Publications
-
Naofumi Homma, Yu-ichi Hayashi, Noriyuki Miura, Daisuke Fujimoto,
Makoto Nagata, and Takafumi Aoki, "Design Methodology and Validity
Verification for a Reactive Countermeasure against EM Attacks," Journal
of Cryptology, DOI:10.1007/s00145-015-9223-3 (in press)
-
Yuichi Hayashi, Naofumi Homma, Takaaki Mizuki, Takafumi Aoki,
Hideaki Sone, "Efficient Electromagnetic Analysis for
Cryptographic Module on the Frequency Domain," IEEJ Transactions on
Fundamentals and Materials, Vol. 135, No. 9, pp. 515--521, September 2015. (in
Japanese)
-
Sho Endo, Yang Li, Naofumi Homma, Kazuo Sakiyama, Kazuo Ohta,
Daisuke Fujimoto, Makoto Nagata, Toshihiro Katashita, Jean-Luc Danger,
and Takafumi Aoki, "A Silicon-level Countermeasure against Fault
Sensitivity Analysis and Its Evaluation," IEEE Transactions on Very
Large Scale Integration Systems, Vol.23, No.8, pp.1429--1438 2015.
-
Hajime Uno, Sho Endo Naofumi Homma, Yu-ichi Hayashi, and
Takafumi Aoki, "Electromagnetic Analysis against Public-Key
Cryptographic Software on Embedded OS," IEICE Transactions on
Communications, Vol.E98-B, No. 7, pp.1242-1249, July 2015.
-
Yuichi Hayashi, Naofumi Homma, Takaaki Mizuki, Takafumi Aoki,
Hideaki Sone, "Fundamental Study on a Mechanism of Faulty
Outputs from Cryptographic Modules due to IEMI," IEEJ Transactions on
Fundamentals and Materials, Vol. 135, No. 5, pp. 276--281, May 2015. (in
Japanese)
-
Rei Ueno, Naofumi Homma, and Takafumi Aoki, "Efficient DFA on
SPN-Based Block Ciphers and Its Application to the LED Block Cipher,"
IEICE Transactions on Fundamentals of Electronics, Communications and
Computer Sciences, Vol. E98-A, No. 1, pp. 182--191, January 2015.
-
Sho Endo, Naofumi Homma, Yu-ichi Hayashi, Junko
Takahashi, Hitoshi Fuji, and Takafumi Aoki, "An Adaptive Multiple-fault
Injection Attack on Microcontrollers and a Countermeasure," IEICE
Transactions on Fundamentals of Electronics, Communications and Computer
Sciences, Vol. E98-A, No. 1, pp. 171--181, January 2015.
-
Kazuya Saito, Naofumi Homma, and Takafumi Aoki, "A Formal
Approach to Designing Multiple-Valued Arithmetic Circuits,"
Journal of Multiple-Valued Logic and Soft Computing, Vol. 24, No. 1-4, pp. 21--34, 2015.
-
Naofumi Homma, Kazuya Saito, and Takafumi Aoki, "Toward Formal
Design of Practical Cryptographic Hardware Based on Galois Field
Arithmetic," IEEE Transactions on Computers, Vol. 63, No. 10, pp. 2604--2613, 2014.
-
Kotaro Okamoto, Naofumi Homma, and Takafumi Aoki, "Formal design
of arithmetic circuits over Galois fields based on normal basis
representations," IEICE Transactions on Information and Systems,
Vol.E97-D, No.9, pp.2270-2277, Sep. 2014.
-
Kazuo Sakiyama, Yang Li, Shigeto Gomisawa, Yu-ichi Hayashi,
Mitsugu Iwamoto, Naofumi Homma, Takafumi Aoki, and Kazuo Ohta,
"Practical DFA Strategy for AES Under Limited-Access Conditions,"
Journal of Information Processing Vol. 22, No. 2, pp. 142--151, 2014.
-
Daisuke Fujimoto, Noriyuki Miura, Makoto Nagata, Yuichi
Hayashi, Naofumi Homma, Takafumi Aoki, Yohei Hori, Toshihiro Katashita,
Kazuo Sakiyama, Thanh-Ha Le, Julien Bringer, Pirouz Bazargan-Sabet,
Shivam Bhasin, Jean-Luc Danger, "Power Noise Measurements of
Cryptographic VLSI Circuits Regarding Side-Channel Information Leakage,"
IEICE Transactions on Electronics, Vol. E97-C, No. 4, pp. 272 --279,
April 2014.
-
Takafumi Hibiki, Naofumi Homma, Yuto Nakano, Kazuhide
Fukushima, Shinsaku Kiyomoto, Yutaka Miyake, and Takafumi Aoki
"Chosen-IV Correlation Power Analysis on KCipher-2 Hardware and a
Masking-based Countermeasure," IEICE Transactions on Fundamentals of
Electronics, Communications and Computer Sciences Vol. E97-A, No.
1, pp. 157--166, January 2014.
-
Laurent Sauvage, Jean-Luc Danger, Sylvain Guilley, Naofumi Homma,
and Yuichi Hayashi, "Advanced Analysis of Faults Injected Through
Conducted Intentional Electromagnetic Interferences," IEEE Transactions
on Electromagnetic Compatibility, Vol. 55, No. 3, pp. 589--596, June 2013.
-
Yuichi Hayashi, Naofumi Homma, Takaaki Mizuki, Takafumi Aoki,
Hideaki Sone, Laurent Sauvage, and Jean-Luc Danger, "Analysis of
Electromagnetic Information Leakage from Cryptographic Devices with
Different Physical Structures," IEEE Transactions on Electromagnetic
Compatibility, Vol. 55, No. 3, pp. 571--580, June 2013.
-
Yu-ichi Hayashi, Naofumi Homma, Takaaki Mizuki, Haruki
Shimada, Takafumi Aoki, Hideaki Sone, Laurent Sauvage, and Jean-Luc
Danger, "Efficient Evaluation of EM Radiation Associated with
Information Leakage from Cryptographic Devices," IEEE Transactions on
Electromagnetic Compatibility, Vol. 55, No. 3, pp. 555--563, June 2013.
-
Yuichi Hayashi, Naofumi Homma, Takashi Watanabe, William
O. Price, and William A. Radasky, "Introduction to the Special Section
on Electromagnetic Information Security," IEEE Transactions on
Electromagnetic Compatibility, Vol. 55, No. 3, pp. 539--546, June 2013.
-
Haruki Shimada, Yuichi Hayashi, Naofumi Homma, Takaaki Mizuki,
Takafumi Aoki, and Hideaki Sone, "Efficient Safety Evaluation of EM
Information Leakage Using a Selected-Data Set," IEICE
Transactions B, Vol. J96-B, No.4, pp. 467-475, April 2013 (in Japanese).
-
Yuichi Hayashi, Naofumi Homma, Takaaki Mizuki, Takafumi Aoki,
and Hideaki Sone, "Transient IEMI Threats for Cryptographic Devices,"
IEEE Transactions on Electromagnetic Compatibility, Vol. 55, No.
1, pp. 140--148, February 2013.
-
Yuichi Hayashi, Naofumi Homma, Takaaki Mizuki,
Takeshi Sugawara, Yoshiki Kayano, Takafumi Aoki,
Shigeki Minegishi, Akashi Satoh, Hideaki Sone, and
Hiroshi Inoue, "Evaluation of Information Leakage
from Cryptographic Hardware via Common-Mode Current,"
IEICE Transactions on Electronics,
Vol.E95-C,No.6,pp. 1089--1097, June 2012.
-
Miroslav Knezevic, Kazuyuki Kobayashi, Jun Ikegami,
Shin'ichiro Matsuo, Akashi Satoh, Unal Kocabas,
Junfeng Fan, Toshiro Katashita, Takeshi Sugawara,
Kazuo Sakiyama, Ingrid Verbauwhede, Kazuo Ohta,
Naofumi Homma, Takafumi Aoki, "Fair and Consistent
Hardware Evaluation of Fourteen Round Two SHA-3
Candidates," IEEE Transactions on Very Large Scale
Integration Systems, Vol. 20, No. 5, pp. 827--840, May 2012.
-
Naofumi Homma, Kazuya Saito, and Takafumi Aoki, "A
Formal Approach to Designing Cryptographic Processors
Based on GF(2^m) Arithmetic Circuits," IEEE
Transactions on Information Forensics & Security,
Vol. 7, No. 1, pp. 3--13, February 2012.
-
Sho Endo, Takeshi Sugawara, Naofumi Homma, Takafumi Aoki, Akashi
Satoh, "A configurable on-chip glitchy-clock generator for fault
injection experiments," IEICE Transactions on Fundamentals of
Electronics, Communications and Computer Sciences, Vol. E95-A, No. 1
pp. 263--266, January 2012.
-
Toshihiro Katashita, Akashi Satoh, Takeshi
Sugawara,Naofumi Homma, and Takafumi Aoki, "Hardware
Implementations of Hash Function Luffa," IPSJ
Journal, Vol. 52, No. 12, pp. 3755--3765, December
2011. (Recommended paper) (in Japanese)
-
Sho Endo, Naofumi Homma, Takeshi Sugawara, Takafumi
Aoki and Akashi, "An On-chip Glitchy-clock Generator
for Testing Fault Injection Attacks," Journal of
Cryptographic Engineering, Vol. 1, No. 4,
pp. 265-270, December 2011.
-
Takeshi Sugawara, Naofumi Homma, Takafumi Aoki, and Akashi Satoh,
"High-performance Architecture for Concurrent Error Detection for AES
Processors," IEICE Transactions on Fundamentals of Electronics,
Communications and Computer Sciences, Vol. E94-A, No.10, pp. 1971-1980, October 2011.
-
Atsushi Miyamoto, Naofumi Homma, Takafumi Aoki, and
Akashi Satoh, "Systematic design of RSA processors
based on high-radix Montgomery multipliers," IEEE
Transactions on Very Large Scale Integration Systems,
Vol. 19, No. 7, pp. 1136--1146, July 2011.
-
Yuichi Baba, Atsushi Miyamoto, Naofumi Homma,
Takafumi Aoki and Akashi Satoh, "Design and
Evaluation of RSA Processor Generation System," IPSJ
Journal, Vol. 51, No. 9, pp. 1847--1858, September
2010. (Recommended paper) (in Japanese)
-
Takeshi Sugawara, Naofumi Homma, Takafumi Aoki, and
Akashi Satoh, "Profiling attack using multivariate
regression analysis," IEICE Electronics Express,
Vol. 7, No. 15, pp. 1139--1144, August 2010.
-
Naofumi Homma, Yuichi Baba, Atsushi Miyamoto, and Takafumi Aoki,
"Multiple-Valued Constant-Power Adder and Its
Application to Cryptographic Processor," IEICE
Transactions on Information and Systems, Vol. E93-D, No. 8, pp. 2117-2125, August 2010.
-
Naofumi Homma, Atsushi Miyamoto, Takafumi Aoki,
Akashi Satoh, and Adi Shamir, "Comparative Power
Analysis of Modular Exponentiation Algorithms," IEEE
Transactions on Computers, Vol. 59, No. 6, pp. 795--807, June 2010.
-
Naofumi Homma, Takafumi Aoki, and Akashi Satoh, "Side
Channel Attack on Cryptographic Modules and Its
Security Evaluation," IEICE Transactions A,
Vol. J93-A, No. 2, pp. 42--51, February
2010. (Invited paper) (in Japanese)
-
Atsushi Miyamoto, Naofumi Homma, Takafumi Aoki, and
Akashi Satoh, "Evaluation of Chosen-Message SPA
Attacks against FPGA Implementations of RSA
Processors," IEICE Transactions D, Vol. J92-D, No. 12,
pp. 2168--2180, December 2009. (in Japanese)
-
Takeshi Sugawara, Naofumi Homma, Takafumi Aoki, and
Akashi Satoh, "High Scalable Circuit Architectures of
the Hash Function Whirlpool," IPSJ Journal, Vol. 50,
No. 11, pp. 2618--2632, November 2009. (in Japanese)
-
Naofumi Homma, Yuki Watanabe, Katsuhiko Degawa,
Takafumi Aoki, Tatsuo Higuchi, "Systematic approach
to designing multiple-valued arithmetic circuits
based on arithmetic description language," Journal of
Multiple-Valued Logic and Soft Computing, Vol. 15,
No. 4, pp. 329--340, 2009.
-
Naofumi Homma, Takafumi Aoki, and Tatsuo Higuchi, "A
Systematic Approach for Designing Redundant
Arithmetic Adders Based on Counter Tree Diagrams,"
IEEE Transactions on Computers, Vol. 57, No. 12,
pp. 1633--1646, December 2008.
-
Yuki Watanabe, Naofumi Homma, Takafumi Aoki, and
Tatsuo Higuchi, "Arithmetic Circuit Verification
Based on Symbolic Computer Algebra," IEICE
Transactions on Fundamentals of Electronics,
Communications and Computer Sciences, Vol. E91-A,
No. 10, pp. 3038--3046, October 2008.
-
Naofumi Homma, Sei Nagashima, Takeshi Sugawara,
Takafumi Aoki, Akashi Satoh, "A high-resolution
phase-based waveform matching and its application to
side-channel attacks," IEICE Transactions on
Fundamentals of Electronics, Communications and
Computer Sciences, Vol. E91-A, No. 1, pp. 193--202,
January 2008.
-
Naofumi Homma, Katsuhiko Degawa, Takafumi Aoki,
Tatsuo Higuchi, "Design of multiple-valued arithmetic
circuits using counter tree diagrams," Journal of
Multiple-Valued Logic and Soft Computing, Vol. 13,
No. 4-6, pp. 487--502, November 2007.
-
Masanori Natsui, Yoshiaki Tadokoro, Naofumi Homma,
Takafumi Aoki, and Tatsuo Higuchi, "Synthesis of
current mirrors based on evolutionary graph
generation with transmigration capability," IEICE
Electronics Express, Vol. 4, No. 3, pp. 88--93,
January 2007.
-
Naofumi Homma, Yuki Watanabe, Takafumi Aoki, and Tatsuo Higuchi, "Formal Design of Arithmetic Circuits Based on Arithmetic Description Language," IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences, Vol. E89-A, No. 12, pp. 3500--3509, December 2006.
-
Naofumi Homma, Takafumi Aoki, and Tatsuo Higuchi, "Systematic interpretation of redundant arithmetic adders in binary and multiple-valued logic," IEICE Transactions on Electronics, Vol. E89-C, No. 11, pp. 1645 --1654, November 2006.
-
Masanori Natsui, Naofumi Homma, Takafumi Aoki, and Tatsuo Higuchi, "Design of Multiple-Valued Logic Circuits Using Graph-Based Evolutionary Synthesis," Journal of Multiple-Valued Logic and Soft Computing, Vol. 11, Nos. 5-6, pp. 519--544, August 2005.
-
Takafumi Aoki, Naofumi Homma, and Tatsuo Higuchi, "Evolutionary synthesis of arithmetic circuit structures," Artificial Intelligence in Logic Design, Edited by S. N. Yanushkevich, Kluwer Academic Publishers, pp. 39--72, 2004 (Reprinted from Artificial Intelligence Review, Vol. 20, Nos. 3-4, 2003).
-
Naofumi Homma, Jun Sakiyama, Taihei Wakamatsu, Takafumi Aoki, and Tatsuo Higuchi, "Systematic Design of Redundant Adders Using Counter Tree Diagrams," IPSJ Journal, Vol. 45, No. 5, pp. 1279--1288, May 2004. (in Japanese)
-
Takafumi Aoki, Naofumi Homma, and Tatsuo Higuchi,
"Evolutionary synthesis of arithmetic circuit structures," Artificial Intelligence Review, Kluwer Academic Publishers, Vol. 20, Nos. 3-4, pp. 199--232, December 2003.
-
Jun Sakiyama, Naofumi Homma, Takafumi Aoki, and Tatsuo Higuchi,
"Counter Tree Diagrams: A unified framework for analyzing fast addition algorithms," IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences, Vol. E86-A, No. 12, pp. 3009--3019, December 2003.
-
Naofumi Homma, Takafumi Aoki, and Tatsuo Higuchi,
"Evolutionary graph generation system with transmigration capability and its application to arithmetic circuit synthesis," IEE Proceedings -Circuits, Devices and Systems, Vol. 149, No. 2, pp. 97--104, April 2002.
-
Dingjun Chen, Takafumi Aoki, Naofumi Homma, Toshiki Terasaki, and Tatsuo Higuchi,
"Graph-based evolutionary design of arithmetic circuits," IEEE Transactions on Evolutionary Computation, Vol. 6, No. 1, pp. 86--100, February 2002.
-
Dingjun Chen, Takafumi Aoki, Naofumi Homma,Ž¡Ž¡and Tatsuo Higuchi,
"Parallel Evolutionary Design of Constant-Coefficient Multipliers," IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences, Vol. E85--A, No. 2, pp. 508-512, February 2002.
-
Dingjun Chen, Takafumi Aoki, Naofumi Homma, and Tatsuo Higuchi,
"A pragmatic method for the design of fast constant-coefficient combinational multipliers," IEE Proceedings -Computers and Digital Techniques, Vol. 148, No. 6, pp. 196--206, November 2001.
-
Dingjun Chen, Takafumi Aoki, Naofumi Homma, and Tatsuo Higuchi,
"Evolutionary design for high-speed constant-coefficient multipliers," IEE Electronics Letters, Vol. 37, No. 4, pp. 256--258, February 2001.
-
Naofumi Homma, Takafumi Aoki, and Tatsuo Higuchi,
"Evolutionary synthesis of fast constant-coefficient multipliers," IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences, Vol. E83-A, No. 9, pp. 1767--1777, September 2000.
-
Naofumi Homma, Takafumi Aoki, and Tatsuo Higuchi,
"Evolutionary graph generation system with symbolic verification for arithmetic circuit design," IEE Electronics Letters, Vol. 36, No. 11, pp. 937--939, May 2000.
-
Takafumi Aoki, Naofumi Homma, and Tatsuo Higuchi,
"Evolutionary design of arithmetic circuits,"
IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences, Vol. E82-A, No. 5, pp. 798--806, May 1999.
