Author of the publication

Evaluation of Information Leakage from Cryptographic Hardware via Common-Mode Current.

, , , , , , , , , and . IEICE Transactions, 95-C (6): 1089-1097 (2012)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

No persons found for author name Sone, Hideaki
add a person with the name Sone, Hideaki
 

Other publications of authors with the same name

Teaching Internet Safety at Universities using "Hikari & Tsubasa's Information Security Game"., , and . CSEDU (1), page 431-433. INSTICC Press, (2010)Resource Access Control for Wireless LAN Roaming Systems., , and . SAINT, page 281-284. IEEE Computer Society, (2008)Study on Information Leakage of Input Key due to Frequency Fluctuation of RC Oscillator in Keyboard., , , and . IEICE Transactions, 96-B (10): 2633-2638 (2013)Evaluation of Information Leakage from Cryptographic Hardware via Common-Mode Current., , , , , , , , , and . IEICE Transactions, 95-C (6): 1089-1097 (2012)Securely Computing Three-Input Functions with Eight Cards., , , and . IEICE Transactions, 98-A (6): 1145-1152 (2015)Secure Multiparty Computations Using a Dial Lock., , and . TAMC, volume 4484 of Lecture Notes in Computer Science, page 499-510. Springer, (2007)Five-Card Secure Computations Using Unequal Division Shuffle., , , , and . TPNC, volume 9477 of Lecture Notes in Computer Science, page 109-120. Springer, (2015)Card-Based Zero-Knowledge Proof for Sudoku., , and . FUN, volume 100 of LIPIcs, page 29:1-29:10. Schloss Dagstuhl - Leibniz-Zentrum fuer Informatik, (2018)Pile-Shifting Scramble for Card-Based Protocols., , , and . IEICE Transactions, 101-A (9): 1494-1502 (2018)The Effect of Position of a Connector Contact Failure on Electromagnetic Near-Field around a Coaxial Cable., and . IEICE Transactions, 92-B (6): 1969-1973 (2009)