Hideaki Sone
Hideaki Sone
Verified email at cc.tohoku.ac.jp
Title
Cited by
Cited by
Year
Six-card secure AND and four-card secure XOR
T Mizuki, H Sone
International Workshop on Frontiers in Algorithmics, 358-369, 2009
662009
Role of the metallic phase arc discharge on arc erosion in Ag contacts
H Sone, T Takagi
IEEE Transactions on Components, Hybrids, and Manufacturing Technology 13 (1 …, 1990
631990
Flexible access management system for campus VLAN based on OpenFlow
Y Yamasaki, Y Miyamoto, J Yamato, H Goto, H Sone
2011 IEEE/IPSJ International Symposium on Applications and the Internet, 347-351, 2011
512011
The five-card trick can be done with four cards
T Mizuki, M Kumamoto, H Sone
International Conference on the Theory and Application of Cryptology and …, 2012
502012
Analysis of electromagnetic information leakage from cryptographic devices with different physical structures
YI Hayashi, N Homma, T Mizuki, T Aoki, H Sone, L Sauvage, JL Danger
IEEE Transactions on Electromagnetic Compatibility 55 (3), 571-580, 2013
462013
A Threat for Tablet PCs in Public Space: Remote Visualization of Screen Images Using EM Emanation
Y Hayashi, N Homma, M Miura, T Aoki, H Sone
Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications …, 2014
392014
Voting with a logarithmic number of cards
T Mizuki, IK Asiedu, H Sone
International Conference on Unconventional Computing and Natural Computation …, 2013
332013
Securely computing XOR with 10 cards
T Mizuki, F Uchiike, H Sone
Australasian Journal of Combinatorics 36, 279-293, 2006
292006
Non-invasive EMI-based fault injection attack against cryptographic modules
Y Hayashi, N Homma, T Sugawara, T Mizuki, T Aoki, H Sone
2011 IEEE International Symposium on Electromagnetic Compatibility, 763-767, 2011
282011
Card-based protocols for any boolean function
T Nishida, Y Hayashi, T Mizuki, H Sone
International Conference on Theory and Applications of Models of Computation …, 2015
262015
A new dynamical domain decomposition method for parallel molecular dynamics simulation
V Zhakhovskii, K Nishihara, Y Fukuda, S Shimojo, T Akiyama, S Miyanaga, ...
CCGrid 2005. IEEE International Symposium on Cluster Computing and the Grid …, 2005
262005
Securely computing the three-input majority function with eight cards
T Nishida, T Mizuki, H Sone
International Conference on Theory and Practice of Natural Computing, 193-204, 2013
252013
Spectrum analysis on cryptographic modules to counteract side-channel attacks
T Sugawara, Y Hayashi, N Homma, T Mizuki, T Aoki, H Sone, A Satoh
EMC 9, 21-24, 2009
252009
How to implement a random bisection cut
I Ueda, A Nishimura, Y Hayashi, T Mizuki, H Sone
International Conference on Theory and Practice of Natural Computing, 58-69, 2016
242016
Mechanism behind information leakage in electromagnetic analysis of cryptographic modules
T Sugawara, Y Hayashi, N Homma, T Mizuki, T Aoki, H Sone, A Satoh
International Workshop on Information Security Applications, 66-78, 2009
232009
Efficient evaluation of EM radiation associated with information leakage from cryptographic devices
Y Hayashi, N Homma, T Mizuki, H Shimada, T Aoki, H Sone, L Sauvage, ...
IEEE Transactions on Electromagnetic Compatibility 55 (3), 555-563, 2013
222013
Relationship between length and diameter of contact bridge formed under thermal equilibrium condition
H Ishida, M Taniguchi, H Sone, H Inoue, T Takagi
IEICE transactions on electronics 88 (8), 1566-1572, 2005
222005
Transient IEMI threats for cryptographic devices
Y Hayashi, N Homma, T Mizuki, T Aoki, H Sone
IEEE transactions on Electromagnetic Compatibility 55 (1), 140-148, 2013
212013
Divide and conquer technique for network fault management
K Ohta, T Mori, N Kato, H Sone, G Mansfield, Y Nemoto
International Symposium on Integrated Network Management, 675-687, 1997
211997
Fundamental measurement of electromagnetic field radiated from a coaxial transmission line caused by connector contact failure
Y Hayashi, H Sone
IEICE transactions on electronics 91 (8), 1306-1312, 2008
192008
The system can't perform the operation now. Try again later.
Articles 1–20