What a lovely hat
Is it made out of
tin foil
?
DBLP data
CryptoDB
Cryptobib
Kazuo Sakiyama
Google Scholar
36
publications in security and cryptology related venues
Year
Venue
Title
2025
conf/acns
Let's Share a Secret: Share-Reduced Design of M&M for the AES S-Box.
Haruka Hirata
Daiki Miyahara
Yuko Hara
Kazuo Sakiyama
Yang Li
2024
journals/tches
All You Need Is Fault: Zero-Value Attacks on AES and a New λ-Detection M&M.
Haruka Hirata
Daiki Miyahara
Victor Arribas
Yang Li
Noriyuki Miura
Svetla Nikova
Kazuo Sakiyama
2020
conf/acns
Simple Electromagnetic Analysis Against Activation Functions of Deep Neural Networks.
Go Takatoi
Takeshi Sugawara
Kazuo Sakiyama
Yang Li
2018
conf/ccs
Sensor CON-Fusion: Defeating Kalman Filter in Signal Injection Attack.
Shoei Nashimoto
Daisuke Suzuki
Takeshi Sugawara
Kazuo Sakiyama
2017
conf/wisa
Improved EM Side-Channel Authentication Using Profile-Based XOR Model.
Momoka Kasuya
Kazuo Sakiyama
2017
conf/wisa
Efficient Software Implementation of Modular Multiplication in Prime Fields on TI's DSP TMS320C6678.
Eito Miyamoto
Takeshi Sugawara
Kazuo Sakiyama
2017
conf/fdtc
Exploiting Bitflip Detector for Non-invasive Probing and its Application to Ineffective Fault Analysis.
Takeshi Sugawara
Natsu Shoji
Kazuo Sakiyama
Kohei Matsuda
Noriyuki Miura
Makoto Nagata
2016
conf/host
On-chip substrate-bounce monitoring for laser-fault countermeasure.
Kohei Matsuda
Noriyuki Miura
Makoto Nagata
Yu-ichi Hayashi
Tatsuya Fujii
Kazuo Sakiyama
2016
conf/iwsec
Deep-Learning-Based Security Evaluation on Authentication Systems Using Arbiter PUF and Its Variants.
Risa Yashiro
Takanori Machida
Mitsugu Iwamoto
Kazuo Sakiyama
2015
conf/iwsec
Artifact-Metric-Based Authentication for Bottles of Wine (Short Paper).
Reina Yagasaki
Kazuo Sakiyama
2014
conf/iwsec
A Technique Using PUFs for Protecting Circuit Layout Designs against Reverse Engineering.
Dai Yamamoto
Masahiko Takenaka
Kazuo Sakiyama
Naoya Torii
2013
conf/fc
Coupon Collector's Problem for Fault Analysis against AES - High Tolerance for Noisy Fault Injections.
Yu Sasaki
Yang Li
Hikaru Sakamoto
Kazuo Sakiyama
2012
journals/tifs
Information-Theoretic Approach to Optimal Differential Fault Analysis.
Kazuo Sakiyama
Yang Li
Mitsugu Iwamoto
Kazuo Ohta
2012
journals/tifs
New Fault-Based Side-Channel Attack Using Fault Sensitivity.
Yang Li
Kazuo Ohta
Kazuo Sakiyama
2012
conf/icisc
Key-Dependent Weakness of AES-Based Ciphers under Clockwise Collision Distinguisher.
Toshiki Nakasone
Yang Li
Yu Sasaki
Mitsugu Iwamoto
Kazuo Ohta
Kazuo Sakiyama
2012
conf/fdtc
An Efficient Countermeasure against Fault Sensitivity Analysis Using Configurable Delay Blocks.
Sho Endo
Yang Li
Naofumi Homma
Kazuo Sakiyama
Kazuo Ohta
Takafumi Aoki
2012
conf/iwsec
Polynomial-Advantage Cryptanalysis of 3D Cipher and 3D-Based Hash Function.
Lei Wang
Yu Sasaki
Kazuo Sakiyama
Kazuo Ohta
2012
conf/iwsec
Boomerang Distinguishers for Full HAS-160 Compression Function.
Yu Sasaki
Lei Wang
Yasuhiro Takasaki
Kazuo Sakiyama
Kazuo Ohta
2012
conf/africacrypt
Three-Subset Meet-in-the-Middle Attack on Reduced XTEA.
Yu Sasaki
Lei Wang
Yasuhide Sakai
Kazuo Sakiyama
Kazuo Ohta
2011
conf/fc
A Study on Computational Formal Verification for Practical Cryptographic Protocol: The Case of Synchronous RFID Authentication.
Yoshikazu Hanatani
Miyako Ohkubo
Shin'ichiro Matsuo
Kazuo Sakiyama
Kazuo Ohta
2011
conf/ches
Uniqueness Enhancement of PUF Responses Based on the Locations of Random Outputting RS Latches.
Dai Yamamoto
Kazuo Sakiyama
Mitsugu Iwamoto
Kazuo Ohta
Takao Ochiai
Masahiko Takenaka
Kouichi Itoh
2011
conf/ches
On the Power of Fault Sensitivity Analysis and Collision Side-Channel Attacks in a Combined Setting.
Amir Moradi
Oliver Mischke
Christof Paar
Yang Li
Kazuo Ohta
Kazuo Sakiyama
2011
conf/host
Revisit fault sensitivity analysis on WDDL-AES.
Yang Li
Kazuo Ohta
Kazuo Sakiyama
2011
conf/ctrsa
(Second) Preimage Attacks on Step-Reduced RIPEMD/RIPEMD-128 with a New Local-Collision Approach.
Lei Wang
Yu Sasaki
Wataru Komatsubara
Kazuo Ohta
Kazuo Sakiyama
2011
conf/fdtc
Fault Sensitivity Analysis Against Elliptic Curve Cryptosystems.
Hikaru Sakamoto
Yang Li
Kazuo Ohta
Kazuo Sakiyama
2011
conf/iwsec
Experimental Verification of Super-Sbox Analysis - Confirmation of Detailed Attack Complexity.
Yu Sasaki
Naoyuki Takayanagi
Kazuo Sakiyama
Kazuo Ohta
2010
conf/icisc
Fault Analysis on Stream Cipher MUGI.
Junko Takahashi
Toshinori Fukunaga
Kazuo Sakiyama
2010
conf/ches
Fault Sensitivity Analysis.
Yang Li
Kazuo Sakiyama
Shigeto Gomisawa
Toshinori Fukunaga
Junko Takahashi
Kazuo Ohta
2010
conf/host
Prototyping Platform for Performance Evaluation of SHA-3 Candidates.
Kazuyuki Kobayashi
Jun Ikegami
Kazuo Sakiyama
Kazuo Ohta
Miroslav Knezevic
Ünal Koçabas
Junfeng Fan
Ingrid Verbauwhede
Eric Xu Guo
Shin'ichiro Matsuo
Sinan Huang
Leyla Nazhandali
Akashi Satoh
2010
conf/wisa
Combination of SW Countermeasure and CPU Modification on FPGA against Power Analysis.
Daisuke Nakatsu
Yang Li
Kazuo Sakiyama
Kazuo Ohta
2010
conf/ctrsa
Improving Efficiency of an ‘On the Fly' Identification Scheme by Perfecting Zero-Knowledgeness.
Bagus Santoso
Kazuo Ohta
Kazuo Sakiyama
Goichiro Hanaoka
2010
conf/asiacrypt
Non-full-active Super-Sbox Analysis: Applications to ECHO and Grøstl.
Yu Sasaki
Yang Li
Lei Wang
Kazuo Sakiyama
Kazuo Ohta
2009
conf/icics
Security Evaluation of a DPA-Resistant S-Box Based on the Fourier Transform.
Yang Li
Kazuo Sakiyama
Shin-ichi Kawamura
Yuichi Komano
Kazuo Ohta
2009
conf/ctrsa
Fault Analysis Attack against an AES Prototype Chip Using RSL.
Kazuo Sakiyama
Tatsuya Yagi
Kazuo Ohta
2009
conf/iwsec
Bit-Free Collision: Application to APOP Attack.
Lei Wang
Yu Sasaki
Kazuo Sakiyama
Kazuo Ohta
2006
conf/ches
Superscalar Coprocessor for High-Speed Curve-Based Cryptography.
Kazuo Sakiyama
Lejla Batina
Bart Preneel
Ingrid Verbauwhede
Coauthors
Akashi Satoh
(1)
Amir Moradi
(1)
Bagus Santoso
(1)
Bart Preneel
(1)
Christof Paar
(1)
Dai Yamamoto
(2)
Daiki Miyahara
(2)
Daisuke Nakatsu
(1)
Daisuke Suzuki
(1)
Eito Miyamoto
(1)
Eric Xu Guo
(1)
Go Takatoi
(1)
Goichiro Hanaoka
(1)
Haruka Hirata
(2)
Hikaru Sakamoto
(2)
Ingrid Verbauwhede
(2)
Jun Ikegami
(1)
Junfeng Fan
(1)
Junko Takahashi
(2)
Kazuo Ohta
(22)
Kazuo Sakiyama
(36)
Kazuyuki Kobayashi
(1)
Kohei Matsuda
(2)
Kouichi Itoh
(1)
Lei Wang
(6)
Lejla Batina
(1)
Leyla Nazhandali
(1)
Makoto Nagata
(2)
Masahiko Takenaka
(2)
Miroslav Knezevic
(1)
Mitsugu Iwamoto
(4)
Miyako Ohkubo
(1)
Momoka Kasuya
(1)
Naofumi Homma
(1)
Naoya Torii
(1)
Naoyuki Takayanagi
(1)
Natsu Shoji
(1)
Noriyuki Miura
(3)
Oliver Mischke
(1)
Reina Yagasaki
(1)
Risa Yashiro
(1)
Shigeto Gomisawa
(1)
Shin'ichiro Matsuo
(2)
Shin-ichi Kawamura
(1)
Sho Endo
(1)
Shoei Nashimoto
(1)
Sinan Huang
(1)
Svetla Nikova
(1)
Takafumi Aoki
(1)
Takanori Machida
(1)
Takao Ochiai
(1)
Takeshi Sugawara
(4)
Tatsuya Fujii
(1)
Tatsuya Yagi
(1)
Toshiki Nakasone
(1)
Toshinori Fukunaga
(2)
Ünal Koçabas
(1)
Victor Arribas
(1)
Wataru Komatsubara
(1)
Yang Li
(14)
Yang Li
(1)
Yasuhide Sakai
(1)
Yasuhiro Takasaki
(1)
Yoshikazu Hanatani
(1)
Yu Sasaki
(9)
Yu-ichi Hayashi
(1)
Yuichi Komano
(1)
Yuko Hara
(1)
Filters
Crypto
Eurocrypt
Asiacrypt
Public Key Cryptography
Theory of Cryptography
Journal of Cryptology
Transactions on Symmetric Cryptology
Transactions on Cryptographic Hardware and Embedded Computing
Communications in Cryptology
Fast Software Encryption
Cryptographic Hardware and Embedded Computing Conference
Usenix Security
IEEE Security and Privacy
ACM CCS
Network and Distributed System Security
Financial cryptography
Cryptographer's Track at RSA Conference (CT-RSA)
ESORICS
IEEE Transactions on Information Forensics and Security
Computers & Security
Journal of Information Security and Applications
IEEE Conference on Blockchains and Cryptocurrency (ICBC)
Asia CCS
European Security & privacy
Symposium on Useful Privacy and Security
Privacy Enhancing Technologies
Security and Privacy in Communication Networks
Cryptology and Network Security
Annual Computer Security Applications Conference
Dependable Systems and Networks
IEEE Computer Security Foundations Workshop
IEEE Conference and Communications and Network Security
International Conference on Applied Cryptography and Network Security
Selected Areas in Cryptology
International Conference on Information Security and Cryptology (ICISC)
International Conference on Information and Communication (ICICS)
IFIP International Information Security Conference (SEC)
Conference on Security and Privacy in Wireless and Mobile Networks (WISEC)
IEEE International Symposium on Hardware Oriented Security and Trust
New Security Paradigms Workshop
Information Hiding and Multimedia Security Workshop
Australasian Conference on Information Security and Privacy
AfricaCrypt
LatinCrypt
International Conference on Cyber Security and Resilience
Asia Joint Conference on information Security
International Conference on information Security Applications
ACM Asia Public-Key Cryptography Workshop
International Workshop on Lightweight Cryptography for Security and Privacy
Workshop on Fault Detection and Tolerance in Cryptography
International Conference on Blockchain Technology and Emerging Technologies
Provable Security
Cloud Computing Security Workshop (CCSW)
International Workshop on Security (IWSEC)
International Conference on Information System Security (ICISS)
Select all
Unselect all
Years:
to