BibTeX records: Junko Takahashi

download as .bib file

@article{DBLP:journals/tches/TanakaUXITH23,
  author       = {Yutaro Tanaka and
                  Rei Ueno and
                  Keita Xagawa and
                  Akira Ito and
                  Junko Takahashi and
                  Naofumi Homma},
  title        = {Multiple-Valued Plaintext-Checking Side-Channel Attacks on Post-Quantum
                  KEMs},
  journal      = {{IACR} Trans. Cryptogr. Hardw. Embed. Syst.},
  volume       = {2023},
  number       = {3},
  pages        = {473--503},
  year         = {2023},
  url          = {https://doi.org/10.46586/tches.v2023.i3.473-503},
  doi          = {10.46586/TCHES.V2023.I3.473-503},
  timestamp    = {Tue, 12 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tches/TanakaUXITH23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieiceta/TakahashiOINGSA22,
  author       = {Junko Takahashi and
                  Keiichi Okabe and
                  Hiroki Itoh and
                  Xuan Thuy Ngo and
                  Sylvain Guilley and
                  Ritu Ranjan Shrivastwa and
                  Mushir Ahmed and
                  Patrick Lejoly},
  title        = {Machine Learning Based Hardware Trojan Detection Using Electromagnetic
                  Emanation},
  journal      = {{IEICE} Trans. Fundam. Electron. Commun. Comput. Sci.},
  volume       = {105-A},
  number       = {3},
  pages        = {311--325},
  year         = {2022},
  url          = {https://doi.org/10.1587/transfun.2021cip0011},
  doi          = {10.1587/TRANSFUN.2021CIP0011},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ieiceta/TakahashiOINGSA22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tches/UenoXTITH22,
  author       = {Rei Ueno and
                  Keita Xagawa and
                  Yutaro Tanaka and
                  Akira Ito and
                  Junko Takahashi and
                  Naofumi Homma},
  title        = {Curse of Re-encryption: {A} Generic Power/EM Analysis on Post-Quantum
                  KEMs},
  journal      = {{IACR} Trans. Cryptogr. Hardw. Embed. Syst.},
  volume       = {2022},
  number       = {1},
  pages        = {296--322},
  year         = {2022},
  url          = {https://doi.org/10.46586/tches.v2022.i1.296-322},
  doi          = {10.46586/TCHES.V2022.I1.296-322},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tches/UenoXTITH22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/TanakaUXITH22,
  author       = {Yutaro Tanaka and
                  Rei Ueno and
                  Keita Xagawa and
                  Akira Ito and
                  Junko Takahashi and
                  Naofumi Homma},
  title        = {Multiple-Valued Plaintext-Checking Side-Channel Attacks on Post-Quantum
                  KEMs},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {940},
  year         = {2022},
  url          = {https://eprint.iacr.org/2022/940},
  timestamp    = {Tue, 27 Sep 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/TanakaUXITH22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jce/UenoTHH21,
  author       = {Rei Ueno and
                  Junko Takahashi and
                  Yu{-}ichi Hayashi and
                  Naofumi Homma},
  title        = {A method for constructing sliding windows leak from noisy cache timing
                  information},
  journal      = {J. Cryptogr. Eng.},
  volume       = {11},
  number       = {2},
  pages        = {161--170},
  year         = {2021},
  url          = {https://doi.org/10.1007/s13389-020-00230-x},
  doi          = {10.1007/S13389-020-00230-X},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jce/UenoTHH21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jip/DanST21,
  author       = {Yuichiro Dan and
                  Toshiki Shibahara and
                  Junko Takahashi},
  title        = {Timing Attack on Random Forests: Experimental Evaluation and Detailed
                  Analysis},
  journal      = {J. Inf. Process.},
  volume       = {29},
  pages        = {757--768},
  year         = {2021},
  url          = {https://doi.org/10.2197/ipsjjip.29.757},
  doi          = {10.2197/IPSJJIP.29.757},
  timestamp    = {Wed, 12 Jan 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jip/DanST21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/asiacrypt/XagawaIUTH21,
  author       = {Keita Xagawa and
                  Akira Ito and
                  Rei Ueno and
                  Junko Takahashi and
                  Naofumi Homma},
  editor       = {Mehdi Tibouchi and
