo Ohta, Kazuo Sakiyama:
Lightweight Authentication Using Noisy Key Derived from Physically Unclonable Function. SecITC 2022: 203-221 - [c78]Masahisa Shimano, Kazuo Sakiyama, Daiki Miyahara:
Towards Verifying Physical Assumption in Card-Based Cryptography. SecITC 2022: 289-305 - [i7]Ryota Hira, Tomoaki Kitahara, Daiki Miyahara, Yuko Hara-Azumi, Yang Li, Kazuo Sakiyama:
Software Evaluation for Second Round Candidates in NIST Lightweight Cryptography. IACR Cryptol. ePrint Arch. 2022: 591 (2022) - 2021
- [c77]Rei Kudo, Takeshi Sugawara, Kazuo Sakiyama, Yuko Hara-Azumi, Yang Li:
Revisiting System Noise in Side-Channel Attacks: Mutual Assistant SCA vs. Genetic Algorithm. AsianHOST 2021: 1-6 - [c76]Annjhih Hsiao, Takao Takenouchi, Hiroaki Kikuchi, Kazuo Sakiyama, Noriyuki Miura:
More Accurate and Robust PRNU-Based Source Camera Identification with 3-Step 3-Class Approach. IWDW 2021: 87-101 - 2020
- [j31]Kazuo Sakiyama, Tatsuya Fujii, Kohei Matsuda, Noriyuki Miura:
Flush Code Eraser: Fast Attack Response Invalidating Cryptographic Sensitive Data. IEEE Embed. Syst. Lett. 12(2): 37-40 (2020) - [c75]Go Takatoi, Takeshi Sugawara, Kazuo Sakiyama, Yang Li:
Simple Electromagnetic Analysis Against Activation Functions of Deep Neural Networks. ACNS Workshops 2020: 181-197 - [c74]Tsubasa Takaki, Yang Li, Kazuo Sakiyama, Shoei Nashimoto, Daisuke Suzuki, Takeshi Sugawara:
An Optimized Implementation of AES-GCM for FPGA Acceleration Using High-Level Synthesis. GCCE 2020: 176-180 - [c73]Marika Yabu, Kazuo Sakiyama, Takeshi Sugawara:
Low-Memory Implementation of Authenticated Encryption Algorithm SAEAES on ARM Cortex-M0 Microcontroller. GCCE 2020: 181-185 - [c72]Tomoki Uemura, Yohei Watanabe, Yang Li, Noriyuki Miura, Mitsugu Iwamoto, Kazuo Sakiyama, Kazuo Ohta:
A Key Recovery Algorithm Using Random Key Leakage from AES Key Schedule. ISITA 2020: 382-386
2010 – 2019
- 2019
- [j30]Takeshi Sugawara, Natsu Shoji, Kazuo Sakiyama, Kohei Matsuda, Noriyuki Miura, Makoto Nagata:
Side-channel leakage from sensor-based countermeasures against fault injection attack. Microelectron. J. 90: 63-71 (2019) - [j29]Yuichi Komano, Kazuo Ohta, Kazuo Sakiyama, Mitsugu Iwamoto, Ingrid Verbauwhede:
Single-Round Pattern Matching Key Generation Using Physically Unclonable Function. Secur. Commun. Networks 2019: 1719585:1-1719585:13 (2019) - [c71]Natsu Shoji, Takeshi Sugawara, Mitsugu Iwamoto, Kazuo Sakiyama:
An Abstraction Model for 1-bit Probing Attack on Block Ciphers. ICCCS 2019: 502-506 - [c70]Yang Li, Ryota Hatano, Sho Tada, Kohei Matsuda, Noriyuki Miura, Takeshi Sugawara, Kazuo Sakiyama:
Side-Channel Leakage of Alarm Signal for a Bulk-Current-Based Laser Sensor. Inscrypt 2019: 346-361 - [c69]Hakuei Sugimoto, Ryota Hatano, Natsu Shoji, Kazuo Sakiyama:
Validating the DFA Attack Resistance of AES (Short Paper). FPS 2019: 371-378 - [c68]Risa Yashiro, Yohei Hori, Toshihiro Katashita, Kazuo Sakiyama:
