Kazuo Sakiyama
Título
Citado por
Citado por
Año
Elliptic-curve-based security processor for RFID
YK Lee, K Sakiyama, L Batina, I Verbauwhede
IEEE Transactions on Computers 57 (11), 1514-1527, 2008
2602008
Fault sensitivity analysis
Y Li, K Sakiyama, S Gomisawa, T Fukunaga, J Takahashi, K Ohta
International Workshop on Cryptographic Hardware and Embedded Systems, 320-334, 2010
1912010
Low-cost elliptic curve cryptography for wireless sensor networks
L Batina, N Mentens, K Sakiyama, B Preneel, I Verbauwhede
European Workshop on Security in Ad-hoc and Sensor Networks, 6-17, 2006
1712006
Multicore curve-based cryptoprocessor with reconfigurable modular arithmetic logic units over GF (2^ n)
K Sakiyama, L Batina, B Preneel, I Verbauwhede
IEEE Transactions on Computers 56 (9), 1269-1282, 2007
782007
On the power of fault sensitivity analysis and collision side-channel attacks in a combined setting
A Moradi, O Mischke, C Paar, Y Li, K Ohta, K Sakiyama
International Workshop on Cryptographic Hardware and Embedded Systems, 292-311, 2011
672011
Fair and consistent hardware evaluation of fourteen round two SHA-3 candidates
M Knezevic, K Kobayashi, J Ikegami, S Matsuo, A Satoh, Ü Kocabas, ...
IEEE Transactions on Very Large Scale Integration (VLSI) Systems 20 (5), 827-840, 2011
642011
Information-theoretic approach to optimal differential fault analysis
K Sakiyama, Y Li, M Iwamoto, K Ohta
Information Forensics and Security, IEEE Transactions on 7 (1), 109-120, 2012
612012
System for biometric signal processing with hardware and software acceleration
I Verbauwhede, P Schaumont, D Hwang, BC Lai, S Yang, K Sakiyama, ...
US Patent App. 10/554,763, 2007
562007
Superscalar coprocessor for high-speed curve-based cryptography
K Sakiyama, L Batina, B Preneel, I Verbauwhede
International Workshop on Cryptographic Hardware and Embedded Systems, 415-429, 2006
552006
Evaluation of Hardware Performance for the SHA-3 Candidates Using SASEBO-GII.
K Kobayashi, J Ikegami, KS Shin'ichiro Matsuo, K Sakiyama, K Ohta
IACR Cryptol. ePrint Arch. 2010, 10, 2010
462010
How can we conduct fair and consistent hardware evaluation for SHA-3 candidate
S Matsuo, M Knezevic, P Schaumont, I Verbauwhede, A Satoh, ...
2nd SHA-3 Candidate Conference, Santa Barbara, August, 23-24, 2010
442010
A parallel processing hardware architecture for elliptic curve cryptosystems
K Sakiyama, E De Mulder, B Preneel, I Verbauwhede
2006 IEEE International Conference on Acoustics Speech and Signal Processing …, 2006
442006
New fault-based side-channel attack using fault sensitivity
Y Li, K Ohta, K Sakiyama
IEEE Transactions on Information Forensics and Security 7 (1), 88-97, 2011
412011
Montgomery modular multiplication algorithm on multi-core systems
J Fan, K Sakiyama, I Verbauwhede
2007 IEEE Workshop on Signal Processing Systems, 261-266, 2007
412007
Uniqueness enhancement of PUF responses based on the locations of random outputting RS latches
D Yamamoto, K Sakiyama, M Iwamoto, K Ohta, T Ochiai, M Takenaka, ...
International Workshop on Cryptographic Hardware and Embedded Systems, 390-406, 2011
402011
Elliptic curve cryptography on embedded multicore systems
J Fan, K Sakiyama, I Verbauwhede
Design Automation for Embedded Systems 12 (3), 231-242, 2008
382008
Non-full-active Super-Sbox analysis: applications to ECHO and Grøstl
Y Sasaki, Y Li, L Wang, K Sakiyama, K Ohta
International Conference on the Theory and Application of Cryptology and …, 2010
362010
Modular Reduction in GF(2 n ) without Pre-computational Phase
M Knežević, K Sakiyama, J Fan, I Verbauwhede
International Workshop on the Arithmetic of Finite Fields, 77-87, 2008
362008
Tripartite modular multiplication
K Sakiyama, M Knežević, J Fan, B Preneel, I Verbauwhede
Integration 44 (4), 259-269, 2011
352011
A new arbiter PUF for enhancing unpredictability on FPGA
T Machida, D Yamamoto, M Iwamoto, K Sakiyama
The Scientific World Journal 2015, 2015
332015
El sistema no puede realizar la operación en estos momentos. Inténtalo de nuevo más tarde.
Artículos 1–20