Kazuo Sakiyama and Yang Li, “Fault Sensitivity Analysis,” Chapter in Sushil Jajodia, Pierangela Samarati, and Moti Yung editors, Encyclopedia of Cryptography, Security and Privacy, Third Edition, Springer (to appear in 2024).
一般社団法人 電気学会・電気システムセキュリティ特別技術委員会スマートグリッドにおける電磁的セキュリティ特別調査専門委員会 編, “IoT時代の電磁波セキュリティ~21世紀の社会インフラを電磁波攻撃から守るには~,” ISBN 978-4-904774-66-3, 科学情報出版株式会社, 分担執筆, 崎山一男, 林優一, “付録 電磁的情報漏えい: B 暗号モジュールを搭載したハードウェアからの情報漏えいの可能性の検討,” (Apr., 2018).
Kazuo Sakiyama, Yu Sasaki, and Yang Li, “Security of Block Ciphers: From Algorithm Design to Hardware Implementation,” ISBN 978-1-118-66001-0, Wiley (Jul., 2015).
Kazuo Sakiyama and Masayuki Terada (Eds.), “Advances in Information and Computer Security – 8th International Workshop on Security,” IWSEC 2013, Okinawa, Japan, November 18-20, 2013. Proceedings. Lecture Notes in Computer Science 8231,” ISBN 978-3642413834, Springer (Nov., 2013).
Junko Takahashi, Toshinori Fukunaga, Shigeto Gomisawa, Yang Li, Kazuo Sakiyama, and Kazuo Ohta, “Fault Injection and Key Retrieval Experiments on Evaluation Board,” Chapter in Marc Joye and Michael Tunstall editors, Fault Analysis in Cryptography, ISBN 978-3-642-29656-7, Springer, pp.313–331 (Jul., 2012).
Kazuo Sakiyama and Lejla Batina, “Arithmetic for Public-key Cryptography,” Chapter in Ingrid Verbauwhede editor, Secure Integrated Circuits and Systems, ISBN 978-0-387-71827-9, Springer, pp.63–78 (Feb., 2010).
Lejla Batina and Kazuo Sakiyama, “Compact Public-key Implementations for RFID and Sensor Nodes,” Chapter in Ingrid Verbauwhede editor, Secure Integrated Circuits and Systems, ISBN 978-0-387-71829-3, Springer, pp.179–196 (Feb., 2010).
Lejla Batina, Kazuo Sakiyama, and Ingrid Verbauwhede, “Architectures for Public-key Cryptography,” Chapter in Vojin G. Oklobdzija editor, Digital Systems and Applications, ISBN 978-0-8493-8619-0, CRC press (Nov., 2007).
学術論文(査読あり)
Daisuke Fujimoto, Takumi Okamoto, Yang Li, Youngwoo Kim, and Yuichi Hayashi, ”Evaluation of Statistical Fault Analysis using Input Timing Violation of Sequential Circuit on Cryptographic Module under IEM” Transactions on Electromagnetic Compatibility, 7 pages, accepted.
Ryota Hira, Tomoaki Kitahara, Daiki Miyahara, Yuko Hara-Azumi, Yang Li, and Kazuo Sakiyama, “Software Evaluation for Second Round Candidates in NIST Lightweight Cryptography,” Journal of Information Processing, Vol.31, pp.205–219 (Mar, 2023).
Léo Robert, Daiki Miyahara, Pascal Lafourcade, Luc Libralesso, and Takaaki Mizuki, “Physical Zero-Knowledge Proof and NP-completeness Proof of Suguru Puzzle,” Information and Computation, Vol.285(B), 14pages (May., 2022).
Go Takatoi, Takeshi Sugawara, Kazuo Sakiyama, Yuko Hara-Azumi, and Yang Li, “The Limits of Timing Analysis and SEMA on Distinguishing Similar Activation Functions of Embedded Deep Neural Networks,” Appl. Sci. 2022, Vol.12(9), 4135 (Apr., 2022).
Léo Robert, Daiki Miyahara, Pascal Lafourcade, and Takaaki Mizuki, “Card-Based ZKP for Connectivity: Applications to Nurikabe, Hitori, and Heyawake,” New Generation Computing, Vol.40, pp.149–171 (Mar., 2022).
Go Takami, Takeshi Sugawara, Kazuo Sakiyama, and Yang Li, “Mixture-Based 5-Round Physical Attack against AES: Attack Proposal and Noise Evaluation,” IEICE Trans. Fundam. Electron. Commun. Comput. Sci., Vol.E105-A, No.3,, pp.289–299 (Mar., 2021).
Sho Tada, Yuki Yamashita, Kohei Matsuda, Makoto Nagata, Kazuo Sakiyama, and Noriyuki Miura, “Design and concept proof of an inductive impulse self-destructor in sense-and-react countermeasure against physical attacks,” J. Appl. Phys. 60, SGGL01, 7pages, (Feb., 2021).
Kazuo Sakiyama, Tatsuya Fujii, Kohei Matsuda, and Noriyuki Miura, “Flush Code Eraser: Fast Attack Response Invalidating Cryptographic Sensitive Data,” IEEE Embedded Systems Letters, Vol.12, Issue 2, pp.37–40 (Jun., 2020).
Kohei Matsuda, Sho Tada, Makoto Nagata, Yuichi Komano, Yang Li, Takeshi Sugawara, Mitsugu Iwamoto, Kazuo Ohta, Kazuo Sakiyama, and Noriyuki Miura, “An IC-level countermeasure against laser fault injection attack by information leakage sensing based on laser-induced opto-electric bulk current density,” J. Appl. Phys. 59, SGGL02, 12pages (Feb., 2020).
Akiko Toh, Yang Li, Kazuo Sakiyama, and Takeshi Sugawara, “Fingerprinting Light Emitting Diodes Using Spectrometer,” IET Electronics Letters, Vol.55, Issue 24, pp.1295–1297 (Nov., 2019).
Takeshi Sugawara, Natsu Shoji, Kazuo Sakiyama, Kohei Matsuda, Noriyuki Miura, and Makoto Nagata, “Side-Channel Leakage from Sensor-Based Countermeasures against Fault Injection Attack,” Microelectronics Journal, Vol.90, pp.63–71 (Aug., 2019).
Takeshi Sugawara, Kazuo Sakiyama, Shoei Nashimoto, Daisuke Suzuki, and Tomoyuki Nagatsuka, “Oscillator without a Combinatorial Loop and its Threat to FPGA in Data Center,” IET Electronics Letters, Vol.55, Issue 11, pp.640–642 (May, 2019).
Takeshi Sugawara, Yang Li, and Kazuo Sakiyama, “Probing Attack of Share-Serial Threshold Implementation of AES,” IET Electronics Letters, Vol.55, Issue 9, pp.517–519 (May, 2019).
Jingyi Feng, Hua Chen, Yang Li, Zhipeng Jiao, and Wei Xi, “A Framework for Evaluation and Analysis on Infection Countermeasures Against Fault Attacks,” IEEE Transactions on Information Forensics and Security, Vol.15, pp.391–406 (Mar., 2019).
Yuichi Komano, Kazuo Ohta, Kazuo Sakiyama, Mitsugu Iwamoto, and Ingrid Verbauwhede, “Single-Round Pattern Matching Key Generation Using Physically Unclonable Function,” Security and Communication Networks, vol.2019, Article ID 1719585, 13 pages (Jan., 2019).
Kohei Matsuda, Tatsuya Fujii, Natsu Shoji, Takeshi Sugawara, Kazuo Sakiyama, Yu-ichi Hayashi, Makoto Nagata, and Noriyuki Miura, “A 286 F2/Cell Distributed Bulk-Current Sensor and Secure Flush Code Eraser against Laser Fault Injection Attack on Cryptographic Processor,” IEEE Journal of Solid-State Circuits, Vol.53, No.11, pp. 3174–3182 (Nov., 2018).
Yang Li, Momoka Kasuya, and Kazuo Sakiyama, “Comprehensive Evaluation on an ID-Based Side-Channel Authentication with FPGA-Based AES,” Appl. Sci., Vol.8(10), No.1898 (Oct., 2018).
Ruyan Wang, Xiaohan Meng, Yang Li, Jian Wang, “Towards Optimized DFA Attacks on AES under Multibyte Random Fault Model,” Security and Communication Networks, Vol.2018, 9 pages (Aug. 2018).
Sen Xu, Xiangjun Lu, Kaiyu Zhang, Yang Li, Lei Wang, Weijia Wang, Haihua Gu, Zheng Guo, Junrong Liu, and Dawu Gu, “Similar Operation Template Attack on RSA-CRT as a Case Study” Science China Information Sciences, Vol.61/ 32111, 17 pages (Mar., 2018).
Risa Yashiro, Takeshi Sugawara, Mitsugu Iwamoto, and Kazuo Sakiyama, “Q-class Authentication System for Double Arbiter PUF,” IEICE Trans. Fundam. Electron. Commun. Comput. Sci., Vol.E101-A, No.1, pp.129–137 (Jan., 2018).
Yang Li, Mengting Chen, and Jian Wang, “Another Security Evaluation of SPA Countermeasures for AES Key Expansion in IoT devices” Journal of Information Science & Engineering, Vol.33/ 4, pp.1085–1100 (Jul., 2017).
Yang Li, Mengting Chen, Zhe Liu, and Jian Wang, “Reduction in the Number of Fault Injections for Blind Fault Attack on SPN Block Ciphers” ACM Transactions on Embedded Computing Systems (TECS), Vol.16(2), pp.1–20 (May., 2017).
