Yang Li, Daisuke Nakatsu, Qi Li, Kazuo Ohta, and Kazuo Sakiyama, “Clockwise Collision Analysis — Overlooked Side-Channel Leakage Inside Your Measurements,” Cryptology ePrint Archive, Report 2011/579, 2011.
Yuiko Matsubara, Daiki Miyahara, Yohei Watanabe, Mitsugu Iwamoto, and Kazuo Sakiyama, “Abstraction Model of Probing and DFA Attacks on Block Ciphers,” Cryptology ePrint Archive, Report 2023/443, 2023.
Kazuo Sakiyama and Yang Li, “Fault Sensitivity Analysis,” Chapter in Sushil Jajodia, Pierangela Samarati, and Moti Yung editors, Encyclopedia of Cryptography, Security and Privacy, Third Edition, Springer (to appear in 2024).
Saya Inagaki, Mingyu Yang, Yang Li, Kazuo Sakiyama, and Yuko Hara-Azumi, “Power Side-channel Countermeasures for ARX Ciphers using High-level Synthesis,” International Symposium on Field-Programmable Gate Arrays (FPGA’23), ACM, pp.52 (Feb., 2023).
西澤慧悟, 崎山一男, 原祐子, 李陽, “相互補助相関電力解析の正解鍵順位と鍵復元率の調査,” 2023年暗号と情報セキュリティシンポジウム (SCIS’23), 2E2-4, 7 pages (Jan., 2023).
Ryota Hira, Tomoaki Kitahara, Daiki Miyahara, Yuko Hara-Azumi, Yang Li, and Kazuo Sakiyama, “Software Evaluation for Second Round Candidates in NIST Lightweight Cryptography,” Cryptology ePrint Archive, Report 2022/591, 2022.
Kazuo Sakiyama, “Invited Talk: Deep Learning for Security Evaluation of Physically Unclocable Function,” The 1st ECTI UEC Workshop on AI and Application (ECTI-UEC2019), (Sep. 6, 2019).
Ryota Hatano and Kazuo Sakiyama, “An Abstraction Model for Differential Fault Analysis on AES,” The First International Workshop on Hardware Oriented Cybersecurity (HwSec2018) (2018年12月20日).
Ryota Hira, Tomoaki Kitahara, Daiki Miyahara, Yuko Hara-Azumi, Yang Li, and Kazuo Sakiyama, “Software Evaluation for Second Round Candidates in NIST Lightweight Cryptography,” Journal of Information Processing, Vol.31, pp.205–219 (Mar, 2023).