Yang Li, Kazuo Sakiyama, Shinichi Kawamura, Yuichi Komano, and Kazuo Ohta, “Security Evaluation of a DPA-resistant S-box Based on the Fourier Transform,” In Proc. International Conference on Information and Communications Security (ICICS’09), LNCS 5927, Springer-Verlag, pp.3–16 (Dec., 2009).
Bagus Santoso, Kazuo Ohta, Kazuo Sakiyama, and Goichiro Hanaoka, “Improving Efficiency of An ‘On the Fly’ Identification Scheme by Perfecting Zero-Knowledgeness,” In Proc. RSA Conference 2010, Cryptographer’s Track (CT-RSA’10), LNCS 5985, Springer-Verlag, pp.284–301 (Mar., 2010).
Masami Izumi, Jun Ikegami, Kazuo Sakiyama, and Kazuo Ohta, “Improved Countermeasure against Address-bit DPA for ECC Scalar Multiplication,” In Proc. Design, Automation and Test in Europe (DATE’10), ACM, pp.981–984 (Mar., 2010).
Yang Li, Kazuo Sakiyama, Lejla Batina, Daisuke Nakatsu, and Kazuo Ohta, “Power Variance Analysis Breaks a Masked ASIC Implementations of AES,” In Proc. Design, Automation and Test in Europe (DATE’10), ACM, pp.1059–1064 (Mar., 2010).
Kazuyuki Kobayashi, Jun Ikegami, Miroslav Knežević, Eric Xu Guo, Shin’ichiro Matsuo, Sinan Huan, Leyla Nazhandali, Ünal Kocabaş, Junfeng Fan, Akashi Satoh, Patrick Schaumont, Ingrid Verbauwhede, Kazuo Sakiyama, and Kazuo Ohta, “Prototyping Platform for Performance Evaluation of SHA-3 Candidates,” In Proc. International Symposium on Hardware-Oriented Security and Trust (HOST’10), IEEE, pp.60–63 (Jun., 2010).
Yang Li, Kazuo Sakiyama, Shigeto Gomisawa, Toshinori Fukunaga, Junko Takahashi, and Kazuo Ohta, “Fault Sensitivity Analysis,” In Proc. Workshop on Cryptographic Hardware and Embedded Systems (CHES’10), LNCS 6225, Springer-Verlag, pp.320–334 (Aug., 2010).
Daisuke Nakatsu, Yang Li, Kazuo Sakiyama, and Kazuo Ohta, “Combination of SW Countermeasure and CPU Modification on FPGA Against Power Analysis,” In Proc. International Workshop on Information Security Applications (WISA’10), LNCS 6513, Springer-Verlag, pp.258–272 (Aug., 2010).
Junko Takahashi, Toshinori Fukunaga, and Kazuo Sakiyama, “Fault Analysis on Stream Cipher MUGI,” In Proc. International Conference on Information Security and Cryptology (ICISC’10), LNCS 6829, Springer-Verlag, pp.420–434 (Dec. 2010).
Kazuo Sakiyama, Reina Yagasaki, Takanori Machida, Tatsuya Fujii, Noriyuki Miura, and Yu-ichi Hayashi, “Circuit-Level Information Leakage Prevention for Fault Detection,” In Proc. URSI Asia-Pacific Radio Science Conference (URSI AP-RASC’16), IEEE, pp.1271–1274 (Aug., 2016).
Momoka Kasuya, Takanori Machida, and Kazuo Sakiyama, “New Metric for Side-Channel Information Leakage: Case Study on EM Radiation from AES Hardware,” In Proc. URSI Asia-Pacific Radio Science Conference (URSI AP-RASC’16), IEEE, pp.1288–1291 (Aug., 2016).