-
Shoei Nashimoto, Naofumi Homma, Yu-Ichi Hayashi, and Takafumi Aoki,
"Buffer Overflow Attack with Multiple Fault Injection and a Proven
Countermeasure," Proceedings of 2015 PROOFS (Security Proofs for
Embedded Systems) Workshop, September 17, 2015. (in press)
-
Rei Ueno, Naofumi Homma, Yukihiro Sugawara, Yasuyuki Nogami, and
Takafumi Aoki, "Highly Efficient GF(2^8) Inversion Circuit Based on
Redundant GF Arithmetic and Its Application to AES Design,"
Cryptographic Hardware and Embedded Systems - CHES 2015, Lecture Notes
in Computer Science 9293, pp. 63--80, Springer-Verlag, September 14,
2015.
-
Ville Yli-Maeyry, Naofumi Homma, and Takafumi Aoki, "Improved Power
Analysis on Unrolled Architecture and Its Application to PRINCE Block
Cipher," Fourth International Workshop on Lightweight Cryptography for
Security & Privacy - LightSec 2015, Lecture Notes in Computer Science,
Springer-Verlag, September 11, 2015. (in press)
-
Atsushi Nagao, Yuichiro Okugawa, Kazuhiro Takaya, Yu-ichi Hayashi,
Naofumi Homma, and Takafumi Aoki, "Detection Method for Overclocking by
Intentional Electromagnetic Interference," 2015 Joint IEEE International
Symposium on Electromagnetic Compatibility and EMC Europe, pp. 241--245,
August 18, 2015. (Best Paper Award Finalist)
-
Ko Nakamura, Yu-ichi Hayashi, Naofumi Homma, Takaaki Mizuki, Takafumi
Aoki, Hideaki Sone, "Method for Estimating Fault Injection Time on
Cryptographic Devices from EM Leakage," 2015 Joint IEEE International
Symposium on Electromagnetic Compatibility and EMC Europe, pp. 235--240,
August 18, 2015.
-
Noriyuki Miura, Naofumi Homma, Yuichi Hayashi, Takafumi Aoki, Daisuke
Fujimoto, and Makoto Nagata "EM Attack Sensor: Concept, Circuit, and
Design-Automation Methodology," Design Automation Conference 2015, Sun
Francisco, No. 176, pp. 1--6, June 11, 2015. (Invited paper)
-
Yukihisa Sugawara, Rei Ueno, Naofumi Homma, and Takafumi Aoki,
"System for Automatic Generation of Parallel Multipliers over Galois
Field," 2015 IEEE 45th International Symposium on Multiple-Valued Logic,
pp. 54--59, Waterloo, May 18, 2015. (Student Travel Award)
-
Rei Ueno, Naofumi Homma, Yukihisa Sugawara, and Takafumi Aoki,
"Formal Design of Galois-Field Arithmetic Circuits Based on Polynomial
Ring Representation," 2015 IEEE 45th International Symposium on
Multiple-Valued Logic, pp. 48--53, Waterloo, May 18, 2015. (Student Travel Award)
-
Daisuke Fujimoto, Noriyuki Miura, Yu-ichi Hayashi, Naofumi Homma,
Takafumi¡¡Aoki, and Makoto Nagata, "A DPA/DEMA/LEMA-Resistant AES
Cryptographic Processor with Supply-Current Equalizer and Micro EM Probe
Sensor," 2015 20th Asia and South Pacific Design Automation Conference,
pp. 26-27, January 20, 2015.
-
Yu-ichi Hayashi, Naofumi Homma, Mamoru Miura, Takafumi Aoki and Hideaki
Sone, "A Threat for Tablet PCs in Public Space: Remote Visualization of
Screen Images Using EM Emanation," 21st ACM Conference on Computer and
Communications Security (CCS), pp. 954--965, Nov. 2014.
-
Naofumi Homma, Yu-ichi Hayashi, Noriyuki Miura, Daisuke Fujimoto,
Daichi Tanaka, Makoto Nagata, and Takafumi Aoki, "EM Attack Is
Non-Invasive? - Design Methodology and Validity Verification of EM
Attack Sensor," Cryptographic Hardware and Embedded Systems - CHES 2014,
Lecture Notes in Computer Science 8731, pp. 1--16, Springer-Verlag, Sep.
2014. (Best Paper Award)
-
Naofumi Homma, Yu-ichi Hayashi, Toshihiro Katashita, and Hideaki
Sone, "Development of Human Resources in Hardware Security through
Practical Information Technology Education Program," IEEE International
Symposium on Electromagnetic Compatibility, pp. 764--767, August 2014.
-
Noriyuki Miura, Daisuke Fujimoto, Yu-ichi Hayashi, Naofumi Homma,
Takafumi Aoki, and Makoto Nagata, "Integrated-Circuit Countermeasures
Against Information Leakage Through EM Radiation," IEEE International
Symposium on Electromagnetic Compatibility, pp. 748--751, August 2014.
-
Yu-ichi Hayashi, Naofumi Homma, Takaaki Mizuki, Takafumi
Aoki, and Hideaki Sone, "Precisely Timed IEMI Fault Injection
Synchronized with EM Information Leakage," IEEE International Symposium
on Electromagnetic Compatibility, pp. 738--742, August 2014.
-
Noriyuki Miura, Daisuke Fujimoto, Daichi Tanaka, Yu-ichi Hayashi,
Naofumi Homma, Takafumi Aoki, and Makoto Nagata, "A Local EM-Analysis
Attack Resistant Cryptographic Engine with Fully-Digital
Oscillator-Based Tamper-Access Sensor," 2014 Symposium on VLSI Circuits,
Digest of Technical Papers, pp. 172-173, June 2014. (Highlighted Paper)
-
Rei Ueno, Kotaro Okamoto, Naofumi Homma, and Takafumi Aoki, "An
Efficient Approach to Verifying Galois-Field Arithmetic Circuits of
Higher Degrees and Its Application to ECC Decoders," 2014 IEEE 44th
International Symposium on Multiple-Valued Logic, pp. 144--149, Bremen,
May 20, 2014.
-
Hajime Uno, Sho Endo, Yu-ichi Hayashi, Naofumi Homma, and Takafumi Aoki,
"Chosen-message Electromagnetic Analysis against Cryptographic Software
on Embedded OS," 2014 International Symposium on Electromagnetic
Compatibility, Tokyo, pp. 313--316, May 14, 2014.
-
Daisuke Fujimoto, Noriyuki Miura, Makoto Nagata, Yu-ichi Hayashi,
Naofumi Homma, Yohei Hori, Toshihiro Katashita, Kazuo Sakiyama, Thanh-Ha
Le, Julien Bringer, Pirouz Bazargan-Sabet, Shivam Bhasin, and Jean-Luc
Danger, " Correlation Power Analysis using Bit-Level Biased Activity
Plaintexts against AES Cores with Countermeasures," 2014 International
Symposium on Electromagnetic Compatibility, Tokyo, pp. 306--309, May 14,
2014.
-
Yu-ichi Hayashi, Naofumi Homma, Takaaki Mizuki, Takafumi Aoki, and
Hideaki Sone, "Efficient Method for Estimating Propagation Area of
Information Leakage via EM Field," 2014 International Symposium on
Electromagnetic Compatibility, Tokyo, pp. 298--301, May 14, 2014.
-
Kotaro Okamoto, Naofumi Homma, Takafumi Aoki and Sumio Morioka,
"A Hierarchical Formal Approach to Verifying Side-channel Resistant
Cryptographic Processors," 2014 IEEE International Symposium on
Hardware-Oriented Security and Trust, pp. 76-79, May 6, 2014.
-
Daisuke Fujimoto, Daichi Tanaka, Noriyuki Miura, Makoto Nagata, Yu-ichi
Hayashi, Naofumi Homma, Shivam Bhasin, and Jean-Luc Danger,
"Side-Channel Leakage on Silicon Substrate of CMOS Cryptographic Chip,"
2014 IEEE International Symposium on Hardware-Oriented Security and
Trust, pp. 32-37, May 6, 2014. (Best Student Paper Award)
-
Sho Endo, Naofumi Homma, Yu-ichi Hayashi, Junko Takahashi, Hitoshi Fuji
and Takafumi Aoki, "A Multiple-fault Injection Attack by Adaptive Timing
Control under Black-box Conditions and a Countermeasure," International
Workshop on Constructive Side-Channel Analysis and Secure Design (COSADE
2014), Lecture Notes in Computer Science, April 15, 2014. (in press)
-
Yang Li, Yu-Ichi Hayashi, Arisa Matsubara, Naofumi Homma, Takafumi Aoki,
Kazuo Ohta and Kazuo Sakiyama, "Yet Another Fault-Based Leakage in
Non-Uniform Faulty Ciphertexts," The 6th International Symposium on
Foundations & Practice of Security, Lecture Notes in Computer Science
8352, pp. 272--290, February, 2014.
-
Yu-ichi Hayashi, Naofumi Homma, Takafumi Aoki, Yuichiro Okugawa, and
Yoshiharu Akiyama "Transient Analysis of EM Radiation Associated with
Information Leakage from Cryptographic ICs," The 9th International
Workshop on Electromagnetic Compatibility of Integrated Circuits (EMC
Compo 2013), pp. 78--82, December 16, 2013.
-
Daisuke Fujimoto, Noriyuki Miura, Makoto Nagata, Yuichi Hayashi, Naofumi
Homma, Yohei Hori, Toshihiro Katashita, Kazuo Sakiyama, Thanh-Ha Le,
Julien Bringer, Pirouz Bazargan-Sabet, and Jean-Luc Danger "On-chip
power noise measurements of cryptographic VLSI circuits and
interpretation for side-channel analysis," EMC Europe 2013, pp. 405--410,
September 4 2013.
-
Naofumi Homma, Yu-ichi Hayashi, and Takafumi Aoki, "Electromagnetic
Information Leakage from Cryptographic Devices," EMC Europe 2013, pp.
401--404, September 4 2013.
-
Kotaro Okamoto, Naofumi Homma, and Takafumi Aoki, "A hierarchical
graph-based approach to generating formally-proofed Galois-field
multipliers," Proceedings of 2013 PROOFS (Security Proofs for Embedded
Systems) Workshop, pp. 98--109, August 24, 2013.
-
Yu-ichi Hayashi, Naofumi Homma, Takaaki Mizuki, Takafumi Aoki, Hideaki
Sone, "Map-based Analysis of IEMI Fault Injection into Cryptographic
Devices," IEEE International Symposium on Electromagnetic Compatibility,
pp. 829--833, August 2013.(Best Symposium Paper Award)
-
Yu-ichi Hayashi, Naofumi Homma, Takaaki Mizuki, Takafumi Aoki, Hideaki
Sone, Laurent Sauvage, and Jean-Luc Danger, "Introduction to Recent
Research on EM Information Leakage," The 2013 Asia-Pacific International
Symposium and Exhibition on Electromagnetic Compatibility, pp. 233--236,
May 21, 2013.
-
Kotaro Okamoto, Naofumi Homma, and Takafumi Aoki, "A graph-based
approach to designing parallel multipliers over Galois fields based on
normal basis representations," Proceedings of 43rd International
Symposium on Multiple Valued Logic, pp. 158--163, May 21 2013.
-
Naofumi Homma, Yu-ichi Hayashi, Toshihiro Katashita, Yohei Hori, and
Takafumi Aoki, "Towards Efficient Evaluation of EM Information Leakage
from Cryptographic Devices," Proceedings of 22nd International Workshop
on Post-Binary ULSI Systems, pp. 50--55, May 20, 2013.
-
Yang Li, Sho Endo, Nicolas Debande, Naofumi Homma, Takafumi Aoki,
Thanh-Ha Le, Jean-Luc Danger, Kazuo Ohta, and Kazuo Sakiyama, "Exploring
the Relations Between Fault Sensitivity and Power Consumption,"
International Workshop on Constructive Side-Channel Analysis and Secure
Design (COSADE 2013), Lecture Notes in Computer Science 7864 (in press)
-
Takafumi Hibiki, Naofumi Homma, Takafumi Aoki, Yuto Nakano, Kazuhide
Fukushima, Shinsaku Kiyomoto and Yutaka Miyake, "Chosen-IV Correlation
Power Analysis on KCipher-2 and a Countermeasure," International
Workshop on Constructive Side-Channel Analysis and Secure Design (COSADE
2013), Lecture Notes in Computer Science 7864, pp. 169--183, March, 2013.
-
Yongdae Kim, Naofumi Homma, Takafumi Aoki, and Heebong Choi, "Security
Evaluation of Cryptographic Modules against Proling Attacks," Proceedins
of the 15th International Conference on Information Security and
Cryptology, Lecture Notes in Computer Science 7839, pp. 383--394,
November 2012
-
Naofumi Homma and Takafumi Aoki, "Effective Data Processing and
Protection Techniques for Community Network Nodes," Proceedings of the
15th International Symposium on Wireless Personal Multimedia
Communications, pp. 571--572, September 2012.
-
Sho Endo, Yang Li, Naofumi Homma, Kazuo Sakiyama, Kazuo Ohta and
Takafumi Aoki, "An Efficient Countermeasure against Fault Sensitivity
Analysis using Configurable Delay Block," 2012 Workshop on Fault
Diagnosis and Tolerance in Cryptography, pp.95--102, September 2012.
-
Sho Endo, Yuichi Hayashi, Naofumi Homma, Takafumi Aoki, Toshihiro
Katashita, Yohei Hori, Kazuo Sakiyama, Makoto Nagata, Jean-Luc Danger,
Thanh-Ha Le and Pirouz Bazargan Sabet, "Measurement of Side-Channel
Information from Cryptographic Devices on Security Evaluation Platform:
Demonstration of SPACES Project," SICE Annual Conference 2012,
pp.313--316, August, 2012.
-
Haruki Shimada, Yuichi Hayashi, Naofumi Homma, Takaaki Mizuki, Takafumi
Aoki, and Hideaki Sone, "Using Selected-Plaintext Sets for Efficient
Evaluation of EM Information Leakage from Cryptographic Devices," SICE
Annual Conference 2012, pp. 64-67, August, 2012.
-
Yu-ichi Hayashi, Naofumi Homma, Taishi Ikematsu, Takaaki Mizuki,
Takafumi Aoki, Hideaki Sone, and Jean-Luc Danger, "An efficient method
for estimating the area of information propagation through
electromagnetic radiation," IEEE International Symposium on
Electromagnetic Compatibility, pp. 800--805, August 2012.
-
Haruki Shimada, Yu-ichi Hayashi, Naofumi Homma, Takaaki Mizuki, Takafumi
Aoki, Hideaki Sone, Laurent Sauvage, and Jean-Luc Danger, "Efficient
mapping of EM radiation associated with information leakage for
cryptographic devices," IEEE International Symposium on Electromagnetic
Compatibility, pp. 794--799, August 2012.
-
Laurent Sauvage, Sylvain Guilley, Jean-Luc Danger, Naofumi Homma and
Yu-ichi Hayashi, "A Fault Model for Conducted Intentional
ElectroMagnetic Interferences," IEEE International Symposium on
Electromagnetic Compatibility, pp. 788--793, August 2012.
-
Junko Takahashi, Yu-ichi Hayashi, Naofumi Homma, Hitoshi Fuji, and
Takafumi Aoki, "Feasibility of Fault Analysis Based on Intentional
Electromagnetic Interference," IEEE International Symposium on
Electromagnetic Compatibility, pp. 782--787, August 2012.
-
Yuichi Hayashi, Naofumi Homma, Takaaki Mizuki, Takafumi Aoki and
Hideaki Sone, "A Threat of EM Information Leakage against Cryptographic
Devices," 2012 Korea-Japan Joint Conference, pp.233-236, 2012.
-
Naofumi Homma, Kazuya Saito, and Takafumi Aoki, "Formal Design
of Multiple-Valued Arithmetic Algorithms over Galois Fields and its
Application to Cryptographic Processors," Proceedings of the 42nd
International Symposium on Multiple Valued Logic, pp. 110--115, May 2012.
-
Kazuya Saito, Naofumi Homma, and Takafumi Aoki, "A Formal
Approach to Designing Arithmetic Circuits over Galois Fields
Using Symbolic Computer Algebra," Proceedings of the 17th
Workshop on Synthesis And System Integration of Mixed
Information technologies, pp. 153--158, March 2012.
-
Yu-ichi Hayashi, Shigeto Gomisawa, Yang Li, Naofumi Homma,
Kazuo Sakiyama, Takafumi Aoki, and Kazuo Ohta, "Intentional
Electromagnetic Interference for Fault Analysis on AES Block
Cipher IC," 8th International Workshop on Electromagnetic
Compatibility of Integrated Circuits, pp. 235--240, November
2011.
-
Yu-ichi Hayashi, Naofumi Homma, Takaaki Mizuki, Takafumi
Aoki, and Hideaki Sone, "Non-invasive Trigger-free Fault
Injection Method Based on Intentional Electromagnetic
Interference," NIST Non-Invasive Attack Testing Workshop,
pp. 15--19, September 2011.
-
Taishi Ikematsu, Yu-ichi Hayashi, Takaaki Mizuki, Naofumi Homma,
Takafumi Aoki, and Hideaki Sone,, "Suppression of Information Leakage
from Electronic Devices Based on SNR," IEEE International Symposium on
Electromagnetic Compatibility, pp. 920--924, August 2011.
-
Olivier Meynard, Sylvain Guilley, Jean-Luc Danger, Yu-ichi
Hayashi, and Naofumi Homma, "Identification of Information Leakage
Points on a Cryptographic Device with an RSA Processor," IEEE
International Symposium on Electromagnetic Compatibility, pp. 773--778, August 2011.
-
Laurent Sauvage, Sylvain Guilley, Jean-Luc Danger, Naofumi Homma, and
Yu-ichi Hayashi, "Practical Results of EM Cartography on a FPGA-based
RSA Hardware Implementation," IEEE International Symposium on
Electromagnetic Compatibility, pp. 768--772, August 2011.
-
Yu-ichi Hayashi, Naofumi Homma, Takeshi Sugawara, Takaaki Mizuki,
Takafumi Aoki, and Hideaki Sone, "Non-Invasive EMI-Based Fault Injection
Attack against Cryptographic Modules," IEEE International Symposium on
Electromagnetic Compatibility, pp. 763--767, August 2011.
