Sho Endo, Yuichi Hayashi, Naofumi Homma, Takafumi Aoki, Toshihiro Katashita, Yohei Hori, Kazuo Sakiyama, Makoto Nagata, Jean-Luc Danger, Thanh-Ha Le and Pirouz Bazargan Sabet, “Measurement of Side-Channel Information from Cryptographic Devices on Security Evaluation Platform: Demonstration of SPACES Project,” SICE Annual Conference 2012, pp.313–316, (Aug., 2012).
Sho Endo, Yang Li, Naofumi Homma, Kazuo Sakiyama, Kazuo Ohta and Takafumi Aoki, “An Efficient Countermeasure against Fault Sensitivity Analysis Using Configurable Delay Blocks,” In Proc. Workshop on Fault Diagnosis and Tolerance in Cryptography (FDTC’12), IEEE, pp.95–102 (Sep., 2012).
Lei Wang, Yu Sasaki, Kazuo Sakiyama and Kazuo Ohta, “Cryptanalysis of 3D Cipher and 3D-based Hash Function,” In Proc. International Workshop on Security 2012 (IWSEC’12), LNCS 7631, Springer-Verlag, pp.170–181 (Nov., 2012).
Yu Sasaki, Lei Wang, Yasuhiro Takasaki, Kazuo Sakiyama, and Kazuo Ohta, “Boomerang Distinguishers for Full HAS-160 Compression Function,” In Proc. International Workshop on Security 2012 (IWSEC’12), LNCS 7631, Springer-Verlag, pp.156–169 (Nov., 2012).
Toshiki Nakasone, Yang Li, Yu Sasaki, Mitsugu Iwamoto, Kazuo Ohta, and Kazuo Sakiyama, “Key-Dependent Weakness of AES-Based Ciphers Under Clockwise Collision Distinguisher,” In Proc. International Conference on Information Security and Cryptology 2012 (ICISC’12), LNCS 7839, Springer-Verlag, pp.395–409 (Nov., 2012).
Yang Li, Kazuo Ohta, and Kazuo Sakiyama, “An Extension of Fault Sensitivity Analysis Based on Clockwise Collision,” In Proc. International Conferences on Information Security and Cryptology 2012 (Inscript’12), LNCS 7763, Springer-Verlag, pp.46–59 (Nov., 2012).
Yang Li, Sho Endo, Nicolas Debande, Naofumi Homma, Takafumi Aoki, Thanh-Ha Le, Jean-Luc Danger, Kazuo Ohta, Kazuo Sakiyama, “Exploring the Relations Between Fault Sensitivity and Power Consumption,” In Proc. Constructive Side-Channel Analysis and Secure Design (COSADE’13), LNCS 7864, Springer-Verlag, pp.137–153 (Mar., 2013).
Yu Sasaki, Yang Li, Hikaru Sakamoto and Kazuo Sakiyama, “Coupon Collector’s Problem for Fault Analysis — High Tolerance for Noisy Fault Injections,” In Proc. Financial Cryptography and Data Security 2013 (FC’13), LNCS 7859, Springer-Verlag, pp.213–220 (Apr., 2013).
Yu Sasaki, Wataru Komatsubara, Lei Wang, Mitsugu Iwamoto, Kazuo Ohta, and Kazuo Sakiyama, “Meet-in-the-Middle Preimage Attacks Revisited: New Results on MD5 and HAVAL,” In Proc. International Conference on Security and Cryptography (SECRYPT’13), SciTePress, pp.111–122 (Jul., 2013).
Toshiki Nakasone, Kazuo Sakiyama, Yang Li, and Kazuo Ohta, “Exploration of the CC-EMA Attack Towards Efficient Evaluation of EM Information Leakage,” In Proc. International Symposium on Electromagnetic Compatibility (EMC EUROPE) 2013, IEEE, pp.411–414 (Sep., 2013).