Publications


Papers

  • Naofumi Homma, Yu-ichi Hayashi, Noriyuki Miura, Daisuke Fujimoto, Makoto Nagata, and Takafumi Aoki, "Design Methodology and Validity Verification for a Reactive Countermeasure against EM Attacks," Journal of Cryptology, DOI:10.1007/s00145-015-9223-3 (in press)

  • Yuichi Hayashi, Naofumi Homma, Takaaki Mizuki, Takafumi Aoki, Hideaki Sone, "Efficient Electromagnetic Analysis for Cryptographic Module on the Frequency Domain," IEEJ Transactions on Fundamentals and Materials, Vol. 135, No. 9, pp. 515--521, September 2015. (in Japanese)

  • Sho Endo, Yang Li, Naofumi Homma, Kazuo Sakiyama, Kazuo Ohta, Daisuke Fujimoto, Makoto Nagata, Toshihiro Katashita, Jean-Luc Danger, and Takafumi Aoki, "A Silicon-level Countermeasure against Fault Sensitivity Analysis and Its Evaluation," IEEE Transactions on Very Large Scale Integration Systems, Vol.23, No.8, pp.1429--1438 2015.

  • Hajime Uno, Sho Endo Naofumi Homma, Yu-ichi Hayashi, and Takafumi Aoki, "Electromagnetic Analysis against Public-Key Cryptographic Software on Embedded OS," IEICE Transactions on Communications, Vol.E98-B, No. 7, pp.1242-1249, July 2015.

  • Yuichi Hayashi, Naofumi Homma, Takaaki Mizuki, Takafumi Aoki, Hideaki Sone, "Fundamental Study on a Mechanism of Faulty Outputs from Cryptographic Modules due to IEMI," IEEJ Transactions on Fundamentals and Materials, Vol. 135, No. 5, pp. 276--281, May 2015. (in Japanese)

  • Rei Ueno, Naofumi Homma, and Takafumi Aoki, "Efficient DFA on SPN-Based Block Ciphers and Its Application to the LED Block Cipher," IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences, Vol. E98-A, No. 1, pp. 182--191, January 2015.

  • Sho Endo, Naofumi Homma, Yu-ichi Hayashi, Junko Takahashi, Hitoshi Fuji, and Takafumi Aoki, "An Adaptive Multiple-fault Injection Attack on Microcontrollers and a Countermeasure," IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences, Vol. E98-A, No. 1, pp. 171--181, January 2015.

  • Kazuya Saito, Naofumi Homma, and Takafumi Aoki, "A Formal Approach to Designing Multiple-Valued Arithmetic Circuits," Journal of Multiple-Valued Logic and Soft Computing, Vol. 24, No. 1-4, pp. 21--34, 2015.

  • Naofumi Homma, Kazuya Saito, and Takafumi Aoki, "Toward Formal Design of Practical Cryptographic Hardware Based on Galois Field Arithmetic," IEEE Transactions on Computers, Vol. 63, No. 10, pp. 2604--2613, 2014.

  • Kotaro Okamoto, Naofumi Homma, and Takafumi Aoki, "Formal design of arithmetic circuits over Galois fields based on normal basis representations," IEICE Transactions on Information and Systems, Vol.E97-D, No.9, pp.2270-2277, Sep. 2014.

  • Kazuo Sakiyama, Yang Li, Shigeto Gomisawa, Yu-ichi Hayashi, Mitsugu Iwamoto, Naofumi Homma, Takafumi Aoki, and Kazuo Ohta, "Practical DFA Strategy for AES Under Limited-Access Conditions," Journal of Information Processing Vol. 22, No. 2, pp. 142--151, 2014.

  • Daisuke Fujimoto, Noriyuki Miura, Makoto Nagata, Yuichi Hayashi, Naofumi Homma, Takafumi Aoki, Yohei Hori, Toshihiro Katashita, Kazuo Sakiyama, Thanh-Ha Le, Julien Bringer, Pirouz Bazargan-Sabet, Shivam Bhasin, Jean-Luc Danger, "Power Noise Measurements of Cryptographic VLSI Circuits Regarding Side-Channel Information Leakage," IEICE Transactions on Electronics, Vol. E97-C, No. 4, pp. 272 --279, April 2014.

  • Takafumi Hibiki, Naofumi Homma, Yuto Nakano, Kazuhide Fukushima, Shinsaku Kiyomoto, Yutaka Miyake, and Takafumi Aoki "Chosen-IV Correlation Power Analysis on KCipher-2 Hardware and a Masking-based Countermeasure," IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences Vol. E97-A, No. 1, pp. 157--166, January 2014.

  • Laurent Sauvage, Jean-Luc Danger, Sylvain Guilley, Naofumi Homma, and Yuichi Hayashi, "Advanced Analysis of Faults Injected Through Conducted Intentional Electromagnetic Interferences," IEEE Transactions on Electromagnetic Compatibility, Vol. 55, No. 3, pp. 589--596, June 2013.

  • Yuichi Hayashi, Naofumi Homma, Takaaki Mizuki, Takafumi Aoki, Hideaki Sone, Laurent Sauvage, and Jean-Luc Danger, "Analysis of Electromagnetic Information Leakage from Cryptographic Devices with Different Physical Structures," IEEE Transactions on Electromagnetic Compatibility, Vol. 55, No. 3, pp. 571--580, June 2013.

  • Yu-ichi Hayashi, Naofumi Homma, Takaaki Mizuki, Haruki Shimada, Takafumi Aoki, Hideaki Sone, Laurent Sauvage, and Jean-Luc Danger, "Efficient Evaluation of EM Radiation Associated with Information Leakage from Cryptographic Devices," IEEE Transactions on Electromagnetic Compatibility, Vol. 55, No. 3, pp. 555--563, June 2013.

  • Yuichi Hayashi, Naofumi Homma, Takashi Watanabe, William O. Price, and William A. Radasky, "Introduction to the Special Section on Electromagnetic Information Security," IEEE Transactions on Electromagnetic Compatibility, Vol. 55, No. 3, pp. 539--546, June 2013.

  • Haruki Shimada, Yuichi Hayashi, Naofumi Homma, Takaaki Mizuki, Takafumi Aoki, and Hideaki Sone, "Efficient Safety Evaluation of EM Information Leakage Using a Selected-Data Set," IEICE Transactions B, Vol. J96-B, No.4, pp. 467-475, April 2013 (in Japanese).

  • Yuichi Hayashi, Naofumi Homma, Takaaki Mizuki, Takafumi Aoki, and Hideaki Sone, "Transient IEMI Threats for Cryptographic Devices," IEEE Transactions on Electromagnetic Compatibility, Vol. 55, No. 1, pp. 140--148, February 2013.

  • Yuichi Hayashi, Naofumi Homma, Takaaki Mizuki, Takeshi Sugawara, Yoshiki Kayano, Takafumi Aoki, Shigeki Minegishi, Akashi Satoh, Hideaki Sone, and Hiroshi Inoue, "Evaluation of Information Leakage from Cryptographic Hardware via Common-Mode Current," IEICE Transactions on Electronics, Vol.E95-C,No.6,pp. 1089--1097, June 2012.

  • Miroslav Knezevic, Kazuyuki Kobayashi, Jun Ikegami, Shin'ichiro Matsuo, Akashi Satoh, Unal Kocabas, Junfeng Fan, Toshiro Katashita, Takeshi Sugawara, Kazuo Sakiyama, Ingrid Verbauwhede, Kazuo Ohta, Naofumi Homma, Takafumi Aoki, "Fair and Consistent Hardware Evaluation of Fourteen Round Two SHA-3 Candidates," IEEE Transactions on Very Large Scale Integration Systems, Vol. 20, No. 5, pp. 827--840, May 2012.

  • Naofumi Homma, Kazuya Saito, and Takafumi Aoki, "A Formal Approach to Designing Cryptographic Processors Based on GF(2^m) Arithmetic Circuits," IEEE Transactions on Information Forensics & Security, Vol. 7, No. 1, pp. 3--13, February 2012.

  • Sho Endo, Takeshi Sugawara, Naofumi Homma, Takafumi Aoki, Akashi Satoh, "A configurable on-chip glitchy-clock generator for fault injection experiments," IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences, Vol. E95-A, No. 1 pp. 263--266, January 2012.

  • Toshihiro Katashita, Akashi Satoh, Takeshi Sugawara,Naofumi Homma, and Takafumi Aoki, "Hardware Implementations of Hash Function Luffa," IPSJ Journal, Vol. 52, No. 12, pp. 3755--3765, December 2011. (Recommended paper) (in Japanese)

  • Sho Endo, Naofumi Homma, Takeshi Sugawara, Takafumi Aoki and Akashi, "An On-chip Glitchy-clock Generator for Testing Fault Injection Attacks," Journal of Cryptographic Engineering, Vol. 1, No. 4, pp. 265-270, December 2011.

  • Takeshi Sugawara, Naofumi Homma, Takafumi Aoki, and Akashi Satoh, "High-performance Architecture for Concurrent Error Detection for AES Processors," IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences, Vol. E94-A, No.10, pp. 1971-1980, October 2011.

  • Atsushi Miyamoto, Naofumi Homma, Takafumi Aoki, and Akashi Satoh, "Systematic design of RSA processors based on high-radix Montgomery multipliers," IEEE Transactions on Very Large Scale Integration Systems, Vol. 19, No. 7, pp. 1136--1146, July 2011.

  • Yuichi Baba, Atsushi Miyamoto, Naofumi Homma, Takafumi Aoki and Akashi Satoh, "Design and Evaluation of RSA Processor Generation System," IPSJ Journal, Vol. 51, No. 9, pp. 1847--1858, September 2010. (Recommended paper) (in Japanese)

  • Takeshi Sugawara, Naofumi Homma, Takafumi Aoki, and Akashi Satoh, "Profiling attack using multivariate regression analysis," IEICE Electronics Express, Vol. 7, No. 15, pp. 1139--1144, August 2010.

  • Naofumi Homma, Yuichi Baba, Atsushi Miyamoto, and Takafumi Aoki, "Multiple-Valued Constant-Power Adder and Its Application to Cryptographic Processor," IEICE Transactions on Information and Systems, Vol. E93-D, No. 8, pp. 2117-2125, August 2010.

  • Naofumi Homma, Atsushi Miyamoto, Takafumi Aoki, Akashi Satoh, and Adi Shamir, "Comparative Power Analysis of Modular Exponentiation Algorithms," IEEE Transactions on Computers, Vol. 59, No. 6, pp. 795--807, June 2010.

  • Naofumi Homma, Takafumi Aoki, and Akashi Satoh, "Side Channel Attack on Cryptographic Modules and Its Security Evaluation," IEICE Transactions A, Vol. J93-A, No. 2, pp. 42--51, February 2010. (Invited paper) (in Japanese)

  • Atsushi Miyamoto, Naofumi Homma, Takafumi Aoki, and Akashi Satoh, "Evaluation of Chosen-Message SPA Attacks against FPGA Implementations of RSA Processors," IEICE Transactions D, Vol. J92-D, No. 12, pp. 2168--2180, December 2009. (in Japanese)

  • Takeshi Sugawara, Naofumi Homma, Takafumi Aoki, and Akashi Satoh, "High Scalable Circuit Architectures of the Hash Function Whirlpool," IPSJ Journal, Vol. 50, No. 11, pp. 2618--2632, November 2009. (in Japanese)

  • Naofumi Homma, Yuki Watanabe, Katsuhiko Degawa, Takafumi Aoki, Tatsuo Higuchi, "Systematic approach to designing multiple-valued arithmetic circuits based on arithmetic description language," Journal of Multiple-Valued Logic and Soft Computing, Vol. 15, No. 4, pp. 329--340, 2009.

  • Naofumi Homma, Takafumi Aoki, and Tatsuo Higuchi, "A Systematic Approach for Designing Redundant Arithmetic Adders Based on Counter Tree Diagrams," IEEE Transactions on Computers, Vol. 57, No. 12, pp. 1633--1646, December 2008.

  • Yuki Watanabe, Naofumi Homma, Takafumi Aoki, and Tatsuo Higuchi, "Arithmetic Circuit Verification Based on Symbolic Computer Algebra," IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences, Vol. E91-A, No. 10, pp. 3038--3046, October 2008.

  • Naofumi Homma, Sei Nagashima, Takeshi Sugawara, Takafumi Aoki, Akashi Satoh, "A high-resolution phase-based waveform matching and its application to side-channel attacks," IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences, Vol. E91-A, No. 1, pp. 193--202, January 2008.

  • Naofumi Homma, Katsuhiko Degawa, Takafumi Aoki, Tatsuo Higuchi, "Design of multiple-valued arithmetic circuits using counter tree diagrams," Journal of Multiple-Valued Logic and Soft Computing, Vol. 13, No. 4-6, pp. 487--502, November 2007.

  • Masanori Natsui, Yoshiaki Tadokoro, Naofumi Homma, Takafumi Aoki, and Tatsuo Higuchi, "Synthesis of current mirrors based on evolutionary graph generation with transmigration capability," IEICE Electronics Express, Vol. 4, No. 3, pp. 88--93, January 2007.

  • Naofumi Homma, Yuki Watanabe, Takafumi Aoki, and Tatsuo Higuchi, "Formal Design of Arithmetic Circuits Based on Arithmetic Description Language," IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences, Vol. E89-A, No. 12, pp. 3500--3509, December 2006.

  • Naofumi Homma, Takafumi Aoki, and Tatsuo Higuchi, "Systematic interpretation of redundant arithmetic adders in binary and multiple-valued logic," IEICE Transactions on Electronics, Vol. E89-C, No. 11, pp. 1645 --1654, November 2006.

  • Masanori Natsui, Naofumi Homma, Takafumi Aoki, and Tatsuo Higuchi, "Design of Multiple-Valued Logic Circuits Using Graph-Based Evolutionary Synthesis," Journal of Multiple-Valued Logic and Soft Computing, Vol. 11, Nos. 5-6, pp. 519--544, August 2005.

  • Takafumi Aoki, Naofumi Homma, and Tatsuo Higuchi, "Evolutionary synthesis of arithmetic circuit structures," Artificial Intelligence in Logic Design, Edited by S. N. Yanushkevich, Kluwer Academic Publishers, pp. 39--72, 2004 (Reprinted from Artificial Intelligence Review, Vol. 20, Nos. 3-4, 2003).

  • Naofumi Homma, Jun Sakiyama, Taihei Wakamatsu, Takafumi Aoki, and Tatsuo Higuchi, "Systematic Design of Redundant Adders Using Counter Tree Diagrams," IPSJ Journal, Vol. 45, No. 5, pp. 1279--1288, May 2004. (in Japanese)

  • Takafumi Aoki, Naofumi Homma, and Tatsuo Higuchi, "Evolutionary synthesis of arithmetic circuit structures," Artificial Intelligence Review, Kluwer Academic Publishers, Vol. 20, Nos. 3-4, pp. 199--232, December 2003.

  • Jun Sakiyama, Naofumi Homma, Takafumi Aoki, and Tatsuo Higuchi, "Counter Tree Diagrams: A unified framework for analyzing fast addition algorithms," IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences, Vol. E86-A, No. 12, pp. 3009--3019, December 2003.

  • Naofumi Homma, Takafumi Aoki, and Tatsuo Higuchi, "Evolutionary graph generation system with transmigration capability and its application to arithmetic circuit synthesis," IEE Proceedings -Circuits, Devices and Systems, Vol. 149, No. 2, pp. 97--104, April 2002.

  • Dingjun Chen, Takafumi Aoki, Naofumi Homma, Toshiki Terasaki, and Tatsuo Higuchi, "Graph-based evolutionary design of arithmetic circuits," IEEE Transactions on Evolutionary Computation, Vol. 6, No. 1, pp. 86--100, February 2002.

  • Dingjun Chen, Takafumi Aoki, Naofumi Homma,Ž¡Ž¡and Tatsuo Higuchi, "Parallel Evolutionary Design of Constant-Coefficient Multipliers," IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences, Vol. E85--A, No. 2, pp. 508-512, February 2002.

  • Dingjun Chen, Takafumi Aoki, Naofumi Homma, and Tatsuo Higuchi, "A pragmatic method for the design of fast constant-coefficient combinational multipliers," IEE Proceedings -Computers and Digital Techniques, Vol. 148, No. 6, pp. 196--206, November 2001.

  • Dingjun Chen, Takafumi Aoki, Naofumi Homma, and Tatsuo Higuchi, "Evolutionary design for high-speed constant-coefficient multipliers," IEE Electronics Letters, Vol. 37, No. 4, pp. 256--258, February 2001.

  • Naofumi Homma, Takafumi Aoki, and Tatsuo Higuchi, "Evolutionary synthesis of fast constant-coefficient multipliers," IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences, Vol. E83-A, No. 9, pp. 1767--1777, September 2000.

  • Naofumi Homma, Takafumi Aoki, and Tatsuo Higuchi, "Evolutionary graph generation system with symbolic verification for arithmetic circuit design," IEE Electronics Letters, Vol. 36, No. 11, pp. 937--939, May 2000.

  • Takafumi Aoki, Naofumi Homma, and Tatsuo Higuchi, "Evolutionary design of arithmetic circuits," IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences, Vol. E82-A, No. 5, pp. 798--806, May 1999.


Proceedings

  • Shoei Nashimoto, Naofumi Homma, Yu-Ichi Hayashi, and Takafumi Aoki, "Buffer Overflow Attack with Multiple Fault Injection and a Proven Countermeasure," Proceedings of 2015 PROOFS (Security Proofs for Embedded Systems) Workshop, September 17, 2015. (in press)

  • Rei Ueno, Naofumi Homma, Yukihiro Sugawara, Yasuyuki Nogami, and Takafumi Aoki, "Highly Efficient GF(2^8) Inversion Circuit Based on Redundant GF Arithmetic and Its Application to AES Design," Cryptographic Hardware and Embedded Systems - CHES 2015, Lecture Notes in Computer Science 9293, pp. 63--80, Springer-Verlag, September 14, 2015.