                  Huaxiong Wang},
  title        = {Fault-Injection Attacks Against NIST's Post-Quantum Cryptography Round
                  3 {KEM} Candidates},
  booktitle    = {Advances in Cryptology - {ASIACRYPT} 2021 - 27th International Conference
                  on the Theory and Application of Cryptology and Information Security,
                  Singapore, December 6-10, 2021, Proceedings, Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {13091},
  pages        = {33--61},
  publisher    = {Springer},
  year         = {2021},
  url          = {https://doi.org/10.1007/978-3-030-92075-3\_2},
  doi          = {10.1007/978-3-030-92075-3\_2},
  timestamp    = {Fri, 03 Dec 2021 17:36:49 +0100},
  biburl       = {https://dblp.org/rec/conf/asiacrypt/XagawaIUTH21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/XagawaIUTH21,
  author       = {Keita Xagawa and
                  Akira Ito and
                  Rei Ueno and
                  Junko Takahashi and
                  Naofumi Homma},
  title        = {Fault-Injection Attacks against NIST's Post-Quantum Cryptography Round
                  3 {KEM} Candidates},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {840},
  year         = {2021},
  url          = {https://eprint.iacr.org/2021/840},
  timestamp    = {Wed, 07 Jul 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/XagawaIUTH21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/UenoXTITH21,
  author       = {Rei Ueno and
                  Keita Xagawa and
                  Yutaro Tanaka and
                  Akira Ito and
                  Junko Takahashi and
                  Naofumi Homma},
  title        = {Curse of Re-encryption: {A} Generic Power/EM Analysis on Post-Quantum
                  KEMs},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {849},
  year         = {2021},
  url          = {https://eprint.iacr.org/2021/849},
  timestamp    = {Wed, 07 Jul 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/UenoXTITH21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icics/TakahashiOINGSA20,
  author       = {Junko Takahashi and
                  Keiichi Okabe and
                  Hiroki Itoh and
                  Xuan Thuy Ngo and
                  Sylvain Guilley and
                  Ritu Ranjan Shrivastwa and
                  Mushir Ahmed and
                  Patrick Lejoly},
  editor       = {Weizhi Meng and
                  Dieter Gollmann and
                  Christian Damsgaard Jensen and
                  Jianying Zhou},
  title        = {Machine Learning Based Hardware Trojan Detection Using Electromagnetic
                  Emanation},
  booktitle    = {Information and Communications Security - 22nd International Conference,
                  {ICICS} 2020, Copenhagen, Denmark, August 24-26, 2020, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {12282},
  pages        = {3--19},
  publisher    = {Springer},
  year         = {2020},
  url          = {https://doi.org/10.1007/978-3-030-61078-4\_1},
  doi          = {10.1007/978-3-030-61078-4\_1},
  timestamp    = {Thu, 18 Feb 2021 13:46:45 +0100},
  biburl       = {https://dblp.org/rec/conf/icics/TakahashiOINGSA20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwsec/DanST20,
  author       = {Yuichiro Dan and
                  Toshiki Shibahara and
                  Junko Takahashi},
  editor       = {Kazumaro Aoki and
                  Akira Kanaoka},
  title        = {Timing Attack on Random Forests for Generating Adversarial Examples},
  booktitle    = {Advances in Information and Computer Security - 15th International
                  Workshop on Security, {IWSEC} 2020, Fukui, Japan, September 2-4, 2020,
                  Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {12231},
  pages        = {285--302},
  publisher    = {Springer},
  year         = {2020},
  url          = {https://doi.org/10.1007/978-3-030-58208-1\_16},
  doi          = {10.1007/978-3-030-58208-1\_16},
  timestamp    = {Thu, 27 Aug 2020 12:11:44 +0200},
  biburl       = {https://dblp.org/rec/conf/iwsec/DanST20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/vtc/TakahashiIT20,
  author       = {Junko Takahashi and
                  Makoto Iwamura and
                  Masashi Tanaka},
  title        = {Security Threat Analysis of Automotive Infotainment Systems},
  booktitle    = {92nd {IEEE} Vehicular Technology Conference, {VTC} Fall 2020, Victoria,
                  BC, Canada, November 18 - December 16, 2020},
  pages        = {1--7},
  publisher    = {{IEEE}},
