Yuki Ikemoto, Soichiro Fujii, Kotaro Naruse, Jun Shiomi, Yoshihiro Midoh, Yuki Yamashita, Makoto Nagata, Yuichi Komano, Mitsugu Iwamoto, Kazuo Sakiyama, and Noriyuki Miura “Double-Sided Multimodal Attack Sensing and Partial Re-Keying in Shared Group Key System,” Proc. ESSERC, IEEE, (Sep., 2024).
Yuki Matsukawa, Daiki Miyahara, Takeshi Sugawara, Kazuo Sakiyama, and Yang Li, “Exploring Leakage Characteristics and Attacks through Profiles of Screaming Channels,” The 7th International Conference on Mobile Internet Security (MobiSec 2023), Springer, pp.152-164 (Dec., 2023).
Léo Robert, Daiki Miyahara, Pascal Lafourcade, and Takaaki Mizuki, “Hide a liar: Card-Based ZKP Protocol for Usowan,” In Proc. Annual Conference on Theory and Applications of Models of Computation (TAMC 2022), LNCS 13571, Springer-Verlag, pp.201–217 (Aug. 2022).
Momoka Kasuya, Nobuyoshi Morita, Hiroki Yamazaki, and Kazuo Sakiyama, “Automated Extraction for Vulnerability Management on PSIRT: A Case Study of Automotive Industry,” In Proc. International Symposium on Computing and Networking, CANDAR Workshops (CANDARW’23), IEEE, pp.232–238 (Nov., 2023).
Maki Tsukahara, Haruka Hirata, Mingyu Yang, Daiki Miyahara, Yang Li, Yuko Hara-Azumi, and Kazuo Sakiyama, “On the Practical Dependency of Fresh Randomness in AES S-box with Second-Order TI,” In Proc. International Symposium on Computing and Networking, CANDAR Workshops (CANDARW’23), IEEE, pp.286–291 (Nov., 2023).
Mengting Chen, Yang Li, and Jian Wang, “Another SPA Key Recovery Against Random Order Countermeasures for AES Key Expansion”, In Proc. International Conference on Cloud Computing and Security (ICCCS’16), LNCS 10039, Springer-Verlag, pp.322–334 (Jun., 2016).
Yang Li, Mengting Chen, and Jian Wang, “Introduction to side-channel attacks and fault attacks,” In Proc. Electromagnetic Compatibility 2016 Asia-Pacific International Symposium (APEMC’16), IEEE, pp.573–575 (Sep. 2016).
Shuang Wang, Yang Li, and Jian Wang, “A New Key Rank Estimation Method to Investigate Dependent Key Lists of Side Channel Attacks” In Proc. Asian Hardware Oriented Security and Trust Symposium (AsianHOST’17), IEEE, pp.1–6 (Oct., 2017).
Yang Li, Shuang Wang, Zhibin Wang, and Jian Wang, “A Strict Key Enumeration Algorithm for Dependent Score Lists of Side-Channel Attacks” In Proc. 16th Smart Card Research and Advanced Application Conference (Cardis’17), LNCS 10728, Springer-Verlag, pp.51–69 (Jan., 2018).
Ruyan Wang, Xiaohan Meng, Yang Li, Jian Wang, “Improved Differential Fault Analysis on Authenticated Encryption of PAEQ-128”, In Proc. International Conferences on Information Security and Cryptology 2018 (Inscript’18), LNCS 11449, Springer-Verlag, pp.183–199 (Dec., 2018).