Sho Tada, Yuki Yamashita, Kohei Matsuda, Makoto Nagata, Kazuo Sakiyama, and Noriyuki Miura, “Design and concept proof of an inductive impulse self-destructor in sense-and-react countermeasure against physical attacks,” J. Appl. Phys. 60, SGGL01, 7pages, (Feb., 2021).
Go Takami, Takeshi Sugawara, Kazuo Sakiyama, and Yang Li, “Mixture-Based 5-Round Physical Attack against AES: Attack Proposal and Noise Evaluation,” IEICE Trans. Fundam. Electron. Commun. Comput. Sci., Vol.E105-A, No.3,, pp.289–299 (Mar., 2021).
Go Takatoi, Takeshi Sugawara, Kazuo Sakiyama, Yuko Hara-Azumi, and Yang Li, “The Limits of Timing Analysis and SEMA on Distinguishing Similar Activation Functions of Embedded Deep Neural Networks,” Appl. Sci. 2022, Vol.12(9), 4135 (Apr., 2022).
Daisuke Fujimoto, Noriyuki Miura, Makoto Nagata, Yuichi Hayashi, Naofumi Homma, Yohei Hori, Toshihiro Katashita, Kazuo Sakiyama, Thanh-Ha Le, Julien Bringer, Pirouz Bazargan-Sabet, Jean-Luc Danger, “On-chip power noise measurements of cryptographic VLSI circuits and interpretation for side-channel analysis,” In Proc. International Symposium on Electromagnetic Compatibility (EMC EUROPE) 2013, IEEE, pp.405–410 (Sep., 2013).
Yang Li, Yu-ichi Hayashi, Arisa Matsubara, Naofumi Homma, Takafumi Aoki, Kazuo Ohta and Kazuo Sakiyama, “Yet Another Fault-Based Leakage in Non-Uniform Faulty Ciphertexts,” In Proc. The Sixth International Symposium on Foundations & Practice of Security (FPS’13), LNCS 8352, pp.272–287, Springer-Verlag (Oct., 2013).
Shugo Mikami, Dai Watanabe, and Kazuo Sakiyama, “A Comparative Study of Stream Ciphers and Hash Functions for RFID Authentications,” In Proc. The 2013 Workshop on RFID and IoT Security (RFIDsec’13 Asia), IOS Press, pp.83–94 (Nov., 2013).
Yang Li, Toshiki Nakasone, Kazuo Ohta, Kazuo Sakiyama, “Privacy-Mode Switching: Toward Flexible Privacy Protection for RFID Tags in Internet of Things,” In Proc. The 11th Annual IEEE Consumer Communications & Networking Conference (CCNC’14), IEEE, pp.519-520 (Jan., 2014).
Daisuke Fujimoto, Noriyuki Miura, Makoto Nagata, Yuichi Hayashi, Naofumi Homma, Takafumi Aoki, Yohei Hori, Toshihiro Katashita, Kazuo Sakiyama, Thanh-Ha Le, Julien Bringer, Pirouz Bazargan-Sabet, Shivam Bhasin, and Jean-Luc Danger, “Correlation Power Analysis using Bit-Level Biased Activity Plaintexts against AES Core with Countermeasures,” in Proc. 2014 International Symposium on Electromagnetic Compatibility, Tokyo (EMC’14/Tokyo), IEEE, pp 306–309, 14P2-A3 (May, 2014).
Yang Li, Toshiki Nakasone, and Kazuo Sakiyama, “Software and Hardware Co-Verification for Privacy-Enhanced Passive UHF RFID Tags,” In Proc. 2014 IEEE International Symposium on Electromagnetic Compatibility (EMC’14), IEEE, pp.752–757 (Aug., 2014).
Dai Yamamoto, Masahiko Takenaka, Kazuo Sakiyama, and Naoya Torii, “A Technique using PUFs for Protecting Circuit Layout Designs against Reverse Engineering,” In Proc. International Workshop on Security 2014 (IWSEC’14), LNCS 8639, Springer-Verlag, pp.158–253 (Sep., 2014).