Yong Ki Lee, Kazuo Sakiyama, Lejla Batina, and Ingrid Verbauwhede, “Elliptic Curve Based Security Processor for RFID,” IEEE Trans. Comput., Vol.57, No.11, pp.1514–1527 (Nov., 2008).
Kazuo Sakiyama and Kazuo Ohta, “On Clock-Based Fault Analysis Attack for an AES Hardware Using RSL,” IEICE Trans. Fundam. Electron. Commun. Comput. Sci., Vol.E93-A, No.1, pp.172–179 (Jan., 2010).
Lei Wang, Kazuo Ohta, Yu Sasaki, Kazuo Sakiyama, and Noboru Kunihiro, “Cryptanalysis of Two MD5-Based Authentication Protocols: APOP and NMAC,” IEICE Trans. Inf. Syst., Vol.E93-D, No.5, pp.1087–1095 (May, 2010).
Bagus Santoso, Kazuo Ohta, Kazuo Sakiyama, Goichiro Hanaoka, “An Efficient Authentication for Lightweight Devices by Perfecting Zero-Knowledgeness,” IEICE Trans. Fundam. Electron. Commun. Comput. Sci., Vol.A94-A, No.1, pp.92–103 (Jan., 2011).
Yang Li, Kazuo Sakiyama, Shinichi Kawamura, and Kazuo Ohta, “Power Analysis against a DPA-resistant S-box Implementation Based on the Fourier Transform,” IEICE Trans. Fundam. Electron. Commun. Comput. Sci., Vol.A94-A, No.1, pp.191–199 (Jan., 2011).
Kazuo Sakiyama, Miroslav Knežević, Junfeng Fan, Bart Preneel, and Ingrid Verbauwhede, “Tripartite Modular Multiplication,” Integration-VLSI J., Vol.44, Issue 4, pp.259–269 (Apr., 2011).
Lei Wang, Yu Sasaki, Wataru Komatsubara, Kazuo Sakiyama, Kazuo Ohta, “Meet-in-the-Middle (Second) Preimage Attacks on Two Double-Branch Hash Functions RIPEMD and RIPEMD-128,” IEICE Trans. Fundam. Electron. Commun. Comput. Sci., Vol.E95-A, No.1, pp.100–110 (Jan., 2012).
Yang Li, Kazuo Ohta, and Kazuo Sakiyama, “Toward Effective Countermeasures Against an Improved Fault Sensitivity Analysis,” IEICE Trans. Fundam. Electron. Commun. Comput. Sci., Vol.A95-A, No.1, pp.234–241 (Jan., 2012).
Junko Takahashi, Toshinori Fukunaga, Kazuo Sakiyama, “Differential Fault Analysis on Stream Cipher MUGI,” IEICE Trans. Fundam. Electron. Commun. Comput. Sci., Vol.E95-A, No.1, pp.242–251 (Jan., 2012).
Yang Li, Kazuo Ohta, and Kazuo Sakiyama, “New Fault-Based Side-Channel Attack Using Fault Sensitivity,” IEEE Trans. Inf. Forensic Secur., Vol.7, No.1, pp.88–97 (Feb., 2012).