  • Ville Yli-Maeyry, Naofumi Homma, and Takafumi Aoki, "Improved Power Analysis on Unrolled Architecture and Its Application to PRINCE Block Cipher," Fourth International Workshop on Lightweight Cryptography for Security & Privacy - LightSec 2015, Lecture Notes in Computer Science, Springer-Verlag, September 11, 2015. (in press)

  • Atsushi Nagao, Yuichiro Okugawa, Kazuhiro Takaya, Yu-ichi Hayashi, Naofumi Homma, and Takafumi Aoki, "Detection Method for Overclocking by Intentional Electromagnetic Interference," 2015 Joint IEEE International Symposium on Electromagnetic Compatibility and EMC Europe, pp. 241--245, August 18, 2015. (Best Paper Award Finalist)

  • Ko Nakamura, Yu-ichi Hayashi, Naofumi Homma, Takaaki Mizuki, Takafumi Aoki, Hideaki Sone, "Method for Estimating Fault Injection Time on Cryptographic Devices from EM Leakage," 2015 Joint IEEE International Symposium on Electromagnetic Compatibility and EMC Europe, pp. 235--240, August 18, 2015.

  • Noriyuki Miura, Naofumi Homma, Yuichi Hayashi, Takafumi Aoki, Daisuke Fujimoto, and Makoto Nagata "EM Attack Sensor: Concept, Circuit, and Design-Automation Methodology," Design Automation Conference 2015, Sun Francisco, No. 176, pp. 1--6, June 11, 2015. (Invited paper)

  • Yukihisa Sugawara, Rei Ueno, Naofumi Homma, and Takafumi Aoki, "System for Automatic Generation of Parallel Multipliers over Galois Field," 2015 IEEE 45th International Symposium on Multiple-Valued Logic, pp. 54--59, Waterloo, May 18, 2015. (Student Travel Award)

  • Rei Ueno, Naofumi Homma, Yukihisa Sugawara, and Takafumi Aoki, "Formal Design of Galois-Field Arithmetic Circuits Based on Polynomial Ring Representation," 2015 IEEE 45th International Symposium on Multiple-Valued Logic, pp. 48--53, Waterloo, May 18, 2015. (Student Travel Award)

  • Daisuke Fujimoto, Noriyuki Miura, Yu-ichi Hayashi, Naofumi Homma, Takafumi¡¡Aoki, and Makoto Nagata, "A DPA/DEMA/LEMA-Resistant AES Cryptographic Processor with Supply-Current Equalizer and Micro EM Probe Sensor," 2015 20th Asia and South Pacific Design Automation Conference, pp. 26-27, January 20, 2015.

  • Yu-ichi Hayashi, Naofumi Homma, Mamoru Miura, Takafumi Aoki and Hideaki Sone, "A Threat for Tablet PCs in Public Space: Remote Visualization of Screen Images Using EM Emanation," 21st ACM Conference on Computer and Communications Security (CCS), pp. 954--965, Nov. 2014.

  • Naofumi Homma, Yu-ichi Hayashi, Noriyuki Miura, Daisuke Fujimoto, Daichi Tanaka, Makoto Nagata, and Takafumi Aoki, "EM Attack Is Non-Invasive? - Design Methodology and Validity Verification of EM Attack Sensor," Cryptographic Hardware and Embedded Systems - CHES 2014, Lecture Notes in Computer Science 8731, pp. 1--16, Springer-Verlag, Sep. 2014. (Best Paper Award)

  • Naofumi Homma, Yu-ichi Hayashi, Toshihiro Katashita, and Hideaki Sone, "Development of Human Resources in Hardware Security through Practical Information Technology Education Program," IEEE International Symposium on Electromagnetic Compatibility, pp. 764--767, August 2014.

  • Noriyuki Miura, Daisuke Fujimoto, Yu-ichi Hayashi, Naofumi Homma, Takafumi Aoki, and Makoto Nagata, "Integrated-Circuit Countermeasures Against Information Leakage Through EM Radiation," IEEE International Symposium on Electromagnetic Compatibility, pp. 748--751, August 2014.

  • Yu-ichi Hayashi, Naofumi Homma, Takaaki Mizuki, Takafumi Aoki, and Hideaki Sone, "Precisely Timed IEMI Fault Injection Synchronized with EM Information Leakage," IEEE International Symposium on Electromagnetic Compatibility, pp. 738--742, August 2014.

  • Noriyuki Miura, Daisuke Fujimoto, Daichi Tanaka, Yu-ichi Hayashi, Naofumi Homma, Takafumi Aoki, and Makoto Nagata, "A Local EM-Analysis Attack Resistant Cryptographic Engine with Fully-Digital Oscillator-Based Tamper-Access Sensor," 2014 Symposium on VLSI Circuits, Digest of Technical Papers, pp. 172-173, June 2014. (Highlighted Paper)

  • Rei Ueno, Kotaro Okamoto, Naofumi Homma, and Takafumi Aoki, "An Efficient Approach to Verifying Galois-Field Arithmetic Circuits of Higher Degrees and Its Application to ECC Decoders," 2014 IEEE 44th International Symposium on Multiple-Valued Logic, pp. 144--149, Bremen, May 20, 2014.

  • Hajime Uno, Sho Endo, Yu-ichi Hayashi, Naofumi Homma, and Takafumi Aoki, "Chosen-message Electromagnetic Analysis against Cryptographic Software on Embedded OS," 2014 International Symposium on Electromagnetic Compatibility, Tokyo, pp. 313--316, May 14, 2014.

  • Daisuke Fujimoto, Noriyuki Miura, Makoto Nagata, Yu-ichi Hayashi, Naofumi Homma, Yohei Hori, Toshihiro Katashita, Kazuo Sakiyama, Thanh-Ha Le, Julien Bringer, Pirouz Bazargan-Sabet, Shivam Bhasin, and Jean-Luc Danger, " Correlation Power Analysis using Bit-Level Biased Activity Plaintexts against AES Cores with Countermeasures," 2014 International Symposium on Electromagnetic Compatibility, Tokyo, pp. 306--309, May 14, 2014.

  • Yu-ichi Hayashi, Naofumi Homma, Takaaki Mizuki, Takafumi Aoki, and Hideaki Sone, "Efficient Method for Estimating Propagation Area of Information Leakage via EM Field," 2014 International Symposium on Electromagnetic Compatibility, Tokyo, pp. 298--301, May 14, 2014.

  • Kotaro Okamoto, Naofumi Homma, Takafumi Aoki and Sumio Morioka, "A Hierarchical Formal Approach to Verifying Side-channel Resistant Cryptographic Processors," 2014 IEEE International Symposium on Hardware-Oriented Security and Trust, pp. 76-79, May 6, 2014.

  • Daisuke Fujimoto, Daichi Tanaka, Noriyuki Miura, Makoto Nagata, Yu-ichi Hayashi, Naofumi Homma, Shivam Bhasin, and Jean-Luc Danger, "Side-Channel Leakage on Silicon Substrate of CMOS Cryptographic Chip," 2014 IEEE International Symposium on Hardware-Oriented Security and Trust, pp. 32-37, May 6, 2014. (Best Student Paper Award)

  • Sho Endo, Naofumi Homma, Yu-ichi Hayashi, Junko Takahashi, Hitoshi Fuji and Takafumi Aoki, "A Multiple-fault Injection Attack by Adaptive Timing Control under Black-box Conditions and a Countermeasure," International Workshop on Constructive Side-Channel Analysis and Secure Design (COSADE 2014), Lecture Notes in Computer Science, April 15, 2014. (in press)

  • Yang Li, Yu-Ichi Hayashi, Arisa Matsubara, Naofumi Homma, Takafumi Aoki, Kazuo Ohta and Kazuo Sakiyama, "Yet Another Fault-Based Leakage in Non-Uniform Faulty Ciphertexts," The 6th International Symposium on Foundations & Practice of Security, Lecture Notes in Computer Science 8352, pp. 272--290, February, 2014.

  • Yu-ichi Hayashi, Naofumi Homma, Takafumi Aoki, Yuichiro Okugawa, and Yoshiharu Akiyama "Transient Analysis of EM Radiation Associated with Information Leakage from Cryptographic ICs," The 9th International Workshop on Electromagnetic Compatibility of Integrated Circuits (EMC Compo 2013), pp. 78--82, December 16, 2013.

  • Daisuke Fujimoto, Noriyuki Miura, Makoto Nagata, Yuichi Hayashi, Naofumi Homma, Yohei Hori, Toshihiro Katashita, Kazuo Sakiyama, Thanh-Ha Le, Julien Bringer, Pirouz Bazargan-Sabet, and Jean-Luc Danger "On-chip power noise measurements of cryptographic VLSI circuits and interpretation for side-channel analysis," EMC Europe 2013, pp. 405--410, September 4 2013.

  • Naofumi Homma, Yu-ichi Hayashi, and Takafumi Aoki, "Electromagnetic Information Leakage from Cryptographic Devices," EMC Europe 2013, pp. 401--404, September 4 2013.

  • Kotaro Okamoto, Naofumi Homma, and Takafumi Aoki, "A hierarchical graph-based approach to generating formally-proofed Galois-field multipliers," Proceedings of 2013 PROOFS (Security Proofs for Embedded Systems) Workshop, pp. 98--109, August 24, 2013.

  • Yu-ichi Hayashi, Naofumi Homma, Takaaki Mizuki, Takafumi Aoki, Hideaki Sone, "Map-based Analysis of IEMI Fault Injection into Cryptographic Devices," IEEE International Symposium on Electromagnetic Compatibility, pp. 829--833, August 2013.(Best Symposium Paper Award)

  • Yu-ichi Hayashi, Naofumi Homma, Takaaki Mizuki, Takafumi Aoki, Hideaki Sone, Laurent Sauvage, and Jean-Luc Danger, "Introduction to Recent Research on EM Information Leakage," The 2013 Asia-Pacific International Symposium and Exhibition on Electromagnetic Compatibility, pp. 233--236, May 21, 2013.

  • Kotaro Okamoto, Naofumi Homma, and Takafumi Aoki, "A graph-based approach to designing parallel multipliers over Galois fields based on normal basis representations," Proceedings of 43rd International Symposium on Multiple Valued Logic, pp. 158--163, May 21 2013.

  • Naofumi Homma, Yu-ichi Hayashi, Toshihiro Katashita, Yohei Hori, and Takafumi Aoki, "Towards Efficient Evaluation of EM Information Leakage from Cryptographic Devices," Proceedings of 22nd International Workshop on Post-Binary ULSI Systems, pp. 50--55, May 20, 2013.

  • Yang Li, Sho Endo, Nicolas Debande, Naofumi Homma, Takafumi Aoki, Thanh-Ha Le, Jean-Luc Danger, Kazuo Ohta, and Kazuo Sakiyama, "Exploring the Relations Between Fault Sensitivity and Power Consumption," International Workshop on Constructive Side-Channel Analysis and Secure Design (COSADE 2013), Lecture Notes in Computer Science 7864 (in press)

  • Takafumi Hibiki, Naofumi Homma, Takafumi Aoki, Yuto Nakano, Kazuhide Fukushima, Shinsaku Kiyomoto and Yutaka Miyake, "Chosen-IV Correlation Power Analysis on KCipher-2 and a Countermeasure," International Workshop on Constructive Side-Channel Analysis and Secure Design (COSADE 2013), Lecture Notes in Computer Science 7864, pp. 169--183, March, 2013.

  • Yongdae Kim, Naofumi Homma, Takafumi Aoki, and Heebong Choi, "Security Evaluation of Cryptographic Modules against Proling Attacks," Proceedins of the 15th International Conference on Information Security and Cryptology, Lecture Notes in Computer Science 7839, pp. 383--394, November 2012

  • Naofumi Homma and Takafumi Aoki, "Effective Data Processing and Protection Techniques for Community Network Nodes," Proceedings of the 15th International Symposium on Wireless Personal Multimedia Communications, pp. 571--572, September 2012.

  • Sho Endo, Yang Li, Naofumi Homma, Kazuo Sakiyama, Kazuo Ohta and Takafumi Aoki, "An Efficient Countermeasure against Fault Sensitivity Analysis using Configurable Delay Block," 2012 Workshop on Fault Diagnosis and Tolerance in Cryptography, pp.95--102, September 2012.

  • Sho Endo, Yuichi Hayashi, Naofumi Homma, Takafumi Aoki, Toshihiro Katashita, Yohei Hori, Kazuo Sakiyama, Makoto Nagata, Jean-Luc Danger, Thanh-Ha Le and Pirouz Bazargan Sabet, "Measurement of Side-Channel Information from Cryptographic Devices on Security Evaluation Platform: Demonstration of SPACES Project," SICE Annual Conference 2012, pp.313--316, August, 2012.

  • Haruki Shimada, Yuichi Hayashi, Naofumi Homma, Takaaki Mizuki, Takafumi Aoki, and Hideaki Sone, "Using Selected-Plaintext Sets for Efficient Evaluation of EM Information Leakage from Cryptographic Devices," SICE Annual Conference 2012, pp. 64-67, August, 2012.

  • Yu-ichi Hayashi, Naofumi Homma, Taishi Ikematsu, Takaaki Mizuki, Takafumi Aoki, Hideaki Sone, and Jean-Luc Danger, "An efficient method for estimating the area of information propagation through electromagnetic radiation," IEEE International Symposium on Electromagnetic Compatibility, pp. 800--805, August 2012.

  • Haruki Shimada, Yu-ichi Hayashi, Naofumi Homma, Takaaki Mizuki, Takafumi Aoki, Hideaki Sone, Laurent Sauvage, and Jean-Luc Danger, "Efficient mapping of EM radiation associated with information leakage for cryptographic devices," IEEE International Symposium on Electromagnetic Compatibility, pp. 794--799, August 2012.

  • Laurent Sauvage, Sylvain Guilley, Jean-Luc Danger, Naofumi Homma and Yu-ichi Hayashi, "A Fault Model for Conducted Intentional ElectroMagnetic Interferences," IEEE International Symposium on Electromagnetic Compatibility, pp. 788--793, August 2012.

  • Junko Takahashi, Yu-ichi Hayashi, Naofumi Homma, Hitoshi Fuji, and Takafumi Aoki, "Feasibility of Fault Analysis Based on Intentional Electromagnetic Interference," IEEE International Symposium on Electromagnetic Compatibility, pp. 782--787, August 2012.

  • Yuichi Hayashi, Naofumi Homma, Takaaki Mizuki, Takafumi Aoki and Hideaki Sone, "A Threat of EM Information Leakage against Cryptographic Devices," 2012 Korea-Japan Joint Conference, pp.233-236, 2012.

  • Naofumi Homma, Kazuya Saito, and Takafumi Aoki, "Formal Design of Multiple-Valued Arithmetic Algorithms over Galois Fields and its Application to Cryptographic Processors," Proceedings of the 42nd International Symposium on Multiple Valued Logic, pp. 110--115, May 2012.

  • Kazuya Saito, Naofumi Homma, and Takafumi Aoki, "A Formal Approach to Designing Arithmetic Circuits over Galois Fields Using Symbolic Computer Algebra," Proceedings of the 17th Workshop on Synthesis And System Integration of Mixed Information technologies, pp. 153--158, March 2012.

  • Yu-ichi Hayashi, Shigeto Gomisawa, Yang Li, Naofumi Homma, Kazuo Sakiyama, Takafumi Aoki, and Kazuo Ohta, "Intentional Electromagnetic Interference for Fault Analysis on AES Block Cipher IC," 8th International Workshop on Electromagnetic Compatibility of Integrated Circuits, pp. 235--240, November 2011.

  • Yu-ichi Hayashi, Naofumi Homma, Takaaki Mizuki, Takafumi Aoki, and Hideaki Sone, "Non-invasive Trigger-free Fault Injection Method Based on Intentional Electromagnetic Interference," NIST Non-Invasive Attack Testing Workshop, pp. 15--19, September 2011.

  • Taishi Ikematsu, Yu-ichi Hayashi, Takaaki Mizuki, Naofumi Homma, Takafumi Aoki, and Hideaki Sone,, "Suppression of Information Leakage from Electronic Devices Based on SNR," IEEE International Symposium on Electromagnetic Compatibility, pp. 920--924, August 2011.

  • Olivier Meynard, Sylvain Guilley, Jean-Luc Danger, Yu-ichi Hayashi, and Naofumi Homma, "Identification of Information Leakage Points on a Cryptographic Device with an RSA Processor," IEEE International Symposium on Electromagnetic Compatibility, pp. 773--778, August 2011.

  • Laurent Sauvage, Sylvain Guilley, Jean-Luc Danger, Naofumi Homma, and Yu-ichi Hayashi, "Practical Results of EM Cartography on a FPGA-based RSA Hardware Implementation," IEEE International Symposium on Electromagnetic Compatibility, pp. 768--772, August 2011.

  • Yu-ichi Hayashi, Naofumi Homma, Takeshi Sugawara, Takaaki Mizuki, Takafumi Aoki, and Hideaki Sone, "Non-Invasive EMI-Based Fault Injection Attack against Cryptographic Modules," IEEE International Symposium on Electromagnetic Compatibility, pp. 763--767, August 2011.

  • Kazuya Saito, Naofumi Homma and Takafumi Aoki, "A Graph-Based Approach to Designing Multiple-Valued Arithmetic Algorithms," Proceedings of the 41st International Symposium on Multiple Valued Logic, pp. 27--32, May 2011.

  • Olivier Meynard, Denis Real, Sylvain Guilley, Jean-Luc Danger, and Naofumi Homma, "Enhancement of Simple Electro-Magnetic Attacks by Pre-characterization in Frequency Domain and Demodulation Techniques," Design, Automation, and Test in Europe (DATE2011), pp. 1004--1009, March, 2011.

  • Sho Endo, Naofumi Homma, Takeshi Sugawara, Takafumi Aoki, and Akashi Satoh, "An On-Chip Glitchy-Clock Generator and its Application to Safe-Error Attack," International Workshop on Constructive Side-Channel Analysis and Secure Design (COSADE 2011), pp. 175--182, February, 2011.

