Published papers
Number of published data : 144
No. Classification Refereed paper Title Authorship Author Journal Volume/issue/page Publication date ISSN DOI URL
1 Tutorial
No
サイドチャネル攻撃と耐タンパー技術

崎山一男
電子情報通信学会知識ベース
1群-3編-14章/ 6, ---
2019/07



2 Tutorial
No
組込機器のセキュリティを脅かすレーザーフォールト攻撃

菅原健, 崎山一男
レーザー学会誌
77/ 6, 305-309
2019/06



3 General remarks
No
現代暗号を脅かす「サイドチャネル攻撃」とは

Kazuo Sakiyama, and Kazuo Ohta
Science Journal KAGAKU
78/ 10, 1080-1083
2008/10



4 Paper
Yes
Mixture-Based 5-Round Physical Attack against AES: Attack Proposal and Noise Evaluation
Joint
Go Takami, Takeshi Sugawara, Kazuo Sakiyama, and Yang Li
IEICE Trans. Fundam. Electron. Commun. Comput. Sci.
XX/ YY, ZZ-
2022



5 Paper
Yes
Design and concept proof of an inductive impulse self-destructor in sense-and-react countermeasure against physical attacks
Joint
Sho Tada, Yuki Yamashita, Kohei Matsuda, Makoto Nagata, Kazuo Sakiyama, and Noriyuki Miura
Japanese Journal of Applied Physics (JJAP)
60/ SGGL01, 7pages-
2021



6 Paper
Yes
Evaluation of Side-Channel Attack Resistance on LFI Detection Circuits

羽田野凌太, 平田 遼, 松田航平, 三浦典之, 李陽, 崎山一男
電子情報通信学会論文誌(A)
J104-A/ 5, 118-126
2021



7 Paper
Yes
Countermeasure Against Deep Learning-Based Cloning Attack on Arbiter PUF by Using Intentional Errors
Joint
八代理紗, 堀洋平, 片下敏宏, 崎山一男
情報処理学会論文誌
1871-1880
2020



8 Paper
Yes
An IC-level countermeasure against laser fault injection attack by information leakage sensing based on laser-induced opto-electric bulk current density
Joint
Kohei Matsuda, Sho Tada, Makoto Nagata, Yuichi Komano, Yang Li, Takeshi Sugawara, Mitsugu Iwamoto, Kazuo Ohta, Kazuo Sakiyama, and Noriyuki Miura
Japanese Journal of Applied Physics (JJAP)
59/ SGGL02, 12pages-
2020



9 Paper
Yes
Flush Code Eraser: Fast Attack Response to Invalidate Cryptographic Sensitive Data
Joint
Kazuo Sakiyama, Tatsuya Fujii, Kohei Matsuda, and Noriyuki Miura
IEEE Embedded Systems Letters
12/ 2, 37-40
2020



10 Paper
Yes
Fingerprinting Light Emitting Diodes Using Spectrometer,
Joint
Akiko Toh, Yang Li, Kazuo Sakiyama, and Takeshi Sugawara
IET Electronics Letters
55/ 24, 1295-1297
2019



11 Paper
Yes
Side-Channel Leakage from Sensor-Based Countermeasures against Fault Injection Attack
Joint
Takeshi Sugawara, Natsu Shoji, Kazuo Sakiyama, Kohei Matsuda, Noriyuki Miura, and Makoto Nagata
Microelectronics Journal
90, 63-71
2019



12 Paper
Yes
Oscillator without a Combinatorial Loop and its Threat to FPGA in Data Center
Joint
Takeshi Sugawara, Kazuo Sakiyama, Shoei Nashimoto, Daisuke Suzuki, Tomoyuki Nagatsuka
IET Electronics Letters
55/ 11, 640-642
2019



13 Paper
Yes
Probing Attack of Share-Serial Threshold Implementation of AES
Joint
Takeshi Sugawara, Yang Li, and Kazuo Sakiyama
IET Electronics Letters
55/ 9, 517-519
2019



14 Paper
Yes
Single-Round Pattern Matching Key Generation Using Physically Unclonable Function
Joint
Yuichi Komano, Kazuo Ohta, Kazuo Sakiyama, Mitsugu Iwamoto, and Ingrid Verbauwhede
Security and Communication Networks
Vol.2019/ Article ID 1719585, 13pages-
2019/01



15 Paper
Yes
A 286 F2/Cell Distributed Bulk-Current Sensor and Secure Flush Code Eraser against Laser Fault Injection Attack on Cryptographic Processor
Joint
Kohei Matsuda, Tatsuya Fujii, Natsu Shoji, 
Takeshi Sugawara, Kazuo Sakiyama, Yu-ichi Hayashi, 
Makoto Nagata, and Noriyuki Miura
IEEE Journal of Solid-State Circuits
53/ 11, 3174-3182
2018/11



16 Paper
Yes
Q-class Authentication System for Double Arbiter PUF
Joint
Risa Yashiro,Takeshi Sugawara,Mitsugu Iwamoto, and Kazuo Sakiyama
IEICE Trans. Fundam. Electron. Commun. Comput. Sci.
E101-A/ 1, 129-137
2018/01



17 Paper
Yes
Protecting cryptographic integrated circuits with side-channel information
Joint
Makoto Nagata,Daisuke Fujimoto,Noriyuki Miura,Naofumi Homma,Yu-ichi Hayashi, and Kazuo Sakiyama
Electronic Express, IEICE
14/ 2, 1-13
2017/01



18 Paper
Yes
Fully Integrated Passive UHF RFID Tag for Hash-Based Mutual Authentication Protocol
Joint
Shugo Mikami, Dai Watanabe, Yang Li, and Kazuo Sakiyama
The Scientific World Journal, Hindawi
2015/ Article ID 498610, 11 pages-
2015/08



19 Paper
Yes
A New Arbiter PUF for Enhancing Unpredictability on FPGA
Joint
Takanori Machida, Dai Yamamoto, Mitsugu Iwamoto, and Kazuo Sakiyama
The Scientific World Journal, Hindawi
Volume 2015/ Article ID 864812, 13 pages-
2015/08



20 Paper
Yes
Protecting cryptographic integrated circuits with side-channel information
Joint
Makoto Nagata,Daisuke Fujimoto,Noriyuki Miura,Naofumi Homma,Yu-ichi Hayashi,andKazuo Sakiyama.
Electronic Express,IEICE
14/ 2, 20162005-
2017/01



