研究成果

著書(分担執筆)

  1. Kazuo Sakiyama, Yu Sasaki, and Yang Li, “Security of Block Ciphers: From Algorithm Design to Hardware Implementation,” ISBN 978-1-118-66001-0, Wiley, (Jul., 2015).
  2. Kazuo Sakiyama and Masayuki Terada (Eds.), “Advances in Information and Computer Security – 8th International Workshop on Security,” IWSEC 2013, Okinawa, Japan, November 18-20, 2013. Proceedings. Lecture Notes in Computer Science 8231,” ISBN 978-3642413834, Springer, (Nov., 2013).
  3. “ユニーク&エキサイティングサイエンス,” 梶谷 誠 (監修), ISBN 978-4-7649-0442-2, 近代科学社, 分担執筆, 崎山一男, “第2章 暗号がつなぐ人と人工物とのコミュニケーション: 暗号とプライバシーとRFIDシステム,” pp.45-70, (Mar., 2013).
  4. Junko Takahashi, Toshinori Fukunaga, Shigeto Gomisawa, Yang Li, Kazuo Sakiyama, and Kazuo Ohta, “Fault Injection and Key Retrieval Experiments on Evaluation Board,” Chapter in Marc Joye and Michael Tunstall editors, Fault Analysis in Cryptography, ISBN 978-3-642-29656-7, Springer, pp.313-331 (Jul., 2012).
  5. Kazuo Sakiyama and Lejla Batina, “Arithmetic for Public-key Cryptography,” Chapter in Ingrid Verbauwhede editor, Secure Integrated Circuits and Systems, ISBN 978-0-387-71827-9, Springer, pp.63-78, (Feb., 2010).
  6. Lejla Batina and Kazuo Sakiyama, “Compact Public-key Implementations for RFID and Sensor Nodes,” Chapter in Ingrid Verbauwhede editor, Secure Integrated Circuits and Systems, ISBN 978-0-387-71829-3, Springer, pp.179-196, (Feb., 2010).
  7. Lejla Batina, Kazuo Sakiyama, and Ingrid Verbauwhede, “Architectures for Public-key Cryptography,” Chapter in Vojin G. Oklobdzija editor, Digital Systems and Applications, ISBN 978-0-8493-8619-0, CRC press, (Nov., 2007).

学術論文(査読あり)

  1. Risa Yashiro, Takeshi Sugawara, Mitsugu Iwamoto, and Kazuo Sakiyama, “Q-class Authentication System for Double Arbiter PUF,” IEICE Trans. Fundam. Electron. Commun. Comput. Sci., Vol.E101-A, No.1, pp.XXX-YYY, (to appear in Jan., 2018).
  2. Makoto Nagata, Daisuke Fujimoto, Noriyuki Miura, Naofumi Homma, Yu-ichi Hayashi, and Kazuo Sakiyama, “Protecting cryptographic integrated circuits with side-channel information,” IEICE Electronic Express, IEICE, Vol.14, No.2, pp.20162005, (Jan., 2017).
  3. Shugo Mikami, Dai Watanabe, Yang Li, and Kazuo Sakiyama, “Fully Integrated Passive UHF RFID Tag for Hash-Based Mutual Authentication Protocol,” The Scientific World Journal, Hindawi, Volume 2015 (2015), Article ID 498610, 11 pages, (Aug., 2015).
  4. Takanori Machida, Dai Yamamoto, Mitsugu Iwamoto, and Kazuo Sakiyama, “A New Arbiter PUF for Enhancing Unpredictability on FPGA,” The Scientific World Journal, Hindawi, Volume 2015 (2015), Article ID 864812, 13 pages, (Aug., 2015).
  5. Dai Yamamoto, Kazuo Sakiyama, Mitsugu Iwamoto, Kazuo Ohta, Masahiko Takenaka, Kouichi Itoh, and Naoya Torii, “A new method for enhancing variety and maintaining reliability of PUF responses and its evaluation on ASICs Journal of Cryptographic Engineering,” J. Cryptographic Engineering, Vol.5(3), pp.187-199, (Sep., 2015).
  6. Sho Endo, Yang Li, Naofumi Homma, Kazuo Sakiyama, Kazuo Ohta, Daisuke Fujimoto, Makoto Nagata, Toshihiro Katashita, Jean-Luc Danger, and Takafumi Aoki, “A Silicon-level Countermeasure against Fault Sensitivity Analysis and Its Evaluation,” IEEE Trans. Very Large Scale Integr. (VLSI) Syst., Vol.23, No.8, pp.1429-1438, (Aug., 2015).
  7. 中曽根俊貴, 李陽, 岩本貢, 太田和夫, 崎山一男, “クロック間衝突を漏洩モデルとする新たなサイドチャネル解析と並列実装AES暗号ハードウェアにおける弱い鍵,” 電子情報通信学会論文誌(A), Vol.J97-A, No.11, pp.695-703, (Nov., 2014).
  8. Daisuke Fujimoto, Noriyuki Miura, Makoto Nagata, Yuichi Hayashi, Naofumi Homma, Takafumi Aoki, Yohei Hori, Toshihiro Katashita, Kazuo Sakiyama, Thanh-Ha Le, Julien Bringer, Pirouz Bazargan-Sabet, Shivam Bhasin, and Jean-Luc Danger, “Power Noise Measurements of Cryptographic VLSI Circuits Regarding Side-Channel Information Leakage,” IEICE Trans. Electronics, Vol.E97-C, No.4, pp.272-279, (Apr., 2014).
  9. Christophe Clavier, Jean-Luc Danger, Guillaume Duc, M. Abdelaziz Elaabid, Benoît Gérard, Sylvain Guilley, Annelie Heuser, Michael Kasper, Yang Li, Victor Lomné, Daisuke Nakatsu, Kazuo Ohta, Kazuo Sakiyama, Laurent Sauvage, Werner Schindler, Marc Stöttinger, Nicolas Veyrat-Charvillon, Matthieu Walle, Antoine Wurcker, “Practical improvements of side-channel attacks on AES: feedback from the 2nd DPA contest,” J. Cryptographic Engineering, Vol.4(1), pp.1-16, (Apr., 2014).
  10. Kazuo Sakiyama, Yang Li, Shigeto Gomisawa, Yu-ichi Hayashi, Mitsugu Iwamoto, Naofumi Homma, Takafumi Aoki, and Kazuo Ohta, “Practical DFA Strategy for AES Under Limited-Access Conditions,” Journal of Information Processing, Vol.55, No.2, (Feb., 2014).
  11. Dai Yamamoto, Kazuo Sakiyama, Mitsugu Iwamoto, Kazuo Ohta, Masahiko Takenaka, and Kouichi Itoh, “Variety Enhancement of PUF Responses Using the Locations of Random Outputting RS Latches,” J. Cryptographic Engineering, Vol.3(4), pp.197-211, (Nov., 2013).
  12. Shugo Mikami, Hirotaka Yoshida, Dai Watanabe, Kazuo Sakiyama, “Correlation Power Analysis and Countermeasure on the Stream Cipher Enocoro-128v2,” IEICE Trans. Fundam. Electron. Commun. Comput. Sci., Vol.96-A, No.3, pp.697-704, (Mar., 2013).
  13. Yang Li, Kazuo Ohta, and Kazuo Sakiyama, “A New Type of Fault-Based Attack: Fault Behavior Analysis,” IEICE Trans. Fundam. Electron. Commun. Comput. Sci., Vol.E96-A, No.1, pp.177-184, (Jan., 2013).
  14. 小池彩歌, 李陽, 中津大介, 太田和夫, 崎山一男, “複数の要因に対する新たな故障感度解析,” 電子情報通信学会論文誌(A), Vol.J95-A, No.10, pp.751-755, (Oct., 2012).
  15. Miroslav Knežević, Kazuyuki Kobayashi, Jun Ikegami, Shin’ichiro Matsuo, Akashi Satoh, Ünal Kocabaş, Junfeng Fan, Toshihiro Katashita, Takeshi Sugawara, Kazuo Sakiyama, Ingrid Verbauwhede, Kazuo Ohta, Naofumi Homma, and Takafumi Aoki, “Fair and Consistent Hardware Evaluation of Fourteen Round Two SHA-3 Candidates,” IEEE Trans. Very Large Scale Integr. (VLSI) Syst., Vol.20, No.5, pp.827-840, (May, 2012).
  16. Kazuo Sakiyama, Yang Li, Mitsugu Iwamoto, and Kazuo Ohta, “Information-Theoretic Approach to Optimal Differential Fault Analysis,” IEEE Trans. Inf. Forensic Secur., Vol.7, No.1, pp.109-120, (Feb., 2012).
  17. Yang Li, Kazuo Ohta, and Kazuo Sakiyama, “New Fault-Based Side-Channel Attack Using Fault Sensitivity,” IEEE Trans. Inf. Forensic Secur., Vol.7, No.1, pp.88-97, (Feb., 2012).
  18. Junko Takahashi, Toshinori Fukunaga, Kazuo Sakiyama, “Differential Fault Analysis on Stream Cipher MUGI,” IEICE Trans. Fundam. Electron. Commun. Comput. Sci., Vol.E95-A, No.1, pp.242-251, (Jan., 2012).
  19. Yang Li, Kazuo Ohta, and Kazuo Sakiyama, “Toward Effective Countermeasures Against an Improved Fault Sensitivity Analysis,” IEICE Trans. Fundam. Electron. Commun. Comput. Sci., Vol.A95-A, No.1, pp.234-241, (Jan., 2012).
  20. Lei Wang, Yu Sasaki, Wataru Komatsubara, Kazuo Sakiyama, Kazuo Ohta, “Meet-in-the-Middle (Second) Preimage Attacks on Two Double-Branch Hash Functions RIPEMD and RIPEMD-128,” IEICE Trans. Fundam. Electron. Commun. Comput. Sci., Vol.E95-A, No.1, pp.100-110, (Jan., 2012).
  21. Kazuo Sakiyama, Miroslav Knežević, Junfeng Fan, Bart Preneel, and Ingrid Verbauwhede, “Tripartite Modular Multiplication,” Integration-VLSI J., Vol.44, Issue 4, pp.259-269, (Apr., 2011).
  22. Yang Li, Kazuo Sakiyama, Shinichi Kawamura, and Kazuo Ohta, “Power Analysis against a DPA-resistant S-box Implementation Based on the Fourier Transform,” IEICE Trans. Fundam. Electron. Commun. Comput. Sci., Vol.A94-A, No.1, pp.191-199, (Jan., 2011).
  23. Bagus Santoso, Kazuo Ohta, Kazuo Sakiyama, Goichiro Hanaoka, “An Efficient Authentication for Lightweight Devices by Perfecting Zero-Knowledgeness,” IEICE Trans. Fundam. Electron. Commun. Comput. Sci., Vol.A94-A, No.1, pp.92-103, (Jan., 2011).
  24. Lei Wang, Kazuo Ohta, Yu Sasaki, Kazuo Sakiyama, and Noboru Kunihiro, “Cryptanalysis of Two MD5-Based Authentication Protocols: APOP and NMAC,” IEICE Trans. Inf. Syst., Vol.E93-D, No.5, pp.1087-1095, (May, 2010).
  25. Kazuo Sakiyama and Kazuo Ohta, “On Clock-Based Fault Analysis Attack for an AES Hardware Using RSL,” IEICE Trans. Fundam. Electron. Commun. Comput. Sci., Vol.E93-A, No.1, pp.172-179, (Jan., 2010).
  26. Yong Ki Lee, Kazuo Sakiyama, Lejla Batina, and Ingrid Verbauwhede, “Elliptic Curve Based Security Processor for RFID,” IEEE Trans. Comput., Vol.57, No.11, pp.1514-1527, (Nov., 2008).
  27. Junfeng Fan, Kazuo Sakiyama, and Ingrid Verbauwhede, “Elliptic Curve Cryptography on Embedded Multicore Systems,” Des. Autom. Embed. Syst., Vol.12, No.3, pp.231-242, (Sep., 2008).
  28. Kazuo Sakiyama, Lejla Batina, Bart Preneel, and Ingrid Verbauwhede, ” Multicore Curve-Based Cryptoprocessor with Reconfigurable Modular Arithmetic Logic Units over GF(2n),” IEEE Trans. Comput., Vol.56, No.9, pp.1269-1282, (Sep., 2007).
  29. Kazuo Sakiyama, Lejla Batina, Bart Preneel, and Ingrid Verbauwhede, ” HW/SW Co-design for Public-Key Cryptosystems on the 8051 Micro-controller, Comput. Electr. Eng., Vol.33, No.5-6, pp.324-332, (Sep., 2007).
  30. Kazuo Sakiyama, Lejla Batina, Bart Preneel, and Ingrid Verbauwhede, “High-performance Public-key Cryptoprocessor for Wireless Mobile Applications,” Mob. Netw. Appl., Vol.12, No.4, pp.245-258, (Aug., 2007).
  31. Kazuo Sakiyama, Nele Mentens, Lejla Batina, Bart Preneel, and Ingrid Verbauwhede, “Reconfigurable Modular Arithmetic Logic Unit Supporting High-performance RSA and ECC over GF(p),” Int. J. Electron., Vol.94, No.5, pp.501-514, (May, 2007).
  32. Shenglin Yang, Kazuo Sakiyama, and Ingrid Verbauwhede, ” Efficient and Secure Fingerprint Verification for Embedded Devices, EURASIP J. Appl. Signal Process., Vol.2006, No.1-11, (May, 2006).
  33. Young-Jae Cho, Takashi Hirakawa, Kazuo Sakiyama, Hiroaki Okamoto, and Yoshihiro Hamakawa, “EL/PL hybrid device enhanced by UV emission from ZnF2:Gd thin film electroluminescence,” J. Korean. Phys. Soc., Vol.30(1997), pp.S65-S68, (Jun., 1997).
  34. Young-Jae Cho, Takashi Hirakawa, Kazuo Sakiyama, Hiroaki Okamoto, and Yoshihiro Hamakawa, “ZnF2:Gd Thin Film Electroluminescent Device,” Appl. Surf. Sci., Vol.113/114 (1997), pp.705-708, (Apr., 1997).

