Yu-ichi HAYASHI
Title
Cited by
Cited by
Year
Analysis of electromagnetic information leakage from cryptographic devices with different physical structures
YI Hayashi, N Homma, T Mizuki, T Aoki, H Sone, L Sauvage, JL Danger
IEEE Transactions on Electromagnetic Compatibility 55 (3), 571-580, 2012
452012
A threat for tablet pcs in public space: Remote visualization of screen images using em emanation
Y Hayashi, N Homma, M Miura, T Aoki, H Sone
Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communicationsá…, 2014
392014
Non-invasive EMI-based fault injection attack against cryptographic modules
Y Hayashi, N Homma, T Sugawara, T Mizuki, T Aoki, H Sone
2011 IEEE International Symposium on Electromagnetic Compatibility, 763-767, 2011
282011
Card-based protocols for any boolean function
T Nishida, Y Hayashi, T Mizuki, H Sone
International Conference on Theory and Applications of Models of Computationá…, 2015
262015
Spectrum analysis on cryptographic modules to counteract side-channel attacks
T Sugawara, Y Hayashi, N Homma, T Mizuki, T Aoki, H Sone, A Satoh
EMC 9, 21-24, 2009
252009
How to implement a random bisection cut
I Ueda, A Nishimura, Y Hayashi, T Mizuki, H Sone
International Conference on Theory and Practice of Natural Computing, 58-69, 2016
242016
Mechanism behind information leakage in electromagnetic analysis of cryptographic modules
T Sugawara, Y Hayashi, N Homma, T Mizuki, T Aoki, H Sone, A Satoh
International Workshop on Information Security Applications, 66-78, 2009
232009
Em attack is non-invasive?-design methodology and validity verification of em attack sensor
N Homma, Y Hayashi, N Miura, D Fujimoto, D Tanaka, M Nagata, T Aoki
International Workshop on Cryptographic Hardware and Embedded Systems, 1-16, 2014
222014
Efficient evaluation of EM radiation associated with information leakage from cryptographic devices
Y Hayashi, N Homma, T Mizuki, H Shimada, T Aoki, H Sone, L Sauvage, ...
IEEE Transactions on Electromagnetic Compatibility 55 (3), 555-563, 2012
222012
Introduction to the special section on electromagnetic information security
YI Hayashi, N Homma, T Watanabe, WO Price, WA Radasky
IEEE Transactions on Electromagnetic Compatibility 55 (3), 539-546, 2013
212013
Transient IEMI threats for cryptographic devices
Y Hayashi, N Homma, T Mizuki, T Aoki, H Sone
IEEE transactions on Electromagnetic Compatibility 55 (1), 140-148, 2012
212012
Fundamental measurement of electromagnetic field radiated from a coaxial transmission line caused by connector contact failure
Y Hayashi, H Sone
IEICE transactions on electronics 91 (8), 1306-1312, 2008
192008
A local EM-analysis attack resistant cryptographic engine with fully-digital oscillator-based tamper-access sensor
N Miura, D Fujimoto, D Tanaka, Y Hayashi, N Homma, T Aoki, M Nagata
2014 symposium on VLSI circuits digest of technical papers, 1-2, 2014
172014
Yet another fault-based leakage in non-uniform faulty ciphertexts
Y Li, YI Hayashi, A Matsubara, N Homma, T Aoki, K Ohta, K Sakiyama
International Symposium on Foundations and Practice of Security, 272-287, 2013
162013
Evaluation of information leakage from cryptographic hardware via common-mode current
Y Hayashi, N Homma, T Mizuki, T Sugawara, Y Kayano, T Aoki, ...
IEICE transactions on electronics 95 (6), 1089-1097, 2012
152012
The minimum number of cards in practical card-based protocols
J Kastner, A Koch, S Walzer, D Miyahara, Y Hayashi, T Mizuki, H Sone
International Conference on the Theory and Application of Cryptology andá…, 2017
142017
Five-card secure computations using unequal division shuffle
A Nishimura, T Nishida, Y Hayashi, T Mizuki, H Sone
International Conference on Theory and Practice of Natural Computing, 109-120, 2015
142015
A multiple-fault injection attack by adaptive timing control under black-box conditions and a countermeasure
S Endo, N Homma, Y Hayashi, J Takahashi, H Fuji, T Aoki
International Workshop on Constructive Side-Channel Analysis and Secureá…, 2014
142014
Buffer overflow attack with multiple fault injection and a proven countermeasure
S Nashimoto, N Homma, Y Hayashi, J Takahashi, H Fuji, T Aoki
Journal of Cryptographic Engineering 7 (1), 35-46, 2017
132017
Five-card and protocol in committed format using only practical shuffles
Y Abe, Y Hayashi, T Mizuki, H Sone
Proceedings of the 5th ACM on ASIA Public-Key Cryptography Workshop, 3-8, 2018
112018
The system can't perform the operation now. Try again later.
Articles 1–20