Yusaku Harada, Maki Tsukahara, Daiki Miyahara, Yang Li, Yuko Hara and Kazuo Sakiyama,“PRNG-Oriented Side-Channel Security Evaluation for TI-AES,” The 8th International Conference on Mobile Internet Security (Mobisec 2024), 9A-2, (Dec. 2024).
Kaiyuan Li, Haruka Hirata, Daiki Miyahara, Yuko Hara, Kazuo Sakiyama, and Yang Li, “Multiplicative Masked M&M: An Attempt at Combined Countermeasures with Reduced Randomness,” In Proc TrustCom-2024, IEEE, pp. XXX-YYY, (Dec. 2024). To appear
Kazumasa Shinagawa, Daiki Miyahara, and Takaaki Mizuki, “How to Play Old Maid with Virtual Players,” Theory of Computing Systems, Springer, vol.?, pp.?–?, To Appear
Ryunosuke Amano, Kazuo Sakiyama, Daiki Miyahara and Yang Li, “LoS Trick: Countermeasure against CPA for DNN models using Loss of Significance in Multiply-Accumulate Operations,“ In Proc. International Symposium on Computing and Networking, CANDAR Workshops (CANDARW’24), IEEE, pp.XXX–YYY (Nov., 2024).
Shohei Kaneko, Pascal Lafourcade, Lola Mallordy, Daiki Miyahara, Maxime Puys, and Kazuo Sakiyama, “Secure Voting Protocol Using Balance Scale,” In Proc. Foundations and Practice of Security (FPS’24), LNCS ?????, Springer-Verlag, pp.???–??? (2025) To Appear.
Shohei Kaneko, Pascal Lafourcade, Lola Mallordy, Daiki Miyahara, Maxime Puys, and Kazuo Sakiyama, “Balance-Based ZKP Protocols for Pencil-and-Paper Puzzles,” In Proc. Information Security (ISC’24), LNCS 15257, Springer-Verlag, pp.211–231 (Oct. 2024)
Daiki Miyahara, Léo Robert, Pascal Lafourcade, and Takaaki Mizuki, ZKP Protocols for Usowan, Herugolf, and Five Cells, Tsinghua Science and Technology, vol.29(6), pp.1651–1666 (Dec. 2024)
Samuel Hand, Alexander Koch, Pascal Lafourcade, Daiki Miyahara, and Léo Robert, Efficient Card-Based ZKP for Single Loop Condition and Its Application to Moon-or-Sun, New Generation Computing, vol. 42, pp. 449–477 (Aug. 2024)
Haruka Hirata, Daiki Miyahara, Victor Arribas, Yang Li, Noriyuki Miura, Svetla Nikova, and Kazuo Sakiyama, “All You Need Is Fault: Zero-Value Attacks on AES and a New $\lambda$-Detection M&M (from TCHES 2024),” 電子情報通信学会情報セキュリティ研究会, 機械振興会館 (May 15, 2024).
Maki Tsukahara, Yusaku Harada, Haruka Hirata, Daiki Miyahara, Yang Li, Yuko Hara-Azumi, and Kazuo Sakiyama, “Practical Randomness Effects on Physical Security in Second-Order Threshold Implementation of AES,” IEICE Trans. Fundam. Electron. Commun. Comput. Sci., Vol.E108-A, No.3, pp.XXX-YYY (Mar., 2025).