解説論文

  1. 崎山一男, 太田和夫, “暗号への脅威「サイドチャネル攻撃」とその対策,”「科学」報告・解説, 岩波書店, Vol.78, No.10, pp.1080-1083, (2008年10月).(訂正箇所)

国際会議プロシーディングス等(査読あり)

  1. Takeshi Sugawara, Natsu Shoji, Kazuo Sakiyama, Kohei Matsuda, Noriyuki Miura, and Makoto Nagata, “Exploiting Bitflip Detector for Non-Invasive Probing and its Application to Ineffective Fault Analysis,” In Proc. Workshop on Fault Diagnosis and Tolerance in Cryptography (FDTC’17), IEEE, pp.XX-YY, (to appear in Sep., 2017).
  2. Eito Miyamoto, Takeshi Sugawara, and Kazuo Sakiyama, “Efficient Software Implementation of Modular Multiplication in Prime Fields on TI’s DSP TMS320C6678,” In Proc. International Workshop on Information Security Applications (WISA’17), LNCS XXXX, Springer-Verlag, pp.YYY-ZZZ, (to appear in Aug., 2017).
  3. Momoka Kasuya and Kazuo Sakiyama, “Improved EM Side-Channel Authentication Using Profile-Based XOR Model,” In Proc. International Workshop on Information Security Applications (WISA’17), LNCS XXXX, Springer-Verlag, pp.YYY-ZZZ, (to appear in Aug., 2017).
  4. Kohei Matsuda, Noriyuki Miura, Makoto Nagata, Yu-ichi Hayashi, Tatsuya Fujii, and Kazuo Sakiyama, “On-Chip Substrate-Bounce Monitoring for Laser-Fault Countermeasure,” In Proc. 2016 IEEE Asian Hardware-Oriented Security and Trust (AsianHOST’06), IEEE, pp. 1-6, Dec. 2016.
  5. Risa Yashiro, Takanori Machida, Mitsugu Iwamoto, and Kazuo Sakiyama, “Deep-Learning-Based Security Evaluation on Authentication Systems Using Arbiter PUF and Its Variants,” In Proc. International Workshop on Security 2016 (IWSEC’16), LNCS 9836, Springer-Verlag, pp.267-285, (Sep., 2016).
  6. Momoka Kasuya, Takanori Machida, and Kazuo Sakiyama, “New Metric for Side-Channel Information Leakage: Case Study on EM Radiation from AES Hardware,” In Proc. URSI Asia-Pacific Radio Science Conference (URSI AP-RASC’16), (Aug., 2016).
  7. Kazuo Sakiyama, Reina Yagasaki, Takanori Machida, Tatsuya Fujii, Noriyuki Miura, and Yu-ichi Hayashi, “Circuit-Level Information Leakage Prevention for Fault Detection,” In Proc. URSI Asia-Pacific Radio Science Conference (URSI AP-RASC’16), IEEE, (Aug., 2016).
  8. Kazuo Sakiyama, Momoka Kasuya, Takanori Machida, Arisa Matsubara, Yunfeng Kuai, Yu-Ichi Hayashi, Takaaki Mizuki, Noriyuki Miura, and Makoto Nagata, “Physical Authentication Using Side-Channel Information,” In Proc. International Conference on Information and Communication Technology (ICoICT’16), IEEE, (May, 2016).
  9. Shugo Mikami, Dai Watanabe, Kazuo Sakiyama, “A Performance Evaluation of Cryptographic Algorithms on FPGA and ASIC on RFID Design Flow,” In Proc. International Conference on Information and Communication Technology (ICoICT’16), IEEE, (May, 2016).
  10. Reina Yagasaki and Kazuo Sakiyama, “Artifact-Metric-Based Authentication for Bottles of Wine (Short Paper),” In Proc. International Workshop on Security 2015 (IWSEC’15), LNCS 9241, Springer-Verlag, pp.335-344, (Aug., 2015).
  11. Kazuo Sakiyama, Takanori Machida, and Arisa Matsubara, “Advanced Fault Analysis Techniques on AES,” In Proc. Joint IEEE International Symposium on Electromagnetic Compatibility and EMC Europe (EMC’15), pp.230-234, IEEE, (Aug., 2015).
  12. Takanori Machida, Dai Yamamoto, Mitsugu Iwamoto, and Kazuo Sakiyama, “Implementation of Double Arbiter PUF and Its Performance Evaluation on FPGA,” 20th Asia and South Pacific Design Automation Conference (ASP-DAC’15), pp.6-7, IEEE, (Jan., 2015).
  13. Yang Li, Shugo Mikami, Dai Watanabe, Kazuo Ohta, and Kazuo Sakiyama, “Single-Chip Implementation and Evaluation of Passive UHF RFID Tag with Hash-Based Mutual Authentication,” In Proc. Workshop on RFID Security (RFIDsec’14 Asia), IOS Press, pp.3-15, (Nov., 2014).
  14. Takanori Machida, Dai Yamamoto, Mitsugu Iwamoto, and Kazuo Sakiyama, “A New Mode of Operation for Arbiter PUF to Improve Uniqueness on FPGA,” In Proc. The Federated Conference on Computer Science and Information Systems (FedCSIS), 1st Workshop on Emerging Aspects in Information Security (EAIS’14), IEEE, pp.871-878 (Sep., 2014).
  15. Dai Yamamoto, Masahiko Takenaka, Kazuo Sakiyama, and Naoya Torii, “Security Evaluation of Bistable Ring PUFs on FPGAs using Differential and Linear Analysis,” In Proc. The Federated Conference on Computer Science and Information Systems (FedCSIS), 1st Workshop on Emerging Aspects in Information Security (EAIS’14), IEEE, pp.911-918 (Sep., 2014).
  16. Dai Yamamoto, Masahiko Takenaka, Kazuo Sakiyama, and Naoya Torii, “A Technique using PUFs for Protecting Circuit Layout Designs against Reverse Engineering,” In Proc. International Workshop on Security 2014 (IWSEC’14), LNCS 8639, Springer-Verlag, pp.158-253, (Sep., 2014).
  17. Yang Li, Toshiki Nakasone, and Kazuo Sakiyama, “Software and Hardware Co-Verification for Privacy-Enhanced Passive UHF RFID Tags,” In Proc. 2014 IEEE International Symposium on Electromagnetic Compatibility (EMC’14), IEEE, pp.752-757 (Aug., 2014).
  18. Daisuke Fujimoto, Noriyuki Miura, Makoto Nagata, Yuichi Hayashi, Naofumi Homma, Takafumi Aoki, Yohei Hori, Toshihiro Katashita, Kazuo Sakiyama, Thanh-Ha Le, Julien Bringer, Pirouz Bazargan-Sabet, Shivam Bhasin, and Jean-Luc Danger, “Correlation Power Analysis using Bit-Level Biased Activity Plaintexts against AES Core with Countermeasures,” in Proc. 2014 International Symposium on Electromagnetic Compatibility, Tokyo (EMC’14/Tokyo), IEEE, pp 306-309, 14P2-A3, (May, 2014).
  19. Yang Li, Toshiki Nakasone, Kazuo Ohta, Kazuo Sakiyama, “Privacy-Mode Switching: Toward Flexible Privacy Protection for RFID Tags in Internet of Things,” In Proc. The 11th Annual IEEE Consumer Communications & Networking Conference (CCNC’14), IEEE, pp.519-520, (Jan., 2014).
  20. Shugo Mikami, Dai Watanabe, and Kazuo Sakiyama, “A Comparative Study of Stream Ciphers and Hash Functions for RFID Authentications,” In Proc. The 2013 Workshop on RFID and IoT Security (RFIDsec’13 Asia), IOS Press, pp.83-94, (Nov., 2013).
  21. Yang Li, Yu-ichi Hayashi, Arisa Matsubara, Naofumi Homma, Takafumi Aoki, Kazuo Ohta and Kazuo Sakiyama, “Yet Another Fault-Based Leakage in Non-Uniform Faulty Ciphertexts,” In Proc. The Sixth International Symposium on Foundations & Practice of Security (FPS’13), LNCS 8352, pp.272-287, Springer-Verlag, (Oct., 2013).
  22. Daisuke Fujimoto, Noriyuki Miura, Makoto Nagata, Yuichi Hayashi, Naofumi Homma, Yohei Hori, Toshihiro Katashita, Kazuo Sakiyama, Thanh-Ha Le, Julien Bringer, Pirouz Bazargan-Sabet, Jean-Luc Danger, “On-chip power noise measurements of cryptographic VLSI circuits and interpretation for side-channel analysis,” In Proc. International Symposium on Electromagnetic Compatibility (EMC EUROPE) 2013, IEEE, pp.405-410, (Sep., 2013).
  23. Toshiki Nakasone, Kazuo Sakiyama, Yang Li, and Kazuo Ohta, “Exploration of the CC-EMA Attack Towards Efficient Evaluation of EM Information Leakage,” In Proc. International Symposium on Electromagnetic Compatibility (EMC EUROPE) 2013, IEEE, pp.411-414, (Sep., 2013).
  24. Yu Sasaki, Wataru Komatsubara, Lei Wang, Mitsugu Iwamoto, Kazuo Ohta, and Kazuo Sakiyama, “Meet-in-the-Middle Preimage Attacks Revisited: New Results on MD5 and HAVAL,” In Proc. International Conference on Security and Cryptography (SECRYPT’13), SciTePress, pp.111-122, (July, 2013).
  25. Yu Sasaki, Yang Li, Hikaru Sakamoto and Kazuo Sakiyama, “Coupon Collector’s Problem for Fault Analysis — High Tolerance for Noisy Fault Injections,” In Proc. Financial Cryptography and Data Security 2013 (FC’13), LNCS 7859, Springer-Verlag, pp.213-220 (Apr., 2013).
