A new arbiter PUF for enhancing unpredictability on FPGA T Machida, D Yamamoto, M Iwamoto, K Sakiyama The Scientific World Journal 2015 (1), 864812, 2015 | 88 | 2015 |
Information-theoretic approach to optimal differential fault analysis K Sakiyama, Y Li, M Iwamoto, K Ohta IEEE Transactions on Information Forensics and Security 7 (1), 109-120, 2011 | 87 | 2011 |
A new mode of operation for arbiter PUF to improve uniqueness on FPGA T Machida, D Yamamoto, M Iwamoto, K Sakiyama 2014 Federated Conference on Computer Science and Information Systems, 871-878, 2014 | 79 | 2014 |
Information theoretic security for encryption based on conditional Rényi entropies M Iwamoto, J Shikata Information Theoretic Security: 7th International Conference, ICITS 2013 …, 2014 | 79 | 2014 |
The Optimal n-out-of-n Visual Secret Sharing Scheme for Gray-Scale Images M Iwamoto, H Yamamoto IEICE transactions on fundamentals of electronics, communications and …, 2002 | 74 | 2002 |
Uniqueness enhancement of PUF responses based on the locations of random outputting RS latches D Yamamoto, K Sakiyama, M Iwamoto, K Ohta, T Ochiai, M Takenaka, ... Cryptographic Hardware and Embedded Systems–CHES 2011: 13th International …, 2011 | 71 | 2011 |
Implementation of double arbiter PUF and its performance evaluation on FPGA T Machida, D Yamamoto, M Iwamoto, K Sakiyama The 20th Asia and South Pacific Design Automation Conference, 6-7, 2015 | 64 | 2015 |
Quantum secret sharing schemes and reversibility of quantum operations T Ogawa, A Sasaki, M Iwamoto, H Yamamoto Physical Review A—Atomic, Molecular, and Optical Physics 72 (3), 032318, 2005 | 56 | 2005 |
An analytic construction of the visual secret sharing scheme for color images H Koga, M Iwamoto, H Yamamoto IEICE transactions on fundamentals of electronics, communications and …, 2001 | 53 | 2001 |
Variety enhancement of PUF responses using the locations of random outputting RS latches D Yamamoto, K Sakiyama, M Iwamoto, K Ohta, M Takenaka, K Itoh Journal of Cryptographic Engineering 3 (4), 197-211, 2013 | 51 | 2013 |
Strongly secure ramp secret sharing schemes for general access structures M Iwamoto, H Yamamoto Information Processing Letters 97 (2), 52-57, 2006 | 50 | 2006 |
Efficient card-based cryptographic protocols for millionaires’ problem utilizing private permutations T Nakai, Y Tokushige, Y Misawa, M Iwamoto, K Ohta Cryptology and Network Security: 15th International Conference, CANS 2016 …, 2016 | 48 | 2016 |
Optimal multiple assignments based on integer programming in secret sharing schemes with general access structures M Iwamoto, H Yamamoto, H Ogawa IEICE transactions on fundamentals of electronics, communications and …, 2007 | 44 | 2007 |
A weak security notion for visual secret sharing schemes M Iwamoto IEEE Transactions on Information Forensics and Security 7 (2), 372-382, 2011 | 42 | 2011 |
Deep-learning-based security evaluation on authentication systems using arbiter PUF and its variants R Yashiro, T Machida, M Iwamoto, K Sakiyama Advances in Information and Computer Security: 11th International Workshop …, 2016 | 39 | 2016 |
Limited-birthday distinguishers for hash functions: Collisions beyond the birthday bound can be meaningful M Iwamoto, T Peyrin, Y Sasaki Advances in Cryptology-ASIACRYPT 2013: 19th International Conference on the …, 2013 | 38 | 2013 |
A construction method of visual secret sharing schemes for plural secret images M Iwamoto, H Yamamoto IEICE transactions on fundamentals of electronics, communications and …, 2003 | 34 | 2003 |
Four cards are sufficient for a card-based three-input voting protocol utilizing private permutations T Nakai, S Shirouchi, M Iwamoto, K Ohta Information Theoretic Security: 10th International Conference, ICITS 2017 …, 2017 | 33 | 2017 |
Card-based majority voting protocols with three inputs using three cards Y Watanabe, Y Kuroki, S Suzuki, Y Koga, M Iwamoto, K Ohta 2018 International Symposium on Information Theory and Its Applications …, 2018 | 31 | 2018 |
Privacy-preserving smart metering with verifiability for both billing and energy management K Ohara, Y Sakai, F Yoshida, M Iwamoto, K Ohta Proceedings of the 2nd ACM workshop on ASIA public-key cryptography, 23-32, 2014 | 31 | 2014 |