21 Paper
Yes
A new method for enhancing variety and maintaining reliability of PUF responses and its evaluation on ASICs Journal of Cryptographic Engineering
Joint
Dai Yamamoto, Kazuo Sakiyama, Mitsugu Iwamoto, Kazuo Ohta, Masahiko Takenaka, Kouichi Itoh, and Naoya Torii
J. Cryptographic Engineering
5/ 3, 187-199
2015/09



22 Paper
Yes
A Silicon-level Countermeasure against Fault Sensitivity Analysis and Its Evaluation
Joint
Sho Endo, Yang Li, Naofumi Homma, Kazuo Sakiyama, Kazuo Ohta, Daisuke Fujimoto, Makoto Nagata, Toshihiro Katashita, Jean-Luc Danger, and Takafumi Aoki
IEEE Trans. Very Large Scale Integr. (VLSI) Syst.
23/ 8, 1429-1438
2014/08



23 Paper
Yes
New Side-Channel Analysis Using Clockwise Collision Leakage Model and Weak Keys on Parallelized AES Hardware

Toshiki Nakasone, Yang Li, Kazuo Ohta, and Kazuo Sakiyama
電子情報通信学会論文誌(A)
J97-A/ 11, 695-703
2014/11



24 Paper
Yes
Power Noise Measurements of Cryptographic VLSI Circuits Regarding Side-Channel Information Leakage

Daisuke Fujimoto, Noriyuki Miura, Makoto Nagata, Yuichi Hayashi, Naofumi Homma, Takafumi Aoki, Yohei Hori, Toshihiro Katashita, Kazuo Sakiyama, Thanh-Ha Le, Julien Bringer, Pirouz Bazargan-Sabet, Shivam Bhasin, and Jean-Luc Danger
IEICE Trans. Electronics
E97-C/ 4, 272-279
2014/04



25 Paper
Yes
Practical improvements of side-channel attacks on AES: feedback from the 2nd DPA contest
Joint
Christophe Clavier, Jean-Luc Danger, Guillaume Duc, M. Abdelaziz Elaabid, Benoît Gérard, Sylvain Guilley, Annelie Heuser, Michael Kasper, Yang Li, Victor Lomné, Daisuke Nakatsu, Kazuo Ohta, Kazuo Sakiyama, Laurent Sauvage, Werner Schindler, Marc Stöttinger, Nicolas Veyrat-Charvillon, Matthieu Walle, Antoine Wurcker
J. Cryptographic Engineering
4/ 1, 1-16
2014/04



26 Paper
Yes
Practical DFA Strategy for AES Under Limited-Access Conditions

Kazuo Sakiyama, Yang Li, Shigeto Gomisawa, Yu-ichi Hayashi, Mitsugu Iwamoto, Naofumi Homma, Takafumi Aoki, and Kazuo Ohta
Journal of Information Processing
55/ 2, (Preprint)-
2014/02



27 Paper
Yes
Variety Enhancement of PUF Responses Using the Locations of Random Outputting RS Latches

Dai Yamamoto, Kazuo Sakiyama, Mitsugu Iwamoto, Kazuo Ohta, Masahiko Takenaka, and Kouichi Itoh
J. Cryptographic Engineering
3/ 4, 197-211
2013/11



28 Paper
Yes
Correlation Power Analysis and Countermeasure on the Stream Cipher Enocoro-128v2

Shugo Mikami, Hirotaka Yoshida, Dai Watanabe, Kazuo Sakiyama
IEICE Trans. Fundam. Electron. Commun. Comput. Sci.
A96-A/ 3, 697-704
2013/01



29 Paper
No
A New Type of Fault-Based Attack: Faulty Behavior
Analysis

Yang Li, Kazuo Ohta, and Kazuo Sakiyama
IEICE Trans. Fundam. Electron. Commun. Comput. Sci.
A96-A/ 1, 177-184
2013/01



30 Paper
Yes
Fault Sensitivity Analysis Using Multiple Factors

Ayaka Koike, Yang Li, Daisuke Nakatsu, Kazuo Ohta, Kazuo Sakiyama
電子情報通信学会論文誌(A)
95/ 10, 751-755
2012/10



31 Paper
Yes
Fair and Consistent Hardware Evaluation of Fourteen Round Two SHA-3 Candidates

Miroslav Knežević, Kazuyuki Kobayashi, Jun Ikegami, Shin'ichiro Matsuo, Akashi Satoh, Ünal Kocabaş, Junfeng Fan, Toshihiro Katashita, Takeshi Sugawara, Kazuo Sakiyama, Ingrid Verbauwhede, Kazuo Ohta, Naofumi Homma, and Takafumi Aoki
IEEE Transactions on Very Large Scale Integration (VLSI) Systems
20/ 5, 827-840
2012/05



32 Paper
Yes
Information-Theoretic Approach to Optimal Differential Fault Analysis

Kazuo Sakiyama, Yang Li, Mitsugu Iwamoto, and Kazuo Ohta
IEEE Transactions on Information Forensics and Security
7/ 1, 109-120
2012/02



33 Paper
Yes
New Fault-Based Side-Channel Attack Using Fault Sensitivity

Yang Li, Kazuo Ohta, and Kazuo Sakiyama
IEEE Transactions on Information Forensics and Security
7/ 1, 88-97
2012/02



34 Paper
Yes
Differential Fault Analysis on Stream Cipher MUGI

Junko Takahashi, Toshinori Fukunaga, and Kazuo Sakiyama
IEICE Transactions on Fundamentals of Electronics, Communications and Computer Science
A95-A/ 01, 242-251
2012/01



35 Paper
Yes
Toward Effective Countermeasures against an Improved Fault Sensitivity Analysis

Yang Li, Kazuo Ohta, and Kazuo Sakiyama
IEICE Transactions on Fundamentals of Electronics, Communications and Computer Science
A95-A/ 01, 234-241
2012/01



36 Paper
Yes
Meet-in-the-Middle (Second) Preimage Attacks on Two Double-Branch Hash Functions RIPEMD and RIPEMD-128

Lei Wang, Yu Sasaki, Wataru Komatsubara, Kazuo Sakiyama, and Kazuo Ohta
IEICE Transactions on Fundamentals of Electronics, Communications and Computer Science
A95-A/ 01, 100-110
2012/01



37 Paper
Yes
Tripartite modular multiplication

Kazuo Sakiyama, Miroslav Knežević, Junfeng Fan, Bart Preneel, and Ingrid Verbauwhede
Integration-the VLSI Journal
44/ 4, 259-269
2011/09



