Daisuke Fujimoto, Takumi Okamoto, Yang Li, Youngwoo Kim, and Yuichi Hayashi, ”Evaluation of Statistical Fault Analysis using Input Timing Violation of Sequential Circuit on Cryptographic Module under IEM” Transactions on Electromagnetic Compatibility, 7 pages, accepted.
Young-Jae Cho, Takashi Hirakawa, Kazuo Sakiyama, Hiroaki Okamoto, and Yoshihiro Hamakawa, “ZnF2:Gd Thin Film Electroluminescent Device,” Appl. Surf. Sci., Vol.113/114 (1997), pp.705–708 (Apr., 1997).
Young-Jae Cho, Takashi Hirakawa, Kazuo Sakiyama, Hiroaki Okamoto, and Yoshihiro Hamakawa, “EL/PL hybrid device enhanced by UV emission from ZnF2:Gd thin film electroluminescence,” J. Korean. Phys. Soc., Vol.30(1997), pp.S65–S68 (Jun., 1997).
Shenglin Yang, Kazuo Sakiyama, and Ingrid Verbauwhede, ”Efficient and Secure Fingerprint Verification for Embedded Devices, EURASIP J. Appl. Signal Process., Vol.2006, No.1–11 (May, 2006).
Kazuo Sakiyama, Nele Mentens, Lejla Batina, Bart Preneel, and Ingrid Verbauwhede, “Reconfigurable Modular Arithmetic Logic Unit Supporting High-performance RSA and ECC over GF(p),” Int. J. Electron., Vol.94, No.5, pp.501–514 (May, 2007).
Kazuo Sakiyama, Lejla Batina, Bart Preneel, and Ingrid Verbauwhede, “High-performance Public-key Cryptoprocessor for Wireless Mobile Applications,” Mob. Netw. Appl., Vol.12, No.4, pp.245–258 (Aug., 2007).
Kazuo Sakiyama, Lejla Batina, Bart Preneel, and Ingrid Verbauwhede, ”HW/SW Co-design for Public-Key Cryptosystems on the 8051 Micro-controller, Comput. Electr. Eng., Vol.33, No.5–6, pp.324–332 (Sep., 2007).
Kazuo Sakiyama, Tatsuya Fujii, Kohei Matsuda, and Noriyuki Miura, “Flush Code Eraser: Fast Attack Response Invalidating Cryptographic Sensitive Data,” IEEE Embedded Systems Letters, Vol.12, Issue 2, pp.37–40 (Jun., 2020).
Yuichi Komano, Kazuo Ohta, Kazuo Sakiyama, Mitsugu Iwamoto, and Ingrid Verbauwhede, “Single-Round Pattern Matching Key Generation Using Physically Unclonable Function,” Security and Communication Networks, vol.2019, Article ID 1719585, 13 pages (Jan., 2019).
Takeshi Sugawara, Yang Li, and Kazuo Sakiyama, “Probing Attack of Share-Serial Threshold Implementation of AES,” IET Electronics Letters, Vol.55, Issue 9, pp.517–519 (May, 2019).