default search action
Naofumi Homma
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j70]Soichiro Kobayashi, Rei Ueno, Yosuke Todo, Naofumi Homma:
Side-Channel Linearization Attack on Unrolled Trivium Hardware. IACR Commun. Cryptol. 1(3): 14 (2024) - [j69]Rei Ueno, Naofumi Homma, Akiko Inoue, Kazuhiko Minematsu:
Fallen Sanctuary: A Higher-Order and Leakage-Resilient Rekeying Scheme. IACR Trans. Cryptogr. Hardw. Embed. Syst. 2024(1): 264-308 (2024) - [c89]Shoei Nashimoto, Rei Ueno, Naofumi Homma:
Comparative Analysis and Implementation of Jump Address Masking for Preventing TEE Bypassing Fault Attacks. ARES 2024: 26:1-26:12 - [e4]Romain Wacquez, Naofumi Homma:
Constructive Side-Channel Analysis and Secure Design - 15th International Workshop, COSADE 2024, Gardanne, France, April 9-10, 2024, Proceedings. Lecture Notes in Computer Science 14595, Springer 2024, ISBN 978-3-031-57542-6 [contents] - [i14]Akira Ito, Rei Ueno, Naofumi Homma:
Perceived Information Revisited II: Information-Theoretical Analysis of Deep-Learning Based Side-Channel Attacks. IACR Cryptol. ePrint Arch. 2024: 124 (2024) - 2023
- [j68]Ryusuke Koseki, Akira Ito, Rei Ueno, Mehdi Tibouchi, Naofumi Homma:
Homomorphic encryption for stochastic computing. J. Cryptogr. Eng. 13(2): 251-263 (2023) - [j67]Katsumi Ebina, Rei Ueno, Naofumi Homma:
Side-Channel Analysis Against SecOC-Compliant AES-CMAC. IEEE Trans. Circuits Syst. II Express Briefs 70(10): 3772-3776 (2023) - [j66]Rei Ueno, Naofumi Homma:
How Secure is Exponent-blinded RSA-CRT with Sliding Window Exponentiation? IACR Trans. Cryptogr. Hardw. Embed. Syst. 2023(2): 241-269 (2023) - [j65]Yutaro Tanaka, Rei Ueno, Keita Xagawa, Akira Ito, Junko Takahashi, Naofumi Homma:
Multiple-Valued Plaintext-Checking Side-Channel Attacks on Post-Quantum KEMs. IACR Trans. Cryptogr. Hardw. Embed. Syst. 2023(3): 473-503 (2023) - [c88]Rei Ueno, Yusuke Yagyu, Naofumi Homma:
Efficient DFA-Resistant AES Hardware Based on Concurrent Fault Detection Scheme. ISMVL 2023: 196-201 - [i13]Rei Ueno, Naofumi Homma, Akiko Inoue, Kazuhiko Minematsu:
Fallen Sanctuary: A Higher-Order and Leakage-Resilient Rekeying Scheme. IACR Cryptol. ePrint Arch. 2023: 1213 (2023) - [i12]Akira Ito, Rei Ueno, Rikuma Tanaka, Naofumi Homma:
Formal Analysis of Non-profiled Deep-learning Based Side-channel Attacks. IACR Cryptol. ePrint Arch. 2023: 1563 (2023) - [i11]Rei Ueno, Hiromichi Haneda, Naofumi Homma, Akiko Inoue, Kazuhiko Minematsu:
Crystalor: Persistent Memory Encryption Mechanism with Optimized Metadata Structure and Fast Crash Recovery. IACR Cryptol. ePrint Arch. 2023: 1630 (2023) - 2022
- [j64]Akira Ito, Rei Ueno, Naofumi Homma:
Efficient Formal Verification of Galois-Field Arithmetic Circuits Using ZDD Representation of Boolean Polynomials. IEEE Trans. Comput. Aided Des. Integr. Circuits Syst. 41(3): 794-798 (2022) - [j63]Ayano Nakashima, Rei Ueno, Naofumi Homma:
AES S-Box Hardware With Efficiency Improvement Based on Linear Mapping Optimization. IEEE Trans. Circuits Syst. II Express Briefs 69(10): 3978-3982 (2022) - [j62]Shoei Nashimoto, Daisuke Suzuki, Rei Ueno, Naofumi Homma:
Bypassing Isolated Execution on RISC-V using Side-Channel-Assisted Fault-Injection and Its Countermeasure. IACR Trans. Cryptogr. Hardw. Embed. Syst. 2022(1): 28-68 (2022) - [j61]Rei Ueno, Keita Xagawa, Yutaro Tanaka, Akira Ito, Junko Takahashi, Naofumi Homma:
Curse of Re-encryption: A Generic Power/EM Analysis on Post-Quantum KEMs. IACR Trans. Cryptogr. Hardw. Embed. Syst. 2022(1): 296-322 (2022) - [j60]Akira Ito, Rei Ueno, Naofumi Homma:
Perceived Information Revisited New Metrics to Evaluate Success Rate of Side-Channel Attacks. IACR Trans. Cryptogr. Hardw. Embed. Syst. 2022(4): 228-254 (2022) - [j59]Kotaro Saito, Akira Ito, Rei Ueno, Naofumi Homma:
One Truth Prevails: A Deep-learning Based Single-Trace Power Analysis on RSA-CRT with Windowed Exponentiation. IACR Trans. Cryptogr. Hardw. Embed. Syst. 2022(4): 490-526 (2022) - [j58]Akiko Inoue, Kazuhiko Minematsu, Maya Oda, Rei Ueno, Naofumi Homma:
ELM: A Low-Latency and Scalable Memory Encryption Scheme. IEEE Trans. Inf. Forensics Secur. 17: 2628-2643 (2022) - [c87]Akira Ito, Rei Ueno, Naofumi Homma:
On the Success Rate of Side-Channel Attacks on Masked Implementations: Information-Theoretical Bounds and Their Practical Usage. CCS 2022: 1521-1535 - [c86]Yuma Itabashi, Rei Ueno, Naofumi Homma:
Efficient Modular Polynomial Multiplier for NTT Accelerator of Crystals-Kyber. DSD 2022: 528-533 - [c85]Rei Ueno, Naofumi Homma:
High-Speed Hardware Architecture for Post-Quantum Diffie-Hellman Key Exchange Based on Residue Number System. ISCAS 2022: 2107-2111 - [i10]Akira Ito, Rei Ueno, Naofumi Homma:
On the Success Rate of Side-Channel Attacks on Masked Implementations: Information-Theoretical Bounds and Their Practical Usage. IACR Cryptol. ePrint Arch. 2022: 576 (2022) - [i9]Yutaro Tanaka, Rei Ueno, Keita Xagawa, Akira Ito, Junko Takahashi, Naofumi Homma:
Multiple-Valued Plaintext-Checking Side-Channel Attacks on Post-Quantum KEMs. IACR Cryptol. ePrint Arch. 2022: 940 (2022) - 2021
- [j57]Rei Ueno, Naofumi Homma, Sumio Morioka, Takafumi Aoki:
A Systematic Design Methodology of Formally Proven Side-Channel-Resistant Cryptographic Hardware. IEEE Des. Test 38(3): 84-92 (2021) - [j56]Akira Ito, Rei Ueno, Naofumi Homma:
An Algebraic Approach to Verifying Galois-Field Arithmetic Circuits with Multiple-Valued Characteristics. IEICE Trans. Inf. Syst. 104-D(8): 1083-1091 (2021) - [j55]Rei Ueno, Junko Takahashi, Yu-ichi Hayashi, Naofumi Homma:
A method for constructing sliding windows leak from noisy cache timing information. J. Cryptogr. Eng. 11(2): 161-170 (2021) - [j54]Ville Yli-Mäyry, Rei Ueno, Noriyuki Miura, Makoto Nagata, Shivam Bhasin, Yves Mathieu, Tarik Graba, Jean-Luc Danger, Naofumi Homma:
Diffusional Side-Channel Leakage From Unrolled Lightweight Block Ciphers: A Case Study of Power Analysis on PRINCE. IEEE Trans. Inf. Forensics Secur. 16: 1351-1364 (2021) - [j53]Akira Ito, Kotaro Saito, Rei Ueno, Naofumi Homma:
Imbalanced Data Problems in Deep Learning-Based Side-Channel Attacks: Analysis and Solution. IEEE Trans. Inf. Forensics Secur. 16: 3790-3802 (2021) - [c84]Keita Xagawa, Akira Ito, Rei Ueno, Junko Takahashi, Naofumi Homma:
Fault-Injection Attacks Against NIST's Post-Quantum Cryptography Round 3 KEM Candidates. ASIACRYPT (2) 2021: 33-61 - [c83]Ville Yli-Mäyry, Akira Ito, Naofumi Homma, Shivam Bhasin, Dirmanto Jap:
Extraction of Binarized Neural Network Architecture and Secret Parameters Using Side-Channel Information. ISCAS 2021: 1-5 - [c82]Akira Ito, Rei Ueno, Naofumi Homma:
A Formal Approach to Identifying Hardware Trojans in Cryptographic Hardware. ISMVL 2021: 154-159 - [i8]Keita Xagawa, Akira Ito, Rei Ueno, Junko Takahashi, Naofumi Homma:
Fault-Injection Attacks against NIST's Post-Quantum Cryptography Round 3 KEM Candidates. IACR Cryptol. ePrint Arch. 2021: 840 (2021) - [i7]Rei Ueno, Keita Xagawa, Yutaro Tanaka, Akira Ito, Junko Takahashi, Naofumi Homma:
Curse of Re-encryption: A Generic Power/EM Analysis on Post-Quantum KEMs. IACR Cryptol. ePrint Arch. 2021: 849 (2021) - [i6]Akira Ito, Rei Ueno, Naofumi Homma:
Toward Optimal Deep-Learning Based Side-Channel Attacks: Probability Concentration Inequality Loss and Its Usage. IACR Cryptol. ePrint Arch. 2021: 1216 (2021) - 2020
- [j52]Rei Ueno, Naofumi Homma, Sumio Morioka, Noriyuki Miura, Kohei Matsuda, Makoto Nagata, Shivam Bhasin, Yves Mathieu, Tarik Graba, Jean-Luc Danger:
High Throughput/Gate AES Hardware Architectures Based on Datapath Compression. IEEE Trans. Computers 69(4): 534-548 (2020) - [j51]Shotaro Sawataishi, Rei Ueno, Naofumi Homma:
Unified Hardware for High-Throughput AES-Based Authenticated Encryptions. IEEE Trans. Circuits Syst. II Express Briefs 67-II(9): 1604-1608 (2020) - [j50]Rei Ueno, Kohei Kazumori, Naofumi Homma:
Rejection Sampling Schemes for Extracting Uniform Distribution from Biased PUFs. IACR Trans. Cryptogr. Hardw. Embed. Syst. 2020(4): 86-128 (2020) - [c81]Dirmanto Jap, Ville Yli-Mäyry, Akira Ito, Rei Ueno, Shivam Bhasin, Naofumi Homma:
Practical Side-Channel Based Model Extraction Attack on Tree-Based Machine Learning Algorithm. ACNS Workshops 2020: 93-105 - [c80]Rei Ueno, Kazuhide Fukushima, Yuto Nakano, Shinsaku Kiyomoto, Naofumi Homma:
Single-Trace Side-Channel Analysis on Polynomial-Based MAC Schemes. COSADE 2020: 43-67 - [c79]Francesco Regazzoni, Shivam Bhasin, Amir Alipour, Ihab Alshaer, Furkan Aydin, Aydin Aysu, Vincent Beroulle, Giorgio Di Natale, Paul D. Franzon, David Hély, Naofumi Homma, Akira Ito, Dirmanto Jap, Priyank Kashyap, Ilia Polian, Seetal Potluri, Rei Ueno, Elena-Ioana Vatajelu, Ville Yli-Mäyry:
Machine Learning and Hardware security: Challenges and Opportunities -Invited Talk-. ICCAD 2020: 141:1-141:6 - [c78]Maya Oda, Rei Ueno, Akiko Inoue, Kazuhiko Minematsu, Naofumi Homma:
PMAC++: Incremental MAC Scheme Adaptable to Lightweight Block Ciphers. ISCAS 2020: 1-4 - [c77]Akira Ito, Rei Ueno, Naofumi Homma:
Effective Formal Verification for Galois-field Arithmetic Circuits with Multiple-Valued Characteristics. ISMVL 2020: 46-51 - [c76]Kohei Kazumori, Rei Ueno, Naofumi Homma:
Debiasing Method for Efficient Ternary Fuzzy Extractors and Ternary Physically Unclonable Functions. ISMVL 2020: 52-57 - [i5]Shoei Nashimoto, Daisuke Suzuki, Rei Ueno, Naofumi Homma:
Bypassing Isolated Execution on RISC-V with Fault Injection. IACR Cryptol. ePrint Arch. 2020: 1193 (2020) - [i4]Akiko Inoue, Kazuhiko Minematsu, Maya Oda, Rei Ueno, Naofumi Homma:
ELM : A Low-Latency and Scalable Memory Encryption Scheme. IACR Cryptol. ePrint Arch. 2020: 1374 (2020)
2010 – 2019
- 2019
- [j49]Yu-ichi Hayashi, Naofumi Homma:
Introduction to Electromagnetic Information Security. IEICE Trans. Commun. 102-B(1): 40-50 (2019) - [j48]Rei Ueno, Naofumi Homma, Yasuyuki Nogami, Takafumi Aoki:
Highly efficient GF(28) inversion circuit based on hybrid GF representations. J. Cryptogr. Eng. 9(2): 101-113 (2019) - [j47]Rei Ueno, Manami Suzuki, Naofumi Homma:
Tackling Biased PUFs Through Biased Masking: A Debiasing Method for Efficient Fuzzy Extractor. IEEE Trans. Computers 68(7): 1091-1104 (2019) - [j46]Manami Suzuki, Rei Ueno, Naofumi Homma, Takafumi Aoki:
Efficient Fuzzy Extractors Based on Ternary Debiasing Method for Biased Physically Unclonable Functions. IEEE Trans. Circuits Syst. I Regul. Pap. 66-I(2): 616-629 (2019) - [c75]Rei Ueno, Naofumi Homma, Tomonori Iida, Kazuhiko Minematsu:
High Throughput/Gate FN-Based Hardware Architectures for AES-OTR. ISCAS 2019: 1-4 - [c74]Kohei Kazumori, Rei Ueno, Naofumi Homma:
A Ternary Fuzzy Extractor for Efficient Cryptographic Key Generation. ISMVL 2019: 49-54 - [c73]Rei Ueno, Junko Takahashi, Yu-ichi Hayashi, Naofumi Homma:
Constructing Sliding Windows Leak from Noisy Cache Timing Information of OSS-RSA. PROOFS 2019: 64-77 - 2018
- [j45]Akira Ito, Rei Ueno, Naofumi Homma, Takafumi Aoki:
Characterizing Parallel Multipliers for Detecting Hardware Trojans. FLAP 5(9): 1815-1832 (2018) - [j44]Wieland Fischer, Naofumi Homma:
Introduction to the CHES 2017 special issue. J. Cryptogr. Eng. 8(2): 93-94 (2018) - [c72]Akira Ito, Rei Ueno, Naofumi Homma, Takafumi Aoki:
A Non-Reversible Insertion Method for Hardware Trojans Based on Path Delay Faults. PROOFS 2018: 50-67 - [c71]Hirokazu Oshida, Rei Ueno, Naofumi Homma, Takafumi Aoki:
On Masked Galois-Field Multiplication for Authenticated Encryption Resistant to Side Channel Analysis. COSADE 2018: 44-57 - [c70]Manami Suzuki, Rei Ueno, Naofumi Homma, Takafumi Aoki:
Quaternary Debiasing for Physically Unclonable Functions. ISMVL 2018: 7-12 - [c69]Akira Ito, Rei Ueno, Naofumi Homma, Takafumi Aoki:
On the Detectability of Hardware Trojans Embedded in Parallel Multipliers. ISMVL 2018: 62-67 - [c68]Naofumi Homma:
Side-channel-aware LSI design. VLSI-DAT 2018: 1 - 2017
- [j43]Makoto Nagata, Daisuke Fujimoto, Noriyuki Miura, Naofumi Homma, Yu-ichi Hayashi, Kazuo Sakiyama:
Protecting cryptographic integrated circuits with side-channel information. IEICE Electron. Express 14(2): 20162005 (2017) - [j42]Ville Yli-Mäyry, Naofumi Homma, Takafumi Aoki:
Power Analysis on Unrolled Architecture with Points-of-Interest Search and Its Application to PRINCE Block Cipher. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 100-A(1): 149-157 (2017) - [j41]Rei Ueno, Naofumi Homma, Takafumi Aoki, Sumio Morioka:
Hierarchical Formal Verification Combining Algebraic Transformation with PPRM Expansion and Its Application to Masked Cryptographic Processors. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 100-A(7): 1396-1408 (2017) - [j40]Rei Ueno, Naofumi Homma, Takafumi Aoki:
Automatic Generation System for Multiple-Valued Galois-Field Parallel Multipliers. IEICE Trans. Inf. Syst. 100-D(8): 1603-1610 (2017) - [j39]Shoei Nashimoto, Naofumi Homma, Yu-ichi Hayashi, Junko Takahashi, Hitoshi Fuji, Takafumi Aoki:
Buffer overflow attack with multiple fault injection and a proven countermeasure. J. Cryptogr. Eng. 7(1): 35-46 (2017) - [j38]Naofumi Homma:
Introduction to the PROOFS 2016 special section. J. Cryptogr. Eng. 7(4): 297-298 (2017) - [j37]Naofumi Homma, Yu-ichi Hayashi, Noriyuki Miura, Daisuke Fujimoto, Makoto Nagata, Takafumi Aoki:
Design Methodology and Validity Verification for a Reactive Countermeasure Against EM Attacks. J. Cryptol. 30(2): 373-391 (2017) - [j36]Rei Ueno, Naofumi Homma, Yukihiro Sugawara, Takafumi Aoki:
Formal Approach for Verifying Galois Field Arithmetic Circuits of Higher Degrees. IEEE Trans. Computers 66(3): 431-442 (2017) - [c67]Rei Ueno, Naofumi Homma, Takafumi Aoki:
Toward More Efficient DPA-Resistant AES Hardware Architecture Based on Threshold Implementation. COSADE 2017: 50-64 - [c66]Manami Suzuki, Rei Ueno, Naofumi Homma, Takafumi Aoki:
Multiple-Valued Debiasing for Physically Unclonable Functions and Its Application to Fuzzy Extractors. COSADE 2017: 248-263 - [c65]Rei Ueno, Naofumi Homma, Sumio Morioka, Takafumi Aoki:
Automatic generation of formally-proven tamper-resistant Galois-field multipliers based on generalized masking scheme. DATE 2017: 978-983 - [c64]Wataru Kawai, Rei Ueno, Naofumi Homma, Takafumi Aoki, Kazuhide Fukushima, Shinsaku Kiyomoto:
Practical Power Analysis on KCipher-2 Software on Low-End Microcontrollers. EuroS&P Workshops 2017: 113-121 - [c63]Rei Ueno, Naofumi Homma, Takafumi Aoki:
A Systematic Design of Tamper-Resistant Galois-Field Arithmetic Circuits Based on Threshold Implementation with (d + 1) Input Shares. ISMVL 2017: 136-141 - [c62]Ville Yli-Mäyry, Naofumi Homma, Takafumi Aoki:
Chosen-input side-channel analysis on unrolled light-weight cryptographic hardware. ISQED 2017: 301-306 - [c61]Kazuhide Fukushima, Rui Xu, Shinsaku Kiyomoto, Naofumi Homma:
Fault Injection Attack on Salsa20 and ChaCha and a Lightweight Countermeasure. TrustCom/BigDataSE/ICESS 2017: 1032-1037 - [e3]Wieland Fischer, Naofumi Homma:
Cryptographic Hardware and Embedded Systems - CHES 2017 - 19th International Conference, Taipei, Taiwan, September 25-28, 2017, Proceedings. Lecture Notes in Computer Science 10529, Springer 2017, ISBN 978-3-319-66786-7 [contents] - 2016
- [j35]Vincent C. Gaudet, Jon T. Butler, Robert Wille, Naofumi Homma:
Guest Editorial Emerging Topics in Multiple-Valued Logic and Its Applications. IEEE J. Emerg. Sel. Topics Circuits Syst. 6(1): 1-4 (2016) - [j34]Rei Ueno, Naofumi Homma, Takafumi Aoki:
A Formal Verification Method of Error Correction Code Processors Over Galois-Field Arithmetic. J. Multiple Valued Log. Soft Comput. 26(1-2): 55-73 (2016) - [c60]Rei Ueno, Sumio Morioka, Naofumi Homma, Takafumi Aoki:
A High Throughput/Gate AES Hardware Architecture by Compressing Encryption and Decryption Datapaths - Toward Efficient CBC-Mode Implementation. CHES 2016: 538-558 - [c59]Rei Ueno, Yukihiro Sugawara, Naofumi Homma, Takafumi Aoki:
Formal Design of Pipelined GF Arithmetic Circuits and Its Application to Cryptographic Processors. ISMVL 2016: 217-222 - [e2]Naofumi Homma, Marcel Medwed:
Smart Card Research and Advanced Applications - 14th International Conference, CARDIS 2015, Bochum, Germany, November 4-6, 2015. Revised Selected Papers. Lecture Notes in Computer Science 9514, Springer 2016, ISBN 978-3-319-31270-5 [contents] - [i3]Rei Ueno, Sumio Morioka, Naofumi Homma, Takafumi Aoki:
A High Throughput/Gate AES Hardware Architecture by Compressing Encryption and Decryption Datapaths - Toward Efficient CBC-Mode Implementation. IACR Cryptol. ePrint Arch. 2016: 595 (2016) - 2015
- [j33]Sho Endo, Naofumi Homma, Yu-ichi Hayashi, Junko Takahashi, Hitoshi Fuji, Takafumi Aoki:
An Adaptive Multiple-Fault Injection Attack on Microcontrollers and a Countermeasure. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 98-A(1): 171-181 (2015) - [j32]Rei Ueno, Naofumi Homma, Takafumi Aoki:
Efficient DFA on SPN-Based Block Ciphers and Its Application to the LED Block Cipher. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 98-A(1): 182-191 (2015) - [j31]Hajime Uno, Sho Endo, Naofumi Homma, Yu-ichi Hayashi, Takafumi Aoki:
Electromagnetic Analysis against Public-Key Cryptographic Software on Embedded OS. IEICE Trans. Commun. 98-B(7): 1242-1249 (2015) - [j30]Kazuya Saito, Naofumi Homma, Takafumi Aoki:
A Formal Approach to Designing Multiple-Valued Arithmetic Circuits. J. Multiple Valued Log. Soft Comput. 24(1-4): 21-34 (2015) - [j29]Sho Endo, Yang Li, Naofumi Homma, Kazuo Sakiyama, Kazuo Ohta, Daisuke Fujimoto, Makoto Nagata, Toshihiro Katashita, Jean-Luc Danger, Takafumi Aoki:
A Silicon-Level Countermeasure Against Fault Sensitivity Analysis and Its Evaluation. IEEE Trans. Very Large Scale Integr. Syst. 23(8): 1429-1438 (2015) - [c58]Daisuke Fujimoto, Noriyuki Miura, Yu-ichi Hayashi, Naofumi Homma, Takafumi Aoki, Makoto Nagata:
A DPA/DEMA/LEMA-resistant AES cryptographic processor with supply-current equalizer and micro EM probe sensor. ASP-DAC 2015: 26-27 - [c57]Rei Ueno, Naofumi Homma, Yukihiro Sugawara, Yasuyuki Nogami, Takafumi Aoki:
