| Publication | Date of Publication | Type |
|---|
Small instanton effects on composite axion mass Journal of High Energy Physics | 2024-09-20 | Paper |
| scientific article; zbMATH DE number 7594157 (Why is no real title available?) | 2022-09-28 | Paper |
On masked Galois-field multiplication for authenticated encryption resistant to side channel analysis Constructive Side-Channel Analysis and Secure Design | 2020-07-20 | Paper |
| A formal approach to designing multiple-valued arithmetic circuits | 2018-09-03 | Paper |
| A formal verification method of error correction code processors over Galois-field arithmetic | 2018-09-03 | Paper |
| Highly efficient \(\mathrm{GF}(2^8)\) inversion circuit based on redundant GF arithmetic and its application to AES design | 2018-02-14 | Paper |
High-Performance Hardware Architectures for Galois Counter Mode IEEE Transactions on Computers | 2017-08-08 | Paper |
A Systematic Approach for Designing Redundant Arithmetic Adders Based on Counter Tree Diagrams IEEE Transactions on Computers | 2017-08-08 | Paper |
Comparative Power Analysis of Modular Exponentiation Algorithms IEEE Transactions on Computers | 2017-07-27 | Paper |
Toward Formal Design of Practical Cryptographic Hardware Based on Galois Field Arithmetic IEEE Transactions on Computers | 2017-06-20 | Paper |
Formal Approach for Verifying Galois Field Arithmetic Circuits of Higher Degrees IEEE Transactions on Computers | 2017-06-08 | Paper |
Design methodology and validity verification for a reactive countermeasure against EM attacks Journal of Cryptology | 2017-05-22 | Paper |
A multiple-fault injection attack by adaptive timing control under black-box conditions and a countermeasure Constructive Side-Channel Analysis and Secure Design | 2016-03-10 | Paper |
Improved Power Analysis on Unrolled Architecture and Its Application to PRINCE Block Cipher Lecture Notes in Computer Science | 2016-02-22 | Paper |
EM attack is non-invasive? - design methodology and validity verification of EM attack sensor Advanced Information Systems Engineering | 2015-07-21 | Paper |
Security evaluation of cryptographic modules against profiling attacks Lecture Notes in Computer Science | 2013-06-04 | Paper |
High-Speed Pipelined Hardware Architecture for Galois Counter Mode Lecture Notes in Computer Science | 2008-06-24 | Paper |
| Design of multiple-valued arithmetic circuits using counter tree diagrams | 2008-03-06 | Paper |
| Design of a two-bit-per-cell content addressable memory using singe-electron transistors | 2008-03-06 | Paper |
Evolutionary synthesis of arithmetic circuit structures Artificial Intelligence Review | 2005-01-19 | Paper |
A Model for Biomolecular Computing Using Enzyme Transistors Interdisciplinary Information Sciences | 2002-12-10 | Paper |
Set-Valued Logic for Multiplex Computing: Toward New-Device-Based Superchips. Interdisciplinary Information Sciences | 2000-10-16 | Paper |
Beyond-Binary Arithmetic: Algorithms and VLSI Implementations. Interdisciplinary Information Sciences | 2000-08-15 | Paper |
| scientific article; zbMATH DE number 1423233 (Why is no real title available?) | 2000-05-29 | Paper |