Mayu Nomura, Daiki Miyahara, Yang Li, and Kazuo Sakiyama, “A Case Study of Side-Channel Authentication Using Screaming Channel, ” 2024 IEEE 21th International Conference on Mobile Ad Hoc and Smart Systems (MASS), IEEE, pp.488-489, (Sep., 2024)
Runa Sako, Daiki Miyahara, Yang Li, and Kazuo Sakiyama, “Poster: Ascon-based Secure Physical Authentication with Relay-Attack Resistance, ” 2024 IEEE 21th International Conference on Mobile Ad Hoc and Smart Systems (MASS), IEEE, pp.486-487, (Sep., 2024).
Yuki Ikemoto, Soichiro Fujii, Kotaro Naruse, Jun Shiomi, Yoshihiro Midoh, Yuki Yamashita, Makoto Nagata, Yuichi Komano, Mitsugu Iwamoto, Kazuo Sakiyama, and Noriyuki Miura “Double-Sided Multimodal Attack Sensing and Partial Re-Keying in Shared Group Key System,” Proc. ESSERC, IEEE, (Sep., 2024).
Yuki Matsukawa, Daiki Miyahara, Takeshi Sugawara, Kazuo Sakiyama, and Yang Li, “Exploring Leakage Characteristics and Attacks through Profiles of Screaming Channels,” The 7th International Conference on Mobile Internet Security (MobiSec 2023), Springer, pp.152-164 (Dec., 2023).
Léo Robert, Daiki Miyahara, Pascal Lafourcade, and Takaaki Mizuki, “Hide a liar: Card-Based ZKP Protocol for Usowan,” In Proc. Annual Conference on Theory and Applications of Models of Computation (TAMC 2022), LNCS 13571, Springer-Verlag, pp.201–217 (Aug. 2022).
Momoka Kasuya, Nobuyoshi Morita, Hiroki Yamazaki, and Kazuo Sakiyama, “Automated Extraction for Vulnerability Management on PSIRT: A Case Study of Automotive Industry,” In Proc. International Symposium on Computing and Networking, CANDAR Workshops (CANDARW’23), IEEE, pp.232–238 (Nov., 2023).
Maki Tsukahara, Haruka Hirata, Mingyu Yang, Daiki Miyahara, Yang Li, Yuko Hara-Azumi, and Kazuo Sakiyama, “On the Practical Dependency of Fresh Randomness in AES S-box with Second-Order TI,” In Proc. International Symposium on Computing and Networking, CANDAR Workshops (CANDARW’23), IEEE, pp.286–291 (Nov., 2023).
Mengting Chen, Yang Li, and Jian Wang, “Another SPA Key Recovery Against Random Order Countermeasures for AES Key Expansion”, In Proc. International Conference on Cloud Computing and Security (ICCCS’16), LNCS 10039, Springer-Verlag, pp.322–334 (Jun., 2016).
Yang Li, Mengting Chen, and Jian Wang, “Introduction to side-channel attacks and fault attacks,” In Proc. Electromagnetic Compatibility 2016 Asia-Pacific International Symposium (APEMC’16), IEEE, pp.573–575 (Sep. 2016).
Shuang Wang, Yang Li, and Jian Wang, “A New Key Rank Estimation Method to Investigate Dependent Key Lists of Side Channel Attacks” In Proc. Asian Hardware Oriented Security and Trust Symposium (AsianHOST’17), IEEE, pp.1–6 (Oct., 2017).