A Deep Learning Attack Countermeasure with Intentional Noise for a PUF-Based Authentication Scheme. SECITC 2019: 78-94 - 2018
- [j28]Risa Yashiro, Takeshi Sugawara, Mitsugu Iwamoto, Kazuo Sakiyama:
Q-Class Authentication System for Double Arbiter PUF. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 101-A(1): 129-137 (2018) - [j27]Kohei Matsuda, Tatsuya Fujii, Natsu Shoji, Takeshi Sugawara, Kazuo Sakiyama, Yu-ichi Hayashi, Makoto Nagata, Noriyuki Miura:
A 286 F2/Cell Distributed Bulk-Current Sensor and Secure Flush Code Eraser Against Laser Fault Injection Attack on Cryptographic Processor. IEEE J. Solid State Circuits 53(11): 3174-3182 (2018) - [c67]Shoei Nashimoto, Daisuke Suzuki, Takeshi Sugawara, Kazuo Sakiyama:
Sensor CON-Fusion: Defeating Kalman Filter in Signal Injection Attack. AsiaCCS 2018: 511-524 - [c66]Jean-Luc Danger, Risa Yashiro, Tarik Graba, Yves Mathieu, Abdelmalek Si-Merabet, Kazuo Sakiyama, Noriyuki Miura, Makoto Nagata:
Analysis of Mixed PUF-TRNG Circuit Based on SR-Latches in FD-SOI Technology. DSD 2018: 508-515 - [c65]Ryuga Matsumura, Takeshi Sugawara, Kazuo Sakiyama:
A Secure LiDAR with AES-Based Side-Channel Fingerprinting. CANDAR Workshops 2018: 479-482 - [c64]Zhiwei Yuan, Yang Li, Kazuo Sakiyama, Takeshi Sugawara, Jian Wang:
Recovering Memory Access Sequence with Differential Flush+Reload Attack. ISPEC 2018: 424-439 - [c63]Kohei Matsuda, Tatsuya Fujii, Natsu Shoji, Takeshi Sugawara, Kazuo Sakiyama, Yu-ichi Hayashi, Makoto Nagata, Noriyuki Miura:
A 286F2/cell distributed bulk-current sensor and secure flush code eraser against laser fault injection attack. ISSCC 2018: 352-354 - 2017
- [j26]Makoto Nagata, Daisuke Fujimoto, Noriyuki Miura, Naofumi Homma, Yu-ichi Hayashi, Kazuo Sakiyama:
Protecting cryptographic integrated circuits with side-channel information. IEICE Electron. Express 14(2): 20162005 (2017) - [c62]Takeshi Sugawara, Natsu Shoji, Kazuo Sakiyama, Kohei Matsuda, Noriyuki Miura, Makoto Nagata:
Exploiting Bitflip Detector for Non-invasive Probing and its Application to Ineffective Fault Analysis. FDTC 2017: 49-56 - [c61]Momoka Kasuya, Kazuo Sakiyama:
Improved EM Side-Channel Authentication Using Profile-Based XOR Model. WISA 2017: 173-183 - [c60]Eito Miyamoto, Takeshi Sugawara, Kazuo Sakiyama:
Efficient Software Implementation of Modular Multiplication in Prime Fields on TI's DSP TMS320C6678. WISA 2017: 261-273 - 2016
- [c59]Kohei Matsuda, Noriyuki Miura, Makoto Nagata, Yu-ichi Hayashi, Tatsuya Fujii, Kazuo Sakiyama:
On-chip substrate-bounce monitoring for laser-fault countermeasure. AsianHOST 2016: 1-6 - [c58]Risa Yashiro, Takanori Machida, Mitsugu Iwamoto, Kazuo Sakiyama:
Deep-Learning-Based Security Evaluation on Authentication Systems Using Arbiter PUF and Its Variants. IWSEC 2016: 267-285 - 2015
- [b1]Kazuo Sakiyama, Yu Sasaki, Yang Li:
Security of Block Ciphers - From Algorithm Design to Hardware Implementation. Wiley 2015, ISBN 978-1-118-66001-0, pp. I-XII, 1-295 - [j25]Dai Yamamoto, Kazuo Sakiyama, Mitsugu Iwamoto, Kazuo Ohta, Masahiko Takenaka, Kouichi Itoh, Naoya Torii:
