酒井靖英, 佐々木悠, 王 磊, 崎山一男, 太田和夫, “158stepの5-pass HAVALと1-Block 3-pass HAVALへの原像攻撃,” 2011年暗号と情報セキュリティシンポジウム (SCIS’11), 4B1-2, 8 pages, (Jan., 2011).
中津大介, 太田和夫, 崎山一男, “AES-128 に対する複数ラウンドCPA,” 2011年暗号と情報セキュリティシンポジウム (SCIS’11), 3D4-1, 8 pages (Jan., 2011).
松田和也, 川合 豊, 崎山一男, 太田和夫, “再暗号化鍵匿名性を満たすIDベースプロキシ再暗号化方式”, 2011年暗号と情報セキュリティシンポジウム (SCIS’11), 3F3-6, 8 pages (Jan., 2011).
五味澤重友, 王 磊, 太田和夫, 山口和彦, 崎山一男, “HMAC-MD5へのフォールト解析攻撃, ” 2011年暗号と情報セキュリティシンポジウム (SCIS’11), 3D3-3, 8 pages (Jan., 2011).
Lei Wang, Yu Sasaki, Kazuo Sakiyama, and Kazuo Ohta, “Bit-Free Collision: Application to APOP Attack,” In Proc. International Workshop on Security 2009 (IWSEC’09), LNCS 5824, Springer-Verlag, pp.3–21 (Oct., 2009).
Yang Li, Kazuo Sakiyama, Shinichi Kawamura, Yuichi Komano, and Kazuo Ohta, “Security Evaluation of a DPA-resistant S-box Based on the Fourier Transform,” In Proc. International Conference on Information and Communications Security (ICICS’09), LNCS 5927, Springer-Verlag, pp.3–16 (Dec., 2009).
Bagus Santoso, Kazuo Ohta, Kazuo Sakiyama, and Goichiro Hanaoka, “Improving Efficiency of An ‘On the Fly’ Identification Scheme by Perfecting Zero-Knowledgeness,” In Proc. RSA Conference 2010, Cryptographer’s Track (CT-RSA’10), LNCS 5985, Springer-Verlag, pp.284–301 (Mar., 2010).
Masami Izumi, Jun Ikegami, Kazuo Sakiyama, and Kazuo Ohta, “Improved Countermeasure against Address-bit DPA for ECC Scalar Multiplication,” In Proc. Design, Automation and Test in Europe (DATE’10), ACM, pp.981–984 (Mar., 2010).
Yang Li, Kazuo Sakiyama, Lejla Batina, Daisuke Nakatsu, and Kazuo Ohta, “Power Variance Analysis Breaks a Masked ASIC Implementations of AES,” In Proc. Design, Automation and Test in Europe (DATE’10), ACM, pp.1059–1064 (Mar., 2010).
Kazuyuki Kobayashi, Jun Ikegami, Miroslav Knežević, Eric Xu Guo, Shin’ichiro Matsuo, Sinan Huan, Leyla Nazhandali, Ünal Kocabaş, Junfeng Fan, Akashi Satoh, Patrick Schaumont, Ingrid Verbauwhede, Kazuo Sakiyama, and Kazuo Ohta, “Prototyping Platform for Performance Evaluation of SHA-3 Candidates,” In Proc. International Symposium on Hardware-Oriented Security and Trust (HOST’10), IEEE, pp.60–63 (Jun., 2010).