Yu Sasaki, Naoyuki Takayanagi, Kazuo Sakiyama, and Kazuo Ohta, “Experimental Verification of Super-Sbox Analysis — Confirmation of Detailed Attack Complexity,” In Proc. International Workshop on Security 2011 (IWSEC’11), LNCS 7038, Springer-Verlag, pp.178–192, (Nov., 2011).
Takuma Koyama, Lei Wang, Yu Sasaki, Kazuo Sakiyama, Kazuo Ohta, “New Truncated Differential Cryptanalysis on 3D Block Cipher,” In Proc. International Conference on Information Security Practice and Experience (ISPEC’12), LNCS 7232, Springer-Verlag, pp.109–125 (Apr., 2012).
Yu Sasaki, Lei Wang, Yasuhide Sakai, Kazuo Sakiyama, and Kazuo Ohta, “Three-Subset Meet-in-the-Middle Attack on Reduced XTEA,” In Proc. International Conference on Cryptology in Africa (Africacrypt’12), LNCS 7374, Springer-Verlag, pp.138–154 (Jul., 2012).
Sho Endo, Yuichi Hayashi, Naofumi Homma, Takafumi Aoki, Toshihiro Katashita, Yohei Hori, Kazuo Sakiyama, Makoto Nagata, Jean-Luc Danger, Thanh-Ha Le and Pirouz Bazargan Sabet, “Measurement of Side-Channel Information from Cryptographic Devices on Security Evaluation Platform: Demonstration of SPACES Project,” SICE Annual Conference 2012, pp.313–316, (Aug., 2012).
Sho Endo, Yang Li, Naofumi Homma, Kazuo Sakiyama, Kazuo Ohta and Takafumi Aoki, “An Efficient Countermeasure against Fault Sensitivity Analysis Using Configurable Delay Blocks,” In Proc. Workshop on Fault Diagnosis and Tolerance in Cryptography (FDTC’12), IEEE, pp.95–102 (Sep., 2012).
Lei Wang, Yu Sasaki, Kazuo Sakiyama and Kazuo Ohta, “Cryptanalysis of 3D Cipher and 3D-based Hash Function,” In Proc. International Workshop on Security 2012 (IWSEC’12), LNCS 7631, Springer-Verlag, pp.170–181 (Nov., 2012).
Yu Sasaki, Lei Wang, Yasuhiro Takasaki, Kazuo Sakiyama, and Kazuo Ohta, “Boomerang Distinguishers for Full HAS-160 Compression Function,” In Proc. International Workshop on Security 2012 (IWSEC’12), LNCS 7631, Springer-Verlag, pp.156–169 (Nov., 2012).
Toshiki Nakasone, Yang Li, Yu Sasaki, Mitsugu Iwamoto, Kazuo Ohta, and Kazuo Sakiyama, “Key-Dependent Weakness of AES-Based Ciphers Under Clockwise Collision Distinguisher,” In Proc. International Conference on Information Security and Cryptology 2012 (ICISC’12), LNCS 7839, Springer-Verlag, pp.395–409 (Nov., 2012).
Yang Li, Kazuo Ohta, and Kazuo Sakiyama, “An Extension of Fault Sensitivity Analysis Based on Clockwise Collision,” In Proc. International Conferences on Information Security and Cryptology 2012 (Inscript’12), LNCS 7763, Springer-Verlag, pp.46–59 (Nov., 2012).
Yang Li, Sho Endo, Nicolas Debande, Naofumi Homma, Takafumi Aoki, Thanh-Ha Le, Jean-Luc Danger, Kazuo Ohta, Kazuo Sakiyama, “Exploring the Relations Between Fault Sensitivity and Power Consumption,” In Proc. Constructive Side-Channel Analysis and Secure Design (COSADE’13), LNCS 7864, Springer-Verlag, pp.137–153 (Mar., 2013).