A new method for enhancing variety and maintaining reliability of PUF responses and its evaluation on ASICs. J. Cryptogr. Eng. 5(3): 187-199 (2015) - [j24]Sho Endo, Yang Li, Naofumi Homma, Kazuo Sakiyama, Kazuo Ohta, Daisuke Fujimoto, Makoto Nagata, Toshihiro Katashita, Jean-Luc Danger, Takafumi Aoki:
A Silicon-Level Countermeasure Against Fault Sensitivity Analysis and Its Evaluation. IEEE Trans. Very Large Scale Integr. Syst. 23(8): 1429-1438 (2015) - [c57]Takanori Machida, Dai Yamamoto, Mitsugu Iwamoto, Kazuo Sakiyama:
Implementation of double arbiter PUF and its performance evaluation on FPGA. ASP-DAC 2015: 6-7 - [c56]Reina Yagasaki, Kazuo Sakiyama:
Artifact-Metric-Based Authentication for Bottles of Wine (Short Paper). IWSEC 2015: 335-344 - 2014
- [j23]Daisuke Fujimoto, Noriyuki Miura, Makoto Nagata, Yu-ichi Hayashi, Naofumi Homma, Takafumi Aoki, Yohei Hori, Toshihiro Katashita, Kazuo Sakiyama, Thanh-Ha Le, Julien Bringer, Pirouz Bazargan-Sabet, Shivam Bhasin, Jean-Luc Danger:
Power Noise Measurements of Cryptographic VLSI Circuits Regarding Side-Channel Information Leakage. IEICE Trans. Electron. 97-C(4): 272-279 (2014) - [j22]Christophe Clavier, Jean-Luc Danger, Guillaume Duc, M. Abdelaziz Elaabid, Benoît Gérard, Sylvain Guilley, Annelie Heuser, Michael Kasper, Yang Li, Victor Lomné, Daisuke Nakatsu, Kazuo Ohta, Kazuo Sakiyama, Laurent Sauvage, Werner Schindler, Marc Stöttinger, Nicolas Veyrat-Charvillon, Matthieu Walle, Antoine Wurcker:
Practical improvements of side-channel attacks on AES: feedback from the 2nd DPA contest. J. Cryptogr. Eng. 4(4): 259-274 (2014) - [j21]Kazuo Sakiyama, Yang Li, Shigeto Gomisawa, Yu-ichi Hayashi, Mitsugu Iwamoto, Naofumi Homma, Takafumi Aoki, Kazuo Ohta:
Practical DFA Strategy for AES Under Limited-access Conditions. J. Inf. Process. 22(2): 142-151 (2014) - [c55]Takanori Machida, Dai Yamamoto, Mitsugu Iwamoto, Kazuo Sakiyama:
A New Mode of Operation for Arbiter PUF to Improve Uniqueness on FPGA. FedCSIS 2014: 871-878 - [c54]Dai Yamamoto, Masahiko Takenaka, Kazuo Sakiyama, Naoya Torii:
Security Evaluation of Bistable Ring PUFs on FPGAs using Differential and Linear Analysis. FedCSIS 2014: 911-918 - [c53]Dai Yamamoto, Masahiko Takenaka, Kazuo Sakiyama, Naoya Torii:
A Technique Using PUFs for Protecting Circuit Layout Designs against Reverse Engineering. IWSEC 2014: 158-173 - [c52]Yang Li, Shugo Mikami, Dai Watanabe, Kazuo Ohta, Kazuo Sakiyama:
Single-Chip Implementation and Evaluation of Passive UHF RFID Tag with Hash-Based Mutual Authentication. RFIDSec Asia 2014: 3-15 - [i6]Kazuo Sakiyama, Patrick Schaumont, Ingrid Verbauwhede:
Design Methods for Secure Hardware (NII Shonan Meeting 2014-11). NII Shonan Meet. Rep. 2014 (2014) - 2013
- [j20]Yang Li, Kazuo Ohta, Kazuo Sakiyama:
A New Type of Fault-Based Attack: Fault Behavior Analysis. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 96-A(1): 177-184 (2013) - [j19]Shugo Mikami, Hirotaka Yoshida, Dai Watanabe, Kazuo Sakiyama:
