Kazuo Sakiyama, Lejla Batina, Patrick Schaumont, and Ingrid Verbauwhede, “HW/SW Co-design for TA/SPA-resistant Public-Key Cryptosystems,” In the Workshop Record of the ECRYPT Workshop on Cryptographic Advances in Secure Hardware (CRASH’05), 8 pages (Sep., 2005).
Lejla Batina, Sandeep Kumar, Joseph Lano, Kerstin Lemke, Nele Mentens, Christoph Paar, Bart Preneel, Kazuo Sakiyama, and Ingrid Verbauwhede, “Testing Framework for eSTREAM Profile II Candidates,” In the Workshop Record of the ECRYPT Workshop, SASC — The State of the Art of Stream Ciphers, 9 pages (Feb., 2006).
Kazuo Sakiyama, Lejla Batina, Nele Mentens, Bart Preneel, and Ingrid Verbauwhede, “Small Footprint ALU for Public-key Processors for Pervasive Security,” In the Workshop Record of the ECRYPT Workshop on RFID Security 2006, 12 pages (Jul., 2006).
Caroline Vanderheyden, Junfeng Fan, Kazuo Sakiyama, and Ingrid Verbauwhede, “Exploring Trade-offs between Area, Performance and Security in HW/SW Co-design of ECC,” In the Workshop Record of the Western European Workshop on Research in Cryptology (WeWoRC’07), 2 pages (Jul., 2007).
Junfeng Fan, Kazuo Sakiyama, and Ingrid Verbauwhede, “Montgomery Modular Multiplication Algorithm for Multi-core Systems,” In the Workshop Record of the ECRYPT Workshop, Software Performance Enhancement for Encryption and Decryption (SPEED’07), 12 pages (Jun., 2007).
Junfeng Fan, Kazuo Sakiyama, and Ingrid Verbauwhede, “Elliptic Curve Cryptography on Embedded Multicore Systems,” In the Workshop Record of the Workshop on Embedded Systems Security (WESS’07), 6 pages (Oct., 2007).
Yong Ki Lee, Kazuo Sakiyama, Lejla Batina, Ingrid Verbauwhede , “A Compact ECC Processor for Pervasive Computing,” In the Workshop Record of the ECRYPT Workshop, Secure Component and System Identification (SECSI’08), 14 pages (Mar., 2008).
Masami Izumi, Kazuo Sakiyama, Kazuo Ohta, “Does The Montgomery Powering Ladder Method Really Offer SPA Resistance?,” In Proc. Triangle Symposium on Advanced ICT 2008 (TriSAI’08), Daejeon, Korea, 6 pages (Oct., 2008).
Bagus Santoso, Kazuo Ohta, and Kazuo Sakiyama, “Yet Another New “On the Fly” Identification Scheme: Reducing Memory Cost by Improving Zero-Knowledgeness,” 3A2-4, 2009 Symposium on Cryptography and Information Security (SCIS’09) (Jan., 2009).
泉 雅巳, 崎山一男, 太田和夫, “フォールト混入時におけるRSL 技術による暗号回路モデルを用いた安全性解析,” 2009年暗号と情報セキュリティシンポジウム (SCIS’09), 2A3-3 (Jan., 2009).