  26. Yang Li, Sho Endo, Nicolas Debande, Naofumi Homma, Takafumi Aoki, Thanh-Ha Le, Jean-Luc Danger, Kazuo Ohta, Kazuo Sakiyama, “Exploring the Relations Between Fault Sensitivity and Power Consumption,” In Proc. Constructive Side-Channel Analysis and Secure Design (COSADE’13), LNCS 7864, Springer-Verlag, pp.137-153 (Mar., 2013).
  27. Yang Li, Kazuo Ohta, and Kazuo Sakiyama, “An Extension of Fault Sensitivity Analysis Based on Clockwise Collision,” In Proc. International Conferences on Information Security and Cryptology 2012 (Inscript’12), LNCS 7763, Springer-Verlag, pp.46-59, (Nov., 2012).
  28. Toshiki Nakasone, Yang Li, Yu Sasaki, Mitsugu Iwamoto, Kazuo Ohta, and Kazuo Sakiyama, “Key-Dependent Weakness of AES-Based Ciphers Under Clockwise Collision Distinguisher,” In Proc. International Conference on Information Security and Cryptology 2012 (ICISC’12), LNCS 7839, Springer-Verlag, pp.395-409, (Nov., 2012).
  29. Yu Sasaki, Lei Wang, Yasuhiro Takasaki, Kazuo Sakiyama, and Kazuo Ohta, “Boomerang Distinguishers for Full HAS-160 Compression Function,” In Proc. International Workshop on Security 2012 (IWSEC’12), LNCS 7631, Springer-Verlag, pp.156-169, (Nov., 2012).
  30. Lei Wang, Yu Sasaki, Kazuo Sakiyama and Kazuo Ohta, “Cryptanalysis of 3D Cipher and 3D-based Hash Function,” In Proc. International Workshop on Security 2012 (IWSEC’12), LNCS 7631, Springer-Verlag, pp.170-181, (Nov., 2012).
  31. Sho Endo, Yang Li, Naofumi Homma, Kazuo Sakiyama, Kazuo Ohta and Takafumi Aoki, “An Efficient Countermeasure against Fault Sensitivity Analysis Using Configurable Delay Blocks,” In Proc. Workshop on Fault Diagnosis and Tolerance in Cryptography (FDTC’12), IEEE, pp.95-102, (Sep., 2012).
  32. Sho Endo, Yuichi Hayashi, Naofumi Homma, Takafumi Aoki, Toshihiro Katashita, Yohei Hori, Kazuo Sakiyama, Makoto Nagata, Jean-Luc Danger, Thanh-Ha Le and Pirouz Bazargan Sabet, “Measurement of Side-Channel Information from Cryptographic Devices on Security Evaluation Platform: Demonstration of SPACES Project,” SICE Annual Conference 2012, pp.313-316, (Aug., 2012).
  33. Yu Sasaki, Lei Wang, Yasuhide Sakai, Kazuo Sakiyama, and Kazuo Ohta, “Three-Subset Meet-in-the-Middle Attack on Reduced XTEA,” In Proc. International Conference on Cryptology in Africa (Africacrypt’12), LNCS 7374, Springer-Verlag, pp.138-154, (Jul., 2012).
  34. Takuma Koyama, Lei Wang, Yu Sasaki, Kazuo Sakiyama, Kazuo Ohta, “New Truncated Differential Cryptanalysis on 3D Block Cipher,” In Proc. International Conference on Information Security Practice and Experience (ISPEC’12), LNCS 7232, Springer-Verlag, pp.109-125, (Apr., 2012).
  35. Yu Sasaki, Naoyuki Takayanagi, Kazuo Sakiyama, and Kazuo Ohta, “Experimental Verification of Super-Sbox Analysis — Confirmation of Detailed Attack Complexity,” In Proc. International Workshop on Security 2011 (IWSEC’11), LNCS 7038, Springer-Verlag, pp.178-192, (Nov., 2011).
  36. Yu-ichi Hayashi, Shigeto Gomisawa, Yang Li, Naofumi Homma, Kazuo Sakiyama, Takafumi Aoki, and Kazuo Ohta, “Intentional Electromagnetic Interference for Fault Analysis on AES Block Cipher IC,” In Proc. International Workshop on Electromagnetic Compatibility of Integrated Circuits (EMCCOMPO’11), IEEE, pp.235-240, (Nov., 2011).
  37. Dai Yamamoto, Kazuo Sakiyama, Mitsugu Iwamoto, Kazuo Ohta, Takao Ochiai, Masahiko Takenaka, Kouichi Itoh, “Uniqueness Enhancement of PUF Responses Based on the Locations of Random Outputting RS Latches,” In Proc. Workshop on Cryptographic Hardware and Embedded Systems (CHES’11), LNCS 6917, Springer-Verlag, pp.390-406, (Sep., 2011).
  38. Amir Moradi, Oliver Mischke, Christof Paar, Yang Li, Kazuo Ohta, Kazuo Sakiyama, “On the Power of Fault Sensitivity Analysis and Collision Side-Channel Attack in a Combined Setting,” In Proc. Workshop on Cryptographic Hardware and Embedded Systems (CHES’11), LNCS 6917, Springer-Verlag, pp.292-311, (Sep., 2011).
  39. Hikaru Sakamoto, Yang Li, Kazuo Ohta, and Kazuo Sakiyama, “Fault Sensitivity Analysis Against Elliptic Curve Cryptosystems,” In Proc. Workshop on Fault Diagnosis and Tolerance in Cryptography (FDTC’11), IEEE, pp.11-20, (Sep., 2011).
  40. Yang Li, Kazuo Ohta, and Kazuo Sakiyama, “Revisit Fault Sensitivity Analysis on WDDL-AES,” In Proc. International Symposium on Hardware-Oriented Security and Trust (HOST’11), IEEE, pp.148-153, (Jun., 2011).
  41. Yoshikazu HanataniI, Miyako Ohkubo, Shin’ichiro Matsuo, Kazuo Sakiyama, Kazuo Ohta, “A Study on Computational Formal Verification for Practical Cryptographic Protocol: The Case of Synchronous RFID Authentication,” In Proc. Real-Life Cryptographic Protocols and Standarization (RLCPS’11), LNCS 7126, Springer-Verlag, pp.70-87, (Feb., 2011).
  42. Lei Wang, Yu Sasaki, Wataru Komatsubara, Kazuo Ohta, and Kazuo Sakiyama, “(Second) Preimage Attacks on Step-Reduced RIPEMD/RIPEMD-128 with a New Local-Collision Approach,” In Proc. RSA Conference 2011, Cryptographer’s Track (CT-RSA’11), LNCS 6558, Springer-Verlag, pp.197-212, (Mar., 2011).
  43. Yu Sasaki, Yang Li, Lei Wang, Kazuo Sakiyama, and Kazuo Ohta, “Non-Full-Active Super-Sbox Analysis: Applications to ECHO and Grøstl,” In Proc. Advances in Cryptology — ASIACRYPT’10, LNCS 6477, Springer-Verlag, pp.38-55, (Dec., 2010).
  44. Junko Takahashi, Toshinori Fukunaga, and Kazuo Sakiyama, “Fault Analysis on Stream Cipher MUGI,” In Proc. International Conference on Information Security and Cryptology (ICISC’10), LNCS 6829, Springer-Verlag, pp.420-434, (Dec. 2010).
  45. Daisuke Nakatsu, Yang Li, Kazuo Sakiyama, and Kazuo Ohta, “Combination of SW Countermeasure and CPU Modification on FPGA Against Power Analysis,” In Proc. International Workshop on Information Security Applications (WISA’10), LNCS 6513, Springer-Verlag, pp.258-272, (Aug., 2010).
  46. Yang Li, Kazuo Sakiyama, Shigeto Gomisawa, Toshinori Fukunaga, Junko Takahashi, and Kazuo Ohta, “Fault Sensitivity Analysis,” In Proc. Workshop on Cryptographic Hardware and Embedded Systems (CHES’10), LNCS 6225, Springer-Verlag, pp.320-334, (Aug., 2010).
  47. Kazuyuki Kobayashi, Jun Ikegami, Miroslav Knežević, Eric Xu Guo, Shin’ichiro Matsuo, Sinan Huan, Leyla Nazhandali, Ünal Kocabaş, Junfeng Fan, Akashi Satoh, Patrick Schaumont, Ingrid Verbauwhede, Kazuo Sakiyama and Kazuo Ohta, “Prototyping Platform for Performance Evaluation of SHA-3 Candidates,” In Proc. International Symposium on Hardware-Oriented Security and Trust (HOST’10), IEEE, pp.60-63, (Jun., 2010).
  48. Yang Li, Kazuo Sakiyama, Lejla Batina, Daisuke Nakatsu, and Kazuo Ohta, “Power Variance Analysis Breaks a Masked ASIC Implementations of AES,” In Proc. Design, Automation and Test in Europe (DATE’10), ACM, pp.1059-1064, (Mar., 2010).
  49. Masami Izumi, Jun Ikegami, Kazuo Sakiyama and Kazuo Ohta, “Improved Countermeasure against Address-bit DPA for ECC Scalar Multiplication,” In Proc. Design, Automation and Test in Europe (DATE’10), ACM, pp.981-984, (Mar., 2010).
  50. Bagus Santoso, Kazuo Ohta, Kazuo Sakiyama, and Goichiro Hanaoka, “Improving Efficiency of An ‘On the Fly’ Identification Scheme by Perfecting Zero-Knowledgeness,” In Proc. RSA Conference 2010, Cryptographer’s Track (CT-RSA’10), LNCS 5985, Springer-Verlag, pp.284-301, (Mar., 2010).
  51. Yang Li, Kazuo Sakiyama, Shinichi Kawamura, Yuichi Komano, and Kazuo Ohta, “Security Evaluation of a DPA-resistant S-box Based on the Fourier Transform,” In Proc. International Conference on Information and Communications Security (ICICS’09), LNCS 5927, Springer-Verlag, pp.3-16, (Dec., 2009).