Correlation Power Analysis and Countermeasure on the Stream Cipher Enocoro-128v2. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 96-A(3): 697-704 (2013) - [j18]Dai Yamamoto, Kazuo Sakiyama, Mitsugu Iwamoto, Kazuo Ohta, Masahiko Takenaka, Kouichi Itoh:
Variety enhancement of PUF responses using the locations of random outputting RS latches. J. Cryptogr. Eng. 3(4): 197-211 (2013) - [c51]Yang Li, Sho Endo, Nicolas Debande, Naofumi Homma, Takafumi Aoki, Thanh-Ha Le, Jean-Luc Danger, Kazuo Ohta, Kazuo Sakiyama:
Exploring the Relations between Fault Sensitivity and Power Consumption. COSADE 2013: 137-153 - [c50]Yu Sasaki, Yang Li, Hikaru Sakamoto, Kazuo Sakiyama:
Coupon Collector's Problem for Fault Analysis against AES - High Tolerance for Noisy Fault Injections. Financial Cryptography 2013: 213-220 - [c49]Yang Li, Yu-ichi Hayashi, Arisa Matsubara, Naofumi Homma, Takafumi Aoki, Kazuo Ohta, Kazuo Sakiyama:
Yet Another Fault-Based Leakage in Non-uniform Faulty Ciphertexts. FPS 2013: 272-287 - [c48]Shugo Mikami, Dai Watanabe, Kazuo Sakiyama:
A Comparative Study of Stream Ciphers and Hash Functions for RFID Authentications. RFIDSec Asia 2013: 83-94 - [c47]Yu Sasaki, Wataru Komatsubara, Yasuhide Sakai, Lei Wang, Mitsugu Iwamoto, Kazuo Sakiyama, Kazuo Ohta:
Meet-in-the-Middle Preimage Attacks Revisited - New Results on MD5 and HAVAL. SECRYPT 2013: 111-122 - [e1]Kazuo Sakiyama, Masayuki Terada:
Advances in Information and Computer Security - 8th International Workshop on Security, IWSEC 2013, Okinawa, Japan, November 18-20, 2013, Proceedings. Lecture Notes in Computer Science 8231, Springer 2013, ISBN 978-3-642-41382-7 [contents] - 2012
- [j17]Lei Wang, Yu Sasaki, Wataru Komatsubara, Kazuo Sakiyama, Kazuo Ohta:
Meet-in-the-Middle (Second) Preimage Attacks on Two Double-Branch Hash Functions RIPEMD and RIPEMD-128. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 95-A(1): 100-110 (2012) - [j16]Yang Li, Kazuo Ohta, Kazuo Sakiyama:
Toward Effective Countermeasures against an Improved Fault Sensitivity Analysis. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 95-A(1): 234-241 (2012) - [j15]Junko Takahashi, Toshinori Fukunaga, Kazuo Sakiyama:
Differential Fault Analysis on Stream Cipher MUGI. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 95-A(1): 242-251 (2012) - [j14]Yang Li, Kazuo Ohta, Kazuo Sakiyama:
New Fault-Based Side-Channel Attack Using Fault Sensitivity. IEEE Trans. Inf. Forensics Secur. 7(1): 88-97 (2012) - [j13]Kazuo Sakiyama, Yang Li, Mitsugu Iwamoto, Kazuo Ohta:
Information-Theoretic Approach to Optimal Differential Fault Analysis. IEEE Trans. Inf. Forensics Secur. 7(1): 109-120 (2012) - [j12]Miroslav Knezevic, Kazuyuki Kobayashi, Jun Ikegami, Shin'ichiro Matsuo, Akashi Satoh, Ünal Koçabas, Junfeng Fan, Toshihiro Katashita, Takeshi Sugawara, Kazuo Sakiyama, Ingrid Verbauwhede, Kazuo Ohta, Naofumi Homma, Takafumi Aoki:
