Follow
Mitsuru Shiozaki
Mitsuru Shiozaki
Nuvoton Technology Corporation Japan
Verified email at ieee.org
Title
Cited by
Cited by
Year
Reversing stealthy dopant-level circuits
T Sugawara, D Suzuki, R Fujii, S Tawa, R Hori, M Shiozaki, T Fujino
Cryptographic Hardware and Embedded Systems–CHES 2014: 16th International …, 2014
922014
On measurable side-channel leaks inside ASIC design primitives
T Sugawara, D Suzuki, M Saeki, M Shiozaki, T Fujino
Cryptographic Hardware and Embedded Systems-CHES 2013: 15th International …, 2013
582013
Deep learning side-channel attack against hardware implementations of AES
T Kubota, K Yoshida, M Shiozaki, T Fujino
Microprocessors and Microsystems 87, 103383, 2021
522021
The arbiter-PUF with high uniqueness utilizing novel arbiter circuit with Delay-Time Measurement
K Fruhashi, M Shiozaki, A Fukushima, T Murayama, T Fujino
2011 IEEE international symposium of circuits and systems (ISCAS), 2325-2328, 2011
512011
Model-extraction attack against FPGA-DNN accelerator utilizing correlation electromagnetic analysis
K Yoshida, T Kubota, M Shiozaki, T Fujino
2019 IEEE 27th Annual International Symposium on Field-Programmable Custom …, 2019
372019
Model reverse-engineering attack using correlation power analysis against systolic array based neural network accelerator
K Yoshida, T Kubota, S Okura, M Shiozaki, T Fujino
2020 IEEE International Symposium on Circuits and Systems (ISCAS), 1-5, 2020
282020
A stable key generation from PUF responses with a Fuzzy Extractor for cryptographic authentications
M Taniguchi, M Shiozaki, H Kubo, T Fujino
2013 IEEE 2nd Global Conference on Consumer Electronics (GCCE), 525-527, 2013
282013
Diffusion programmable device: The device to prevent reverse engineering
M Shiozaki, R Hori, T Fujino
Cryptology ePrint Archive, 2014
272014
Signal distribution architecture and semiconductor device
H Ikeda, M Sasaki, A Iwata, M Shiozaki, A Mori
US Patent 7,538,603, 2009
202009
VLSI design and test for systems dependability
S Asai
Springer, 2018
192018
Simple electromagnetic analysis attacks based on geometric leak on an ASIC implementation of ring-oscillator PUF
M Shiozaki, T Fujino
Proceedings of the 3rd ACM Workshop on Attacks and Solutions in Hardware …, 2019
132019
Solid-state imaging device, method for driving solid-state imaging device, and electronic apparatus with physically unclonable function
I Takayanagi, S Tanaka, S Matsuo, S Okura, S Iwata, T Fujino, M Shiozaki, ...
US Patent 10,382,708, 2019
132019
Tamper-resistant authentication system with side-channel attack resistant AES and PUF using MDR-ROM
M Shiozaki, T Kubota, T Nakai, A Takeuchi, T Nishimura, T Fujino
2015 IEEE International Symposium on Circuits and Systems (ISCAS), 1462-1465, 2015
132015
Side-channel attack resistant AES cryptographic circuits with ROM reducing address-dependent EM leaks
T Nakai, M Shibatani, M Shiozaki, T Kubota, T Fujino
2014 IEEE International Symposium on Circuits and Systems (ISCAS), 2547-2550, 2014
122014
12GHz low-area-overhead standing-wave clock distribution with inductively-loaded and coupled technique
M Sasaki, M Shiozaki, A Mori, A Iwata, H Ikeda
2007 IEEE International Solid-State Circuits Conference. Digest of Technical …, 2007
112007
Model reverse-engineering attack against systolic-array-based dnn accelerator using correlation power analysis
K Yoshida, M Shiozaki, S Okura, T Kubota, T Fujino
IEICE Transactions on Fundamentals of Electronics, Communications and …, 2021
102021
Tamper-resistant cryptographic hardware
T Fujino, T Kubota, M Shiozaki
IEICE Electronics Express 14 (2), 20162004-20162004, 2017
92017
LSI Implementation Method of DES Cryptographic Circuit Utilizing Domino-RSL Gate Resistant to DPA Attack
K Kojima
SASIMI2010, 196-201, 2010
92010
On measurable side-channel leaks inside ASIC design primitives
T Sugawara, D Suzuki, M Saeki, M Shiozaki, T Fujino
Journal of Cryptographic Engineering 4, 59-73, 2014
82014
Bus-off attack against CAN ECU using stuff error injection from Raspberry Pi
R Kameoka, T Kubota, M Shiozaki, M Shirahata, R Kurachi, T Fujino
Proceedings of the Symposium on Cryptography and Information Security (SCIS), 2017
62017
The system can't perform the operation now. Try again later.
Articles 1–20