  52. Lei Wang, Yu Sasaki, Kazuo Sakiyama, and Kazuo Ohta, “Bit-Free Collision: Application to APOP Attack,” In Proc. International Workshop on Security 2009 (IWSEC’09), LNCS 5824, Springer-Verlag, pp.3-21, (Oct., 2009).
  53. Kazuo Sakiyama, Tatsuya Yagi, and Kazuo Ohta, “Fault Analysis Attack against an AES Prototype Chip Using RSL,” In Proc. RSA Conference 2009, Cryptographer’s Track (CT-RSA’09), LNCS 5473, Springer-Verlag, pp.429-443, (Apr., 2009).
  54. Masami Izumi, Kazuo Sakiyama, and Kazuo Ohta, “A New Approach for Implementing the MPL Method toward Higher SPA Resistance,” In Proc. International Conference on Availability, Reliability and Security (ARES’09), IEEE, pp.181-186, (Mar., 2009).
  55. Miroslav Knežević, Kazuo Sakiyama, Junfeng Fan, and Ingrid Verbauwhede, “Modular Multiplication in GF(2n) without Pre-computational Phase,” In Proc. International Workshop on the Arithmetic of Finite Fields (WAIFI’08), LNCS 5130, Springer-Verlag, pp.77-87, (Jul., 2008).
  56. Miroslav Knežević, Kazuo Sakiyama, Yong Ki Lee, and Ingrid Verbauwhede, “On the High-Throughput Implementation of RIPEMD-160 Hash Algorithm,” In Proc. 19th IEEE International Conference on Application-specific Systems, Architectures and Processor (ASAP’08), IEEE, pp.85-90, (Jul., 2008).
  57. Junfeng Fan, Lejla Batina, Kazuo Sakiyama, and Ingrid Verbauwhede, “FPGA Design for Algebraic Tori-Based Public-Key Cryptography,” In Proc. Design, Automation and Test in Europe (DATE’08), ACM, pp.1292 – 1297, (Mar., 2008).
  58. Junfeng Fan, Kazuo Sakiyama, and Ingrid Verbauwhede, “Montgomery Modular Multiplication Algorithm on Multi-Core Systems,” In Proc. IEEE Workshop on Signal Processing Systems (SIPS’07), IEEE, pp.261-266, (Oct., 2007).
  59. Nele Mentens, Kazuo Sakiyama, Lejla Batina, Bart Preneel, and Ingrid Verbauwhede, “A Side-channel Attack Resistant Programmable PKC Coprocessor for Embedded Applications,” In Proc. International Symposium on Systems, Architectures, MOdeling and Simulation (IC-SAMOS’07), IEEE, pp.194-200, (Jul., 2007).
  60. Lejla Batina, Nele Mentens, Kazuo Sakiyama, Bart Preneel, and Ingrid Verbauwhede, “Public-Key Cryptography on the Top of a Needle,” In Proc. IEEE International Symposium on Circuits and Systems (ISCAS’07), Special Session: Novel Cryptographic Architectures for Low-Cost RFID, IEEE, pp.1831-1834, (May, 2007).
  61. Kazuo Sakiyama, Elke De Mulder, Bart Preneel, and Ingrid Verbauwhede, “Side-channel Resistant System-level Design Flow for Public-key Cryptography,” In Proc. 2007 Great Lakes Symposium on VLSI (GLSVLSI’07), ACM, pp.144-147, (Mar., 2007).
  62. Nele Mentens, Kazuo Sakiyama, Bart Preneel, and Ingrid Verbauwhede, “Efficient Pipelining for Modular Multiplication Architectures in Prime Fields,” In Proc. 2007 Great Lakes Symposium on VLSI (GLSVLSI’07), ACM, pp.534-539, (Mar., 2007).
  63. Kazuo Sakiyama, Lejla Batina, Bart Preneel, and Ingrid Verbauwhede, “Superscalar Coprocessor for High-Speed Curve-Based Cryptography,” In Workshop on Cryptographic Hardware and Embedded Systems (CHES’06), LNCS 4249, Springer-Verlag, pp.415-429, (Oct., 2006).
  64. Lejla Batina, Nele Mentens, Kazuo Sakiyama, Bart Preneel, and Ingrid Verbauwhede, “Low-Cost Elliptic Curve Cryptography for Wireless Sensor Networks,” In Third European Workshop on Security and Privacy in Ad Hoc and Sensor Networks (ESAS’06), LNCS 4357, Springer-Verlag, pp.6-17, (Sep., 2006).
  65. Lejla Batina, Alireza Hodjat, David Hwang, Kazuo Sakiyama, and Ingrid Verbauwhede, “Reconfigurable Architectures for Curve-Based Cryptography on Embedded Micro-controllers,” In Proc. 16th International Conference on Field Programmable Logic and Applications (FPL’06), IEEE, pp.667-670, (Aug., 2006).
  66. Nele Mentens, Kazuo Sakiyama, Lejla Batina, Ingrid Verbauwhede, and Bart Preneel, “FPGA-Oriented Secure Data Path Design: Implementation of a Public Key Coprocessor,” In Proc. 16th International Conference on Field Programmable Logic and Applications (FPL’06), IEEE, pp.133-138, (Aug., 2006).
  67. Kazuo Sakiyama, Lejla Batina, Bart Preneel, and Ingrid Verbauwhede, “HW/SW Co-design for Accelerating Public-Key Cryptosystems over GF(p) on the 8051 μ-controller,” In Proc. World Automation Congress (WAC’06), 6 pages, (Jul., 2006).
  68. Kazuo Sakiyama, Elke De Mulder, Bart Preneel, and Ingrid Verbauwhede, “A Parallel Processing Hardware Architecture for Elliptic Curve Cryptosystems,” In Proc. IEEE International Conference on Acoustics, Speech, and Signal Processing (ICASSP’06), IEEE, pp.III-904-III-907, (May, 2006).
  69. Kazuo Sakiyama, Bart Preneel, and Ingrid Verbauwhede, “A Fast Dual-Field Modular Arithmetic Logic Unit and Its Hardware Implementation,” In Proc. IEEE International Symposium on Circuits and Systems (ISCAS’06), IEEE, pp.787-790, (May, 2006).
  70. Kazuo Sakiyama, Nele Mentens, Lejla Batina, Bart Preneel, and Ingrid Verbauwhede, “Reconfigurable Modular Arithmetic Logic Unit for High-performance Public-key Cryptosystems,” In International Workshop on Applied Reconfigurable Computing (ARC’06), LNCS 3985, Springer-Verlag, pp.347-357, (Mar., 2006).
  71. Patrick Schaumont, Kazuo Sakiyama, Alireza Hodjat, and Ingrid Verbauwhede, “Embedded Software Integration for Coarse-grain Reconfigurable Systems,” In Proc. IEEE 18th International Parallel and Distributed Processing Symposium (IPDPS’04), IEEE, pp.137-142, (Apr., 2004).
  72. Shenglin Yang, Kazuo Sakiyama, and Ingrid Verbauwhede, “A Secure and Efficient Fingerprint Verification System for an Embedded Device,” In Proc. 37th Asilomar Conference on Signals, Systems and Computers, pp.2058-2062, (Nov., 2003).
  73. Patrick Schaumont, Kazuo Sakiyama, Yi Fan, David Hwang, Shenglin Yang, Alireza Hodjat, Bo-Cheng Lai, and Ingrid Verbauwhede, “Testing ThumbPod: Softcore Bugs are Hard to Find,” In Proc. IEEE International High Level Design Validation and Test Workshop (HLDVT’03), IEEE, pp.77-82, (Nov., 2003).
  74. David Hwang, Patrick Schaumont, Yi Fan, Alireza Hodjat, Bo-Cheng Lai, Kazuo Sakiyama, Shenglin Yang, and Ingrid Verbauwhede, “Design flow for HW/SW Acceleration Transparency in the Thumbpod Secure Embedded System,” In Proc. 40th Design Automation Conference (DAC’03), ACM, pp.60 – 65, (Jun., 2003).
  75. Kazuo Sakiyama, Patrick Schaumont, D. Hwang, and Ingrid Verbauwhede, “Teaching Trade-offs in System-level Design Methodologies,” In Proc. IEEE Microelectronic Systems Education (MSE’03), IEEE, pp.62 – 63, (Jun., 2003).
  76. Kazuo Sakiyama, Patrick Schaumont, and Ingrid Verbauwhede, “Finding the best System Design Flow for a High-Speed JPEG Encoder,” In Proc. 8th Asia and South Pacific Design Automation Conference (ASP-DAC’03), ACM, pp.577 – 578, (Jan., 2003).
  77. Young-Jae Cho, Takashi Hirakawa, Kazuo Sakiyama, Hiroaki Okamoto and Yoshihiro Hamakawa, “ZnF2:Gd UV Emitting Electroluminescent Device,”8th International Workshop on Electroluminescence, Berlin, Germany, (Aug. 1996); In “Inorganic and Organic Electroluminescence,” eds. R. Mauch and H.-E. Gumlich (Wissenschaft und Technik Verlag, Berlin, 1996) pp.347-350.
  78. Young-Jae Cho, Takashi Hirakawa, Kazuo Sakiyama, Hiroaki Okamoto and Yoshihiro Hamakawa, “ZnF2:Gd Thin Film Electroluminescent Devices,” 8th International Conference Solid Films and Surface, Osaka, Japan, (Jul., 1996).