38 Paper
Yes
Power Analysis against a DPA-Resistant S-box Implementation Based on the Fourier Transform

Yang Li, Kazuo Sakiyama, Shinichi Kawamura, and Kazuo Ohta
IEICE Transactions on Fundamentals of Electronics, Communications and Computer Science
E94-A/ 01, 191-199
2011/01



39 Paper
Yes
An Efficient Authentication for Lightweight Devices by Perfecting Zero-Knowledgeness

Bagus Santoso, Kazuo Ohta, Kazuo Sakiyama, Goichiro Hanaoka
IEICE Transactions on Fundamentals of Electronics, Communications and Computer Science
E94-A/ 01, 92-103
2011/01



40 Paper
Yes
Cryptanalysis of Two MD5-Based Authentication Protocols: APOP and NMAC

Lei Wang, Kazuo Ohta, Yu Sasaki, Kazuo Sakiyama, and Noboru Kunihiro
IEICE Transactions on Information and Systems
E93-D/ 05, 1087-1095
2010/05



41 Paper
Yes
On Clock-Based Fault Analysis Attack for an AES Hardware Using RSL

Kazuo Sakiyama and Kazuo Ohta
IEICE Transactions on Fundamentals of Electronics, Communications and Computer Science
E93-A/ 01, 172-179
2010/01



42 Paper
Yes
Elliptic Curve Based Security Processor for RFID

Yong Ki Lee, Kazuo Sakiyama, Lejla Batina, and Ingrid Verbauwhede
IEEE Transactions on Computers
57/ 11, 1514-1527
2008/11



43 Paper
Yes
Elliptic curve cryptography on embedded multicore systems

Junfeng Fan, Kazuo Sakiyama, and Ingrid Verbauwhede
Design Automation for Embedded Systems
12/ 3, 231-242
2008/09



44 Paper
Yes
Multicore Curve-Based Cryptoprocessor with Reconfigurable Modular Arithmetic Logic Units over GF(2n)

Kazuo Sakiyama, Lejla Batina, Bart Preneel, and Ingrid Verbauwhede
IEEE Transactions on Computers
56/ 9, 1269-1282
2007/09



45 Paper
Yes
HW/SW co-design for Public-Key cryptosystems on the 8051 micro-controller

Kazuo Sakiyama, Lejla Batina, Bart Preneel, and Ingrid Verbauwhede
Computers & Electrical Engineering
33/ 5-6, 324-332
2007/09



46 Paper
Yes
High-performance Public-key Cryptoprocessor for Wireless Mobile Applications

Kazuo Sakiyama, Lejla Batina, Bart Preneel, and Ingrid Verbauwhede
Mobile Networks Applications
12/ 4, 245-258
2007/08



47 Paper
Yes
Reconfigurable modular arithmetic logic unit Supporting high-performance RSA and ECC over GF(p)

Kazuo Sakiyama, Nele Mentens, Lejla Batina, Bart Preneel, and Ingrid Verbauwhede
International Journal of Electronics
94/ 5, 501-514
2007/05



48 Paper
Yes
Efficient and Secure Fingerprint Verification for Embedded Devices

Shenglin Yang, Kazuo Sakiyama, and Ingrid Verbauwhede
EURASIP Journal on Advances in Signal Processing
2006, 1-11
2006/05



49 Paper
Yes
EL/PL hybrid device enhanced by UV emission from ZnF2:Gd thin film electroluminescence

Young-Jae Cho, Takashi Hirakawa, Kazuo Sakiyama, Hiroaki Okamoto, and Yoshihiro Hamakawa
Journal of the Korean Physical Society
30/ 1997, S65-S68
1997/01



50 Paper
Yes
ZnF2:Gd Thin Film Electroluminescent Device

Young-Jae Cho, Takashi Hirakawa, Kazuo Sakiyama, Hiroaki Okamoto, and Yoshihiro Hamakawa
Applied Surface Science
113-114/ 1997, 705-708
1997/04



51 International conference proceedings, etc.
Yes
A Key Recovery Algorithm Using Random Key Leakage from AES Key Schedule
Joint
Tomoki Uemura, Yohei Watanabe, Yang Li, Noriyuki Miura, Iwamoto Mitsugu, Kazuo Sakiyama, and Kazuo Ohta
The International Symposium on Information Theory and Its Applications, (ISITA’20)
382-386
2020/10



52 International conference proceedings, etc.
Yes
Simple Electromagnetic Analysis Against Activation Functions of Deep Neural Networks
Joint
Go Takatoi, Takeshi Sugawara, Kazuo Sakiyama, and Yang Li
Artificial Intelligence in Hardware Security (AIHWS’20)
LNCS/ 12418, 181-197
2020/10



53 International conference proceedings, etc.
Yes
Low-Memory Implementation of Authenticated Encryption Algorithm SAEAES on ARM Cortex-M0 Microcontroller
Joint
Marika Yabu, Kazuo Sakiyama, and Takeshi Sugawara
Global Conference on Consumer Electronics (GCCE’20)
181-185
2020/10



54 International conference proceedings, etc.
Yes
An Optimized Implementation of AES-GCM for FPGA Acceleration Using High-Level Synthesis
Joint
Tsubasa Takaki, Yang Li, Kazuo Sakiyama, Shoei Nashimoto, Daisuke Suzuki,and Takeshi Sugawara
Global Conference on Consumer Electronics (GCCE’20)
176-180
2020/10



55 International conference proceedings, etc.
Yes
An Inductive Impulse Self-Destructor in Sense-and-ReactCountermeasure Against Physical Attacks
Joint
Sho Tada, Kohei Matsuda, Makoto Nagata, Kazuo Sakiyama, and Noriyuki Miura,
In Extended Abstracts of International Conference on Solid State Devices and Materials (SSDM’20)
L-9/ 05, 791-792
2020/09



56 International conference proceedings, etc.
Yes
Deep Learning Attack against Large n-XOR PUFs on 180nm Silicon Chips
Joint
Risa Yashiro, Yohei Hori, Toshihiro Katashita, and Kazuo Sakiyama
RISP International Workshop on Nonlinear Circuits, Communications and Signal Processing (NCSP’20)
598-601
2020/03



57 International conference proceedings, etc.
Yes
Side-Channel Leakage of Alarm Signal for a Bulk-Current-Based Laser Sensor
Joint
Yang Li, Ryota Hatano, Sho Tada, Kohei Matsuda, Noriyuki Miura, Takeshi Sugawara, and Kazuo Sakiyama
International Conference on Information Security and Cryptology (Inscrypt’19)
LNCS12020, 346-361
2019/11