Dai Yamamoto, Kazuo Sakiyama, Mitsugu Iwamoto, Kazuo Ohta, Masahiko Takenaka, Kouichi Itoh, and Naoya Torii, “A new method for enhancing variety and maintaining reliability of PUF responses and its evaluation on ASICs Journal of Cryptographic Engineering,” J. Cryptographic Engineering, Vol.5(3), pp.187–199 (Sep., 2015).
Shugo Mikami, Dai Watanabe, Yang Li, and Kazuo Sakiyama, “Fully Integrated Passive UHF RFID Tag for Hash-Based Mutual Authentication Protocol,” The Scientific World Journal, Hindawi, Vol.2015, Article ID 498610, 11 pages (Aug., 2015).
Takanori Machida, Dai Yamamoto, Mitsugu Iwamoto, and Kazuo Sakiyama, “A New Arbiter PUF for Enhancing Unpredictability on FPGA,” The Scientific World Journal, Hindawi, Vol.2015, Article ID 864812, 13 pages (Aug., 2015).
Sho Endo, Yang Li, Naofumi Homma, Kazuo Sakiyama, Kazuo Ohta, Daisuke Fujimoto, Makoto Nagata, Toshihiro Katashita, Jean-Luc Danger, and Takafumi Aoki, “A Silicon-level Countermeasure against Fault Sensitivity Analysis and Its Evaluation,” IEEE Trans. Very Large Scale Integr. (VLSI) Syst., Vol.23, No.8, pp.1429–1438 (Aug., 2015).
Daisuke Fujimoto, Noriyuki Miura, Makoto Nagata, Yuichi Hayashi, Naofumi Homma, Takafumi Aoki, Yohei Hori, Toshihiro Katashita, Kazuo Sakiyama, Thanh-Ha Le, Julien Bringer, Pirouz Bazargan-Sabet, Shivam Bhasin, and Jean-Luc Danger, “Power Noise Measurements of Cryptographic VLSI Circuits Regarding Side-Channel Information Leakage,” IEICE Trans. Electronics, Vol.E97-C, No.4, pp.272–279, (Apr., 2014).
Christophe Clavier, Jean-Luc Danger, Guillaume Duc, M. Abdelaziz Elaabid, Benoît Gérard, Sylvain Guilley, Annelie Heuser, Michael Kasper, Yang Li, Victor Lomné, Daisuke Nakatsu, Kazuo Ohta, Kazuo Sakiyama, Laurent Sauvage, Werner Schindler, Marc Stöttinger, Nicolas Veyrat-Charvillon, Matthieu Walle, Antoine Wurcker, “Practical improvements of side-channel attacks on AES: feedback from the 2nd DPA contest,” J. Cryptographic Engineering, Vol.4(1), pp.259–274 (Apr., 2014).
Kazuo Sakiyama, Yang Li, Shigeto Gomisawa, Yu-ichi Hayashi, Mitsugu Iwamoto, Naofumi Homma, Takafumi Aoki, and Kazuo Ohta, “Practical DFA Strategy for AES Under Limited-Access Conditions,” Journal of Information Processing, Vol.22, No.2, 142–151 (Feb., 2014).
Dai Yamamoto, Kazuo Sakiyama, Mitsugu Iwamoto, Kazuo Ohta, Masahiko Takenaka, and Kouichi Itoh, “Variety Enhancement of PUF Responses Using the Locations of Random Outputting RS Latches,” J. Cryptographic Engineering, Vol.3(4), pp.197–211 (Nov., 2013).
Shugo Mikami, Hirotaka Yoshida, Dai Watanabe, Kazuo Sakiyama, “Correlation Power Analysis and Countermeasure on the Stream Cipher Enocoro-128v2,” IEICE Trans. Fundam. Electron. Commun. Comput. Sci., Vol.96-A, No.3, pp.697–704 (Mar., 2013).
Yang Li, Kazuo Ohta, and Kazuo Sakiyama, “A New Type of Fault-Based Attack: Fault Behavior Analysis,” IEICE Trans. Fundam. Electron. Commun. Comput. Sci., Vol.E96-A, No.1, pp.177–184 (Jan., 2013).
Yang Li, Kazuo Ohta, and Kazuo Sakiyama, “Toward Effective Countermeasures Against an Improved Fault Sensitivity Analysis,” IEICE Trans. Fundam. Electron. Commun. Comput. Sci., Vol.A95-A, No.1, pp.234–241 (Jan., 2012).
Lei Wang, Yu Sasaki, Wataru Komatsubara, Kazuo Sakiyama, Kazuo Ohta, “Meet-in-the-Middle (Second) Preimage Attacks on Two Double-Branch Hash Functions RIPEMD and RIPEMD-128,” IEICE Trans. Fundam. Electron. Commun. Comput. Sci., Vol.E95-A, No.1, pp.100–110 (Jan., 2012).
Kazuo Sakiyama, Miroslav Knežević, Junfeng Fan, Bart Preneel, and Ingrid Verbauwhede, “Tripartite Modular Multiplication,” Integration-VLSI J., Vol.44, Issue 4, pp.259–269 (Apr., 2011).
Yang Li, Kazuo Sakiyama, Shinichi Kawamura, and Kazuo Ohta, “Power Analysis against a DPA-resistant S-box Implementation Based on the Fourier Transform,” IEICE Trans. Fundam. Electron. Commun. Comput. Sci., Vol.A94-A, No.1, pp.191–199 (Jan., 2011).
Lei Wang, Kazuo Ohta, Yu Sasaki, Kazuo Sakiyama, and Noboru Kunihiro, “Cryptanalysis of Two MD5-Based Authentication Protocols: APOP and NMAC,” IEICE Trans. Inf. Syst., Vol.E93-D, No.5, pp.1087–1095 (May, 2010).
Kazuo Sakiyama and Kazuo Ohta, “On Clock-Based Fault Analysis Attack for an AES Hardware Using RSL,” IEICE Trans. Fundam. Electron. Commun. Comput. Sci., Vol.E93-A, No.1, pp.172–179 (Jan., 2010).
Yong Ki Lee, Kazuo Sakiyama, Lejla Batina, and Ingrid Verbauwhede, “Elliptic Curve Based Security Processor for RFID,” IEEE Trans. Comput., Vol.57, No.11, pp.1514–1527 (Nov., 2008).
Junfeng Fan, Kazuo Sakiyama, and Ingrid Verbauwhede, “Elliptic Curve Cryptography on Embedded Multicore Systems,” Des. Autom. Embed. Syst., Vol.12, No.3, pp.231–242 (Sep., 2008).
Kazuo Sakiyama, Lejla Batina, Bart Preneel, and Ingrid Verbauwhede, ”HW/SW Co-design for Public-Key Cryptosystems on the 8051 Micro-controller, Comput. Electr. Eng., Vol.33, No.5–6, pp.324–332 (Sep., 2007).
Kazuo Sakiyama, Lejla Batina, Bart Preneel, and Ingrid Verbauwhede, ” Multicore Curve-Based Cryptoprocessor with Reconfigurable Modular Arithmetic Logic Units over GF(2n),” IEEE Trans. Comput., Vol.56, No.9, pp.1269–1282 (Sep., 2007).
Kazuo Sakiyama, Lejla Batina, Bart Preneel, and Ingrid Verbauwhede, “High-performance Public-key Cryptoprocessor for Wireless Mobile Applications,” Mob. Netw. Appl., Vol.12, No.4, pp.245–258 (Aug., 2007).
Kazuo Sakiyama, Nele Mentens, Lejla Batina, Bart Preneel, and Ingrid Verbauwhede, “Reconfigurable Modular Arithmetic Logic Unit Supporting High-performance RSA and ECC over GF(p),” Int. J. Electron., Vol.94, No.5, pp.501–514 (May, 2007).
Shenglin Yang, Kazuo Sakiyama, and Ingrid Verbauwhede, ”Efficient and Secure Fingerprint Verification for Embedded Devices, EURASIP J. Appl. Signal Process., Vol.2006, No.1–11 (May, 2006).
Young-Jae Cho, Takashi Hirakawa, Kazuo Sakiyama, Hiroaki Okamoto, and Yoshihiro Hamakawa, “EL/PL hybrid device enhanced by UV emission from ZnF2:Gd thin film electroluminescence,” J. Korean. Phys. Soc., Vol.30(1997), pp.S65–S68 (Jun., 1997).
Samuel Hand, Alexander Koch, Pascal Lafourcade Daiki Miyahara, and Léo Robert, “Check Alternating Patterns: A Physical Zero-Knowledge Proof for Moon-or-Sun,” In Proc. International Workshop on Security (IWSEC’23), LNCS ?, Springer-Verlag, pp.?–? (2023, to appear).
Yuichi Komano, Mitsugu Iwamoto, Kazuo Ohta, and Kazuo Sakiyama, “Lightweight Authentication Using Noisy Key Derivedfrom Physically Unclonable Function,” In Proc. International Conference on Security for Information Technology and Communications (SecITC’22), LNCS 13809, Springer-Verlag, pp.203–221 (May, 2023).
Masahisa Shimano, Kazuo Sakiyama, and Daiki Miyaha, “Towards Verifying Physical Assumption in Card-Based Cryptography,” In Proc. International Conference on Security for Information Technology and Communications (SecITC’22), LNCS 13809, Springer-Verlag, pp.289–305 (May, 2023).