学会口頭発表(上記以外のもの, 査読なし)

  1. 庄司奈津, 松村竜我, 菅原 健, 崎山一男, “誤り暗号文を使わないAESへの故障利用攻撃,” ハードウエアセキュリティ研究会(HWS), (Jun., 2017).
  2. 松村竜我, 庄司奈津, 菅原 健, 崎山一男, “ダイオードレーザーを用いた光によるサイドチャネル認証,” ハードウエアセキュリティ研究会(HWS), (Jun., 2017).
  3. 辰巳恵里奈, 菅原 健, 崎山一男, “Row Hammerに関する基礎実験,” ハードウエアセキュリティ研究会(HWS), (Jun., 2017).
  4. 松田航平, 三浦典之, 永田 真, 林 優一, 藤井達哉, 崎山一男, “基板電流検知回路を用いたレーザーフォールト注入攻撃対策のオーバヘッド推定,” 電子情報通信学会総合大会, AS-3-13, pp. S-38, (Mar., 2017).
  5. 粕谷桃伽, 町田卓謙, 崎山一男, “XORモデルを用いたサイドチャネル認証,” 2017年暗号と情報セキュリティシンポジウム (SCIS2017), 3C2-3, 6 pages, (Jan., 2017).
  6. 宮元景冬, 崎山一男, “TI社DSP TMS320C6678における高速な剰余乗算アルゴリズムの実装評価,” 2016年暗号と情報セキュリティシンポジウム (SCIS2017), 2A4-1, 6 pages, (Jan., 2017).
  7. Momoka Kasuya and Kazuo Sakiyama, “Authentication Using Physical Information,” Poster Session, AsianHOST2016 (Dec., 2016).
  8. Risa Yashiro, Mitsugu Iwamoto, and Kazuo Sakiyama, “Q-Class Authentication System Using DAPUF,” Poster Session, AsianHOST2016 (Dec., 2016).
  9. 宮元景冬, 崎山一男, “DSP C6678における剰余乗算の高速実装評価,” ハードウェアセキュリティフォーラム2016(ポスター), (Dec., 2016).
  10. 松田航平, 三浦典之, 永田真, 林 優一, 藤井達哉, 崎山一男, “基板電位変動モニタリングによるレーザーフォールト注入攻撃対策,” IEICE2016年ソサイエティ大会, (Sep., 2016).
  11. 八代理紗, 藤井達哉, 岩本 貢, 崎山一男, “Deep Learningを用いたRSAに対する単純電磁波解析,” IEICE2016年ソサイエティ大会, (Sep., 2016).
  12. 粕谷桃伽, 崎山一男, “認証の枠組みを用いたサイドチャネル攻撃に必要な波形数の導出,” IEICE2016年ソサイエティ大会, (Sep., 2016).
  13. 松田航平, 三浦典之, 永田 真, 林 優一, 藤井達哉, 矢ヶ崎玲奈, 崎山一男, “基板電位変動モニタリングによるレーザーフォールト注入攻撃対策,” LSIとシステムのワークショップ2016、学生P26、(May, 2016).
  14. 八代理紗, 町田卓謙, 岩本 貢, 崎山一男, “Deep Learningを用いたDouble Arbiter PUFの安全性評価,” IEICE2016年総合大会, (Mar., 2016).
  15. 粕谷桃伽, 町田卓謙, 崎山一男, “サイドチャネル情報における固有性解析,” IEICE2016年総合大会(学生ポスターセッション), (Mar., 2016)..
  16. 藤本大介, 照屋唯紀, 崎山一男, 本間尚文, 池田 誠, 永田 真, 松本 勉, “並列化RNSアーキテクチャによる高速ペアリング実装に関する検討,” 2016年暗号と情報セキュリティシンポジウム (SCIS2016), 2C4-3, 6 pages, (Jan., 2016).
  17. 松田航平, 三浦典之, 永田 真, 林 優一, 藤井達哉, 矢ヶ崎玲奈, 崎山一男, “レーザーフォールト注入時のIC基板電位変動のオンチップ測定,” 2016年暗号と情報セキュリティシンポジウム (SCIS2016), 2F1-4, 6 pages, (Jan., 2016).
  18. 粕谷桃伽, 町田卓謙, 崎山一男, “AES暗号を用いたサイドチャネル認証における識別可能なデバイス数,” 2016年暗号と情報セキュリティシンポジウム (SCIS2016), 1F2-3, 4 pages, (Jan., 2016).
  19. 藤井達哉, 粕谷桃伽, 町田卓謙, 崎山一男, “DE0-nanoを用いたサイドチャネル認証,” コンピュータセキュリティシンポジウム2015(CSS2015)デモンストレーション(ポスター)セッション, (Oct., 2015).
  20. 粕谷桃伽, 町田卓謙, 崎山一男, “漏洩電磁波を用いたサイドチャネル認証の基礎実験,” IEICE2015年ソサイエティ大会, (Sep., 2015).
  21. 矢ヶ崎玲奈, 崎山一男, “ワイン瓶の透過光を用いた人工物メトリクスに関する研究,” IEICE2015年総合大会, (Mar., 2015).
  22. 酒井芳章, 崎山一男, “Android端末に向けた新たな認証システム,” IEICE2015年総合大会(学生ポスターセッション), (Mar., 2015).
  23. 川述 優, 崎山一男, “物理特性の変更が可能なRO-PUF,” IEICE2015年総合大会(学生ポスターセッション), (Mar., 2015).
  24. 松原有沙, 町田卓謙, 崎山一男, “ランダム故障混入時のAES暗号回路への故障利用攻撃,” IEICE2015年総合大会(学生ポスターセッション), (Mar., 2015).
  25. 松原有沙, 町田卓謙, 林 優一, 崎山一男, “サイドチャネル認証の為の漏洩モデルに関する一考察,” 2015年暗号と情報セキュリティシンポジウム (SCIS2015), 3A2-1, 6 pages, (Jan., 2015).
  26. カイ云峰, 李陽, 町田卓謙, 崎山一男, “AESハードウェア実装の任意ラウンドにおける消費電力制御,” 2015年暗号と情報セキュリティシンポジウム (SCIS2015), 3A2-2, 7 pages, (Jan., 2015).
  27. 三上修吾, 渡辺 大, 崎山一男, “バッファを用いた軽量擬似乱数生成器のグリッチ削減方法とハードウェア実装評価,” コンピュータセキュリティシンポジウム 2014(CSS2014), 1C3, 6 pages, (Oct., 2014).
  28. 松原有沙, 李 陽, 林 優一, 崎山一男, “サイドチャネル認証に向けた基礎的考察,” ISEC2014-10, pp.1-8, (Jul., 2014).
  29. Yang Li and Kazuo Sakiyama, “Toward Practical Solution to Unsuccessful Write Operation on Non-Volatile Memory of Passive RFID Tags,” Poster Session, ASIACCS2014 (Jun., 2014).
  30. 稲毛 契, 藤井威生, 高橋謙三, 山尾泰, 崎山一男, “ICT国際PBL (1):国際性と実践力に優れた高度専門人材育成,” IEICE2014年総合大会, (Mar., 2014).
  31. 大竹健太, 稲毛 契, 戴 競擇, 藤井威生, 山尾 泰, 崎山一男, “ICT国際PBL (2):無線ネットワークによるロボットカー制御プロジェクト,” IEICE2014年総合大会, (Mar., 2014).
  32. 中曽根俊貴, 崎山一男, “ICT国際PBL (3):ハッシュ関数SHA-256の高速実装,” IEICE2014年総合大会, (Mar., 2014).
  33. 福井言葉, 船橋鴻志, 高橋謙三, 山尾泰, 小島年春, 崎山一男, “ICT国際PBL(4):ディジタル信号処理,” IEICE2014年総合大会, (Mar., 2014).
  34. 藤本大介, 田中大智, 三浦典之, 永田 真, 林 優一, 本間尚文, 青木孝文, 堀 洋平, 片下敏広, 崎山一男, Thanh-Ha Le, Julien Bringer, Pirouz Bazargan-Sabet, Shivam Bhasin, Jean-Luc Danger, “チップ内外での電源電圧取得によるサイドチャネル漏洩情報の一考察,” 2014年暗号と情報セキュリティシンポジウム (SCIS2014), 2A3-3, 6 pages, (Jan., 2014).
  35. 町田卓謙, 山本 大, 岩本 貢, 崎山一男, “FPGA実装されたArbiter PUFのユニーク性向上に向けた一考察,” 2014年暗号と情報セキュリティシンポジウム (SCIS2014), 2A1-5, 5 pages, (Jan., 2014).
  36. 三上修吾, 渡辺 大, 崎山一男, “バッファを用いた軽量擬似乱数生成器のハードウェア実装と評価,” 2014年暗号と情報セキュリティシンポジウム (SCIS2014), 2A2-1, 7 pages, (Jan., 2014).
  37. Takanori Machida, Toshiki Nakasone, Mitsugu Iwamoto, and Kazuo Sakiyama, “A New Model of Modeling Attacks against Arbiter PUF on FPGA,” Poster Session, IWSEC2013 (Nov., 2013).
  38. Yang Li, Toshiki Nakasone, and Kazuo Sakiyama, “Toward Applications of SRAM Retention Time as Battery-Less Timer for RFID Tags,” Poster Session, IWSEC2013 (Nov., 2013).
  39. 町田卓謙, 中曽根俊貴, 崎山一男, “Arbiter PUFのFPGA実装における評価手法と脆弱性,” ISEC2013-18, pp.53-58, (Jul., 2013).
  40. 松原有沙, 蒯 云峰, 李 陽, 中曽根俊貴, 太田和夫, 崎山一男, “AES暗号回路における信号遷移回数を用いたサイドチャネル情報に関する考察,” ISEC2013-45, pp.331-338, (Jul., 2013).
  41. Yang Li, Hikaru Sakamoto, Iwamasa Nishikado, Takafumi Saito, Kazuo Ohta, Kazuo Sakiyama, “Toward Flexible Privacy Protection for RFID Tags Using Privacy-Mode Switching,” IEICE2013年総合大会, (Mar., 2013).
  42. 中曽根俊貴, 李 陽, 崎山一男, “システム上にあるSRAMの電荷保持時間とPUF特性を利用したDoS攻撃対策,” IEICE2013年総合大会, (Mar., 2013).
  43. 佐々木悠, 李 陽, 阪本光, 崎山一男, “クーポンコレクタ問題を利用したノイズに強い飽和フォールト攻撃,” IEICE2013年総合大会, (Mar., 2013).
  44. 松原有沙, 李 陽, 太田和夫, 崎山一男, “故障混入時のAES暗号ハードウェアの脆弱性について,” IEICE2013年総合大会(学生ポスターセッション), (Mar., 2013).
  45. 遠藤翔, 李陽, 本間尚文, 崎山一男, 藤本大介, 永田真, 太田和夫, 青木孝文, “故障感度隠蔽のための効率的な対策とその評価,” 2013年暗号と情報セキュリティシンポジウム (SCIS2013), 1E1-5, 8 pages, (Jan., 2013).
  46. 駒野雄一, 太田和夫, 岩本 貢, 崎山一男, “PUF出力の一部を用いるパターン照合鍵生成システム,” 2013年暗号と情報セキュリティシンポジウム (SCIS2013), 1D2-3, 8 pages, (Jan., 2013).
  47. 三上修吾, 渡辺 大, 崎山一男, “RFID認証プロトコル向け軽量暗号アルゴリズムの実装評価,” 2013年暗号と情報セキュリティシンポジウム (SCIS2013), 2E2-1, 8 pages, (Jan., 2013).
  48. 山本 大, 崎山一男, 岩本 貢, 太田和夫, 武仲正彦, 伊藤孝一, 鳥居直哉, “レスポンス数の向上手法を適用したラッチPUFのASIC実装評価,” 2013年暗号と情報セキュリティシンポジウム (SCIS2013), 2E2-2, 8 pages, (Jan., 2013).
  49. 岩井佑樹, 福島崇文, 森山大輔, 松尾真一郎, 駒野雄一, 岩本 貢, 太田和夫, 崎山一男, “巡回シフトを用いたPUFに基づくパターン照合鍵生成システムの実装評価,” 2013年暗号と情報セキュリティシンポジウム (SCIS2013), 2E3-3, 8 pages, (Jan., 2013).
  50. 松原有沙, 李 陽, 太田和夫, 崎山一男, “Mechanism Analysis for Non-Uniform Mapping of Faulty S-box –Case Study of AES-COMP–,” 2013年暗号と情報セキュリティシンポジウム (SCIS2013), 3E3-1, 6 pages, (Jan., 2013).