58 International conference proceedings, etc.
Yes
A Deep Learning Attack Countermeasure with Intentional Noise for a PUF-based Authentication Scheme
Joint
Risa Yashiro, Yohei Hori, Toshihiro Katashita, and Kazuo Sakiyama
International Conference on Security for Information Technology and Communications (SecITC’19)
LNCS/ 12001, 78-94
2019/11



59 International conference proceedings, etc.
Yes
Validating the DFA Attack Resistance of AES (Short Paper)
Joint
Hakuei Sugimoto, Ryota Hatano, Natsu Shoji, and Kazuo Sakiyama
International Symposium on Foundations & Practice of Security (FPS’19)
LNCS12056, 371-378
2019/11



60 International conference proceedings, etc.
Yes
An Information Leakage Sensor Based on Measurement of Laser-Induced Opto-Electric Bulk Current Density
Joint
Kohei Matsuda, Sho Tada, Makoto Nagata, Yang Li, Takeshi Sugawara, Mitsugu Iwamoto, Kazuo Ohta, Kazuo Sakiyama, and Noriyuki Miura
International Conference on Solid State Devices and Materials (SSDM’19)
501-502
2019/09



61 International conference proceedings, etc.
Yes
An Abstraction Model for 1-bit Probing Attack on Block Ciphers
Joint
Natsu Shoji, Takeshi Sugawara, Mitsugu Iwamoto and Kazuo Sakiyama
International Conference on Computer and Communication Systems (ICCCS’19)
502-506
2019/02



62 International conference proceedings, etc.
Yes
Analysis of Mixed PUF-TRNG Circuit Based on SR-Latches in FD-SOI Technology
Joint
Jean-Luc Danger, Risa Yashiro, Tarik Graba, Sylvain Guilley, Yves Mathieu, Noriyuki Miura, Abdelmalek Si-Merabet, Kazuo Sakiyama, and Makoto Nagata
Euromicro Conference on Digita System Design(DSD'18)
508-515
2018



63 International conference proceedings, etc.
Yes
Recovering Memory Access Sequence with Differential Flush+Reload Attack
Joint
Zhiwei Yuan, Yang Li, Kazuo Sakiyama, Takeshi Sugawara, and Jian Wang
International Conference on Information Security Practice and Experience (ISPEC’18)
424-439
2018/09



64 International conference proceedings, etc.
Yes
A Secure LiDAR with Side-channel Fingerprinting
Joint
Ryuga Matsumura, Takeshi Sugawara, and Kazuo Sakiyama
International Symposium on Computing and Networking, CANDAR Workshops (CANDARW’18)
479-482
2018/08



65 International conference proceedings, etc.
Yes
Sensor CON-Fusion: Defeating Kalman Filter in Signal Injection Attack
Joint
Shoei Nashimoto, Daisuke Suzuki, Takeshi Sugawara, and Kazuo Sakiyama
The 13th ACM ASIA Conference on Information, Computer and Communications Security (ACM ASIACCS 2018)
511-524
2018/06



66 International conference proceedings, etc.
Yes
A 286F2/Cell Distributed Bulk-Current Sensor and Secure Flush Code Eraser Against Laser Fault Injection Attack
Joint
Kohei Matsuda, Tatsuya Fujii, Natsu Shoji, Takeshi Sugawara, Kazuo Sakiyama, Yu-ichi Hayashi, Makoto Nagata, and Noriyuki Miura
2018 IEEE Intl. Solid-State Circuits Conference (ISSCC’18)
IEEE/ #21.5, 352-354
2018/02



67 International conference proceedings, etc.
Yes
Exploiting Bitfip Detector for Non-Invasive Probing and its Application to Ineffective Fault Analysis
Joint
Takeshi Sugawara,Natsu Shoji, Kazuo Sakiyama,Kohei Matsuda,Noriyuki Miura,and Makoto Nagata
Workshop on Fault Diagnosis and Tolerance in Cryptography(FDTC'17)
IEEE, 49-56
2017/09



68 International conference proceedings, etc.
Yes
Efficient Software Implementation of Modular Multiplication in Prime Fields on TI's DSP TMS320C6678
Joint
Eito Miyamoto,Takeshi Sugawara,and Kazuo Sakiyama
International Workshop on Information Security Applications(WISA'2017)
LNCS 10763/ Springer-Verlag, 261-273
2017/08



69 International conference proceedings, etc.
Yes
Improved EM Side-Channel Authentication Using Profile-Based XOR Model
Joint
Momoka Kasuya,and Kazuo Sakiyama
International Workshop on Information Security Applications(WISA'2017)
LNCS 10763/ Springer-Verlag, 173-183
2017/08



70 International conference proceedings, etc.
Yes
On-Chip Substrate-Bounce Monitoring for Laser-Fault Countermeasure
Joint
Kohei Matsuda,Noriyuki Miura,Makoto Nagata,Yu-ichi Hayashi,Tatsuya Fujii, and Kazuo Sakiyama
2016 IEEE Asian Hardware-Oriented Security and Trust (AsianHOST'06)
IEEE, 1-6
2016/12



71 International conference proceedings, etc.
Yes
Deep-Learning-Based Security Evaluation on Authentication Systems Using Arbiter PUF and Its Variants
Joint
Risa Yashiro,Takanori Machida, Mitsugu Iwamoto, and Kazuo Sakiyama
International Workshop on Security 2016 (IWSEC'16)
LNCS 9836/ Springer-Verlag, 267-285
2016/09



72 International conference proceedings, etc.
Yes
New Metric for Side-Channel Information Leakage:Case Study on EM Radiation from AES Hardware
Joint
Momoka Kasuya,Takanori Machida,and Kazuo Sakiyama
URSI Asia-Pacific Radio Science Conference (URSI AP-PASC'16)
1-4
2016/08



73 International conference proceedings, etc.
Yes
Circuit-Level Information Leakage Prevention for Fault Detection
Joint
Kazuo Sakiyama, Reina Yagasaki, Takanori Machida, Tatsuya Fujii, and Yu-ichi Hayashi
URSI Asia-Pacific Radio Science Conference (URSI AP-PASC'16)
1-4
2016/08



74 International conference proceedings, etc.
Yes
Physical Authentication Using Side-Channel Information
Joint
Kazuo Sakiyama, Momoka Kasuya, Takanori Machida, Arisa Matsubara, Yunfeng Kuai, Yu-ichi Hayashi, Takaaki Mizuki, Noriyuki Miura, and Makoto Nagata
International Conference on Information and Communication Technology (ICoICT'16)
1-6
2016/06



