Author of the publication

Performance Improvement of Power Analysis Attacks on AES with Encryption-Related Signals.

, , , , and . IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 95-A (6): 1091-1094 (2012)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Single-Trace Vulnerability of Countermeasures against Instruction-related Timing Attack., and . IACR Cryptology ePrint Archive, (2019)An improved side channel attack using event information of subtraction., , , and . J. Netw. Comput. Appl., (2014)Key Bit-Dependent Attack on Protected PKC Using a Single Trace., and . ISPEC, volume 10701 of Lecture Notes in Computer Science, page 168-185. Springer, (2017)A Study on the SCA Trends for Application to IoT Devices., and . J. Internet Serv. Inf. Secur., 10 (1): 2-21 (2020)Deep-Learning-Based Side-Channel Analysis of Block Cipher PIPO With Bitslice Implementation., , and . IEEE Access, (2022)A new bit-serial multiplier over GF(pm) using irreducible trinomials., , , , and . Comput. Math. Appl., 60 (2): 355-361 (2010)Efficient key detection method in the correlation electromagnetic analysis using peak selection algorithm., , , , and . J. Commun. Networks, 11 (6): 556-563 (2009)Chosen-ciphertext Clustering Attack on CRYSTALS-KYBER using the Side-channel Leakage of Barrett Reduction., , and . IACR Cryptol. ePrint Arch., (2021)Ghost key patterns with Equidistant Chosen Message attack on RSA-CRT., , , and . ICCST, page 1-5. IEEE, (2011)Single Trace Analysis of Comparison Operation Based Constant-Time CDT Sampling and Its Countermeasure., , , , and . ICISC (1), volume 14561 of Lecture Notes in Computer Science, page 185-201. Springer, (2023)