Highly Efficient GF(28) Inversion Circuit Based on Redundant GF Arithmetic and Its Application to AES Design. CHES 2015: 63-80 - [c56]Noriyuki Miura, Daisuke Fujimoto, Makoto Nagata, Naofumi Homma, Yu-ichi Hayashi, Takafumi Aoki:
EM attack sensor: concept, circuit, and design-automation methodology. DAC 2015: 176:1-176:6 - [c55]Rei Ueno, Naofumi Homma, Yukihiro Sugawara, Takafumi Aoki:
Formal Design of Galois-Field Arithmetic Circuits Based on Polynomial Ring Representation. ISMVL 2015: 48-53 - [c54]Yukihiro Sugawara, Rei Ueno, Naofumi Homma, Takafumi Aoki:
System for Automatic Generation of Parallel Multipliers over Galois Fields. ISMVL 2015: 54-59 - [c53]Ville Yli-Mäyry, Naofumi Homma, Takafumi Aoki:
Improved Power Analysis on Unrolled Architecture and Its Application to PRINCE Block Cipher. LightSec 2015: 148-163 - [e1]Naofumi Homma, Victor Lomné:
2015 Workshop on Fault Diagnosis and Tolerance in Cryptography, FDTC 2015, Saint Malo, France, September 13, 2015. IEEE Computer Society 2015, ISBN 978-1-4673-7579-5 [contents] - [i2]Rei Ueno, Naofumi Homma, Yukihiro Sugawara, Yasuyuki Nogami, Takafumi Aoki:
Highly Efficient GF(28) Inversion Circuit Based on Redundant GF Arithmetic and Its Application to AES Design. IACR Cryptol. ePrint Arch. 2015: 763 (2015) - 2014
- [j28]Takafumi Hibiki, Naofumi Homma, Yuto Nakano, Kazuhide Fukushima, Shinsaku Kiyomoto, Yutaka Miyake, Takafumi Aoki:
Chosen-IV Correlation Power Analysis on KCipher-2 Hardware and a Masking-Based Countermeasure. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 97-A(1): 157-166 (2014) - [j27]Daisuke Fujimoto, Noriyuki Miura, Makoto Nagata, Yu-ichi Hayashi, Naofumi Homma, Takafumi Aoki, Yohei Hori, Toshihiro Katashita, Kazuo Sakiyama, Thanh-Ha Le, Julien Bringer, Pirouz Bazargan-Sabet, Shivam Bhasin, Jean-Luc Danger:
Power Noise Measurements of Cryptographic VLSI Circuits Regarding Side-Channel Information Leakage. IEICE Trans. Electron. 97-C(4): 272-279 (2014) - [j26]Kotaro Okamoto, Naofumi Homma, Takafumi Aoki:
Formal Design of Arithmetic Circuits over Galois Fields Based on Normal Basis Representations. IEICE Trans. Inf. Syst. 97-D(9): 2270-2277 (2014) - [j25]Kazuo Sakiyama, Yang Li, Shigeto Gomisawa, Yu-ichi Hayashi, Mitsugu Iwamoto, Naofumi Homma, Takafumi Aoki, Kazuo Ohta:
Practical DFA Strategy for AES Under Limited-access Conditions. J. Inf. Process. 22(2): 142-151 (2014) - [j24]Naofumi Homma, Kazuya Saito, Takafumi Aoki:
Toward Formal Design of Practical Cryptographic Hardware Based on Galois Field Arithmetic. IEEE Trans. Computers 63(10): 2604-2613 (2014) - [c52]Yu-ichi Hayashi, Naofumi Homma, Mamoru Miura, Takafumi Aoki, Hideaki Sone:
A Threat for Tablet PCs in Public Space: Remote Visualization of Screen Images Using EM Emanation. CCS 2014: 954-965 - [c51]Naofumi Homma, Yu-ichi Hayashi, Noriyuki Miura, Daisuke Fujimoto, Daichi Tanaka, Makoto Nagata, Takafumi Aoki:
EM Attack Is Non-invasive? - Design Methodology and Validity Verification of EM Attack Sensor. CHES 2014: 1-16 - [c50]Sho Endo, Naofumi Homma, Yu-ichi Hayashi, Junko Takahashi, Hitoshi Fuji, Takafumi Aoki:
A Multiple-Fault Injection Attack by Adaptive Timing Control Under Black-Box Conditions and a Countermeasure. COSADE 2014: 214-228 - [c49]Daisuke Fujimoto, Daichi Tanaka, Noriyuki Miura, Makoto Nagata, Yu-ichi Hayashi, Naofumi Homma, Shivam Bhasin, Jean-Luc Danger:
Side-channel leakage on silicon substrate of CMOS cryptographic chip. HOST 2014: 32-37 - [c48]Kotaro Okamoto, Naofumi Homma, Takafumi Aoki, Sumio Morioka:
A hierarchical formal approach to verifying side-channel resistant cryptographic processors. HOST 2014: 76-79 - [c47]Rei Ueno, Kotaro Okamoto, Naofumi Homma, Takafumi Aoki:
An Efficient Approach to Verifying Galois-Field Arithmetic Circuits of Higher Degrees and Its Application to ECC Decoders. ISMVL 2014: 144-149 - [c46]Noriyuki Miura, Daisuke Fujimoto, Daichi Tanaka, Yu-ichi Hayashi, Naofumi Homma, Takafumi Aoki, Makoto Nagata:
A local EM-analysis attack resistant cryptographic engine with fully-digital oscillator-based tamper-access sensor. VLSIC 2014: 1-2 - [i1]Naofumi Homma, Yu-ichi Hayashi, Noriyuki Miura, Daisuke Fujimoto, Daichi Tanaka, Makoto Nagata, Takafumi Aoki:
EM Attack Is Non-Invasive? - Design Methodology and Validity Verification of EM Attack Sensor. IACR Cryptol. ePrint Arch. 2014: 541 (2014) - 2013
