Dai Yamamoto, Kazuo Sakiyama, Mitsugu Iwamoto, Kazuo Ohta, Takao Ochiai, Masahiko Takenaka, and Kouichi Itoh, “Uniqueness Enhancement of PUF Responses Based on the Locations of Random Outputting RS Latches,” In Proc. Workshop on Cryptographic Hardware and Embedded Systems (CHES’11), LNCS 6917, Springer-Verlag, pp.390–406 (Sep., 2011).
Yu-ichi Hayashi, Shigeto Gomisawa, Yang Li, Naofumi Homma, Kazuo Sakiyama, Takafumi Aoki, and Kazuo Ohta, “Intentional Electromagnetic Interference for Fault Analysis on AES Block Cipher IC,” In Proc. International Workshop on Electromagnetic Compatibility of Integrated Circuits (EMCCOMPO’11), IEEE, pp.235–240 (Nov., 2011).
Yu Sasaki, Naoyuki Takayanagi, Kazuo Sakiyama, and Kazuo Ohta, “Experimental Verification of Super-Sbox Analysis — Confirmation of Detailed Attack Complexity,” In Proc. International Workshop on Security 2011 (IWSEC’11), LNCS 7038, Springer-Verlag, pp.178–192, (Nov., 2011).
Takuma Koyama, Lei Wang, Yu Sasaki, Kazuo Sakiyama, Kazuo Ohta, “New Truncated Differential Cryptanalysis on 3D Block Cipher,” In Proc. International Conference on Information Security Practice and Experience (ISPEC’12), LNCS 7232, Springer-Verlag, pp.109–125 (Apr., 2012).
Yu Sasaki, Lei Wang, Yasuhide Sakai, Kazuo Sakiyama, and Kazuo Ohta, “Three-Subset Meet-in-the-Middle Attack on Reduced XTEA,” In Proc. International Conference on Cryptology in Africa (Africacrypt’12), LNCS 7374, Springer-Verlag, pp.138–154 (Jul., 2012).
Sho Endo, Yuichi Hayashi, Naofumi Homma, Takafumi Aoki, Toshihiro Katashita, Yohei Hori, Kazuo Sakiyama, Makoto Nagata, Jean-Luc Danger, Thanh-Ha Le and Pirouz Bazargan Sabet, “Measurement of Side-Channel Information from Cryptographic Devices on Security Evaluation Platform: Demonstration of SPACES Project,” SICE Annual Conference 2012, pp.313–316, (Aug., 2012).
Sho Endo, Yang Li, Naofumi Homma, Kazuo Sakiyama, Kazuo Ohta and Takafumi Aoki, “An Efficient Countermeasure against Fault Sensitivity Analysis Using Configurable Delay Blocks,” In Proc. Workshop on Fault Diagnosis and Tolerance in Cryptography (FDTC’12), IEEE, pp.95–102 (Sep., 2012).
Lei Wang, Yu Sasaki, Kazuo Sakiyama and Kazuo Ohta, “Cryptanalysis of 3D Cipher and 3D-based Hash Function,” In Proc. International Workshop on Security 2012 (IWSEC’12), LNCS 7631, Springer-Verlag, pp.170–181 (Nov., 2012).
Yu Sasaki, Lei Wang, Yasuhiro Takasaki, Kazuo Sakiyama, and Kazuo Ohta, “Boomerang Distinguishers for Full HAS-160 Compression Function,” In Proc. International Workshop on Security 2012 (IWSEC’12), LNCS 7631, Springer-Verlag, pp.156–169 (Nov., 2012).
Toshiki Nakasone, Yang Li, Yu Sasaki, Mitsugu Iwamoto, Kazuo Ohta, and Kazuo Sakiyama, “Key-Dependent Weakness of AES-Based Ciphers Under Clockwise Collision Distinguisher,” In Proc. International Conference on Information Security and Cryptology 2012 (ICISC’12), LNCS 7839, Springer-Verlag, pp.395–409 (Nov., 2012).