-
Kazuya Saito, Naofumi Homma and Takafumi Aoki, "A Graph-Based Approach
to Designing Multiple-Valued Arithmetic Algorithms," Proceedings of the
41st International Symposium on Multiple Valued Logic, pp. 27--32, May
2011.
-
Olivier Meynard, Denis Real, Sylvain Guilley, Jean-Luc Danger, and
Naofumi Homma, "Enhancement of Simple Electro-Magnetic Attacks by
Pre-characterization in Frequency Domain and Demodulation Techniques,"
Design, Automation, and Test in Europe (DATE2011), pp. 1004--1009, March,
2011.
-
Sho Endo, Naofumi Homma, Takeshi Sugawara, Takafumi Aoki, and Akashi
Satoh, "An On-Chip Glitchy-Clock Generator and its Application to
Safe-Error Attack," International Workshop on Constructive Side-Channel
Analysis and Secure Design (COSADE 2011), pp. 175--182, February, 2011.
-
Yu-ichi Hayashi, Takeshi Sugawara, Yoshiki Kayano,
Naofumi Homma, Takaaki Mizuki, Akashi Satoh, Takafumi
Aoki, Shigeki Minegishi, Hideaki Sone, Hiroshi Inoue,
"Information Leakage from Cryptographic Hardware via
Common-Mode Current," IEEE International Symposium on
Electromagnetic Compatibility, pp. 109--114, July
2010.(Invited paper)
-
Masahiro Yamaguchi, Hideki Toriduka, Shoichi Kobayashi,
Takeshi Sugawara, Naofumi Homma, Akashi Satoh, and
Takafumi Aoki, "Development of an on-chip micro
shielded-loop probe to evaluate performance of magnetic
film to protect a cryptographic LSI from
electromagnetic analysis," IEEE International Symposium
on Electromagnetic Compatibility, pp. 103--108, July
2010.(Invited paper)
-
Naofumi Homma, Takafumi Aoki, and Akashi Satoh,
"Electromagnetic Information Leakage for Side-Channel
Analysis of Cryptographic Modules," IEEE International
Symposium on Electromagnetic Compatibility,
pp. 97--102, July 2010.(Invited paper)
-
Akashi Satoh, Toshihiro Katashita, Takeshi Sugawara,
Takafumi Aoki and Naofumi Homma, "Hardware
Implementations of Hash Function Luffa," IEEE
International Symposium on Hardware-Oriented Security
and Trust, pp. 102--106, June 2010.
-
Yuichi Baba, Naofumi Homma, Atsushi Miyamoto, Takafumi
Aoki, "Design of tamper-resistant registers for
multiple-valued cryptographic processors," Proceedings
of the 40th International Symposium on Multiple Valued
Logic, pp. 67--72, May 2010.
-
Yongdae Kim, Takeshi Sugawara, Naofumi Homma, Takafumi
Aoki, Akashi Satoh, "Biasing power traces to improve
correlation in power analysis attacks," International
Workshop on Constructive Side-Channel Analysis and
Secure Design 2010, pp. 77--80, February 2010.
-
Takeshi Sugawara, Yu-ichi Hayashi, Naofumi Homma,
Takaaki Mizuki, Takafumi Aoki, Hideaki Sone, and Akashi
Satoh, "Mechanism behind Information Leakage in
Electromagnetic Analysis of Cryptographic Modules,"
Workshop on Information Security Applications - WISA
2009, Lecture Notes in Computer Science 5932,
pp. 66--78, Springer-Verlag, 2009.
-
Masahiro Yamaguchi, Hideki, Toriduka, Shoichi
Kobayashi, Takeshi Sugawara, Naofumi Homma, Akashi
Satoh, Takafumi Aoki, "Side Channel Attack to Magnetic
Near Field of Cryptographic LSI and Its Protection by
Magnetic Thin Film," Soft Magnetic Materials 19, A3-11,
September 2009.
-
Toshihiro Katashita, Akashi Satoh, Takeshi Sugawara,
Naofumi Homma, and Takafumi Aoki, "Development of
Side-Channel Attack Standard Evaluation Environment,"
European Conference on Circuit Theory and Design 2009,
pp. 403--408, August 2009.
-
Takeshi Sugawara, Naofumi Homma, Takafumi Aoki, and
Akashi Satoh, "Differential Power Analysis of AES ASIC
Implementations with Various S-box Circuits," European
Conference on Circuit Theory and Design 2009,
pp. 395--398, August 2009.
-
Takeshi Sugawara, Yu-ichi Hayashi, Naofumi Homma,
Takaaki Mizuki, Takafumi Aoki, Hideaki Sone, and Akashi
Satoh, "Spectrum Analysis on Cryptographic Modules to
Counteract Side-Channel Attacks," Proceedings of the
2009 International Symposium on Electromagnetic
Compatibility, pp. 21--24, July 2009.
-
Yu-ichi Hayashi, Takeshi Sugawara, Yoshiki Kayano,
Naofumi Homma, Takaaki Mizuki, Akashi Satoh, Takafumi
Aoki, Shigeki Minegishi, Hideaki Sone, and Hiroshi
Inoue, "An Analysis of Information Leakage from a
Cryptographic Hardware via Common-Mode Current,"
Proceedings of the 2009 International Symposium on
Electromagnetic Compatibility, pp. 17--20, July 2009.
-
Atsushi Miyamoto, Naofumi Homma, Takafumi Aoki, and
Akashi Satoh, "Evaluation of Simple/Comparative Power
Analysis Against an RSA ASIC Implementation",
Proceedings of the 2009 IEEE International Symposium on
Circuits and Systems, pp.2918--2921, May 2009.
-
Yuichi Baba, Atsushi Miyamoto, Naofumi Homma, Takafumi
Aoki, "Multiple-Valued Constant-Power Adder for
Cryptographic Processor," Proceedings of the 39th
International Symposium on Multiple Valued Logic,
pp. 239--244, May 2009.
-
Atsushi Miyamoto, Naofumi Homma, Takafumi Aoki, and
Akashi Satoh, "An experimental comparison of power
analysis attacks against RSA processors on ASIC and
FPGA," Proceedings of the 15th Workshop on Synthesis
And System Integration of Mixed Information
technologies, pp. 58--63, March 2009.
-
Takeshi Sugawara, Naofumi Homma, Takafumi Aoki, and
Akashi Satoh, "Compact ASIC Architectures for the
512-bit Hash Function Whirlpool," Workshop on
Information Security Applications - WISA 2008, Lecture
Notes in Computer Science 5379, pp. 28--40,
Springer-Verlag, January 2009.
-
Toshihiro Katashita, Akashi Satoh, Takeshi Sugawara,
Naofumi Homma and Takafumi Aoki, "Enhanced Correlation
Power Analysis using Key Screening Techniques," 2008
International Conference on ReConFigurable Computing
and FPGAs, pp. 403-408, December 2008.
-
Atsushi Miyamoto, Naofumi Homma, Takafumi Aoki, and
Akashi Satoh, "Systematic design of high-radix
Montgomery multipliers for RSA processors," Proceedings
of the 26th IEEE International Conference of Computer
Design, pp. 416--421, October 2008.
-
Atsushi Miyamoto, Naofumi Homma, Takafumi Aoki, and
Akashi Satoh, "Chosen-message SPA attacks against
FPGA-based RSA hardware implementations," Proceedings
of the 2008 International Conference on Field
Programmable Logic and Applications, pp. 35--40,
September 2008.
-
Akashi Satoh, Takeshi Sugawara, Naofumi Homma, and
Takafumi Aoki, "High-performance concurrent error
detection scheme for AES hardware," Cryptographic
Hardware and Embedded Systems - CHES 2008, Lecture
Notes in Computer Science 5154, pp. 100--112,
Springer-Verlag, August 2008.
-
Naofumi Homma, Atsushi Miyamoto, Takafumi Aoki, Akashi
Satoh, and Adi Shamir, "Collision-based power analysis
of modular exponentiation using chosen-message pairs,"
Cryptographic Hardware and Embedded Systems - CHES
2008, Lecture Notes in Computer Science 5154,
pp. 15--29, Springer-Verlag, August 2008.
-
Naofumi Homma, Atsushi Miyamoto, Takafumi Aoki, and
Akashi Satoh, "Power analysis of RSA processors with
high-radix Montgomery multipliers," Proceedings of 17th
International Workshop on Post-Binary ULSI Systems,
pp. 21--24, May 2008.
-
Yuki Watanabe, Naofumi Homma, Katsuhiko Degawa,
Takafumi Aoki, and Tatsuo Higuchi, "High-level design
of multiple-valued arithmetic circuits based on
arithmetic description language," Proceedings of the
38th IEEE International Symposium on Multiple-Valued
Logic, No. 31, pp. 112--117, May 2008.
-
Atsushi Miyamoto, Naofumi Homma, Takafumi Aoki, and
Akashi Satoh, "Enhanced power analysis attack
using chosen message against RSA hardware
implementations," Proceedings of the 2008 IEEE
International Symposium on Circuits and Systems,
pp. 3282--3285, May 2008.
-
Takeshi Sugawara, Naofumi Homma, Takafumi Aoki, and
Akashi Satoh, "High-performance ASIC implementations of
the 128-bit block cipher CLEFIA," Proceedings of the
2008 IEEE International Symposium on Circuits and
Systems, pp. 2925--2928, May 2008.
-
Yuki Watanabe, Naofumi Homma, Takafumi Aoki, and Tatsuo
Higuchi, "Arithmetic module generator with algorithm
optimization capability," Proceedings of the 2008 IEEE
International Symposium on Circuits and Systems,
pp. 1796--1799, May 2008.
-
Yuki Watanabe, Naofumi Homma, Takafumi Aoki, and Tatsuo Higuchi, "Formal representation and verification of arithmetic circuits using symbolic computer algebra," Proceedings of the 14th Workshop on Synthesis And System Integration of Mixed Information technologies, October 2007.
-
Yuki Watanabe, Naofumi Homma, Takafumi Aoki, and Tatsuo Higuchi, "Application of symbolic computer algebra to arithmetic circuit verification," Proceedings of the 25th IEEE International Conference of Computer Design, October 2007.
-
Takeshi Sugawara, Naofumi Homma, Takafumi Aoki, Akashi Satoh, "ASIC performance comparison for the ISO standard block ciphers," Proceedings of the 2nd Joint Workshop on Information Security, pp. 485--498, August 2007.
-
Takeshi Sugawara, Naofumi Homma, Takafumi Aoki, Akashi Satoh, "A high-performance ASIC implementation of the 64-bit block cipher CAST-128," Proceedings of the 2007 IEEE International Symposium on Circuits and Systems, pp. 1859--1862, May 2007.
-
Atsushi Miyamoto, Naofumi Homma, Takafumi Aoki, Akashi Satoh, "SPA against an FPGA-based RSA implementation with a high-radix Montgomery multiplier," Proceedings of the 2007 IEEE International Symposium on Circuits and Systems, pp. 1847--1850, May 2007.
-
Sei Nagashima, Naofumi Homma, Takafumi Aoki, Akashi Satoh, "DPA using phase-based waveform matching against random-delay countermeasure," Proceedings of the 2007 IEEE International Symposium on Circuits and Systems, pp. 1807--1810, May 2007
-
Naofumi Homma, Katsuhiko Degawa, Takafumi Aoki, and Tatsuo Higuchi, "Algorithm-level optimization of multiple-valued arithmetic circuits using counter tree diagrams," Proceedings of the 37th IEEE International Symposium on Multiple-Valued Logic, No. 31, pp. 1--8, May 2007.
-
Yuki Watanabe, Naofumi Homma, Takafumi Aoki, and Tatsuo Higuchi, "Formal Design of Decimal Arithmetic Circuits Using Arithmetic Description Language," 2006 IEEE International Symposium on Intelligent Signal Processing and Communication Systems, pp. 419--422, December 2006.
-
Naofumi Homma, Sei Nagashima, Yuichi Imai, Takafumi Aoki, and Akashi Satoh,
"High-resolution side-channel attack using phase-based waveform matching," Cryptographic Hardware and Embedded Systems - CHES 2006, Lecture Notes in Computer Science 4249, pp. 187--200, Springer-Verlag, October 2006.
-
Naofumi Homma, Takafumi Aoki, and Tatsuo Higuchi, "Algorithm-level interpretation of fast adder structures in binary and multiple-valued logic,"
Proceedings of the 36th International Symposium on Multiple-Valued Logic, p. 2, May 2006.
-
Yuki Watanabe, Naofumi Homma, Takafumi Aoki, and Tatsuo Higuchi, "Arithmatic module generator based on arithmatic description language,"
Proceedings of the 13th Workshop on Synthesis And System Integration of Mixed Information Technologies, pp. 153--160, April 2006.
-
Naofumi Homma, Yuki Watanabe, Kazuya Ishida, Takafumi Aoki, and Tatsuo Higuchi, "A multiplier module generator based on arithmetic description language," Proceedings of the IP Based SoC Design Conference & Exhibition, pp. 207--212, December 2005.
-
Naofumi Homma, Takafumi Aoki, and Tatsuo Higuchi, "A Graph-Based Representation for Analyzing Fast Addition Algorithms," Proceedings of the 7th International Symposium on Representations and Methodology of Future Computing Technologies, pp. 52--57, September 2005.
-
Naofumi Homma, Kazuya Ishida, Takafumi Aoki and Tatsuo Higuchi, "Arithmetic Description Language and Its Application to Parallel Multiplier Design," Proceedings of the 12th Synthesis And System Integration of Mixed Information technologies, pp. 319--326, October 2004.
-
Masanori Natsui, Naofumi Homma, Takafumi Aoki and Tatsuo Higuchi, "Topology-Oriented Design of Current Mirrors Using Evolutionary Graph Generation System," Proceedings of the 12th Synthesis And System Integration of Mixed Information technologies, pp. 78--84, October 2004.
-
Masanori Natsui, Naofumi Homma, Takafumi Aoki and Tatsuo Higuchi, "Topology-Oriented Design of Analog Circuits Based on Evolutionary Graph Generation," Parallel Problem Solving from Nature - PPSN VIII, Lecture Notes in Computer Science 3242, Springer-Verlag, pp. 342--351, September 2004.
-
Masanori Natsui, Naofumi Homma, Takafumi Aoki, and Tatsuo Higuchi, "Evolutionary Graph Generation System with Transmigration Capability and Its Application to Current Mirror Circuit Synthesis," Proceedings of the 2004 International Technical Conference on Circuits/Systems, Computers and Communications, pp 8A2L-3-1--8A2L-3-4, July 2004
-
Naofumi Homma, Taihei Wakamatsu, Jun Sakiyama, Takafumi Aoki, and Tatsuo Higuchi, "Counter Tree Diagrams for Redundant Adder Design," Proceedings of the 2004 International Technical Conference on Circuits/Systems, Computers and Communications, pp 6C3L-2-1--6C3L-2-4, July 2004
-
Naofumi Homma, Takafumi Aoki, and Tatsuo Higuchi, "Multiplier Block Synthesis Using Evolutionary Graph Generation," The IEEE Computer Society Press in the proceedings of the 2004 NASA/DoD Conference on Evolvable Hardware, pp 79--82, June 2004
-
Naofumi Homma, Jun Sakiyama, Taihei Wakamatsu, Takafumi Aoki, and Tatsuo Higuchi, "A Systematic Approach for Analyzing Fast Addition Algorithms Using Counter Tree Diagrams," Proceedings of the 2004 IEEE International Symposium on Circuits and Systems, pp. V-197--V-200, May 2004
-
Kazuya Ishida, Naofumi Homma, Takafumi Aoki, and Tatsuo Higuchi, "Design and Verification of Parallel Multipliers Using Arithmetic Description Language: ARITH," Proceedings of the 34th IEEE International Symposium on Multiple-Valued Logic, pp. 334 -- 339, May 2004
-
Naofumi Homma, Masanori Natsui, Takafumi Aoki, and Tatsuo Higuchi, "Graph-Based Approach for Synthesizing Arithmetic Circuits," Proceedings of 13th International Workshop on Post-Binary ULSI Systems, pp. 25--32, May 2004. (Invited)
-
Masanori Natsui, Naofumi Homma, Takafumi Aoki, and Tatsuo Higuchi, "Evolutionary Graph Generation System and Its Application MOS Current Mirror Synthesis," Proceedings of the 2003 IEEE International Symposium on Intelligent Signal Processing and Communication Systems, pp. 747--752, December 2003.
-
Naofumi Homma, Masanori Natsui, Takafumi Aoki, and Tatsuo Higuchi, "VLSI Circuit Design Using an Object-Oriented Framework of Evolutionary Graph Generation System," Proceedings of 2003 Congress on Evolutionary Computation, pp. 115--122, December 2003.
-
Naofumi Homma, Takafumi Aoki, Makoto Motegi and Tatsuo Higuchi, "A framework of evolutionary graph generation system and its application to circuit synthesis," Proceedings of the 2003 IEEE International Symposium on Circuits and Systems, pp. V-201--V-204, May 2003.
-
Naofumi Homma, Takafumi Aoki, and Tatsuo Higuchi, "Evolutionary synthesis of circuit structures," Proceedings of 2002 International Symposium on New Paradigm VLSI Computing, pp. 48--51, December 2002.
-
Makoto Motegi, Naofumi Homma, Takafumi Aoki, and Tatsuo Higuchi, "Evolutionary Graph Generation System and Its Application to Bit-Serial Arithmetic Circuit Synthesis," Parallel Problem Solving from Nature - PPSN VII, Lecture Notes in Computer Science 2439, Springer-Verlag, pp. 831--840, September 2002.
-
Naofumi Homma, Takafumi Aoki, and Tatsuo Higuchi, "Graph-based Individual Representation for Evolutionary Synthesis of Arithmetic Circuits," Proceedings of the 2002 Congress on Evolutionary Computation, pp. 1492--1497, May 2002.
