- Secure implementation of cryptographic modules---Development of a standard evaluation environment for side channel attacks
- Akashi Satoh, Toshihiro Katashita, and Hirofumi Sakane,

Synthesiology, Vol.3, No.1, pp.56-65, July 2010.

- High-Performance Hardware Archuitectures for Galois Counter Mode
- Akashi Satoh, Takeshi Sugawara, and Takafumi Aoki,

IEEE Transaction on Computer, vol. 58, no. 7, pp. 917-930, July 2009.

- A High-Resolution Phase-Based Waveform Matching and Its Application to Side-Channel Attacks
- Naofumi Homma, Sei Nagashima, Takeshi Sugawara, Takafumi Aoki, Akashi Satoh,

IEICE Transactions, vol. 91-A, no. 1, pp. 193-202, January 2008.

- A Fast Power Current Analysis Methodology Using Capacitor Charging Model for Side Channel Attack Evaluation,
- Daisuke Fujimoto, Makoto Nagata, Toshihiro Katashita,
Akihiko Sasaki, Yohei Hori, and Akashi Satoh,

IEEE International Symposium on Hardware-Oriented Security and Trust (*HOST 2011*), Proceedings of HOST 2011, #P35, pp.87-92, June 2011.

- Quantitative and Statistical Performance Evaluation of Arbiter Physical Unclonable Functions on FPGAs,
- Yohei Hori, Takahiro Yoshida, Toshihiro Katashita, and
Akashi Satoh,

6th International Conference on Reconfigurable Computing and FPGAs (*ReConFig 2010*), Proceedings of ReConFig 2010, pp.298-303, December 2010.

- Biasing power traces to improve correlation power analysis attacks,
- Yongdae Kim, Takeshi Sugawara, Naofumi Homma, Takafumi Aoki, and Akashi Satoh,

First International Workshop on Constructive Side-Channel Analysis and Secure Design 2010 (*COSADE 2010*), Proceedings of COSEADE 2010, pp.77-80, February 2010.

- DPA Characteristic Evaluation of SASEBO for Board Level Simulations,
- Toshihiro Katashita, Akashi Satoh, Katsuya Kikuchi, Hiroshi Nakagawa
and Masahiro Aoyagi,

First International Workshop on Constructive Side-Channel Analysis and Secure Design 2010 (*COSADE 2010*), Proceedings of COSEADE 2010, pp.36-39, February 2010.

- Side Channel Attack to Magnetic Near Field of Cryptographic LSI and its Countermeasure by means of Magnetic Thin Film,
- Masahiro Yamaguchi, Hideki Toriduka, Shoichi Kobayashi, Takeshi Sugawara, Naofumi Homma, Akashi Satoh, and Takafumi Aoki,

19th Soft Magnetic Materials Conference, (*SMM19*), Proceedings of SMM19, No. A3-11, September 2009.

- Is the Differential Frequency-based Attack Effective against Random Delay Insertion?,
- Ye Lu, Kean Hong Boey, Maire O'Neill, John. V. McCanny, and Akashi Satoh,

IEEE Workshop on Signal Processing Systems (*SiPS 2009*), Proceedings of SiPS 2009, October 2009.

- A Design Methodology for a DPA-Resistant Cryptographic LSI with RSL Techniques
- Daisuke Suzuki, Minoru Saeki, Koichi Simizu, and Akashi Satoh,

Cryptographic Hardware and Embedded Systems (*CHES 2009*), Lecture Notes in Computer Science, vol., September 2009.

- Differential Power Analysis of AES ASIC Implementations with Various S-box Circuits
- Takeshi Sugawara, Naofumi Homma, Takafumi Aoki, and Akashi Satoh,

Proceedings of European Conference on Circuit Theory and Design 2009 (*ECCTD '09*), August 2009.