Fair and Consistent Hardware Evaluation of Fourteen Round Two SHA-3 Candidates. IEEE Trans. Very Large Scale Integr. Syst. 20(5): 827-840 (2012) - [c46]Yu Sasaki, Lei Wang, Yasuhide Sakai, Kazuo Sakiyama, Kazuo Ohta:
Three-Subset Meet-in-the-Middle Attack on Reduced XTEA. AFRICACRYPT 2012: 138-154 - [c45]Yang Li, Kazuo Ohta, Kazuo Sakiyama:
An Extension of Fault Sensitivity Analysis Based on Clockwise Collision. Inscrypt 2012: 46-59 - [c44]Sho Endo, Yang Li, Naofumi Homma, Kazuo Sakiyama, Kazuo Ohta, Takafumi Aoki:
An Efficient Countermeasure against Fault Sensitivity Analysis Using Configurable Delay Blocks. FDTC 2012: 95-102 - [c43]Toshiki Nakasone, Yang Li, Yu Sasaki, Mitsugu Iwamoto, Kazuo Ohta, Kazuo Sakiyama:
Key-Dependent Weakness of AES-Based Ciphers under Clockwise Collision Distinguisher. ICISC 2012: 395-409 - [c42]Takuma Koyama, Lei Wang, Yu Sasaki, Kazuo Sakiyama, Kazuo Ohta:
New Truncated Differential Cryptanalysis on 3D Block Cipher. ISPEC 2012: 109-125 - [c41]Yu Sasaki, Lei Wang, Yasuhiro Takasaki, Kazuo Sakiyama, Kazuo Ohta:
Boomerang Distinguishers for Full HAS-160 Compression Function. IWSEC 2012: 156-169 - [c40]Lei Wang, Yu Sasaki, Kazuo Sakiyama, Kazuo Ohta:
Polynomial-Advantage Cryptanalysis of 3D Cipher and 3D-Based Hash Function. IWSEC 2012: 170-181 - [p3]Junko Takahashi, Toshinori Fukunaga, Shigeto Gomisawa, Yang Li, Kazuo Sakiyama, Kazuo Ohta:
Fault Injection and Key Retrieval Experiments on an Evaluation Board. Fault Analysis in Cryptography 2012: 313-331 - 2011
- [j11]Bagus Santoso, Kazuo Ohta, Kazuo Sakiyama, Goichiro Hanaoka:
An Efficient Authentication for Lightweight Devices by Perfecting Zero-Knowledgeness. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 94-A(1): 92-103 (2011) - [j10]Yang Li, Kazuo Sakiyama, Shin-ichi Kawamura, Kazuo Ohta:
Power Analysis against a DPA-Resistant S-Box Implementation Based on the Fourier Transform. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 94-A(1): 191-199 (2011) - [j9]Kazuo Sakiyama, Miroslav Knezevic, Junfeng Fan, Bart Preneel, Ingrid Verbauwhede:
Tripartite modular multiplication. Integr. 44(4): 259-269 (2011) - [c39]Amir Moradi, Oliver Mischke, Christof Paar, Yang Li, Kazuo Ohta, Kazuo Sakiyama:
On the Power of Fault Sensitivity Analysis and Collision Side-Channel Attacks in a Combined Setting. CHES 2011: 292-311 - [c38]Dai Yamamoto, Kazuo Sakiyama, Mitsugu Iwamoto, Kazuo Ohta, Takao Ochiai, Masahiko Takenaka, Kouichi Itoh:
Uniqueness Enhancement of PUF Responses Based on the Locations of Random Outputting RS Latches. CHES 2011: 390-406 - [c37]Lei Wang, Yu Sasaki, Wataru Komatsubara, Kazuo Ohta, Kazuo Sakiyama:
(Second) Preimage Attacks on Step-Reduced RIPEMD/RIPEMD-128 with a New Local-Collision Approach. CT-RSA 2011: 197-212 - [c36]Yoshikazu Hanatani, Miyako Ohkubo, Shin'ichiro Matsuo, Kazuo Sakiyama, Kazuo Ohta:
A Study on Computational Formal Verification for Practical Cryptographic Protocol: The Case of Synchronous RFID Authentication. Financial Cryptography Workshops 2011: 70-87 - [c35]Hikaru Sakamoto, Yang Li, Kazuo Ohta, Kazuo Sakiyama:
Fault Sensitivity Analysis Against Elliptic Curve Cryptosystems. FDTC 2011: 11-20 - [c34]Yang Li, Kazuo Ohta, Kazuo Sakiyama:
Revisit fault sensitivity analysis on WDDL-AES. HOST 2011: 148-153 - [c33]Yu Sasaki, Naoyuki Takayanagi, Kazuo Sakiyama, Kazuo Ohta:
Experimental Verification of Super-Sbox Analysis - Confirmation of Detailed Attack Complexity. IWSEC 2011: 178-192 - [i5]Yang Li, Daisuke Nakatsu, Qi Li, Kazuo Ohta, Kazuo Sakiyama:
Clockwise Collision Analysis - Overlooked Side-Channel Leakage Inside Your Measurements. IACR Cryptol. ePrint Arch. 2011: 579 (2011) - 2010
- [j8]Kazuo Sakiyama, Kazuo Ohta:
On Clock-Based Fault Analysis Attack for an AES Hardware Using RSL. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 93-A(1): 172-179 (2010) - [j7]Lei Wang, Kazuo Ohta, Yu Sasaki, Kazuo Sakiyama, Noboru Kunihiro:
Cryptanalysis of Two MD5-Based Authentication Protocols: APOP and NMAC. IEICE Trans. Inf. Syst. 93-D(5): 1087-1095 (2010) - [c32]Yu Sasaki, Yang Li, Lei Wang, Kazuo Sakiyama, Kazuo Ohta:
Non-full-active Super-Sbox Analysis: Applications to ECHO and Grøstl. ASIACRYPT 2010: 38-55 - [c31]Yang Li, Kazuo Sakiyama, Shigeto Gomisawa, Toshinori Fukunaga, Junko Takahashi, Kazuo Ohta:
Fault Sensitivity Analysis. CHES 2010: 320-334 - [c30]Bagus Santoso, Kazuo Ohta, Kazuo Sakiyama, Goichiro Hanaoka:
Improving Efficiency of an ‘On the Fly' Identification Scheme by Perfecting Zero-Knowledgeness. CT-RSA 2010: 284-301 - [c29]Masami Izumi, Jun Ikegami, Kazuo Sakiyama, Kazuo Ohta:
Improved countermeasure against Address-bit DPA for ECC scalar multiplication. DATE 2010: 981-984 - [c28]Yang Li, Kazuo Sakiyama, Lejla Batina, Daisuke Nakatsu, Kazuo Ohta:
Power Variance Analysis breaks a masked ASIC implementation of AES. DATE 2010: 1059-1064 - [c27]Kazuyuki Kobayashi, Jun Ikegami, Kazuo Sakiyama, Kazuo Ohta, Miroslav Knezevic, Ünal Koçabas, Junfeng Fan, Ingrid Verbauwhede, Eric Xu Guo, Shin'ichiro Matsuo, Sinan Huang, Leyla Nazhandali, Akashi Satoh:
Prototyping Platform for Performance Evaluation of SHA-3 Candidates. HOST 2010: 60-63 - [c26]Junko Takahashi, Toshinori Fukunaga, Kazuo Sakiyama:
Fault Analysis on Stream Cipher MUGI. ICISC 2010: 420-434 - [c25]Daisuke Nakatsu, Yang Li, Kazuo Sakiyama, Kazuo Ohta:
Combination of SW Countermeasure and CPU Modification on FPGA against Power Analysis. WISA 2010: 258-272 - [p2]Kazuo Sakiyama, Lejla Batina:
Arithmetic for Public-Key Cryptography. Secure Integrated Circuits and Systems 2010: 63-78 - [p1]Lejla Batina, Kazuo Sakiyama, Ingrid M. R. Verbauwhede:
Compact Public-Key Implementations for RFID and Sensor Nodes. Secure Integrated Circuits and Systems 2010: 179-195 - [i4]Kazuyuki Kobayashi, Jun Ikegami, Shin'ichiro Matsuo, Kazuo Sakiyama, Kazuo Ohta:
Evaluation of Hardware Performance for the SHA-3 Candidates Using SASEBO-GII. IACR Cryptol. ePrint Arch. 2010: 10 (2010) - [i3]Yang Li, Shigeto Gomisawa, Kazuo Sakiyama, Kazuo Ohta:
An Information Theoretic Perspective on the Differential Fault Analysis against AES. IACR Cryptol. ePrint Arch. 2010: 32 (2010) - [i2]Shigeto Gomisawa, Yang Li, Junko Takahashi, Toshinori Fukunaga, Yu Sasaki, Kazuo Sakiyama, Kazuo Ohta:
Efficient Differential Fault Analysis for AES. IACR Cryptol. ePrint Arch. 2010: 336 (2010) - [i1]Miyako Ohkubo, Shin'ichiro Matsuo, Yoshikazu Hanatani, Kazuo Sakiyama, Kazuo Ohta:
Robust RFID Authentication Protocol with Formal Proof and Its Feasibility. IACR Cryptol. ePrint Arch. 2010: 345 (2010)
2000 – 2009
- 2009
- [c24]Masami Izumi, Kazuo Sakiyama, Kazuo Ohta:
A New Approach for Implementing the MPL Method toward Higher SPA Resistance. ARES 2009: 181-186 - [c23]Kazuo Sakiyama, Tatsuya Yagi, Kazuo Ohta:
Fault Analysis Attack against an AES Prototype Chip Using RSL. CT-RSA 2009: 429-443 - [c22]Yang Li, Kazuo Sakiyama, Shin-ichi Kawamura, Yuichi Komano, Kazuo Ohta:
Security Evaluation of a DPA-Resistant S-Box Based on the Fourier Transform. ICICS 2009: 3-16 - [c21]Lei Wang, Yu Sasaki, Kazuo Sakiyama, Kazuo Ohta:
Bit-Free Collision: Application to APOP Attack. IWSEC 2009: 3-21 - 2008
- [j6]Junfeng Fan, Kazuo Sakiyama, Ingrid Verbauwhede:
Elliptic curve cryptography on embedded multicore systems. Des. Autom. Embed. Syst. 12(3): 231-242 (2008) - [j5]Yong Ki Lee, Kazuo Sakiyama, Lejla Batina, Ingrid Verbauwhede:
Elliptic-Curve-Based Security Processor for RFID. IEEE Trans. Computers 57(11): 1514-1527 (2008) - [c20]Miroslav Knezevic, Kazuo Sakiyama, Yong Ki Lee, Ingrid Verbauwhede:
On the high-throughput implementation of RIPEMD-160 hash algorithm. ASAP 2008: 85-90 - [c19]Junfeng Fan, Lejla Batina, Kazuo Sakiyama, Ingrid Verbauwhede:
FPGA Design for Algebraic Tori-Based Public-Key Cryptography. DATE 2008: 1292-1297 - [c18]Miroslav Knezevic, Kazuo Sakiyama, Junfeng Fan, Ingrid Verbauwhede:
Modular Reduction in GF(2n) without Pre-computational Phase. WAIFI 2008: 77-87 - 2007
- [j4]Kazuo Sakiyama, Lejla Batina, Bart Preneel, Ingrid Verbauwhede:
HW/SW co-design for public-key cryptosystems on the 8051 micro-controller. Comput. Electr. Eng. 33(5-6): 324-332 (2007) - [j3]Kazuo Sakiyama, Lejla Batina, Bart Preneel, Ingrid Verbauwhede:
High-performance Public-key Cryptoprocessor for Wireless Mobile Applications. Mob. Networks Appl. 12(4): 245-258 (2007) - [j2]Kazuo Sakiyama, Lejla Batina, Bart Preneel, Ingrid Verbauwhede:
Multicore Curve-Based Cryptoprocessor with Reconfigurable Modular Arithmetic Logic Units over GF(2n). IEEE Trans. Computers 56(9): 1269-1282 (2007) - [c17]Kazuo Sakiyama, Elke De Mulder, Bart Preneel, Ingrid Verbauwhede:
Side-channel resistant system-level design flow for public-key cryptography. ACM Great Lakes Symposium on VLSI 2007: 144-147 - [c16]Nele Mentens, Kazuo Sakiyama, Bart Preneel, Ingrid Verbauwhede:
Efficient pipelining for modular multiplication architectures in prime fields. ACM Great Lakes Symposium on VLSI 2007: 534-539 - [c15]Lejla Batina, Nele Mentens, Kazuo Sakiyama, Bart Preneel, Ingrid Verbauwhede:
Public-Key Cryptography on the Top of a Needle. ISCAS 2007: 1831-1834 - [c14]Nele Mentens, Kazuo Sakiyama, Lejla Batina, Bart Preneel, Ingrid Verbauwhede:
A Side-channel Attack Resistant Programmable PKC Coprocessor for Embedded Applications. ICSAMOS 2007: 194-200 - [c13]Junfeng Fan, Kazuo Sakiyama, Ingrid Verbauwhede:
Montgomery Modular Multiplication Algorithm on Multi-Core Systems. SiPS 2007: 261-266 - 2006
- [j1]Shenglin Yang, Kazuo Sakiyama, Ingrid Verbauwhede:
Efficient and Secure Fingerprint Verification for Embedded Devices. EURASIP J. Adv. Signal Process. 2006 (2006) - [c12]Kazuo Sakiyama, Nele Mentens, Lejla Batina, Bart Preneel, Ingrid Verbauwhede:
Reconfigurable Modular Arithmetic Logic Unit for High-Performance Public-Key Cryptosystems. ARC 2006: 347-357 - [c11]Kazuo Sakiyama, Lejla Batina, Bart Preneel, Ingrid Verbauwhede:
Superscalar Coprocessor for High-Speed Curve-Based Cryptography. CHES 2006: 415-429 - [c10]Lejla Batina, Nele Mentens, Kazuo Sakiyama, Bart Preneel, Ingrid Verbauwhede:
Low-Cost Elliptic Curve Cryptography for Wireless Sensor Networks. ESAS 2006: 6-17 - [c9]Lejla Batina, Alireza Hodjat, David Hwang, Kazuo Sakiyama, Ingrid Verbauwhede:
Reconfigurable Architectures for Curve-Based Cryptography on Embedded Micro-Controllers. FPL 2006: 1-4 - [c8]Nele Mentens, Kazuo Sakiyama, Lejla Batina, Ingrid Verbauwhede, Bart Preneel:
Fpga-Oriented Secure Data Path Design: Implementation of a Public Key Coprocessor. FPL 2006: 1-6 - [c7]Kazuo Sakiyama, Elke De Mulder, Bart Preneel, Ingrid Verbauwhede:
A Parallel Processing Hardware Architecture for Elliptic Curve Cryptosystems. ICASSP (3) 2006: 904-907 - [c6]Kazuo Sakiyama, Bart Preneel, Ingrid Verbauwhede:
A fast dual-field modular arithmetic logic unit and its hardware implementation. ISCAS 2006 - 2004
- [c5]Patrick Schaumont, Kazuo Sakiyama, Alireza Hodjat, Ingrid Verbauwhede:
Embedded Software Integration for Coarse-Grain Reconfigurable Systems. IPDPS 2004 - 2003
- [c4]Kazuo Sakiyama, Patrick Schaumont, Ingrid Verbauwhede:
Finding the best system design flow for a high-speed JPEG encoder. ASP-DAC 2003: 577-578 - [c3]David D. Hwang, Bo-Cheng Lai, Patrick Schaumont, Kazuo Sakiyama, Yi Fan, Shenglin Yang, Alireza Hodjat, Ingrid Verbauwhede:
Design flow for HW / SW acceleration transparency in the thumbpod secure embedded system. DAC 2003: 60-65 - [c2]Patrick Schaumont, Kazuo Sakiyama, Yi Fan, David D. Hwang, Shenglin Yang, Alireza Hodjat, Bo-Cheng Lai, Ingrid Verbauwhede:
Testing ThumbPod: Softcore bugs are hard to find. HLDVT 2003: 77-82 - [c1]Kazuo Sakiyama, Patrick Schaumont, David Hwang, Ingrid Verbauwhede:
Teaching Trade-offs in System-level Design Methodologies. MSE 2003: 62-53
Coauthor Index
aka: Ingrid M. R. Verbauwhede
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-12-02 22:26 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint