Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

No persons found for author name Sakiyama, Kazuo
add a person with the name Sakiyama, Kazuo
 

Other publications of authors with the same name

A New Approach for Implementing the MPL Method toward Higher SPA Resistance., , and . ARES, page 181-186. IEEE Computer Society, (2009)Arithmetic for Public-Key Cryptography., and . Secure Integrated Circuits and Systems, Springer, (2010)A New Mode of Operation for Arbiter PUF to Improve Uniqueness on FPGA., , , and . FedCSIS, page 871-878. (2014)Analysis of Mixed PUF-TRNG Circuit Based on SR-Latches in FD-SOI Technology., , , , , , , and . DSD, page 508-515. IEEE Computer Society, (2018)Exploring the Relations between Fault Sensitivity and Power Consumption., , , , , , , , and . COSADE, volume 7864 of Lecture Notes in Computer Science, page 137-153. Springer, (2013)Polynomial-Advantage Cryptanalysis of 3D Cipher and 3D-Based Hash Function., , , and . IWSEC, volume 7631 of Lecture Notes in Computer Science, page 170-181. Springer, (2012)Elliptic curve cryptography on embedded multicore systems., , and . Design Autom. for Emb. Sys., 12 (3): 231-242 (2008)Power Noise Measurements of Cryptographic VLSI Circuits Regarding Side-Channel Information Leakage., , , , , , , , , and 4 other author(s). IEICE Transactions, 97-C (4): 272-279 (2014)A New Type of Fault-Based Attack: Fault Behavior Analysis., , and . IEICE Transactions, 96-A (1): 177-184 (2013)Robust RFID Authentication Protocol with Formal Proof and Its Feasibility., , , , and . IACR Cryptology ePrint Archive, (2010)