Saya Inagaki, Mingyu Yang, Yang Li, Kazuo Sakiyama, and Yuko Hara-Azumi, “Power Side-channel Countermeasures for ARX Ciphers using High-level Synthesis,” International Symposium on Field-Programmable Gate Arrays (FPGA’23), ACM, pp.52 (Feb., 2023).
Tomoaki Kitahara, Ryota Hira, Yuko Hara-Azumi, Daiki Miyahara, Yang Li, and Kazuo Sakiyama, “Optimized Software Implementations of Ascon, Grain-128AEAD, and TinyJambu on ARM Cortex-M,” In Proc. International Symposium on Computing and Networking, CANDAR Workshops (CANDARW’22), IEEE, pp.316–322 (Nov., 2022).
Saya Inagaki, Mingyu Yang1, Yang Li, Kazuo Sakiyama, and Yuko Hara-Azumi, “Examining Vulnerability of HLS-designed Chaskey-12 Circuits to Power Side-Channel Attacks,” International Symposium on Quality Electronic Design (ISQED’22), IEEE, 1page (Apr., 2022).
Rei Kudo, Takeshi Sugawara, Kazuo Sakiyama, Yuko Hara-Azumi, and Yang Li, “Revisiting System Noise in Side-Channel Attacks: Mutual Assistant SCA vs. Genetic Algorithm,” Asian Hardware Oriented Security and Trust Symposium (AsianHOST’21), IEEE, pp.1–6 (Dec., 2021).
Annjhih Hsiao, Takao Takenouchi, Hiroaki Kikuchi, Kazuo Sakiyama, and Noriyuki Miura, “More Accurate and Robust PRNU-based Source Camera Identification with 3-Step 3-Class Approach,” In Proc. International Workshop on Digital-forensics and Watermarking (IWDW’21), LNCS 13180,Springer-Verlag, pp.87–101 (Nov., 2021).
Tomoki Uemura, Yohei Watanabe, Yang Li, Noriyuki Miura, Iwamoto Mitsugu, Kazuo Sakiyama, and Kazuo Ohta, “A Key Recovery Algorithm Using Random Key Leakage from AES Key Schedule,” In Proc. The International Symposium on Information Theory and Its Applications, (ISITA’20), IEEE, pp.382–386 (Oct., 2020).
Go Takatoi, Takeshi Sugawara, Kazuo Sakiyama, and Yang Li, “Simple Electromagnetic Analysis Against Activation Functions of Deep Neural Networks,” In Proc. Artificial Intelligence in Hardware Security (AIHWS’20), LNCS 12418, Springer-Verlag, pp.181-197, (Oct., 2020).
Marika Yabu, Kazuo Sakiyama, and Takeshi Sugawara, “Low-Memory Implementation of Authenticated Encryption Algorithm SAEAES on ARM Cortex-M0 Microcontroller,” In Proc. Global Conference on Consumer Electronics (GCCE’20), IEEE, pp.181-185, (Oct., 2020).
Tsubasa Takaki, Yang Li, Kazuo Sakiyama, Shoei Nashimoto, Daisuke Suzuki, and Takeshi Sugawara, “An Optimized Implementation of AES-GCM for FPGA Acceleration Using High-Level Synthesis,” In Proc. Global Conference on Consumer Electronics (GCCE’20), IEEE, pp.176–180 (Oct., 2020).
Takeshi Sugawara, Tatsuya Onuma, and Yang Li, “Signal Injection Attack on Time-to-Digital Converter and Its Application to Physically Unclonable Function,” In Proc. International Workshop on Security (IWSEC 2020), LNCS 12231, Springer-Verlag, pp.117–127 (Sep., 2020).
Sho Tada, Kohei Matsuda, Makoto Nagata, Kazuo Sakiyama, and Noriyuki Miura, “An Inductive Impulse Self-Destructor in Sense-and-React Countermeasure Against Physical Attacks,” In Extended Abstracts of International Conference on Solid State Devices and Materials (SSDM’20), L-9-05, pp.791–792 (Sep., 2020).
Risa Yashiro, Yohei Hori, Toshihiro Katashita, and Kazuo Sakiyama, “Deep Learning Attack against Large n-XOR PUFs on 180nm Silicon Chips,” In Proc. RISP International Workshop on Nonlinear Circuits, Communications and Signal Processing (NCSP’20), pp.598–601 (Mar., 2020).
Yang Li, Ryota Hatano, Sho Tada, Kohei Matsuda, Noriyuki Miura, Takeshi Sugawara, and Kazuo Sakiyama, “Side-Channel Leakage of Alarm Signal for a Bulk-Current-Based Laser Sensor,” In Proc. International Conference on Information Security and Cryptology (Inscrypt’19), LNCS 12020, Springer-Verlag, pp.346–361 (Dec., 2019).
Hakuei Sugimoto, Ryota Hatano, Natsu Shoji, and Kazuo Sakiyama, “Validating the DFA Attack Resistance of AES (Short Paper),” In Proc. International Symposium on Foundations & Practice of Security (FPS’19), LNCS 12056, Springer-Verlag, pp.371–378 (Nov., 2019).
Risa Yashiro, Yohei Hori, Toshihiro Katashita, and Kazuo Sakiyama, “A Deep Learning Attack Countermeasure with Intentional Noise for a PUF-based Authentication Scheme,” In Proc. International Conference on Security for Information Technology and Communications (SecITC’19) , LNCS 12001, Springer-Verlag, pp.78–94 (Nov., 2019).
Kohei Matsuda, Sho Tada, Makoto Nagata, Yang Li, Takeshi Sugawara, Mitsugu Iwamoto, Kazuo Ohta, Kazuo Sakiyama, and Noriyuki Miura, “An Information Leakage Sensor Based on Measurement of Laser-Induced Opto-Electric Bulk Current Density,” In Extended Abstracts of International Conference on Solid State Devices and Materials (SSDM’19), M-1-03, pp.501–502 (Sep., 2019).
Muhammad Salman, Yang Li, Jian Wang, “A Graphical PIN Entry System with Shoulder Surfing Resistance”, 2019 IEEE 4th International Conference on Signal and Image Processing, IEEE, pp. 203–207 (Jul., 2019).
Natsu Shoji, Takeshi Sugawara, Mitsugu Iwamoto and Kazuo Sakiyama, “An Abstraction Model for 1-bit Probing Attack on Block Ciphers,” In Proc. International Conference on Computer and Communication Systems (ICCCS’19), IEEE, pp.502–506 (Feb., 2019).
Ruyan Wang, Xiaohan Meng, Yang Li, Jian Wang, “Improved Differential Fault Analysis on Authenticated Encryption of PAEQ-128”, In Proc. International Conferences on Information Security and Cryptology 2018 (Inscript’18), LNCS 11449, Springer-Verlag, pp.183–199 (Dec., 2018).
Zhiwei Yuan, Yang Li, Kazuo Sakiyama, Takeshi Sugawara, and Jian Wang, “Recovering Memory Access Sequence with Differential Flush+Reload Attack,” In Proc. International Conference on Information Security Practice and Experience (ISPEC’18), LNCS 11125, Springer-Verlag, pp.424–439 (Sep., 2018).
Ryuga Matsumura, Takeshi Sugawara, and Kazuo Sakiyama, “A Secure LiDAR with Side-channel Fingerprinting,” In Proc. International Symposium on Computing and Networking, CANDAR Workshops (CANDARW’18), IEEE, pp.479–482 (Aug., 2018).
Jean-Luc Danger, Risa Yashiro, Tarik Graba, Sylvain Guilley, Yves Mathieu, Noriyuki Miura, Abdelmalek Si-Merabet, Kazuo Sakiyama, and Makoto Nagata, “Analysis of Mixed PUF-TRNG Circuit Based on SR-Latches in FD-SOI Technology,” In Proc. Euromicro Conference on Digital System Design (DSD’18), IEEE, pp.508–515 (Aug., 2018).
Shoei Nashimoto, Daisuke Suzuki, Takeshi Sugawara, and Kazuo Sakiyama,”Sensor CON-Fusion: Defeating Kalman Filter in Signal Injection Attack,” In Proc. Asia Conference on Computer and Communications Security (AsiaCCS’18), ACM, pp.511–524 (Jun., 2018).
Yang Li, Shuang Wang, Zhibin Wang, and Jian Wang, “A Strict Key Enumeration Algorithm for Dependent Score Lists of Side-Channel Attacks” In Proc. 16th Smart Card Research and Advanced Application Conference (Cardis’17), LNCS 10728, Springer-Verlag, pp.51–69 (Jan., 2018).
Shuang Wang, Yang Li, and Jian Wang, “A New Key Rank Estimation Method to Investigate Dependent Key Lists of Side Channel Attacks” In Proc. Asian Hardware Oriented Security and Trust Symposium (AsianHOST’17), IEEE, pp.1–6 (Oct., 2017).
Takeshi Sugawara, Natsu Shoji, Kazuo Sakiyama, Kohei Matsuda, Noriyuki Miura, and Makoto Nagata, “Exploiting Bitflip Detector for Non-Invasive Probing and its Application to Ineffective Fault Analysis,” In Proc. Workshop on Fault Diagnosis and Tolerance in Cryptography (FDTC’17), IEEE, pp.49–56 (Sep., 2017).
Eito Miyamoto, Takeshi Sugawara, and Kazuo Sakiyama, “Efficient Software Implementation of Modular Multiplication in Prime Fields on TI’s DSP TMS320C6678,” In Proc. International Workshop on Information Security Applications (WISA’17), LNCS 10763, Springer-Verlag, pp.261–273 (Aug., 2017).
