K. Sakiyama

From MaRDI portal
Person:2384543



List of research outcomes

This list is not complete and representing at the moment only items from zbMATH Open and arXiv. We are working on additional sources - please check back here soon!

PublicationDate of PublicationType
Side-Channel Leakage of Alarm Signal for a Bulk-Current-Based Laser Sensor
Information Security and Cryptology
2022-10-14Paper
Multicore Curve-Based Cryptoprocessor with Reconfigurable Modular Arithmetic Logic Units over GF(2^n)
IEEE Transactions on Computers
2018-06-12Paper
Elliptic-Curve-Based Security Processor for RFID
IEEE Transactions on Computers
2017-08-08Paper
A technique using PUFs for protecting circuit layout designs against reverse engineering
Advances in Information and Computer Security
2015-05-27Paper
Key-Dependent Weakness of AES-Based Ciphers under Clockwise Collision Distinguisher
Lecture Notes in Computer Science
2013-06-04Paper
An extension of fault sensitivity analysis based on clockwise collision
Information Security and Cryptology
2013-05-28Paper
Boomerang distinguishers for full HAS-160 compression function
Advances in Information and Computer Security
2013-04-04Paper
Polynomial-advantage cryptanalysis of 3D cipher and 3D-based hash function
Advances in Information and Computer Security
2013-04-04Paper
Three-subset meet-in-the-middle attack on reduced XTEA
Progress in Cryptology - AFRICACRYPT 2012
2012-07-23Paper
New truncated differential cryptanalysis on 3D block cipher
Information Security Practice and Experience
2012-06-29Paper
Experimental verification of super-Sbox analysis -- confirmation of detailed attack complexity
Advances in Information and Computer Security
2011-11-10Paper
Fault analysis on stream cipher MUGI
Information Security and Cryptology - ICISC 2010
2011-10-27Paper
Uniqueness enhancement of PUF responses based on the locations of random outputting RS latches
Cryptographic hardware and embedded systems -- CHES 2011. 13th international workshop, Nara, Japan, September 28--October 1, 2011. Proceedings
2011-10-07Paper
(Second) preimage attacks on step-reduced RIPEMD/RIPEMD-128 with a new local-collision approach
Topics in Cryptology – CT-RSA 2011
2011-02-11Paper
Non-full-active Super-Sbox analysis: applications to ECHO and Grøstl
Advances in Cryptology - ASIACRYPT 2010
2010-12-07Paper
Improving Efficiency of an ‘On the Fly’ Identification Scheme by Perfecting Zero-Knowledgeness
Topics in Cryptology - CT-RSA 2010
2010-03-16Paper
Bit-Free Collision: Application to APOP Attack
Advances in Information and Computer Security
2009-10-28Paper
Fault Analysis Attack against an AES Prototype Chip Using RSL
Topics in Cryptology – CT-RSA 2009
2009-04-29Paper
Modular Reduction in GF(2 n ) without Pre-computational Phase
Arithmetic of Finite Fields
2008-08-19Paper
HW/SW co-design for public-key cryptosystems on the 8051 micro-controller
Computers and Electrical Engineering
2007-10-10Paper
Efficient and secure fingerprint verification for embedded devices
EURASIP Journal on Applied Signal Processing
2006-08-28Paper


Research outcomes over time


This page was built for person: K. Sakiyama