How to Solve Millionaires’ Problem with Two Kinds of Cards
Nakai, Takeshi, Misawa, Yuto, Tokushige, Yuuki, Iwamoto, Mitsugu, Ohta, Kazuo
Published in New generation computing (01.04.2021)
Published in New generation computing (01.04.2021)
Get full text
Journal Article
Efficient Card-Based Majority Voting Protocols
Abe, Yoshiki, Nakai, Takeshi, Kuroki, Yoshihisa, Suzuki, Shinnosuke, Koga, Yuta, Watanabe, Yohei, Iwamoto, Mitsugu, Ohta, Kazuo
Published in New generation computing (23.03.2022)
Published in New generation computing (23.03.2022)
Get full text
Journal Article
An IC-level countermeasure against laser fault injection attack by information leakage sensing based on laser-induced opto-electric bulk current density
Matsuda, Kohei, Tada, Sho, Nagata, Makoto, Komano, Yuichi, Li, Yang, Sugawara, Takeshi, Iwamoto, Mitsugu, Ohta, Kazuo, Sakiyama, Kazuo, Miura, Noriyuki
Published in Japanese Journal of Applied Physics (01.04.2020)
Published in Japanese Journal of Applied Physics (01.04.2020)
Get full text
Journal Article
New Fault-Based Side-Channel Attack Using Fault Sensitivity
Yang Li, Ohta, Kazuo, Sakiyama, Kazuo
Published in IEEE transactions on information forensics and security (01.02.2012)
Published in IEEE transactions on information forensics and security (01.02.2012)
Get full text
Journal Article
Information-Theoretic Approach to Optimal Differential Fault Analysis
Sakiyama, K., Li, Y., Ohta, K., Iwamoto, M.
Published in IEEE transactions on information forensics and security (01.02.2012)
Published in IEEE transactions on information forensics and security (01.02.2012)
Get full text
Journal Article
A limitation on security evaluation of cryptographic primitives with fixed keys
Kawai, Yutaka, Hanaoka, Goichiro, Ohta, Kazuo, Kunihiro, Noboru
Published in Security and communication networks (01.08.2016)
Published in Security and communication networks (01.08.2016)
Get full text
Journal Article
Fair and Consistent Hardware Evaluation of Fourteen Round Two SHA-3 Candidates
Knezevic, M., Kobayashi, K., Ikegami, J., Matsuo, S., Satoh, A., Kocabas, U., Junfeng Fan, Katashita, T., Sugawara, T., Sakiyama, K., Verbauwhede, I., Ohta, K., Homma, N., Aoki, T.
Published in IEEE transactions on very large scale integration (VLSI) systems (01.05.2012)
Published in IEEE transactions on very large scale integration (VLSI) systems (01.05.2012)
Get full text
Journal Article
A new method for enhancing variety and maintaining reliability of PUF responses and its evaluation on ASICs
Yamamoto, Dai, Sakiyama, Kazuo, Iwamoto, Mitsugu, Ohta, Kazuo, Takenaka, Masahiko, Itoh, Kouichi, Torii, Naoya
Published in Journal of cryptographic engineering (01.09.2015)
Published in Journal of cryptographic engineering (01.09.2015)
Get full text
Journal Article
Provably Secure Electronic Cash Based on Blind Multisignature Schemes
Hanatani, Yoshikazu, Komano, Yuichi, Ohta, Kazuo, Kunihiro, Noboru
Published in Financial Cryptography and Data Security (2006)
Published in Financial Cryptography and Data Security (2006)
Get full text
Book Chapter
Conference Proceeding
Structural analysis of cubic GaN through X-ray pole figure generation
BALAKRISHNAN, K, FEUILLET, G, OHTA, K, HAMAGUCHI, H, OKUMURA, H, YOSHIDA, S
Published in Japanese Journal of Applied Physics (01.10.1997)
Published in Japanese Journal of Applied Physics (01.10.1997)
Get full text
Journal Article