Seguir
Hideaki Sone
Hideaki Sone
Dirección de correo verificada de tohoku.ac.jp - Página principal
Título
Citado por
Citado por
Año
A Threat for Tablet PCs in Public Space: Remote Visualization of Screen Images Using EM Emanation
Y Hayashi, N Homma, M Miura, T Aoki, H Sone
Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications …, 2014
902014
Analysis of electromagnetic information leakage from cryptographic devices with different physical structures
YI Hayashi, N Homma, T Mizuki, T Aoki, H Sone, L Sauvage, JL Danger
IEEE Transactions on Electromagnetic Compatibility 55 (3), 571-580, 2013
842013
Role of the metallic phase arc discharge on arc erosion in Ag contacts
H Sone, T Takagi
IEEE Transactions on Components, Hybrids, and Manufacturing Technology 13 (1 …, 1990
671990
Flexible access management system for campus VLAN based on OpenFlow
Y Yamasaki, Y Miyamoto, J Yamato, H Goto, H Sone
2011 IEEE/IPSJ International Symposium on Applications and the Internet, 347-351, 2011
602011
Card-based protocols for any boolean function
T Nishida, Y Hayashi, T Mizuki, H Sone
Theory and Applications of Models of Computation: 12th Annual Conference …, 2015
592015
The Minimum Number of Cards in Practical Card-Based Protocols
J Kastner, A Koch, S Walzer, D Miyahara, Y Hayashi, T Mizuki, H Sone
International Conference on the Theory and Application of Cryptology and …, 2017
582017
Non-invasive EMI-based fault injection attack against cryptographic modules
Y Hayashi, N Homma, T Sugawara, T Mizuki, T Aoki, H Sone
2011 IEEE International Symposium on Electromagnetic Compatibility, 763-767, 2011
482011
Securely computing the three-input majority function with eight cards
T Nishida, T Mizuki, H Sone
International Conference on Theory and Practice of Natural Computing, 193-204, 2013
472013
Transient IEMI threats for cryptographic devices
Y Hayashi, N Homma, T Mizuki, T Aoki, H Sone
IEEE transactions on Electromagnetic Compatibility 55 (1), 140-148, 2013
442013
Interactive physical zero-knowledge proof for Norinori
JG Dumas, P Lafourcade, D Miyahara, T Mizuki, T Sasaki, H Sone
Computing and Combinatorics: 25th International Conference, COCOON 2019, Xi …, 2019
432019
Efficient evaluation of EM radiation associated with information leakage from cryptographic devices
Y Hayashi, N Homma, T Mizuki, H Shimada, T Aoki, H Sone, L Sauvage, ...
IEEE Transactions on Electromagnetic Compatibility 55 (3), 555-563, 2013
422013
Card-Based Physical Zero-Knowledge Proof for Kakuro
D MIYAHARA, T SASAKI, T MIZUKI, H SONE
IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and …, 2019
402019
A new dynamical domain decomposition method for parallel molecular dynamics simulation
V Zhakhovskii, K Nishihara, Y Fukuda, S Shimojo, T Akiyama, S Miyanaga, ...
CCGrid 2005. IEEE International Symposium on Cluster Computing and the Grid …, 2005
402005
Five-Card AND Protocol in Committed Format Using Only Practical Shuffles
Y Abe, Y Hayashi, T Mizuki, H Sone
Proceedings of the 5th ACM on ASIA Public-Key Cryptography Workshop, 3-8, 2018
332018
Spectrum analysis on cryptographic modules to counteract side-channel attacks
T Sugawara, Y Hayashi, N Homma, T Mizuki, T Aoki, H Sone, A Satoh
EMC 9, 21-24, 2009
332009
Pile-Shifting Scramble for Card-Based Protocols
A NISHIMURA, Y HAYASHI, T MIZUKI, H SONE
IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and …, 2018
292018
Card-based protocols using unequal division shuffles
A Nishimura, T Nishida, Y Hayashi, T Mizuki, H Sone
Soft Computing 22 (2), 361-371, 2018
282018
Securely computing three-input functions with eight cards
T Nishida, Y Hayashi, T Mizuki, H Sone
IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and …, 2015
282015
Mechanism behind information leakage in electromagnetic analysis of cryptographic modules
T Sugawara, Y Hayashi, N Homma, T Mizuki, T Aoki, H Sone, A Satoh
International Workshop on Information Security Applications, 66-78, 2009
272009
Card-based zero-knowledge proof for sudoku
T Sasaki, T Mizuki, H Sone
9th International Conference on Fun with Algorithms (FUN 2018), 2018
242018
El sistema no puede realizar la operación en estos momentos. Inténtalo de nuevo más tarde.
Artículos 1–20