Publication
International Journal
- Secure implementation of cryptographic modules---Development of a standard evaluation environment for side channel attacks
- Akashi Satoh, Toshihiro Katashita, and Hirofumi Sakane,
Synthesiology, Vol.3, No.1, pp.56-65, July 2010.
- High-Performance Hardware Archuitectures for Galois Counter Mode
- Akashi Satoh, Takeshi Sugawara, and Takafumi Aoki,
IEEE Transaction on Computer, vol. 58, no. 7, pp. 917-930, July 2009.
- A High-Resolution Phase-Based Waveform Matching and Its Application to Side-Channel Attacks
- Naofumi Homma, Sei Nagashima, Takeshi Sugawara, Takafumi Aoki, Akashi Satoh,
IEICE Transactions, vol. 91-A, no. 1, pp. 193-202, January 2008.
International Conference
- A Fast Power Current Analysis Methodology Using Capacitor
Charging Model for Side Channel Attack Evaluation,
- Daisuke Fujimoto, Makoto Nagata, Toshihiro Katashita,
Akihiko Sasaki, Yohei Hori, and Akashi Satoh,
IEEE International Symposium on Hardware-Oriented Security and Trust
(HOST 2011),
Proceedings of HOST 2011, #P35, pp.87-92, June 2011.
-
Quantitative and Statistical Performance Evaluation of Arbiter
Physical Unclonable Functions on FPGAs,
- Yohei Hori, Takahiro Yoshida, Toshihiro Katashita, and
Akashi Satoh,
6th International Conference on Reconfigurable Computing and FPGAs
(ReConFig 2010),
Proceedings of ReConFig 2010, pp.298-303, December 2010.
-
Biasing power traces to improve correlation power analysis attacks,
- Yongdae Kim, Takeshi Sugawara, Naofumi Homma, Takafumi Aoki, and Akashi Satoh,
First International Workshop on Constructive Side-Channel Analysis and Secure Design 2010
(COSADE 2010),
Proceedings of COSEADE 2010, pp.77-80, February 2010.
-
DPA Characteristic Evaluation of SASEBO for Board Level Simulations,
- Toshihiro Katashita, Akashi Satoh, Katsuya Kikuchi, Hiroshi Nakagawa
and Masahiro Aoyagi,
First International Workshop on Constructive Side-Channel Analysis and Secure Design 2010
(COSADE 2010),
Proceedings of COSEADE 2010, pp.36-39, February 2010.
- Side Channel Attack to Magnetic Near Field of Cryptographic LSI and its
Countermeasure by means of Magnetic Thin Film,
- Masahiro Yamaguchi, Hideki Toriduka, Shoichi Kobayashi, Takeshi Sugawara, Naofumi Homma, Akashi Satoh, and Takafumi Aoki,
19th Soft Magnetic Materials Conference,
(SMM19),
Proceedings of SMM19, No. A3-11, September 2009.
-
Is the Differential Frequency-based Attack Effective against Random Delay Insertion?,
- Ye Lu, Kean Hong Boey, Maire O'Neill, John. V. McCanny, and Akashi Satoh,
IEEE Workshop on Signal Processing Systems
(SiPS 2009),
Proceedings of SiPS 2009, October 2009.
- A Design Methodology for a DPA-Resistant Cryptographic LSI with RSL Techniques
- Daisuke Suzuki, Minoru Saeki, Koichi Simizu, and Akashi Satoh,
Cryptographic Hardware and Embedded Systems (CHES 2009), Lecture Notes in Computer Science, vol., September 2009.
- Differential Power Analysis of AES ASIC Implementations with Various S-box Circuits
- Takeshi Sugawara, Naofumi Homma, Takafumi Aoki, and Akashi Satoh,
Proceedings of European Conference on Circuit Theory and Design 2009 (ECCTD '09), August 2009.
- Development of Side-channel Attack Standard Evaluation Emvironment
- Toshihiro Katashita, Akashi Satoh, Takeshi Sugawara, Naofumi Homma, and Takafumi Aoki,
Proceedings of European Conference on Circuit Theory and Design 2009 (ECCTD '09), August 2009.
- Mechanism behind Information Leakage in Electromagnetic Analysis of Cryptographic Modules
- Takeshi Sugawara, Yuichi Hayashi, Naofumi Homma, Takaaki Mizuki, Kohei Omura, Shigeki Minegishi, Takafumi Aoki, and Akashi Satoh,
Proceedings of the 10th International Workshop on Information Security Applications (WISA 2009), August 2009.
- An Analysis of Information Leakage from a Cryptographic Hardware via Common-Mode Current
- Yuichi Hayashi, Takeshi Sugawara, Y. Kayano, Naofumi Homma, Takaaki Mizuki, Akashi Satoh, Takafumi Aoki, Shigeki Minegish, Hideaki Sone, and Hiroshi Inoue,
Proceedings of 2009 International Symposium on Electromagnetic Compatibility (EMC '09), July 2009.
- Spectrum Analysis on Cryptographic Modules to Counteract Side-Channel Attacks
- Takeshi Sugawara, Yuichi Hayashi, Naofumi Homma, Takafumi Aoki, Takaaki Mizuki, Hideaki Sone, and Akashi Satoh,
Proceedings of 2009 International Symposium on Electromagnetic Compatibility (EMC '09), July 2009.
- Compact and High-speed Hardware Architectures for Hash Function Tiger
- Akashi Satoh,
Proceedings of 2008 IEEE International Symposium on Circuits and Systems (ISCAS 2009), May 2008.
- Evaluation of Simple/Comparative Power Analysis against an RSA ASIC Implementation
- Atsushi Miyamoto, Naofumi Homma, Takafumi Aoki, and Akashi Satoh,
Proceedings of 2008 IEEE International Symposium on Circuits and Systems (ISCAS 2009), pp. 2918-2912, May 2009.