75 International conference proceedings, etc.
Yes
A Performance Evaluation of Cryptographic Algorithms on FPGA and ASIC on RFID Design Flow
Joint
Shugo Mikami, Dai watanabe, and Kazuo Sakiyama
International Conference on Information and Communication Technology (ICoICT'16)
1-6
2016/06



76 International conference proceedings, etc.
Yes
Artifact-Metric-Based Authentication for Bottles of Wine
Joint
Reina Yagasaki and Kazuo Sakiyama
International Workshop on Security 2015 (IWSEC’15)
LNCS 9241/ Springer-Verlag, 335-344
2015/08



77 International conference proceedings, etc.
Yes
Advanced Fault Analysis Techniques on AES
Joint
Kazuo Sakiyama, Takanori Machida, and Arisa Matsubara
Joint IEEE International Symposium on Electromagnetic Compatibility and EMC Europe (EMC’15)
230-234
2015/08



78 International conference proceedings, etc.
Yes
Implementation of Double Arbiter PUF and Its Performance Evaluation on FPGA
Joint
Takanori Machida, Dai Yamamoto, Mitsugu Iwamoto, and Kazuo Sakiyama
20th Asia and South Pacific Design Automation Conference (ASP-DAC 2015)
6-7
2015/01



79 International conference proceedings, etc.
Yes
Single-Chip Implementation and Evaluation of Passive UHF RFID Tag with Hash-Based Mutual Authentication
Joint
Yang Li, Shugo Mikami, Dai Watanabe, Kazuo Ohta, and Kazuo Sakiyama
In Proc. Workshop on RFID Security (RFIDsec’14 Asia), IOS Press
3-15
2014/11



80 International conference proceedings, etc.
Yes
A New Mode of Operation for Arbiter PUF to Improve Uniqueness on FPGA
Joint
Takanori Machida, Dai Yamamoto, Mitsugu Iwamoto, and Kazuo Sakiyama
The Federated Conference on Coputer Science and Information Systems (FedCSIS), 1st Workshop on Emerging Aspects in Information Security (EAIS’14)
871-878
2014/09



81 International conference proceedings, etc.
Yes
Security Evaluation of Bistable Ring PUFs on FPGAs using Differential and Linear Analysis
Joint
Dai Yamamoto, Masahiko Takenaka, Kazuo Sakiyama, and Naoya Torii
The Federated Conference on Coputer Science and Information Systems (FedCSIS), 1st Workshop on Emerging Aspects in Information Security (EAIS’14)
ACSIS-2, 911-918
2014/09



82 International conference proceedings, etc.
Yes
A Technique using PUFs for Protecting Circuit Layout Designs against Reverse Engineering
Joint
Dai Yamamoto, Masahiko Takenaka, Kazuo Sakiyama, and Naoya Torii
International Workshop on Security 2014 (IWSEC’14)
LNCS 8639/ Springer-Verlag, 158-173
2014/09



83 International conference proceedings, etc.
Yes
Software and Hardware Co-Verification for Privacy-Enhanced Passive UHF RFID Tags
Joint
Yang Li, Toshiki Nakasone, and Kazuo Sakiyama
International Symposium on Electromagnetic Compatibility (EMC’14)
752-757
2014/04



84 International conference proceedings, etc.
Yes
Correlation Power Analysis using Bit-Level Biased Activity Plaintexts against AES Core with Countermeasures
Joint
Daisuke Fujimoto, Noriyuki Miura, Makoto Nagata, Yuichi Hayashi, Naofumi Homma, Takafumi Aoki, Yohei Hori, Toshihiro Katashita, Kazuo Sakiyama, Thanh-Ha Le, Julien Bringer, Pirouz Bazargan-Sabet, Shivam Bhasin, and Jean-Luc Danger
International Symposium on Electromagnetic Compatibility, Tokyo (EMC’14/Tokyo)
14P2-A3, 306-309
2014/05



85 International conference proceedings, etc.
Yes
Privacy-Mode Switching: Toward Flexible Privacy Protection for RFID Tags in Internet of Things
Joint
Yang Li, Toshiki Nakasone, Kazuo Ohta, Kazuo Sakiyama
The 11th Annual IEEE Consumer Communications & Networking Conference (CCNC’14)
941-942
2014/01



86 International conference proceedings, etc.
Yes
A Comparative Study of Stream Ciphers and Hash Functions for RFID Authentications

Shugo Mikami, Dai Watanabe, and Kazuo Sakiyama
The 2013 Workshop on RFID and IoT Security (RFIDsec’13 Asia)
11, 83-94
2013/11



87 International conference proceedings, etc.
Yes
Yet Another Fault-Based Leakage in Non-Uniform Faulty Ciphertexts

Yang Li, Yu-ichi Hayashi, Arisa Matsubara, Naofumi Homma, Takafumi Aoki, Kazuo Ohta and Kazuo Sakiyama
The Sixth International Symposium on Foundations & Practice of Security (FPS’13)
LNCS 8352/ Springer-Verlag, 272-287
2013/10



88 International conference proceedings, etc.
Yes
On-chip power noise measurements of cryptographic VLSI circuits and interpretation for side-channel analysis

Daisuke Fujimoto, Noriyuki Miura, Makoto Nagata, Yuichi Hayashi, Naofumi Homma,
Yohei Hori, Toshihiro Katashita, Kazuo Sakiyama, Thanh-Ha Le, Julien Bringer, Pirouz Bazargan-Sabet, Jean-Luc Danger
International Symposium on Electromagnetic Compatibility (EMC EUROPE) 2013
405 - 410
2013/09



89 International conference proceedings, etc.
Yes
Exploration of the CC-EMA Attack Towards Efficient Evaluation of EM Information Leakage

Toshiki Nakasone, Kazuo Sakiyama, Yang Li, and Kazuo Ohta
International Symposium on Electromagnetic Compatibility (EMC EUROPE) 2013
411-414
2013/09



90 International conference proceedings, etc.
Yes
Meet-in-the-Middle Preimage Attacks Revisited: New Results on MD5 and HAVAL

Yu Sasaki, Wataru Komatsubara, Lei Wang, Mitsugu Iwamoto, Kazuo Ohta, and Kazuo Sakiyama
International Conference on Security and Cryptography (SECRYPT’13)
SciTePress, 111-122
2013/07



91 International conference proceedings, etc.
Yes
Coupon Collector’s Problem for Fault Analysis ― High Tolerance for Noisy Fault Injections

Yu Sasaki, Yang Li, Hikaru Sakamoto and Kazuo Sakiyama
Financial Cryptography and Data Security 2013 (FC’13)
LNCS 7859/ Springer-Verlag, 213-220
2013/04