- [c45]Yang Li, Sho Endo, Nicolas Debande, Naofumi Homma, Takafumi Aoki, Thanh-Ha Le, Jean-Luc Danger, Kazuo Ohta, Kazuo Sakiyama:
Exploring the Relations between Fault Sensitivity and Power Consumption. COSADE 2013: 137-153 - [c44]Takafumi Hibiki, Naofumi Homma, Yuto Nakano, Kazuhide Fukushima, Shinsaku Kiyomoto, Yutaka Miyake, Takafumi Aoki:
Chosen-IV Correlation Power Analysis on KCipher-2 and a Countermeasure. COSADE 2013: 169-183 - [c43]Yu-ichi Hayashi, Naofumi Homma, Takafumi Aoki, Yuichiro Okugawa, Yoshiharu Akiyama:
Transient analysis of EM radiation associated with information leakage from cryptographic ICs. EMC Compo 2013: 78-82 - [c42]Yang Li, Yu-ichi Hayashi, Arisa Matsubara, Naofumi Homma, Takafumi Aoki, Kazuo Ohta, Kazuo Sakiyama:
Yet Another Fault-Based Leakage in Non-uniform Faulty Ciphertexts. FPS 2013: 272-287 - [c41]Kotaro Okamoto, Naofumi Homma, Takafumi Aoki:
A Graph-Based Approach to Designing Parallel Multipliers over Galois Fields Based on Normal Basis Representations. ISMVL 2013: 158-163 - 2012
- [j23]Sho Endo, Takeshi Sugawara, Naofumi Homma, Takafumi Aoki, Akashi Satoh:
A Configurable On-Chip Glitchy-Clock Generator for Fault Injection Experiments. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 95-A(1): 263-266 (2012) - [j22]Yu-ichi Hayashi, Naofumi Homma, Takaaki Mizuki, Takeshi Sugawara, Yoshiki Kayano, Takafumi Aoki, Shigeki Minegishi, Akashi Satoh, Hideaki Sone, Hiroshi Inoue:
Evaluation of Information Leakage from Cryptographic Hardware via Common-Mode Current. IEICE Trans. Electron. 95-C(6): 1089-1097 (2012) - [j21]Naofumi Homma, Kazuya Saito, Takafumi Aoki:
A Formal Approach to Designing Cryptographic Processors Based on $GF(2^m)$ Arithmetic Circuits. IEEE Trans. Inf. Forensics Secur. 7(1): 3-13 (2012) - [j20]Miroslav Knezevic, Kazuyuki Kobayashi, Jun Ikegami, Shin'ichiro Matsuo, Akashi Satoh, Ünal Koçabas, Junfeng Fan, Toshihiro Katashita, Takeshi Sugawara, Kazuo Sakiyama, Ingrid Verbauwhede, Kazuo Ohta, Naofumi Homma, Takafumi Aoki:
Fair and Consistent Hardware Evaluation of Fourteen Round Two SHA-3 Candidates. IEEE Trans. Very Large Scale Integr. Syst. 20(5): 827-840 (2012) - [c40]Sho Endo, Yang Li, Naofumi Homma, Kazuo Sakiyama, Kazuo Ohta, Takafumi Aoki:
An Efficient Countermeasure against Fault Sensitivity Analysis Using Configurable Delay Blocks. FDTC 2012: 95-102 - [c39]Yongdae Kim, Naofumi Homma, Takafumi Aoki, Heebong Choi:
Security Evaluation of Cryptographic Modules against Profiling Attacks. ICISC 2012: 383-394 - [c38]Naofumi Homma, Kazuya Saito, Takafumi Aoki:
Formal Design of Multiple-Valued Arithmetic Algorithms over Galois Fields and Its Application to Cryptographic Processor. ISMVL 2012: 110-115 - [c37]Naofumi Homma, Takafumi Aoki:
Effective data processing and protection techniques for community network nodes. WPMC 2012: 574-575 - 2011
- [j19]Takeshi Sugawara, Naofumi Homma, Takafumi Aoki, Akashi Satoh:
High-Performance Architecture for Concurrent Error Detection for AES Processors. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 94-A(10): 1971-1980 (2011) - [j18]Sho Endo, Takeshi Sugawara, Naofumi Homma, Takafumi Aoki, Akashi Satoh:
An on-chip glitchy-clock generator for testing fault injection attacks. J. Cryptogr. Eng. 1(4): 265-270 (2011) - [j17]Atsushi Miyamoto, Naofumi Homma, Takafumi Aoki, Akashi Satoh:
Systematic Design of RSA Processors Based on High-Radix Montgomery Multipliers. IEEE Trans. Very Large Scale Integr. Syst. 19(7): 1136-1146 (2011) - [c36]Olivier Meynard, Denis Réal, Florent Flament, Sylvain Guilley, Naofumi Homma, Jean-Luc Danger:
Enhancement of simple electro-magnetic attacks by pre-characterization in frequency domain and demodulation techniques. DATE 2011: 1004-1009 - [c35]Kazuya Saito, Naofumi Homma, Takafumi Aoki:
A Graph-Based Approach to Designing Multiple-Valued Arithmetic Algorithms. ISMVL 2011: 27-32 - 2010
- [j16]Takeshi Sugawara, Naofumi Homma, Takafumi Aoki, Akashi Satoh:
Profiling attack using multivariate regression analysis. IEICE Electron. Express 7(15): 1139-1144 (2010) - [j15]Naofumi Homma, Yuichi Baba, Atsushi Miyamoto, Takafumi Aoki:
Multiple-Valued Constant-Power Adder and Its Application to Cryptographic Processor. IEICE Trans. Inf. Syst. 93-D(8): 2117-2125 (2010) - [j14]Naofumi Homma, Atsushi Miyamoto, Takafumi Aoki, Akashi Satoh, Adi Shamir:
Comparative Power Analysis of Modular Exponentiation Algorithms. IEEE Trans. Computers 59(6): 795-807 (2010) - [c34]Akashi Satoh, Toshihiro Katashita, Takeshi Sugawara, Naofumi Homma, Takafumi Aoki:
