Follow
Yohei Hori
Yohei Hori
advanced industrial science and technology chuo university
No verified email
Title
Cited by
Cited by
Year
Quantitative and statistical performance evaluation of arbiter physical unclonable functions on FPGAs
Y Hori, T Yoshida, T Katashita, A Satoh
2010 International conference on reconfigurable computing and FPGAs, 298-303, 2010
2702010
Cryptographie key generation from PUF data using efficient fuzzy extractors
H Kang, Y Hori, T Katashita, M Hagiwara, K Iwamura
16th International conference on advanced communication technology, 23-26, 2014
832014
Bitstream encryption and authentication with AES-GCM in dynamically reconfigurable systems
Y Hori, A Satoh, H Sakane, K Toda
2008 International Conference on Field Programmable Logic and Applications …, 2008
622008
Evaluation of physical unclonable functions for 28-nm process field-programmable gate arrays
Y Hori, H Kang, T Katashita, A Satoh, S Kawamura, K Kobara
Journal of Information Processing 22 (2), 344-356, 2014
462014
SASEBO-GIII: A hardware security evaluation board equipped with a 28-nm FPGA
Y Hori, T Katashita, A Sasaki, A Satoh
The 1st IEEE Global Conference on Consumer Electronics 2012, 657-660, 2012
452012
Pseudo-LFSR PUF: A compact, efficient and reliable physical unclonable function
Y Hori, H Kang, T Katashita, A Satoh
2011 International Conference on Reconfigurable Computing and FPGAs, 223-228, 2011
412011
Side-channel attack standard evaluation board SASEBO-W for smartcard testing
T Katashita, Y Hori, H Sakane, A Satoh
Power 3 (2012), 400, 2012
292012
Organic physically unclonable function on flexible substrate operable at 2 V for IoT/IoE security applications
K Kuribara, Y Hori, T Katashita, K Kakita, Y Tanaka, M Yoshida
Organic Electronics 51, 137-141, 2017
282017
Electromagnetic side-channel attack against 28-nm FPGA device
Y Hori, T Katashita, A Sasaki, A Satoh
Pre-proceedings of WISA, 84, 2012
212012
Performance evaluation of the first commercial PUF-embedded RFID
H Kang, Y Hori, A Satoh
The 1st IEEE Global Conference on Consumer Electronics 2012, 5-8, 2012
202012
Performance analysis for puf data using fuzzy extractor
H Kang, Y Hori, T Katashita, M Hagiwara, K Iwamura
Ubiquitous Information Technologies and Applications, 277-284, 2014
172014
Bitstream encryption and authentication using AES-GCM in dynamically reconfigurable systems
Y Hori, A Satoh, H Sakane, K Toda
International Workshop on Security, 261-278, 2008
162008
A secure content delivery system based on a partially reconfigurable FPGA
Y Hori, H Yokoyama, H Sakane, K Toda
IEICE transactions on information and systems 91 (5), 1398-1407, 2008
162008
Image display apparatus
O Morikawa, K Toda, T Katashita, Y Hori
US Patent 7,843,401, 2010
142010
The implementation of fuzzy extractor is not hard to do: An approach using puf data
H Kang, Y Hori, T Katashita, M Hagiwara
Proceedings of the 30th Symposium on Cryptography and Information Security …, 2013
132013
A fast power current analysis methodology using capacitor charging model for side channel attack evaluation
D Fujimoto, M Nagata, T Katashita, A Sasaki, Y Hori, A Satoh
2011 IEEE International Symposium on Hardware-Oriented Security and Trust, 87-92, 2011
122011
On-chip power noise measurements of cryptographic VLSI circuits and interpretation for side-channel analysis
D Fujimoto, N Miura, M Nagata, Y Hayashi, N Homma, Y Hori, T Katashita, ...
2013 International Symposium on Electromagnetic Compatibility, 405-410, 2013
112013
Robust and compact key generator using physically unclonable function based on logic-transistor-compatible poly-crystalline-Si channel FinFET technology
Y Liu, Y Hori, T Irisawa, H Fuketa, Y Morita, S Migita, T Mori, T Nakagawa, ...
2015 IEEE International Electron Devices Meeting (IEDM), 25.6. 1-25.6. 4, 2015
102015
Development of the unified security requirements of PUFs during the standardization process
N Bruneau, JL Danger, A Facon, S Guilley, S Hamaguchi, Y Hori, Y Kang, ...
International Conference on Security for Information Technology and …, 2018
92018
Bitstream protection in dynamic partial reconfiguration systems using authenticated encryption
Y Hori, T Katashita, H Sakane, K Toda, A Satoh
IEICE TRANSACTIONS on Information and Systems 96 (11), 2333-2343, 2013
92013
The system can't perform the operation now. Try again later.
Articles 1–20