  51. 中曽根俊貴, 李 陽, 佐々木悠, 岩本 貢, 太田和夫, 崎山一男, “CC-EMAとCEMAの攻撃性能の比較,” 2013年暗号と情報セキュリティシンポジウム (SCIS2013), 3E3-2, 8 pages, (Jan., 2013).
  52. Toshiki Nakasone, Daisuke Nakatsu, Yang Li, Kazuo Ohta, and Kazuo Sakiyama, “Locality Randomization for EMA-Resistant AES Hardware,” In Proc. Triangle Symposium on Advanced ICT 2012 (TriSAI’12), 4 pages, (Sep., 2012).
  53. Yang Li, Daisuke Nakatsu, Kazuo Ohta, and Kazuo Sakiyama, “Key Recovery with Less Power Traces Using DPA Contest Data,” Poster Session, CHES2012 (Sep., 2012).
  54. 李 陽, 太田和夫, 崎山一男, “Sensitive-Data Dependency of Faulty Behavior and Its Application,” 2012年暗号と情報セキュリティシンポジウム (SCIS2012), 3C1-3E, 7 pages, (Feb., 2012)
  55. 中曽根俊貴, 中津大介, 李 陽, 太田和夫, 崎山一男, “クロック間衝突を利用した電磁波解析,” 2012年暗号と情報セキュリティシンポジウム (SCIS2012), 3C1-1, 8 pages, (Feb., 2012)
  56. 小池彩歌, 李 陽, 中津大介, 太田和夫, 崎山一男, “IRドロップを利用した故障感度解析と高温環境下における影響,” 2012年暗号と情報セキュリティシンポジウム (SCIS2012), 2C3-3, 7 pages, (Jan., 2012)
  57. 中津大介, 李 陽, 太田和夫, 崎山一男, “テンプレートを利用した時系列電力解析,” 2012年暗号と情報セキュリティシンポジウム (SCIS2012), 2C2-5, 6 pages, (Jan., 2012)
  58. 高橋順子, 阪本 光, 福永利徳, 冨士 仁, 崎山一男, “Access-Driven Cache Attackの自動的な攻撃評価手法の提案,” 2012年暗号と情報セキュリティシンポジウム (SCIS2012), 2C2-2, 7 pages, (Jan., 2012)
  59. 三上修吾, 吉田博隆, 渡辺 大, 崎山一男, “Threshold Implementation を利用したストリーム暗号Enocoro-128 v2の相関電力解析対策,” 2012年暗号と情報セキュリティシンポジウム (SCIS2012), 2C2-1, 6 pages, (Jan., 2012)
  60. 小松原航, 王 磊, 佐々木悠, 崎山一男, 太田和夫, “54ステップのSHA-0への原像攻撃,” 2012年暗号と情報セキュリティシンポジウム (SCIS2012), 1C1-1, (Jan., 2012)
  61. 駒野雄一, 太田和夫, 崎山一男, 岩本 貢, “PUFを用いる証明可能安全なパターン照合鍵生成方法,” 2012年暗号と情報セキュリティシンポジウム (SCIS2012), 1D2-2, 8 pages, (Jan., 2012)
  62. 山本 大, 崎山一男, 岩本 貢, 太田和夫, 落合隆夫, 武仲正彦, 伊藤孝一, “[招待講演]Uniquness Enhancement of PUF Responces Based on the Locations of Random Outputting RS Latches,” ISEC2011-66, p.29, (Dec., 2011).
  63. 李 陽, 太田和夫, 崎山一男, “[招待講演]マスク対策AESに対する誤り暗号文を用いた故障感度解析~CHES2011での発表のレビュー~,” ISEC2011-66, p.25, (Dec., 2011).
  64. 伊豆哲也, 猪俣敦夫, 桶屋勝幸, 川端健, 駒野雄一, 崎山一男, 酒見由美, 佐藤 証, 須賀祐治, 高木 剛, 高橋順子, 角尾幸保, 盛合志帆, 堀 洋平, 本間尚文, 渡辺 大, “国際会議CHES2011 報告,” ISEC2011-66, p.21-24, (Dec., 2011).
  65. 阪本光, 李陽, 太田和夫, 崎山一男, “クロック間衝突を用いた楕円曲線暗号実装に対する故障感度解析,” ISEC2011-49, pp.101-108, (Nov., 2011).
  66. Toshiki Nakasone, Daisuke Nakatsu, Yang Li, Kazuo Ohta, Kazuo Sakiyama, “First Experimental Results of Correlation-Enhanced EMA Collision Attack,” Poster Session, CHES2011 (Sep., 2011).
  67. Takuma Koyama, Yu Sasaki, Kazuo Sakiyama, and Kazuo Ohta, “Rebound Attack on 3D Block Cipher,” In Proc. Triangle Symposium on Advanced ICT 2011 (TriSAI’11), pp.220-224, (Aug., 2011).
  68. Yasuhide Sakai, Yu Sasaki, Lei Wang, Kazuo Ohta, and Kazuo Sakiyama, “Preimage Attacks on 5-Pass HAVAL Reduced to 158-Steps and One-Block 3-Pass HAVAL,” Industrial Track Session, ACNS2011, 14 pages, (Jun., 2011).
  69. Qi Li, Shigeto Gomisawa, Mitsugu Iwamoto, Kazuo Ohta, and Kazuo Sakiyama, “New Differential Fault Analysis on Trivium Based on Setup-Time Violations,” ISEC2010-122, pp.333-339, (Mar., 2011).
  70. 山本 大, 崎山一男, 岩本貢, 太田和夫, 落合隆夫, 武仲正彦, 伊藤孝一, “ラッチの乱数出力位置を利用したPUFによるID生成/認証システムの信頼性向上手法,” 2011年暗号と情報セキュリティシンポジウム (SCIS2011), 2D1-1, 8 pages, (Jan., 2011)
  71. 岩井祐樹, 太田和夫, 崎山一男, “故障感度解析を利用したPUFの実現について,” 2011年暗号と情報セキュリティシンポジウム (SCIS2011), 2D1-3, 8 pages, (Jan., 2011).
  72. 高柳真如, 佐々木悠, 李陽, 太田和夫, 崎山一男, “7 及び8 ラウンド既知鍵AES識別機の実装,” 2011年暗号と情報セキュリティシンポジウム (SCIS2011), 2B2-4, 7 pages, (Jan., 2011).
  73. 落合隆夫, 山本 大, 伊藤孝一, 武仲正彦, 鳥居直哉, 内田大輔, 永井利明, 若菜伸一, 岩本貢, 太田和夫, 崎山一男, “電磁波解析における局所性と放射磁界方向について,” 2011年暗号と情報セキュリティシンポジウム (SCIS2011), 2D3-3, 8 pages, (Jan., 2011).
  74. 李 陽, 太田和夫, 崎山一男, “Self-Template Fault Sensitivity Analysis,” 2011年暗号と情報セキュリティシンポジウム (SCIS2011), 3D3-1, 8 pages, (Jan., 2011).
  75. 阪本光, 李 陽, 太田和夫, 崎山一男, “楕円曲線暗号実装に対するFault Sensitivity Analysis,” 2011年暗号と情報セキュリティシンポジウム (SCIS2011), 3D3-2, 8 pages, (Jan., 2011).
  76. 五味澤重友, 王 磊, 太田和夫, 山口和彦, 崎山一男, “HMAC-MD5へのフォールト解析攻撃,” 2011年暗号と情報セキュリティシンポジウム (SCIS2011), 3D3-3, 8 pages, (Jan., 2011).
  77. 松田和也, 川合 豊, 崎山一男, 太田和夫, “再暗号化鍵匿名性を満たすIDベースプロキシ再暗号化方式,” 2011年暗号と情報セキュリティシンポジウム (SCIS2011), 3F3-6, 8 pages, (Jan., 2011).
  78. 中津大介, 太田和夫, 崎山一男, “AES-128 に対する複数ラウンドCPA,” 2011年暗号と情報セキュリティシンポジウム (SCIS2011), 3D4-1, 8 pages, (Jan., 2011).
  79. 酒井靖英, 佐々木悠, 王 磊, 崎山一男, 太田和夫, “158stepの5-pass HAVALと1-Block 3-pass HAVALへの原像攻撃,” 2011年暗号と情報セキュリティシンポジウム (SCIS2011), 4B1-2, 8 pages, (Jan., 2011).
  80. 名渕大樹, 岩本 貢, 崎山一男, 太田和夫, “Joux-Lucksの3-collisions探索アルゴリズムに関する計算量の詳細な検討,” 2011年暗号と情報セキュリティシンポジウム (SCIS2011), 4B1-4, 8 pages, (Jan., 2011).
  81. Naoyuki Takayanagi, Yang Li, Kazuo Sakiyama, and Kazuo Ohta, “Effective Verification for Known-Key Distinguisher by Using Extended Differential Path,” In Proc. Triangle Symposium on Advanced ICT 2010 (TriSAI’10), pp.284-287, (Oct., 2010).
  82. Qi Li, Kazuo Sakiyama, Lei Wang, and Kazuo Ohta, “Another Differential Fault Analysis on Trivium,” In Proc. Triangle Symposium on Advanced ICT 2010 (TriSAI’10), pp.247-252, (Oct., 2010).
  83. 岩本 貢, 李 陽, 崎山一男, 太田和夫, “回転操作が可能な視覚復号型秘密分散法の一般的構成法,” ISEC2010-49, pp.67-74, (Sep., 2010).
  84. 花谷嘉一, 大久保美也子, 松尾真一郎, 太田和夫, 崎山一男, “CryptoVerifを用いたRFID向け相互認証プロトコルの安全性証明の検討,” 日本応用数理学会2010年度年会 FAISセッション, (Sep., 2010).
  85. Shin’ichiro Matsuo, Miroslav Knežević, Patrick Schaumont, Ingrid Verbauwhede, Akashi Satoh, Kazuo Sakiyama and Kazuo Ohta, “How Can We Conduct Fair and Consistent Hardware Evaluation for SHA-3 Candidate?” The Second SHA-3 Candidate Conference, (Aug., 2010).
  86. Yu Sasaki, Yang Li, Lei Wang, Kazuo Sakiyama, and Kazuo Ohta, “New Non-Ideal Properties of AES-Based Permutations: Applications to ECHO and Grøstl,” The Second SHA-3 Candidate Conference, (Aug., 2010).
  87. 小林和幸, 池上 淳, 松尾真一郎, 崎山一男, 太田和夫, “SASEBO-GIIを用いたSHA-3候補のハードウェア性能評価,”第15回共同研究成果報告会, pp.29-30, (Jun., 2010).
  88. 太田和夫, 王 磊, 崎山一男, “強識別不可能性理論とSHA-3プロジェクト ~ハッシュ関数設計のための理論研究と実装研究の現状~,” ISEC2009-104, pp.159-166, (Mar., 2010).
  89. 塙 知剛, 川合 豊, 崎山一男, 太田和夫, “HB-MAC 認証プロトコルに対する受動的攻撃,” 2010年暗号と情報セキュリティシンポジウム (SCIS’10), 1E2-1, 6 pages, (Jan., 2010).
  90. 五味澤重友, 泉 雅巳, 李 陽, 高橋順子, 福永利徳, 佐々木悠, 崎山一男, 太田和夫, “AES暗号実装へのフォールト解析攻撃における適用範囲の拡大と解析効率の向上,” 2010年暗号と情報セキュリティシンポジウム (SCIS’10), 2B1-1, 6 pages, (Jan., 2010).
