Kazuo Sakiyama, Lejla Batina, Nele Mentens, Bart Preneel, and Ingrid Verbauwhede, “Small Footprint ALU for Public-key Processors for Pervasive Security,” In the Workshop Record of the ECRYPT Workshop on RFID Security 2006, 12 pages (Jul., 2006).
Caroline Vanderheyden, Junfeng Fan, Kazuo Sakiyama, and Ingrid Verbauwhede, “Exploring Trade-offs between Area, Performance and Security in HW/SW Co-design of ECC,” In the Workshop Record of the Western European Workshop on Research in Cryptology (WeWoRC’07), 2 pages (Jul., 2007).
Junfeng Fan, Kazuo Sakiyama, and Ingrid Verbauwhede, “Montgomery Modular Multiplication Algorithm for Multi-core Systems,” In the Workshop Record of the ECRYPT Workshop, Software Performance Enhancement for Encryption and Decryption (SPEED’07), 12 pages (Jun., 2007).
Junfeng Fan, Kazuo Sakiyama, and Ingrid Verbauwhede, “Elliptic Curve Cryptography on Embedded Multicore Systems,” In the Workshop Record of the Workshop on Embedded Systems Security (WESS’07), 6 pages (Oct., 2007).
Yong Ki Lee, Kazuo Sakiyama, Lejla Batina, Ingrid Verbauwhede , “A Compact ECC Processor for Pervasive Computing,” In the Workshop Record of the ECRYPT Workshop, Secure Component and System Identification (SECSI’08), 14 pages (Mar., 2008).
Masami Izumi, Kazuo Sakiyama, Kazuo Ohta, “Does The Montgomery Powering Ladder Method Really Offer SPA Resistance?,” In Proc. Triangle Symposium on Advanced ICT 2008 (TriSAI’08), Daejeon, Korea, 6 pages (Oct., 2008).
Bagus Santoso, Kazuo Ohta, and Kazuo Sakiyama, “Yet Another New “On the Fly” Identification Scheme: Reducing Memory Cost by Improving Zero-Knowledgeness,” 3A2-4, 2009 Symposium on Cryptography and Information Security (SCIS’09) (Jan., 2009).
泉 雅巳, 崎山一男, 太田和夫, “フォールト混入時におけるRSL 技術による暗号回路モデルを用いた安全性解析,” 2009年暗号と情報セキュリティシンポジウム (SCIS’09), 2A3-3 (Jan., 2009).
八木達哉, 崎山一男, 太田和夫, “高周波クロックによるRSL技術を用いたAESへのフォールト攻撃実験,” 2009年暗号と情報セキュリティシンポジウム (SCIS’09), 2A3-2 (Jan., 2009).
Lei Wang, Yu Sasaki, Kazuo Ohta, and Kazuo Sakiyama, “MD5チャレンジ・レスポンスプロトコルへの速い攻撃,” 2009 Symposium on Cryptography and Information Security (SCIS’09), 2A2-1 (Jan., 2009).