Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Differential Fault Analysis on the AES Key Schedule., and . IACR Cryptology ePrint Archive, (2007)Scalar Multiplication on Koblitz Curves using tau2-NAF., , , , and . IACR Cryptology ePrint Archive, (2011)Differential Fault Analysis on Stream Cipher MUGI., , and . IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 95-A (1): 242-251 (2012)Brand Validation: Security Indicator to Better Indicate Website Identity., , , , , and . HCI (27), volume 12788 of Lecture Notes in Computer Science, page 432-447. Springer, (2021)Improved Differential Fault Analysis on CLEFIA., and . FDTC, page 25-34. IEEE Computer Society, (2008)Differential Fault Analysis on AES with 192 and 256-Bit Keys., and . IACR Cryptology ePrint Archive, (2010)Highly Accurate Key Extraction Method for Access-Driven Cache Attacks Using Correlation Coefficient., , , and . ACISP, volume 7959 of Lecture Notes in Computer Science, page 286-301. Springer, (2013)Practical Fault Attack on a Cryptographic LSI with ISO/IEC 18033-3 Block Ciphers., and . FDTC, page 84-92. IEEE Computer Society, (2009)Fault Injection and Key Retrieval Experiments on an Evaluation Board., , , , , and . Fault Analysis in Cryptography, Springer, (2012)Evaluation Method for Access-Driven Cache Attacks Using Correlation Coefficient., , , and . IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 98-A (1): 192-202 (2015)