Momoka Kasuya and Kazuo Sakiyama, “Improved EM Side-Channel Authentication Using Profile-Based XOR Model,” In Proc. International Workshop on Information Security Applications (WISA’17), LNCS 10763, Springer-Verlag, pp.173–183 (Aug., 2017).
Kohei Matsuda, Noriyuki Miura, Makoto Nagata, Yu-ichi Hayashi, Tatsuya Fujii, and Kazuo Sakiyama, “On-Chip Substrate-Bounce Monitoring for Laser-Fault Countermeasure,” In Proc. 2016 IEEE Asian Hardware-Oriented Security and Trust (AsianHOST’16), IEEE, pp.1–6 (Dec. 2016).
Yang Li, Mengting Chen, and Jian Wang, “Introduction to side-channel attacks and fault attacks,” In Proc. Electromagnetic Compatibility 2016 Asia-Pacific International Symposium (APEMC’16), IEEE, pp.573–575 (Sep. 2016).
Risa Yashiro, Takanori Machida, Mitsugu Iwamoto, and Kazuo Sakiyama, “Deep-Learning-Based Security Evaluation on Authentication Systems Using Arbiter PUF and Its Variants,” In Proc. International Workshop on Security 2016 (IWSEC’16), LNCS 9836, Springer-Verlag, pp.267–285 (Sep., 2016).
Momoka Kasuya, Takanori Machida, and Kazuo Sakiyama, “New Metric for Side-Channel Information Leakage: Case Study on EM Radiation from AES Hardware,” In Proc. URSI Asia-Pacific Radio Science Conference (URSI AP-RASC’16), IEEE, pp.1288–1291 (Aug., 2016).
Kazuo Sakiyama, Reina Yagasaki, Takanori Machida, Tatsuya Fujii, Noriyuki Miura, and Yu-ichi Hayashi, “Circuit-Level Information Leakage Prevention for Fault Detection,” In Proc. URSI Asia-Pacific Radio Science Conference (URSI AP-RASC’16), IEEE, pp.1271–1274 (Aug., 2016).
Mengting Chen, Yang Li, and Jian Wang, “Another SPA Key Recovery Against Random Order Countermeasures for AES Key Expansion”, In Proc. International Conference on Cloud Computing and Security (ICCCS’16), LNCS 10039, Springer-Verlag, pp.322–334 (Jun., 2016).
Kazuo Sakiyama, Momoka Kasuya, Takanori Machida, Arisa Matsubara, Yunfeng Kuai, Yu-Ichi Hayashi, Takaaki Mizuki, Noriyuki Miura, and Makoto Nagata, “Physical Authentication Using Side-Channel Information,” In Proc. International Conference on Information and Communication Technology (ICoICT’16), IEEE (May, 2016).
Shugo Mikami, Dai Watanabe, Kazuo Sakiyama, “A Performance Evaluation of Cryptographic Algorithms on FPGA and ASIC on RFID Design Flow,” In Proc. International Conference on Information and Communication Technology (ICoICT’16), IEEE (May, 2016).
Reina Yagasaki and Kazuo Sakiyama, “Artifact-Metric-Based Authentication for Bottles of Wine (Short Paper),” In Proc. International Workshop on Security 2015 (IWSEC’15), LNCS 9241, Springer-Verlag, pp.335–344 (Aug., 2015).
Kazuo Sakiyama, Takanori Machida, and Arisa Matsubara, “Advanced Fault Analysis Techniques on AES,” In Proc. Joint IEEE International Symposium on Electromagnetic Compatibility and EMC Europe (EMC’15), pp.230–234, IEEE (Aug., 2015).
Takanori Machida, Dai Yamamoto, Mitsugu Iwamoto, and Kazuo Sakiyama, “Implementation of Double Arbiter PUF and Its Performance Evaluation on FPGA,” 20th Asia and South Pacific Design Automation Conference (ASP-DAC’15), pp.6–7, IEEE (Jan., 2015).
Yang Li, Shugo Mikami, Dai Watanabe, Kazuo Ohta, and Kazuo Sakiyama, “Single-Chip Implementation and Evaluation of Passive UHF RFID Tag with Hash-Based Mutual Authentication,” In Proc. Workshop on RFID Security (RFIDsec’14 Asia), IOS Press, pp.3–15 (Nov., 2014).
Takanori Machida, Dai Yamamoto, Mitsugu Iwamoto, and Kazuo Sakiyama, “A New Mode of Operation for Arbiter PUF to Improve Uniqueness on FPGA,” In Proc. The Federated Conference on Computer Science and Information Systems (FedCSIS), 1st Workshop on Emerging Aspects in Information Security (EAIS’14), IEEE, pp.871–878 (Sep., 2014).
Dai Yamamoto, Masahiko Takenaka, Kazuo Sakiyama, and Naoya Torii, “Security Evaluation of Bistable Ring PUFs on FPGAs using Differential and Linear Analysis,” In Proc. The Federated Conference on Computer Science and Information Systems (FedCSIS), 1st Workshop on Emerging Aspects in Information Security (EAIS’14), IEEE, pp.911–918 (Sep., 2014).
Dai Yamamoto, Masahiko Takenaka, Kazuo Sakiyama, and Naoya Torii, “A Technique using PUFs for Protecting Circuit Layout Designs against Reverse Engineering,” In Proc. International Workshop on Security 2014 (IWSEC’14), LNCS 8639, Springer-Verlag, pp.158–253 (Sep., 2014).
Yang Li, Toshiki Nakasone, and Kazuo Sakiyama, “Software and Hardware Co-Verification for Privacy-Enhanced Passive UHF RFID Tags,” In Proc. 2014 IEEE International Symposium on Electromagnetic Compatibility (EMC’14), IEEE, pp.752–757 (Aug., 2014).
Daisuke Fujimoto, Noriyuki Miura, Makoto Nagata, Yuichi Hayashi, Naofumi Homma, Takafumi Aoki, Yohei Hori, Toshihiro Katashita, Kazuo Sakiyama, Thanh-Ha Le, Julien Bringer, Pirouz Bazargan-Sabet, Shivam Bhasin, and Jean-Luc Danger, “Correlation Power Analysis using Bit-Level Biased Activity Plaintexts against AES Core with Countermeasures,” in Proc. 2014 International Symposium on Electromagnetic Compatibility, Tokyo (EMC’14/Tokyo), IEEE, pp 306–309, 14P2-A3 (May, 2014).
Yang Li, Toshiki Nakasone, Kazuo Ohta, Kazuo Sakiyama, “Privacy-Mode Switching: Toward Flexible Privacy Protection for RFID Tags in Internet of Things,” In Proc. The 11th Annual IEEE Consumer Communications & Networking Conference (CCNC’14), IEEE, pp.519-520 (Jan., 2014).
Shugo Mikami, Dai Watanabe, and Kazuo Sakiyama, “A Comparative Study of Stream Ciphers and Hash Functions for RFID Authentications,” In Proc. The 2013 Workshop on RFID and IoT Security (RFIDsec’13 Asia), IOS Press, pp.83–94 (Nov., 2013).
Yang Li, Yu-ichi Hayashi, Arisa Matsubara, Naofumi Homma, Takafumi Aoki, Kazuo Ohta and Kazuo Sakiyama, “Yet Another Fault-Based Leakage in Non-Uniform Faulty Ciphertexts,” In Proc. The Sixth International Symposium on Foundations & Practice of Security (FPS’13), LNCS 8352, pp.272–287, Springer-Verlag (Oct., 2013).
Daisuke Fujimoto, Noriyuki Miura, Makoto Nagata, Yuichi Hayashi, Naofumi Homma, Yohei Hori, Toshihiro Katashita, Kazuo Sakiyama, Thanh-Ha Le, Julien Bringer, Pirouz Bazargan-Sabet, Jean-Luc Danger, “On-chip power noise measurements of cryptographic VLSI circuits and interpretation for side-channel analysis,” In Proc. International Symposium on Electromagnetic Compatibility (EMC EUROPE) 2013, IEEE, pp.405–410 (Sep., 2013).
Toshiki Nakasone, Kazuo Sakiyama, Yang Li, and Kazuo Ohta, “Exploration of the CC-EMA Attack Towards Efficient Evaluation of EM Information Leakage,” In Proc. International Symposium on Electromagnetic Compatibility (EMC EUROPE) 2013, IEEE, pp.411–414 (Sep., 2013).
Yu Sasaki, Wataru Komatsubara, Lei Wang, Mitsugu Iwamoto, Kazuo Ohta, and Kazuo Sakiyama, “Meet-in-the-Middle Preimage Attacks Revisited: New Results on MD5 and HAVAL,” In Proc. International Conference on Security and Cryptography (SECRYPT’13), SciTePress, pp.111–122 (Jul., 2013).
Yu Sasaki, Yang Li, Hikaru Sakamoto and Kazuo Sakiyama, “Coupon Collector’s Problem for Fault Analysis — High Tolerance for Noisy Fault Injections,” In Proc. Financial Cryptography and Data Security 2013 (FC’13), LNCS 7859, Springer-Verlag, pp.213–220 (Apr., 2013).
Yang Li, Sho Endo, Nicolas Debande, Naofumi Homma, Takafumi Aoki, Thanh-Ha Le, Jean-Luc Danger, Kazuo Ohta, Kazuo Sakiyama, “Exploring the Relations Between Fault Sensitivity and Power Consumption,” In Proc. Constructive Side-Channel Analysis and Secure Design (COSADE’13), LNCS 7864, Springer-Verlag, pp.137–153 (Mar., 2013).
