稲垣沙耶, 楊明宇, 李陽, 崎山一男, 原祐子, “電力サイドチャネル攻撃に対して堅牢なARX型暗号回路の高位合成,” 2023年暗号と情報セキュリティシンポジウム (SCIS’23), 3E2-3, 8 pages (Jan., 2023).
Enhao Xu, Takeshi Sugawara, Kazuo Sakiyama, Yuko Hara-Azumi, and Yang Li, “Attention-Based Non-Profiled SCA on ASCAD Database,” 2023年暗号と情報セキュリティシンポジウム (SCIS’23), 3E1-4, 8 pages (Jan., 2023).
Junko Takahashi, Toshinori Fukunaga, Shigeto Gomisawa, Yang Li, Kazuo Sakiyama, and Kazuo Ohta, “Fault Injection and Key Retrieval Experiments on Evaluation Board,” Chapter in Marc Joye and Michael Tunstall editors, Fault Analysis in Cryptography, ISBN 978-3-642-29656-7, Springer, pp.313–331 (Jul., 2012).
五味澤重友, 泉 雅巳, 李 陽, 高橋順子, 福永利徳, 佐々木悠, 崎山一男, 太田和夫, “AES暗号実装へのフォールト解析攻撃における適用範囲の拡大と解析効率の向上,” 2010年暗号と情報セキュリティシンポジウム (SCIS’10), 2B1-1, 6 pages (Jan., 2010).
Yu Sasaki, Yang Li, Lei Wang, Kazuo Sakiyama, and Kazuo Ohta, “New Non-Ideal Properties of AES-Based Permutations: Applications to ECHO and Grøstl,” The Second SHA-3 Candidate Conference (Aug., 2010).
Naoyuki Takayanagi, Yang Li, Kazuo Sakiyama, and Kazuo Ohta, “Effective Verification for Known-Key Distinguisher by Using Extended Differential Path,” In Proc. Triangle Symposium on Advanced ICT 2010 (TriSAI’10), pp.284–287 (Oct., 2010).
Yang Li, Kazuo Sakiyama, Shinichi Kawamura, Yuichi Komano, and Kazuo Ohta, “Security Evaluation of a DPA-resistant S-box Based on the Fourier Transform,” In Proc. International Conference on Information and Communications Security (ICICS’09), LNCS 5927, Springer-Verlag, pp.3–16 (Dec., 2009).
Yang Li, Kazuo Sakiyama, Lejla Batina, Daisuke Nakatsu, and Kazuo Ohta, “Power Variance Analysis Breaks a Masked ASIC Implementations of AES,” In Proc. Design, Automation and Test in Europe (DATE’10), ACM, pp.1059–1064 (Mar., 2010).
Yang Li, Kazuo Sakiyama, Shigeto Gomisawa, Toshinori Fukunaga, Junko Takahashi, and Kazuo Ohta, “Fault Sensitivity Analysis,” In Proc. Workshop on Cryptographic Hardware and Embedded Systems (CHES’10), LNCS 6225, Springer-Verlag, pp.320–334 (Aug., 2010).