-
Dingjun Chen, Takafumi Aoki, Naofumi Homma, and Tatsuo Higuchi, "Design of constant-coefficient multipliers," Proceedings of 2001 4th International Conference on ASIC, Vol. 1, pp. 416--419, October 2001
-
Dingjun Chen, Takafumi Aoki, Naofumi Homma, and Tatsuo Higuchi, "Distributed evolutionary design of constant-coefficient multipliers," Proceedings of The 8th IEEE International Conference on Electronics, Circuits and Systems, Vol. 1, pp. 249--252, September 2001
-
Naofumi Homma, Takafumi Aoki, and Tatsuo Higuchi, "Evolutionary graph generation system with transmigration capability for arithmetic circuit design," Proceedings of The 2001 IEEE International Symposium on Circuits and Systems, Vol. 5 of 5, pp. 171--174, May 2001.
-
Naofumi Homma, Takafumi Aoki, and Tatsuo Higuchi, "Evolutionary generation of constant-coefficient multipliers," Proceedings of the 1999 IEEE International Symposium on Intelligent Signal Processing and Communication Systems, pp. 481--484, December 1999.
-
Naofumi Homma, Takafumi Aoki, and Tatsuo Higuchi, "A new evolutionary approach for synthesizing circuit structures," Proceedings of the 1999 International Symposium on Nonlinear Theory and its Applications, pp. 239--242, November 1999.
-
Naofumi Homma, Takafumi Aoki, and Tatsuo Higuchi, "Evolutionary graph generation system for arithmetic circuit design," Proceedings of International Symposium on Future of Intellectual Integrated Electronics, pp. 355--364, March 1999.
-
Naofumi Homma, Takafumi Aoki, and Tatsuo Higuchi, "Design of arithmetic circuits based on evolutionary graph generation," Proceedings of the Workshop on Synthesis and System Integration of Mixed Technologies, pp. 31--38, October 1998.
-
Æ£ËÜÂç²ð¡¤¾È²°Í£µª¡¤ºê»³ °ìÃË¡¤ËÜ´Ö¾°Ê¸¡¤ÃÓÅÄ À¿¡¤±ÊÅÄ ¿¿¡¤¾¾ËÜ ÊÙ¡¤"ÊÂÎó²½RNS¥¢¡¼¥¥Æ¥¯¥Á¥ã¤Ë¤è¤ë¹â®¥Ú¥¢¥ê¥ó¥°¼ÂÁõ¤Ë´Ø¤¹¤ë¸¡Æ¤¡¤" 2016 ǯ°Å¹æ¤È¾ðÊ󥻥¥å¥ê¥Æ¥£¥·¥ó¥Ý¥¸¥¦¥à, Vol. 2F3-4, pp.1--8, January 20, 2016.
-
¾åÌîÎ桤¿û¸¶¹¬¹°¡¤ËÜ´Ö¾°Ê¸¡¤ÀÄÌÚ¹§Ê¸¡¤¿¹²¬À¡É×, "°ìÈ̲½¥Þ¥¹¥¥ó¥°¥¹¥¡¼¥à¤Ë´ð¤Å¤¯ÂÑ¥¿¥ó¥Ñ¡¼À°Å¹æ¥Ï¡¼¥É¥¦¥§¥¢¤Î¼«Æ°¹çÀ®¡¤" 2016 ǯ°Å¹æ¤È¾ðÊ󥻥¥å¥ê¥Æ¥£¥·¥ó¥Ý¥¸¥¦¥à, Vol. 2F3-4, pp.1--8, January 20, 2016.
-
²Ï°æ¹Ò¡¤¾åÌîÎ桤ËÜ´Ö¾°Ê¸¡¤ÀÄÌÚ¹§Ê¸¡¤Ê¡Åçϱѡ¤À¶ËÜ¿¸ºî, "IC¥«¡¼¥É¾å¤Ë¼ÂÁõ¤µ¤ì¤¿KCipher-2¥½¥Õ¥È¥¦¥§¥¢¤ËÂФ¹¤ëÅÅÎϲòÀϤθ¡Æ¤¡¤" 2016 ǯ°Å¹æ¤È¾ðÊ󥻥¥å¥ê¥Æ¥£¥·¥ó¥Ý¥¸¥¦¥à, Vol. 2F3-1, pp.1--6, January 20, 2016.
-
ÎÓÍ¥°ì¡¤ËÜ´Ö¾°Ê¸¡¤Ä»³¤ÍÛÊ¿¡¤¹âëϹ¨¡¤ÀÄÌÚ¹§Ê¸¡¤"Åż§Åª²èÌÌÅð»ë¤Ë¤ª¤±¤ëϳ¤¨¤¤¥Ñ¥é¥á¥¿¤Î¹â®¿äÄêË¡¤Ë´Ø¤¹¤ë¸¡Æ¤¡¤" 2016 ǯ°Å¹æ¤È¾ðÊ󥻥¥å¥ê¥Æ¥£¥·¥ó¥Ý¥¸¥¦¥à, Vol. 2F2-2, pp.1--5, January 20, 2016.
-
ÀÐȨÂçÊ塤ËÜ´Ö¾°Ê¸, ÎÓÍ¥°ì, »°±ºÅµÇ·, Æ£ËÜÂç²ð, ±ÊÅÄ¿¿, ÀÄÌÚ¹§Ê¸¡¤"Åż§ÇȲòÀϹ¶·â¤ËÂФ¹¤ëÈ¿±þ·¿Âкö¤Î¹âÀǽ²½¤È¤½¤Îɾ²Á," 2016 ǯ°Å¹æ¤È¾ðÊ󥻥¥å¥ê¥Æ¥£¥·¥ó¥Ý¥¸¥¦¥à, Vol. 2F2-1, pp.1--6, January 20, 2016.
-
ÍüËÜæƱÊ, ËÜ´Ö¾°Ê¸, ÎÓÍ¥°ì, ¹â¶¶½ç»Ò¡¤ÉڻοΡ¤ÀÄÌÚ¹§Ê¸, "¥Ñ¥¤¥×¥é¥¤¥ó¹½Â¤¤òͤ¹¤ë¥Þ¥¤¥¯¥í¥×¥í¥»¥Ã¥µ¤Ø¤Î¸Î¾ãÃíÆþ¹¶·â," 2016 ǯ°Å¹æ¤È¾ðÊ󥻥¥å¥ê¥Æ¥£¥·¥ó¥Ý¥¸¥¦¥à, Vol. 2F1-3, pp.1--7, January 20, 2016.
-
¥ô¥£¥Ã¥ì¥¦¥ê¥Þ¥¦¥ë, ËÜ´Ö¾°Ê¸, ÀÄÌÚ¹§Ê¸, "¥¢¥ó¥í¡¼¥ë¥É¥¢¡¼¥¥Æ¥¯¥Á¥ã¤ËÂФ¹¤ëÅÅÎϲòÀϤιâÅÙ²½¼êË¡," 2016 ǯ°Å¹æ¤È¾ðÊ󥻥¥å¥ê¥Æ¥£¥·¥ó¥Ý¥¸¥¦¥à, Vol. 1F2-4, pp.1--6, January 19, 2016.
-
¾åÌîÎ桤ËÜ´Ö¾°Ê¸¡¤¿û¸¶¹¬¹°¡¤Ìî¾åÊÝÇ·¡¤ÀÄÌÚ¹§Ê¸¡¤"¾éĹɽ¸½¤Ë´ð¤Å¤¯¹â¸úΨ¥¬¥í¥¢Âλ»½Ñ±é»»²óÏ©¤ÎÀ߷ס¤" Âè29²ó¿ÃÍÏÀÍý¤È¤½¤Î±þÍѸ¦µæ²ñ, No. 4, pp. ??--??, January 9 2016.
-
¿û¸¶¹¬¹°, ¾åÌîÎæ, ËÜ´Ö¾°Ê¸, ÀÄÌÚ¹§Ê¸, "¥Þ¥ë¥Á¥Ñ¡¼¥Æ¥£·×»»¤Ë´ð¤Å¤¯°Å¹æ¥Ï¡¼¥É¥¦¥§¥¢¤Î·Á¼°ÅªÀ߷פ˴ؤ¹¤ë¸¡Æ¤," Âè38²ó¿ÃÍÏÀÍý¥Õ¥©¡¼¥é¥à, No. 11, pp. 11-1--11-6, September 13, 2015.
-
ÀÐȨÂçÊå, ËÜ´Ö¾°Ê¸, ÎÓÍ¥°ì, »°±ºÅµÇ·, Æ£ËÜÂç²ð, ±ÊÅÄ¿¿, ÀÄÌÚ¹§Ê¸¡¤"°Å¹æLSI¤Ø¤Î¼ÂÁõ¹¶·â¤ËÂФ¹¤ëÈ¿±þ·¿Âкö¤Î¹âÀºÅÙ²½¤Ë´Ø¤¹¤ë¸¡Æ¤¡¤" Ê¿À®27ǯÅÙ Åŵ¤´Ø·¸³Ø²ñÅìËÌ»ÙÉôÏ¢¹çÂç²ñ¡¤No. 2E01, p. 1, August 28, 2015
-
²Ï°æ¹Ò¡¤ËÜ´Ö¾°Ê¸¡¤Ê¡Åçϱѡ¤À¶ËÜ¿¸ºî¡¤ÀÄÌÚ¹§Ê¸¡¤"¥¹¥È¥ê¡¼¥à°Å¹æ¥½¥Õ¥È¥¦¥§¥¢¤ËÂФ¹¤ëǽưŪʪÍý¹¶·â¤Îɾ²Á¡¤" Ê¿À®27ǯÅÙ Åŵ¤´Ø·¸³Ø²ñÅìËÌ»ÙÉôÏ¢¹çÂç²ñ¡¤No. 2C14, p. 1, August 28, 2015
-
ÅÄÃæÎ÷Â硤»°±ºÅµÇ·¡¤Æ£ËÜÂç²ð¡¤ËÜ´Ö¾°Ê¸¡¤ÎÓÍ¥°ì¡¤ÀÄÌÚ¹§Ê¸¡¤±ÊÅÄ¿¿, "°Å¹æ½èÍý²óÏ©¤Ø¤Î¶á˵Åż§ÇȲòÀϹ¶·â¤ò¸¡ÃΤ¹¤ë´°Á´¥Ç¥¸¥¿¥ëȯ¿¶´ï·¿¥»¥ó¥µ," LSI¤È¥·¥¹¥Æ¥à¤Î¥ï¡¼¥¯¥·¥ç¥Ã¥×¡¤p. 9, May 11, 2015.¡ÊÍ¥½¨¥Ý¥¹¥¿¡¼¾Þ¼õ¾Þ¡Ë
-
±óÆ£æÆ, ÍüËÜæƱÊ, ËÜ´Ö¾°Ê¸, ÎÓÍ¥°ì, ¹â¶¶½ç»Ò, ÉڻοÎ, ÀÄÌÚ¹§Ê¸, "Cortex-M0¥×¥í¥»¥Ã¥µ¾å¤Î°Å¹æ¥½¥Õ¥È¥¦¥§¥¢¤ËÂФ¹¤ë¿½Å¸Î¾ãÃíÆþ¹¶·â¤Î¸¡Æ¤," ¾ðÊó½èÍý³Ø²ñ¸¦µæÊó¹ð, Vol. 2015-CSEC-68, No. 15, pp. 1--8, March 5, 2015.
-
ĹÈøÆÆ, ±üÀîͺ°ìϺ, ¹âëϹ¨, ÎÓÍ¥°ì, ËÜ´Ö¾°Ê¸, ÀÄÌÚ¹§Ê¸, "°Õ¿ÞŪ¤ÊÅż§Ë¸³²ÇȤˤè¤Ã¤ÆȯÀ¸¤¹¤ë¥ª¡¼¥Ð¡¼¥¯¥í¥Ã¥¯¤Î¸¡½ÐÊýË¡¤Ë´Ø¤¹¤ë¸¡Æ¤," ÅŻҾðÊóÄÌ¿®³Ø²ñµ»½Ñ¸¦µæÊó¹ð, vol.114, no. 398, EMCJ2014-100 pp.83-88, January 23, 2015.
-
¥ô¥£¥Ã¥ì¥¦¥ê¥Þ¥¦¥ë, ËÜ´Ö¾°Ê¸, ±óÆ£æÆ, ÀÄÌÚ¹§Ê¸, "¥¢¥ó¥í¡¼¥ë¥¢¡¼¥¥Æ¥¯¥Á¥ã¤Ç¼ÂÁõ¤µ¤ì¤¿PRINCE¥Ï¡¼¥É¥¦¥§¥¢¤ËÂФ¹¤ëÅÅÎϲòÀϤθ¡Æ¤," 2015 ǯ°Å¹æ¤È¾ðÊ󥻥¥å¥ê¥Æ¥£¥·¥ó¥Ý¥¸¥¦¥à, Vol. 3A2-4, pp.1--6, January 22, 2015.
-
ËÜ´Ö¾°Ê¸, ÎÓÍ¥°ì, »°±ºÅµÇ·, Æ£ËÜÂç²ð, ±ÊÅÄ¿¿, ÀÄÌÚ¹§Ê¸, "Åż§Çȹ¶·â¥»¥ó¥µ¤ÎÀ߷פȼ¾Ú," 2015 ǯ°Å¹æ¤È¾ðÊ󥻥¥å¥ê¥Æ¥£¥·¥ó¥Ý¥¸¥¦¥à, Vol. 2F4-4, pp.1--6, January 21, 2015.
-
ÎÓÍ¥°ì, ËÜ´Ö¾°Ê¸, »°±º±Ò, ÀÄÌÚ¹§Ê¸, Á¾º¬½¨¾¼, "¥¿¥Ö¥ì¥Ã¥ÈüËö¤«¤é¤ÎÅż§ÇȤò²ð¤·¤¿¾ðÊóϳ¤¨¤¤¥á¥«¥Ë¥º¥à¤Î¸¡Æ¤," 2015 ǯ°Å¹æ¤È¾ðÊ󥻥¥å¥ê¥Æ¥£¥·¥ó¥Ý¥¸¥¦¥à, Vol. 2F4-3, pp.1--5, January 21, 2015.
-
ÍüËÜæƱÊ, ±óÆ£æÆ, ËÜ´Ö¾°Ê¸, ÎÓÍ¥°ì, ÀÄÌÚ¹§Ê¸, "¥Þ¥¤¥¯¥í¥³¥ó¥È¥í¡¼¥é¾å¤Î¥×¥í¥°¥é¥àÀ©¸æ¥Õ¥í¡¼¤Ø¤Î¸Î¾ãÃíÆþ¹¶·â," 2015 ǯ°Å¹æ¤È¾ðÊ󥻥¥å¥ê¥Æ¥£¥·¥ó¥Ý¥¸¥¦¥à, Vol. 2F4-2, pp.1--8, January 21, 2015.
-
Ãæ¼¹É, ÎÓÍ¥°ì, ¿åÌÚ·ÉÌÀ, ËÜ´Ö¾°Ê¸, ÀÄÌÚ¹§Ê¸, Á¾º¬½¨¾¼, "°Å¹æ¥â¥¸¥å¡¼¥ë¤«¤é¤Îϳ±ÌÅż§ÇȤòÍѤ¤¤¿¸Î¾ãȯÀ¸¥¿¥¤¥ß¥ó¥°ÆÃÄê¼êË¡," 2015 ǯ°Å¹æ¤È¾ðÊ󥻥¥å¥ê¥Æ¥£¥·¥ó¥Ý¥¸¥¦¥à, Vol. 2F4-1, pp.1--8, January 21, 2015.
-
¾åÌîÎæ, ËÜ´Ö¾°Ê¸, ¿û¸¶¹¬¹°, ÀÄÌÚ¹§Ê¸, "¿¹à¼°´Äɽ¸½¤òÍѤ¤¤¿GF(2^8)¹çÀ®Âεոµ±é»»´ï¤ÎÀß·×," 2015 ǯ°Å¹æ¤È¾ðÊ󥻥¥å¥ê¥Æ¥£¥·¥ó¥Ý¥¸¥¦¥à, Vol. 2B1-1, pp.1--6, January 21, 2015.
-
±§ÌîÊã, ±óÆ£æÆ, ËÜ´Ö¾°Ê¸, ÀÄÌÚ¹§Ê¸, ÃçÌîÍÅÐ, À¶ËÜ¿¸ºî, »°ÂðÍ¥, "KCipher-2¥½¥Õ¥È¥¦¥§¥¢¤ÎIC¥«¡¼¥É¼ÂÁõ¤È¤½¤Îɾ²Á¡¤"¥³¥ó¥Ô¥å¡¼¥¿¥»¥¥å¥ê¥Æ¥£¥·¥ó¥Ý¥¸¥¦¥à 2014, pp. 64--71, October 22, 2014.
-
¾åÌîÎ桤ËÜ´Ö¾°Ê¸¡¤¿û¸¶¹¬¹°¡¤ÀÄÌÚ¹§Ê¸¡¤"¿¹à¼°´Äɽ¸½¤µ¤ì¤¿¥¬¥í¥¢Âξå¤Î»»½Ñ±é»»²óÏ©¤Î·Á¼°ÅªÀ߷פ˴ؤ¹¤ë¸¡Æ¤¡¤"Âè37²ó¿ÃÍÏÀÍý¥Õ¥©¡¼¥é¥à, No. 14, pp. 15-1--15-8, September 14, 2014.
-
¿û¸¶¹¬¹°¡¤¾åÌîÎ桤ËÜ´Ö¾°Ê¸¡¤ÀÄÌÚ¹§Ê¸¡¤"¥¬¥í¥¢Âξå¤ÎÊÂÎó¾è»»´ï¼«Æ°À¸À®¥·¥¹¥Æ¥à¤Î¹½ÃۤȤ½¤Îɾ²Á¡¤"Âè37²ó¿ÃÍÏÀÍý¥Õ¥©¡¼¥é¥à, No. 14, pp. 14-1--14-7, September 14, 2014.
-
¿û¸¶¹¬¹°¡¤¾åÌîÎ桤ËÜ´Ö¾°Ê¸¡¤ÀÄÌÚ¹§Ê¸¡¤"¶¦Ä̸°°Å¹æ¥×¥í¥»¥Ã¥µ¤Î¸úΨŪ¤Ê¸¡¾Ú¥·¥¹¥Æ¥à¤Î¹½ÃÛ¡¤" Ê¿À®26ǯÅÙ Åŵ¤´Ø·¸³Ø²ñÅìËÌ»ÙÉôÏ¢¹çÂç²ñ¡¤No. 2G06, p. 1, August 22, 2014.