  year         = {2020},
  url          = {https://doi.org/10.1109/VTC2020-Fall49728.2020.9348647},
  doi          = {10.1109/VTC2020-FALL49728.2020.9348647},
  timestamp    = {Mon, 20 Dec 2021 11:29:51 +0100},
  biburl       = {https://dblp.org/rec/conf/vtc/TakahashiIT20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jip/TakahashiTFNMS19,
  author       = {Junko Takahashi and
                  Masashi Tanaka and
                  Hitoshi Fuji and
                  Toshio Narita and
                  Shunsuke Matsumoto and
                  Hiroki Sato},
  title        = {Automotive Security on Abnormal Vehicle Behavior Using Only Fabricated
                  Informative {CAN} Messages},
  journal      = {J. Inf. Process.},
  volume       = {27},
  pages        = {159--167},
  year         = {2019},
  url          = {https://doi.org/10.2197/ipsjjip.27.159},
  doi          = {10.2197/IPSJJIP.27.159},
  timestamp    = {Tue, 16 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jip/TakahashiTFNMS19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/proofs/UenoTHH19,
  author       = {Rei Ueno and
                  Junko Takahashi and
                  Yu{-}ichi Hayashi and
                  Naofumi Homma},
  editor       = {Karine Heydemann and
                  Ulrich K{\"{u}}hne and
                  Letitia Li},
  title        = {Constructing Sliding Windows Leak from Noisy Cache Timing Information
                  of {OSS-RSA}},
  booktitle    = {Proceedings of 8th International Workshop on Security Proofs for Embedded
                  Systems, {PROOFS} 2019, colocated with {CHES} 2018, Atlanta, GA, USA,
                  August 24, 2019},
  series       = {Kalpa Publications in Computing},
  volume       = {11},
  pages        = {64--77},
  publisher    = {EasyChair},
  year         = {2019},
  url          = {https://doi.org/10.29007/ws8z},
  doi          = {10.29007/WS8Z},
  timestamp    = {Wed, 15 Dec 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/proofs/UenoTHH19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieicet/Takahashi18,
  author       = {Junko Takahashi},
  title        = {An Overview of Cyber Security for Connected Vehicles},
  journal      = {{IEICE} Trans. Inf. Syst.},
  volume       = {101-D},
  number       = {11},
  pages        = {2561--2575},
  year         = {2018},
  url          = {https://doi.org/10.1587/transinf.2017ICI0001},
  doi          = {10.1587/TRANSINF.2017ICI0001},
  timestamp    = {Sat, 11 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ieicet/Takahashi18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/host/TakahashiTFNMS18,
  author       = {Junko Takahashi and
                  Masashi Tanaka and
                  Hitoshi Fuji and
                  Toshio Narita and
                  Shunsuke Matsumoto and
                  Hiroki Sato},
  title        = {Abnormal vehicle behavior induced using only fabricated informative
                  {CAN} messages},
  booktitle    = {2018 {IEEE} International Symposium on Hardware Oriented Security
                  and Trust, {HOST} 2018, Washington, DC, USA, April 30 - May 4, 2018},
  pages        = {134--137},
  publisher    = {{IEEE} Computer Society},
  year         = {2018},
  url          = {https://doi.org/10.1109/HST.2018.8383901},
  doi          = {10.1109/HST.2018.8383901},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/host/TakahashiTFNMS18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jce/NashimotoHHTFA17,
  author       = {Shoei Nashimoto and
                  Naofumi Homma and
                  Yu{-}ichi Hayashi and
                  Junko Takahashi and
                  Hitoshi Fuji and
                  Takafumi Aoki},
  title        = {Buffer overflow attack with multiple fault injection and a proven
                  countermeasure},
  journal      = {J. Cryptogr. Eng.},
  volume       = {7},
  number       = {1},
  pages        = {35--46},
  year         = {2017},
  url          = {https://doi.org/10.1007/s13389-016-0136-3},
  doi          = {10.1007/S13389-016-0136-3},
  timestamp    = {Thu, 09 Jul 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jce/NashimotoHHTFA17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jip/TakahashiAMFYHU17,
  author       = {Junko Takahashi and
                  Yosuke Aragane and
                  Toshiyuki Miyazawa and
                  Hitoshi Fuji and
                  Hirofumi Yamashita and
                  Keita Hayakawa and
                  Shintarou Ukai and