  91. Yang Li, Shigeto Gomisawa, Kazuo Sakiyama, and Kazuo Ohta, “An Information Theoretic Perspective on the Differential Fault Analysis against AES,” 2010 Symposium on Cryptography and Information Security (SCIS’10), 2B1-2, 6 pages, (Jan., 2010).
  92. 長井大地, 塙 知剛, 太田和夫, 崎山一男, 岩本 貢, “PUF-HBプロトコルに対する中間者攻撃,” 2010年暗号と情報セキュリティシンポジウム (SCIS’10), 2C2-5, 6 pages, (Jan., 2010).
  93. 中津大介, 李 陽, 崎山一男, 太田和夫, “DPA耐性のあるソフトウェア実装のための安全なCPU,” 2010年暗号と情報セキュリティシンポジウム (SCIS’10), 2B3-1, 6 pages, (Jan., 2010).
  94. 泉 雅巳, 崎山一男, 太田和夫, 佐藤 証, “公開鍵暗号の SPA/DPA 耐性向上に向けた対策アルゴリズムの再考,” 2010年暗号と情報セキュリティシンポジウム (SCIS’10), 2B3-2, 6 pages, (Jan., 2010).
  95. 松田和也, 坂井祐介, 太田和夫, 崎山一男, “Katz らのLeakage Resilient t-time 署名の解析,” 2010年暗号と情報セキュリティシンポジウム (SCIS’10), 2B3-4, 6 pages, (Jan., 2010).
  96. 池上 淳, 小林和幸, 崎山一男, 太田和夫, “SASEBO-GIIを用いたSHA-3候補のハードウェア性能評価,” 2010年暗号と情報セキュリティシンポジウム (SCIS’10), 4F1-2, 6 pages, (Jan., 2010).
  97. Bagus Santoso, Kazuo Ohta, Kazuo Sakiyama, and Goichiro Hanaoka, “Performance Comparison of Lightweight Public-Key Identification Schemes,” WISP Summit – First workshop on Wirelessly Powered Sensor Networks and Computational RFID, (Nov., 2009).
  98. Yang Li, Mitsugu Iwamoto, Kazuo Ohta, and Kazuo Sakiyama, “Visual Secret Sharing Schemes Allowing Arbitrary Rotation Angles of Shares,” In Proc. Triangle Symposium on Advanced ICT 2009 (TriSAI’09), Tokyo, Japan, pp.33-38, (Oct., 2009).
  99. Tomotaka Hanawa, Kazuo Sakiyama, and Kazuo Ohta, “Cryptanalysis of Duc-Kim Key Exchange Protocol Proposed at TriSAI’08,” In Proc. Triangle Symposium on Advanced ICT 2009 (TriSAI’09), Tokyo, Japan, pp.39-42, (Oct., 2009).
  100. Daisuke Nakatsu, Yang Li, Kazuo Sakiyama, and Kazuo Ohta, “Comparison of Masked S-boxes in Hardware Implementation,” In Proc. Triangle Symposium on Advanced ICT 2009 (TriSAI’09), Tokyo, Japan, pp.176-181, (Oct., 2009).
  101. Shigeto Gomisawa, Masami Izumi, Kazuo Sakiyama, and Kazuo Ohta, “An Extension of Differential Fault Analysis Attack of AES,” In Proc. Triangle Symposium on Advanced ICT 2009 (TriSAI’09), Tokyo, Japan, pp.185-188, (Oct., 2009).
  102. Bagus Santoso, Kazuo Ohta, Kazuo Sakiyama, and Goichiro Hanaoka, “Improving Efficiency of an ‘On the Fly’ Identification Scheme by Perfecting Zero-Knowledgeness,” ISEC2009-30, pp.161-168, (July, 2009).
  103. Yang Li, Mitsugu Iwamoto, Kazuo Ohta, and Kazuo Sakiyama, “A Novel Construction Method for Visual Secret Sharing Schemes Allowing Rotation of Shares,” ISEC2009-5, pp.29-36, (May, 2009).
  104. Yang Li, Mengyu Zhu, Wang Lei, Kazuo Ohta, and Kazuo Sakiyama, “Visual Secret Sharing Schemes for Multiple Secret Images Allowing the 90-degree Rotation of Shares,” 2009 Symposium on Cryptography and Information Security (SCIS’09), 1F1-3, (Jan., 2009).
  105. Lei Wang, Yu Sasaki, Kazuo Ohta, and Kazuo Sakiyama, “MD5チャレンジ・レスポンスプロトコルへの速い攻撃,” 2009 Symposium on Cryptography and Information Security (SCIS’09), 2A2-1, (Jan., 2009).
  106. 八木達哉, 崎山一男, 太田和夫, “高周波クロックによるRSL技術を用いたAESへのフォールト攻撃実験,” 2009年暗号と情報セキュリティシンポジウム (SCIS’09), 2A3-2, (Jan., 2009).
  107. 泉 雅巳, 崎山一男, 太田和夫, “フォールト混入時におけるRSL 技術による暗号回路モデルを用いた安全性解析,” 2009年暗号と情報セキュリティシンポジウム (SCIS’09), 2A3-3, (Jan., 2009).
  108. Bagus Santoso, Kazuo Ohta, and Kazuo Sakiyama, “Yet Another New “On the Fly” Identification Scheme: Reducing Memory Cost by Improving Zero-Knowledgeness,” 3A2-4, 2009 Symposium on Cryptography and Information Security (SCIS’09), (Jan., 2009).
  109. Masami Izumi, Kazuo Sakiyama, Kazuo Ohta, “Does The Montgomery Powering Ladder Method Really Offer SPA Resistance?,” In Proc. Triangle Symposium on Advanced ICT 2008 (TriSAI’08), Daejeon, Korea, 6 pages, (Oct., 2008).
  110. Yong Ki Lee, Kazuo Sakiyama, Lejla Batina, Ingrid Verbauwhede , “A Compact ECC Processor for Pervasive Computing,” In the Workshop Record of the ECRYPT Workshop, Secure Component and System Identification (SECSI’08), 14 pages, (Mar., 2008).
  111. Junfeng Fan, Kazuo Sakiyama, and Ingrid Verbauwhede, “Elliptic Curve Cryptography on Embedded Multicore Systems,” In the Workshop Record of the Workshop on Embedded Systems Security (WESS’07), 6 pages, (Oct., 2007).
  112. Junfeng Fan, Kazuo Sakiyama, and Ingrid Verbauwhede, “Montgomery Modular Multiplication Algorithm for Multi-core Systems,” In the Workshop Record of the ECRYPT Workshop, Software Performance Enhancement for Encryption and Decryption (SPEED’07), 12 pages, (Jun., 2007).
  113. Caroline Vanderheyden, Junfeng Fan, Kazuo Sakiyama, and Ingrid Verbauwhede, “Exploring Trade-offs between Area, Performance and Security in HW/SW Co-design of ECC,” In the Workshop Record of the Western European Workshop on Research in Cryptology (WeWoRC’07), 2 pages, (Jul., 2007).
  114. Kazuo Sakiyama, Lejla Batina, Nele Mentens, Bart Preneel, and Ingrid Verbauwhede, “Small Footprint ALU for Public-key Processors for Pervasive Security,” In the Workshop Record of the ECRYPT Workshop on RFID Security 2006, 12 pages, (Jul., 2006).
  115. Lejla Batina, Sandeep Kumar, Joseph Lano, Kerstin Lemke, Nele Mentens, Christoph Paar, Bart Preneel, Kazuo Sakiyama, and Ingrid Verbauwhede, “Testing Framework for eSTREAM Profile II Candidates,” In the Workshop Record of the ECRYPT Workshop, SASC – The State of the Art of Stream Ciphers, 9 pages, (Feb., 2006).
  116. Kazuo Sakiyama, Lejla Batina, Patrick Schaumont, and Ingrid Verbauwhede, “HW/SW Co-design for TA/SPA-resistant Public-Key Cryptosystems,” In the Workshop Record of the ECRYPT Workshop on Cryptographic Advances in Secure Hardware (CRASH’05), 8 pages, (Sep., 2005).
  117. Young-Jae Cho, Takashi Hirakawa, Kazuo Sakiyama, Hiroaki Okamoto and Yoshihiro Hamakawa, “EL/PL Hybrid Device Enhanced by UV Emission from ZnF2:Gd Thin Film Electroluminescence,” 8th Seoul International Symposium on the Physics of Semiconductors and Applications (ISPSA’96), Seoul, Korea, pp.21-22, (Oct., 1996).
  118. 平川 孝, 崎山一男, 趙 永載, 濱川圭弘, “ZnF2:Gdを用いたEL-PL複合素子(II),” 第57回応用物理学会学術講演会講演予稿集, Vol.43, No.3, p.1210, (1996年9月).
  119. 崎山一男, 趙 永載, 濱川圭弘, “ZnF2:Gdを用いたEL-PL複合素子,” 第56回応用物理学会学術講演会講演予稿集, Vol.56, No.3, p.1085, (1995年8月).
  120. 森田真太郎, 崎山一男, 趙 永載, 濱川圭弘, “a-Si:H層を用いたEL素子の低しきい電圧化,” 第55回応用物理学会学術講演会講演予稿集, Vol.55, No.3, p.1155, (1994年9月).

