Kazuo SAKIYAMA


Q-Class Authentication System for Double Arbiter PUF
Risa YASHIRO Takeshi SUGAWARA Mitsugu IWAMOTO Kazuo SAKIYAMA 
Publication:   
Publication Date: 2018/01/01
Vol. E101-A  No. 1  pp. 129-137
Type of Manuscript:  Special Section PAPER (Special Section on Cryptography and Information Security)
Category: 
Keyword: 
Physically Unclonable Functionauthenticationmachine-learning attack
 Summary | Full Text:PDF(2.8MB)

Power Noise Measurements of Cryptographic VLSI Circuits Regarding Side-Channel Information Leakage
Daisuke FUJIMOTO Noriyuki MIURA Makoto NAGATA Yuichi HAYASHI Naofumi HOMMA Takafumi AOKI Yohei HORI Toshihiro KATASHITA Kazuo SAKIYAMA Thanh-Ha LE Julien BRINGER Pirouz BAZARGAN-SABET Shivam BHASIN Jean-Luc DANGER 
Publication:   IEICE TRANSACTIONS on Electronics
Publication Date: 2014/04/01
Vol. E97-C  No. 4  pp. 272-279
Type of Manuscript:  Special Section PAPER (Special Section on Solid-State Circuit Design,---,Architecture, Circuit, Device and Design Methodology)
Category: 
Keyword: 
information leakageside-channel attackcorrelation power analysisadvance encryption standard
 Summary | Full Text:PDF(4MB)

Correlation Power Analysis and Countermeasure on the Stream Cipher Enocoro-128v2
Shugo MIKAMI Hirotaka YOSHIDA Dai WATANABE Kazuo SAKIYAMA 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2013/03/01
Vol. E96-A  No. 3  pp. 697-704
Type of Manuscript:  PAPER
Category: Cryptography and Information Security
Keyword: 
stream cipherEnocoro-128v2side channel analysiscorrelation power analysisthreshold implementation
 Summary | Full Text:PDF(1.3MB)

A New Type of Fault-Based Attack: Fault Behavior Analysis
Yang LI Kazuo OHTA Kazuo SAKIYAMA 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2013/01/01
Vol. E96-A  No. 1  pp. 177-184
Type of Manuscript:  Special Section PAPER (Special Section on Cryptography and Information Security)
Category: Implementation
Keyword: 
fault-based attackAESfaulty behaviorphysical attacksmasking
 Summary | Full Text:PDF(1.2MB)

Meet-in-the-Middle (Second) Preimage Attacks on Two Double-Branch Hash Functions RIPEMD and RIPEMD-128
Lei WANG Yu SASAKI Wataru KOMATSUBARA Kazuo SAKIYAMA Kazuo OHTA 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2012/01/01
Vol. E95-A  No. 1  pp. 100-110
Type of Manuscript:  Special Section PAPER (Special Section on Cryptography and Information Security)
Category: Hash Function
Keyword: 
RIPEMDRIPEMD-128meet-in-the-middleone-message-word local collision
 Summary | Full Text:PDF(1.5MB)

Differential Fault Analysis on Stream Cipher MUGI
Junko TAKAHASHI Toshinori FUKUNAGA Kazuo SAKIYAMA 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2012/01/01
Vol. E95-A  No. 1  pp. 242-251
Type of Manuscript:  Special Section PAPER (Special Section on Cryptography and Information Security)
Category: Implementation
Keyword: 
fault analysisdifferential fault analysis (DFA)stream cipherside-channel analysisMUGI
 Summary | Full Text:PDF(788.8KB)

Toward Effective Countermeasures against an Improved Fault Sensitivity Analysis
Yang LI Kazuo OHTA Kazuo SAKIYAMA 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2012/01/01
Vol. E95-A  No. 1  pp. 234-241
Type of Manuscript:  Special Section PAPER (Special Section on Cryptography and Information Security)
Category: Implementation
Keyword: 
side-channel attacksfault sensitivity analysiscountermeasuresWDDLAES
 Summary | Full Text:PDF(558.1KB)

Power Analysis against a DPA-Resistant S-Box Implementation Based on the Fourier Transform
Yang LI Kazuo SAKIYAMA Shinichi KAWAMURA Kazuo OHTA 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2011/01/01
Vol. E94-A  No. 1  pp. 191-199
Type of Manuscript:  Special Section PAPER (Special Section on Cryptography and Information Security)
Category: Implementation
Keyword: 
side channel attacksmaskingFourier transforms-boxprobability density function
 Summary | Full Text:PDF(2.1MB)

An Efficient Authentication for Lightweight Devices by Perfecting Zero-Knowledgeness
Bagus SANTOSO Kazuo OHTA Kazuo SAKIYAMA Goichiro HANAOKA 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2011/01/01
Vol. E94-A  No. 1  pp. 92-103
Type of Manuscript:  Special Section PAPER (Special Section on Cryptography and Information Security)
Category: Identification
Keyword: 
identification schemeRFIDzero-knowledgeimpersonation
 Summary | Full Text:PDF(736.7KB)

Cryptanalysis of Two MD5-Based Authentication Protocols: APOP and NMAC
Lei WANG Kazuo OHTA Yu SASAKI Kazuo SAKIYAMA Noboru KUNIHIRO 
Publication:   IEICE TRANSACTIONS on Information and Systems
Publication Date: 2010/05/01
Vol. E93-D  No. 5  pp. 1087-1095
Type of Manuscript:  Special Section PAPER (Special Section on Information and Communication System Security)
Category: 
Keyword: 
authentication protocolAPOPNMACMD5
 Summary | Full Text:PDF(317.2KB)

On Clock-Based Fault Analysis Attack for an AES Hardware Using RSL
Kazuo SAKIYAMA Kazuo OHTA 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2010/01/01
Vol. E93-A  No. 1  pp. 172-179
Type of Manuscript:  Special Section PAPER (Special Section on Cryptography and Information Security)
Category: Cryptanalysis
Keyword: 
fault analysisrandom switching logicAESclock-based fault analysis attack
 Summary | Full Text:PDF(438.1KB)