Hardware Implementations of Hash Function Luffa. HOST 2010: 130-134 - [c33]Yuichi Baba, Naofumi Homma, Atsushi Miyamoto, Takafumi Aoki:
Design of Tamper-Resistant Registers for Multiple-Valued Cryptographic Processors. ISMVL 2010: 67-72
2000 – 2009
- 2009
- [j13]Naofumi Homma, Yuki Watanabe, Katsuhiko Degawa, Takafumi Aoki, Tatsuo Higuchi:
Systematic Approach to Designing Multiple-Valued Arithmetic Circuits Based on Arithmetic Description Language. J. Multiple Valued Log. Soft Comput. 15(4): 329-340 (2009) - [c32]Takeshi Sugawara, Naofumi Homma, Takafumi Aoki, Akashi Satoh:
Differential power analysis of AES ASIC implementations with various S-box circuits. ECCTD 2009: 395-398 - [c31]Toshihiro Katashita, Akashi Satoh, Takeshi Sugawara, Naofumi Homma, Takafumi Aoki:
Development of side-channel attack standard evaluation environment. ECCTD 2009: 403-408 - [c30]Atsushi Miyamoto, Naofumi Homma, Takafumi Aoki, Akashi Satoh:
Evaluation of Simple/Comparative Power Analysis against an RSA ASIC Implementation. ISCAS 2009: 2918-2921 - [c29]Yuichi Baba, Atsushi Miyamoto, Naofumi Homma, Takafumi Aoki:
Multiple-Valued Constant-Power Adder for Cryptographic Processors. ISMVL 2009: 239-244 - [c28]Takeshi Sugawara, Yu-ichi Hayashi, Naofumi Homma, Takaaki Mizuki, Takafumi Aoki, Hideaki Sone, Akashi Satoh:
Mechanism behind Information Leakage in Electromagnetic Analysis of Cryptographic Modules. WISA 2009: 66-78 - 2008
- [j12]Naofumi Homma, Sei Nagashima, Takeshi Sugawara, Takafumi Aoki, Akashi Satoh:
A High-Resolution Phase-Based Waveform Matching and Its Application to Side-Channel Attacks. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 91-A(1): 193-202 (2008) - [j11]Yuki Watanabe, Naofumi Homma, Takafumi Aoki, Tatsuo Higuchi:
Arithmetic Circuit Verification Based on Symbolic Computer Algebra. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 91-A(10): 3038-3046 (2008) - [j10]Naofumi Homma, Takafumi Aoki, Tatsuo Higuchi:
A Systematic Approach for Designing Redundant Arithmetic Adders Based on Counter Tree Diagrams. IEEE Trans. Computers 57(12): 1633-1646 (2008) - [c27]Naofumi Homma, Atsushi Miyamoto, Takafumi Aoki, Akashi Satoh, Adi Shamir:
Collision-Based Power Analysis of Modular Exponentiation Using Chosen-Message Pairs. CHES 2008: 15-29 - [c26]Akashi Satoh, Takeshi Sugawara, Naofumi Homma, Takafumi Aoki:
High-Performance Concurrent Error Detection Scheme for AES Hardware. CHES 2008: 100-112 - [c25]Atsushi Miyamoto, Naofumi Homma, Takafumi Aoki, Akashi Satoh:
Chosen-message SPA attacks against FPGA-based RSA hardware implementations. FPL 2008: 35-40 - [c24]Atsushi Miyamoto, Naofumi Homma, Takafumi Aoki, Akashi Satoh:
Systematic design of high-radix Montgomery multipliers for RSA processors. ICCD 2008: 416-421 - [c23]Yuki Watanabe, Naofumi Homma, Takafumi Aoki, Tatsuo Higuchi:
Arithmetic module generator with algorithm optimization capability. ISCAS 2008: 1796-1799 - [c22]Takeshi Sugawara, Naofumi Homma, Takafumi Aoki, Akashi Satoh:
High-performance ASIC implementations of the 128-bit block cipher CLEFIA. ISCAS 2008: 2925-2928 - [c21]Atsushi Miyamoto, Naofumi Homma, Takafumi Aoki, Akashi Satoh:
Enhanced power analysis attack using chosen message against RSA hardware implementations. ISCAS 2008: 3282-3285 - [c20]Yuki Watanabe, Naofumi Homma, Katsuhiko Degawa, Takafumi Aoki, Tatsuo Higuchi:
High-Level Design of Multiple-Valued Arithmetic Circuits Based on Arithmetic Description Language. ISMVL 2008: 112-117 - [c19]Toshihiro Katashita, Akashi Satoh, Takeshi Sugawara, Naofumi Homma, Takafumi Aoki:
Enhanced Correlation Power Analysis Using Key Screening Technique. ReConFig 2008: 403-408 - [c18]Takeshi Sugawara, Naofumi Homma, Takafumi Aoki, Akashi Satoh:
Compact ASIC Architectures for the 512-Bit Hash Function Whirlpool. WISA 2008: 28-40 - 2007
- [j9]Masanori Natsui, Yoshiaki Tadokoro, Naofumi Homma, Takafumi Aoki, Tatsuo Higuchi:
Synthesis of current mirrors based on evolutionary graph generation with transmigration capability. IEICE Electron. Express 4(3): 88-93 (2007) - [j8]Naofumi Homma, Katsuhiko Degawa, Takafumi Aoki, Tatsuo Higuchi:
Design of Multiple-valued Arithmetic Circuits Using Counter Tree Diagrams. J. Multiple Valued Log. Soft Comput. 13(4-6): 487-502 (2007) - [c17]Yuki Watanabe, Naofumi Homma, Takafumi Aoki, Tatsuo Higuchi:
Application of symbolic computer algebra to arithmetic circuit verification. ICCD 2007: 25-32 - [c16]Sei Nagashima, Naofumi Homma, Yuichi Imai, Takafumi Aoki, Akashi Satoh:
DPA Using Phase-Based Waveform Matching against Random-Delay Countermeasure. ISCAS 2007: 1807-1810 - [c15]Atsushi Miyamoto, Naofumi Homma, Takafumi Aoki, Akashi Satoh:
SPA against an FPGA-Based RSA Implementation with a High-Radix Montgomery Multiplier. ISCAS 2007: 1847-1850 - [c14]Takeshi Sugawara, Naofumi Homma, Takafumi Aoki, Akashi Satoh:
A High-Performance ASIC Implementation of the 64-bit Block Cipher CAST-128. ISCAS 2007: 1859-1862 - [c13]Naofumi Homma, Katsuhiko Degawa, Takafumi Aoki, Tatsuo Higuchi:
Algorithm-Level Optimization of Multiple-Valued Arithmetic Circuits Using Counter Tree Diagrams. ISMVL 2007: 31 - 2006
- [j7]Naofumi Homma, Takafumi Aoki, Tatsuo Higuchi:
Systematic Interpretation of Redundant Arithmetic Adders in Binary and Multiple-Valued Logic. IEICE Trans. Electron. 89-C(11): 1645-1654 (2006) - [j6]Naofumi Homma, Yuki Watanabe, Takafumi Aoki, Tatsuo Higuchi:
Formal Design of Arithmetic Circuits Based on Arithmetic Description Language. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 89-A(12): 3500-3509 (2006) - [c12]Naofumi Homma, Sei Nagashima, Yuichi Imai, Takafumi Aoki, Akashi Satoh:
High-Resolution Side-Channel Attack Using Phase-Based Waveform Matching. CHES 2006: 187-200 - [c11]Naofumi Homma, Takafumi Aoki, Tatsuo Higuchi:
Algorithm-level interpretation of fast adder structures in binary and multiple-valued logic. ISMVL 2006: 2 - 2005
- [j5]Masanori Natsui, Naofumi Homma, Takafumi Aoki, Tatsuo Higuchi:
Design of Multiple-Valued Logic Circuits Using Graph-Based Evolutionary Synthesis. J. Multiple Valued Log. Soft Comput. 11(5-6): 519-544 (2005) - 2004
- [c10]Naofumi Homma, Takafumi Aoki, Tatsuo Higuchi:
Multiplier Block Synthesis Using Evolutionary Graph Generation. Evolvable Hardware 2004: 79-82 - [c9]Naofumi Homma, Jun Sakiyama, Taihei Wakamatsu, Takafumi Aoki, Tatsuo Higuchi:
A systematic approach for analyzing fast addition algorithms using counter tree diagrams. ISCAS (5) 2004: 197-200 - [c8]Kazuya Ishida, Naofumi Homma, Takafumi Aoki, Tatsuo Higuchi:
Design and Verification of Parallel Multipliers Using Arithmetic Description Language: ARITH. ISMVL 2004: 334-339 - [c7]Masanori Natsui, Naofumi Homma, Takafumi Aoki, Tatsuo Higuchi:
Topology-Oriented Design of Analog Circuits Based on Evolutionary Graph Generation. PPSN 2004: 342-351 - 2003
- [j4]Takafumi Aoki, Naofumi Homma, Tatsuo Higuchi:
Evolutionary Synthesis of Arithmetic Circuit Structures. Artif. Intell. Rev. 20(3-4): 199-232 (2003) - [j3]Jun Sakiyama, Naofumi Homma, Takafumi Aoki, Tatsuo Higuchi:
Counter Tree Diagrams: A Unified Framework for Analyzing Fast Addition Algorithms. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 86-A(12): 3009-3019 (2003) - [c6]Naofumi Homma, Masanori Natsui, Takafumi Aoki, Tatsuo Higuchi:
VLSI circuit design using an object-oriented framework of evolutionary graph generation system. IEEE Congress on Evolutionary Computation 2003: 115-122 - [c5]Naofumi Homma, Takafumi Aoki, Makoto Motegi, Tatsuo Higuchi:
A framework of evolutionary graph generation system and its application to circuit synthesis. ISCAS (5) 2003: 201-204 - 2002
- [j2]Dingjun Chen, Takafumi Aoki, Naofumi Homma, Tatsuo Higuchi:
Parallel Evolutionary Design of Constant-Coefficient Multipliers. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 85-A(2): 508-512 (2002) - [j1]Dingjun Chen, Takafumi Aoki, Naofumi Homma, Toshiki Terasaki, Tatsuo Higuchi:
Graph-based evolutionary design of arithmetic circuits. IEEE Trans. Evol. Comput. 6(1): 86-100 (2002) - [c4]Naofumi Homma, Takafumi Aoki, Tatsuo Higuchi:
Graph-based individual representation for evolutionary synthesis of arithmetic circuits. IEEE Congress on Evolutionary Computation 2002: 1492-1497 - [c3]Makoto Motegi, Naofumi Homma, Takafumi Aoki, Tatsuo Higuchi:
Evolutionary Graph Generation System and Its Application to Bit-Serial Arithmetic Circuit Synthesis. PPSN 2002: 831-840 - 2001
- [c2]Dingjun Chen, Takafumi Aoki, Naofumi Homma, Tatsuo Higuchi:
Distributed evolutionary design of constant-coefficient multipliers. ICECS 2001: 249-252 - [c1]Naofumi Homma, Takafumi Aoki, Tatsuo Higuchi:
Evolutionary graph generation system with transmigration capability for arithmetic circuit design. ISCAS (5) 2001: 171-174
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-11-11 21:23 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint