Quantitative and statistical performance evaluation of arbiter physical unclonable functions on FPGAs Y Hori, T Yoshida, T Katashita, A Satoh 2010 International conference on reconfigurable computing and FPGAs, 298-303, 2010 | 270 | 2010 |
Cryptographie key generation from PUF data using efficient fuzzy extractors H Kang, Y Hori, T Katashita, M Hagiwara, K Iwamura 16th International conference on advanced communication technology, 23-26, 2014 | 83 | 2014 |
Bitstream encryption and authentication with AES-GCM in dynamically reconfigurable systems Y Hori, A Satoh, H Sakane, K Toda 2008 International Conference on Field Programmable Logic and Applications …, 2008 | 62 | 2008 |
Evaluation of physical unclonable functions for 28-nm process field-programmable gate arrays Y Hori, H Kang, T Katashita, A Satoh, S Kawamura, K Kobara Journal of Information Processing 22 (2), 344-356, 2014 | 46 | 2014 |
SASEBO-GIII: A hardware security evaluation board equipped with a 28-nm FPGA Y Hori, T Katashita, A Sasaki, A Satoh The 1st IEEE Global Conference on Consumer Electronics 2012, 657-660, 2012 | 45 | 2012 |
Pseudo-LFSR PUF: A compact, efficient and reliable physical unclonable function Y Hori, H Kang, T Katashita, A Satoh 2011 International Conference on Reconfigurable Computing and FPGAs, 223-228, 2011 | 41 | 2011 |
Side-channel attack standard evaluation board SASEBO-W for smartcard testing T Katashita, Y Hori, H Sakane, A Satoh Power 3 (2012), 400, 2012 | 29 | 2012 |
Organic physically unclonable function on flexible substrate operable at 2 V for IoT/IoE security applications K Kuribara, Y Hori, T Katashita, K Kakita, Y Tanaka, M Yoshida Organic Electronics 51, 137-141, 2017 | 28 | 2017 |
Electromagnetic side-channel attack against 28-nm FPGA device Y Hori, T Katashita, A Sasaki, A Satoh Pre-proceedings of WISA, 84, 2012 | 21 | 2012 |
Performance evaluation of the first commercial PUF-embedded RFID H Kang, Y Hori, A Satoh The 1st IEEE Global Conference on Consumer Electronics 2012, 5-8, 2012 | 20 | 2012 |
Performance analysis for puf data using fuzzy extractor H Kang, Y Hori, T Katashita, M Hagiwara, K Iwamura Ubiquitous Information Technologies and Applications, 277-284, 2014 | 17 | 2014 |
Bitstream encryption and authentication using AES-GCM in dynamically reconfigurable systems Y Hori, A Satoh, H Sakane, K Toda International Workshop on Security, 261-278, 2008 | 16 | 2008 |
A secure content delivery system based on a partially reconfigurable FPGA Y Hori, H Yokoyama, H Sakane, K Toda IEICE transactions on information and systems 91 (5), 1398-1407, 2008 | 16 | 2008 |
Image display apparatus O Morikawa, K Toda, T Katashita, Y Hori US Patent 7,843,401, 2010 | 14 | 2010 |
The implementation of fuzzy extractor is not hard to do: An approach using puf data H Kang, Y Hori, T Katashita, M Hagiwara Proceedings of the 30th Symposium on Cryptography and Information Security …, 2013 | 13 | 2013 |
A fast power current analysis methodology using capacitor charging model for side channel attack evaluation D Fujimoto, M Nagata, T Katashita, A Sasaki, Y Hori, A Satoh 2011 IEEE International Symposium on Hardware-Oriented Security and Trust, 87-92, 2011 | 12 | 2011 |
On-chip power noise measurements of cryptographic VLSI circuits and interpretation for side-channel analysis D Fujimoto, N Miura, M Nagata, Y Hayashi, N Homma, Y Hori, T Katashita, ... 2013 International Symposium on Electromagnetic Compatibility, 405-410, 2013 | 11 | 2013 |
Robust and compact key generator using physically unclonable function based on logic-transistor-compatible poly-crystalline-Si channel FinFET technology Y Liu, Y Hori, T Irisawa, H Fuketa, Y Morita, S Migita, T Mori, T Nakagawa, ... 2015 IEEE International Electron Devices Meeting (IEDM), 25.6. 1-25.6. 4, 2015 | 10 | 2015 |
Development of the unified security requirements of PUFs during the standardization process N Bruneau, JL Danger, A Facon, S Guilley, S Hamaguchi, Y Hori, Y Kang, ... International Conference on Security for Information Technology and …, 2018 | 9 | 2018 |
Bitstream protection in dynamic partial reconfiguration systems using authenticated encryption Y Hori, T Katashita, H Sakane, K Toda, A Satoh IEICE TRANSACTIONS on Information and Systems 96 (11), 2333-2343, 2013 | 9 | 2013 |