2009

  • T. Katashita, A. Satoh, T. Sugawara, N. Homma, and T.Aoki, "Development of Side-Channel Attack Standard Evaluation Environment," European Conference on Circuit Theory and Design 2009 (ECCTD2009), August, 2009.
  • T. Sugawara, N. Homma, T. Aoki, and A. Satoh, "Differential Power Analysis of AES ASIC Implementations with Various S-box Circuits," European Conference on Circuit Theory and Design 2009 (ECCTD2009), August, 2009.
  • T. Sugawara, Y. Hayashi, N. Homma, T. Mizuki, T. Aoki, H. Sone, and A. Satoh, "Mechanism behind Information Leakage in Electromagnetic Analysis of Cryptographic Modules," 10th Workshop on Information Security Applications (WISA2009), August, 2009.
  • A. Satoh, T. Sugawara, N. Homma, and T. Aoki, "High-Performance Hardware Architectures for Galois Counter Mode", IEEE Trans. Computers, Vol. 58, No. 7, pp. 917--930, July, 2009
  • T. Sugawara, Y. Hayashi, N. Homma, T. Mizuki, T. Aoki, H. Sone, and A. Satoh, "Spectrum Analysis on Cryptographic Modules to Counteract Side-Channel Attacks," 2009 International Symposium on Electromagnetic Compatibility (EMC'09), July, 2009.
  • Y. Hayashi, T. Sugawara, Y. Kayano, N. Homma, T. Mizuki, A. Satoh, T. Aoki, S. Minegishi, H. Sone, and H. Inoue, "An Analysis of Information Leakage from a Cryptographic Hardware via Common-Mode Current," 2009 International Symposium on Electromagnetic Compatibility (EMC'09), July, 2009.
  • Y. Baba, A. Miyamoto, N. Homma, T. Aoki, "Multiple-Valued Constant-Power Adder for Cryptographic Processor," The 39th International Symposium on Multiple Valued Logic (ISMVL2009), pp. 239--244, May 2009.

2008

  • T. Sugawara, N. Homma, T. Aoki, and A. Satoh, "Compact ASIC Architectures for the 512-bit Hash Function Whirlpool," 9th Workshop on Information Security Applications (WISA2008), September, 2008, PDF.
  • A. Miyamoto, N. Homma, T. Aoki, and A. Satoh, "Chosen-Message SPA Attacks Against FPGA-Based RSA Hardware Implementation," Proceedings of the International Conference on Field Programmable Logic and Applications (FPL2008), pp.35--40, September 2008, PDF.
  • A. Satoh, T. Sugawara, N. Homma, and T. Aoki, "High-performance Concurrent Error Detection Scheme for AES Hardware," CHES2008, LNCS5154, pp. 100--112, August 2008.
  • N. Homma, A. Miyamoto, T. Aoki, A. Satoh, and A. Shamir, "Collision-based Power Analysis of Modular Exponentiation Using Chosen-message Pairs," CHES2008, LNCS5154, pp. 15--29, August 2008, PDF.
  • A. Miyamoto, N. Homma, T. Aoki, and A. Satoh, "Enhanced Power Analysis Attack Using Chosen Message against RSA Hardware Implementations," Proceedings of 2008 International Symposium on Circuits and Systems (ISCAS2008), pp. 3282--3285, May 2008, PDF.
  • T. Sugawara, N. Homma, T. Aoki, and A. Satoh, "High-performance ASIC Implementations of the 128-bit Block Cipher CLEFIA," Proceedings of 2008 International Symposium on Circuits and Systems (ISCAS2008), pp. 2925--2928, May 2008, PDF.
  • N. Homma, S. Nagashima, T. Sugawara, T. Aoki, and A. Satoh, "A High-Resolution Phase-Based Waveform Matching and Its Application to Side-Channel Attacks", IEICE Trans. Fundamentals, Special Section on Cryptography and Information Security, vol. E91-A, no. 1, pp. 193--202, January 2008, PDF.

2007

  • A. Satoh, T. Sugawara, and T. Aoki, "High-Speed Pipelined Hardware Architecture for Galois Counter Mode," 10th Information Security Conference (ISC2007), LNCS4779, pp. 118--129, Octobar 2007.
  • T. Sugawara, N. Homma, T. Aoki, and A. Satoh, "ASIC Performance Comparison for the ISO Standard Block Ciphers," The 2nd Joint Workshop on Information Security (JWIS2007), pp. 485--498, August 2007, PDF.
  • T. Sugawara, N. Homma, T. Aoki, and A. Satoh, "A High-Performance ASIC Implementation of the 64-bit Block Cipher CAST-128," Proceedings of 2007 International Symposium on Circuits and Systems (ISCAS2007), pp. 1859--1862, May 2007, PDF.
  • A. Miyamoto, N. Homma, T. Aoki, and A. Satoh, "SPA Against an FPGA-Based RSA Implementation with a High-Radix Montgomery Multiplier," Proceedings of 2007 International Symposium on Circuits and Systems (ISCAS2007), pp. 1847--1850, May 2007, PDF.
  • S. Nagashima, N. Homma, Y. Imai, T. Aoki, and A. Satoh, "DPA Using Phase-Based Waveform Matching against Random-Delay Countermeasure," Proceedings of 2007 International Symposium on Circuits and Systems (ISCAS2007), pp. 1807--1810, May 2007, PDF.

2006

  • N. Homma, S. Nagashima, Y. Imai, T. Aoki, and A. Satoh, "High-resolution Side-Channel Attack Using Phase-Based Waveform Matching," CHES2006, LNCS4249, pp. 187-200, 2006. PDF.
page top