- An Experimental Comparison of Power Analysis Attacks against RSA Processors on ASIC and FPGA
- Atsushi Miyamoto, Naofumi Homma, Takafumi Aoki, and Akashi Satoh,
Proceedings of 14th Workshop on Synthesis And System Integration of Mixed Information technologies (SASIMI2009), pp. 58-63, March 2009.
- Enhanced Correlation Power Analysis using Key Screening Technique
- Takeshi Sugawara, Naofumi Homma and Takafumi Aoki, and Akashi Satoh,
Proceedings of 2008 International Conference on Reconfigurable Computing and FPGAs (Reconfig '08), pp. 403-408, December 2008.
- Systematic design of high-radix Montgomery multipliers for RSA processors
- Atsushi Miyamoto, Naofumi Homma, Takafumi Aoki, and Akashi Satoh,
Proceedings of IEEE International Conference on Computer Design (ICCD 2008), pp. 403-408, October 2008.
- Compact ASIC Architectures for the 512-bit Hash Function Whirlpool
- Takeshi Sugawara, Naofumi Homma, Takafumi Aoki, and Akashi Satoh,
Workshop on Information Security Applications (WISA 2008), September 2008.
- Systematic design of high-radix Montgomery multipliers for RSA processors
- Atsushi Miyamoto, Naofumi Homma, Takafumi Aoki, and Akashi Satoh,
The 26th IEEE International Conference of Computer Design (ICCD 2008), October 2008.
- Chosen-Message SPA Attacks against FPGA-based RSA Hardware Implementations
- Atsushi Miyamoto, Naofumi Homma, Takafumi Aoki, and Akashi Satoh,
International Conference on Field Programmable Logic and Applications (FPL 08), September 2008.
- Bitstream Encryption and Authentication with AES-GCM in Dynamically Reconfigurable Systems
- Yohei Hori, Akashi Satoh, Hirofumi Sakane, and Kenji Toda,
International Conference on Field Programmable Logic and Applications (FPL 08), September 2008.
- Collision-based Power Analysis of Modular Exponentiation Using Chosen-message Pairs
- Naofumi Homma, Atsushi Miyamoto, Takafumi Aoki, Akashi Satoh, and Adi Shamir,
Cryptographic Hardware and Embedded Systems (CHES 2008), Lecture Notes in Computer Science, vol. 5154, August 2008.
- High-performance Concurrent Error Detection Scheme for AES Hardware
- Akashi Satoh, Takeshi Sugawara, Naofumi Homma, and Takafumi Aoki,
Cryptographic Hardware and Embedded Systems (CHES 2008), Lecture Notes in Computer Science, vol. 5154, pp. 100-112, August 2008.
- Enhanced Power Analysis Attack Using Chosen Message Against RSA Hardware Implementations
- Atsushi Miyamoto, Naofumi Homma, Takafumi Aoki, and Akashi Satoh,
Proceedings of 2008 IEEE International Symposium on Circuits and Systems (ISCAS 2008), (poster), May 2008.
- High-performance ASIC Implementations of the 128-bit Block Cipher CLEFIA
- Taksehi Sugawara, Naofumi Homma, Takafumi Aoki, and Akashi Satoh,
Proceedings of 2008 IEEE International Symposium on Circuits and Systems (ISCAS 2008), pp. 2925-2928, May 2008.
- ASIC Hardware Implementations for 512-Bit Hash Function Whirlpool
- Akashi Satoh,
Proceedings of 2008 IEEE International Symposium on Circuits and Systems (ISCAS 2008), pp. 2917-2920, May 2008.
- High-Speed Pipelined Hardware Architecture for Galois Counter Mode
- Akashi Satoh,
Information Security Conference 2007 (ISC 2007), Lecture Notes in Computer Science, vol. 4779, pp. 118-129, October 2007.
- ASIC performance comparison for the ISO standard block ciphers
- Takeshi Sugawara, Naofumi Homma, Takafumi Aoki, and Akashi Satoh,
The 2nd Joint Workshop on Information Security (JWIS2007), pp. 485-498, August 2007.
- High-Speed Parallel Hardware Architecture for Galois Counter Mode
- Akashi Satoh,
Proceedings of 2007 IEEE International Symposium on Circuits and Systems (ISCAS 2007), pp.1863 - 1866, May 2007.
- A High-performance ASIC Implementation of the 64-bit Block Cipher CAST-128
- Takeshi Sugawara, Naofumi Homma, Takafumi Aoki, and Akashi Satoh,
Proceedings of 2007 IEEE International Symposium on Circuits and Systems (ISCAS 2007), pp. 1859 - 1862, May 2007.
- SPA against RSA processor with High-Radix Montgomery Multiplier on an FPGA
- Atsushi Miyamoto, Naofumi Homma, Takafumi Aoki, and Akashi Satoh,
Proceedings of 2007 IEEE International Symposium on Circuits and Systems (ISCAS 2007), pp. 1847 - 1850, May 2007.
- DPA using Phase-Based Waveform Matching against Random-Delay Countermeasure
- Sei Nagashima, Naofumi Homma, Yuichi Imai, Takafumi Aoki, and Akashi Satoh,
Proceedings of 2007 IEEE International Symposium on Circuits and Systems (ISCAS 2007), pp. 1807 - 1810, May 2007.
- High-Resolution Side-Channel Attack Using Phase-Based Waveform Matching
- Naofumi Homma, Sei Nagashima, Yuichi Imai, Takafumi Aoki, and Akashi Satoh,
Cryptographic Hardware and Embedded Systems (CHES 2006), Lecture Notes in Computer Science, vol. 4249, pp. 187-200, October 2006.