Samuel Hand, Alexander Koch, Pascal Lafourcade Daiki Miyahara, and Léo Robert, “Check Alternating Patterns: A Physical Zero-Knowledge Proof for Moon-or-Sun,” In Proc. International Workshop on Security (IWSEC’23), LNCS 14128, Springer-Verlag, pp.255–272 (Aug., 2023).
Lei Wang, Yu Sasaki, Kazuo Sakiyama, and Kazuo Ohta, “Bit-Free Collision: Application to APOP Attack,” In Proc. International Workshop on Security 2009 (IWSEC’09), LNCS 5824, Springer-Verlag, pp.3–21 (Oct., 2009).
Yang Li, Kazuo Sakiyama, Shinichi Kawamura, Yuichi Komano, and Kazuo Ohta, “Security Evaluation of a DPA-resistant S-box Based on the Fourier Transform,” In Proc. International Conference on Information and Communications Security (ICICS’09), LNCS 5927, Springer-Verlag, pp.3–16 (Dec., 2009).
Bagus Santoso, Kazuo Ohta, Kazuo Sakiyama, and Goichiro Hanaoka, “Improving Efficiency of An ‘On the Fly’ Identification Scheme by Perfecting Zero-Knowledgeness,” In Proc. RSA Conference 2010, Cryptographer’s Track (CT-RSA’10), LNCS 5985, Springer-Verlag, pp.284–301 (Mar., 2010).
Masami Izumi, Jun Ikegami, Kazuo Sakiyama, and Kazuo Ohta, “Improved Countermeasure against Address-bit DPA for ECC Scalar Multiplication,” In Proc. Design, Automation and Test in Europe (DATE’10), ACM, pp.981–984 (Mar., 2010).
Yang Li, Kazuo Sakiyama, Lejla Batina, Daisuke Nakatsu, and Kazuo Ohta, “Power Variance Analysis Breaks a Masked ASIC Implementations of AES,” In Proc. Design, Automation and Test in Europe (DATE’10), ACM, pp.1059–1064 (Mar., 2010).
Kazuyuki Kobayashi, Jun Ikegami, Miroslav Knežević, Eric Xu Guo, Shin’ichiro Matsuo, Sinan Huan, Leyla Nazhandali, Ünal Kocabaş, Junfeng Fan, Akashi Satoh, Patrick Schaumont, Ingrid Verbauwhede, Kazuo Sakiyama, and Kazuo Ohta, “Prototyping Platform for Performance Evaluation of SHA-3 Candidates,” In Proc. International Symposium on Hardware-Oriented Security and Trust (HOST’10), IEEE, pp.60–63 (Jun., 2010).
Yang Li, Kazuo Sakiyama, Shigeto Gomisawa, Toshinori Fukunaga, Junko Takahashi, and Kazuo Ohta, “Fault Sensitivity Analysis,” In Proc. Workshop on Cryptographic Hardware and Embedded Systems (CHES’10), LNCS 6225, Springer-Verlag, pp.320–334 (Aug., 2010).
Daisuke Nakatsu, Yang Li, Kazuo Sakiyama, and Kazuo Ohta, “Combination of SW Countermeasure and CPU Modification on FPGA Against Power Analysis,” In Proc. International Workshop on Information Security Applications (WISA’10), LNCS 6513, Springer-Verlag, pp.258–272 (Aug., 2010).
Junko Takahashi, Toshinori Fukunaga, and Kazuo Sakiyama, “Fault Analysis on Stream Cipher MUGI,” In Proc. International Conference on Information Security and Cryptology (ICISC’10), LNCS 6829, Springer-Verlag, pp.420–434 (Dec. 2010).