Sho Tada, Yuki Yamashita, Kohei Matsuda, Makoto Nagata, Kazuo Sakiyama, and Noriyuki Miura, “Design and concept proof of an inductive impulse self-destructor in sense-and-react countermeasure against physical attacks,” J. Appl. Phys. 60, SGGL01, 7pages, (Feb., 2021).
Go Takami, Takeshi Sugawara, Kazuo Sakiyama, and Yang Li, “Mixture-Based 5-Round Physical Attack against AES: Attack Proposal and Noise Evaluation,” IEICE Trans. Fundam. Electron. Commun. Comput. Sci., Vol.E105-A, No.3,, pp.289–299 (Mar., 2021).
Léo Robert, Daiki Miyahara, Pascal Lafourcade, Luc Libralesso, and Takaaki Mizuki, “Physical Zero-Knowledge Proof and NP-completeness Proof of Suguru Puzzle,” Information and Computation, Vol.285(B), 14pages (May., 2022).
Léo Robert, Daiki Miyahara, Pascal Lafourcade, and Takaaki Mizuki, “Card-Based ZKP for Connectivity: Applications to Nurikabe, Hitori, and Heyawake,” New Generation Computing, Vol.40, pp.149–171 (Mar., 2022).
Go Takatoi, Takeshi Sugawara, Kazuo Sakiyama, Yuko Hara-Azumi, and Yang Li, “The Limits of Timing Analysis and SEMA on Distinguishing Similar Activation Functions of Embedded Deep Neural Networks,” Appl. Sci. 2022, Vol.12(9), 4135 (Apr., 2022).
Kazuo Sakiyama, Lejla Batina, Bart Preneel, and Ingrid Verbauwhede, ” Multicore Curve-Based Cryptoprocessor with Reconfigurable Modular Arithmetic Logic Units over GF(2n),” IEEE Trans. Comput., Vol.56, No.9, pp.1269–1282 (Sep., 2007).
Junfeng Fan, Kazuo Sakiyama, and Ingrid Verbauwhede, “Elliptic Curve Cryptography on Embedded Multicore Systems,” Des. Autom. Embed. Syst., Vol.12, No.3, pp.231–242 (Sep., 2008).
Yong Ki Lee, Kazuo Sakiyama, Lejla Batina, and Ingrid Verbauwhede, “Elliptic Curve Based Security Processor for RFID,” IEEE Trans. Comput., Vol.57, No.11, pp.1514–1527 (Nov., 2008).
Kazuo Sakiyama and Kazuo Ohta, “On Clock-Based Fault Analysis Attack for an AES Hardware Using RSL,” IEICE Trans. Fundam. Electron. Commun. Comput. Sci., Vol.E93-A, No.1, pp.172–179 (Jan., 2010).
Lei Wang, Kazuo Ohta, Yu Sasaki, Kazuo Sakiyama, and Noboru Kunihiro, “Cryptanalysis of Two MD5-Based Authentication Protocols: APOP and NMAC,” IEICE Trans. Inf. Syst., Vol.E93-D, No.5, pp.1087–1095 (May, 2010).