-
ÍüËÜæƱʡ¤±§Ìî¡¡Ê㡤ËÜ´Ö¾°Ê¸¡¤ÀÄÌÚ¹§Ê¸¡¤"¥µ¥¤¥É¥Á¥ã¥Í¥ë¹¶·âÂÑÀ¤òͤ¹¤ëÂʱ߶ÊÀþ°Å¹æ¥½¥Õ¥È¥¦¥§¥¢¤ÎIC¥«¡¼¥É¼ÂÁõ¡¤" Ê¿À®26ǯÅÙ Åŵ¤´Ø·¸³Ø²ñÅìËÌ»ÙÉôÏ¢¹çÂç²ñ¡¤No. 2G05, p. 1, August 22, 2014.
-
Ãæ¼¹É, ÎÓÍ¥°ì, ËÜ´Ö¾°Ê¸, ¿åÌÚ·ÉÌÀ, ÀÄÌÚ¹§Ê¸, Á¾º¬ ½¨¾¼, "¥µ¥¤¥É¥Á¥ã¥Í¥ë¾ðÊó¤òÍѤ¤¤¿¸Î¾ãȯÀ¸¥¿¥¤¥ß¥ó¥°ÆÃÄê¼êË¡¤Î¼Â¸½²ÄǽÀ¤Ë´Ø¤¹¤ë¸¡Æ¤," ÅŻҾðÊóÄÌ¿®³Ø²ñµ»½Ñ¸¦µæÊó¹ð, vol. 114, no. 129, EMCJ2014-23, pp. 37-42, 2014.
-
Ãæ¼¹É, ÎÓÍ¥°ì, ËÜ´Ö¾°Ê¸, ¿åÌÚ·ÉÌÀ, ÀÄÌÚ¹§Ê¸, Á¾º¬ ½¨¾¼, "°Å¹æ¥â¥¸¥å¡¼¥ë¤Ë¤ª¤±¤ë¥µ¥¤¥É¥Á¥ã¥Í¥ë¾ðÊó¤òÍѤ¤¤¿¸Î¾ãȯÀ¸¥¿¥¤¥ß¥ó¥°ÆÃÄê¼êË¡," ÅŻҾðÊóÄÌ¿®³Ø²ñµ»½Ñ¸¦µæÊó¹ð, vol. 114, no. 93, EMCJ2014-11, pp. 7-12, 2014.
-
Æ£ËÜÂç²ð, »°±ºÅµÇ·, ±ÊÅÄ¿¿, ÎÓÍ¥°ì, ËÜ´Ö¾°Ê¸, Shivam Bhasin¡¤Jean-Luc Danger, "CMOS°Å¹æ²óÏ©¤Ë¤ª¤±¤ë¥·¥ê¥³¥ó´ðÈĤ«¤é¤Î¥µ¥¤¥É¥Á¥ã¥Í¥ëϳ±Ì," ÅŻҾðÊóÄÌ¿®³Ø²ñµ»½Ñ¸¦µæÊó¹ð, vol. 114, no. 93, EMCJ2014-10, pp. 1-6, 2014.
-
±§ÌîÊã, ±óÆ£æÆ, ËÜ´Ö¾°Ê¸, ÀÄÌÚ¹§Ê¸, ÃçÌîÍÅÐ, À¶ËÜ¿¸ºî, »°ÂðÍ¥, "ZigBeeɾ²ÁÍÑ¥Þ¥¤¥³¥ó¾å¤Ë¼ÂÁõ¤µ¤ì¤¿KCipher-2¤ËÂФ¹¤ëÁê´ØÅż§ÇȲòÀϤθ¡Æ¤," ¿®³Øµ»Êó, ISEC2013-88, pp. 35-40, March 10, 2014.
-
±§ÌîÊ㡤±óÆ£æÆ¡¤ËÜ´Ö¾°Ê¸, ÎÓÍ¥°ì, ÀÄÌÚ¹§Ê¸, "Áȹþ¤ßOS¾å¤Ë¼ÂÁõ¤µ¤ì¤¿¸ø³«¸°°Å¹æ¥½¥Õ¥È¥¦¥§¥¢¤ËÂФ¹¤ëÅż§ÇȲòÀϹ¶·â," 2014 ǯ°Å¹æ¤È¾ðÊ󥻥¥å¥ê¥Æ¥£¥·¥ó¥Ý¥¸¥¦¥à, Vol. 3A2-3, pp.1--7, January 23, 2014.
-
¾åÌîÎæ, ËÜ´Ö¾°Ê¸, ÀÄÌÚ¹§Ê¸, "LED °Å¹æ¤Ø¤Îñ°ì¤Î¸Î¾ãÃíÆþ¤òÍѤ¤¤¿º¹Ê¬¸Î¾ã²òÀϤȤ½¤Îɾ²Á," 2014 ǯ°Å¹æ¤È¾ðÊ󥻥¥å¥ê¥Æ¥£¥·¥ó¥Ý¥¸¥¦¥à, Vol. 3A1-5, pp.1--8, January 23, 2014.
-
±óÆ£æÆ, ËÜ´Ö¾°Ê¸, ÎÓÍ¥°ì, ¹â¶¶½ç»Ò, ÉڻοÎ, ÀÄÌÚ¹§Ê¸, "Ŭ±þŪ¤Ë¥¿¥¤¥ß¥ó¥°¤òÀ©¸æ¤·¤¿Â¿½Å¸Î¾ãÃíÆþ¹¶·â¤È¤½¤ÎÂкö," 2014 ǯ°Å¹æ¤È¾ðÊ󥻥¥å¥ê¥Æ¥£¥·¥ó¥Ý¥¸¥¦¥à, Vol. 3A1-1, pp.1--7, January 23, 2014.
-
ÎÓÍ¥°ì, ËÜ´Ö¾°Ê¸, »°±º±Ò,ÀÄÌÚ¹§Ê¸, Á¾º¬ ½¨¾¼, "¥¿¥Ö¥ì¥Ã¥ÈüËö¤ËÂФ¹¤ëÅż§ÇȤò²ð¤·¤¿¾ðÊóϳ¤¨¤¤¤Î¶¼°Ò," 2014 ǯ°Å¹æ¤È¾ðÊ󥻥¥å¥ê¥Æ¥£¥·¥ó¥Ý¥¸¥¦¥à, Vol. 2A3-4, pp.1--6, January 22, 2014.
-
Æ£ËÜÂç²ð, ÅÄÃæÂçÃÒ, »°±ºÅµÇ·, ±ÊÅÄ¿¿, ÎÓÍ¥°ì, ËÜ´Ö¾°Ê¸, ÀÄÌÚ¹§Ê¸, ËÙÍÎÊ¿, ÊÒ²¼ÉÒ¹, ùõ»³°ìÃË, Thanh-Ha Le, Julien Bringer, Pirouz Bazargan-Sabet, Shivam Bhasin, Jean-Luc Danger, "¥Á¥Ã¥×Æâ³°¤Ç¤ÎÅŸ»ÅÅ°µ¼èÆÀ¤Ë¤è¤ë¥µ¥¤¥É¥Á¥ã¥Í¥ëϳ±Ì¾ðÊó¤Î°ì¹Í»¡," 2014 ǯ°Å¹æ¤È¾ðÊ󥻥¥å¥ê¥Æ¥£¥·¥ó¥Ý¥¸¥¦¥à, Vol. 2A3-3, pp.1--6, January 22, 2014.
-
²¬ËܹÂÀϺ, ËÜ´Ö¾°Ê¸, ÀÄÌÚ¹§Ê¸, "¿Íͤʥ¬¥í¥¢Âξå¤Î»»½Ñ±é»»¤Ë´ð¤Å¤¯°Å¹æ¥×¥í¥»¥Ã¥µ¤Î·Á¼°ÅªÀß·×¼êË¡," 2014 ǯ°Å¹æ¤È¾ðÊ󥻥¥å¥ê¥Æ¥£¥·¥ó¥Ý¥¸¥¦¥à, Vol. 1A3-4, pp.1--8, January 21, 2014.
-
ÎÓÍ¥°ì, ËÜ´Ö¾°Ê¸, ÊÒ²¼ÉÒ¹¨, Á¾º¬ ½¨¾¼, "¼ÂÁ©Åª¾ðÊ󶵰é¤òÄ̤¸¤¿¥Ï¡¼¥É¥¦¥§¥¢¥»¥¥å¥ê¥Æ¥£¿Íºà¤Î°éÀ®," ÅŻҾðÊóÄÌ¿®³Ø²ñµ»½Ñ¸¦µæÊó¹ð, vol. 113, no. 342, ISEC2013-78, pp. 33-37, 2013.
-
¾®ÎÓ¿ð¼ù¡¤ÎÓÍ¥°ì¡¤ËÜ´Ö¾°Ê¸¡¤¿åÌÚ·ÉÌÀ¡¤ÀÄÌÚ¹§Ê¸¡¤Á¾º¬½¨¾¼¡¤"ϳ¤¨¤¤Åż§¾ðÊó¤òÍѤ¤¤¿Ç¤°Õ¤Î½èÍý¤Ø¤ÎÈ󿯽±¤Ê¸Î¾ãÃíÆþ¼êË¡,"2013 ǯÅŻҾðÊóÄÌ¿®³Ø²ñ´ðÁᦶ³¦¥½¥µ¥¤¥¨¥Æ¥£Âç²ñ¡¤A-7-5, p. 101, September 18, 2013.
-
¾åÌîÎ桤²¬ËܹÂÀϺ, ËÜ´Ö¾°Ê¸, ÀÄÌÚ¹§Ê¸, "¥¬¥í¥¢Âλ»½Ñ²óÏ©¥°¥é¥Õ¤Ë´ð¤Å¤¯¸í¤êÄûÀµ²óÏ©¤Î·Á¼°Åª¸¡¾Ú¤Ë´Ø¤¹¤ë¸¡Æ¤," Âè36²ó¿ÃÍÏÀÍý¥Õ¥©¡¼¥é¥à, No. 10, pp. 10-1--10-7, September 14, 2013.
-
¾åÌîÎ桤²¬ËܹÂÀϺ, ËÜ´Ö¾°Ê¸, ÀÄÌÚ¹§Ê¸¡¤"¸í¤êÄûÀµÉä¹æ²½²óÏ©¤Î·Á¼°ÅªÀ߷פȤ½¤Îɾ²Á¡¤"Ê¿À®25ǯÅÙ Åŵ¤´Ø·¸³Ø²ñÅìËÌ»ÙÉôÏ¢¹çÂç²ñ¡¤No. 2F24, p. 211, August 23, 2013.
-
±§ÌîÊ㡤±óÆ£æÆ¡¤ËÜ´Ö¾°Ê¸, ÀÄÌÚ¹§Ê¸¡¤"AndroidOS ¾å¤Ë¼ÂÁõ¤µ¤ì¤¿RSA ¥½¥Õ¥È¥¦¥§¥¢¤ËÂФ¹¤ëÅż§¥»¥¥å¥ê¥Æ¥£²òÀÏ¡¤"Ê¿À®25ǯÅÙ Åŵ¤´Ø·¸³Ø²ñÅìËÌ»ÙÉôÏ¢¹çÂç²ñ¡¤No. 2F20, p. 207, August 23, 2013.
-
ÅèÅÄÀ²µ®¡¤ÎÓÍ¥°ì, ËÜ´Ö¾°Ê¸, ¿åÌÚ·ÉÌÀ¡¤ÀÄÌÚ¹§Ê¸, Á¾º¬½¨¾¼, "°Å¹æ¥â¥¸¥å¡¼¥ë¤Ø¤Î˸³²ÇÈÃíÆþ»þ¤Î¼§³¦Ê¬É۲Ļ벽¤Ë´Ø¤¹¤ë¸¡Æ¤,"ÅŻҾðÊóÄÌ¿®³Ø²ñÁí¹çÂç²ñ, B-4-59, p.404, 2013.
-
»°±º¡¡±Ò¡¤ËÜ´Ö¾°Ê¸¡¤Èª¡¡²íÇ·¡¤ÊҶ͡¡´²¡¤ÀÄÌÚ¹§Ê¸, "ºÒ³²»þ¤Î¾ðÊó¼ý½¸¤Î¤¿¤á¤Îñ´ã¥«¥á¥é¤òÍѤ¤¤¿ÆþÎÏ¥·¥¹¥Æ¥à¤Î¸¡Æ¤," Âè75²ó¾ðÊó½èÍý³Ø²ñÁ´¹ñÂç²ñ, 5J-1, 4-531-4-532, March 8, 2013
-
²¬ËܹÂÀϺ¡¤ËÜ´Ö¾°Ê¸¡¤ÀÄÌÚ¹§Ê¸¡¤"¥¬¥í¥¢Âξå¤Î¾è»»´ï¥â¥¸¥å¡¼¥ë¥¸¥§¥Í¥ì¡¼¥¿¤Î¹½ÃÛ¡¤" Âè75²ó¾ðÊó½èÍý³Ø²ñÁ´¹ñÂç²ñ, 3K-8¡¤1-135-1-136¡¤March 7, 2013.
-
¥ô¥£¥Ã¥ì ¥¦¥ê¥Þ¥¦¥ë¡¤±óÆ£¡¡æÆ¡¤ËÜ´Ö¾°Ê¸¡¤ÀÄÌÚ¹§Ê¸¡¤"LED°Å¹æ¥Ï¡¼¥É¥¦¥§¥¢¤ËÂФ¹¤ëÁê´ØÅÅÎϲòÀϤȤ½¤ÎÂкö¡¤" Âè75²ó¾ðÊó½èÍý³Ø²ñÁ´¹ñÂç²ñ, 2Z-9¡¤3-533-3-534¡¤March 6, 2013.
-
ÎÓÍ¥°ì, ËÜ´Ö¾°Ê¸, ¿åÌÚ·ÉÌÀ, ÀÄÌÚ¹§Ê¸, Á¾º¬½¨¾¼,"ϳ¤¨¤¤¾ðÊó¤òÍѤ¤¤ÆÃíÆþ¥¿¥¤¥ß¥ó¥°¤òÀ©¸æ²Äǽ¤Ê±óÊý¤«¤é¤Î¸Î¾ãÃíÆþ¼êË¡," 2013 ǯ°Å¹æ¤È¾ðÊ󥻥¥å¥ê¥Æ¥£¥·¥ó¥Ý¥¸¥¦¥à, Vol. 3E4-3, pp.1--6, January 24, 2012.
-
±óÆ£æÆ, ÍûÍÛ, ËÜ´Ö¾°Ê¸, ºê»³°ìÃË, Æ£ËÜÂç²ð, ±ÊÅÄ¿¿, ÂÀÅÄÏÂÉ×, ÀÄÌÚ¹§Ê¸,"¸Î¾ã´¶ÅÙ±£ÊäΤ¿¤á¤Î¸úΨŪ¤ÊÂкö¤È¤½¤Îɾ²Á," 2013 ǯ°Å¹æ¤È¾ðÊ󥻥¥å¥ê¥Æ¥£¥·¥ó¥Ý¥¸¥¦¥à, Vol. 1E1-5, pp.1--8, January 22, 2012.
-
¶Á¿ò»Ë, ËÜ´Ö¾°Ê¸, ÀÄÌÚ¹§Ê¸, ÃçÌîÍÅÐ, Ê¡ÅçϱÑ, À¶ËÜ¿¸ºî, »°ÂðÍ¥, "KCipher-2¤Ø¤ÎÅÅÎϲòÀϹ¶·âÂкö¤È¤½¤Îɾ²Á," ¥³¥ó¥Ô¥å¡¼¥¿¥»¥¥å¥ê¥Æ¥£¥·¥ó¥Ý¥¸¥¦¥à 2012, pp. 749--756, November 1, 2012.
-
¿ÅÄÀ®¹¨, ÎÓÍ¥°ì, ËÜ´Ö¾°Ê¸¡¤¿åÌÚ·ÉÌÀ¡¤ÀÄÌÚ¹§Ê¸¡¤Á¾º¬½¨¾¼, "°Õ¿ÞŪ¤ÊÅż§Ë¸³²¤Ë¤è¤ë¥Õ¥©¡¼¥ë¥ÈȯÀ¸¥á¥«¥Ë¥º¥à¤Ë´Ø¤¹¤ë´ðÁÃŪ¸¡Æ¤," Åŵ¤³Ø²ñ¸¦µæ²ñ»ñÎÁ, EMC-12-33, pp. 83-86, October 26, 2012.
-
²¬ËܹÂÀϺ, ËÜ´Ö¾°Ê¸, ÀÄÌÚ¹§Ê¸, "Àµµ¬´ðÄìɽ¸½¤µ¤ì¤¿¥¬¥í¥¢Âξå¤Î»»½Ñ±é»»²óÏ©¤Î·Á¼°ÅªÀ߷פ˴ؤ¹¤ë¸¡Æ¤," Âè35²ó¿ÃÍÏÀÍý¥Õ¥©¡¼¥é¥à, No. 7, pp. 7-1--7-6, September 15, 2012.
-
²¬ËܹÂÀϺ, ËÜ´Ö¾°Ê¸, ÀÄÌÚ¹§Ê¸, "¥¬¥í¥¢Âξå¤Î»»½Ñ±é»»²óÏ©¤Î¼«Æ°À¸À®¥·¥¹¥Æ¥à¤Î¹½ÃÛ," Ê¿À®24ǯÅÙ Åŵ¤´Ø·¸³Ø²ñÅìËÌ»ÙÉôÏ¢¹çÂç²ñ¡¤No. 1I03, pp. 115, August 30, 2012.
-
ÎÓÍ¥°ì, ËÜ´Ö¾°Ê¸¡¤¿åÌÚ·ÉÌÀ¡¤ÀÄÌÚ¹§Ê¸¡¤Á¾º¬½¨¾¼, "°Õ¿ÞŪ¤ÊÅż§Ë¸³²¤Ë¤è¤ë°Å¹æ¥â¥¸¥å¡¼¥ë¤Ø¤Î¸Î¾ãÃíÆþ¥á¥«¥Ë¥º¥à¤Ë´Ø¤¹¤ë¸¡Æ¤," Åŵ¤³Ø²ñ¸¦µæ²ñ»ñÎÁ, EMC-12-10, pp. 23-27, June 22, 2012.
