A threat for tablet pcs in public space: Remote visualization of screen images using em emanation Y Hayashi, N Homma, M Miura, T Aoki, H Sone Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications …, 2014 | 96 | 2014 |
Analysis of electromagnetic information leakage from cryptographic devices with different physical structures YI Hayashi, N Homma, T Mizuki, T Aoki, H Sone, L Sauvage, JL Danger IEEE Transactions on Electromagnetic Compatibility 55 (3), 571-580, 2012 | 84 | 2012 |
Em attack is non-invasive?-design methodology and validity verification of em attack sensor N Homma, Y Hayashi, N Miura, D Fujimoto, D Tanaka, M Nagata, T Aoki Cryptographic Hardware and Embedded Systems–CHES 2014: 16th International …, 2014 | 66 | 2014 |
Card-based protocols for any boolean function T Nishida, Y Hayashi, T Mizuki, H Sone Theory and Applications of Models of Computation: 12th Annual Conference …, 2015 | 62 | 2015 |
The minimum number of cards in practical card-based protocols J Kastner, A Koch, S Walzer, D Miyahara, Y Hayashi, T Mizuki, H Sone International Conference on the Theory and Application of Cryptology and …, 2017 | 61 | 2017 |
Secure implementations of a random bisection cut I Ueda, D Miyahara, A Nishimura, Y Hayashi, T Mizuki, H Sone International journal of information security 19, 445-452, 2020 | 52 | 2020 |
How to implement a random bisection cut I Ueda, A Nishimura, Y Hayashi, T Mizuki, H Sone Theory and Practice of Natural Computing: 5th International Conference, TPNC …, 2016 | 51 | 2016 |
Introduction to the special section on electromagnetic information security YI Hayashi, N Homma, T Watanabe, WO Price, WA Radasky IEEE Transactions on Electromagnetic Compatibility 55 (3), 539-546, 2013 | 48 | 2013 |
Practical card-based implementations of Yao's millionaire protocol D Miyahara, Y Hayashi, T Mizuki, H Sone Theoretical computer science 803, 207-221, 2020 | 47 | 2020 |
A local EM-analysis attack resistant cryptographic engine with fully-digital oscillator-based tamper-access sensor N Miura, D Fujimoto, D Tanaka, Y Hayashi, N Homma, T Aoki, M Nagata 2014 symposium on VLSI circuits digest of technical papers, 1-2, 2014 | 44 | 2014 |
Transient IEMI threats for cryptographic devices Y Hayashi, N Homma, T Mizuki, T Aoki, H Sone IEEE transactions on Electromagnetic Compatibility 55 (1), 140-148, 2012 | 44 | 2012 |
Non-invasive EMI-based fault injection attack against cryptographic modules Y Hayashi, N Homma, T Sugawara, T Mizuki, T Aoki, H Sone 2011 IEEE International Symposium on Electromagnetic Compatibility, 763-767, 2011 | 44 | 2011 |
Efficient evaluation of EM radiation associated with information leakage from cryptographic devices Y Hayashi, N Homma, T Mizuki, H Shimada, T Aoki, H Sone, L Sauvage, ... IEEE Transactions on Electromagnetic Compatibility 55 (3), 555-563, 2012 | 42 | 2012 |
Five-card AND protocol in committed format using only practical shuffles Y Abe, Y Hayashi, T Mizuki, H Sone Proceedings of the 5th ACM on ASIA Public-Key Cryptography Workshop, 3-8, 2018 | 36 | 2018 |
A 286 F2/Cell Distributed Bulk-Current Sensor and Secure Flush Code Eraser Against Laser Fault Injection Attack on Cryptographic Processor K Matsuda, T Fujii, N Shoji, T Sugawara, K Sakiyama, Y Hayashi, ... IEEE Journal of Solid-State Circuits 53 (11), 3174-3182, 2018 | 34 | 2018 |
Buffer overflow attack with multiple fault injection and a proven countermeasure S Nashimoto, N Homma, Y Hayashi, J Takahashi, H Fuji, T Aoki Journal of Cryptographic Engineering 7, 35-46, 2017 | 33 | 2017 |
Pile-shifting scramble for card-based protocols A Nishimura, Y Hayashi, T Mizuki, H Sone IEICE transactions on fundamentals of electronics, communications and …, 2018 | 32 | 2018 |
Spectrum analysis on cryptographic modules to counteract side-channel attacks T Sugawara, Y Hayashi, N Homma, T Mizuki, T Aoki, H Sone, A Satoh EMC 9, 21-24, 2009 | 32 | 2009 |
Remote visualization of screen images using a pseudo-antenna that blends into the mobile environment Y Hayashi, N Homma, Y Toriumi, K Takaya, T Aoki IEEE Transactions on Electromagnetic Compatibility 59 (1), 24-33, 2016 | 31 | 2016 |
A multiple-fault injection attack by adaptive timing control under black-box conditions and a countermeasure S Endo, N Homma, Y Hayashi, J Takahashi, H Fuji, T Aoki Constructive Side-Channel Analysis and Secure Design: 5th International …, 2014 | 30 | 2014 |