High Throughput/Gate AES Hardware Architectures Based on Datapath Compression
Ueno, Rei, Homma, Naofumi, Morioka, Sumio, Miura, Noriyuki, Matsuda, Kohei, Nagata, Makoto, Bhasin, Shivam, Mathieu, Yves, Graba, Tarik, Danger, Jean-Luc
Published in IEEE transactions on computers (01.04.2020)
Published in IEEE transactions on computers (01.04.2020)
Get full text
Journal Article
Automatic generation of formally-proven tamper-resistant Galois-field multipliers based on generalized masking scheme
Ueno, Rei, Homma, Naofumi, Morioka, Sumio, Aoki, Takafumi
Published in Design, Automation & Test in Europe Conference & Exhibition (DATE), 2017 (01.03.2017)
Published in Design, Automation & Test in Europe Conference & Exhibition (DATE), 2017 (01.03.2017)
Get full text
Conference Proceeding
Tweakable TWINE: Building a Tweakable Block Cipher on Generalized Feistel Structure
Sakamoto, Kosei, Minematsu, Kazuhiko, Shibata, Nao, Shigeri, Maki, Kubo, Hiroyasu, Funabiki, Yuki, Bogdanov, Andrey, Morioka, Sumio, Isobe, Takanori
Published in Advances in Information and Computer Security
Published in Advances in Information and Computer Security
Get full text
Book Chapter
A 10-Gbps full-AES crypto design with a twisted BDD S-Box architecture
Morioka, S., Satoh, A.
Published in IEEE transactions on very large scale integration (VLSI) systems (01.07.2004)
Published in IEEE transactions on very large scale integration (VLSI) systems (01.07.2004)
Get full text
Journal Article
On Cryptographic Algorithms and Key Length for Delayed Disclosure Authentication of GNSS
Yoshida, Maki, Morioka, Sumio, Obana, Satoshi
Published in 2022 International Conference on Localization and GNSS (ICL-GNSS) (07.06.2022)
Published in 2022 International Conference on Localization and GNSS (ICL-GNSS) (07.06.2022)
Get full text
Conference Proceeding