Curse of re-encryption: a generic power/EM analysis on post-quantum KEMs R Ueno, K Xagawa, Y Tanaka, A Ito, J Takahashi, N Homma IACR Transactions on Cryptographic Hardware and Embedded Systems, 296-322, 2022 | 93 | 2022 |
Fault-injection attacks against NIST’s post-quantum cryptography round 3 KEM candidates K Xagawa, A Ito, R Ueno, J Takahashi, N Homma Advances in Cryptology–ASIACRYPT 2021: 27th International Conference on the …, 2021 | 51 | 2021 |
Imbalanced data problems in deep learning-based side-channel attacks: Analysis and solution A Ito, K Saito, R Ueno, N Homma IEEE Transactions on Information Forensics and Security 16, 3790-3802, 2021 | 34 | 2021 |
Machine learning and hardware security: Challenges and opportunities F Regazzoni, S Bhasin, AA Pour, I Alshaer, F Aydin, A Aysu, V Beroulle, ... Proceedings of the 39th International Conference on Computer-Aided Design, 1-6, 2020 | 29 | 2020 |
On the success rate of side-channel attacks on masked implementations: information-theoretical bounds and their practical usage A Ito, R Ueno, N Homma Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications …, 2022 | 20 | 2022 |
Multiple-valued plaintext-checking side-channel attacks on post-quantum kems Y Tanaka, R Ueno, K Xagawa, A Ito, J Takahashi, N Homma IACR Transactions on Cryptographic Hardware and Embedded Systems 2023 (3 …, 2023 | 19 | 2023 |
Extraction of binarized neural network architecture and secret parameters using side-channel information V Yli-Mäyry, A Ito, N Homma, S Bhasin, D Jap 2021 IEEE International Symposium on Circuits and Systems (ISCAS), 1-5, 2021 | 17 | 2021 |
Perceived information revisited: New metrics to evaluate success rate of side-channel attacks A Ito, R Ueno, N Homma IACR Transactions on Cryptographic Hardware and Embedded Systems, 228-254, 2022 | 12 | 2022 |
Practical side-channel based model extraction attack on tree-based machine learning algorithm D Jap, V Yli-Mäyry, A Ito, R Ueno, S Bhasin, N Homma Applied Cryptography and Network Security Workshops: ACNS 2020 Satellite …, 2020 | 8 | 2020 |
Toward optimal deep-learning based side-channel attacks: Probability concentration inequality loss and its usage A Ito, R Ueno, N Homma Cryptology ePrint Archive, 2021 | 7 | 2021 |
Efficient formal verification of galois-field arithmetic circuits using ZDD representation of Boolean polynomials A Ito, R Ueno, N Homma IEEE Transactions on Computer-Aided Design of Integrated Circuits and …, 2021 | 6 | 2021 |
One truth prevails: A deep-learning based single-trace power analysis on RSA–CRT with windowed exponentiation K Saito, A Ito, R Ueno, N Homma IACR Transactions on Cryptographic Hardware and Embedded Systems, 490-526, 2022 | 4 | 2022 |
Effective formal verification for galois-field arithmetic circuits with multiple-valued characteristics A Ito, R Ueno, N Homma 2020 IEEE 50th International Symposium on Multiple-Valued Logic (ISMVL), 46-51, 2020 | 4 | 2020 |
CycleGAN-based high-quality non-parallel voice conversion with spectrogram and WaveRNN A Kanagaki, M Tanaka, T Nose, R Shimizu, A Ito, A Ito 2020 IEEE 9th Global Conference on Consumer Electronics (GCCE), 356-357, 2020 | 4 | 2020 |
Homomorphic encryption for stochastic computing R Koseki, A Ito, R Ueno, M Tibouchi, N Homma Journal of Cryptographic Engineering 13 (2), 251-263, 2023 | 3 | 2023 |
A formal approach to identifying hardware trojans in cryptographic hardware A Ito, R Ueno, N Homma 2021 IEEE 51st International Symposium on Multiple-Valued Logic (ISMVL), 154-159, 2021 | 3 | 2021 |
Scyclone: High-Quality and Parallel-Data-Free Voice Conversion Using Spectrogram and Cycle-Consistent Adversarial Networks M Tanaka, T Nose, A Kanagaki, R Shimizu, A Ito arXiv preprint arXiv:2005.03334, 2020 | 2 | 2020 |
A Study on 2D photo-realistic facial animation generation using 3D facial feature points and deep neural networks K Sato, T Nose, A Ito, Y Chiba, A Ito, T Shinozaki Advances in Intelligent Information Hiding and Multimedia Signal Processing …, 2018 | 2 | 2018 |
Analysis of Linear Mode Connectivity via Permutation-Based Weight Matching A Ito, M Yamada, A Kumagai arXiv preprint arXiv:2402.04051, 2024 | 1 | 2024 |
Formal Analysis of Non-profiled Deep-learning Based Side-channel Attacks A Ito, R Ueno, R Tanaka, N Homma Cryptology ePrint Archive, 2023 | 1 | 2023 |