                  Hiroshi Hayakawa},
  title        = {Automotive Attacks and Countermeasures on LIN-Bus},
  journal      = {J. Inf. Process.},
  volume       = {25},
  pages        = {220--228},
  year         = {2017},
  url          = {https://doi.org/10.2197/ipsjjip.25.220},
  doi          = {10.2197/IPSJJIP.25.220},
  timestamp    = {Tue, 16 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jip/TakahashiAMFYHU17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieicet/EndoHHTFA15,
  author       = {Sho Endo and
                  Naofumi Homma and
                  Yu{-}ichi Hayashi and
                  Junko Takahashi and
                  Hitoshi Fuji and
                  Takafumi Aoki},
  title        = {An Adaptive Multiple-Fault Injection Attack on Microcontrollers and
                  a Countermeasure},
  journal      = {{IEICE} Trans. Fundam. Electron. Commun. Comput. Sci.},
  volume       = {98-A},
  number       = {1},
  pages        = {171--181},
  year         = {2015},
  url          = {https://doi.org/10.1587/transfun.E98.A.171},
  doi          = {10.1587/TRANSFUN.E98.A.171},
  timestamp    = {Sat, 11 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ieicet/EndoHHTFA15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieicet/TakahashiFAF15,
  author       = {Junko Takahashi and
                  Toshinori Fukunaga and
                  Kazumaro Aoki and
                  Hitoshi Fuji},
  title        = {Evaluation Method for Access-Driven Cache Attacks Using Correlation
                  Coefficient},
  journal      = {{IEICE} Trans. Fundam. Electron. Commun. Comput. Sci.},
  volume       = {98-A},
  number       = {1},
  pages        = {192--202},
  year         = {2015},
  url          = {https://doi.org/10.1587/transfun.E98.A.192},
  doi          = {10.1587/TRANSFUN.E98.A.192},
  timestamp    = {Sat, 11 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ieicet/TakahashiFAF15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cosade/EndoHHTFA14,
  author       = {Sho Endo and
                  Naofumi Homma and
                  Yu{-}ichi Hayashi and
                  Junko Takahashi and
                  Hitoshi Fuji and
                  Takafumi Aoki},
  editor       = {Emmanuel Prouff},
  title        = {A Multiple-Fault Injection Attack by Adaptive Timing Control Under
                  Black-Box Conditions and a Countermeasure},
  booktitle    = {Constructive Side-Channel Analysis and Secure Design - 5th International
                  Workshop, {COSADE} 2014, Paris, France, April 13-15, 2014. Revised
                  Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {8622},
  pages        = {214--228},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-319-10175-0\_15},
  doi          = {10.1007/978-3-319-10175-0\_15},
  timestamp    = {Tue, 14 May 2019 10:00:39 +0200},
  biburl       = {https://dblp.org/rec/conf/cosade/EndoHHTFA14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/dac/RoyMIT14,
  author       = {Debapriya Basu Roy and
                  Debdeep Mukhopadhyay and
                  Masami Izumi and
                  Junko Takahashi},
  title        = {Tile Before Multiplication: An Efficient Strategy to Optimize {DSP}
                  Multiplier for Accelerating Prime Field {ECC} for {NIST} Curves},
  booktitle    = {The 51st Annual Design Automation Conference 2014, {DAC} '14, San
                  Francisco, CA, USA, June 1-5, 2014},
  pages        = {177:1--177:6},
  publisher    = {{ACM}},
  year         = {2014},
  url          = {https://doi.org/10.1145/2593069.2593234},
  doi          = {10.1145/2593069.2593234},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/dac/RoyMIT14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icisc/TakahashiF14,
  author       = {Junko Takahashi and
                  Toshinori Fukunaga},
  editor       = {Jooyoung Lee and
                  Jongsung Kim},
  title        = {Fault Analysis on {SIMON} Family of Lightweight Block Ciphers},
  booktitle    = {Information Security and Cryptology - {ICISC} 2014 - 17th International
                  Conference, Seoul, Korea, December 3-5, 2014, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {8949},
  pages        = {175--189},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-319-15943-0\_11},
  doi          = {10.1007/978-3-319-15943-0\_11},
  timestamp    = {Tue, 14 May 2019 10:00:36 +0200},
  biburl       = {https://dblp.org/rec/conf/icisc/TakahashiF14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/TakahashiFAF13,
