Follow
Takeshi Sugawara
Takeshi Sugawara
Verified email at uec.ac.jp
Title
Cited by
Cited by
Year
High-performance concurrent error detection scheme for AES hardware
A Satoh, T Sugawara, N Homma, T Aoki
International Workshop on Cryptographic Hardware and Embedded Systems, 100-112, 2008
822008
An on-chip glitchy-clock generator for testing fault injection attacks
S Endo, T Sugawara, N Homma, T Aoki, A Satoh
Journal of Cryptographic Engineering 1 (4), 265-270, 2011
752011
Light Commands: Laser-Based Audio Injection Attacks on Voice-Controllable Systems
T Sugawara, B Cyr, S Rampazzi, D Genkin, K Fu
arXiv preprint arXiv:2006.11946, 2020
722020
Reversing stealthy dopant-level circuits
T Sugawara, D Suzuki, R Fujii, S Tawa, R Hori, M Shiozaki, T Fujino
International Workshop on Cryptographic Hardware and Embedded Systems, 112-126, 2014
702014
Fair and consistent hardware evaluation of fourteen round two SHA-3 candidates
M Knezevic, K Kobayashi, J Ikegami, S Matsuo, A Satoh, Ü Kocabas, ...
IEEE Transactions on Very Large Scale Integration (VLSI) Systems 20 (5), 827-840, 2011
692011
High-speed pipelined hardware architecture for Galois counter mode
A Satoh, T Sugawara, T Aoki
International Conference on Information Security, 118-129, 2007
552007
Minalpher v1
Y Sasaki, Y Todo, K Aoki, Y Naito, T Sugawara, Y Murakami, M Matsui, ...
CAESAR Round 1, 2014
53*2014
On measurable side-channel leaks inside ASIC design primitives
T Sugawara, D Suzuki, M Saeki, M Shiozaki, T Fujino
International Conference on Cryptographic Hardware and Embedded Systems, 159-178, 2013
512013
High-performance hardware architectures for Galois counter mode
A Satoh, T Sugawara, T Aoki
IEEE Transactions on Computers 58 (7), 917-930, 2008
512008
Non-invasive EMI-based fault injection attack against cryptographic modules
Y Hayashi, N Homma, T Sugawara, T Mizuki, T Aoki, H Sone
2011 IEEE International Symposium on Electromagnetic Compatibility, 763-767, 2011
392011
Biasing power traces to improve correlation power analysis attacks
Y Kim, T Sugawara, N Homma, T Aoki, A Satoh
First International Workshop on Constructive Side-Channel Analysis and c, 2010
382010
Oscillator without a combinatorial loop and its threat to FPGA in data centre
T Sugawara, K Sakiyama, S Nashimoto, D Suzuki, T Nagatsuka
Electronics Letters 55 (11), 640-642, 2019
332019
Spectrum analysis on cryptographic modules to counteract side-channel attacks
T Sugawara, Y Hayashi, N Homma, T Mizuki, T Aoki, H Sone, A Satoh
EMC 9, 21-24, 2009
292009
A 286 F²/Cell Distributed Bulk-Current Sensor and Secure Flush Code Eraser Against Laser Fault Injection Attack on Cryptographic Processor
K Matsuda, T Fujii, N Shoji, T Sugawara, K Sakiyama, Y Hayashi, ...
IEEE Journal of Solid-State Circuits, 2018
28*2018
High-performance ASIC Implementations of the 128-bit Block Cipher CLEFIA
T Sugawara, N Homma, T Aoki, A Satoh
2008 IEEE International Symposium on Circuits and Systems, 2925-2928, 2008
272008
3-Share Threshold Implementation of AES S-box without Fresh Randomness
T Sugawara
IACR Transactions on Cryptographic Hardware and Embedded Systems, 123-145, 2019
262019
SAEB: A Lightweight Blockcipher-Based AEAD Mode of Operation
Y Naito, M Matsui, T Sugawara, D Suzuki
IACR Transactions on Cryptographic Hardware and Embedded Systems, 192-217, 2018
262018
Development of side-channel attack standard evaluation environment
T Katashita, A Satoh, T Sugawara, N Homma, T Aoki
2009 European Conference on Circuit Theory and Design, 403-408, 2009
252009
Mechanism behind information leakage in electromagnetic analysis of cryptographic modules
T Sugawara, Y Hayashi, N Homma, T Mizuki, T Aoki, H Sone, A Satoh
International Workshop on Information Security Applications, 66-78, 2009
242009
Differential power analysis of AES ASIC implementations with various S-box circuits
T Sugawara, N Homma, T Aoki, A Satoh
2009 European Conference on Circuit Theory and Design, 395-398, 2009
212009
The system can't perform the operation now. Try again later.
Articles 1–20