-
ÎÓÍ¥°ì, ¿åÌÚ·ÉÌÀ¡¤ËÜ´Ö¾°Ê¸¡¤Á¾º¬½¨¾¼, ÀÄÌÚ¹§Ê¸¡¤"¼þÇÈ¿ôÎΰè¤Ë¤ª¤±¤ëÅż§ÇȲòÀϤθúΨ²½¤Ë´Ø¤¹¤ë¸¡Æ¤,"Åż§´Ä¶¸¦µæ²ñ, EMC-12-003, pp. 13-18, March 21, 2012.
-
ã·Æ£ÏÂÌé, ËÜ´Ö¾°Ê¸, ÀÄÌÚ¹§Ê¸, "¥¬¥í¥¢Âξå¤Î»»½Ñ±é»»²óÏ©¤Î·Á¼°ÅªÀ߷פȤ½¤ÎAES°Å¹æ¥×¥í¥»¥Ã¥µ¤Ø¤Î±þÍÑ," 2012ǯ°Å¹æ¤È¾ðÊ󥻥¥å¥ê¥Æ¥£¥·¥ó¥Ý¥¸¥¦¥à, Vol. 4C1-4, pp.1--8, February 2, 2012.
-
ÎÓÍ¥°ì, ¿åÌÚ·ÉÌÀ, ËÜ´Ö¾°Ê¸, Á¾º¬½¨¾¼, ÀÄÌÚ¹§Ê¸, "°Å¹æµ¡´ï¾å¤Î¥µ¥¤¥É¥Á¥ã¥Í¥ë¾ðÊó¼èÆÀÀʬÉÛ¿ÞºîÀ®¤Î¸úΨ²½¤Î¸¡Æ¤," 2012ǯ°Å¹æ¤È¾ðÊ󥻥¥å¥ê¥Æ¥£¥·¥ó¥Ý¥¸¥¦¥à, Vol. 3C2-1, pp.1--7, February 1, 2012.
-
¶Á¿ò»Ë, ã·Æ£ÏÂÌé, ËÜ´Ö¾°Ê¸, ÀÄÌÚ¹§Ê¸, ÃçÌîÍÅÐ, Ê¡ÅçϱÑ, À¶ËÜ¿¸ºî, »°ÂðÍ¥, "KCipher-2 ¤ËÂФ¹¤ëÁê´ØÅÅÎϲòÀϤȤ½¤ÎÂкö," 2012ǯ°Å¹æ¤È¾ðÊ󥻥¥å¥ê¥Æ¥£¥·¥ó¥Ý¥¸¥¦¥à, Vol. 3C1-2, pp.1--8, February 1, 2012
-
ã·Æ£ÏÂÌé, ËÜ´Ö¾°Ê¸, ÀÄÌÚ¹§Ê¸, "¥¬¥í¥¢Âξå¤Î»»½Ñ±é»»²óÏ©¤Î·Á¼°ÅªÉ½¸½¤Ë´Ø¤¹¤ë¸¡Æ¤," Âè25²ó¿ÃÍÏÀÍý¤È¤½¤Î±þÍѸ¦µæ²ñ, No. 8, pp. 38--44, January 7 2012.
-
ÃÓ¾¾Âç»Ö¡¢ÎÓÍ¥°ì¡¢¿åÌÚ·ÉÌÀ¡¢ËÜ´Ö¾°Ê¸¡¢Á¾º¬½¨¾¼¡¢ÀÄÌÚ¹§Ê¸, "¾ðÊ󵡴狼¤é¤ÎÅż§Åª¾ðÊóϳ±Ì¤Ë¤ª¤±¤ë¼èÆÀÀͽ¬¤Ë´Ø¤¹¤ë¸¡Æ¤," ´Ä¶Åż§¸¦µæ²ñ, EMC-11-32, pp. 23--28, December 9, 2011.
-
ÅèÅÄÀ²µ®, ÎÓÍ¥°ì, ¿åÌÚ·ÉÌÀ, ËÜ´Ö¾°Ê¸, Á¾º¬½¨¾¼, ÀÄÌÚ¹§Ê¸, "¾ðÊ󵡴ï¤Ë¤ª¤±¤ëÊü¼ÍÅż§³¦Ê¬ÉÛ¤ÈÅż§Åª¾ðÊóϳ±Ì¤Ë´Ø¤¹¤ë´ðÁÃŪ¸¡Æ¤," ´Ä¶Åż§¸¦µæ²ñ, EMC-11-23, pp. 23-27, 2011.
-
ÎÓÍ¥°ì, ËÜ´Ö¾°Ê¸, ¿åÌÚ·ÉÌÀ, ÀÄÌÚ¹§Ê¸, Á¾º¬½¨¾¼, "°Å¹æ¥â¥¸¥å¡¼¥ë¤ËÂФ¹¤ë°Õ¿ÞŪ¤ÊÅż§Ë¸³²¤Ë´Ø¤¹¤ë¸¡Æ¤," 2011ǯÅŻҾðÊóÄÌ¿®³Ø²ñ¥½¥µ¥¤¥¨¥Æ¥£Âç²ñ¡¤B-4-58, September 13, 2011.
-
ã·Æ£ ÏÂÌ顤ËÜ´Ö ¾°Ê¸¡¤ÀÄÌÚ ¹§Ê¸, "»»½Ñ²óÏ©¥°¥é¥Õ¤Î°Å¹æ¥×¥í¥»¥Ã¥µÀ߷פؤαþÍÑ," Âè34²ó¿ÃÍÏÀÍý¥Õ¥©¡¼¥é¥à, No. 11, pp. 11-1--11-6, September 18, 2011.
-
¶Á¿ò»Ë, ã·Æ£ÏÂÌé, ËÜ´Ö¾°Ê¸, ÀÄÌÚ¹§Ê¸, "¥¹¥È¥ê¡¼¥à°Å¹æKCipher-2¤Î¥Ï¡¼¥É¥¦¥§¥¢¼ÂÁõɾ²Á," Ê¿À®23ǯÅÙ Åŵ¤´Ø·¸³Ø²ñÅìËÌ»ÙÉôÏ¢¹çÂç²ñ¡¤No. 2C25, pp. 115, August 26, 2011.
-
Sho Endo, Naofumi Homma and Takahumi Aoki, "Efficient countermeasure against fault injection attacks on modular," Ê¿À®23ǯÅÙ Åŵ¤´Ø·¸³Ø²ñÅìËÌ»ÙÉôÏ¢¹çÂç²ñ¡¤No. 1A03, pp. 3, August 25, 2011.
-
ÎÓÍ¥°ì, ¿û¸¶·ò, ËÜ´Ö¾°Ê¸¡¤¿åÌÚ·ÉÌÀ¡¤ÀÄÌÚ¹§Ê¸¡¤Á¾º¬½¨¾¼, "°Õ¿ÞŪ¤ÊÅż§Ë¸³²¤Ë¤è¤ë°Å¹æ¥â¥¸¥å¡¼¥ë¤Ø¤Î¸Î¾ãÃíÆþ¤Ë´Ø¤¹¤ë¸¡Æ¤,"Åż§´Ä¶¸¦µæ²ñ, EMC-11-17, pp. 53-57, June 24, 2011.
-
ÎÓÍ¥°ì, ÃÓ¾¾Âç»Ö¡¤¿åÌÚ·ÉÌÀ, ËÜ´Ö¾°Ê¸¡¤ÀÄÌÚ¹§Ê¸, Á¾º¬½¨¾¼, "SNR¤Ë´ð¤Å¤¤¤¿ÅŻҵ¡´ï¤«¤é¤Î¾ðÊó¼èÆÀÀ¤Ë´Ø¤¹¤ë´ðÁÃŪ¸¡Æ¤," Åż§´Ä¶¸¦µæ²ñ, EMC-11-002, pp.5-10, March 24, 2011
-
ÎÓÍ¥°ì, ¿û¸¶·ò, ËÜ´Ö¾°Ê¸, ¿åÌÚ·ÉÌÀ, ÀÄÌÚ¹§Ê¸, Á¾º¬½¨¾¼, "Åż§ÇȤòÍѤ¤¤¿ÅŸ»Àþ¤«¤é¤Î¥Õ¥©¡¼¥ë¥È¹¶·â," 2011ǯ°Å¹æ¤È¾ðÊ󥻥¥å¥ê¥Æ¥£¥·¥ó¥Ý¥¸¥¦¥à, Vol. 3D3-4, pp.1--6, January 27, 2011.
-
±óÆ£æÆ, ËÜ´Ö¾°Ê¸, ¿û¸¶·ò, ÀÄÌÚ¹§Ê¸, º´Æ£¾Ú, "¤Ù¤¾è¾ê;±é»»¤ËÂФ¹¤ë¸Î¾ãÃíÆþ¤òÍѤ¤¤¿ÅÅÎϲòÀϹ¶·â," 2011ǯ°Å¹æ¤È¾ðÊ󥻥¥å¥ê¥Æ¥£¥·¥ó¥Ý¥¸¥¦¥à, Vol. 1D2-5, pp.1--6, January 25, 2011.
-
±óÆ£æÆ, ËÜ´Ö¾°Ê¸, ¿û¸¶·ò, ÀÄÌÚ¹§Ê¸, "°Å¹æ¥×¥í¥»¥Ã¥µ¤Î¸Î¾ã²òÀÏ¥·¥¹¥Æ¥à¤Ë´Ø¤¹¤ë¸¡Æ¤," Âè24²ó¿ÃÍÏÀÍý¤È¤½¤Î±þÍѸ¦µæ²ñ, No. 11, pp. 11-1-11-4, January 9 2011.
-
ã·Æ£ÏÂÌé, ËÜ´Ö¾°Ê¸, ÀÄÌÚ¹§Ê¸, "»»½Ñ²óÏ©¥°¥é¥Õ¤Ë´ð¤Å¤¯»»½Ñ±é»»²óÏ©¤Î·Á¼°ÅªÀ߷פ˴ؤ¹¤ë¸¡Æ¤," Âè24²ó¿ÃÍÏÀÍý¤È¤½¤Î±þÍѸ¦µæ²ñ, No. 8, pp. 8-1-8-6, January 8 2011.
-
ã·Æ£ÏÂÌé, ËÜ´Ö¾°Ê¸, ÀÄÌÚ¹§Ê¸ "¿ÃÍ»»½Ñ±é»»²óÏ©¸þ¤±»»
½Ñ¥¢¥ë¥´¥ê¥º¥à¤Î·Á¼°ÅªÉ½¸½¤È¸¡¾Ú¤Ë´Ø¤¹¤ë¸¡Æ¤," Âè33²ó
¿ÃÍÏÀÍý¥Õ¥©¡¼¥é¥à, No. 8, pp. 8-1--8-6, September
2010.
-
¥Õ¥¡¥¸¥ã¥ë ¥á¥¬ ¥×¥é¥¿¥Þ, ËÜ´Ö¾°Ê¸, ÀÄÌÚ¹§Ê¸, »³¸ýδ
¹°, ½ÐÀɧ, ½©ÅÄδǷ, "½ÅÊ£ÂÓ°è¤Î°ÌÁê¾ðÊó¤òÍøÍѤ·¤¿
¹ÂÓ°è¿®¹æ·×¬ˡ¤Îɾ²Á," Ê¿À®22ǯÅÙ Åŵ¤´Ø·¸³Ø²ñÅìËÌ
»ÙÉôÏ¢¹çÂç²ñ, No. 1H14, p. 262, August 2010
-
ã·Æ£ÏÂÌé, ¿û¸¶ ·ò, ËÜ´Ö¾°Ê¸, ÀÄÌÚ¹§Ê¸, º´Æ£¾Ú, " Âʱß
¶ÊÀþ°Å¹æ¥Ï¡¼¥É¥¦¥§¥¢¤ÎÅÅÎϲòÀϤˤè¤ë°ÂÁ´Àɾ²Á," Ê¿À®
22ǯÅÙ Åŵ¤´Ø·¸³Ø²ñÅìËÌ»ÙÉôÏ¢¹çÂç²ñ, No. 1E08,
p. 143, August 2010
-
º´Æ£¾Ú, ÊÒ²¼ÉÒ¹¨, ¿û¸¶·ò, ËÜ´Ö¾°Ê¸, ÀÄÌÚ¹§Ê¸, "¥Ï¥Ã¥·¥å´Ø¿ôLuffa¤Î¥Ï¡¼¥É¥¦¥§¥¢¼ÂÁõ," ¥Þ¥ë¥Á¥á¥Ç¥£¥¢¡¤Ê¬»¶¡¤¶¨Ä´¤È¥â¥Ð¥¤¥ë (DICOMO2010) ¥·¥ó¥Ý¥¸¥¦¥à, No. 7F-1, pp. 1660--1665, July 2010.
-
ÎÓ Í¥°ì, ¿û¸¶ ·ò, ÃÓ¾¾ Âç»Ö, ËÜ´Ö ¾°Ê¸, ¿åÌÚ ·ÉÌÀ, ÀÄ
ÌÚ ¹§Ê¸, Á¾º¬ ½¨¾¼"°Å¹æµ¡´ï¤ÎʪÍý·Á¾õ¤ò¹Íθ¤·¤¿¥µ¥¤
¥É¥Á¥ã¥Í¥ë¾ðÊó¤Îɾ²Á," 2010ǯ°Å¹æ¤È¾ðÊ󥻥¥å¥ê¥Æ¥£
¥·¥ó¥Ý¥¸¥¦¥à, Vol. 3B1-4, pp.1--6, January 2010.
-
¶â ÍÑÂç, ¿û¸¶ ·ò, ËÜ´Ö ¾°Ê¸,ÀÄÌÚ ¹§Ê¸, º´Æ£ ¾Ú, "ÊФé
¤»¤¿ÇÈ·Á¥»¥Ã¥È¤òÍѤ¤¤¿ÅÅÎϲòÀϹ¶·â¤Î¹âÀºÅÙ²½," 2010ǯ
°Å¹æ¤È¾ðÊ󥻥¥å¥ê¥Æ¥£¥·¥ó¥Ý¥¸¥¦¥à, Vol. 3B1-5,
pp.1--6, January 2010.
-
¿û¸¶ ·ò, ËÜ´Ö ¾°Ê¸, ÎÓ Í¥°ì, ¿åÌÚ ·ÉÌÀ, ÀÄÌÚ ¹§Ê¸, Á¾
º¬ ½¨¾¼, º´Æ£ ¾Ú, "ÊÑÄ´¤µ¤ì¤¿¥µ¥¤¥É¥Á¥ã¥Í¥ë¿®¹æ¤Î¼þÇÈ
¿ôÎΰè¤Ç¤ÎÅÅÎϲòÀÏ," 2010ǯ°Å¹æ¤È¾ðÊ󥻥¥å¥ê¥Æ¥£¥·¥ó
¥Ý¥¸¥¦¥à, Vol. 3B1-4, pp.1--6, January 2010.
-
¶âÍÑÂç, ¿û¸¶·ò, ÎÓÍ¥°ì, ËÜ´Ö¾°Ê¸, ÀÄÌÚ¹§Ê¸, º´Æ£¾Ú,"
½Å²óµ¢Ê¬ÀϤòÍѤ¤¤¿¥µ¥¤¥É¥Á¥ã¥Í¥ë¹¶·â¤Î¹âÀºÅÙ²½¡¤"¥³¥ó
¥Ô¥å¡¼¥¿¥»¥¥å¥ê¥Æ¥£¥·¥ó¥Ý¥¸¥¦¥à 2009, pp. 649--654,
October 2009.
-
ÇϾìÍ´°ì¡¤µÜËÜÆƻ֡¤ËÜ´Ö¾°Ê¸¡¤ÀÄÌÚ¹§Ê¸¡¤""ÅÅή¥â¡¼¥É
¿ÃÍÏÀÍý¤òÍѤ¤¤¿°Å¹æ¥Ï¡¼¥É¥¦¥§¥¢¤Î°ÂÁ´À¤Ë´Ø¤¹¤ë¸¡Æ¤¡¤
"Âè32²ó¿ÃÍÏÀÍý¥Õ¥©¡¼¥é¥à, No. 3, pp. 3-1--3-6,
September 2009.
-
¿û¸¶·ò, ÎÓÍ¥°ì, ËÜ´Ö¾°Ê¸, ¿åÌÚ·ÉÌÀ¡¤ÀÄÌÚ¹§Ê¸¡¤Á¾º¬½¨
¾¼, º´Æ£¾Ú, "¼þÇÈ¿ôÎΰè¤Ç¤Î°Å¹æ¥â¥¸¥å¡¼¥ë¤ÎÅÅÎϲòÀÏ¡¤
"Âè8²ó¾ðÊó²Ê³Øµ»½Ñ¥Õ¥©¡¼¥é¥à (FIT2009), No. L-007,
pp. 142--145, September 2009.
-
¥Õ¥¡¥¸¥ã¥ë ¥á¥¬ ¥×¥é¥¿¥Þ¡¤µÜß·°ìÇ·¡¤ËÜ´Ö¾°Ê¸¡¤ÀÄÌÚ¹§
ʸ¡¤""ÂÓ°èʬ³äË¡¤Ë´ð¤Å¤¯¹ÂÓ°è¿®¹æ·×¬," Âè8²ó ¾ðÊó²Ê
³Øµ»½Ñ¥Õ¥©¡¼¥é¥à (FIT2009), No. C-039, pp. 527--534,
September 2009.
-
¶âÍÑÂ硤¿û¸¶·ò¡¤ËÜ´Ö¾°Ê¸¡¤ÀÄÌÚ¹§Ê¸¡¤º´Æ£¾Ú, "AES ¤Î¥Ï¡¼
¥É¥¦¥§¥¢¼ÂÁõ¤ËÂФ¹¤ë¥Æ¥ó¥×¥ì¡¼¥È¹¶·â," Âè8²ó ¾ðÊó²Ê³Ø
µ»½Ñ¥Õ¥©¡¼¥é¥à (FIT2009), No. L-008, pp. 139--146,
September 2009.