  author       = {Junko Takahashi and
                  Toshinori Fukunaga and
                  Kazumaro Aoki and
                  Hitoshi Fuji},
  editor       = {Colin Boyd and
                  Leonie Simpson},
  title        = {Highly Accurate Key Extraction Method for Access-Driven Cache Attacks
                  Using Correlation Coefficient},
  booktitle    = {Information Security and Privacy - 18th Australasian Conference, {ACISP}
                  2013, Brisbane, Australia, July 1-3, 2013. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7959},
  pages        = {286--301},
  publisher    = {Springer},
  year         = {2013},
  url          = {https://doi.org/10.1007/978-3-642-39059-3\_20},
  doi          = {10.1007/978-3-642-39059-3\_20},
  timestamp    = {Tue, 14 May 2019 10:00:46 +0200},
  biburl       = {https://dblp.org/rec/conf/acisp/TakahashiFAF13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/smc/IshikawaTTMK13,
  author       = {Takumi Ishikawa and
                  Junko Takahashi and
                  Hiroshi Takemura and
                  Hiroshi Mizoguchi and
                  Takeshi Kuwata},
  title        = {Gastric Lymph Node Cancer Detection of Multiple Features Classifier
                  for Pathology Diagnosis Support System},
  booktitle    = {{IEEE} International Conference on Systems, Man, and Cybernetics,
                  Manchester, {SMC} 2013, United Kingdom, October 13-16, 2013},
  pages        = {2611--2616},
  publisher    = {{IEEE}},
  year         = {2013},
  url          = {https://doi.org/10.1109/SMC.2013.446},
  doi          = {10.1109/SMC.2013.446},
  timestamp    = {Thu, 23 Jun 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/smc/IshikawaTTMK13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieicet/TakahashiFS12,
  author       = {Junko Takahashi and
                  Toshinori Fukunaga and
                  Kazuo Sakiyama},
  title        = {Differential Fault Analysis on Stream Cipher {MUGI}},
  journal      = {{IEICE} Trans. Fundam. Electron. Commun. Comput. Sci.},
  volume       = {95-A},
  number       = {1},
  pages        = {242--251},
  year         = {2012},
  url          = {https://doi.org/10.1587/transfun.E95.A.242},
  doi          = {10.1587/TRANSFUN.E95.A.242},
  timestamp    = {Sun, 22 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ieicet/TakahashiFS12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:series/isc/TakahashiFGLSO12,
  author       = {Junko Takahashi and
                  Toshinori Fukunaga and
                  Shigeto Gomisawa and
                  Yang Li and
                  Kazuo Sakiyama and
                  Kazuo Ohta},
  editor       = {Marc Joye and
                  Michael Tunstall},
  title        = {Fault Injection and Key Retrieval Experiments on an Evaluation Board},
  booktitle    = {Fault Analysis in Cryptography},
  series       = {Information Security and Cryptography},
  pages        = {313--331},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-29656-7\_18},
  doi          = {10.1007/978-3-642-29656-7\_18},
  timestamp    = {Fri, 27 Mar 2020 08:31:50 +0100},
  biburl       = {https://dblp.org/rec/series/isc/TakahashiFGLSO12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/fdtc/2011,
  editor       = {Luca Breveglieri and
                  Sylvain Guilley and
                  Israel Koren and
                  David Naccache and
                  Junko Takahashi},
  title        = {2011 Workshop on Fault Diagnosis and Tolerance in Cryptography, {FDTC}
                  2011, Tokyo, Japan, September 29, 2011},
  publisher    = {{IEEE} Computer Society},
  year         = {2011},
  url          = {https://ieeexplore.ieee.org/xpl/conhome/6075045/proceeding},
  isbn         = {978-1-4577-1463-4},
  timestamp    = {Wed, 16 Oct 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/fdtc/2011.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/RoyRMTF11,
  author       = {Sujoy Sinha Roy and
                  Chester Rebeiro and
                  Debdeep Mukhopadhyay and
                  Junko Takahashi and
                  Toshinori Fukunaga},
  title        = {Scalar Multiplication on Koblitz Curves using tau\({}^{\mbox{2}}\)-NAF},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {318},
  year         = {2011},
  url          = {http://eprint.iacr.org/2011/318},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/RoyRMTF11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieicet/TakahashiF10,
  author       = {Junko Takahashi and