Yang Li, Kazuo Ohta, and Kazuo Sakiyama, “An Extension of Fault Sensitivity Analysis Based on Clockwise Collision,” In Proc. International Conferences on Information Security and Cryptology 2012 (Inscript’12), LNCS 7763, Springer-Verlag, pp.46–59 (Nov., 2012).
Toshiki Nakasone, Yang Li, Yu Sasaki, Mitsugu Iwamoto, Kazuo Ohta, and Kazuo Sakiyama, “Key-Dependent Weakness of AES-Based Ciphers Under Clockwise Collision Distinguisher,” In Proc. International Conference on Information Security and Cryptology 2012 (ICISC’12), LNCS 7839, Springer-Verlag, pp.395–409 (Nov., 2012).
Yu Sasaki, Lei Wang, Yasuhiro Takasaki, Kazuo Sakiyama, and Kazuo Ohta, “Boomerang Distinguishers for Full HAS-160 Compression Function,” In Proc. International Workshop on Security 2012 (IWSEC’12), LNCS 7631, Springer-Verlag, pp.156–169 (Nov., 2012).
Lei Wang, Yu Sasaki, Kazuo Sakiyama and Kazuo Ohta, “Cryptanalysis of 3D Cipher and 3D-based Hash Function,” In Proc. International Workshop on Security 2012 (IWSEC’12), LNCS 7631, Springer-Verlag, pp.170–181 (Nov., 2012).
Sho Endo, Yang Li, Naofumi Homma, Kazuo Sakiyama, Kazuo Ohta and Takafumi Aoki, “An Efficient Countermeasure against Fault Sensitivity Analysis Using Configurable Delay Blocks,” In Proc. Workshop on Fault Diagnosis and Tolerance in Cryptography (FDTC’12), IEEE, pp.95–102 (Sep., 2012).
Sho Endo, Yuichi Hayashi, Naofumi Homma, Takafumi Aoki, Toshihiro Katashita, Yohei Hori, Kazuo Sakiyama, Makoto Nagata, Jean-Luc Danger, Thanh-Ha Le and Pirouz Bazargan Sabet, “Measurement of Side-Channel Information from Cryptographic Devices on Security Evaluation Platform: Demonstration of SPACES Project,” SICE Annual Conference 2012, pp.313–316, (Aug., 2012).
Yu Sasaki, Lei Wang, Yasuhide Sakai, Kazuo Sakiyama, and Kazuo Ohta, “Three-Subset Meet-in-the-Middle Attack on Reduced XTEA,” In Proc. International Conference on Cryptology in Africa (Africacrypt’12), LNCS 7374, Springer-Verlag, pp.138–154 (Jul., 2012).
Takuma Koyama, Lei Wang, Yu Sasaki, Kazuo Sakiyama, Kazuo Ohta, “New Truncated Differential Cryptanalysis on 3D Block Cipher,” In Proc. International Conference on Information Security Practice and Experience (ISPEC’12), LNCS 7232, Springer-Verlag, pp.109–125 (Apr., 2012).
Yu Sasaki, Naoyuki Takayanagi, Kazuo Sakiyama, and Kazuo Ohta, “Experimental Verification of Super-Sbox Analysis — Confirmation of Detailed Attack Complexity,” In Proc. International Workshop on Security 2011 (IWSEC’11), LNCS 7038, Springer-Verlag, pp.178–192, (Nov., 2011).
Yu-ichi Hayashi, Shigeto Gomisawa, Yang Li, Naofumi Homma, Kazuo Sakiyama, Takafumi Aoki, and Kazuo Ohta, “Intentional Electromagnetic Interference for Fault Analysis on AES Block Cipher IC,” In Proc. International Workshop on Electromagnetic Compatibility of Integrated Circuits (EMCCOMPO’11), IEEE, pp.235–240 (Nov., 2011).
Amir Moradi, Oliver Mischke, Christof Paar, Yang Li, Kazuo Ohta, and Kazuo Sakiyama, “On the Power of Fault Sensitivity Analysis and Collision Side-Channel Attack in a Combined Setting,” In Proc. Workshop on Cryptographic Hardware and Embedded Systems (CHES’11), LNCS 6917, Springer-Verlag, pp.292–311 (Sep., 2011).
Hikaru Sakamoto, Yang Li, Kazuo Ohta, and Kazuo Sakiyama, “Fault Sensitivity Analysis Against Elliptic Curve Cryptosystems,” In Proc. Workshop on Fault Diagnosis and Tolerance in Cryptography (FDTC’11), IEEE, pp.11–20 (Sep., 2011).
Dai Yamamoto, Kazuo Sakiyama, Mitsugu Iwamoto, Kazuo Ohta, Takao Ochiai, Masahiko Takenaka, and Kouichi Itoh, “Uniqueness Enhancement of PUF Responses Based on the Locations of Random Outputting RS Latches,” In Proc. Workshop on Cryptographic Hardware and Embedded Systems (CHES’11), LNCS 6917, Springer-Verlag, pp.390–406 (Sep., 2011).
Yang Li, Kazuo Ohta, and Kazuo Sakiyama, “Revisit Fault Sensitivity Analysis on WDDL-AES,” In Proc. International Symposium on Hardware-Oriented Security and Trust (HOST’11), IEEE, pp.148–153 (Jun., 2011).
Lei Wang, Yu Sasaki, Wataru Komatsubara, Kazuo Ohta, and Kazuo Sakiyama, “(Second) Preimage Attacks on Step-Reduced RIPEMD/RIPEMD-128 with a New Local-Collision Approach,” In Proc. RSA Conference 2011, Cryptographer’s Track (CT-RSA’11), LNCS 6558, Springer-Verlag, pp.197–212 (Mar., 2011).
Yoshikazu HanataniI, Miyako Ohkubo, Shin’ichiro Matsuo, Kazuo Sakiyama, Kazuo Ohta, “A Study on Computational Formal Verification for Practical Cryptographic Protocol: The Case of Synchronous RFID Authentication,” In Proc. Real-Life Cryptographic Protocols and Standarization (RLCPS’11), LNCS 7126, Springer-Verlag, pp.70–87 (Feb., 2011).
Yu Sasaki, Yang Li, Lei Wang, Kazuo Sakiyama, and Kazuo Ohta, “Non-Full-Active Super-Sbox Analysis: Applications to ECHO and Grøstl,” In Proc. Advances in Cryptology — ASIACRYPT’10, LNCS 6477, Springer-Verlag, pp.38–55 (Dec., 2010).
Junko Takahashi, Toshinori Fukunaga, and Kazuo Sakiyama, “Fault Analysis on Stream Cipher MUGI,” In Proc. International Conference on Information Security and Cryptology (ICISC’10), LNCS 6829, Springer-Verlag, pp.420–434 (Dec. 2010).
Daisuke Nakatsu, Yang Li, Kazuo Sakiyama, and Kazuo Ohta, “Combination of SW Countermeasure and CPU Modification on FPGA Against Power Analysis,” In Proc. International Workshop on Information Security Applications (WISA’10), LNCS 6513, Springer-Verlag, pp.258–272 (Aug., 2010).
Yang Li, Kazuo Sakiyama, Shigeto Gomisawa, Toshinori Fukunaga, Junko Takahashi, and Kazuo Ohta, “Fault Sensitivity Analysis,” In Proc. Workshop on Cryptographic Hardware and Embedded Systems (CHES’10), LNCS 6225, Springer-Verlag, pp.320–334 (Aug., 2010).
Kazuyuki Kobayashi, Jun Ikegami, Miroslav Knežević, Eric Xu Guo, Shin’ichiro Matsuo, Sinan Huan, Leyla Nazhandali, Ünal Kocabaş, Junfeng Fan, Akashi Satoh, Patrick Schaumont, Ingrid Verbauwhede, Kazuo Sakiyama, and Kazuo Ohta, “Prototyping Platform for Performance Evaluation of SHA-3 Candidates,” In Proc. International Symposium on Hardware-Oriented Security and Trust (HOST’10), IEEE, pp.60–63 (Jun., 2010).
Yang Li, Kazuo Sakiyama, Lejla Batina, Daisuke Nakatsu, and Kazuo Ohta, “Power Variance Analysis Breaks a Masked ASIC Implementations of AES,” In Proc. Design, Automation and Test in Europe (DATE’10), ACM, pp.1059–1064 (Mar., 2010).
Masami Izumi, Jun Ikegami, Kazuo Sakiyama, and Kazuo Ohta, “Improved Countermeasure against Address-bit DPA for ECC Scalar Multiplication,” In Proc. Design, Automation and Test in Europe (DATE’10), ACM, pp.981–984 (Mar., 2010).
Bagus Santoso, Kazuo Ohta, Kazuo Sakiyama, and Goichiro Hanaoka, “Improving Efficiency of An ‘On the Fly’ Identification Scheme by Perfecting Zero-Knowledgeness,” In Proc. RSA Conference 2010, Cryptographer’s Track (CT-RSA’10), LNCS 5985, Springer-Verlag, pp.284–301 (Mar., 2010).
Yang Li, Kazuo Sakiyama, Shinichi Kawamura, Yuichi Komano, and Kazuo Ohta, “Security Evaluation of a DPA-resistant S-box Based on the Fourier Transform,” In Proc. International Conference on Information and Communications Security (ICICS’09), LNCS 5927, Springer-Verlag, pp.3–16 (Dec., 2009).
Lei Wang, Yu Sasaki, Kazuo Sakiyama, and Kazuo Ohta, “Bit-Free Collision: Application to APOP Attack,” In Proc. International Workshop on Security 2009 (IWSEC’09), LNCS 5824, Springer-Verlag, pp.3–21 (Oct., 2009).
