Maki Tsukahara, Yusaku Harada, Haruka Hirata, Daiki Miyahara, Yang Li, Yuko Hara-Azumi, and Kazuo Sakiyama, “Practical Randomness Effects on Physical Security in Second-Order Threshold Implementation of AES,” IEICE Trans. Fundam. Electron. Commun. Comput. Sci., Vol.E108-A, No.3, pp.XXX-YYY (Mar., 2025).
Mingyu Yang, Tanvir Ahmed, Saya Inagaki, Kazuo Sakiyama, Yang Li, Yuko Hara-Azumi, “Hardware/Software Cooperative Design against Power Side-channel Attacks on IoT Devices”, IEEE Internet of Things Journal, Vol.11(9), pp.16758-16768 (May, 2024).
Haruka Hirata, Daiki Miyahara, Victor Arribas, Yang Li, Noriyuki Miura, Svetla Nikova, and Kazuo Sakiyama, “All You Need Is Fault: Zero-Value Attacks on AES and a New λ-Detection M&M,” Vol.2024, No.1, pp.133–156, 2023.
Léo Robert, Daiki Miyahara, Pascal Lafourcade, and Takaaki Mizuki, “Physical ZKP Protocols for Nurimisaki and Kurodoko,” Theoretical Computer Science, vol. 972, 114071 (Sep., 2023).
嶋野 裕一郎, 宮原 大輝, 崎山 一男, “スマートフォンを利用したサイドチャネル情報の取得に関する基礎研究,” 電気学会論文誌C(電子・情報・システム部門誌), 143巻, 12号, pp. 1180–1186 (Dec., 2023).
Saya Inagaki, Mingyu Yang, Yang Li, Kazuo Sakiyama, and Yuko Hara-Azumi, “Power Side-channel Attack Resistant Circuit Designs of ARX Ciphers Using High-level Synthesis,” ACM Trans. Embed. Comput. Syst., Vol.22, Issue 5, No.85, pp.1-17, (Sept., 2023).
Yang Li, Mengting Chen, Zhe Liu, and Jian Wang, “Reduction in the Number of Fault Injections for Blind Fault Attack on SPN Block Ciphers” ACM Transactions on Embedded Computing Systems (TECS), Vol.16(2), pp.1–20 (May., 2017).
Yang Li, Mengting Chen, and Jian Wang, “Another Security Evaluation of SPA Countermeasures for AES Key Expansion in IoT devices” Journal of Information Science & Engineering, Vol.33/ 4, pp.1085–1100 (Jul., 2017).
Sen Xu, Xiangjun Lu, Kaiyu Zhang, Yang Li, Lei Wang, Weijia Wang, Haihua Gu, Zheng Guo, Junrong Liu, and Dawu Gu, “Similar Operation Template Attack on RSA-CRT as a Case Study” Science China Information Sciences, Vol.61/ 32111, 17 pages (Mar., 2018).
Ruyan Wang, Xiaohan Meng, Yang Li, Jian Wang, “Towards Optimized DFA Attacks on AES under Multibyte Random Fault Model,” Security and Communication Networks, Vol.2018, 9 pages (Aug. 2018).