92 International conference proceedings, etc.
Yes
Exploring the Relations Between Fault Sensitivity and Power Consumption

Yang Li, Sho Endo, Nicolas Debande, Naofumi Homma, Takafumi Aoki, Thanh-Ha Le, Jean-Luc Danger, Kazuo Ohta, Kazuo Sakiyama
Constructive Side-Channel Analysis and Secure Design (COSADE’13)
LNCS 7864/ Springer-Verlag, 137-153
2013/03



93 International conference proceedings, etc.
Yes
An Extension of Fault Sensitivity Analysis Based on Clockwise Collision

Yang Li, Kazuo Ohta, and Kazuo Sakiyama
International Conferences on Information Security and Cryptology 2012 (Inscript’12)
LNCS 7763/ Springer-Verlag, 46-59
2012/11



94 International conference proceedings, etc.
Yes
Key-Dependent Weakness of AES-Based Ciphers Under Clockwise Collision Distinguisher

Toshiki Nakasone, Yang Li, Yu Sasaki, Mitsugu Iwamoto, Kazuo Ohta, and Kazuo Sakiyama
International Conference on Information Security and Cryptology 2012 (ICISC’12)
LNCS 7839/ Springer-Verlag, 395-409
2012/11



95 International conference proceedings, etc.
Yes
Boomerang Distinguishers for Full HAS-160 Compression Function

Yu Sasaki, Lei Wang, Yasuhiro Takasaki, Kazuo Sakiyama, and Kazuo Ohta
International Workshop on Security
2012 (IWSEC’12)
LNCS 7631/ Springer-Verlag, 170-181
2012/11



96 International conference proceedings, etc.
Yes
Cryptanalysis of 3D Cipher and 3D-based Hash Function

Lei Wang, Yu Sasaki, Kazuo Sakiyama and Kazuo Ohta
International Workshop on Security 2012 (IWSEC’12)
LNCS 7631/ Springer-Verlag, 170-181
2012/11



97 International conference proceedings, etc.
Yes
An Efficient Countermeasure against Fault Sensitivity Analysis Using Configurable Delay Blocks

Sho Endo, Yang Li, Naofumi Homma, Kazuo Sakiyama, Kazuo Ohta and Takafumi Aoki
Workshop on Fault Diagnosis and Tolerance in Cryptography (FDTC’12)
95-102
2012/09



98 International conference proceedings, etc.
Yes
Measurement of Side-Channel Information from Cryptographic Devices on Security Evaluation Platform: Demonstration of SPACES Project

Sho Endo, Yuichi Hayashi, Naofumi Homma, Takafumi Aoki, Toshihiro Katashita, Yohei Hori, Kazuo Sakiyama, Makoto Nagata, Jean-Luc Danger, Thanh-Ha Le and Pirouz Bazargan Sabet
SICE Annual Conference 2012
313-616
2012/08



99 International conference proceedings, etc.
Yes
Three-Subset Meet-in-the-Middle Attack on Reduced XTEA

Yu Sasaki, Lei Wang, Yasuhide Sakai, Kazuo Sakiyama, and Kazuo Ohta
International Conference on Cryptology in Africa (Africacrypt’12)
LNCS 7374/ Springer-Verlag, 138-154
2012/07



100 International conference proceedings, etc.
Yes
New Truncated Differential Cryptanalysis on 3D Block Cipher

Takuma Koyama, Lei Wang, Yu Sasaki, Kazuo Sakiyama, Kazuo Ohta
International Conference on Information Security Practice and Experience (ISPEC’12)
LNCS 7232/ Springer-Verlag, 109-125
2012/04



101 International conference proceedings, etc.
Yes
Experimental Verification of Super-Sbox Analysis --- Confirmation of Detailed Attack Complexity

Yu Sasaki, Naoyuki Takayanagi, Kazuo Sakiyama, and Kazuo Ohta
International Workshop on Security 2011 (IWSEC'11)
LNCS 7374/ Springer-Verlag, 178-192
2011/11



102 International conference proceedings, etc.
Yes
Intentional Electromagnetic Interference for Fault Analysis on AES Block Cipher IC

Yu-ichi Hayashi, Shigeto Gomisawa, Yang Li, Naofumi Homma, Kazuo Sakiyama, Takafumi Aoki, and Kazuo Ohta
International Workshop on Electromagnetic Compatibility of Integrated Circuits (EMCCOMPO'11)
235-240
2011/11



103 International conference proceedings, etc.
Yes
Uniqueness Enhancement of PUF Responses Based on the Locations of Random Outputting RS Latches

Dai Yamamoto, Kazuo Sakiyama, Mitsugu Iwamoto, Kazuo Ohta, Takao Ochiai, Masahiko Takenaka, Kouichi Itoh
Cryptographic Hardware and Embedded Systems (CHES'11)
LNCS 6917/ Springer-Verlag, 390-406
2011/09



104 International conference proceedings, etc.
Yes
On the Power of Fault Sensitivity Analysis and Collision Side-Channel Attack in a Combined Setting

Amir Moradi, Oliver Mischke, Christof Paar, Yang Li, Kazuo Ohta, Kazuo Sakiyama
Cryptographic Hardware and Embedded Systems (CHES'11)
LNCS 6917/ Springer-Verlag, 292-311
2011/09



105 International conference proceedings, etc.
Yes
Fault Sensitivity Analysis Against Elliptic Curve Cryptosystems

Hikaru Sakamoto, Yang Li, Kazuo Ohta, and Kazuo Sakiyama
Workshop on Fault Diagnosis and Tolerance in Cryptography (FDTC'11)
11-20
2011/06



106 International conference proceedings, etc.
Yes
Revisit Fault Sensitivity Analysis on WDDL-AES

Yang Li, Kazuo Ohta, and Kazuo Sakiyama
International Symposium on Hardware-Oriented Security and Trust (HOST'11)
148-153
2011/06



107 International conference proceedings, etc.
Yes
A Study on Computational Formal Verification for Practical Cryptographic Protocol: The Case of Synchronous RFID Authentication

Yoshikazu Hanatani, Miyako Ohkubo, Shin'ichiro Matsuo, Kazuo Sakiyama, Kazuo Ohta
Real-Life Cryptographic Protocols and Standarization (RLCPS'11)
LNCS 7126/ Springer-Verlag, 70-87
2011/02



108 International conference proceedings, etc.
Yes
(Second) Preimage Attacks on Step-Reduced RIPEMD/RIPEMD-128 with a New Local-Collision Approach

