Marika Yabu, Kazuo Sakiyama, and Takeshi Sugawara, “Low-Memory Implementation of Authenticated Encryption Algorithm SAEAES on ARM Cortex-M0 Microcontroller,” In Proc. Global Conference on Consumer Electronics (GCCE’20), IEEE, pp.181-185, (Oct., 2020).
Go Takatoi, Takeshi Sugawara, Kazuo Sakiyama, and Yang Li, “Simple Electromagnetic Analysis Against Activation Functions of Deep Neural Networks,” In Proc. Artificial Intelligence in Hardware Security (AIHWS’20), LNCS 12418, Springer-Verlag, pp.181-197, (Oct., 2020).
Tomoki Uemura, Yohei Watanabe, Yang Li, Noriyuki Miura, Iwamoto Mitsugu, Kazuo Sakiyama, and Kazuo Ohta, “A Key Recovery Algorithm Using Random Key Leakage from AES Key Schedule,” In Proc. The International Symposium on Information Theory and Its Applications, (ISITA’20), IEEE, pp.382–386 (Oct., 2020).
Annjhih Hsiao, Takao Takenouchi, Hiroaki Kikuchi, Kazuo Sakiyama, and Noriyuki Miura, “More Accurate and Robust PRNU-based Source Camera Identification with 3-Step 3-Class Approach,” In Proc. International Workshop on Digital-forensics and Watermarking (IWDW’21), LNCS 13180,Springer-Verlag, pp.87–101 (Nov., 2021).
Rei Kudo, Takeshi Sugawara, Kazuo Sakiyama, Yuko Hara-Azumi, and Yang Li, “Revisiting System Noise in Side-Channel Attacks: Mutual Assistant SCA vs. Genetic Algorithm,” Asian Hardware Oriented Security and Trust Symposium (AsianHOST’21), IEEE, pp.1–6 (Dec., 2021).
Saya Inagaki, Mingyu Yang1, Yang Li, Kazuo Sakiyama, and Yuko Hara-Azumi, “Examining Vulnerability of HLS-designed Chaskey-12 Circuits to Power Side-Channel Attacks,” International Symposium on Quality Electronic Design (ISQED’22), IEEE, 1page (Apr., 2022).
Tomoaki Kitahara, Ryota Hira, Yuko Hara-Azumi, Daiki Miyahara, Yang Li, and Kazuo Sakiyama, “Optimized Software Implementations of Ascon, Grain-128AEAD, and TinyJambu on ARM Cortex-M,” In Proc. International Symposium on Computing and Networking, CANDAR Workshops (CANDARW’22), IEEE, pp.316–322 (Nov., 2022).
Masahisa Shimano, Kazuo Sakiyama, and Daiki Miyaha, “Towards Verifying Physical Assumption in Card-Based Cryptography,” In Proc. International Conference on Security for Information Technology and Communications (SecITC’22), LNCS 13809, Springer-Verlag, pp.289–305 (May, 2023).
Yuichi Komano, Mitsugu Iwamoto, Kazuo Ohta, and Kazuo Sakiyama, “Lightweight Authentication Using Noisy Key Derivedfrom Physically Unclonable Function,” In Proc. International Conference on Security for Information Technology and Communications (SecITC’22), LNCS 13809, Springer-Verlag, pp.203–221 (May, 2023).
Young-Jae Cho, Takashi Hirakawa, Kazuo Sakiyama, Hiroaki Okamoto and Yoshihiro Hamakawa, “ZnF2:Gd Thin Film Electroluminescent Devices,” 8th International Conference Solid Films and Surface, Osaka, Japan (Jul., 1996).