-
ÇϾìÍ´°ì¡¤µÜËÜÆƻ֡¤ËÜ´Ö¾°Ê¸¡¤ÀÄÌÚ¹§Ê¸¡¤º´Æ£¾Ú¡¤"RSA
°Å¹æ¥×¥í¥»¥Ã¥µ¥¸¥§¥Í¥ì¡¼¥¿¤ÎÀ߷פÈɾ²Á¡¤" Âè8²ó¾ðÊó²Ê
³Øµ»½Ñ¥Õ¥©¡¼¥é¥à(FIT2009), No. RC-003, pp. 129--136,
September 2009¡¥
-
Ä»ÄÍ ±Ñ¼ù¡¤»³¸ý ÀµÍΡ¤¿û¸¶ ·ò¡¤ËÜ´Ö ¾°Ê¸¡¤º´Æ£ ¾Ú¡¤ÀÄ
ÌÚ ¹§Ê¸¡¤"¥ª¥ó¥Á¥Ã¥×½¸ÀѲ½¥Þ¥¤¥¯¥í¼§³¦¥×¥í¡¼¥Ö¤òÍѤ¤
¤¿°Å¹æLSI ¤Î¶á˵¼§³¦·×¬¡¤"¡¡ÅÅ»ÒÄÌ¿®³Ø²ñ´Ä¶Åż§¹©³Ø
¸¦µæ²ñ¡¤Vol. 108, No. 482, pp. 37-42, March, 2009.
-
ÊÒ²¼ ÉÒ¹¨¡¤º´Æ£¡¡¾Ú¡¤¿û¸¶ ·ò¡¤ËÜ´Ö¾°Ê¸¡¤ÀÄÌÚ¹§Ê¸¡¤
"CPA¤ËÂФ¹¤ë¥Ç¥«¥Ã¥×¥ê¥ó¥°¥¥ã¥Ñ¥·¥¿¤Î±Æ¶Á¤ÎͽÈ÷¸¡¾Ú¡¤
" 2009ǯ°Å¹æ¤È¾ðÊ󥻥¥å¥ê¥Æ¥£¥·¥ó¥Ý¥¸¥¦¥à,
Vol. 3A4-2, pp.1--6, January 2009.
-
¿û¸¶ ·ò¡¤Ä»ÄÍ ±Ñ¼ù¡¤ËÜ´Ö¾°Ê¸¡¤º´Æ£¾Ú¡¤ÀÄÌÚ¹§Ê¸¡¤»³¸ý
ÀµÍÎ"ºÇ¶á˵¤«¤é·×¬¤·¤¿¼§³¦¤òÍѤ¤¤¿º¹Ê¬Åż§ÇȲòÀÏ¡¤"
2009ǯ°Å¹æ¤È¾ðÊ󥻥¥å¥ê¥Æ¥£¥·¥ó¥Ý¥¸¥¦¥à, Vol. 3A1-5,
pp.1--6, January 2009.
-
µÜËÜÆƻ֡¤ËÜ´Ö¾°Ê¸¡¤ÀÄÌÚ¹§Ê¸¡¤º´Æ£¾Ú¡¤"¤Ù¤¾è¾ê;±é»»
¤ËÂФ¹¤ëÈæ³ÓÅÅÎϲòÀϤαþÍÑ¡¤" 2009ǯ°Å¹æ¤È¾ðÊ󥻥¥å
¥ê¥Æ¥£¥·¥ó¥Ý¥¸¥¦¥à, Vol. 2A1-2, pp.1--6, January
2009.
-
ËÜ´Ö¾°Ê¸¡¤µÜËÜÆƻ֡¤¿û¸¶·ò¡¤ÀÄÌÚ¹§Ê¸¡¤º´Æ£¾Ú¡¤"¥µ¥¤¥É
¥Á¥ã¥Í¥ë¹¶·âɾ²ÁÍÑISO/IECɸ½à°Å¹æ¥×¥í¥»¥Ã¥µ¤Î³«È¯¡¤"
2009ǯ°Å¹æ¤È¾ðÊ󥻥¥å¥ê¥Æ¥£¥·¥ó¥Ý¥¸¥¦¥à, Vol. 2A1-1,
pp.1--6, January 2009.
-
¿û¸¶·ò¡¤ËÜ´Ö¾°Ê¸¡¤ÀÄÌÚ¹§Ê¸¡¤º´Æ£¾Ú¡¤"ɸ½àɾ²Á´ðÈľå¤Î
ASIC¤Ø¤Îº¹Ê¬ÅÅÎϲòÀϼ¸³¡¤"¥³¥ó¥Ô¥å¡¼¥¿¥»¥¥å¥ê¥Æ¥£¥·
¥ó¥Ý¥¸¥¦¥à 2008, D5-3, October 2008.
-
ÎÓÍ¥°ì¡¤¿û¸¶·ò¡¤ËÜ´Ö¾°Ê¸¡¤¿åÌÚ·ÉÌÀ¡¤ÀÄÌÚ¹§Ê¸¡¤Á¾º¬½¨
¾¼¡¤º´Æ£ ¾Ú¡¤"ÅŸ»¥é¥¤¥ó¾å¤Îϳ±Ì¾ðÊó¤òÍѤ¤¤¿¥µ¥¤¥É¥Á¥ã
¥Í¥ë¹¶·â¡¤"¥³¥ó¥Ô¥å¡¼¥¿¥»¥¥å¥ê¥Æ¥£¥·¥ó¥Ý¥¸¥¦¥à 2008,
D5-2, October 2008.
-
ÊÒ²¼ÉÒ¹¨¡¤º´Æ£¾Ú¡¤¿û¸¶·ò¡¤ËÜ´Ö¾°Ê¸¡¤ÀÄÌÚ¹§Ê¸¡¤"¸°¸õÊä
¤ÎäÁ¤¤Ê¬¤±¤Ë¤è¤ëCPA¤Î¹â®²½¤È¸°¿äÄêÀºÅ٤θþ¾å¡¤"¥³¥ó
¥Ô¥å¡¼¥¿¥»¥¥å¥ê¥Æ¥£¥·¥ó¥Ý¥¸¥¦¥à 2008, D5-1, October
2008.
-
ÇϾìÍ´°ì¡¤µÜËÜÆƻ֡¤ËÜ´Ö¾°Ê¸¡¤ÀÄÌÚ¹§Ê¸¡¤º´Æ£¾Ú¡¤"¹â´ð¿ô¥â¥ó¥´¥á¥ê¾è»»¤Ë´ð¤Å¤¯RSA°Å¹æ¤Î¹âÀǽ¥Ï¡¼¥É¥¦¥§¥¢¼ÂÁõ¡¤"Ê¿À®20ǯÅÙÅŵ¤´Ø·¸³Ø²ñÅìËÌ»ÙÉôÏ¢¹çÂç²ñ,No. 1F07, p. 198, August 2008.
-
º´Æ£¾Ú, ¿û¸¶·ò¡¤ËÜ´Ö¾°Ê¸¡¤ÀÄÌÚ¹§Ê¸¡¤"¥Ö¥í¥Ã¥¯°Å¹æAES¤Î¹âÀǽ¥¨¥é¡¼¸¡½Ð²óÏ©Êý¼°, "¥Þ¥ë¥Á¥á¥Ç¥£¥¢¡¤Ê¬»¶¡¤¶¨Ä´¤È¥â¥Ð¥¤¥ë (DICOMO2008) ¥·¥ó¥Ý¥¸¥¦¥à, No. 3A-3, pp. 498 - 505, July 2008.
-
¿û¸¶·ò, ËÜ´Ö¾°Ê¸, ÀÄÌÚ¹§Ê¸, º´Æ£¾Ú, "¥·¥Õ¥È¥ì¥¸¥¹¥¿¡¦¥¢¡¼¥¥Æ¥¯¥Á¥ã¤Ë¤è¤ë¥Ï¥Ã¥·¥å´Ø¿ôWhirlpool¤Î¹âÀǽ²óÏ©¼ÂÁõ, "¥Þ¥ë¥Á¥á¥Ç¥£¥¢¡¤Ê¬»¶¡¤¶¨Ä´¤È¥â¥Ð¥¤¥ë (DICOMO2008) ¥·¥ó¥Ý¥¸¥¦¥à, No. 3A-2, pp. 490 - 497, July 2008.
-
µÜËÜÆÆ»Ö, ËÜ´Ö¾°Ê¸, ÀÄÌÚ¹§Ê¸, º´Æ£¾Ú, "ÆÃÄêÆþÎÏ¥Ú¥¢¤òÍѤ¤¤¿RSA°Å¹æ¤ËÂФ¹¤ëÅÅÎϲòÀϹ¶·â¤Î¼Â¸³ÅªÉ¾²Á, "¥Þ¥ë¥Á¥á¥Ç¥£¥¢¡¤Ê¬»¶¡¤¶¨Ä´¤È¥â¥Ð¥¤¥ë (DICOMO2008) ¥·¥ó¥Ý¥¸¥¦¥à, No. 3A-1, pp. 482 - 489, July 2008.
-
ÅÏîµ Íµ¼ù¡¤ËÜ´Ö ¾°Ê¸¡¤½ÐÀî ¾¡É§¡¤ÀÄÌÚ ¹§Ê¸¡¤Èõ¸ý ζͺ, "»»½Ñ¥¢¥ë¥´¥ê¥º¥àµ½Ò¸À¸ì¤Ë´ð¤Å¤¯Â¿ÃÍÏÀÍý²óÏ©¤ÎÀß·×,"
Âè21²ó¡¡²óÏ©¤È¥·¥¹¥Æ¥à·Ú°æÂô¥ï¡¼¥¯¥·¥ç¥Ã¥×, pp. 237--242, April 2008.
-
µÜËÜÆƻ֡¤ËÜ´Ö¾°Ê¸¡¤ÀÄÌÚ¹§Ê¸¡¤º´Æ£¾Ú¡¤"¹â´ð¿ô¥â¥ó¥´¥á
¥ê¾è»»¤Ë´ð¤Å¤¯¥¹¥±¡¼¥é¥Ö¥ëRSA°Å¹æ¥×¥í¥»¥Ã¥µ¤ÎÀ߷ס¤"
2008ǯ°Å¹æ¤È¾ðÊ󥻥¥å¥ê¥Æ¥£¥·¥ó¥Ý¥¸¥¦¥à, Vol. 2C3-3,
pp.1-6, January 2008.
-
¿û¸¶·ò, ËÜ´Ö¾°Ê¸, ÀÄÌÚ¹§Ê¸, º´Æ£¾Ú,"¥Ï¥Ã¥·¥å´Ø¿ô
Whirlpool ¤Î¾®·¿¥Ï¡¼¥É¥¦¥§¥¢¡¦¥¢¡¼¥¥Æ¥¯¥Á¥ã¡¤" 2008
ǯ°Å¹æ¤È¾ðÊ󥻥¥å¥ê¥Æ¥£¥·¥ó¥Ý¥¸¥¦¥à, Vol. 2C3-1,
pp.1-6, January 2008.
-
ËÜ´Ö¾°Ê¸¡¤µÜËÜÆƻ֡¤ÀÄÌÚ¹§Ê¸¡¤º´Æ£¾Ú¡¤"RSA°Å¹æ¤ËÂФ¹
¤ëʿʸÁªÂò·¿ÅÅÎϲòÀϹ¶·â¤Î¸¡Æ¤¡¤" 2008ǯ°Å¹æ¤È¾ðÊó¥»
¥¥å¥ê¥Æ¥£¥·¥ó¥Ý¥¸¥¦¥à, Vol. 1A1-5, pp.1-6, January
2008.
-
µÜËÜ Æƻ֡¤ËÜ´Ö ¾°Ê¸¡¤ÀÄÌÚ ¹§Ê¸¡¤º´Æ£ ¾Ú¡¤"RSA°Å¹æ¤Ë
ÂФ¹¤ëʿʸÁªÂò·¿SPA¤Î¼Â¸³ÅªÉ¾²Á," ¥³¥ó¥Ô¥å¡¼¥¿¥»¥¥å
¥ê¥Æ¥£¥·¥ó¥Ý¥¸¥¦¥à 2007, pp. 649--654, November 2007.
-
¿û¸¶·ò¡¤ËÜ´Ö¾°Ê¸¡¤ÀÄÌÚ¹§Ê¸¡¤º´Æ£¾Ú¡¤"128¥Ó¥Ã¥È¥Ö¥í¥Ã
¥¯°Å¹æCLEFIA¤ÎASIC¼ÂÁõ," ¥³¥ó¥Ô¥å¡¼¥¿¥»¥¥å¥ê¥Æ¥£¥·¥ó
¥Ý¥¸¥¦¥à 2007, pp. 175--180, October 2007.
-
ÅÏîµÍµ¼ù¡¤ËÜ´Ö¾°Ê¸¡¤ÀÄÌÚ¹§Ê¸¡¤Èõ¸ýζͺ, "·×»»µ¡Âå¿ô¤Ë
´ð¤Å¤¯»»½Ñ±é»»²óÏ©¤Îɽ¸½¤È¸¡¾Ú," DA¥·¥ó¥Ý¥¸¥¦¥à2007
ÏÀʸ½¸, pp. 61--66, August 2007.
-
A. Tumewu, A. Miyamoto, N. Homma, T. Aoki and A. Satoh, "Power analysis against RSA software implementation on a 32-bit microprocessor," Ê¿À®19ǯÅÙ Åŵ¤´Ø·¸³Ø²ñÅìËÌ»ÙÉôÏ¢¹çÂç²ñ, No. 1A17, p. 17, August 2007.
-
¿û¸¶·ò¡¤ËÜ´Ö¾°Ê¸¡¤ÀÄÌÚ¹§Ê¸¡¤º´Æ£¾Ú, "¥µ¥¤¥É¥Á¥ã¥Í¥ë¹¶·âɸ½àɾ²ÁFPGA¥Ü¡¼¥É¤òÍѤ¤¤¿°Å¹æ¥Ï¡¼¥É¥¦¥§¥¢¤ËÂФ¹¤ëÅÅÎϲòÀϼ¸³," ¥Þ¥ë¥Á¥á¥Ç¥£¥¢¡¤Ê¬»¶¡¤¶¯Ä´¤È¥â¥Ð¥¤¥ë (DICOMO2007) ¥·¥ó¥Ý¥¸¥¦¥à, pp. 1415--1420, July 2007.
-
µÜËÜÆƻ֡¤ËÜ´Ö¾°Ê¸¡¤ÀÄÌÚ¹§Ê¸¡¤º´Æ£¾Ú, "ÆÃÄêÆþÎϥѥ¿¡¼¥ó¤òÍѤ¤¤¿RSA°Å¹æ¥Ï¡¼¥É¥¦¥§¥¢¤Îñ½ãÅÅÎϲòÀÏ," ¥Þ¥ë¥Á¥á¥Ç¥£¥¢¡¢Ê¬»¶¡¢¶¨Ä´¤È¥â¥Ð¥¤¥ë (DICOMO2007) ¥·¥ó¥Ý¥¸¥¦¥à, pp. 1409--1414, July 2007.
-
ĹÅèÀ»¡¤ËÜ´Ö¾°Ê¸¡¤¿û¸¶·ò¡¤ÀÄÌÚ¹§Ê¸¡¤º´Æ£¾Ú, "ÇÈ·Á¥Õ¥£¥ë¥¿¥ê¥ó¥°¤Ë¤è¤ë°Å¹æ¥â¥¸¥å¡¼¥ë¤Ø¤Î¹âÀºÅÙÅÅÎϲòÀÏ," ¥Þ¥ë¥Á¥á¥Ç¥£¥¢¡¤Ê¬»¶¡¤¶¯Ä´¤È¥â¥Ð¥¤¥ë (DICOMO2007) ¥·¥ó¥Ý¥¸¥¦¥à, pp. 1403--1408, July 2007.
-
ÅÏîµÍµ¼ù¡¤ËÜ´Ö¾°Ê¸¡¤ÀÄÌÚ¹§Ê¸¡¤Èõ¸ýζͺ, "ÊÂÎó¥×¥ì¥Õ¥£¥Ã¥¯¥¹²Ã»»´ï¤òÍѤ¤¤¿»»½Ñ±é»»¥â¥¸¥å¡¼¥ë¤Î¼«Æ°À¸À®," ¿®³Øµ»Êó, Vol. 107, No. 101, pp. 49--54, June 2007.
-
½ÐÀɧ¡¤ËÜ´Ö¾°Ê¸¡¤ÀÄÌÚ ¹§Ê¸¡¤Èõ¸ýζͺ, "Counter Tree Diagram¤Ë¤è¤ë¿ÃÍ»»½Ñ±é»»²óÏ©¤ÎºÇŬÀß·×," Âè20²ó¡¡²óÏ©¤È¥·¥¹¥Æ¥à·Ú°æÂô¥ï¡¼¥¯¥·¥ç¥Ã¥×, pp. 361--366, April 2007.
-
¿û¸¶·ò, ËÜ´Ö¾°Ê¸, ÀÄÌÚ¹§Ê¸, º´Æ£¾Ú, "ISOɸ½à¥Ö¥í¥Ã¥¯°Å¹æ¤ÎASIC¥Ï¡¼¥É¥¦¥§¥¢Àǽɾ²Á," 2007ǯ¾ðÊóÄÌ¿®´ðÁÃ¥µ¥Ö¥½¥µ¥¤¥¨¥Æ¥£¹çƱ¸¦µæ²ñ, ¿®³Øµ»Êó, vol. 106, No. 597, ISEC2006-159, pp. 111-117, ·²ÇÏ, March 2007.
-
ËÜ´Ö¾°Ê¸¡¤µÜËÜÆƻ֡¤ÀÄÌÚ¹§Ê¸¡¤º´Æ£¾Ú¡¤"¸ÇÄêÃÍÆþÎϤòÍѤ¤¤¿RSA°Å¹æ¥Ï¡¼¥É¥¦¥§¥¢¤ËÂФ¹¤ëSPA¡¤" ¡¡2007ǯ°Å¹æ¤È¾ðÊ󥻥¥å¥ê¥Æ¥£¥·¥ó¥Ý¥¸¥¦¥à, Vol. 3E3-2, pp.1-6, January 2007.