  • Yu-ichi Hayashi, Takeshi Sugawara, Yoshiki Kayano, Naofumi Homma, Takaaki Mizuki, Akashi Satoh, Takafumi Aoki, Shigeki Minegishi, Hideaki Sone, Hiroshi Inoue, "Information Leakage from Cryptographic Hardware via Common-Mode Current," IEEE International Symposium on Electromagnetic Compatibility, pp. 109--114, July 2010.(Invited paper)

  • Masahiro Yamaguchi, Hideki Toriduka, Shoichi Kobayashi, Takeshi Sugawara, Naofumi Homma, Akashi Satoh, and Takafumi Aoki, "Development of an on-chip micro shielded-loop probe to evaluate performance of magnetic film to protect a cryptographic LSI from electromagnetic analysis," IEEE International Symposium on Electromagnetic Compatibility, pp. 103--108, July 2010.(Invited paper)

  • Naofumi Homma, Takafumi Aoki, and Akashi Satoh, "Electromagnetic Information Leakage for Side-Channel Analysis of Cryptographic Modules," IEEE International Symposium on Electromagnetic Compatibility, pp. 97--102, July 2010.(Invited paper)

  • Akashi Satoh, Toshihiro Katashita, Takeshi Sugawara, Takafumi Aoki and Naofumi Homma, "Hardware Implementations of Hash Function Luffa," IEEE International Symposium on Hardware-Oriented Security and Trust, pp. 102--106, June 2010.

  • Yuichi Baba, Naofumi Homma, Atsushi Miyamoto, Takafumi Aoki, "Design of tamper-resistant registers for multiple-valued cryptographic processors," Proceedings of the 40th International Symposium on Multiple Valued Logic, pp. 67--72, May 2010.

  • Yongdae Kim, Takeshi Sugawara, Naofumi Homma, Takafumi Aoki, Akashi Satoh, "Biasing power traces to improve correlation in power analysis attacks," International Workshop on Constructive Side-Channel Analysis and Secure Design 2010, pp. 77--80, February 2010.

  • Takeshi Sugawara, Yu-ichi Hayashi, Naofumi Homma, Takaaki Mizuki, Takafumi Aoki, Hideaki Sone, and Akashi Satoh, "Mechanism behind Information Leakage in Electromagnetic Analysis of Cryptographic Modules," Workshop on Information Security Applications - WISA 2009, Lecture Notes in Computer Science 5932, pp. 66--78, Springer-Verlag, 2009.

  • Masahiro Yamaguchi, Hideki, Toriduka, Shoichi Kobayashi, Takeshi Sugawara, Naofumi Homma, Akashi Satoh, Takafumi Aoki, "Side Channel Attack to Magnetic Near Field of Cryptographic LSI and Its Protection by Magnetic Thin Film," Soft Magnetic Materials 19, A3-11, September 2009.

  • Toshihiro Katashita, Akashi Satoh, Takeshi Sugawara, Naofumi Homma, and Takafumi Aoki, "Development of Side-Channel Attack Standard Evaluation Environment," European Conference on Circuit Theory and Design 2009, pp. 403--408, August 2009.

  • Takeshi Sugawara, Naofumi Homma, Takafumi Aoki, and Akashi Satoh, "Differential Power Analysis of AES ASIC Implementations with Various S-box Circuits," European Conference on Circuit Theory and Design 2009, pp. 395--398, August 2009.

  • Takeshi Sugawara, Yu-ichi Hayashi, Naofumi Homma, Takaaki Mizuki, Takafumi Aoki, Hideaki Sone, and Akashi Satoh, "Spectrum Analysis on Cryptographic Modules to Counteract Side-Channel Attacks," Proceedings of the 2009 International Symposium on Electromagnetic Compatibility, pp. 21--24, July 2009.

  • Yu-ichi Hayashi, Takeshi Sugawara, Yoshiki Kayano, Naofumi Homma, Takaaki Mizuki, Akashi Satoh, Takafumi Aoki, Shigeki Minegishi, Hideaki Sone, and Hiroshi Inoue, "An Analysis of Information Leakage from a Cryptographic Hardware via Common-Mode Current," Proceedings of the 2009 International Symposium on Electromagnetic Compatibility, pp. 17--20, July 2009.

  • Atsushi Miyamoto, Naofumi Homma, Takafumi Aoki, and Akashi Satoh, "Evaluation of Simple/Comparative Power Analysis Against an RSA ASIC Implementation", Proceedings of the 2009 IEEE International Symposium on Circuits and Systems, pp.2918--2921, May 2009.

  • Yuichi Baba, Atsushi Miyamoto, Naofumi Homma, Takafumi Aoki, "Multiple-Valued Constant-Power Adder for Cryptographic Processor," Proceedings of the 39th International Symposium on Multiple Valued Logic, pp. 239--244, May 2009.

  • Atsushi Miyamoto, Naofumi Homma, Takafumi Aoki, and Akashi Satoh, "An experimental comparison of power analysis attacks against RSA processors on ASIC and FPGA," Proceedings of the 15th Workshop on Synthesis And System Integration of Mixed Information technologies, pp. 58--63, March 2009.

  • Takeshi Sugawara, Naofumi Homma, Takafumi Aoki, and Akashi Satoh, "Compact ASIC Architectures for the 512-bit Hash Function Whirlpool," Workshop on Information Security Applications - WISA 2008, Lecture Notes in Computer Science 5379, pp. 28--40, Springer-Verlag, January 2009.

  • Toshihiro Katashita, Akashi Satoh, Takeshi Sugawara, Naofumi Homma and Takafumi Aoki, "Enhanced Correlation Power Analysis using Key Screening Techniques," 2008 International Conference on ReConFigurable Computing and FPGAs, pp. 403-408, December 2008.

  • Atsushi Miyamoto, Naofumi Homma, Takafumi Aoki, and Akashi Satoh, "Systematic design of high-radix Montgomery multipliers for RSA processors," Proceedings of the 26th IEEE International Conference of Computer Design, pp. 416--421, October 2008.

  • Atsushi Miyamoto, Naofumi Homma, Takafumi Aoki, and Akashi Satoh, "Chosen-message SPA attacks against FPGA-based RSA hardware implementations," Proceedings of the 2008 International Conference on Field Programmable Logic and Applications, pp. 35--40, September 2008.

  • Akashi Satoh, Takeshi Sugawara, Naofumi Homma, and Takafumi Aoki, "High-performance concurrent error detection scheme for AES hardware," Cryptographic Hardware and Embedded Systems - CHES 2008, Lecture Notes in Computer Science 5154, pp. 100--112, Springer-Verlag, August 2008.

  • Naofumi Homma, Atsushi Miyamoto, Takafumi Aoki, Akashi Satoh, and Adi Shamir, "Collision-based power analysis of modular exponentiation using chosen-message pairs," Cryptographic Hardware and Embedded Systems - CHES 2008, Lecture Notes in Computer Science 5154, pp. 15--29, Springer-Verlag, August 2008.

  • Naofumi Homma, Atsushi Miyamoto, Takafumi Aoki, and Akashi Satoh, "Power analysis of RSA processors with high-radix Montgomery multipliers," Proceedings of 17th International Workshop on Post-Binary ULSI Systems, pp. 21--24, May 2008.

  • Yuki Watanabe, Naofumi Homma, Katsuhiko Degawa, Takafumi Aoki, and Tatsuo Higuchi, "High-level design of multiple-valued arithmetic circuits based on arithmetic description language," Proceedings of the 38th IEEE International Symposium on Multiple-Valued Logic, No. 31, pp. 112--117, May 2008.

  • Atsushi Miyamoto, Naofumi Homma, Takafumi Aoki, and Akashi Satoh, "Enhanced power analysis attack using chosen message against RSA hardware implementations," Proceedings of the 2008 IEEE International Symposium on Circuits and Systems, pp. 3282--3285, May 2008.

  • Takeshi Sugawara, Naofumi Homma, Takafumi Aoki, and Akashi Satoh, "High-performance ASIC implementations of the 128-bit block cipher CLEFIA," Proceedings of the 2008 IEEE International Symposium on Circuits and Systems, pp. 2925--2928, May 2008.

  • Yuki Watanabe, Naofumi Homma, Takafumi Aoki, and Tatsuo Higuchi, "Arithmetic module generator with algorithm optimization capability," Proceedings of the 2008 IEEE International Symposium on Circuits and Systems, pp. 1796--1799, May 2008.

  • Yuki Watanabe, Naofumi Homma, Takafumi Aoki, and Tatsuo Higuchi, "Formal representation and verification of arithmetic circuits using symbolic computer algebra," Proceedings of the 14th Workshop on Synthesis And System Integration of Mixed Information technologies, October 2007.

  • Yuki Watanabe, Naofumi Homma, Takafumi Aoki, and Tatsuo Higuchi, "Application of symbolic computer algebra to arithmetic circuit verification," Proceedings of the 25th IEEE International Conference of Computer Design, October 2007.

  • Takeshi Sugawara, Naofumi Homma, Takafumi Aoki, Akashi Satoh, "ASIC performance comparison for the ISO standard block ciphers," Proceedings of the 2nd Joint Workshop on Information Security, pp. 485--498, August 2007.

  • Takeshi Sugawara, Naofumi Homma, Takafumi Aoki, Akashi Satoh, "A high-performance ASIC implementation of the 64-bit block cipher CAST-128," Proceedings of the 2007 IEEE International Symposium on Circuits and Systems, pp. 1859--1862, May 2007.

  • Atsushi Miyamoto, Naofumi Homma, Takafumi Aoki, Akashi Satoh, "SPA against an FPGA-based RSA implementation with a high-radix Montgomery multiplier," Proceedings of the 2007 IEEE International Symposium on Circuits and Systems, pp. 1847--1850, May 2007.

  • Sei Nagashima, Naofumi Homma, Takafumi Aoki, Akashi Satoh, "DPA using phase-based waveform matching against random-delay countermeasure," Proceedings of the 2007 IEEE International Symposium on Circuits and Systems, pp. 1807--1810, May 2007

  • Naofumi Homma, Katsuhiko Degawa, Takafumi Aoki, and Tatsuo Higuchi, "Algorithm-level optimization of multiple-valued arithmetic circuits using counter tree diagrams," Proceedings of the 37th IEEE International Symposium on Multiple-Valued Logic, No. 31, pp. 1--8, May 2007.

  • Yuki Watanabe, Naofumi Homma, Takafumi Aoki, and Tatsuo Higuchi, "Formal Design of Decimal Arithmetic Circuits Using Arithmetic Description Language," 2006 IEEE International Symposium on Intelligent Signal Processing and Communication Systems, pp. 419--422, December 2006.

  • Naofumi Homma, Sei Nagashima, Yuichi Imai, Takafumi Aoki, and Akashi Satoh, "High-resolution side-channel attack using phase-based waveform matching," Cryptographic Hardware and Embedded Systems - CHES 2006, Lecture Notes in Computer Science 4249, pp. 187--200, Springer-Verlag, October 2006.

  • Naofumi Homma, Takafumi Aoki, and Tatsuo Higuchi, "Algorithm-level interpretation of fast adder structures in binary and multiple-valued logic," Proceedings of the 36th International Symposium on Multiple-Valued Logic, p. 2, May 2006.

  • Yuki Watanabe, Naofumi Homma, Takafumi Aoki, and Tatsuo Higuchi, "Arithmatic module generator based on arithmatic description language," Proceedings of the 13th Workshop on Synthesis And System Integration of Mixed Information Technologies, pp. 153--160, April 2006.

  • Naofumi Homma, Yuki Watanabe, Kazuya Ishida, Takafumi Aoki, and Tatsuo Higuchi, "A multiplier module generator based on arithmetic description language," Proceedings of the IP Based SoC Design Conference & Exhibition, pp. 207--212, December 2005.

  • Naofumi Homma, Takafumi Aoki, and Tatsuo Higuchi, "A Graph-Based Representation for Analyzing Fast Addition Algorithms," Proceedings of the 7th International Symposium on Representations and Methodology of Future Computing Technologies, pp. 52--57, September 2005.

  • Naofumi Homma, Kazuya Ishida, Takafumi Aoki and Tatsuo Higuchi, "Arithmetic Description Language and Its Application to Parallel Multiplier Design," Proceedings of the 12th Synthesis And System Integration of Mixed Information technologies, pp. 319--326, October 2004.

  • Masanori Natsui, Naofumi Homma, Takafumi Aoki and Tatsuo Higuchi, "Topology-Oriented Design of Current Mirrors Using Evolutionary Graph Generation System," Proceedings of the 12th Synthesis And System Integration of Mixed Information technologies, pp. 78--84, October 2004.

  • Masanori Natsui, Naofumi Homma, Takafumi Aoki and Tatsuo Higuchi, "Topology-Oriented Design of Analog Circuits Based on Evolutionary Graph Generation," Parallel Problem Solving from Nature - PPSN VIII, Lecture Notes in Computer Science 3242, Springer-Verlag, pp. 342--351, September 2004.

  • Masanori Natsui, Naofumi Homma, Takafumi Aoki, and Tatsuo Higuchi, "Evolutionary Graph Generation System with Transmigration Capability and Its Application to Current Mirror Circuit Synthesis," Proceedings of the 2004 International Technical Conference on Circuits/Systems, Computers and Communications, pp 8A2L-3-1--8A2L-3-4, July 2004

  • Naofumi Homma, Taihei Wakamatsu, Jun Sakiyama, Takafumi Aoki, and Tatsuo Higuchi, "Counter Tree Diagrams for Redundant Adder Design," Proceedings of the 2004 International Technical Conference on Circuits/Systems, Computers and Communications, pp 6C3L-2-1--6C3L-2-4, July 2004

  • Naofumi Homma, Takafumi Aoki, and Tatsuo Higuchi, "Multiplier Block Synthesis Using Evolutionary Graph Generation," The IEEE Computer Society Press in the proceedings of the 2004 NASA/DoD Conference on Evolvable Hardware, pp 79--82, June 2004

  • Naofumi Homma, Jun Sakiyama, Taihei Wakamatsu, Takafumi Aoki, and Tatsuo Higuchi, "A Systematic Approach for Analyzing Fast Addition Algorithms Using Counter Tree Diagrams," Proceedings of the 2004 IEEE International Symposium on Circuits and Systems, pp. V-197--V-200, May 2004

  • Kazuya Ishida, Naofumi Homma, Takafumi Aoki, and Tatsuo Higuchi, "Design and Verification of Parallel Multipliers Using Arithmetic Description Language: ARITH," Proceedings of the 34th IEEE International Symposium on Multiple-Valued Logic, pp. 334 -- 339, May 2004

  • Naofumi Homma, Masanori Natsui, Takafumi Aoki, and Tatsuo Higuchi, "Graph-Based Approach for Synthesizing Arithmetic Circuits," Proceedings of 13th International Workshop on Post-Binary ULSI Systems, pp. 25--32, May 2004. (Invited)

  • Masanori Natsui, Naofumi Homma, Takafumi Aoki, and Tatsuo Higuchi, "Evolutionary Graph Generation System and Its Application MOS Current Mirror Synthesis," Proceedings of the 2003 IEEE International Symposium on Intelligent Signal Processing and Communication Systems, pp. 747--752, December 2003.

  • Naofumi Homma, Masanori Natsui, Takafumi Aoki, and Tatsuo Higuchi, "VLSI Circuit Design Using an Object-Oriented Framework of Evolutionary Graph Generation System," Proceedings of 2003 Congress on Evolutionary Computation, pp. 115--122, December 2003.

  • Naofumi Homma, Takafumi Aoki, Makoto Motegi and Tatsuo Higuchi, "A framework of evolutionary graph generation system and its application to circuit synthesis," Proceedings of the 2003 IEEE International Symposium on Circuits and Systems, pp. V-201--V-204, May 2003.

  • Naofumi Homma, Takafumi Aoki, and Tatsuo Higuchi, "Evolutionary synthesis of circuit structures," Proceedings of 2002 International Symposium on New Paradigm VLSI Computing, pp. 48--51, December 2002.

  • Makoto Motegi, Naofumi Homma, Takafumi Aoki, and Tatsuo Higuchi, "Evolutionary Graph Generation System and Its Application to Bit-Serial Arithmetic Circuit Synthesis," Parallel Problem Solving from Nature - PPSN VII, Lecture Notes in Computer Science 2439, Springer-Verlag, pp. 831--840, September 2002.

  • Naofumi Homma, Takafumi Aoki, and Tatsuo Higuchi, "Graph-based Individual Representation for Evolutionary Synthesis of Arithmetic Circuits," Proceedings of the 2002 Congress on Evolutionary Computation, pp. 1492--1497, May 2002.

  • Dingjun Chen, Takafumi Aoki, Naofumi Homma, and Tatsuo Higuchi, "Design of constant-coefficient multipliers," Proceedings of 2001 4th International Conference on ASIC, Vol. 1, pp. 416--419, October 2001

  • Dingjun Chen, Takafumi Aoki, Naofumi Homma, and Tatsuo Higuchi, "Distributed evolutionary design of constant-coefficient multipliers," Proceedings of The 8th IEEE International Conference on Electronics, Circuits and Systems, Vol. 1, pp. 249--252, September 2001

  • Naofumi Homma, Takafumi Aoki, and Tatsuo Higuchi, "Evolutionary graph generation system with transmigration capability for arithmetic circuit design," Proceedings of The 2001 IEEE International Symposium on Circuits and Systems, Vol. 5 of 5, pp. 171--174, May 2001.

  • Naofumi Homma, Takafumi Aoki, and Tatsuo Higuchi, "Evolutionary generation of constant-coefficient multipliers," Proceedings of the 1999 IEEE International Symposium on Intelligent Signal Processing and Communication Systems, pp. 481--484, December 1999.

  • Naofumi Homma, Takafumi Aoki, and Tatsuo Higuchi, "A new evolutionary approach for synthesizing circuit structures," Proceedings of the 1999 International Symposium on Nonlinear Theory and its Applications, pp. 239--242, November 1999.

  • Naofumi Homma, Takafumi Aoki, and Tatsuo Higuchi, "Evolutionary graph generation system for arithmetic circuit design," Proceedings of International Symposium on Future of Intellectual Integrated Electronics, pp. 355--364, March 1999.

