DPA countermeasures by improving the window method K Itoh, J Yajima, M Takenaka, N Torii International Workshop on Cryptographic Hardware and Embedded Systems, 303-317, 2002 | 92 | 2002 |
The block cipher SC2000 T Shimoyama, H Yanami, K Yokoyama, M Takenaka, K Itoh, J Yajima, ... International Workshop on Fast Software Encryption, 312-327, 2001 | 59 | 2001 |
Extended key preparing apparatus, extended key preparing method, recording medium and computer program T Shimoyama, K Ito, M Takenaka, N Torii, J Yajima, H Yanami, ... US Patent 6,956,951, 2005 | 34 | 2005 |
Wang's sufficient conditions of MD5 are not sufficient. J Yajima, T Shimoyama IACR Cryptology ePrint Archive 2005, 263, 2005 | 34 | 2005 |
Improved collision search for SHA-0 Y Naito, Y Sasaki, T Shimoyama, J Yajima, N Kunihiro, K Ohta Advances in Cryptology–ASIACRYPT 2006: 12th International Conference on the …, 2006 | 28 | 2006 |
How to Construct Sufficient Condition in Searching Collisions of MD5. Y Sasaki, Y Naito, J Yajima, T Shimoyama, N Kunihiro, K Ohta IACR Cryptology ePrint Archive 2006, 74, 2006 | 26 | 2006 |
Secure boot method, semiconductor device and recording medium J Yajima, K Saito US Patent 9,530,004, 2016 | 24 | 2016 |
A new strategy for finding a differential path of SHA-1 J Yajima, Y Sasaki, Y Naito, T Iwasaki, T Shimoyama, N Kunihiro, K Ohta Information Security and Privacy: 12th Australasian Conference, ACISP 2007 …, 2007 | 22 | 2007 |
A very compact hardware implementation of the KASUMI block cipher D Yamamoto, K Itoh, J Yajima IFIP International Workshop on Information Security Theory and Practices …, 2010 | 19 | 2010 |
Encryption operating apparatus and method having side-channel attack resistance J Yajima, K Itoh, M Takenaka, N Torii US Patent 7,065,788, 2006 | 18 | 2006 |
A strict evaluation method on the number of conditions for the SHA-1 collision search J Yajima, T Iwasaki, Y Naito, Y Sasaki, T Shimoyama, N Kunihiro, K Ohta Proceedings of the 2008 ACM symposium on Information, computer and …, 2008 | 17 | 2008 |
Computing apparatus using an SPN structure in an F function and a computation method thereof T Shimoyama, K Ito, M Takenaka, N Torii, J Yajima, H Yanami, ... US Patent App. 09/813,024, 2002 | 15 | 2002 |
Encrypting device, encrypting method, and recording medium J Yajima, K Itoh, M Takenaka, D Yamamoto US Patent 9,401,805, 2016 | 14 | 2016 |
Decryption method, recording medium storing decryption program, decryption device, key generation method, and recording medium storing key generation program J Yajima, M Yasuda, T Shimoyama, J Kogure US Patent App. 14/081,231, 2014 | 13 | 2014 |
Data scramble device, security device, security system, and data scramble method J Yajima US Patent App. 14/587,466, 2015 | 12 | 2015 |
Compact architecture for ASIC and FPGA implementation of the KASUMI block cipher D Yamamoto, K Itoh, J Yajima IEICE Transactions on Fundamentals of Electronics, Communications and …, 2011 | 11 | 2011 |
Communication control apparatus and communication control method J Yajima, T Hasebe, M Takenaka US Patent App. 14/926,108, 2016 | 10 | 2016 |
A very compact hardware implementation of the MISTY1 block cipher D Yamamoto, J Yajima, K Itoh International Workshop on Cryptographic Hardware and Embedded Systems, 315-330, 2008 | 10 | 2008 |
Analysis of lattice reduction attack against the somewhat homomorphic encryption based on ideal lattices M Yasuda, J Yajima, T Shimoyama, J Kogure European Public Key Infrastructure Workshop, 1-16, 2012 | 8 | 2012 |
First to Possess His Statistics: Data-Free Model Extraction Attack on Tabular Data M Tasumi, K Iwahana, N Yanai, K Shishido, T Shimizu, Y Higuchi, ... arXiv preprint arXiv:2109.14857, 2021 | 7 | 2021 |