Kazuo Sakiyama, Tatsuya Yagi, and Kazuo Ohta, “Fault Analysis Attack against an AES Prototype Chip Using RSL,” In Proc. RSA Conference 2009, Cryptographer’s Track (CT-RSA’09), LNCS 5473, Springer-Verlag, pp.429–443 (Apr., 2009).
Masami Izumi, Kazuo Sakiyama, and Kazuo Ohta, “A New Approach for Implementing the MPL Method toward Higher SPA Resistance,” In Proc. International Conference on Availability, Reliability and Security (ARES’09), IEEE, pp.181–186 (Mar., 2009).
Miroslav Knežević, Kazuo Sakiyama, Junfeng Fan, and Ingrid Verbauwhede, “Modular Multiplication in GF(2n) without Pre-computational Phase,” In Proc. International Workshop on the Arithmetic of Finite Fields (WAIFI’08), LNCS 5130, Springer-Verlag, pp.77–87 (Jul., 2008).
Miroslav Knežević, Kazuo Sakiyama, Yong Ki Lee, and Ingrid Verbauwhede, “On the High-Throughput Implementation of RIPEMD-160 Hash Algorithm,” In Proc. 19th IEEE International Conference on Application-specific Systems, Architectures and Processor (ASAP’08), IEEE, pp.85–90 (Jul., 2008).
Junfeng Fan, Lejla Batina, Kazuo Sakiyama, and Ingrid Verbauwhede, “FPGA Design for Algebraic Tori-Based Public-Key Cryptography,” In Proc. Design, Automation and Test in Europe (DATE’08), ACM, pp.1292–1297 (Mar., 2008).
Junfeng Fan, Kazuo Sakiyama, and Ingrid Verbauwhede, “Montgomery Modular Multiplication Algorithm on Multi-Core Systems,” In Proc. IEEE Workshop on Signal Processing Systems (SIPS’07), IEEE, pp.261-266 (Oct., 2007).
Nele Mentens, Kazuo Sakiyama, Lejla Batina, Bart Preneel, and Ingrid Verbauwhede, “A Side-channel Attack Resistant Programmable PKC Coprocessor for Embedded Applications,” In Proc. International Symposium on Systems, Architectures, MOdeling and Simulation (IC-SAMOS’07), IEEE, pp.194–200 (Jul., 2007).
Lejla Batina, Nele Mentens, Kazuo Sakiyama, Bart Preneel, and Ingrid Verbauwhede, “Public-Key Cryptography on the Top of a Needle,” In Proc. IEEE International Symposium on Circuits and Systems (ISCAS’07), Special Session: Novel Cryptographic Architectures for Low-Cost RFID, IEEE, pp.1831–1834 (May, 2007).
Kazuo Sakiyama, Elke De Mulder, Bart Preneel, and Ingrid Verbauwhede, “Side-channel Resistant System-level Design Flow for Public-key Cryptography,” In Proc. 2007 Great Lakes Symposium on VLSI (GLSVLSI’07), ACM, pp.144–147 (Mar., 2007).
Nele Mentens, Kazuo Sakiyama, Bart Preneel, and Ingrid Verbauwhede, “Efficient Pipelining for Modular Multiplication Architectures in Prime Fields,” In Proc. 2007 Great Lakes Symposium on VLSI (GLSVLSI’07), ACM, pp.534–539 (Mar., 2007).
Kazuo Sakiyama, Lejla Batina, Bart Preneel, and Ingrid Verbauwhede, “Superscalar Coprocessor for High-Speed Curve-Based Cryptography,” In Workshop on Cryptographic Hardware and Embedded Systems (CHES’06), LNCS 4249, Springer-Verlag, pp.415–429 (Oct., 2006).
Lejla Batina, Nele Mentens, Kazuo Sakiyama, Bart Preneel, and Ingrid Verbauwhede, “Low-Cost Elliptic Curve Cryptography for Wireless Sensor Networks,” In Third European Workshop on Security and Privacy in Ad Hoc and Sensor Networks (ESAS’06), LNCS 4357, Springer-Verlag, pp.6-17 (Sep., 2006).
Lejla Batina, Alireza Hodjat, David Hwang, Kazuo Sakiyama, and Ingrid Verbauwhede, “Reconfigurable Architectures for Curve-Based Cryptography on Embedded Micro-controllers,” In Proc. 16th International Conference on Field Programmable Logic and Applications (FPL’06), IEEE, pp.667–670 (Aug., 2006).
Nele Mentens, Kazuo Sakiyama, Lejla Batina, Ingrid Verbauwhede, and Bart Preneel, “FPGA-Oriented Secure Data Path Design: Implementation of a Public Key Coprocessor,” In Proc. 16th International Conference on Field Programmable Logic and Applications (FPL’06), IEEE, pp.133–138 (Aug., 2006).
Kazuo Sakiyama, Lejla Batina, Bart Preneel, and Ingrid Verbauwhede, “HW/SW Co-design for Accelerating Public-Key Cryptosystems over GF(p) on the 8051 μ-controller,” In Proc. World Automation Congress (WAC’06), 6 pages (Jul., 2006).
Kazuo Sakiyama, Elke De Mulder, Bart Preneel, and Ingrid Verbauwhede, “A Parallel Processing Hardware Architecture for Elliptic Curve Cryptosystems,” In Proc. IEEE International Conference on Acoustics, Speech, and Signal Processing (ICASSP’06), IEEE, pp.III-904–III-907 (May, 2006).
Kazuo Sakiyama, Bart Preneel, and Ingrid Verbauwhede, “A Fast Dual-Field Modular Arithmetic Logic Unit and Its Hardware Implementation,” In Proc. IEEE International Symposium on Circuits and Systems (ISCAS’06), IEEE, pp.787–790 (May, 2006).
Kazuo Sakiyama, Nele Mentens, Lejla Batina, Bart Preneel, and Ingrid Verbauwhede, “Reconfigurable Modular Arithmetic Logic Unit for High-performance Public-key Cryptosystems,” In International Workshop on Applied Reconfigurable Computing (ARC’06), LNCS 3985, Springer-Verlag, pp.347–357 (Mar., 2006).
Patrick Schaumont, Kazuo Sakiyama, Alireza Hodjat, and Ingrid Verbauwhede, “Embedded Software Integration for Coarse-grain Reconfigurable Systems,” In Proc. IEEE 18th International Parallel and Distributed Processing Symposium (IPDPS’04), IEEE, pp.137–142 (Apr., 2004).
Shenglin Yang, Kazuo Sakiyama, and Ingrid Verbauwhede, “A Secure and Efficient Fingerprint Verification System for an Embedded Device,” In Proc. 37th Asilomar Conference on Signals, Systems and Computers, pp.2058–2062 (Nov., 2003).
Patrick Schaumont, Kazuo Sakiyama, Yi Fan, David Hwang, Shenglin Yang, Alireza Hodjat, Bo-Cheng Lai, and Ingrid Verbauwhede, “Testing ThumbPod: Softcore Bugs are Hard to Find,” In Proc. IEEE International High Level Design Validation and Test Workshop (HLDVT’03), IEEE, pp.77–82 (Nov., 2003).
David Hwang, Patrick Schaumont, Yi Fan, Alireza Hodjat, Bo-Cheng Lai, Kazuo Sakiyama, Shenglin Yang, and Ingrid Verbauwhede, “Design flow for HW/SW Acceleration Transparency in the Thumbpod Secure Embedded System,” In Proc. 40th Design Automation Conference (DAC’03), ACM, pp.60–65 (Jun., 2003).
Kazuo Sakiyama, Patrick Schaumont, D. Hwang, and Ingrid Verbauwhede, “Teaching Trade-offs in System-level Design Methodologies,” In Proc. IEEE Microelectronic Systems Education (MSE’03), IEEE, pp.62–63 (Jun., 2003).
Kazuo Sakiyama, Patrick Schaumont, and Ingrid Verbauwhede, “Finding the best System Design Flow for a High-Speed JPEG Encoder,” In Proc. 8th Asia and South Pacific Design Automation Conference (ASP-DAC’03), ACM, pp.577–578 (Jan., 2003).
Young-Jae Cho, Takashi Hirakawa, Kazuo Sakiyama, Hiroaki Okamoto and Yoshihiro Hamakawa, “ZnF2:Gd UV Emitting Electroluminescent Device,” 8th International Workshop on Electroluminescence, Berlin, Germany, In “Inorganic and Organic Electroluminescence,” eds. R. Mauch and H.-E. Gumlich (Wissenschaft und Technik Verlag, Berlin, 1996) pp.347–350 (Aug. 1996)
Young-Jae Cho, Takashi Hirakawa, Kazuo Sakiyama, Hiroaki Okamoto and Yoshihiro Hamakawa, “ZnF2:Gd Thin Film Electroluminescent Devices,” 8th International Conference Solid Films and Surface, Osaka, Japan (Jul., 1996).
学会口頭発表(査読なし)
Enhao Xu, Takeshi Sugawara, Kazuo Sakiyama, Yuko Hara-Azumi, and Yang Li, “Attention-Based Non-Profiled SCA on ASCAD Database,” 2023年暗号と情報セキュリティシンポジウム (SCIS’23), 3E1-4, 8 pages (Jan., 2023).
Haruka Hirata, Daiki Miyahara, Yang Li, and Kazuo Sakiyama, “Glitch-Based Key Recovery with Shannon Entropy on the Last AES Round,” Poster Session, CARDIS2022 (Nov., 2022).