  • Naofumi Homma, Takafumi Aoki, and Tatsuo Higuchi, "Design of arithmetic circuits based on evolutionary graph generation," Proceedings of the Workshop on Synthesis and System Integration of Mixed Technologies, pp. 31--38, October 1998.


Proceedings (in Japanese)

  • Æ£ËÜÂç²ð¡¤¾È²°Í£µª¡¤ºê»³ °ìÃË¡¤ËÜ´Ö¾°Ê¸¡¤ÃÓÅÄ À¿¡¤±ÊÅÄ ¿¿¡¤¾¾ËÜ ÊÙ¡¤"ÊÂÎó²½RNS¥¢¡¼¥­¥Æ¥¯¥Á¥ã¤Ë¤è¤ë¹â®¥Ú¥¢¥ê¥ó¥°¼ÂÁõ¤Ë´Ø¤¹¤ë¸¡Æ¤¡¤" 2016 ǯ°Å¹æ¤È¾ðÊ󥻥­¥å¥ê¥Æ¥£¥·¥ó¥Ý¥¸¥¦¥à, Vol. 2F3-4, pp.1--8, January 20, 2016.

  • ¾åÌîÎ桤¿û¸¶¹¬¹°¡¤ËÜ´Ö¾°Ê¸¡¤ÀÄÌÚ¹§Ê¸¡¤¿¹²¬À¡É×, "°ìÈ̲½¥Þ¥¹¥­¥ó¥°¥¹¥­¡¼¥à¤Ë´ð¤Å¤¯ÂÑ¥¿¥ó¥Ñ¡¼À­°Å¹æ¥Ï¡¼¥É¥¦¥§¥¢¤Î¼«Æ°¹çÀ®¡¤" 2016 ǯ°Å¹æ¤È¾ðÊ󥻥­¥å¥ê¥Æ¥£¥·¥ó¥Ý¥¸¥¦¥à, Vol. 2F3-4, pp.1--8, January 20, 2016.

  • ²Ï°æ¹Ò¡¤¾åÌîÎ桤ËÜ´Ö¾°Ê¸¡¤ÀÄÌÚ¹§Ê¸¡¤Ê¡Åçϱѡ¤À¶ËÜ¿¸ºî, "IC¥«¡¼¥É¾å¤Ë¼ÂÁõ¤µ¤ì¤¿KCipher-2¥½¥Õ¥È¥¦¥§¥¢¤ËÂФ¹¤ëÅÅÎϲòÀϤθ¡Æ¤¡¤" 2016 ǯ°Å¹æ¤È¾ðÊ󥻥­¥å¥ê¥Æ¥£¥·¥ó¥Ý¥¸¥¦¥à, Vol. 2F3-1, pp.1--6, January 20, 2016.

  • ÎÓÍ¥°ì¡¤ËÜ´Ö¾°Ê¸¡¤Ä»³¤ÍÛÊ¿¡¤¹âëϹ¨¡¤ÀÄÌÚ¹§Ê¸¡¤"Åż§Åª²èÌÌÅð»ë¤Ë¤ª¤±¤ëϳ¤¨¤¤¥Ñ¥é¥á¥¿¤Î¹â®¿äÄêË¡¤Ë´Ø¤¹¤ë¸¡Æ¤¡¤" 2016 ǯ°Å¹æ¤È¾ðÊ󥻥­¥å¥ê¥Æ¥£¥·¥ó¥Ý¥¸¥¦¥à, Vol. 2F2-2, pp.1--5, January 20, 2016.

  • ÀÐȨÂçÊ塤ËÜ´Ö¾°Ê¸, ÎÓÍ¥°ì, »°±ºÅµÇ·, Æ£ËÜÂç²ð, ±ÊÅÄ¿¿, ÀÄÌÚ¹§Ê¸¡¤"Åż§ÇȲòÀϹ¶·â¤ËÂФ¹¤ëÈ¿±þ·¿Âкö¤Î¹âÀ­Ç½²½¤È¤½¤Îɾ²Á," 2016 ǯ°Å¹æ¤È¾ðÊ󥻥­¥å¥ê¥Æ¥£¥·¥ó¥Ý¥¸¥¦¥à, Vol. 2F2-1, pp.1--6, January 20, 2016.

  • ÍüËÜæƱÊ, ËÜ´Ö¾°Ê¸, ÎÓÍ¥°ì, ¹â¶¶½ç»Ò¡¤ÉڻοΡ¤ÀÄÌÚ¹§Ê¸, "¥Ñ¥¤¥×¥é¥¤¥ó¹½Â¤¤òÍ­¤¹¤ë¥Þ¥¤¥¯¥í¥×¥í¥»¥Ã¥µ¤Ø¤Î¸Î¾ãÃíÆþ¹¶·â," 2016 ǯ°Å¹æ¤È¾ðÊ󥻥­¥å¥ê¥Æ¥£¥·¥ó¥Ý¥¸¥¦¥à, Vol. 2F1-3, pp.1--7, January 20, 2016.

  • ¥ô¥£¥Ã¥ì¥¦¥ê¥Þ¥¦¥ë, ËÜ´Ö¾°Ê¸, ÀÄÌÚ¹§Ê¸, "¥¢¥ó¥í¡¼¥ë¥É¥¢¡¼¥­¥Æ¥¯¥Á¥ã¤ËÂФ¹¤ëÅÅÎϲòÀϤιâÅÙ²½¼êË¡," 2016 ǯ°Å¹æ¤È¾ðÊ󥻥­¥å¥ê¥Æ¥£¥·¥ó¥Ý¥¸¥¦¥à, Vol. 1F2-4, pp.1--6, January 19, 2016.

  • ¾åÌîÎ桤ËÜ´Ö¾°Ê¸¡¤¿û¸¶¹¬¹°¡¤Ìî¾åÊÝÇ·¡¤ÀÄÌÚ¹§Ê¸¡¤"¾éĹɽ¸½¤Ë´ð¤Å¤¯¹â¸úΨ¥¬¥í¥¢Âλ»½Ñ±é»»²óÏ©¤ÎÀ߷ס¤" Âè29²ó¿ÃÍÏÀÍý¤È¤½¤Î±þÍѸ¦µæ²ñ, No. 4, pp. ??--??, January 9 2016.

  • ¿û¸¶¹¬¹°, ¾åÌîÎæ, ËÜ´Ö¾°Ê¸, ÀÄÌÚ¹§Ê¸, "¥Þ¥ë¥Á¥Ñ¡¼¥Æ¥£·×»»¤Ë´ð¤Å¤¯°Å¹æ¥Ï¡¼¥É¥¦¥§¥¢¤Î·Á¼°ÅªÀ߷פ˴ؤ¹¤ë¸¡Æ¤," Âè38²ó¿ÃÍÏÀÍý¥Õ¥©¡¼¥é¥à, No. 11, pp. 11-1--11-6, September 13, 2015.

  • ÀÐȨÂçÊå, ËÜ´Ö¾°Ê¸, ÎÓÍ¥°ì, »°±ºÅµÇ·, Æ£ËÜÂç²ð, ±ÊÅÄ¿¿, ÀÄÌÚ¹§Ê¸¡¤"°Å¹æLSI¤Ø¤Î¼ÂÁõ¹¶·â¤ËÂФ¹¤ëÈ¿±þ·¿Âкö¤Î¹âÀºÅÙ²½¤Ë´Ø¤¹¤ë¸¡Æ¤¡¤" Ê¿À®27ǯÅÙ Åŵ¤´Ø·¸³Ø²ñÅìËÌ»ÙÉôÏ¢¹çÂç²ñ¡¤No. 2E01, p. 1, August 28, 2015

  • ²Ï°æ¹Ò¡¤ËÜ´Ö¾°Ê¸¡¤Ê¡Åçϱѡ¤À¶ËÜ¿¸ºî¡¤ÀÄÌÚ¹§Ê¸¡¤"¥¹¥È¥ê¡¼¥à°Å¹æ¥½¥Õ¥È¥¦¥§¥¢¤ËÂФ¹¤ëǽưŪʪÍý¹¶·â¤Îɾ²Á¡¤" Ê¿À®27ǯÅÙ Åŵ¤´Ø·¸³Ø²ñÅìËÌ»ÙÉôÏ¢¹çÂç²ñ¡¤No. 2C14, p. 1, August 28, 2015

  • ÅÄÃæÎ÷Â硤»°±ºÅµÇ·¡¤Æ£ËÜÂç²ð¡¤ËÜ´Ö¾°Ê¸¡¤ÎÓÍ¥°ì¡¤ÀÄÌÚ¹§Ê¸¡¤±ÊÅÄ¿¿, "°Å¹æ½èÍý²óÏ©¤Ø¤Î¶á˵Åż§ÇȲòÀϹ¶·â¤ò¸¡ÃΤ¹¤ë´°Á´¥Ç¥¸¥¿¥ëȯ¿¶´ï·¿¥»¥ó¥µ," LSI¤È¥·¥¹¥Æ¥à¤Î¥ï¡¼¥¯¥·¥ç¥Ã¥×¡¤p. 9, May 11, 2015.¡ÊÍ¥½¨¥Ý¥¹¥¿¡¼¾Þ¼õ¾Þ¡Ë

  • ±óÆ£æÆ, ÍüËÜæƱÊ, ËÜ´Ö¾°Ê¸, ÎÓÍ¥°ì, ¹â¶¶½ç»Ò, ÉڻοÎ, ÀÄÌÚ¹§Ê¸, "Cortex-M0¥×¥í¥»¥Ã¥µ¾å¤Î°Å¹æ¥½¥Õ¥È¥¦¥§¥¢¤ËÂФ¹¤ë¿½Å¸Î¾ãÃíÆþ¹¶·â¤Î¸¡Æ¤," ¾ðÊó½èÍý³Ø²ñ¸¦µæÊó¹ð, Vol. 2015-CSEC-68, No. 15, pp. 1--8, March 5, 2015.

  • ĹÈøÆÆ, ±üÀîͺ°ìϺ, ¹âëϹ¨, ÎÓÍ¥°ì, ËÜ´Ö¾°Ê¸, ÀÄÌÚ¹§Ê¸, "°Õ¿ÞŪ¤ÊÅż§Ë¸³²ÇȤˤè¤Ã¤ÆȯÀ¸¤¹¤ë¥ª¡¼¥Ð¡¼¥¯¥í¥Ã¥¯¤Î¸¡½ÐÊýË¡¤Ë´Ø¤¹¤ë¸¡Æ¤," ÅŻҾðÊóÄÌ¿®³Ø²ñµ»½Ñ¸¦µæÊó¹ð, vol.114, no. 398, EMCJ2014-100 pp.83-88, January 23, 2015.

  • ¥ô¥£¥Ã¥ì¥¦¥ê¥Þ¥¦¥ë, ËÜ´Ö¾°Ê¸, ±óÆ£æÆ, ÀÄÌÚ¹§Ê¸, "¥¢¥ó¥í¡¼¥ë¥¢¡¼¥­¥Æ¥¯¥Á¥ã¤Ç¼ÂÁõ¤µ¤ì¤¿PRINCE¥Ï¡¼¥É¥¦¥§¥¢¤ËÂФ¹¤ëÅÅÎϲòÀϤθ¡Æ¤," 2015 ǯ°Å¹æ¤È¾ðÊ󥻥­¥å¥ê¥Æ¥£¥·¥ó¥Ý¥¸¥¦¥à, Vol. 3A2-4, pp.1--6, January 22, 2015.

  • ËÜ´Ö¾°Ê¸, ÎÓÍ¥°ì, »°±ºÅµÇ·, Æ£ËÜÂç²ð, ±ÊÅÄ¿¿, ÀÄÌÚ¹§Ê¸, "Åż§Çȹ¶·â¥»¥ó¥µ¤ÎÀ߷פȼ¾Ú," 2015 ǯ°Å¹æ¤È¾ðÊ󥻥­¥å¥ê¥Æ¥£¥·¥ó¥Ý¥¸¥¦¥à, Vol. 2F4-4, pp.1--6, January 21, 2015.

  • ÎÓÍ¥°ì, ËÜ´Ö¾°Ê¸, »°±º±Ò, ÀÄÌÚ¹§Ê¸, Á¾º¬½¨¾¼, "¥¿¥Ö¥ì¥Ã¥ÈüËö¤«¤é¤ÎÅż§ÇȤò²ð¤·¤¿¾ðÊóϳ¤¨¤¤¥á¥«¥Ë¥º¥à¤Î¸¡Æ¤," 2015 ǯ°Å¹æ¤È¾ðÊ󥻥­¥å¥ê¥Æ¥£¥·¥ó¥Ý¥¸¥¦¥à, Vol. 2F4-3, pp.1--5, January 21, 2015.

  • ÍüËÜæƱÊ, ±óÆ£æÆ, ËÜ´Ö¾°Ê¸, ÎÓÍ¥°ì, ÀÄÌÚ¹§Ê¸, "¥Þ¥¤¥¯¥í¥³¥ó¥È¥í¡¼¥é¾å¤Î¥×¥í¥°¥é¥àÀ©¸æ¥Õ¥í¡¼¤Ø¤Î¸Î¾ãÃíÆþ¹¶·â," 2015 ǯ°Å¹æ¤È¾ðÊ󥻥­¥å¥ê¥Æ¥£¥·¥ó¥Ý¥¸¥¦¥à, Vol. 2F4-2, pp.1--8, January 21, 2015.

  • Ãæ¼¹É, ÎÓÍ¥°ì, ¿åÌÚ·ÉÌÀ, ËÜ´Ö¾°Ê¸, ÀÄÌÚ¹§Ê¸, Á¾º¬½¨¾¼, "°Å¹æ¥â¥¸¥å¡¼¥ë¤«¤é¤Îϳ±ÌÅż§ÇȤòÍѤ¤¤¿¸Î¾ãȯÀ¸¥¿¥¤¥ß¥ó¥°ÆÃÄê¼êË¡," 2015 ǯ°Å¹æ¤È¾ðÊ󥻥­¥å¥ê¥Æ¥£¥·¥ó¥Ý¥¸¥¦¥à, Vol. 2F4-1, pp.1--8, January 21, 2015.

  • ¾åÌîÎæ, ËÜ´Ö¾°Ê¸, ¿û¸¶¹¬¹°, ÀÄÌÚ¹§Ê¸, "¿¹à¼°´Äɽ¸½¤òÍѤ¤¤¿GF(2^8)¹çÀ®Âεոµ±é»»´ï¤ÎÀß·×," 2015 ǯ°Å¹æ¤È¾ðÊ󥻥­¥å¥ê¥Æ¥£¥·¥ó¥Ý¥¸¥¦¥à, Vol. 2B1-1, pp.1--6, January 21, 2015.

  • ±§ÌîÊã, ±óÆ£æÆ, ËÜ´Ö¾°Ê¸, ÀÄÌÚ¹§Ê¸, ÃçÌîÍ­ÅÐ, À¶ËÜ¿¸ºî, »°ÂðÍ¥, "KCipher-2¥½¥Õ¥È¥¦¥§¥¢¤ÎIC¥«¡¼¥É¼ÂÁõ¤È¤½¤Îɾ²Á¡¤"¥³¥ó¥Ô¥å¡¼¥¿¥»¥­¥å¥ê¥Æ¥£¥·¥ó¥Ý¥¸¥¦¥à 2014, pp. 64--71, October 22, 2014.

  • ¾åÌîÎ桤ËÜ´Ö¾°Ê¸¡¤¿û¸¶¹¬¹°¡¤ÀÄÌÚ¹§Ê¸¡¤"¿¹à¼°´Äɽ¸½¤µ¤ì¤¿¥¬¥í¥¢Âξå¤Î»»½Ñ±é»»²óÏ©¤Î·Á¼°ÅªÀ߷פ˴ؤ¹¤ë¸¡Æ¤¡¤"Âè37²ó¿ÃÍÏÀÍý¥Õ¥©¡¼¥é¥à, No. 14, pp. 15-1--15-8, September 14, 2014.

  • ¿û¸¶¹¬¹°¡¤¾åÌîÎ桤ËÜ´Ö¾°Ê¸¡¤ÀÄÌÚ¹§Ê¸¡¤"¥¬¥í¥¢Âξå¤ÎÊÂÎó¾è»»´ï¼«Æ°À¸À®¥·¥¹¥Æ¥à¤Î¹½ÃۤȤ½¤Îɾ²Á¡¤"Âè37²ó¿ÃÍÏÀÍý¥Õ¥©¡¼¥é¥à, No. 14, pp. 14-1--14-7, September 14, 2014.

  • ¿û¸¶¹¬¹°¡¤¾åÌîÎ桤ËÜ´Ö¾°Ê¸¡¤ÀÄÌÚ¹§Ê¸¡¤"¶¦Ä̸°°Å¹æ¥×¥í¥»¥Ã¥µ¤Î¸úΨŪ¤Ê¸¡¾Ú¥·¥¹¥Æ¥à¤Î¹½ÃÛ¡¤" Ê¿À®26ǯÅÙ Åŵ¤´Ø·¸³Ø²ñÅìËÌ»ÙÉôÏ¢¹çÂç²ñ¡¤No. 2G06, p. 1, August 22, 2014.

  • ÍüËÜæƱʡ¤±§Ìî¡¡Ê㡤ËÜ´Ö¾°Ê¸¡¤ÀÄÌÚ¹§Ê¸¡¤"¥µ¥¤¥É¥Á¥ã¥Í¥ë¹¶·âÂÑÀ­¤òÍ­¤¹¤ëÂʱ߶ÊÀþ°Å¹æ¥½¥Õ¥È¥¦¥§¥¢¤ÎIC¥«¡¼¥É¼ÂÁõ¡¤" Ê¿À®26ǯÅÙ Åŵ¤´Ø·¸³Ø²ñÅìËÌ»ÙÉôÏ¢¹çÂç²ñ¡¤No. 2G05, p. 1, August 22, 2014.