- Development of Side-channel Attack Standard Evaluation Emvironment
- Toshihiro Katashita, Akashi Satoh, Takeshi Sugawara, Naofumi Homma, and Takafumi Aoki,

Proceedings of European Conference on Circuit Theory and Design 2009 (*ECCTD '09*), August 2009.

- Mechanism behind Information Leakage in Electromagnetic Analysis of Cryptographic Modules
- Takeshi Sugawara, Yuichi Hayashi, Naofumi Homma, Takaaki Mizuki, Kohei Omura, Shigeki Minegishi, Takafumi Aoki, and Akashi Satoh,

Proceedings of the 10th International Workshop on Information Security Applications (*WISA 2009*), August 2009.

- An Analysis of Information Leakage from a Cryptographic Hardware via Common-Mode Current
- Yuichi Hayashi, Takeshi Sugawara, Y. Kayano, Naofumi Homma, Takaaki Mizuki, Akashi Satoh, Takafumi Aoki, Shigeki Minegish, Hideaki Sone, and Hiroshi Inoue,

Proceedings of 2009 International Symposium on Electromagnetic Compatibility (*EMC '09*), July 2009.

- Spectrum Analysis on Cryptographic Modules to Counteract Side-Channel Attacks
- Takeshi Sugawara, Yuichi Hayashi, Naofumi Homma, Takafumi Aoki, Takaaki Mizuki, Hideaki Sone, and Akashi Satoh,

Proceedings of 2009 International Symposium on Electromagnetic Compatibility (*EMC '09*), July 2009.

- Compact and High-speed Hardware Architectures for Hash Function Tiger
- Akashi Satoh,

Proceedings of 2008 IEEE International Symposium on Circuits and Systems (*ISCAS 2009*), May 2008.

- Evaluation of Simple/Comparative Power Analysis against an RSA ASIC Implementation
- Atsushi Miyamoto, Naofumi Homma, Takafumi Aoki, and Akashi Satoh,

Proceedings of 2008 IEEE International Symposium on Circuits and Systems (*ISCAS 2009*), pp. 2918-2912, May 2009.

- An Experimental Comparison of Power Analysis Attacks against RSA Processors on ASIC and FPGA
- Atsushi Miyamoto, Naofumi Homma, Takafumi Aoki, and Akashi Satoh,

Proceedings of 14th Workshop on Synthesis And System Integration of Mixed Information technologies (*SASIMI2009*), pp. 58-63, March 2009.

- Enhanced Correlation Power Analysis using Key Screening Technique
- Takeshi Sugawara, Naofumi Homma and Takafumi Aoki, and Akashi Satoh,

Proceedings of 2008 International Conference on Reconfigurable Computing and FPGAs (*Reconfig '08*), pp. 403-408, December 2008.

- Systematic design of high-radix Montgomery multipliers for RSA processors
- Atsushi Miyamoto, Naofumi Homma, Takafumi Aoki, and Akashi Satoh,

Proceedings of IEEE International Conference on Computer Design (*ICCD 2008*), pp. 403-408, October 2008.

- Compact ASIC Architectures for the 512-bit Hash Function Whirlpool
- Takeshi Sugawara, Naofumi Homma, Takafumi Aoki, and Akashi Satoh,

Workshop on Information Security Applications (*WISA 2008*), September 2008.

- Systematic design of high-radix Montgomery multipliers for RSA processors
- Atsushi Miyamoto, Naofumi Homma, Takafumi Aoki, and Akashi Satoh,

The 26th IEEE International Conference of Computer Design (*ICCD 2008*), October 2008.

- Chosen-Message SPA Attacks against FPGA-based RSA Hardware Implementations
- Atsushi Miyamoto, Naofumi Homma, Takafumi Aoki, and Akashi Satoh,

International Conference on Field Programmable Logic and Applications (*FPL 08*), September 2008.