Go Takatoi, Takeshi Sugawara, Kazuo Sakiyama, Yuko Hara-Azumi, Yang Li, “Pushing the Limits of Simple Electromagnetic Analysis Against Similar Activation Functions,” 2021年暗号と情報セキュリティシンポジウム (SCIS’21), 2D3-5, 6 pages (Jan., 2021).
Yang Li, Natsu Shoji, Takeshi Sugawara, Kazuo Sakiyama, “Investigation of Information Leakage from A Laser Fault Injection Sensor,” IEICE2019年総合大会 (Mar., 2019).
Risa Yashiro, Takeshi Sugawara, Mitsuru Shiozaki, Takeshi Fujino, and Kazuo Sakiyama, “A TEG Chip of Arbiter PUF for Efficient Simulation Model,” In Conference Record of International Conference on Computer and Communication Systems (ICCCS’19) (Feb., 2019)
Erina Tatsumi, Kazuo Sakiyama, and Takeshi Sugawara, “A Case Study of Row Hammer under Different Refresh Rates” Poster Session, IWSEC2018 (Aug., 2018).
Yang Li and Kazuo Sakiyama, “Toward Practical Solution to Unsuccessful Write Operation on Non-Volatile Memory of Passive RFID Tags,” Poster Session, ASIACCS2014 (Jun., 2014).
Takanori Machida, Toshiki Nakasone, Mitsugu Iwamoto, and Kazuo Sakiyama, “A New Model of Modeling Attacks against Arbiter PUF on FPGA,” Poster Session, IWSEC’13 (Nov., 2013).
Yang Li, Toshiki Nakasone, and Kazuo Sakiyama, “Toward Applications of SRAM Retention Time as Battery-Less Timer for RFID Tags,” Poster Session, IWSEC’13 (Nov., 2013).
Toshiki Nakasone, Daisuke Nakatsu, Yang Li, Kazuo Ohta, and Kazuo Sakiyama, “Locality Randomization for EMA-Resistant AES Hardware,” In Proc. Triangle Symposium on Advanced ICT 2012 (TriSAI’12), 4 pages (Sep., 2012).
Yang Li, Daisuke Nakatsu, Kazuo Ohta, and Kazuo Sakiyama, “Key Recovery with Less Power Traces Using DPA Contest Data,” Poster Session, CHES’12 (Sep., 2012).
李 陽, 太田和夫, 崎山一男, “Sensitive-Data Dependency of Faulty Behavior and Its Application,” 2012年暗号と情報セキュリティシンポジウム (SCIS’12), 3C1-3E, 7 pages (Feb., 2012)
山本 大, 崎山一男, 岩本 貢, 太田和夫, 落合隆夫, 武仲正彦, 伊藤孝一, “[招待講演]Uniquness Enhancement of PUF Responces Based on the Locations of Random Outputting RS Latches,” ISEC2011-66, p.29 (Dec., 2011).
Toshiki Nakasone, Daisuke Nakatsu, Yang Li, Kazuo Ohta, Kazuo Sakiyama, “First Experimental Results of Correlation-Enhanced EMA Collision Attack,” Poster Session, CHES2011 (Sep., 2011).
Takuma Koyama, Yu Sasaki, Kazuo Sakiyama, and Kazuo Ohta, “Rebound Attack on 3D Block Cipher,” In Proc. Triangle Symposium on Advanced ICT 2011 (TriSAI’11), pp.220–224 (Aug., 2011).
Yasuhide Sakai, Yu Sasaki, Lei Wang, Kazuo Ohta, and Kazuo Sakiyama, “Preimage Attacks on 5-Pass HAVAL Reduced to 158-Steps and One-Block 3-Pass HAVAL,” Industrial Track Session, ACNS2011, 14 pages (Jun., 2011).
Qi Li, Shigeto Gomisawa, Mitsugu Iwamoto, Kazuo Ohta, and Kazuo Sakiyama, “New Differential Fault Analysis on Trivium Based on Setup-Time Violations,” ISEC2010-122, pp.333–339 (Mar., 2011).
Naoyuki Takayanagi, Yang Li, Kazuo Sakiyama, and Kazuo Ohta, “Effective Verification for Known-Key Distinguisher by Using Extended Differential Path,” In Proc. Triangle Symposium on Advanced ICT 2010 (TriSAI’10), pp.284–287 (Oct., 2010).
Qi Li, Kazuo Sakiyama, Lei Wang, and Kazuo Ohta, “Another Differential Fault Analysis on Trivium,” In Proc. Triangle Symposium on Advanced ICT 2010 (TriSAI’10), pp.247–252 (Oct., 2010).
Shin’ichiro Matsuo, Miroslav Knežević, Patrick Schaumont, Ingrid Verbauwhede, Akashi Satoh, Kazuo Sakiyama and Kazuo Ohta, “How Can We Conduct Fair and Consistent Hardware Evaluation for SHA-3 Candidate?” The Second SHA-3 Candidate Conference (Aug., 2010).
Yu Sasaki, Yang Li, Lei Wang, Kazuo Sakiyama, and Kazuo Ohta, “New Non-Ideal Properties of AES-Based Permutations: Applications to ECHO and Grøstl,” The Second SHA-3 Candidate Conference (Aug., 2010).
Yang Li, Shigeto Gomisawa, Kazuo Sakiyama, and Kazuo Ohta, “An Information Theoretic Perspective on the Differential Fault Analysis against AES,” 2010 Symposium on Cryptography and Information Security (SCIS’10), 2B1-2, 6 pages (Jan., 2010).
Bagus Santoso, Kazuo Ohta, Kazuo Sakiyama, and Goichiro Hanaoka, “Performance Comparison of Lightweight Public-Key Identification Schemes,” WISP Summit – First workshop on Wirelessly Powered Sensor Networks and Computational RFID (Nov., 2009).
Yang Li, Mitsugu Iwamoto, Kazuo Ohta, and Kazuo Sakiyama, “Visual Secret Sharing Schemes Allowing Arbitrary Rotation Angles of Shares,” In Proc. Triangle Symposium on Advanced ICT 2009 (TriSAI’09), Tokyo, Japan, pp.33–38 (Oct., 2009).
Tomotaka Hanawa, Kazuo Sakiyama, and Kazuo Ohta, “Cryptanalysis of Duc-Kim Key Exchange Protocol Proposed at TriSAI’08,” In Proc. Triangle Symposium on Advanced ICT 2009 (TriSAI’09), Tokyo, Japan, pp.39–42 (Oct., 2009).
Daisuke Nakatsu, Yang Li, Kazuo Sakiyama, and Kazuo Ohta, “Comparison of Masked S-boxes in Hardware Implementation,” In Proc. Triangle Symposium on Advanced ICT 2009 (TriSAI’09), Tokyo, Japan, pp.176–181 (Oct., 2009).
Shigeto Gomisawa, Masami Izumi, Kazuo Sakiyama, and Kazuo Ohta, “An Extension of Differential Fault Analysis Attack of AES,” In Proc. Triangle Symposium on Advanced ICT 2009 (TriSAI’09), Tokyo, Japan, pp.185–188 (Oct., 2009).
Bagus Santoso, Kazuo Ohta, Kazuo Sakiyama, and Goichiro Hanaoka, “Improving Efficiency of an ‘On the Fly’ Identification Scheme by Perfecting Zero-Knowledgeness,” ISEC2009-30, pp.161–168 (July, 2009).
Yang Li, Mitsugu Iwamoto, Kazuo Ohta, and Kazuo Sakiyama, “A Novel Construction Method for Visual Secret Sharing Schemes Allowing Rotation of Shares,” ISEC2009-5, pp.29–36 (May, 2009).
Yang Li, Mengyu Zhu, Wang Lei, Kazuo Ohta, and Kazuo Sakiyama, “Visual Secret Sharing Schemes for Multiple Secret Images Allowing the 90-degree Rotation of Shares,” 2009 Symposium on Cryptography and Information Security (SCIS’09), 1F1-3 (Jan., 2009).
Lei Wang, Yu Sasaki, Kazuo Ohta, and Kazuo Sakiyama, “MD5チャレンジ・レスポンスプロトコルへの速い攻撃,” 2009 Symposium on Cryptography and Information Security (SCIS’09), 2A2-1 (Jan., 2009).
Bagus Santoso, Kazuo Ohta, and Kazuo Sakiyama, “Yet Another New “On the Fly” Identification Scheme: Reducing Memory Cost by Improving Zero-Knowledgeness,” 3A2-4, 2009 Symposium on Cryptography and Information Security (SCIS’09) (Jan., 2009).
Masami Izumi, Kazuo Sakiyama, Kazuo Ohta, “Does The Montgomery Powering Ladder Method Really Offer SPA Resistance?,” In Proc. Triangle Symposium on Advanced ICT 2008 (TriSAI’08), Daejeon, Korea, 6 pages (Oct., 2008).
Yong Ki Lee, Kazuo Sakiyama, Lejla Batina, Ingrid Verbauwhede , “A Compact ECC Processor for Pervasive Computing,” In the Workshop Record of the ECRYPT Workshop, Secure Component and System Identification (SECSI’08), 14 pages (Mar., 2008).
Junfeng Fan, Kazuo Sakiyama, and Ingrid Verbauwhede, “Elliptic Curve Cryptography on Embedded Multicore Systems,” In the Workshop Record of the Workshop on Embedded Systems Security (WESS’07), 6 pages (Oct., 2007).
