Naofumi Homma

From MaRDI portal
(Redirected from Person:704631)



List of research outcomes

This list is not complete and representing at the moment only items from zbMATH Open and arXiv. We are working on additional sources - please check back here soon!

PublicationDate of PublicationType
Fault-injection attacks against NIST's post-quantum cryptography round 3 KEM candidates
Lecture Notes in Computer Science
2023-05-12Paper
Single-trace side-channel analysis on polynomial-based MAC schemes2022-12-16Paper
scientific article; zbMATH DE number 7594157 (Why is no real title available?)2022-09-28Paper
High Throughput/Gate AES Hardware Architectures Based on Datapath Compression
IEEE Transactions on Computers
2020-10-02Paper
On masked Galois-field multiplication for authenticated encryption resistant to side channel analysis
Constructive Side-Channel Analysis and Secure Design
2020-07-20Paper
Tackling Biased PUFs Through Biased Masking: A Debiasing Method for Efficient Fuzzy Extractor
IEEE Transactions on Computers
2019-08-13Paper
A formal approach to designing multiple-valued arithmetic circuits2018-09-03Paper
A formal verification method of error correction code processors over Galois-field arithmetic2018-09-03Paper
Highly efficient \(\mathrm{GF}(2^8)\) inversion circuit based on redundant GF arithmetic and its application to AES design2018-02-14Paper
A Systematic Approach for Designing Redundant Arithmetic Adders Based on Counter Tree Diagrams
IEEE Transactions on Computers
2017-08-08Paper
Comparative Power Analysis of Modular Exponentiation Algorithms
IEEE Transactions on Computers
2017-07-27Paper
Toward Formal Design of Practical Cryptographic Hardware Based on Galois Field Arithmetic
IEEE Transactions on Computers
2017-06-20Paper
Formal Approach for Verifying Galois Field Arithmetic Circuits of Higher Degrees
IEEE Transactions on Computers
2017-06-08Paper
Design methodology and validity verification for a reactive countermeasure against EM attacks
Journal of Cryptology
2017-05-22Paper
A multiple-fault injection attack by adaptive timing control under black-box conditions and a countermeasure
Constructive Side-Channel Analysis and Secure Design
2016-03-10Paper
Improved Power Analysis on Unrolled Architecture and Its Application to PRINCE Block Cipher
Lecture Notes in Computer Science
2016-02-22Paper
EM attack is non-invasive? - design methodology and validity verification of EM attack sensor
Advanced Information Systems Engineering
2015-07-21Paper
Security evaluation of cryptographic modules against profiling attacks
Lecture Notes in Computer Science
2013-06-04Paper
Design of multiple-valued arithmetic circuits using counter tree diagrams2008-03-06Paper
Evolutionary synthesis of arithmetic circuit structures
Artificial Intelligence Review
2005-01-19Paper


Research outcomes over time


This page was built for person: Naofumi Homma