- Bitstream Encryption and Authentication with AES-GCM in Dynamically Reconfigurable Systems
- Yohei Hori, Akashi Satoh, Hirofumi Sakane, and Kenji Toda,

International Conference on Field Programmable Logic and Applications (*FPL 08*), September 2008.

- Collision-based Power Analysis of Modular Exponentiation Using Chosen-message Pairs
- Naofumi Homma, Atsushi Miyamoto, Takafumi Aoki, Akashi Satoh, and Adi Shamir,

Cryptographic Hardware and Embedded Systems (*CHES 2008*), Lecture Notes in Computer Science, vol. 5154, August 2008.

- High-performance Concurrent Error Detection Scheme for AES Hardware
- Akashi Satoh, Takeshi Sugawara, Naofumi Homma, and Takafumi Aoki,

Cryptographic Hardware and Embedded Systems (*CHES 2008*), Lecture Notes in Computer Science, vol. 5154, pp. 100-112, August 2008.

- Enhanced Power Analysis Attack Using Chosen Message Against RSA Hardware Implementations
- Atsushi Miyamoto, Naofumi Homma, Takafumi Aoki, and Akashi Satoh,

Proceedings of 2008 IEEE International Symposium on Circuits and Systems (*ISCAS 2008*), (poster), May 2008.

- High-performance ASIC Implementations of the 128-bit Block Cipher CLEFIA
- Taksehi Sugawara, Naofumi Homma, Takafumi Aoki, and Akashi Satoh,

Proceedings of 2008 IEEE International Symposium on Circuits and Systems (*ISCAS 2008*), pp. 2925-2928, May 2008.

- ASIC Hardware Implementations for 512-Bit Hash Function Whirlpool
- Akashi Satoh,

Proceedings of 2008 IEEE International Symposium on Circuits and Systems (*ISCAS 2008*), pp. 2917-2920, May 2008.

- High-Speed Pipelined Hardware Architecture for Galois Counter Mode
- Akashi Satoh,

Information Security Conference 2007 (*ISC 2007*), Lecture Notes in Computer Science, vol. 4779, pp. 118-129, October 2007.

- ASIC performance comparison for the ISO standard block ciphers
- Takeshi Sugawara, Naofumi Homma, Takafumi Aoki, and Akashi Satoh,

The 2nd Joint Workshop on Information Security (*JWIS2007*), pp. 485-498, August 2007.

- High-Speed Parallel Hardware Architecture for Galois Counter Mode
- Akashi Satoh,

Proceedings of 2007 IEEE International Symposium on Circuits and Systems (*ISCAS 2007*), pp.1863 - 1866, May 2007.

- A High-performance ASIC Implementation of the 64-bit Block Cipher CAST-128
- Takeshi Sugawara, Naofumi Homma, Takafumi Aoki, and Akashi Satoh,

Proceedings of 2007 IEEE International Symposium on Circuits and Systems (*ISCAS 2007*), pp. 1859 - 1862, May 2007.

- SPA against RSA processor with High-Radix Montgomery Multiplier on an FPGA
- Atsushi Miyamoto, Naofumi Homma, Takafumi Aoki, and Akashi Satoh,

Proceedings of 2007 IEEE International Symposium on Circuits and Systems (*ISCAS 2007*), pp. 1847 - 1850, May 2007.

- DPA using Phase-Based Waveform Matching against Random-Delay Countermeasure
- Sei Nagashima, Naofumi Homma, Yuichi Imai, Takafumi Aoki, and Akashi Satoh,

Proceedings of 2007 IEEE International Symposium on Circuits and Systems (*ISCAS 2007*), pp. 1807 - 1810, May 2007.

- High-Resolution Side-Channel Attack Using Phase-Based Waveform Matching
- Naofumi Homma, Sei Nagashima, Yuichi Imai, Takafumi Aoki, and Akashi Satoh,

Cryptographic Hardware and Embedded Systems (*CHES 2006*), Lecture Notes in Computer Science, vol. 4249, pp. 187-200, October 2006.