Lei Wang, Yu Sasaki, Wataru Komatsubara, Kazuo Ohta, and Kazuo Sakiyama
RSA Conference 2011, Cryptographer's Track (CT-RSA'11)
LNCS 6558/ Springer-Verlag, 197-212
2011/03



109 International conference proceedings, etc.
Yes
Non-full-active Super-Sbox Analysis: Applications to ECHO and Grøstl

Yu Sasaki, Yang Li, Lei Wang, Kazuo Sakiyama, and Kazuo Ohta
Advances in Cryptology -- ASIACRYPT'10
LNCS 6477/ Springer-Verlag, 38-55
2010/12



110 International conference proceedings, etc.
Yes
Fault Analysis on Stream Cipher MUGI

Junko Takahashi, Toshinori Fukunaga, and Kazuo Sakiyama
International Conference on Information Security and Cryptology (ICISC'10)
LNCS 6829/ Springer-Verlag, 420-434
2010/12



111 International conference proceedings, etc.
Yes
Combination of SW Countermeasure and CPU Modification on FPGA against Power Analysis

Daisuke Nakatsu, Yang Li, Kazuo Sakiyama, and Kazuo Ohta
International Workshop on Information Security Applications (WISA'10)
LNCS 6513/ Springer-Verlag, 258-272
2010/08



112 International conference proceedings, etc.
Yes
Fault Sensitivity Analysis

Yang Li, Kazuo Sakiyama, Shigeto Gomisawa, Toshinori Fukunaga, Junko Takahashi, and Kazuo Ohta
Cryptographic Hardware and Embedded Systems (CHES'10)
LNCS 6225/ Springer-Verlag, 320-334
2010/08



113 International conference proceedings, etc.
Yes
Prototyping Platform for Performance Evaluation of SHA-3 Candidates

Kazuyuki Kobayashi, Jun Ikegami, Miroslav Knezevic, Eric Xu Guo, Shin'ichiro Matsuo, Sinan Huan, Leyla Nazhandali, Unal Kocabas, Junfeng Fan, Akashi Satoh, Patrick Schaumont, Ingrid Verbauwhede, Kazuo Sakiyama and Kazuo Ota
International Symposium on Hardware-Oriented Security and Trust (HOST'10)
60-63
2010/06



114 International conference proceedings, etc.
Yes
Power Variance Analysis Breaks a Masked ASIC Implementations of AES

Yang Li, Kazuo Sakiyama, Lejla Batina, Daisuke Nakatsu, and Kazuo Ohta
Design, Automation and Test in Europe (DATE'10)
1059-1064
2010/03



115 International conference proceedings, etc.
Yes
Improved Countermeasure against Address-bit DPA for ECC Scalar Multiplication

Masami Izumi, Jun Ikegami, Kazuo Sakiyama, and Kazuo Ohta
Design, Automation and Test in Europe (DATE'10)
981-984
2010/03



116 International conference proceedings, etc.
Yes
Improving Efficiency of An 'On the Fly' Identification Scheme by Perfecting Zero-Knowledgeness

Bagus Santoso, Kazuo Ohta, Kazuo Sakiyama, and Goichiro Hanaoka
RSA Conference 2010, Cryptographer's Track (CT-RSA'10)
LNCS 5985/ Springer-Verlag, 284-301
2010/03



117 International conference proceedings, etc.
Yes
Security Evaluation of a DPA-Resistant S-Box Based on the Fourier Transform

Yang Li, Kazuo Sakiyama, Shinichi Kawamura, Yuichi Komano, and Kazuo Ohta
International Conference on Information and Communications Security (ICICS'09)
LNCS 5927/ Springer-Verlag, 3-16
2009/12



118 International conference proceedings, etc.
Yes
Bit-Free Collision: Application to APOP Attack

Lei Wang, Yu Sasaki, Kazuo Sakiyama, and Kazuo Ohta
International Workshop on Security 2009 (IWSEC'09)
LNCS 5824/ Springer-Verlag, 3-21
2009/10



119 International conference proceedings, etc.
Yes
Fault Analysis Attack against an AES Prototype Chip Using RSL

Kazuo Sakiyama, Tatsuya Yagi, and Kazuo Ohta
RSA Conference 2009, Cryptographer's Track (CT-RSA'09)
LNCS 5473/ Springer-Verlag, 429-443
2009/04



120 International conference proceedings, etc.
Yes
A New Approach for Implementing the MPL Method toward Higher SPA Resistance

Masami Izumi, Kazuo Sakiyama, and Kazuo Ohta
International Conference on Availability, Reliability and Security (ARES'09)
181-186
2009/03



121 International conference proceedings, etc.
Yes
Modular Multiplication in GF(2n) without Pre-computational Phase

Miroslav Knezevic, Kazuo Sakiyama, Junfeng Fan, and Ingrid Verbauwhede
International Workshop on the Arithmetic of Finite Fields (WAIFI'08)
LNCS 5130/ Springer-Verlag, 77-87
2008/07



122 International conference proceedings, etc.
Yes
On the High-Throughput Implementation of RIPEMD-160 Hash Algorithm

Miroslav Knezevic, Kazuo Sakiyama, Yong Ki Lee, and Ingrid Verbauwhede
IEEE International Conference on Application-specific Systems, Architectures and Processor (ASAP'08)
85-90
2008/07



123 International conference proceedings, etc.
Yes
FPGA Design for Algebraic Tori-Based Public-Key Cryptography

Junfeng Fan, Lejla Batina, Kazuo Sakiyama, and Ingrid Verbauwhede
Design, Automation and Test in Europe Conference (DATE'08)
1292-1297
2008/03



124 International conference proceedings, etc.
Yes
MONTGOMERY MODULAR MULTIPLICATION ALGORITHM ON MULTI-CORE SYSTEMS

Junfeng Fan, Kazuo Sakiyama, and Ingrid Verbauwhede
IEEE Workshop on Signal Processing Systems (SIPS'07)
261-266
2007/10



125 International conference proceedings, etc.
Yes
A Side-channel Attack Resistant Programmable PKC Coprocessor for Embedded Applications

Nele Mentens, Kazuo Sakiyama, Lejla Batina, Bart Preneel, and Ingrid Verbauwhede
International Conference on Systems, Architectures, Modeling and Simulation (IC-SAMOS'07)
194-200
2007/07



126 International conference proceedings, etc.
Yes
Public-key Cryptography on the Top of a Needle

Lejla Batina, Nele Mentens, Kazuo Sakiyama, Bart Preneel, and Ingrid Verbauwhede
IEEE International Symposium on Circuits and Systems (ISCAS'07)
1831-1834
2007/05



