Curse of re-encryption: A generic power/em analysis on post-quantum kems R Ueno, K Xagawa, Y Tanaka, A Ito, J Takahashi, N Homma IACR Transactions on Cryptographic Hardware and Embedded Systems, 296-322, 2022 | 48 | 2022 |
Highly Efficient Inversion Circuit Based on Redundant GF Arithmetic and Its Application to AES Design R Ueno, N Homma, Y Sugawara, Y Nogami, T Aoki Cryptographic Hardware and Embedded Systems--CHES 2015: 17th International …, 2015 | 38 | 2015 |
A High Throughput/Gate AES Hardware Architecture by Compressing Encryption and Decryption Datapaths: —Toward Efficient CBC-Mode Implementation R Ueno, S Morioka, N Homma, T Aoki Cryptographic Hardware and Embedded Systems–CHES 2016: 18th International …, 2016 | 35 | 2016 |
Toward more efficient DPA-resistant AES hardware architecture based on threshold implementation R Ueno, N Homma, T Aoki Constructive Side-Channel Analysis and Secure Design: 8th International …, 2017 | 34 | 2017 |
Fault-injection attacks against NIST’s post-quantum cryptography round 3 KEM candidates K Xagawa, A Ito, R Ueno, J Takahashi, N Homma Advances in Cryptology–ASIACRYPT 2021: 27th International Conference on the …, 2021 | 29 | 2021 |
Machine learning and hardware security: Challenges and opportunities F Regazzoni, S Bhasin, AA Pour, I Alshaer, F Aydin, A Aysu, V Beroulle, ... Proceedings of the 39th International Conference on Computer-Aided Design, 1-6, 2020 | 18 | 2020 |
High throughput/gate AES hardware architectures based on datapath compression R Ueno, S Morioka, N Miura, K Matsuda, M Nagata, S Bhasin, Y Mathieu, ... IEEE Transactions on Computers 69 (4), 534-548, 2019 | 18 | 2019 |
Imbalanced data problems in deep learning-based side-channel attacks: Analysis and solution A Ito, K Saito, R Ueno, N Homma IEEE Transactions on Information Forensics and Security 16, 3790-3802, 2021 | 15 | 2021 |
Efficient fuzzy extractors based on ternary debiasing method for biased physically unclonable functions M Suzuki, R Ueno, N Homma, T Aoki IEEE Transactions on Circuits and Systems I: Regular Papers 66 (2), 616-629, 2018 | 15 | 2018 |
Multiple-valued debiasing for physically unclonable functions and its application to fuzzy extractors M Suzuki, R Ueno, N Homma, T Aoki Constructive Side-Channel Analysis and Secure Design: 8th International …, 2017 | 11 | 2017 |
A systematic design of tamper-resistant galois-field arithmetic circuits based on threshold implementation with (d+ 1) input shares R Ueno, N Homma, T Aoki 2017 IEEE 47th International Symposium on Multiple-Valued Logic (ISMVL), 136-141, 2017 | 10 | 2017 |
Highly efficient inversion circuit based on hybrid GF representations R Ueno, N Homma, Y Nogami, T Aoki Journal of Cryptographic Engineering 9, 101-113, 2019 | 9 | 2019 |
Tackling biased PUFs through biased masking: A debiasing method for efficient fuzzy extractor R Ueno, M Suzuki, N Homma IEEE Transactions on Computers 68 (7), 1091-1104, 2019 | 9 | 2019 |
System for automatic generation of parallel multipliers over galois fields Y Sugawara, R Ueno, N Homma, T Aoki 2015 IEEE International Symposium on Multiple-Valued Logic, 54-59, 2015 | 9 | 2015 |
On the success rate of side-channel attacks on masked implementations: Information-theoretical bounds and their practical usage A Ito, R Ueno, N Homma Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications …, 2022 | 8 | 2022 |
Unified hardware for high-throughput AES-based authenticated encryptions S Sawataishi, R Ueno, N Homma IEEE Transactions on Circuits and Systems II: Express Briefs 67 (9), 1604-1608, 2020 | 6 | 2020 |
Bypassing isolated execution on risc-v with fault injection S Nashimoto, D Suzuki, R Ueno, N Homma Cryptology ePrint Archive, 2020 | 6 | 2020 |
Practical side-channel based model extraction attack on tree-based machine learning algorithm D Jap, V Yli-Mäyry, A Ito, R Ueno, S Bhasin, N Homma Applied Cryptography and Network Security Workshops: ACNS 2020 Satellite …, 2020 | 6 | 2020 |
On masked galois-field multiplication for authenticated encryption resistant to side channel analysis H Oshida, R Ueno, N Homma, T Aoki Constructive Side-Channel Analysis and Secure Design: 9th International …, 2018 | 6 | 2018 |
IEICE technical report T Mori, E Sugimura, T Mizutani OME, 2009 | 6 | 2009 |