Author of the publication

Correlation Power Analysis Based on Switching Glitch Model.

, , , and . WISA, volume 6513 of Lecture Notes in Computer Science, page 191-205. Springer, (2010)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

No persons found for author name Tsunoo, Yukiyasu
add a person with the name Tsunoo, Yukiyasu
 

Other publications of authors with the same name

Access-Driven Cache Attack on the Stream Cipher DICING Using the Chosen IV., , , , and . IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 93-A (4): 799-807 (2010)Ciphertext Only Attack for One-way Function of the MAP Using One Ciphertext., , and . CRYPTO, volume 839 of Lecture Notes in Computer Science, page 369-382. Springer, (1994)Cryptanalysis of DES Implemented on Computers with Cache., , , , and . CHES, volume 2779 of Lecture Notes in Computer Science, page 62-76. Springer, (2003)Scheme overcoming incompatibility of privacy and utilization of personal data., , , , , , , and . ISITA, page 727-730. IEEE, (2012)A smaller and faster variant of RSM., , , and . DATE, page 1-6. European Design and Automation Association, (2014)Improving cache attacks by considering cipher structure., , , , and . Int. J. Inf. Sec., 5 (3): 166-176 (2006)Expanding Weak PRF with Small Key Size., and . ICISC, volume 3935 of Lecture Notes in Computer Science, page 284-298. Springer, (2005)Correlation Power Analysis Based on Switching Glitch Model., , , and . WISA, volume 6513 of Lecture Notes in Computer Science, page 191-205. Springer, (2010)Higher Order Differential Attacks on Reduced-Round MISTY1., , , and . ICISC, volume 5461 of Lecture Notes in Computer Science, page 415-431. Springer, (2008)Privacy Preserving Data Processing with Collaboration of Homomorphic Cryptosystems., , , , , and . Financial Cryptography Workshops, volume 7862 of Lecture Notes in Computer Science, page 201-212. Springer, (2013)