  • Ãæ¼¹É, ÎÓÍ¥°ì, ËÜ´Ö¾°Ê¸, ¿åÌÚ·ÉÌÀ, ÀÄÌÚ¹§Ê¸, Á¾º¬ ½¨¾¼, "¥µ¥¤¥É¥Á¥ã¥Í¥ë¾ðÊó¤òÍѤ¤¤¿¸Î¾ãȯÀ¸¥¿¥¤¥ß¥ó¥°ÆÃÄê¼êË¡¤Î¼Â¸½²ÄǽÀ­¤Ë´Ø¤¹¤ë¸¡Æ¤," ÅŻҾðÊóÄÌ¿®³Ø²ñµ»½Ñ¸¦µæÊó¹ð, vol. 114, no. 129, EMCJ2014-23, pp. 37-42, 2014.

  • Ãæ¼¹É, ÎÓÍ¥°ì, ËÜ´Ö¾°Ê¸, ¿åÌÚ·ÉÌÀ, ÀÄÌÚ¹§Ê¸, Á¾º¬ ½¨¾¼, "°Å¹æ¥â¥¸¥å¡¼¥ë¤Ë¤ª¤±¤ë¥µ¥¤¥É¥Á¥ã¥Í¥ë¾ðÊó¤òÍѤ¤¤¿¸Î¾ãȯÀ¸¥¿¥¤¥ß¥ó¥°ÆÃÄê¼êË¡," ÅŻҾðÊóÄÌ¿®³Ø²ñµ»½Ñ¸¦µæÊó¹ð, vol. 114, no. 93, EMCJ2014-11, pp. 7-12, 2014.

  • Æ£ËÜÂç²ð, »°±ºÅµÇ·, ±ÊÅÄ¿¿, ÎÓÍ¥°ì, ËÜ´Ö¾°Ê¸, Shivam Bhasin¡¤Jean-Luc Danger, "CMOS°Å¹æ²óÏ©¤Ë¤ª¤±¤ë¥·¥ê¥³¥ó´ðÈĤ«¤é¤Î¥µ¥¤¥É¥Á¥ã¥Í¥ëϳ±Ì," ÅŻҾðÊóÄÌ¿®³Ø²ñµ»½Ñ¸¦µæÊó¹ð, vol. 114, no. 93, EMCJ2014-10, pp. 1-6, 2014.

  • ±§ÌîÊã, ±óÆ£æÆ, ËÜ´Ö¾°Ê¸, ÀÄÌÚ¹§Ê¸, ÃçÌîÍ­ÅÐ, À¶ËÜ¿¸ºî, »°ÂðÍ¥, "ZigBeeɾ²ÁÍÑ¥Þ¥¤¥³¥ó¾å¤Ë¼ÂÁõ¤µ¤ì¤¿KCipher-2¤ËÂФ¹¤ëÁê´ØÅż§ÇȲòÀϤθ¡Æ¤," ¿®³Øµ»Êó, ISEC2013-88, pp. 35-40, March 10, 2014.

  • ±§ÌîÊ㡤±óÆ£æÆ¡¤ËÜ´Ö¾°Ê¸, ÎÓÍ¥°ì, ÀÄÌÚ¹§Ê¸, "Áȹþ¤ßOS¾å¤Ë¼ÂÁõ¤µ¤ì¤¿¸ø³«¸°°Å¹æ¥½¥Õ¥È¥¦¥§¥¢¤ËÂФ¹¤ëÅż§ÇȲòÀϹ¶·â," 2014 ǯ°Å¹æ¤È¾ðÊ󥻥­¥å¥ê¥Æ¥£¥·¥ó¥Ý¥¸¥¦¥à, Vol. 3A2-3, pp.1--7, January 23, 2014.

  • ¾åÌîÎæ, ËÜ´Ö¾°Ê¸, ÀÄÌÚ¹§Ê¸, "LED °Å¹æ¤Ø¤Îñ°ì¤Î¸Î¾ãÃíÆþ¤òÍѤ¤¤¿º¹Ê¬¸Î¾ã²òÀϤȤ½¤Îɾ²Á," 2014 ǯ°Å¹æ¤È¾ðÊ󥻥­¥å¥ê¥Æ¥£¥·¥ó¥Ý¥¸¥¦¥à, Vol. 3A1-5, pp.1--8, January 23, 2014.

  • ±óÆ£æÆ, ËÜ´Ö¾°Ê¸, ÎÓÍ¥°ì, ¹â¶¶½ç»Ò, ÉڻοÎ, ÀÄÌÚ¹§Ê¸, "Ŭ±þŪ¤Ë¥¿¥¤¥ß¥ó¥°¤òÀ©¸æ¤·¤¿Â¿½Å¸Î¾ãÃíÆþ¹¶·â¤È¤½¤ÎÂкö," 2014 ǯ°Å¹æ¤È¾ðÊ󥻥­¥å¥ê¥Æ¥£¥·¥ó¥Ý¥¸¥¦¥à, Vol. 3A1-1, pp.1--7, January 23, 2014.

  • ÎÓÍ¥°ì, ËÜ´Ö¾°Ê¸, »°±º±Ò,ÀÄÌÚ¹§Ê¸, Á¾º¬ ½¨¾¼, "¥¿¥Ö¥ì¥Ã¥ÈüËö¤ËÂФ¹¤ëÅż§ÇȤò²ð¤·¤¿¾ðÊóϳ¤¨¤¤¤Î¶¼°Ò," 2014 ǯ°Å¹æ¤È¾ðÊ󥻥­¥å¥ê¥Æ¥£¥·¥ó¥Ý¥¸¥¦¥à, Vol. 2A3-4, pp.1--6, January 22, 2014.

  • Æ£ËÜÂç²ð, ÅÄÃæÂçÃÒ, »°±ºÅµÇ·, ±ÊÅÄ¿¿, ÎÓÍ¥°ì, ËÜ´Ö¾°Ê¸, ÀÄÌÚ¹§Ê¸, ËÙÍÎÊ¿, ÊÒ²¼ÉÒ¹­, ùõ»³°ìÃË, Thanh-Ha Le, Julien Bringer, Pirouz Bazargan-Sabet, Shivam Bhasin, Jean-Luc Danger, "¥Á¥Ã¥×Æâ³°¤Ç¤ÎÅŸ»ÅÅ°µ¼èÆÀ¤Ë¤è¤ë¥µ¥¤¥É¥Á¥ã¥Í¥ëϳ±Ì¾ðÊó¤Î°ì¹Í»¡," 2014 ǯ°Å¹æ¤È¾ðÊ󥻥­¥å¥ê¥Æ¥£¥·¥ó¥Ý¥¸¥¦¥à, Vol. 2A3-3, pp.1--6, January 22, 2014.

  • ²¬Ëܹ­ÂÀϺ, ËÜ´Ö¾°Ê¸, ÀÄÌÚ¹§Ê¸, "¿Íͤʥ¬¥í¥¢Âξå¤Î»»½Ñ±é»»¤Ë´ð¤Å¤¯°Å¹æ¥×¥í¥»¥Ã¥µ¤Î·Á¼°ÅªÀß·×¼êË¡," 2014 ǯ°Å¹æ¤È¾ðÊ󥻥­¥å¥ê¥Æ¥£¥·¥ó¥Ý¥¸¥¦¥à, Vol. 1A3-4, pp.1--8, January 21, 2014.

  • ÎÓÍ¥°ì, ËÜ´Ö¾°Ê¸, ÊÒ²¼ÉÒ¹¨, Á¾º¬ ½¨¾¼, "¼ÂÁ©Åª¾ðÊ󶵰é¤òÄ̤¸¤¿¥Ï¡¼¥É¥¦¥§¥¢¥»¥­¥å¥ê¥Æ¥£¿Íºà¤Î°éÀ®," ÅŻҾðÊóÄÌ¿®³Ø²ñµ»½Ñ¸¦µæÊó¹ð, vol. 113, no. 342, ISEC2013-78, pp. 33-37, 2013.

  • ¾®ÎÓ¿ð¼ù¡¤ÎÓÍ¥°ì¡¤ËÜ´Ö¾°Ê¸¡¤¿åÌÚ·ÉÌÀ¡¤ÀÄÌÚ¹§Ê¸¡¤Á¾º¬½¨¾¼¡¤"ϳ¤¨¤¤Åż§¾ðÊó¤òÍѤ¤¤¿Ç¤°Õ¤Î½èÍý¤Ø¤ÎÈ󿯽±¤Ê¸Î¾ãÃíÆþ¼êË¡,"2013 ǯÅŻҾðÊóÄÌ¿®³Ø²ñ´ðÁᦶ­³¦¥½¥µ¥¤¥¨¥Æ¥£Âç²ñ¡¤A-7-5, p. 101, September 18, 2013.

  • ¾åÌîÎ桤²¬Ëܹ­ÂÀϺ, ËÜ´Ö¾°Ê¸, ÀÄÌÚ¹§Ê¸, "¥¬¥í¥¢Âλ»½Ñ²óÏ©¥°¥é¥Õ¤Ë´ð¤Å¤¯¸í¤êÄûÀµ²óÏ©¤Î·Á¼°Åª¸¡¾Ú¤Ë´Ø¤¹¤ë¸¡Æ¤," Âè36²ó¿ÃÍÏÀÍý¥Õ¥©¡¼¥é¥à, No. 10, pp. 10-1--10-7, September 14, 2013.

  • ¾åÌîÎ桤²¬Ëܹ­ÂÀϺ, ËÜ´Ö¾°Ê¸, ÀÄÌÚ¹§Ê¸¡¤"¸í¤êÄûÀµÉä¹æ²½²óÏ©¤Î·Á¼°ÅªÀ߷פȤ½¤Îɾ²Á¡¤"Ê¿À®25ǯÅÙ Åŵ¤´Ø·¸³Ø²ñÅìËÌ»ÙÉôÏ¢¹çÂç²ñ¡¤No. 2F24, p. 211, August 23, 2013.

  • ±§ÌîÊ㡤±óÆ£æÆ¡¤ËÜ´Ö¾°Ê¸, ÀÄÌÚ¹§Ê¸¡¤"AndroidOS ¾å¤Ë¼ÂÁõ¤µ¤ì¤¿RSA ¥½¥Õ¥È¥¦¥§¥¢¤ËÂФ¹¤ëÅż§¥»¥­¥å¥ê¥Æ¥£²òÀÏ¡¤"Ê¿À®25ǯÅÙ Åŵ¤´Ø·¸³Ø²ñÅìËÌ»ÙÉôÏ¢¹çÂç²ñ¡¤No. 2F20, p. 207, August 23, 2013.

  • ÅèÅÄÀ²µ®¡¤ÎÓÍ¥°ì, ËÜ´Ö¾°Ê¸, ¿åÌÚ·ÉÌÀ¡¤ÀÄÌÚ¹§Ê¸, Á¾º¬½¨¾¼, "°Å¹æ¥â¥¸¥å¡¼¥ë¤Ø¤Î˸³²ÇÈÃíÆþ»þ¤Î¼§³¦Ê¬É۲Ļ벽¤Ë´Ø¤¹¤ë¸¡Æ¤,"ÅŻҾðÊóÄÌ¿®³Ø²ñÁí¹çÂç²ñ, B-4-59, p.404, 2013.

  • »°±º¡¡±Ò¡¤ËÜ´Ö¾°Ê¸¡¤Èª¡¡²íÇ·¡¤ÊҶ͡¡´²¡¤ÀÄÌÚ¹§Ê¸, "ºÒ³²»þ¤Î¾ðÊó¼ý½¸¤Î¤¿¤á¤Îñ´ã¥«¥á¥é¤òÍѤ¤¤¿ÆþÎÏ¥·¥¹¥Æ¥à¤Î¸¡Æ¤," Âè75²ó¾ðÊó½èÍý³Ø²ñÁ´¹ñÂç²ñ, 5J-1, 4-531-4-532, March 8, 2013

  • ²¬Ëܹ­ÂÀϺ¡¤ËÜ´Ö¾°Ê¸¡¤ÀÄÌÚ¹§Ê¸¡¤"¥¬¥í¥¢Âξå¤Î¾è»»´ï¥â¥¸¥å¡¼¥ë¥¸¥§¥Í¥ì¡¼¥¿¤Î¹½ÃÛ¡¤" Âè75²ó¾ðÊó½èÍý³Ø²ñÁ´¹ñÂç²ñ, 3K-8¡¤1-135-1-136¡¤March 7, 2013.

  • ¥ô¥£¥Ã¥ì ¥¦¥ê¥Þ¥¦¥ë¡¤±óÆ£¡¡æÆ¡¤ËÜ´Ö¾°Ê¸¡¤ÀÄÌÚ¹§Ê¸¡¤"LED°Å¹æ¥Ï¡¼¥É¥¦¥§¥¢¤ËÂФ¹¤ëÁê´ØÅÅÎϲòÀϤȤ½¤ÎÂкö¡¤" Âè75²ó¾ðÊó½èÍý³Ø²ñÁ´¹ñÂç²ñ, 2Z-9¡¤3-533-3-534¡¤March 6, 2013.

  • ÎÓÍ¥°ì, ËÜ´Ö¾°Ê¸, ¿åÌÚ·ÉÌÀ, ÀÄÌÚ¹§Ê¸, Á¾º¬½¨¾¼,"ϳ¤¨¤¤¾ðÊó¤òÍѤ¤¤ÆÃíÆþ¥¿¥¤¥ß¥ó¥°¤òÀ©¸æ²Äǽ¤Ê±óÊý¤«¤é¤Î¸Î¾ãÃíÆþ¼êË¡," 2013 ǯ°Å¹æ¤È¾ðÊ󥻥­¥å¥ê¥Æ¥£¥·¥ó¥Ý¥¸¥¦¥à, Vol. 3E4-3, pp.1--6, January 24, 2012.

  • ±óÆ£æÆ, ÍûÍÛ, ËÜ´Ö¾°Ê¸, ºê»³°ìÃË, Æ£ËÜÂç²ð, ±ÊÅÄ¿¿, ÂÀÅÄÏÂÉ×, ÀÄÌÚ¹§Ê¸,"¸Î¾ã´¶ÅÙ±£ÊäΤ¿¤á¤Î¸úΨŪ¤ÊÂкö¤È¤½¤Îɾ²Á," 2013 ǯ°Å¹æ¤È¾ðÊ󥻥­¥å¥ê¥Æ¥£¥·¥ó¥Ý¥¸¥¦¥à, Vol. 1E1-5, pp.1--8, January 22, 2012.

  • ¶Á¿ò»Ë, ËÜ´Ö¾°Ê¸, ÀÄÌÚ¹§Ê¸, ÃçÌîÍ­ÅÐ, Ê¡ÅçϱÑ, À¶ËÜ¿¸ºî, »°ÂðÍ¥, "KCipher-2¤Ø¤ÎÅÅÎϲòÀϹ¶·âÂкö¤È¤½¤Îɾ²Á," ¥³¥ó¥Ô¥å¡¼¥¿¥»¥­¥å¥ê¥Æ¥£¥·¥ó¥Ý¥¸¥¦¥à 2012, pp. 749--756, November 1, 2012.

  • ¿ÅÄÀ®¹¨, ÎÓÍ¥°ì, ËÜ´Ö¾°Ê¸¡¤¿åÌÚ·ÉÌÀ¡¤ÀÄÌÚ¹§Ê¸¡¤Á¾º¬½¨¾¼, "°Õ¿ÞŪ¤ÊÅż§Ë¸³²¤Ë¤è¤ë¥Õ¥©¡¼¥ë¥ÈȯÀ¸¥á¥«¥Ë¥º¥à¤Ë´Ø¤¹¤ë´ðÁÃŪ¸¡Æ¤," Åŵ¤³Ø²ñ¸¦µæ²ñ»ñÎÁ, EMC-12-33, pp. 83-86, October 26, 2012.

  • ²¬Ëܹ­ÂÀϺ, ËÜ´Ö¾°Ê¸, ÀÄÌÚ¹§Ê¸, "Àµµ¬´ðÄìɽ¸½¤µ¤ì¤¿¥¬¥í¥¢Âξå¤Î»»½Ñ±é»»²óÏ©¤Î·Á¼°ÅªÀ߷פ˴ؤ¹¤ë¸¡Æ¤," Âè35²ó¿ÃÍÏÀÍý¥Õ¥©¡¼¥é¥à, No. 7, pp. 7-1--7-6, September 15, 2012.

  • ²¬Ëܹ­ÂÀϺ, ËÜ´Ö¾°Ê¸, ÀÄÌÚ¹§Ê¸, "¥¬¥í¥¢Âξå¤Î»»½Ñ±é»»²óÏ©¤Î¼«Æ°À¸À®¥·¥¹¥Æ¥à¤Î¹½ÃÛ," Ê¿À®24ǯÅÙ Åŵ¤´Ø·¸³Ø²ñÅìËÌ»ÙÉôÏ¢¹çÂç²ñ¡¤No. 1I03, pp. 115, August 30, 2012.

  • ÎÓÍ¥°ì, ËÜ´Ö¾°Ê¸¡¤¿åÌÚ·ÉÌÀ¡¤ÀÄÌÚ¹§Ê¸¡¤Á¾º¬½¨¾¼, "°Õ¿ÞŪ¤ÊÅż§Ë¸³²¤Ë¤è¤ë°Å¹æ¥â¥¸¥å¡¼¥ë¤Ø¤Î¸Î¾ãÃíÆþ¥á¥«¥Ë¥º¥à¤Ë´Ø¤¹¤ë¸¡Æ¤," Åŵ¤³Ø²ñ¸¦µæ²ñ»ñÎÁ, EMC-12-10, pp. 23-27, June 22, 2012.

  • ÎÓÍ¥°ì, ¿åÌÚ·ÉÌÀ¡¤ËÜ´Ö¾°Ê¸¡¤Á¾º¬½¨¾¼, ÀÄÌÚ¹§Ê¸¡¤"¼þÇÈ¿ôÎΰè¤Ë¤ª¤±¤ëÅż§ÇȲòÀϤθúΨ²½¤Ë´Ø¤¹¤ë¸¡Æ¤,"Åż§´Ä¶­¸¦µæ²ñ, EMC-12-003, pp. 13-18, March 21, 2012.

