Muhammad Salman, Yang Li, Jian Wang, “A Graphical PIN Entry System with Shoulder Surfing Resistance”, 2019 IEEE 4th International Conference on Signal and Image Processing, IEEE, pp. 203–207 (Jul., 2019).
Takeshi Sugawara, Tatsuya Onuma, and Yang Li, “Signal Injection Attack on Time-to-Digital Converter and Its Application to Physically Unclonable Function,” In Proc. International Workshop on Security (IWSEC 2020), LNCS 12231, Springer-Verlag, pp.117–127 (Sep., 2020).
Yang Li, Mengyu Zhu, Wang Lei, Kazuo Ohta, and Kazuo Sakiyama, “Visual Secret Sharing Schemes for Multiple Secret Images Allowing the 90-degree Rotation of Shares,” 2009 Symposium on Cryptography and Information Security (SCIS’09), 1F1-3 (Jan., 2009).
Yang Li, Mitsugu Iwamoto, Kazuo Ohta, and Kazuo Sakiyama, “A Novel Construction Method for Visual Secret Sharing Schemes Allowing Rotation of Shares,” ISEC2009-5, pp.29–36 (May, 2009).
Daisuke Nakatsu, Yang Li, Kazuo Sakiyama, and Kazuo Ohta, “Comparison of Masked S-boxes in Hardware Implementation,” In Proc. Triangle Symposium on Advanced ICT 2009 (TriSAI’09), Tokyo, Japan, pp.176–181 (Oct., 2009).
Yang Li, Mitsugu Iwamoto, Kazuo Ohta, and Kazuo Sakiyama, “Visual Secret Sharing Schemes Allowing Arbitrary Rotation Angles of Shares,” In Proc. Triangle Symposium on Advanced ICT 2009 (TriSAI’09), Tokyo, Japan, pp.33–38 (Oct., 2009).
Yang Li and Kazuo Sakiyama, “Toward Practical Solution to Unsuccessful Write Operation on Non-Volatile Memory of Passive RFID Tags,” Poster Session, ASIACCS2014 (Jun., 2014).
カイ云峰, 李陽, 町田卓謙, 崎山一男, “AESハードウェア実装の任意ラウンドにおける消費電力制御,” 2015年暗号と情報セキュリティシンポジウム (SCIS’15), 3A2-2, 7 pages (Jan., 2015).
中津大介, 李 陽, 太田和夫, 崎山一男, “テンプレートを利用した時系列電力解析,” 2012年暗号と情報セキュリティシンポジウム (SCIS’12), 2C2-5, 6 pages (Jan., 2012)
小池彩歌, 李 陽, 中津大介, 太田和夫, 崎山一男, “IRドロップを利用した故障感度解析と高温環境下における影響,” 2012年暗号と情報セキュリティシンポジウム (SCIS’12), 2C3-3, 7 pages (Jan., 2012)