Caroline Vanderheyden, Junfeng Fan, Kazuo Sakiyama, and Ingrid Verbauwhede, “Exploring Trade-offs between Area, Performance and Security in HW/SW Co-design of ECC,” In the Workshop Record of the Western European Workshop on Research in Cryptology (WeWoRC’07), 2 pages (Jul., 2007).
Junfeng Fan, Kazuo Sakiyama, and Ingrid Verbauwhede, “Montgomery Modular Multiplication Algorithm for Multi-core Systems,” In the Workshop Record of the ECRYPT Workshop, Software Performance Enhancement for Encryption and Decryption (SPEED’07), 12 pages (Jun., 2007).
Kazuo Sakiyama, Lejla Batina, Nele Mentens, Bart Preneel, and Ingrid Verbauwhede, “Small Footprint ALU for Public-key Processors for Pervasive Security,” In the Workshop Record of the ECRYPT Workshop on RFID Security 2006, 12 pages (Jul., 2006).
Lejla Batina, Sandeep Kumar, Joseph Lano, Kerstin Lemke, Nele Mentens, Christoph Paar, Bart Preneel, Kazuo Sakiyama, and Ingrid Verbauwhede, “Testing Framework for eSTREAM Profile II Candidates,” In the Workshop Record of the ECRYPT Workshop, SASC — The State of the Art of Stream Ciphers, 9 pages (Feb., 2006).
Kazuo Sakiyama, Lejla Batina, Patrick Schaumont, and Ingrid Verbauwhede, “HW/SW Co-design for TA/SPA-resistant Public-Key Cryptosystems,” In the Workshop Record of the ECRYPT Workshop on Cryptographic Advances in Secure Hardware (CRASH’05), 8 pages (Sep., 2005).
Young-Jae Cho, Takashi Hirakawa, Kazuo Sakiyama, Hiroaki Okamoto and Yoshihiro Hamakawa, “EL/PL Hybrid Device Enhanced by UV Emission from ZnF2:Gd Thin Film Electroluminescence,” 8th Seoul International Symposium on the Physics of Semiconductors and Applications (ISPSA’96), Seoul, Korea, pp.21–22 (Oct., 1996).
Yuiko Matsubara, Daiki Miyahara, Yohei Watanabe, Mitsugu Iwamoto, and Kazuo Sakiyama, “Abstraction Model of Probing and DFA Attacks on Block Ciphers,” Cryptology ePrint Archive, Report 2023/443, 2023.
Ryota Hira, Tomoaki Kitahara, Daiki Miyahara, Yuko Hara-Azumi, Yang Li, and Kazuo Sakiyama, “Software Evaluation for Second Round Candidates in NIST Lightweight Cryptography,” Cryptology ePrint Archive, Report 2022/591, 2022.
Yang Li, Daisuke Nakatsu, Qi Li, Kazuo Ohta, and Kazuo Sakiyama, “Clockwise Collision Analysis — Overlooked Side-Channel Leakage Inside Your Measurements,” Cryptology ePrint Archive, Report 2011/579, 2011.
Miyako Ohkubo, Shin’ichiro Matsuo, Yoshikazu Hanatani, Kazuo Sakiyama and Kazuo Ohta, “Robust RFID Authentication Protocol with Formal Proof and Its Feasibility,” Cryptology ePrint Archive, Report 2010/345, 2010.
Shigeto Gomisawa, Yang Li, Junko Takahashi, Toshinori Fukunaga, Yu Sasaki, Kazuo Sakiyama, and Kazuo Ohta, “Efficient Differential Fault Analysis for AES,” Cryptology ePrint Archive, Report 2010/336, 2010.
Yang Li, Shigeto Gomisawa, Kazuo Sakiyama, and Kazuo Ohta, “An Information Theoretic Perspective on the Differential Fault Analysis against AES,” Cryptology ePrint Archive, Report 2010/032, 2010.
Kazuyuki Kobayashi, Jun Ikegami, Shin’ichiro Matsuo, Kazuo Sakiyama, and Kazuo Ohta, “Evaluation of Hardware Performance for the SHA-3 Candidates Using SASEBO-GII,” Cryptology ePrint Archive, Report 2010/010, 2010.
その他の発表
Ryota Hatano and Kazuo Sakiyama, “An Abstraction Model for Differential Fault Analysis on AES,” The First International Workshop on Hardware Oriented Cybersecurity (HwSec2018) (2018年12月20日).
Shoji Natsu and Kazuo Sakiyama, “Modeling 1-bit Probing Attack on Block Ciphers,” The First International Workshop on Hardware Oriented Cybersecurity (HwSec2018) (2018年12月20日).
粕谷桃伽, 町田卓謙, 崎山一男 “Physical Information Using Side-Channel Information~(overview),” Hot Channel Workshop 2016 (2016年4月4日).
矢ヶ崎玲奈, 崎山一男, 林優一, 三浦典之, “差分故障解析に対するデバイスレベルの対策手法に向けて,” Hot Channel Workshop 2015 (2015年10月8日).
矢ヶ崎玲奈, 崎山一男, “ガラスのムラを用いた人工物メトリクスの研究,” Hot Channel Workshop 2014 (2014年10月7日).
李陽, 崎山一男, “Single-Chip Implementation and Evaluation of Passive UHF RFID Tag with Hash-Based Mutual Authentication,” Hot Channel Workshop 2014 (2014年10月7日).
松原有沙, 町田卓謙, 崎山一男, “サイドチャネル情報を用いた認証の実現に向けて,” Hot Channel Workshop 2014 (2014年10月6日).
李 陽, 中曽根俊貴, 崎山一男, “Toward Practically Secure and Flexible RFID Tags,” Hot Channel Workshop 2013 (2013年4月12日).
講演・チュートリアル等
Kazuo Sakiyama, “Invited Talk: Deep Learning for Security Evaluation of Physically Unclocable Function,” The 1st ECTI UEC Workshop on AI and Application (ECTI-UEC2019), (Sep. 6, 2019).
Kazuo Sakiyama et al., Dagstuhl Seminar 19301, “Secure Composition for Hardware Systems,” (21-26, Jul., 2019).
Kazuo Sakiyama, “Anti-tamper cryptographic hardware with analog electronics,” Mini Symposium: Crypto for long-term security and privacy (Mar. 22, 2019).
Kazuo Sakiyama, “Keynote: Towards Resilient IoT System – How to Evaluate Information Leakage,” The First International Workshop on Hardware Oriented Cybersecurity (HwSec2018) (Dec. 19, 2018).
Kazuo Sakiyama, “Keynote: Hardware Security and IoT Ecosystem,” International Conference on Advanced Computing and Applications (ACOMP 2018) (Nov. 28, 2018).
Kazuo Sakiyama, “Hardware Implementations of ECC,” Autumn school, 22nd Workshop on Elliptic Curve Cryptography (Nov. 17, 2018).
Kazuo Sakiyama, “WHO WILL FAULT SENSORS BE HELPFUL FOR?,” COSIC Seminar (Nov. 3, 2017).
Momoka Kasuya and Kazuo Sakiyama, “Side-Channel Authentication Using XOR Model,” SCIS & CSS Award Session, International Workshop on Security 2017 (IWSEC’17) (Sep. 1, 2017).
Yang Li and Kazuo Sakiyama, “Review Fault Attacks on ECC Implementations with Fault Sensitivity Analysis,” A-SSCC 2015 レビュー講演, IEEE SSCS Japan/Kansai Chapter Technical Seminar (2016年1月13日).
Yang Li and Kazuo Sakiyama, “Review Fault Attacks on ECC Implementations with Fault Sensitivity Analysis,” IEEE Asian Solid-State Circuits Conference 2015 (A-SSCC’15) (Nov. 10, 2015).
Kazuo Sakiyama, “Hardware Implementations of ECC,” Summer school on real-world crypto and privacy (Jun. 4, 2015).
Kazuo Sakiyama, “Fault Analysis for Cryptosystems: Introduction to Differential Fault Analysis and Fault Sensitivity Analysis,” Tutorial-4: Hardware Trust in VLSI Design and Implementations, Asia and South Pacific Design Automation Conference (ASP-DAC’15), Tutorial Session (Jan., 2015).
Kazuo Sakiyama, Patrick Schaumont, and Ingrid Verbauwhede, “Design Methods for Secure Hardware,” NII Shonan Meeting (Sep. 15–19, 2014).
李 陽, 崎山一男, “Two Topics in Cryptographic Hardware: Coupon DFA and Secure RFID,” Compview暗号理論ワークショップ2013 (2013年2月21日).
崎山一男, 李陽, ”故障感度解析の可能性,” Hot Channel Workshop 2012 (2012年9月5日).
Kazuo Sakiyama, “A New Fault Analysis Attack (joint work with Yang Li and Kazuo Ohta),” 2010 Japan-Taiwan Joint Research Symposium on Cryptography and Next IT-society (Nov. 16, 2010).
Kazuo Sakiyama, “Cryptanalysis and Side-channel Analysis – Approach to Optimal Differential Fault Analysis (joint work with Yang Li and Kazuo Ohta),” Forum Math-for-Industry 2010 (Oct. 22, 2010).
崎山一男, “サイドチャネル攻撃への対策とその副作用,” RSA Conference Japan 2009, クラストラック:暗号技術の最新動向(RC-03) (2009年6月10日).
Lejla Batina and Kazuo Sakiyama, “Compact Implementations for RFID and Sensor Nodes,” Special Interest Workshops – Secure Embedded Implementations, Design, Automation and Test in Europe (DATE’07) (Apr., 2007).