  • ã·Æ£ÏÂÌé, ËÜ´Ö¾°Ê¸, ÀÄÌÚ¹§Ê¸, "¥¬¥í¥¢Âξå¤Î»»½Ñ±é»»²óÏ©¤Î·Á¼°ÅªÀ߷פȤ½¤ÎAES°Å¹æ¥×¥í¥»¥Ã¥µ¤Ø¤Î±þÍÑ," 2012ǯ°Å¹æ¤È¾ðÊ󥻥­¥å¥ê¥Æ¥£¥·¥ó¥Ý¥¸¥¦¥à, Vol. 4C1-4, pp.1--8, February 2, 2012.

  • ÎÓÍ¥°ì, ¿åÌÚ·ÉÌÀ, ËÜ´Ö¾°Ê¸, Á¾º¬½¨¾¼, ÀÄÌÚ¹§Ê¸, "°Å¹æµ¡´ï¾å¤Î¥µ¥¤¥É¥Á¥ã¥Í¥ë¾ðÊó¼èÆÀÀ­Ê¬ÉÛ¿ÞºîÀ®¤Î¸úΨ²½¤Î¸¡Æ¤," 2012ǯ°Å¹æ¤È¾ðÊ󥻥­¥å¥ê¥Æ¥£¥·¥ó¥Ý¥¸¥¦¥à, Vol. 3C2-1, pp.1--7, February 1, 2012.

  • ¶Á¿ò»Ë, ã·Æ£ÏÂÌé, ËÜ´Ö¾°Ê¸, ÀÄÌÚ¹§Ê¸, ÃçÌîÍ­ÅÐ, Ê¡ÅçϱÑ, À¶ËÜ¿¸ºî, »°ÂðÍ¥, "KCipher-2 ¤ËÂФ¹¤ëÁê´ØÅÅÎϲòÀϤȤ½¤ÎÂкö," 2012ǯ°Å¹æ¤È¾ðÊ󥻥­¥å¥ê¥Æ¥£¥·¥ó¥Ý¥¸¥¦¥à, Vol. 3C1-2, pp.1--8, February 1, 2012

  • ã·Æ£ÏÂÌé, ËÜ´Ö¾°Ê¸, ÀÄÌÚ¹§Ê¸, "¥¬¥í¥¢Âξå¤Î»»½Ñ±é»»²óÏ©¤Î·Á¼°ÅªÉ½¸½¤Ë´Ø¤¹¤ë¸¡Æ¤," Âè25²ó¿ÃÍÏÀÍý¤È¤½¤Î±þÍѸ¦µæ²ñ, No. 8, pp. 38--44, January 7 2012.

  • ÃÓ¾¾Âç»Ö¡¢ÎÓÍ¥°ì¡¢¿åÌÚ·ÉÌÀ¡¢ËÜ´Ö¾°Ê¸¡¢Á¾º¬½¨¾¼¡¢ÀÄÌÚ¹§Ê¸, "¾ðÊ󵡴狼¤é¤ÎÅż§Åª¾ðÊóϳ±Ì¤Ë¤ª¤±¤ë¼èÆÀÀ­Í½Â¬¤Ë´Ø¤¹¤ë¸¡Æ¤," ´Ä¶­Åż§¸¦µæ²ñ, EMC-11-32, pp. 23--28, December 9, 2011.

  • ÅèÅÄÀ²µ®, ÎÓÍ¥°ì, ¿åÌÚ·ÉÌÀ, ËÜ´Ö¾°Ê¸, Á¾º¬½¨¾¼, ÀÄÌÚ¹§Ê¸, "¾ðÊ󵡴ï¤Ë¤ª¤±¤ëÊü¼ÍÅż§³¦Ê¬ÉÛ¤ÈÅż§Åª¾ðÊóϳ±Ì¤Ë´Ø¤¹¤ë´ðÁÃŪ¸¡Æ¤," ´Ä¶­Åż§¸¦µæ²ñ, EMC-11-23, pp. 23-27, 2011.

  • ÎÓÍ¥°ì, ËÜ´Ö¾°Ê¸, ¿åÌÚ·ÉÌÀ, ÀÄÌÚ¹§Ê¸, Á¾º¬½¨¾¼, "°Å¹æ¥â¥¸¥å¡¼¥ë¤ËÂФ¹¤ë°Õ¿ÞŪ¤ÊÅż§Ë¸³²¤Ë´Ø¤¹¤ë¸¡Æ¤," 2011ǯÅŻҾðÊóÄÌ¿®³Ø²ñ¥½¥µ¥¤¥¨¥Æ¥£Âç²ñ¡¤B-4-58, September 13, 2011.

  • ã·Æ£ ÏÂÌ顤ËÜ´Ö ¾°Ê¸¡¤ÀÄÌÚ ¹§Ê¸, "»»½Ñ²óÏ©¥°¥é¥Õ¤Î°Å¹æ¥×¥í¥»¥Ã¥µÀ߷פؤαþÍÑ," Âè34²ó¿ÃÍÏÀÍý¥Õ¥©¡¼¥é¥à, No. 11, pp. 11-1--11-6, September 18, 2011.

  • ¶Á¿ò»Ë, ã·Æ£ÏÂÌé, ËÜ´Ö¾°Ê¸, ÀÄÌÚ¹§Ê¸, "¥¹¥È¥ê¡¼¥à°Å¹æKCipher-2¤Î¥Ï¡¼¥É¥¦¥§¥¢¼ÂÁõɾ²Á," Ê¿À®23ǯÅÙ Åŵ¤´Ø·¸³Ø²ñÅìËÌ»ÙÉôÏ¢¹çÂç²ñ¡¤No. 2C25, pp. 115, August 26, 2011.

  • Sho Endo, Naofumi Homma and Takahumi Aoki, "Efficient countermeasure against fault injection attacks on modular," Ê¿À®23ǯÅÙ Åŵ¤´Ø·¸³Ø²ñÅìËÌ»ÙÉôÏ¢¹çÂç²ñ¡¤No. 1A03, pp. 3, August 25, 2011.

  • ÎÓÍ¥°ì, ¿û¸¶·ò, ËÜ´Ö¾°Ê¸¡¤¿åÌÚ·ÉÌÀ¡¤ÀÄÌÚ¹§Ê¸¡¤Á¾º¬½¨¾¼, "°Õ¿ÞŪ¤ÊÅż§Ë¸³²¤Ë¤è¤ë°Å¹æ¥â¥¸¥å¡¼¥ë¤Ø¤Î¸Î¾ãÃíÆþ¤Ë´Ø¤¹¤ë¸¡Æ¤,"Åż§´Ä¶­¸¦µæ²ñ, EMC-11-17, pp. 53-57, June 24, 2011.

  • ÎÓÍ¥°ì, ÃÓ¾¾Âç»Ö¡¤¿åÌÚ·ÉÌÀ, ËÜ´Ö¾°Ê¸¡¤ÀÄÌÚ¹§Ê¸, Á¾º¬½¨¾¼, "SNR¤Ë´ð¤Å¤¤¤¿ÅŻҵ¡´ï¤«¤é¤Î¾ðÊó¼èÆÀÀ­¤Ë´Ø¤¹¤ë´ðÁÃŪ¸¡Æ¤," Åż§´Ä¶­¸¦µæ²ñ, EMC-11-002, pp.5-10, March 24, 2011

  • ÎÓÍ¥°ì, ¿û¸¶·ò, ËÜ´Ö¾°Ê¸, ¿åÌÚ·ÉÌÀ, ÀÄÌÚ¹§Ê¸, Á¾º¬½¨¾¼, "Åż§ÇȤòÍѤ¤¤¿ÅŸ»Àþ¤«¤é¤Î¥Õ¥©¡¼¥ë¥È¹¶·â," 2011ǯ°Å¹æ¤È¾ðÊ󥻥­¥å¥ê¥Æ¥£¥·¥ó¥Ý¥¸¥¦¥à, Vol. 3D3-4, pp.1--6, January 27, 2011.

  • ±óÆ£æÆ, ËÜ´Ö¾°Ê¸, ¿û¸¶·ò, ÀÄÌÚ¹§Ê¸, º´Æ£¾Ú, "¤Ù¤­¾è¾ê;±é»»¤ËÂФ¹¤ë¸Î¾ãÃíÆþ¤òÍѤ¤¤¿ÅÅÎϲòÀϹ¶·â," 2011ǯ°Å¹æ¤È¾ðÊ󥻥­¥å¥ê¥Æ¥£¥·¥ó¥Ý¥¸¥¦¥à, Vol. 1D2-5, pp.1--6, January 25, 2011.

  • ±óÆ£æÆ, ËÜ´Ö¾°Ê¸, ¿û¸¶·ò, ÀÄÌÚ¹§Ê¸, "°Å¹æ¥×¥í¥»¥Ã¥µ¤Î¸Î¾ã²òÀÏ¥·¥¹¥Æ¥à¤Ë´Ø¤¹¤ë¸¡Æ¤," Âè24²ó¿ÃÍÏÀÍý¤È¤½¤Î±þÍѸ¦µæ²ñ, No. 11, pp. 11-1-11-4, January 9 2011.

  • ã·Æ£ÏÂÌé, ËÜ´Ö¾°Ê¸, ÀÄÌÚ¹§Ê¸, "»»½Ñ²óÏ©¥°¥é¥Õ¤Ë´ð¤Å¤¯»»½Ñ±é»»²óÏ©¤Î·Á¼°ÅªÀ߷פ˴ؤ¹¤ë¸¡Æ¤," Âè24²ó¿ÃÍÏÀÍý¤È¤½¤Î±þÍѸ¦µæ²ñ, No. 8, pp. 8-1-8-6, January 8 2011.

  • ã·Æ£ÏÂÌé, ËÜ´Ö¾°Ê¸, ÀÄÌÚ¹§Ê¸ "¿ÃÍ»»½Ñ±é»»²óÏ©¸þ¤±»» ½Ñ¥¢¥ë¥´¥ê¥º¥à¤Î·Á¼°ÅªÉ½¸½¤È¸¡¾Ú¤Ë´Ø¤¹¤ë¸¡Æ¤," Âè33²ó ¿ÃÍÏÀÍý¥Õ¥©¡¼¥é¥à, No. 8, pp. 8-1--8-6, September 2010.

  • ¥Õ¥¡¥¸¥ã¥ë ¥á¥¬ ¥×¥é¥¿¥Þ, ËÜ´Ö¾°Ê¸, ÀÄÌÚ¹§Ê¸, »³¸ýδ ¹°, ½ÐÀɧ, ½©ÅÄδǷ, "½ÅÊ£ÂÓ°è¤Î°ÌÁê¾ðÊó¤òÍøÍѤ·¤¿ ¹­ÂÓ°è¿®¹æ·×¬ˡ¤Îɾ²Á," Ê¿À®22ǯÅÙ Åŵ¤´Ø·¸³Ø²ñÅìËÌ »ÙÉôÏ¢¹çÂç²ñ, No. 1H14, p. 262, August 2010

  • ã·Æ£ÏÂÌé, ¿û¸¶ ·ò, ËÜ´Ö¾°Ê¸, ÀÄÌÚ¹§Ê¸, º´Æ£¾Ú, " Â汧 ¶ÊÀþ°Å¹æ¥Ï¡¼¥É¥¦¥§¥¢¤ÎÅÅÎϲòÀϤˤè¤ë°ÂÁ´À­É¾²Á," Ê¿À® 22ǯÅÙ Åŵ¤´Ø·¸³Ø²ñÅìËÌ»ÙÉôÏ¢¹çÂç²ñ, No. 1E08, p. 143, August 2010

  • º´Æ£¾Ú, ÊÒ²¼ÉÒ¹¨, ¿û¸¶·ò, ËÜ´Ö¾°Ê¸, ÀÄÌÚ¹§Ê¸, "¥Ï¥Ã¥·¥å´Ø¿ôLuffa¤Î¥Ï¡¼¥É¥¦¥§¥¢¼ÂÁõ," ¥Þ¥ë¥Á¥á¥Ç¥£¥¢¡¤Ê¬»¶¡¤¶¨Ä´¤È¥â¥Ð¥¤¥ë (DICOMO2010) ¥·¥ó¥Ý¥¸¥¦¥à, No. 7F-1, pp. 1660--1665, July 2010.

  • ÎÓ Í¥°ì, ¿û¸¶ ·ò, ÃÓ¾¾ Âç»Ö, ËÜ´Ö ¾°Ê¸, ¿åÌÚ ·ÉÌÀ, ÀÄ ÌÚ ¹§Ê¸, Á¾º¬ ½¨¾¼"°Å¹æµ¡´ï¤ÎʪÍý·Á¾õ¤ò¹Íθ¤·¤¿¥µ¥¤ ¥É¥Á¥ã¥Í¥ë¾ðÊó¤Îɾ²Á," 2010ǯ°Å¹æ¤È¾ðÊ󥻥­¥å¥ê¥Æ¥£ ¥·¥ó¥Ý¥¸¥¦¥à, Vol. 3B1-4, pp.1--6, January 2010.

  • ¶â ÍÑÂç, ¿û¸¶ ·ò, ËÜ´Ö ¾°Ê¸,ÀÄÌÚ ¹§Ê¸, º´Æ£ ¾Ú, "ÊÐ¤é ¤»¤¿ÇÈ·Á¥»¥Ã¥È¤òÍѤ¤¤¿ÅÅÎϲòÀϹ¶·â¤Î¹âÀºÅÙ²½," 2010ǯ °Å¹æ¤È¾ðÊ󥻥­¥å¥ê¥Æ¥£¥·¥ó¥Ý¥¸¥¦¥à, Vol. 3B1-5, pp.1--6, January 2010.

  • ¿û¸¶ ·ò, ËÜ´Ö ¾°Ê¸, ÎÓ Í¥°ì, ¿åÌÚ ·ÉÌÀ, ÀÄÌÚ ¹§Ê¸, Á¾ º¬ ½¨¾¼, º´Æ£ ¾Ú, "ÊÑÄ´¤µ¤ì¤¿¥µ¥¤¥É¥Á¥ã¥Í¥ë¿®¹æ¤Î¼þÇÈ ¿ôÎΰè¤Ç¤ÎÅÅÎϲòÀÏ," 2010ǯ°Å¹æ¤È¾ðÊ󥻥­¥å¥ê¥Æ¥£¥·¥ó ¥Ý¥¸¥¦¥à, Vol. 3B1-4, pp.1--6, January 2010.

  • ¶âÍÑÂç, ¿û¸¶·ò, ÎÓÍ¥°ì, ËÜ´Ö¾°Ê¸, ÀÄÌÚ¹§Ê¸, º´Æ£¾Ú," ½Å²óµ¢Ê¬ÀϤòÍѤ¤¤¿¥µ¥¤¥É¥Á¥ã¥Í¥ë¹¶·â¤Î¹âÀºÅÙ²½¡¤"¥³¥ó ¥Ô¥å¡¼¥¿¥»¥­¥å¥ê¥Æ¥£¥·¥ó¥Ý¥¸¥¦¥à 2009, pp. 649--654, October 2009.

  • ÇϾìÍ´°ì¡¤µÜËÜÆƻ֡¤ËÜ´Ö¾°Ê¸¡¤ÀÄÌÚ¹§Ê¸¡¤""ÅÅή¥â¡¼¥É ¿ÃÍÏÀÍý¤òÍѤ¤¤¿°Å¹æ¥Ï¡¼¥É¥¦¥§¥¢¤Î°ÂÁ´À­¤Ë´Ø¤¹¤ë¸¡Æ¤¡¤ "Âè32²ó¿ÃÍÏÀÍý¥Õ¥©¡¼¥é¥à, No. 3, pp. 3-1--3-6, September 2009.

  • ¿û¸¶·ò, ÎÓÍ¥°ì, ËÜ´Ö¾°Ê¸, ¿åÌÚ·ÉÌÀ¡¤ÀÄÌÚ¹§Ê¸¡¤Á¾º¬½¨ ¾¼, º´Æ£¾Ú, "¼þÇÈ¿ôÎΰè¤Ç¤Î°Å¹æ¥â¥¸¥å¡¼¥ë¤ÎÅÅÎϲòÀÏ¡¤ "Âè8²ó¾ðÊó²Ê³Øµ»½Ñ¥Õ¥©¡¼¥é¥à (FIT2009), No. L-007, pp. 142--145, September 2009.

  • ¥Õ¥¡¥¸¥ã¥ë ¥á¥¬ ¥×¥é¥¿¥Þ¡¤µÜß·°ìÇ·¡¤ËÜ´Ö¾°Ê¸¡¤ÀÄÌÚ¹§ ʸ¡¤""ÂÓ°èʬ³äË¡¤Ë´ð¤Å¤¯¹­ÂÓ°è¿®¹æ·×¬," Âè8²ó ¾ðÊó²Ê ³Øµ»½Ñ¥Õ¥©¡¼¥é¥à (FIT2009), No. C-039, pp. 527--534, September 2009.

  • ¶âÍÑÂ硤¿û¸¶·ò¡¤ËÜ´Ö¾°Ê¸¡¤ÀÄÌÚ¹§Ê¸¡¤º´Æ£¾Ú, "AES ¤Î¥Ï¡¼ ¥É¥¦¥§¥¢¼ÂÁõ¤ËÂФ¹¤ë¥Æ¥ó¥×¥ì¡¼¥È¹¶·â," Âè8²ó ¾ðÊó²Ê³Ø µ»½Ñ¥Õ¥©¡¼¥é¥à (FIT2009), No. L-008, pp. 139--146, September 2009.

  • ÇϾìÍ´°ì¡¤µÜËÜÆƻ֡¤ËÜ´Ö¾°Ê¸¡¤ÀÄÌÚ¹§Ê¸¡¤º´Æ£¾Ú¡¤"RSA °Å¹æ¥×¥í¥»¥Ã¥µ¥¸¥§¥Í¥ì¡¼¥¿¤ÎÀ߷פÈɾ²Á¡¤" Âè8²ó¾ðÊó²Ê ³Øµ»½Ñ¥Õ¥©¡¼¥é¥à(FIT2009), No. RC-003, pp. 129--136, September 2009¡¥

  • Ä»ÄÍ ±Ñ¼ù¡¤»³¸ý ÀµÍΡ¤¿û¸¶ ·ò¡¤ËÜ´Ö ¾°Ê¸¡¤º´Æ£ ¾Ú¡¤ÀÄ ÌÚ ¹§Ê¸¡¤"¥ª¥ó¥Á¥Ã¥×½¸ÀѲ½¥Þ¥¤¥¯¥í¼§³¦¥×¥í¡¼¥Ö¤òÍѤ¤ ¤¿°Å¹æLSI ¤Î¶á˵¼§³¦·×¬¡¤"¡¡ÅÅ»ÒÄÌ¿®³Ø²ñ´Ä¶­Åż§¹©³Ø ¸¦µæ²ñ¡¤Vol. 108, No. 482, pp. 37-42, March, 2009.

  • ÊÒ²¼ ÉÒ¹¨¡¤º´Æ£¡¡¾Ú¡¤¿û¸¶ ·ò¡¤ËÜ´Ö¾°Ê¸¡¤ÀÄÌÚ¹§Ê¸¡¤ "CPA¤ËÂФ¹¤ë¥Ç¥«¥Ã¥×¥ê¥ó¥°¥­¥ã¥Ñ¥·¥¿¤Î±Æ¶Á¤ÎͽÈ÷¸¡¾Ú¡¤ " 2009ǯ°Å¹æ¤È¾ðÊ󥻥­¥å¥ê¥Æ¥£¥·¥ó¥Ý¥¸¥¦¥à, Vol. 3A4-2, pp.1--6, January 2009.

  • ¿û¸¶ ·ò¡¤Ä»ÄÍ ±Ñ¼ù¡¤ËÜ´Ö¾°Ê¸¡¤º´Æ£¾Ú¡¤ÀÄÌÚ¹§Ê¸¡¤»³¸ý ÀµÍÎ"ºÇ¶á˵¤«¤é·×¬¤·¤¿¼§³¦¤òÍѤ¤¤¿º¹Ê¬Åż§ÇȲòÀÏ¡¤" 2009ǯ°Å¹æ¤È¾ðÊ󥻥­¥å¥ê¥Æ¥£¥·¥ó¥Ý¥¸¥¦¥à, Vol. 3A1-5, pp.1--6, January 2009.

  • µÜËÜÆƻ֡¤ËÜ´Ö¾°Ê¸¡¤ÀÄÌÚ¹§Ê¸¡¤º´Æ£¾Ú¡¤"¤Ù¤­¾è¾ê;±é»» ¤ËÂФ¹¤ëÈæ³ÓÅÅÎϲòÀϤαþÍÑ¡¤" 2009ǯ°Å¹æ¤È¾ðÊ󥻥­¥å ¥ê¥Æ¥£¥·¥ó¥Ý¥¸¥¦¥à, Vol. 2A1-2, pp.1--6, January 2009.

  • ËÜ´Ö¾°Ê¸¡¤µÜËÜÆƻ֡¤¿û¸¶·ò¡¤ÀÄÌÚ¹§Ê¸¡¤º´Æ£¾Ú¡¤"¥µ¥¤¥É ¥Á¥ã¥Í¥ë¹¶·âɾ²ÁÍÑISO/IECɸ½à°Å¹æ¥×¥í¥»¥Ã¥µ¤Î³«È¯¡¤" 2009ǯ°Å¹æ¤È¾ðÊ󥻥­¥å¥ê¥Æ¥£¥·¥ó¥Ý¥¸¥¦¥à, Vol. 2A1-1, pp.1--6, January 2009.

  • ¿û¸¶·ò¡¤ËÜ´Ö¾°Ê¸¡¤ÀÄÌÚ¹§Ê¸¡¤º´Æ£¾Ú¡¤"ɸ½àɾ²Á´ðÈľå¤Î ASIC¤Ø¤Îº¹Ê¬ÅÅÎϲòÀϼ¸³¡¤"¥³¥ó¥Ô¥å¡¼¥¿¥»¥­¥å¥ê¥Æ¥£¥· ¥ó¥Ý¥¸¥¦¥à 2008, D5-3, October 2008.

  • ÎÓÍ¥°ì¡¤¿û¸¶·ò¡¤ËÜ´Ö¾°Ê¸¡¤¿åÌÚ·ÉÌÀ¡¤ÀÄÌÚ¹§Ê¸¡¤Á¾º¬½¨ ¾¼¡¤º´Æ£ ¾Ú¡¤"ÅŸ»¥é¥¤¥ó¾å¤Îϳ±Ì¾ðÊó¤òÍѤ¤¤¿¥µ¥¤¥É¥Á¥ã ¥Í¥ë¹¶·â¡¤"¥³¥ó¥Ô¥å¡¼¥¿¥»¥­¥å¥ê¥Æ¥£¥·¥ó¥Ý¥¸¥¦¥à 2008, D5-2, October 2008.

  • ÊÒ²¼ÉÒ¹¨¡¤º´Æ£¾Ú¡¤¿û¸¶·ò¡¤ËÜ´Ö¾°Ê¸¡¤ÀÄÌÚ¹§Ê¸¡¤"¸°¸õÊä ¤ÎäÁ¤¤Ê¬¤±¤Ë¤è¤ëCPA¤Î¹â®²½¤È¸°¿äÄêÀºÅ٤θþ¾å¡¤"¥³¥ó ¥Ô¥å¡¼¥¿¥»¥­¥å¥ê¥Æ¥£¥·¥ó¥Ý¥¸¥¦¥à 2008, D5-1, October 2008.

  • ÇϾìÍ´°ì¡¤µÜËÜÆƻ֡¤ËÜ´Ö¾°Ê¸¡¤ÀÄÌÚ¹§Ê¸¡¤º´Æ£¾Ú¡¤"¹â´ð¿ô¥â¥ó¥´¥á¥ê¾è»»¤Ë´ð¤Å¤¯RSA°Å¹æ¤Î¹âÀ­Ç½¥Ï¡¼¥É¥¦¥§¥¢¼ÂÁõ¡¤"Ê¿À®20ǯÅÙÅŵ¤´Ø·¸³Ø²ñÅìËÌ»ÙÉôÏ¢¹çÂç²ñ,No. 1F07, p. 198, August 2008.

  • º´Æ£¾Ú, ¿û¸¶·ò¡¤ËÜ´Ö¾°Ê¸¡¤ÀÄÌÚ¹§Ê¸¡¤"¥Ö¥í¥Ã¥¯°Å¹æAES¤Î¹âÀ­Ç½¥¨¥é¡¼¸¡½Ð²óÏ©Êý¼°, "¥Þ¥ë¥Á¥á¥Ç¥£¥¢¡¤Ê¬»¶¡¤¶¨Ä´¤È¥â¥Ð¥¤¥ë (DICOMO2008) ¥·¥ó¥Ý¥¸¥¦¥à, No. 3A-3, pp. 498 - 505, July 2008.

  • ¿û¸¶·ò, ËÜ´Ö¾°Ê¸, ÀÄÌÚ¹§Ê¸, º´Æ£¾Ú, "¥·¥Õ¥È¥ì¥¸¥¹¥¿¡¦¥¢¡¼¥­¥Æ¥¯¥Á¥ã¤Ë¤è¤ë¥Ï¥Ã¥·¥å´Ø¿ôWhirlpool¤Î¹âÀ­Ç½²óÏ©¼ÂÁõ, "¥Þ¥ë¥Á¥á¥Ç¥£¥¢¡¤Ê¬»¶¡¤¶¨Ä´¤È¥â¥Ð¥¤¥ë (DICOMO2008) ¥·¥ó¥Ý¥¸¥¦¥à, No. 3A-2, pp. 490 - 497, July 2008.

  • µÜËÜÆÆ»Ö, ËÜ´Ö¾°Ê¸, ÀÄÌÚ¹§Ê¸, º´Æ£¾Ú, "ÆÃÄêÆþÎÏ¥Ú¥¢¤òÍѤ¤¤¿RSA°Å¹æ¤ËÂФ¹¤ëÅÅÎϲòÀϹ¶·â¤Î¼Â¸³ÅªÉ¾²Á, "¥Þ¥ë¥Á¥á¥Ç¥£¥¢¡¤Ê¬»¶¡¤¶¨Ä´¤È¥â¥Ð¥¤¥ë (DICOMO2008) ¥·¥ó¥Ý¥¸¥¦¥à, No. 3A-1, pp. 482 - 489, July 2008.

  • ÅÏîµ Íµ¼ù¡¤ËÜ´Ö ¾°Ê¸¡¤½ÐÀî ¾¡É§¡¤ÀÄÌÚ ¹§Ê¸¡¤Èõ¸ý ζͺ, "»»½Ñ¥¢¥ë¥´¥ê¥º¥àµ­½Ò¸À¸ì¤Ë´ð¤Å¤¯Â¿ÃÍÏÀÍý²óÏ©¤ÎÀß·×," Âè21²ó¡¡²óÏ©¤È¥·¥¹¥Æ¥à·Ú°æÂô¥ï¡¼¥¯¥·¥ç¥Ã¥×, pp. 237--242, April 2008.

  • µÜËÜÆƻ֡¤ËÜ´Ö¾°Ê¸¡¤ÀÄÌÚ¹§Ê¸¡¤º´Æ£¾Ú¡¤"¹â´ð¿ô¥â¥ó¥´¥á ¥ê¾è»»¤Ë´ð¤Å¤¯¥¹¥±¡¼¥é¥Ö¥ëRSA°Å¹æ¥×¥í¥»¥Ã¥µ¤ÎÀ߷ס¤" 2008ǯ°Å¹æ¤È¾ðÊ󥻥­¥å¥ê¥Æ¥£¥·¥ó¥Ý¥¸¥¦¥à, Vol. 2C3-3, pp.1-6, January 2008.

  • ¿û¸¶·ò, ËÜ´Ö¾°Ê¸, ÀÄÌÚ¹§Ê¸, º´Æ£¾Ú,"¥Ï¥Ã¥·¥å´Ø¿ô Whirlpool ¤Î¾®·¿¥Ï¡¼¥É¥¦¥§¥¢¡¦¥¢¡¼¥­¥Æ¥¯¥Á¥ã¡¤" 2008 ǯ°Å¹æ¤È¾ðÊ󥻥­¥å¥ê¥Æ¥£¥·¥ó¥Ý¥¸¥¦¥à, Vol. 2C3-1, pp.1-6, January 2008.

  • ËÜ´Ö¾°Ê¸¡¤µÜËÜÆƻ֡¤ÀÄÌÚ¹§Ê¸¡¤º´Æ£¾Ú¡¤"RSA°Å¹æ¤ËÂФ¹ ¤ëʿʸÁªÂò·¿ÅÅÎϲòÀϹ¶·â¤Î¸¡Æ¤¡¤" 2008ǯ°Å¹æ¤È¾ðÊó¥» ¥­¥å¥ê¥Æ¥£¥·¥ó¥Ý¥¸¥¦¥à, Vol. 1A1-5, pp.1-6, January 2008.

  • µÜËÜ Æƻ֡¤ËÜ´Ö ¾°Ê¸¡¤ÀÄÌÚ ¹§Ê¸¡¤º´Æ£ ¾Ú¡¤"RSA°Å¹æ¤Ë ÂФ¹¤ëʿʸÁªÂò·¿SPA¤Î¼Â¸³ÅªÉ¾²Á," ¥³¥ó¥Ô¥å¡¼¥¿¥»¥­¥å ¥ê¥Æ¥£¥·¥ó¥Ý¥¸¥¦¥à 2007, pp. 649--654, November 2007.

  • ¿û¸¶·ò¡¤ËÜ´Ö¾°Ê¸¡¤ÀÄÌÚ¹§Ê¸¡¤º´Æ£¾Ú¡¤"128¥Ó¥Ã¥È¥Ö¥í¥Ã ¥¯°Å¹æCLEFIA¤ÎASIC¼ÂÁõ," ¥³¥ó¥Ô¥å¡¼¥¿¥»¥­¥å¥ê¥Æ¥£¥·¥ó ¥Ý¥¸¥¦¥à 2007, pp. 175--180, October 2007.

  • ÅÏîµÍµ¼ù¡¤ËÜ´Ö¾°Ê¸¡¤ÀÄÌÚ¹§Ê¸¡¤Èõ¸ýζͺ, "·×»»µ¡Âå¿ô¤Ë ´ð¤Å¤¯»»½Ñ±é»»²óÏ©¤Îɽ¸½¤È¸¡¾Ú," DA¥·¥ó¥Ý¥¸¥¦¥à2007 ÏÀʸ½¸, pp. 61--66, August 2007.

  • A. Tumewu, A. Miyamoto, N. Homma, T. Aoki and A. Satoh, "Power analysis against RSA software implementation on a 32-bit microprocessor," Ê¿À®19ǯÅÙ Åŵ¤´Ø·¸³Ø²ñÅìËÌ»ÙÉôÏ¢¹çÂç²ñ, No. 1A17, p. 17, August 2007.

  • ¿û¸¶·ò¡¤ËÜ´Ö¾°Ê¸¡¤ÀÄÌÚ¹§Ê¸¡¤º´Æ£¾Ú, "¥µ¥¤¥É¥Á¥ã¥Í¥ë¹¶·âɸ½àɾ²ÁFPGA¥Ü¡¼¥É¤òÍѤ¤¤¿°Å¹æ¥Ï¡¼¥É¥¦¥§¥¢¤ËÂФ¹¤ëÅÅÎϲòÀϼ¸³," ¥Þ¥ë¥Á¥á¥Ç¥£¥¢¡¤Ê¬»¶¡¤¶¯Ä´¤È¥â¥Ð¥¤¥ë (DICOMO2007) ¥·¥ó¥Ý¥¸¥¦¥à, pp. 1415--1420, July 2007.

  • µÜËÜÆƻ֡¤ËÜ´Ö¾°Ê¸¡¤ÀÄÌÚ¹§Ê¸¡¤º´Æ£¾Ú, "ÆÃÄêÆþÎϥѥ¿¡¼¥ó¤òÍѤ¤¤¿RSA°Å¹æ¥Ï¡¼¥É¥¦¥§¥¢¤Îñ½ãÅÅÎϲòÀÏ," ¥Þ¥ë¥Á¥á¥Ç¥£¥¢¡¢Ê¬»¶¡¢¶¨Ä´¤È¥â¥Ð¥¤¥ë (DICOMO2007) ¥·¥ó¥Ý¥¸¥¦¥à, pp. 1409--1414, July 2007.

  • ĹÅèÀ»¡¤ËÜ´Ö¾°Ê¸¡¤¿û¸¶·ò¡¤ÀÄÌÚ¹§Ê¸¡¤º´Æ£¾Ú, "ÇÈ·Á¥Õ¥£¥ë¥¿¥ê¥ó¥°¤Ë¤è¤ë°Å¹æ¥â¥¸¥å¡¼¥ë¤Ø¤Î¹âÀºÅÙÅÅÎϲòÀÏ," ¥Þ¥ë¥Á¥á¥Ç¥£¥¢¡¤Ê¬»¶¡¤¶¯Ä´¤È¥â¥Ð¥¤¥ë (DICOMO2007) ¥·¥ó¥Ý¥¸¥¦¥à, pp. 1403--1408, July 2007.

  • ÅÏîµÍµ¼ù¡¤ËÜ´Ö¾°Ê¸¡¤ÀÄÌÚ¹§Ê¸¡¤Èõ¸ýζͺ, "ÊÂÎó¥×¥ì¥Õ¥£¥Ã¥¯¥¹²Ã»»´ï¤òÍѤ¤¤¿»»½Ñ±é»»¥â¥¸¥å¡¼¥ë¤Î¼«Æ°À¸À®," ¿®³Øµ»Êó, Vol. 107, No. 101, pp. 49--54, June 2007.

  • ½ÐÀɧ¡¤ËÜ´Ö¾°Ê¸¡¤ÀÄÌÚ ¹§Ê¸¡¤Èõ¸ýζͺ, "Counter Tree Diagram¤Ë¤è¤ë¿ÃÍ»»½Ñ±é»»²óÏ©¤ÎºÇŬÀß·×," Âè20²ó¡¡²óÏ©¤È¥·¥¹¥Æ¥à·Ú°æÂô¥ï¡¼¥¯¥·¥ç¥Ã¥×, pp. 361--366, April 2007.

  • ¿û¸¶·ò, ËÜ´Ö¾°Ê¸, ÀÄÌÚ¹§Ê¸, º´Æ£¾Ú, "ISOɸ½à¥Ö¥í¥Ã¥¯°Å¹æ¤ÎASIC¥Ï¡¼¥É¥¦¥§¥¢À­Ç½É¾²Á," 2007ǯ¾ðÊóÄÌ¿®´ðÁÃ¥µ¥Ö¥½¥µ¥¤¥¨¥Æ¥£¹çƱ¸¦µæ²ñ, ¿®³Øµ»Êó, vol. 106, No. 597, ISEC2006-159, pp. 111-117, ·²ÇÏ, March 2007.

  • ËÜ´Ö¾°Ê¸¡¤µÜËÜÆƻ֡¤ÀÄÌÚ¹§Ê¸¡¤º´Æ£¾Ú¡¤"¸ÇÄêÃÍÆþÎϤòÍѤ¤¤¿RSA°Å¹æ¥Ï¡¼¥É¥¦¥§¥¢¤ËÂФ¹¤ëSPA¡¤" ¡¡2007ǯ°Å¹æ¤È¾ðÊ󥻥­¥å¥ê¥Æ¥£¥·¥ó¥Ý¥¸¥¦¥à, Vol. 3E3-2, pp.1-6, January 2007.

  • ËÜ´Ö¾°Ê¸¡¤Ä¹ÅèÀ»¡¤º£°æ͵°ì¡¤ÀÄÌÚ¹§Ê¸¡¤º´Æ£¾Ú¡¤"°ÌÁê¸ÂÄêÁê´ØË¡¤òÍѤ¤¤¿¹âÀºÅÙº¹Ê¬ÅÅÎϲòÀϤȤ½¤Î¥Î¥¤¥ºÂÑÀ­É¾²Á¡¤"¡¡2007ǯ°Å¹æ¤È¾ðÊ󥻥­¥å¥ê¥Æ¥£¥·¥ó¥Ý¥¸¥¦¥à, Vol. 2E4-5, pp.1-6, January 2007.