127 International conference proceedings, etc.
Yes
Side-channel Resistant System-level Design Flow for Public-key Cryptography

Kazuo Sakiyama, Elke De Mulder, Bart Preneel, and Ingrid Verbauwhede
ACM Great Lakes Symposium on VLSI (GLSVLSI'07)
144-147
2007/03



128 International conference proceedings, etc.
Yes
Efficient Pipelining for Modular Multiplication Architectures in Prime Field

Nele Mentens, Kazuo Sakiyama, Bart Preneel, and Ingrid Verbauwhede
ACM Great Lakes Symposium on VLSI (GLSVLSI'07)
534-539
2007/03



129 International conference proceedings, etc.
Yes
Superscalar Coprocessor for High-Speed Curve-Based Cryptography

Kazuo Sakiyama, Lejla Batina, Bart Preneel, and Ingrid Verbauwhede
Cryptographic Hardware and Embedded Systems (CHES'06)
LNCS 4249/ Springer-Verlag, 415-429
2006/10



130 International conference proceedings, etc.
Yes
Low-Cost Elliptic Curve Cryptography for Wireless Sensor Networks

Lejla Batina, Nele Mentens, Kazuo Sakiyama, Bart Preneel, and Ingrid Verbauwhede
European Workshop on Security and Privacy in Ad hoc and Sensor Networks (ESAS'06), Lecture Notes in Computer Science
LNCS 4357/ Springer-Verlag, 6-17
2006/09



131 International conference proceedings, etc.
Yes
RECONFIGURABLE ARCHITECTURES FOR CURVE-BASED CRYPTOGRAPHY ON EMBEDDED MICRO-CONTROLLERS

Lejla Batina, Alireza Hodjat, David Hwang, Kazuo Sakiyama, and Ingrid Verbauwhede
International Conference on Field Programmable Logic and Applications (FPL'06)
667-670
2006/08



132 International conference proceedings, etc.
Yes
FPGA-ORIENTED SECURE DATA PATH DESIGN: IMPLEMENTATION OF A PUBLIC KER COPROCESSOR

Nele Mentens, Kazuo Sakiyama, Lejla Batina, Ingrid Verbauwhede, and Bart Preneel
International Conference on Field Programmable Logic and Applications (FPL'06)
133-138
2006/08



133 International conference proceedings, etc.
Yes
HW/SW Co-design for Accelerating Public-key Cryptosystems over GF(p) on the 8051 μ-controller

Kazuo Sakiyama, Lejla Batina, Bart Preneel, and Ingrid Verbauwhede
World Automation Congress (WAC'06), Special Session on Information Security and Hardware Implementations
6 pages-
2006/07



134 International conference proceedings, etc.
Yes
A PARALLEL PROCESSING HARDWARE ARCHITECTURE FOR ELLIPTIC CURVE CRYPTOSYSTEMS

Kazuo Sakiyama, Elke De Mulder, Bart Preneel, and Ingrid Verbauwhede
International Conference on Acoustics, Speech, and Signal Processing (ICASSP'06)
III-904-III-907-
2006/05



135 International conference proceedings, etc.
Yes
A Fast Dual-field Modular Arithmetic Logic Unit and Its Hardware Implementation

Kazuo Sakiyama, Bart Preneel, and Ingrid Verbauwhede
International Symposium on Circuits and Systems (ISCAS'06)
787-790
2006/05



136 International conference proceedings, etc.
Yes
Reconfigurable Modular Arithmetic Logic Unit for High-Performance Public-key Cryptosystems

Kazuo Sakiyama, Nele Mentens, Lejla Batina, Bart Preneel, and Ingrid Verbauwhede
International Workshop on Applied Reconfigurable Computing (ARC'06)
LNCS 3985/ Springer-Verlag, 347-357
2006/03



137 International conference proceedings, etc.
Yes
Embedded Software Integration for Coarse-grain Reconfigurable Systems

Patrick Schaumont, Kazuo Sakiyama, Alireza Hodjat, and Ingrid Verbauwhede
IEEE 18th International Parallel and Distributed Processing Symposium (IPDPS'04)
137-142
2004/04



138 International conference proceedings, etc.
Yes
A Compact and Efficient Fingerprint Verification System for an Embedded Devices

Shanglin Yang, Kazuo Sakiyama, and Ingrid Verbauwhede
Asilomar Conference on Signals, Systems and Computers
2058-2062
2003/11



139 International conference proceedings, etc.
Yes
Testing ThumbPod: Softcore Bugs are Hard to Find

Patrick Schaumont, Kazuo Sakiyama, Yi Fan, David Hwang, Alireza Hodjat, Bo-Cheng. Lai, S. Yang, and I. Verbauwhede
IEEE International High Level Design Validation and Test
Workshop (HLDVT'04)
77-82
2003/11



140 International conference proceedings, etc.
Yes
Design Flow for HW/SW Acceleration Transparency in
the Thumbpod Secure Embedded System

David Hwang, Patrick Schaumont, Yi Fan, Alireza Hodjat, Bo-Cheng Lai, Kazuo Sakiyama, Shenglin Yang, and Ingrid Verbauwhede
Design Automation Conference (DAC'03)
60-65
2003/06



141 International conference proceedings, etc.
Yes
Teaching Trade-offs in System-level Design Methodologies

Kazuo Sakiyama, Patrick Schaumont, David Hwang, and Ingrid Verbauwhede
Microelectronic Systems Education (MSE'03)
62-63
2003/06



142 International conference proceedings, etc.
Yes
Finding the best System Design Flow for a High-Speed JPEG Encoder

Kazuo Sakiyama, Patrick Schaumont, and Ingrid Verbauwhede
Asia and South Pacific Design Automation Conference (ASP-DAC'03)
577-578
2003/01



143 International conference proceedings, etc.
Yes
ZnF2:Gd UV Emitting Electroluminescent Device

Young-Jae Cho, Takashi Hirakawa, Kazuo Sakiyama, Hiroaki Okamoto and Yoshihiro Hamakawa
8th International Workshop on Electroluminescence; in "Inorganic and Organic Electroluminescence," eds. R. Mauch and H.-E. Gumlich (Wissenschaft und Technik Verlag
347-350
1996/08



144 International conference proceedings, etc.
Yes
ZnF2:Gd Thin Film Electroluminescent Devices

Young-Jae Cho, Takashi Hirakawa, Kazuo Sakiyama, Hiroaki Okamoto and Yoshihiro Hamakawa
8th International Conference Solid Films and Surface
--
1996/07