Author of the publication

Differential power analysis of AES ASIC implementations with various S-box circuits.

, , , and . ECCTD, page 395-398. IEEE, (2009)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Unified Coprocessor Architecture for Secure Key Storage and Challenge-Response Authentication., , , , , and . IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 97-A (1): 264-274 (2014)On measurable side-channel leaks inside ASIC design primitives., , , , and . J. Cryptogr. Eng., 4 (1): 59-73 (2014)SAEB: A Lightweight Blockcipher-Based AEAD Mode of Operation., , , and . IACR Trans. Cryptogr. Hardw. Embed. Syst., 2018 (2): 192-217 (2018)An Abstraction Model for 1-bit Probing Attack on Block Ciphers., , , and . ICCCS, page 502-506. IEEE, (2019)Differential power analysis of AES ASIC implementations with various S-box circuits., , , and . ECCTD, page 395-398. IEEE, (2009)Mechanism behind Information Leakage in Electromagnetic Analysis of Cryptographic Modules., , , , , , and . WISA, volume 5932 of Lecture Notes in Computer Science, page 66-78. Springer, (2009)High-performance ASIC implementations of the 128-bit block cipher CLEFIA., , , and . ISCAS, page 2925-2928. IEEE, (2008)AquaSonic: Acoustic Manipulation of Underwater Data Center Operations and Resource Management., , , , , , , and . CoRR, (2024)The Exact Multi-user Security of (Tweakable) Key Alternating Ciphers with a Single Permutation., , and . EUROCRYPT (1), volume 14651 of Lecture Notes in Computer Science, page 97-127. Springer, (2024)Exploring Leakage Characteristics and Attacks Through Profiles of Screaming Channels., , , , and . MobiSec, volume 2095 of Communications in Computer and Information Science, page 152-166. Springer, (2023)