  • ÅÏîµÍµ¼ù¡¤ËÜ´Ö¾°Ê¸¡¤ÀÄÌÚ¹§Ê¸¡¤Èõ¸ýζͺ, "»»½Ñ±é»»²óÏ©¤Î·Á¼°Åª¸¡¾Ú¼êË¡¤È¤½¤Îɾ²Á," ¥Ç¥¶¥¤¥ó¥¬¥¤¥¢2006 ¡ÁVLSIÀ߷פο·¤·¤¤ÂçÃϤò¹Í¤¨¤ë¸¦µæ²ñ¡Á, Vol. 106, No. 387, pp. 17--22, November 2006.

  • ĹÅèÀ»¡¤ËÜ´Ö¾°Ê¸¡¤º£°æ͵°ì¡¤ÀÄÌÚ¹§Ê¸¡¤º´Æ£¾Ú¡¤" °ÌÁê¸ÂÄêÁê´ØË¡¤Ë´ð¤Å¤¯¹âÀºÅÙÇÈ·Á¥Þ¥Ã¥Á¥ó¥° -- °Å¹æ¥Ï¡¼¥É¥¦¥§¥¢¤ÎÆ°ºî²òÀϤؤαþÍÑ --," Âè21²ó¿®¹æ½èÍý¥·¥ó¥Ý¥¸¥¦¥à¡¤ pp. B5-4¡¤November 2006.

  • µÜËÜÆƻ֡¤ËÜ´Ö¾°Ê¸¡¤ÀÄÌÚ¹§Ê¸¡¤º´Æ£¾Ú¡¤" RSA°Å¹æ¤ÎFPGA¼ÂÁõ¤ËÂФ¹¤ëSPAÂÑÀ­É¾²Á," ¥³¥ó¥Ô¥å¡¼¥¿¥»¥­¥å¥ê¥Æ¥£¥·¥ó¥Ý¥¸¥¦¥àCSS2006¡¤pp. 263--268¡¤October 2006.

  • ¿û¸¶·ò¡¤ËÜ´Ö¾°Ê¸¡¤ÀÄÌÚ¹§Ê¸¡¤º´Æ£¾Ú¡¤"64¥Ó¥Ã¥È¥Ö¥í¥Ã¥¯°Å¹æCAST-128¤Î¾®·¿ASIC¼ÂÁõ," ¥³¥ó¥Ô¥å¡¼¥¿¥»¥­¥å¥ê¥Æ¥£¥·¥ó¥Ý¥¸¥¦¥àCSS2006¡¤pp. 257--262¡¤October 2006.

  • º£°æ͵°ì¡¤ËÜ´Ö¾°Ê¸¡¤Ä¹ÅèÀ»¡¤ÀÄÌÚ¹§Ê¸¡¤º´Æ£¾Ú¡¤"°ÌÁê¸ÂÄêÁê´ØË¡¤Ë¤è¤ëÇÈ·Á¥Þ¥Ã¥Á¥ó¥°¤òÍѤ¤¤¿¹âÀºÅÙº¹Ê¬ÅÅÎϲòÀÏË¡," ¥³¥ó¥Ô¥å¡¼¥¿¥»¥­¥å¥ê¥Æ¥£¥·¥ó¥Ý¥¸¥¦¥àCSS2006¡¤pp. 61--66¡¤October 2006.

  • ¿û¸¶·ò¡¤ËÜ´Ö¾°Ê¸¡¤ÀÄÌÚ¹§Ê¸¡¤º´Æ£¾Ú,¡¡"ϳ±ÌÅż§ÇȤˤè¤ë¶¦Ä̸°°Å¹æ½èÍý¥Ï¡¼¥É¥¦¥§¥¢¤ÎÆ°ºî²òÀÏ," Ê¿À®18ǯÅÙÅŵ¤´Ø·¸³Ø²ñÅìËÌ»ÙÉôÏ¢¹çÂç²ñ, p. 210, August 2006.

  • ËÜ´Ö¾°Ê¸¡¤ÀÄÌÚ¹§Ê¸¡¤Èõ¸ýζͺ, "Counter Tree Diagram¤Ë´ð¤Å¤¯2ÃÍ¡¦Â¿Ã͹⮲û»´ï¤Î²òÀÏ," Âè29²ó ¿ÃÍÏÀÍý¥Õ¥©¡¼¥é¥à, Vol. 29, No. 12, pp. 1--6, August 2006.

  • ÅÏîµÍµ¼ù¡¤ËÜ´Ö¾°Ê¸¡¤ÀÄÌÚ¹§Ê¸¡¤Èõ¸ýζͺ, "»»½Ñ¥¢¥ë¥´¥ê¥º¥à¤Î·Á¼°Åª¸¡¾Ú¤Ë´Ø¤¹¤ë°ì¹Í»¡," Âè29²ó ¿ÃÍÏÀÍý¥Õ¥©¡¼¥é¥à, Vol. 29, No. 11, pp. 1--6, August 2006.

  • ËÜ´Ö¾°Ê¸¡¤ÀÄÌÚ¹§Ê¸¡¤º´Æ£¾Ú, "°Å¹æ½èÍýLSI¤ÎÀß·×µ»½Ñ," IEEE EMC-S ÀçÂæ¥Á¥ã¥×¥¿¡¦¥³¥í¥­¥¦¥à¡¤July 7, 2006. ¡Ê¾·ÂÔ¹Ö±é¡Ë

  • º£°æ͵°ì¡¤ËÜ´Ö¾°Ê¸¡¤Ä¹ÅèÀ»¡¤ÀÄÌÚ¹§Ê¸¡¤º´Æ£¾Ú, ¡È°ÌÁê¸ÂÄêÁê´ØË¡¤Ë´ð¤Å¤¯¹âÀºÅÙÇÈ·Á²òÀϤȤ½¤Î¥µ¥¤¥É¥Á¥ã¥Í¥ë¹¶·â¤Ø¤Î±þÍÑ,¡É ¿®³Øµ»Êó, IT2005-81, pp. 97--104, March 2006.

  • µÜËÜÆƻ֡¤ËÜ´Ö¾°Ê¸¡¤ÀÄÌÚ¹§Ê¸¡¤º´Æ£¾Ú, ¡ÈÀÑϱ黻´ï¤Ë´ð¤Å¤¯¥¹¥±¡¼¥é¥Ö¥ë¹â´ð¿ô¥â¥ó¥´¥á¥ê¾è»»´ï¤ÎÀ߷פÈɾ²Á,¡É 2006ǯ°Å¹æ¤È¾ðÊ󥻥­¥å¥ê¥Æ¥£¥·¥ó¥Ý¥¸¥¦¥à, Vol. 2C4, No.1, pp.139--144, January 2006.

  • µÜËÜÆÆ»Ö, ÅÏîµÍµ¼ù, ËÜ´Ö¾°Ê¸, ÀÄÌÚ¹§Ê¸, Èõ¸ýζͺ, ¡È»»½Ñ¥¢¥ë¥´¥ê¥º¥àµ­½Ò¸À¸ìARITH¤Ë´ð¤Å¤¯¾éĹ2¿Ê¾è»»´ï¤Î·Á¼°ÅªÀß·×,¡É Ê¿À®17ǯÅÙÅŵ¤´Ø·¸³Ø²ñÅìËÌ»ÙÉôÏ¢¹çÂç²ñ, p. 326, August 2005.

  • ÅÏîµÍµ¼ù, ËÜ´Ö¾°Ê¸, ÀÄÌÚ¹§Ê¸, Èõ¸ýζͺ, ¡È»»½Ñ¥¢¥ë¥´¥ê¥º¥àµ­½Ò¸À¸ìARITH¤Ë´ð¤Å¤¯»»½Ñ±é»»²óÏ©¤Î·Á¼°ÅªÀß·×,¡É ¿®³Øµ»Êó, CAS2005-21, pp. 37--42, June 2005.

  • ËÜ´Ö¾°Ê¸, ÀÄÌÚ¹§Ê¸, Èõ¸ýζͺ, ¡È¾éĹ¿ô·Ï¤Ë´ð¤Å¤¯¹â®²Ã»»´ï¤ÎºÇŬÀß·×,¡É ¿®³Øµ»Êó, CAS2005-20, pp. 31--36, June 2005.

  • ÀÐÅÄ °ìºÈ, ËÜ´Ö ¾°Ê¸, ÀÄÌÚ ¹§Ê¸, Èõ¸ý ζͺ, ¡È»»½Ñ¥¢¥ë¥´¥ê¥º¥àµ­½Ò¸À¸ì¤òÍѤ¤¤¿¾è»»´ï¥â¥¸¥å¡¼¥ë¥¸¥§¥Í¥ì¡¼¥¿¤Î¹½ÃÛ,¡É ¥Ç¥¶¥¤¥ó¥¬¥¤¥¢2004 ¡ÁVLSIÀ߷פο·¤·¤¤ÂçÃϤò¹Í¤¨¤ë¸¦µæ²ñ¡Á, pp. 169--174, December 2004.

  • ¼ã¾¾ÂÙÊ¿, ËÜ´Ö¾°Ê¸, ºê»³½ß, ÀÄÌÚ¹§Ê¸, Èõ¸ýζͺ, ¡È¾éĹ²Ã»»´ï¤ÎºÇŬÀ߷פ˴ؤ¹¤ë¼Â¸³Åª¸¡Æ¤,¡É ¿ÃÍÏÀÍý¸¦µæ¥Î¡¼¥È/Âè27²ó¿ÃÍÏÀÍý¥Õ¥©¡¼¥é¥à, pp. 14-1--14-8, September 2004.

  • ÅÏîµÍµ¼ù, ÀÐÅÄ°ìºÈ, ËÜ´Ö¾°Ê¸, ÀÄÌÚ¹§Ê¸, Èõ¸ýζͺ, ¡È»»½Ñ¥¢¥ë¥´¥ê¥º¥àµ­½Ò¸À¸ìARITH¤Ë´ð¤Å¤¯ÊÂÎó¾è»»´ï¤ÎÀ߷פÈɾ²Á,¡É Ê¿À®16ǯÅÙÅŵ¤´Ø·¸³Ø²ñÅìËÌ»ÙÉôÏ¢¹çÂç²ñ, p. 261, August 2004.

  • ²Æ°æ²íŵ, ËÜ´Ö¾°Ê¸, ÀÄÌÚ¹§Ê¸, Èõ¸ýζͺ, ¡È¿Ê²½Åª¥°¥é¥ÕÀ¸À®¼êË¡¤Ë´ð¤Å¤¯¥«¥ì¥ó¥È¥ß¥é¡¼²óÏ©¤Î¹çÀ®,¡É Âè17²ó ²óÏ©¤È¥·¥¹¥Æ¥à·Ú°æÂô¥ï¡¼¥¯¥·¥ç¥Ã¥×¹Ö±éÏÀʸ½¸, pp. 415--420, April 2004.

  • ¼ã¾¾ÂÙÊ¿, ËÜ´Ö¾°Ê¸, ºê»³½ß, ÀÄÌÚ¹§Ê¸, Èõ¸ýζͺ¡¤¡ÈCounter Tree Diagram ¤Ë´ð¤Å¤¯¾éĹ2¿Ê²Ã»»´ï¤ÎÀß·×,¡É 2004ǯÅŻҾðÊóÄÌ¿®³Ø²ñÁí¹çÂç²ñ, A-3-10, p. 77 March 2004.

  • ºê»³½ß, ËÜ´Ö¾°Ê¸, ¼ã¾¾ÂÙÊ¿, ÀÄÌÚ¹§Ê¸, Èõ¸ýζͺ¡¤¡ÈCounter Tree Diagrams¤Ë¤è¤ë¾éĹ²Ã»»´ï¤ÎÀ߷פÈɾ²Á,¡É ¿ÃÍÏÀÍý¸¦µæ¥Î¡¼¥ÈÂè26´¬, pp. 11-1--11-9, September 2003.

  • ²Æ°æ²íŵ, ËÜ´Ö¾°Ê¸, ÀÄÌÚ¹§Ê¸, Èõ¸ýζͺ, ¡ÈEvolutionary Graph Generation System and Its Application to Current Mirror Synthesis,¡É Ê¿À®15ǯÅÙÅŵ¤´Ø·¸³Ø²ñÅìËÌ»ÙÉôÏ¢¹çÂç²ñ¹Ö±éÏÀʸ½¸, August 2003.

  • ¹â¶¶¾°ÆÁ, ËÜ´Ö¾°Ê¸, ÀÄÌÚ¹§Ê¸, Èõ¸ýζͺ¡¤¡ÈVLSI¥Ç¡¼¥¿¥Ñ¥¹¼«Æ°À¸À®¥·¥¹¥Æ¥à¤Î¹½ÃÛ,¡É Ê¿À®15ǯÅÙÅŵ¤´Ø·¸³Ø²ñÅìËÌ»ÙÉôÏ¢¹çÂç²ñ¹Ö±éÏÀʸ½¸, No. 1G13, p. 237, August 2003.

  • ÀÐÅÄ°ìºÈ, ËÜ´Ö¾°Ê¸, ÀÄÌÚ¹§Ê¸, Èõ¸ýζͺ¡¤¡È»»½Ñ¥¢¥ë¥´¥ê¥º¥àµ­½Ò¸À¸ìARITH¤Ë¤è¤ë¥Ñ¥¤¥×¥é¥¤¥ó¾è»»´ï¤Î·Á¼°Åª¸¡¾Ú,¡É Ê¿À®15ǯÅÙÅŵ¤´Ø·¸³Ø²ñÅìËÌ»ÙÉôÏ¢¹çÂç²ñ¹Ö±éÏÀʸ½¸, No. 1F9, p. 194, August 2003.

  • ËÜ´Ö¾°Ê¸¡¤ÀÄÌÚ¹§Ê¸, Èõ¸ýζͺ, ¡È¿Ê²½Åª¥°¥é¥ÕÀ¸À®¥·¥¹¥Æ¥à¤È¤½¤ÎÄê·¸¿ô¾è»»´ï¹çÀ®¤Ø¤Î±þÍÑ,¡É Âè15²ó ²óÏ©¤È¥·¥¹¥Æ¥à ¡Ê·Ú°æÂô¡Ë¥ï¡¼¥¯¥·¥ç¥Ã¥× ÏÀʸ½¸, pp. 287--292, April 2002.

  • ËÜ´Ö¾°Ê¸, ÀÄÌÚ¹§Ê¸, Èõ¸ýζͺ, ¡È¿Ê²½Åª¥°¥é¥ÕÀ¸À®¥·¥¹¥Æ¥à EGG --VLSI±é»»²óÏ©¹çÀ®¤Ø¤Î±þÍÑ-- ,¡É Âè199²ó·×¬¼«Æ°À©¸æ³Ø²ñÅìËÌ»ÙÉô¸¦µæ½¸²ñ, No. 199-10, pp. 1--10, December 2001.

  • ËÜ´Ö¾°Ê¸, ÄÄÄê·¯, ÀÄÌÚ¹§Ê¸, Èõ¸ýζͺ, ¡ÈEvolutionary graph generation and its application,¡É Âè199²ó·×¬¼«Æ°À©¸æ³Ø²ñÅìËÌ»ÙÉô¸¦µæ½¸²ñ, No. 191-3, pp. 1--10, November 2000.

  • ËÜ´Ö¾°Ê¸, ÀÄÌÚ¹§Ê¸, Èõ¸ýζͺ, ¡Èµ­¹æŪµ¡Ç½¸¡¾Ú¤Ë´ð¤Å¤¯¿Ê²½Åª»»½Ñ²óÏ©¹çÀ®,¡É Ê¿À®11ǯÅÙÅŵ¤´Ø·¸³Ø²ñÅìËÌ»ÙÉôÏ¢¹çÂç²ñ¹Ö±éÏÀʸ½¸, No.2F-5, p. 189, August 1999.

  • ËÜ´Ö¾°Ê¸, ÀÄÌÚ¹§Ê¸, Èõ¸ýζͺ, ¡È¿Ê²½Åª¥°¥é¥ÕÀ¸À®¼êË¡¤Ë´ð¤Å¤¯»»½Ñ±é»»²óÏ©Àß·×,¡É Ê¿À®11ǯÅÙSICE³Ø½Ñ¹Ö±é²ñ¹Ö±éÏÀʸ½¸,¡É No. 204A-4, pp. 377--378, July 1999.

  • ËÜ´Ö¾°Ê¸, ÀÄÌÚ¹§Ê¸, Èõ¸ýζͺ, ¡ÈVLSI±é»»²óÏ©¹çÀ®¤Î¤¿¤á¤Î¥°¥é¥Õɽ¸½¤ÎÄó°Æ,¡É Ê¿À®10ǯÅÙÅŵ¤´Ø·¸³Ø²ñÅìËÌ»ÙÉôÏ¢¹çÂç²ñ¹Ö±éÏÀʸ½¸, No. 1H1, p. 289, August 1998.

  • ËÜ´Ö¾°Ê¸, ÀÄÌÚ¹§Ê¸, Èõ¸ýζͺ, ¡È»»½Ñ²óÏ©¹½Â¤¤Î¿Ê²½ÅªÀ¸À®,¡É ÅŻҾðÊóÄÌ¿®³Ø²ñµ»½Ñ¸¦µæÊó¹ð, Vol. 98, No. 140, pp. 61--68, June 1998.

  • ËÜ´Ö¾°Ê¸, ÀÄÌÚ¹§Ê¸, Èõ¸ýζͺ, ¡È¿Ê²½Åª¥°¥é¥ÕÀ¸À®¥·¥¹¥Æ¥à¤Ë´ð¤Å¤¯»»½Ñ¥¢¥ë¥´¥ê¥º¥àÀ߷פÎÄó°Æ,¡É 1998ǯÅŻҾðÊóÄÌ¿®³Ø²ñÁí¹çÂç²ñ¹Ö±éÏÀʸ½¸, No. A-3-15, p. 101, March 1998.