Systematic design of RSA processors based on high-radix Montgomery multipliers A Miyamoto, N Homma, T Aoki, A Satoh IEEE Transactions on very large scale integration (VLSI) Systems 19 (7 …, 2010 | 112 | 2010 |
An on-chip glitchy-clock generator for testing fault injection attacks S Endo, T Sugawara, N Homma, T Aoki, A Satoh Journal of Cryptographic Engineering 1, 265-270, 2011 | 105 | 2011 |
A threat for tablet pcs in public space: Remote visualization of screen images using em emanation Y Hayashi, N Homma, M Miura, T Aoki, H Sone Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications …, 2014 | 100 | 2014 |
Collision-based power analysis of modular exponentiation using chosen-message pairs N Homma, A Miyamoto, T Aoki, A Satoh, A Shamir Cryptographic Hardware and Embedded Systems–CHES 2008: 10th International …, 2008 | 99 | 2008 |
Curse of re-encryption: a generic power/EM analysis on post-quantum KEMs R Ueno, K Xagawa, Y Tanaka, A Ito, J Takahashi, N Homma IACR Transactions on Cryptographic Hardware and Embedded Systems, 296-322, 2022 | 94 | 2022 |
High-resolution side-channel attack using phase-based waveform matching N Homma, S Nagashima, Y Imai, T Aoki, A Satoh Cryptographic Hardware and Embedded Systems-CHES 2006: 8th International …, 2006 | 90 | 2006 |
High-performance concurrent error detection scheme for AES hardware A Satoh, T Sugawara, N Homma, T Aoki Cryptographic Hardware and Embedded Systems–CHES 2008: 10th International …, 2008 | 88 | 2008 |
Analysis of electromagnetic information leakage from cryptographic devices with different physical structures YI Hayashi, N Homma, T Mizuki, T Aoki, H Sone, L Sauvage, JL Danger IEEE Transactions on Electromagnetic Compatibility 55 (3), 571-580, 2012 | 84 | 2012 |
Fair and consistent hardware evaluation of fourteen round two SHA-3 candidates M Knezevic, K Kobayashi, J Ikegami, S Matsuo, A Satoh, Ü Kocabas, ... IEEE Transactions on Very Large Scale Integration (VLSI) Systems 20 (5), 827-840, 2011 | 76 | 2011 |
Comparative power analysis of modular exponentiation algorithms N Homma, A Miyamoto, T Aoki, A Satoh, A Samir IEEE Transactions on Computers 59 (6), 795-807, 2009 | 72 | 2009 |
Em attack is non-invasive?-design methodology and validity verification of em attack sensor N Homma, Y Hayashi, N Miura, D Fujimoto, D Tanaka, M Nagata, T Aoki Cryptographic Hardware and Embedded Systems–CHES 2014: 16th International …, 2014 | 68 | 2014 |
Fault-injection attacks against NIST’s post-quantum cryptography round 3 KEM candidates K Xagawa, A Ito, R Ueno, J Takahashi, N Homma Advances in Cryptology–ASIACRYPT 2021: 27th International Conference on the …, 2021 | 53 | 2021 |
Introduction to the special section on electromagnetic information security YI Hayashi, N Homma, T Watanabe, WO Price, WA Radasky IEEE Transactions on Electromagnetic Compatibility 55 (3), 539-546, 2013 | 48 | 2013 |
A local EM-analysis attack resistant cryptographic engine with fully-digital oscillator-based tamper-access sensor N Miura, D Fujimoto, D Tanaka, Y Hayashi, N Homma, T Aoki, M Nagata 2014 symposium on VLSI circuits digest of technical papers, 1-2, 2014 | 47 | 2014 |
Transient IEMI threats for cryptographic devices Y Hayashi, N Homma, T Mizuki, T Aoki, H Sone IEEE transactions on Electromagnetic Compatibility 55 (1), 140-148, 2012 | 47 | 2012 |
Formal design of arithmetic circuits based on arithmetic description language N Homma, Y Watanabe, T Aoki, T Higuchi IEICE transactions on fundamentals of electronics, communications and …, 2006 | 47 | 2006 |
Non-invasive EMI-based fault injection attack against cryptographic modules Y Hayashi, N Homma, T Sugawara, T Mizuki, T Aoki, H Sone 2011 IEEE International Symposium on Electromagnetic Compatibility, 763-767, 2011 | 46 | 2011 |
Efficient evaluation of EM radiation associated with information leakage from cryptographic devices Y Hayashi, N Homma, T Mizuki, H Shimada, T Aoki, H Sone, L Sauvage, ... IEEE Transactions on Electromagnetic Compatibility 55 (3), 555-563, 2012 | 45 | 2012 |
Highly Efficient Inversion Circuit Based on Redundant GF Arithmetic and Its Application to AES Design R Ueno, N Homma, Y Sugawara, Y Nogami, T Aoki Cryptographic Hardware and Embedded Systems--CHES 2015: 17th International …, 2015 | 44 | 2015 |
Toward more efficient DPA-resistant AES hardware architecture based on threshold implementation R Ueno, N Homma, T Aoki International Workshop on Constructive Side-Channel Analysis and Secure …, 2017 | 43 | 2017 |