-
ËÜ´Ö¾°Ê¸¡¤Ä¹ÅèÀ»¡¤º£°æ͵°ì¡¤ÀÄÌÚ¹§Ê¸¡¤º´Æ£¾Ú¡¤"°ÌÁê¸ÂÄêÁê´ØË¡¤òÍѤ¤¤¿¹âÀºÅÙº¹Ê¬ÅÅÎϲòÀϤȤ½¤Î¥Î¥¤¥ºÂÑÀɾ²Á¡¤"¡¡2007ǯ°Å¹æ¤È¾ðÊ󥻥¥å¥ê¥Æ¥£¥·¥ó¥Ý¥¸¥¦¥à, Vol. 2E4-5, pp.1-6, January 2007.
-
ÅÏîµÍµ¼ù¡¤ËÜ´Ö¾°Ê¸¡¤ÀÄÌÚ¹§Ê¸¡¤Èõ¸ýζͺ, "»»½Ñ±é»»²óÏ©¤Î·Á¼°Åª¸¡¾Ú¼êË¡¤È¤½¤Îɾ²Á," ¥Ç¥¶¥¤¥ó¥¬¥¤¥¢2006 ¡ÁVLSIÀ߷פο·¤·¤¤ÂçÃϤò¹Í¤¨¤ë¸¦µæ²ñ¡Á, Vol. 106, No. 387, pp. 17--22, November 2006.
-
ĹÅèÀ»¡¤ËÜ´Ö¾°Ê¸¡¤º£°æ͵°ì¡¤ÀÄÌÚ¹§Ê¸¡¤º´Æ£¾Ú¡¤" °ÌÁê¸ÂÄêÁê´ØË¡¤Ë´ð¤Å¤¯¹âÀºÅÙÇÈ·Á¥Þ¥Ã¥Á¥ó¥° -- °Å¹æ¥Ï¡¼¥É¥¦¥§¥¢¤ÎÆ°ºî²òÀϤؤαþÍÑ --," Âè21²ó¿®¹æ½èÍý¥·¥ó¥Ý¥¸¥¦¥à¡¤ pp. B5-4¡¤November 2006.
-
µÜËÜÆƻ֡¤ËÜ´Ö¾°Ê¸¡¤ÀÄÌÚ¹§Ê¸¡¤º´Æ£¾Ú¡¤" RSA°Å¹æ¤ÎFPGA¼ÂÁõ¤ËÂФ¹¤ëSPAÂÑÀɾ²Á," ¥³¥ó¥Ô¥å¡¼¥¿¥»¥¥å¥ê¥Æ¥£¥·¥ó¥Ý¥¸¥¦¥àCSS2006¡¤pp. 263--268¡¤October 2006.
-
¿û¸¶·ò¡¤ËÜ´Ö¾°Ê¸¡¤ÀÄÌÚ¹§Ê¸¡¤º´Æ£¾Ú¡¤"64¥Ó¥Ã¥È¥Ö¥í¥Ã¥¯°Å¹æCAST-128¤Î¾®·¿ASIC¼ÂÁõ," ¥³¥ó¥Ô¥å¡¼¥¿¥»¥¥å¥ê¥Æ¥£¥·¥ó¥Ý¥¸¥¦¥àCSS2006¡¤pp. 257--262¡¤October 2006.
-
º£°æ͵°ì¡¤ËÜ´Ö¾°Ê¸¡¤Ä¹ÅèÀ»¡¤ÀÄÌÚ¹§Ê¸¡¤º´Æ£¾Ú¡¤"°ÌÁê¸ÂÄêÁê´ØË¡¤Ë¤è¤ëÇÈ·Á¥Þ¥Ã¥Á¥ó¥°¤òÍѤ¤¤¿¹âÀºÅÙº¹Ê¬ÅÅÎϲòÀÏË¡," ¥³¥ó¥Ô¥å¡¼¥¿¥»¥¥å¥ê¥Æ¥£¥·¥ó¥Ý¥¸¥¦¥àCSS2006¡¤pp. 61--66¡¤October 2006.
-
¿û¸¶·ò¡¤ËÜ´Ö¾°Ê¸¡¤ÀÄÌÚ¹§Ê¸¡¤º´Æ£¾Ú,¡¡"ϳ±ÌÅż§ÇȤˤè¤ë¶¦Ä̸°°Å¹æ½èÍý¥Ï¡¼¥É¥¦¥§¥¢¤ÎÆ°ºî²òÀÏ," Ê¿À®18ǯÅÙÅŵ¤´Ø·¸³Ø²ñÅìËÌ»ÙÉôÏ¢¹çÂç²ñ, p. 210, August 2006.
-
ËÜ´Ö¾°Ê¸¡¤ÀÄÌÚ¹§Ê¸¡¤Èõ¸ýζͺ, "Counter Tree Diagram¤Ë´ð¤Å¤¯2ÃÍ¡¦Â¿Ã͹⮲û»´ï¤Î²òÀÏ," Âè29²ó ¿ÃÍÏÀÍý¥Õ¥©¡¼¥é¥à, Vol. 29, No. 12, pp. 1--6, August 2006.
-
ÅÏîµÍµ¼ù¡¤ËÜ´Ö¾°Ê¸¡¤ÀÄÌÚ¹§Ê¸¡¤Èõ¸ýζͺ, "»»½Ñ¥¢¥ë¥´¥ê¥º¥à¤Î·Á¼°Åª¸¡¾Ú¤Ë´Ø¤¹¤ë°ì¹Í»¡," Âè29²ó ¿ÃÍÏÀÍý¥Õ¥©¡¼¥é¥à, Vol. 29, No. 11, pp. 1--6, August 2006.
-
ËÜ´Ö¾°Ê¸¡¤ÀÄÌÚ¹§Ê¸¡¤º´Æ£¾Ú, "°Å¹æ½èÍýLSI¤ÎÀß·×µ»½Ñ," IEEE EMC-S ÀçÂæ¥Á¥ã¥×¥¿¡¦¥³¥í¥¥¦¥à¡¤July 7, 2006. ¡Ê¾·ÂÔ¹Ö±é¡Ë
-
º£°æ͵°ì¡¤ËÜ´Ö¾°Ê¸¡¤Ä¹ÅèÀ»¡¤ÀÄÌÚ¹§Ê¸¡¤º´Æ£¾Ú, ¡È°ÌÁê¸ÂÄêÁê´ØË¡¤Ë´ð¤Å¤¯¹âÀºÅÙÇÈ·Á²òÀϤȤ½¤Î¥µ¥¤¥É¥Á¥ã¥Í¥ë¹¶·â¤Ø¤Î±þÍÑ,¡É
¿®³Øµ»Êó, IT2005-81, pp. 97--104, March 2006.
-
µÜËÜÆƻ֡¤ËÜ´Ö¾°Ê¸¡¤ÀÄÌÚ¹§Ê¸¡¤º´Æ£¾Ú, ¡ÈÀÑϱ黻´ï¤Ë´ð¤Å¤¯¥¹¥±¡¼¥é¥Ö¥ë¹â´ð¿ô¥â¥ó¥´¥á¥ê¾è»»´ï¤ÎÀ߷פÈɾ²Á,¡É 2006ǯ°Å¹æ¤È¾ðÊ󥻥¥å¥ê¥Æ¥£¥·¥ó¥Ý¥¸¥¦¥à, Vol. 2C4, No.1, pp.139--144, January 2006.
-
µÜËÜÆÆ»Ö, ÅÏîµÍµ¼ù, ËÜ´Ö¾°Ê¸, ÀÄÌÚ¹§Ê¸, Èõ¸ýζͺ, ¡È»»½Ñ¥¢¥ë¥´¥ê¥º¥àµ½Ò¸À¸ìARITH¤Ë´ð¤Å¤¯¾éĹ2¿Ê¾è»»´ï¤Î·Á¼°ÅªÀß·×,¡É Ê¿À®17ǯÅÙÅŵ¤´Ø·¸³Ø²ñÅìËÌ»ÙÉôÏ¢¹çÂç²ñ, p. 326, August 2005.
-
ÅÏîµÍµ¼ù, ËÜ´Ö¾°Ê¸, ÀÄÌÚ¹§Ê¸, Èõ¸ýζͺ, ¡È»»½Ñ¥¢¥ë¥´¥ê¥º¥àµ½Ò¸À¸ìARITH¤Ë´ð¤Å¤¯»»½Ñ±é»»²óÏ©¤Î·Á¼°ÅªÀß·×,¡É ¿®³Øµ»Êó, CAS2005-21, pp. 37--42, June 2005.
-
ËÜ´Ö¾°Ê¸, ÀÄÌÚ¹§Ê¸, Èõ¸ýζͺ, ¡È¾éĹ¿ô·Ï¤Ë´ð¤Å¤¯¹â®²Ã»»´ï¤ÎºÇŬÀß·×,¡É ¿®³Øµ»Êó, CAS2005-20, pp. 31--36, June 2005.
-
ÀÐÅÄ °ìºÈ, ËÜ´Ö ¾°Ê¸, ÀÄÌÚ ¹§Ê¸, Èõ¸ý ζͺ, ¡È»»½Ñ¥¢¥ë¥´¥ê¥º¥àµ½Ò¸À¸ì¤òÍѤ¤¤¿¾è»»´ï¥â¥¸¥å¡¼¥ë¥¸¥§¥Í¥ì¡¼¥¿¤Î¹½ÃÛ,¡É ¥Ç¥¶¥¤¥ó¥¬¥¤¥¢2004 ¡ÁVLSIÀ߷פο·¤·¤¤ÂçÃϤò¹Í¤¨¤ë¸¦µæ²ñ¡Á, pp. 169--174, December 2004.
-
¼ã¾¾ÂÙÊ¿, ËÜ´Ö¾°Ê¸, ºê»³½ß, ÀÄÌÚ¹§Ê¸, Èõ¸ýζͺ, ¡È¾éĹ²Ã»»´ï¤ÎºÇŬÀ߷פ˴ؤ¹¤ë¼Â¸³Åª¸¡Æ¤,¡É ¿ÃÍÏÀÍý¸¦µæ¥Î¡¼¥È/Âè27²ó¿ÃÍÏÀÍý¥Õ¥©¡¼¥é¥à, pp. 14-1--14-8, September 2004.
-
ÅÏîµÍµ¼ù, ÀÐÅÄ°ìºÈ, ËÜ´Ö¾°Ê¸, ÀÄÌÚ¹§Ê¸, Èõ¸ýζͺ, ¡È»»½Ñ¥¢¥ë¥´¥ê¥º¥àµ½Ò¸À¸ìARITH¤Ë´ð¤Å¤¯ÊÂÎó¾è»»´ï¤ÎÀ߷פÈɾ²Á,¡É Ê¿À®16ǯÅÙÅŵ¤´Ø·¸³Ø²ñÅìËÌ»ÙÉôÏ¢¹çÂç²ñ, p. 261, August 2004.
-
²Æ°æ²íŵ, ËÜ´Ö¾°Ê¸, ÀÄÌÚ¹§Ê¸, Èõ¸ýζͺ, ¡È¿Ê²½Åª¥°¥é¥ÕÀ¸À®¼êË¡¤Ë´ð¤Å¤¯¥«¥ì¥ó¥È¥ß¥é¡¼²óÏ©¤Î¹çÀ®,¡É Âè17²ó ²óÏ©¤È¥·¥¹¥Æ¥à·Ú°æÂô¥ï¡¼¥¯¥·¥ç¥Ã¥×¹Ö±éÏÀʸ½¸, pp. 415--420, April 2004.
-
¼ã¾¾ÂÙÊ¿, ËÜ´Ö¾°Ê¸, ºê»³½ß, ÀÄÌÚ¹§Ê¸, Èõ¸ýζͺ¡¤¡ÈCounter Tree Diagram ¤Ë´ð¤Å¤¯¾éĹ2¿Ê²Ã»»´ï¤ÎÀß·×,¡É 2004ǯÅŻҾðÊóÄÌ¿®³Ø²ñÁí¹çÂç²ñ, A-3-10, p. 77 March 2004.
-
ºê»³½ß, ËÜ´Ö¾°Ê¸, ¼ã¾¾ÂÙÊ¿, ÀÄÌÚ¹§Ê¸, Èõ¸ýζͺ¡¤¡ÈCounter Tree Diagrams¤Ë¤è¤ë¾éĹ²Ã»»´ï¤ÎÀ߷פÈɾ²Á,¡É ¿ÃÍÏÀÍý¸¦µæ¥Î¡¼¥ÈÂè26´¬, pp. 11-1--11-9, September 2003.
-
²Æ°æ²íŵ, ËÜ´Ö¾°Ê¸, ÀÄÌÚ¹§Ê¸, Èõ¸ýζͺ, ¡ÈEvolutionary Graph Generation System and Its Application to Current Mirror Synthesis,¡É Ê¿À®15ǯÅÙÅŵ¤´Ø·¸³Ø²ñÅìËÌ»ÙÉôÏ¢¹çÂç²ñ¹Ö±éÏÀʸ½¸, August 2003.
-
¹â¶¶¾°ÆÁ, ËÜ´Ö¾°Ê¸, ÀÄÌÚ¹§Ê¸, Èõ¸ýζͺ¡¤¡ÈVLSI¥Ç¡¼¥¿¥Ñ¥¹¼«Æ°À¸À®¥·¥¹¥Æ¥à¤Î¹½ÃÛ,¡É Ê¿À®15ǯÅÙÅŵ¤´Ø·¸³Ø²ñÅìËÌ»ÙÉôÏ¢¹çÂç²ñ¹Ö±éÏÀʸ½¸, No. 1G13, p. 237, August 2003.
-
ÀÐÅÄ°ìºÈ, ËÜ´Ö¾°Ê¸, ÀÄÌÚ¹§Ê¸, Èõ¸ýζͺ¡¤¡È»»½Ñ¥¢¥ë¥´¥ê¥º¥àµ½Ò¸À¸ìARITH¤Ë¤è¤ë¥Ñ¥¤¥×¥é¥¤¥ó¾è»»´ï¤Î·Á¼°Åª¸¡¾Ú,¡É Ê¿À®15ǯÅÙÅŵ¤´Ø·¸³Ø²ñÅìËÌ»ÙÉôÏ¢¹çÂç²ñ¹Ö±éÏÀʸ½¸, No. 1F9, p. 194, August 2003.
-
ËÜ´Ö¾°Ê¸¡¤ÀÄÌÚ¹§Ê¸, Èõ¸ýζͺ, ¡È¿Ê²½Åª¥°¥é¥ÕÀ¸À®¥·¥¹¥Æ¥à¤È¤½¤ÎÄê·¸¿ô¾è»»´ï¹çÀ®¤Ø¤Î±þÍÑ,¡É Âè15²ó ²óÏ©¤È¥·¥¹¥Æ¥à ¡Ê·Ú°æÂô¡Ë¥ï¡¼¥¯¥·¥ç¥Ã¥× ÏÀʸ½¸, pp. 287--292, April 2002.
-
ËÜ´Ö¾°Ê¸, ÀÄÌÚ¹§Ê¸, Èõ¸ýζͺ, ¡È¿Ê²½Åª¥°¥é¥ÕÀ¸À®¥·¥¹¥Æ¥à EGG --VLSI±é»»²óÏ©¹çÀ®¤Ø¤Î±þÍÑ-- ,¡É Âè199²ó·×¬¼«Æ°À©¸æ³Ø²ñÅìËÌ»ÙÉô¸¦µæ½¸²ñ, No. 199-10, pp. 1--10, December 2001.
-
ËÜ´Ö¾°Ê¸, ÄÄÄê·¯, ÀÄÌÚ¹§Ê¸, Èõ¸ýζͺ, ¡ÈEvolutionary graph generation and its application,¡É Âè199²ó·×¬¼«Æ°À©¸æ³Ø²ñÅìËÌ»ÙÉô¸¦µæ½¸²ñ, No. 191-3, pp. 1--10, November 2000.
-
ËÜ´Ö¾°Ê¸, ÀÄÌÚ¹§Ê¸, Èõ¸ýζͺ, ¡Èµ¹æŪµ¡Ç½¸¡¾Ú¤Ë´ð¤Å¤¯¿Ê²½Åª»»½Ñ²óÏ©¹çÀ®,¡É Ê¿À®11ǯÅÙÅŵ¤´Ø·¸³Ø²ñÅìËÌ»ÙÉôÏ¢¹çÂç²ñ¹Ö±éÏÀʸ½¸, No.2F-5, p. 189, August 1999.
-
ËÜ´Ö¾°Ê¸, ÀÄÌÚ¹§Ê¸, Èõ¸ýζͺ, ¡È¿Ê²½Åª¥°¥é¥ÕÀ¸À®¼êË¡¤Ë´ð¤Å¤¯»»½Ñ±é»»²óÏ©Àß·×,¡É Ê¿À®11ǯÅÙSICE³Ø½Ñ¹Ö±é²ñ¹Ö±éÏÀʸ½¸,¡É No. 204A-4, pp. 377--378, July 1999.
-
ËÜ´Ö¾°Ê¸, ÀÄÌÚ¹§Ê¸, Èõ¸ýζͺ, ¡ÈVLSI±é»»²óÏ©¹çÀ®¤Î¤¿¤á¤Î¥°¥é¥Õɽ¸½¤ÎÄó°Æ,¡É Ê¿À®10ǯÅÙÅŵ¤´Ø·¸³Ø²ñÅìËÌ»ÙÉôÏ¢¹çÂç²ñ¹Ö±éÏÀʸ½¸, No. 1H1, p. 289, August 1998.
-
ËÜ´Ö¾°Ê¸, ÀÄÌÚ¹§Ê¸, Èõ¸ýζͺ, ¡È»»½Ñ²óÏ©¹½Â¤¤Î¿Ê²½ÅªÀ¸À®,¡É ÅŻҾðÊóÄÌ¿®³Ø²ñµ»½Ñ¸¦µæÊó¹ð, Vol. 98, No. 140, pp. 61--68, June 1998.
-
ËÜ´Ö¾°Ê¸, ÀÄÌÚ¹§Ê¸, Èõ¸ýζͺ, ¡È¿Ê²½Åª¥°¥é¥ÕÀ¸À®¥·¥¹¥Æ¥à¤Ë´ð¤Å¤¯»»½Ñ¥¢¥ë¥´¥ê¥º¥àÀ߷פÎÄó°Æ,¡É 1998ǯÅŻҾðÊóÄÌ¿®³Ø²ñÁí¹çÂç²ñ¹Ö±éÏÀʸ½¸, No. A-3-15, p. 101, March 1998.
|