Cryptology ePrint Archive

  1. Kazuo Sakiyama, Takanori Machida, Arisa Matsubara, Yunfeng Kuai, Yu-ichi Hayashi, Takaaki Mizuki, Noriyuki Miura, and Makoto Nagata, “Authentication Using Side-Channel Information,” Cryptology ePrint Archive, Report 2015/834, 2015.
  2. Yang Li, Daisuke Nakatsu, Qi Li, Kazuo Ohta, and Kazuo Sakiyama, “Clockwise Collision Analysis — Overlooked Side-Channel Leakage Inside Your Measurements,” Cryptology ePrint Archive, Report 2011/579, 2011.
  3. Miyako Ohkubo, Shin’ichiro Matsuo, Yoshikazu Hanatani, Kazuo Sakiyama and Kazuo Ohta, “Robust RFID Authentication Protocol with Formal Proof and Its Feasibility,” Cryptology ePrint Archive, Report 2010/345, 2010.
  4. Shigeto Gomisawa, Yang Li, Junko Takahashi, Toshinori Fukunaga, Yu Sasaki, Kazuo Sakiyama, and Kazuo Ohta, “Efficient Differential Fault Analysis for AES,” Cryptology ePrint Archive, Report 2010/336, 2010.
  5. Yang Li, Shigeto Gomisawa, Kazuo Sakiyama, and Kazuo Ohta, “An Information Theoretic Perspective on the Differential Fault Analysis against AES,” Cryptology ePrint Archive, Report 2010/032, 2010.
  6. Kazuyuki Kobayashi, Jun Ikegami, Shin’ichiro Matsuo, Kazuo Sakiyama, and Kazuo Ohta, “Evaluation of Hardware Performance for the SHA-3 Candidates Using SASEBO-GII,” Cryptology ePrint Archive, Report 2010/010, 2010.

その他の発表

  1. 粕谷桃伽, 町田卓謙, 崎山一男 “Physical Infomation Using Side-Channel Infomation~(overview),” Hot Channel Workshop 2016, (2016年4月4日).
  2. 八代理紗, 町田卓謙, 岩本 貢, 崎山一男, “Double Arbiter PUFに対するDeep Learningを使った安全性評価,” Hot Channel Workshop 2016, (2016年4月4日).
  3. 藤井達哉, 崎山一男, “AES暗号化回路から漏洩する電磁波サイドチャネル情報の可視化,” Hot Channel Workshop 2016, (2016年4月4日).
  4. 宮元景冬, “ハイパバイザによる有害画像の視覚的規制,” Hot Channel Workshop 2016, (2016年4月3日).
  5. 粕谷桃伽, 藤井達哉, 町田卓謙, 崎山一男, “AES暗号化回路からの全ラウンド漏洩電磁波を用いたサイドチャネル認証,” Hot Channel Workshop 2015, (2015年10月9日).
  6. 松田航平, 三浦典之, 永田真, 林 優一,
    藤井達哉, 崎山一男, “レーザーフォルト注入時の
    IC基板電位変動のオンチップ測定,” Hot Channel Workshop 2015, (2015年10月8日).
  7. 矢ヶ崎玲奈, 崎山一男, 林 優一, 三浦典之, “差分故障解析に対するデバイスレベルの対策手法に向けて,” Hot Channel Workshop 2015, (2015年10月8日).
  8. 矢ヶ崎玲奈, 崎山一男, “ガラスのムラを用いた人工物メトリクスの研究,” Hot Channel Workshop 2014, (2014年10月7日).
  9. 李 陽, 崎山一男, “Single-Chip Implementation and Evaluation of Passive UHF RFID Tag with Hash-Based Mutual Authentication,” Hot Channel Workshop 2014, (2014年10月7日).
  10. 松原有沙, 町田卓謙, 崎山一男, “サイドチャネル情報を用いた認証の実現に向けて,” Hot Channel Workshop 2014, (2014年10月6日).
  11. 李 陽, 三上修吾, 渡辺 大, 太田和夫, 崎山一男, “RFIDシステムにおけるリレー攻撃対策,” Hot Channel Workshop 2014, (2014年4月23日).
  12. 町田卓謙, 山本大, 岩本 貢, 崎山一男, “FPGA実装されたArbiter-based PUFのユニーク性向上に向けた実装法の検討” Hot Channel Workshop 2014, (2014年4月22日).
  13. 三上修吾, 渡辺 大, 崎山一男, “バッファを用いた軽量擬似乱数生成器のグリッチ削減方法と実装評価,” Hot Channel Workshop 2014, (2014年4月22日).
  14. 李 陽, 崎山一男, “Single-Chip Implementation and Evaluation of A Privacy-Enhanced RFID Tag,” Hot Channel Workshop 2014, (2014年4月22日).
  15. 町田卓謙, 中曽根俊貴, 岩本 貢, 崎山一男, “FPGA上のArbiter PUFに対する機械学習攻撃の新たなモデル作成に向けて,” Hot Channel Workshop 2013, (2013年11月26日).
  16. 李 陽, 崎山一男, “Introduction to IAIK Demotag and Related Experiments on It,” Hot Channel Workshop 2013, (2013年11月25日).
  17. 崎山一男, ”暗号システムへの故障利用解析,” 2013年電子情報通信学会ソサイエティ大会, BI-1. 安全・安心な情報通信社会を実現する電磁情報セキュリティ評価・対策技術, (2013年9月19日).
  18. 駒野雄一, 太田和夫, 崎山一男, 岩本 貢, “PUFを用いる鍵生成方法とその安全性,” Hot Channel Workshop 2013, (2013年4月11日).
  19. 三上修吾, 渡辺 大, 崎山一男, “OSKプロトコル向け軽量暗号アルゴリズムの実装評価,” Hot Channel Workshop 2013, (2013年4月11日).
  20. 松原有沙, 李 陽, 太田和夫, 崎山一男, “NU-FVAに基づく新たな鍵復元攻撃について,” Hot Channel Workshop 2013, (2013年4月11日).
  21. 李 陽, 中曽根俊貴, 崎山一男, “Toward Practically Secure and Flexible RFID Tags,” Hot Channel Workshop 2013, (2013年4月12日).

講演・チュートリアル・パネルディスカッション等

  1. 三上修吾, 崎山一男, “プライバシ保護可能な認証プロトコルのRFIDタグ実装と性能評価,” ハードウェアセキュリティフォーラム2016, (Dec. 3, 2016).
  2. IoTセキュリティフォーラム2016, “トロージャン攻撃に関するハードウェアセキュリティ分野の研究動向,” (Sep. 16, 2016).
  3. Dagstuhl Seminar 16342, “Foundations of Secure Scaling,” (Aug., 21-26, 2016).
  4. Dagstuhl Seminar 16202, “Hardware Security,” (16-20, May, 2016).
  5. Yang Li, Kazuo Sakiyama, “Review Fault Attacks on ECC Implementations with Fault Sensitivity Analysis,” A-SSCC 2015 レビュー講演, IEEE SSCS Japan/Kansai Chapter Technical Seminar, (2016年1月13日).
  6. Yang Li, Kazuo Sakiyama, “Review Fault Attacks on ECC Implementations with Fault Sensitivity Analysis,” IEEE Asian Solid-State Circuits Conference 2015, (A-SSCC’15), (Nov., 10th, 2015).
  7. Kazuo Sakiyama, “Hardware Implementations of ECC,” Summer school on real-world crypto and privacy, (2015年6月4日).
  8. 崎山一男, “暗号ハードウェアからの情報漏洩,” 日本学術振興会シリコン超集積化システム第165委員会, (2015年5月15日).
  9. Kazuo Sakiyama, “Fault Analysis for Cryptosystems: Introduction to Differential Fault Analysis and Fault Sensitivity Analysis,” Tutorial-4: Hardware Trust in VLSI Design and Implementations, Asia and South Pacific Design Automation Conference (ASP-DAC’15), Tutorial Session, (Jan., 2015).
  10. NII Shonan Meeting, “Design Methods for Secure Hardware,” (Sep. 15-19, 2014).
  11. 李 陽, 崎山一男, “Two Topics in Cryptographic Hardware: Coupon DFA and Secure RFID,” Compview暗号理論ワークショップ2013, (2013年2月21日).
  12. 崎山一男, 李 陽, ”故障感度解析の可能性,” Hot Channel Workshop 2012, (2012年9月5日).
  13. 崎山一男, “故障感度解析とその応用について,” 16回情報科学研究科セミナー@JAIST, (2012年3月5日).
  14. 崎山一男, “Fault Behavior Analysis,” Compview暗号理論ワークショップ2012, (2012年2月21日).
  15. 崎山一男, “Fault Sensitivity Analysis,” Compview暗号理論ワークショップ2011, (2011年2月21日).
  16. Kazuo Sakiyama, “A New Fault Analysis Attack (joint work with Yang Li and Kazuo Ohta),” 2010 Japan-Taiwan Joint Research Symposium on Cryptography and Next IT-society, (Nov. 16, 2010).
  17. Kazuo Sakiyama, “Cryptanalysis and Side-channel Analysis – Approach to Optimal Differential Fault Analysis (joint work with Yang Li and Kazuo Ohta),” Forum Math-for-Industry 2010, (Oct. 22, 2010).
  18. “暗号技術の実装について,” CRYPTRECシンポジウム2010, (2010年3月2日)
  19. “暗号理論に関する問題提起と討論,” Compview暗号理論ワークショップ2010, (2010年2月25日).
  20. 崎山一男, “サイドチャネル攻撃への対策とその副作用,” RSA Conference Japan 2009, クラストラック:暗号技術の最新動向(RC-03), (2009年6月10日).
  21. Lejla Batina and Kazuo Sakiyama, “Compact Implementations for RFID and Sensor Nodes,” Special Interest Workshops – Secure Embedded Implementations, Design, Automation and Test in Europe (DATE’07), (Apr., 2007).