                  Toshinori Fukunaga},
  title        = {Differential Fault Analysis on {CLEFIA} with 128, 192, and 256-Bit
                  Keys},
  journal      = {{IEICE} Trans. Fundam. Electron. Commun. Comput. Sci.},
  volume       = {93-A},
  number       = {1},
  pages        = {136--143},
  year         = {2010},
  url          = {https://doi.org/10.1587/transfun.E93.A.136},
  doi          = {10.1587/TRANSFUN.E93.A.136},
  timestamp    = {Sat, 11 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ieicet/TakahashiF10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ches/LiSGFTO10,
  author       = {Yang Li and
                  Kazuo Sakiyama and
                  Shigeto Gomisawa and
                  Toshinori Fukunaga and
                  Junko Takahashi and
                  Kazuo Ohta},
  editor       = {Stefan Mangard and
                  Fran{\c{c}}ois{-}Xavier Standaert},
  title        = {Fault Sensitivity Analysis},
  booktitle    = {Cryptographic Hardware and Embedded Systems, {CHES} 2010, 12th International
                  Workshop, Santa Barbara, CA, USA, August 17-20, 2010. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6225},
  pages        = {320--334},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-15031-9\_22},
  doi          = {10.1007/978-3-642-15031-9\_22},
  timestamp    = {Tue, 14 May 2019 10:00:47 +0200},
  biburl       = {https://dblp.org/rec/conf/ches/LiSGFTO10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icisc/TakahashiFS10,
  author       = {Junko Takahashi and
                  Toshinori Fukunaga and
                  Kazuo Sakiyama},
  editor       = {Kyung Hyune Rhee and
                  DaeHun Nyang},
  title        = {Fault Analysis on Stream Cipher {MUGI}},
  booktitle    = {Information Security and Cryptology - {ICISC} 2010 - 13th International
                  Conference, Seoul, Korea, December 1-3, 2010, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {6829},
  pages        = {420--434},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-24209-0\_28},
  doi          = {10.1007/978-3-642-24209-0\_28},
  timestamp    = {Tue, 14 May 2019 10:00:36 +0200},
  biburl       = {https://dblp.org/rec/conf/icisc/TakahashiFS10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/TakahashiF10,
  author       = {Junko Takahashi and
                  Toshinori Fukunaga},
  title        = {Differential Fault Analysis on {AES} with 192 and 256-Bit Keys},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {23},
  year         = {2010},
  url          = {http://eprint.iacr.org/2010/023},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/TakahashiF10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/GomisawaLTFSSO10,
  author       = {Shigeto Gomisawa and
                  Yang Li and
                  Junko Takahashi and
                  Toshinori Fukunaga and
                  Yu Sasaki and
                  Kazuo Sakiyama and
                  Kazuo Ohta},
  title        = {Efficient Differential Fault Analysis for {AES}},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {336},
  year         = {2010},
  url          = {http://eprint.iacr.org/2010/336},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/GomisawaLTFSSO10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fdtc/FukunagaT09,
  author       = {Toshinori Fukunaga and
                  Junko Takahashi},
  editor       = {Luca Breveglieri and
                  Israel Koren and
                  David Naccache and
                  Elisabeth Oswald and
                  Jean{-}Pierre Seifert},
  title        = {Practical Fault Attack on a Cryptographic {LSI} with {ISO/IEC} 18033-3
                  Block Ciphers},
  booktitle    = {Sixth International Workshop on Fault Diagnosis and Tolerance in Cryptography,
                  {FDTC} 2009, Lausanne, Switzerland, 6 September 2009},
  pages        = {84--92},
  publisher    = {{IEEE} Computer Society},
  year         = {2009},
  url          = {https://doi.org/10.1109/FDTC.2009.34},
  doi          = {10.1109/FDTC.2009.34},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/fdtc/FukunagaT09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/indocrypt/RebeiroMTF09,
  author       = {Chester Rebeiro and
                  Debdeep Mukhopadhyay and
                  Junko Takahashi and
                  Toshinori Fukunaga},
  editor       = {Bimal K. Roy and
                  Nicolas Sendrier},
  title        = {Cache Timing Attacks on Clefia},
  booktitle    = {Progress in Cryptology - {INDOCRYPT} 2009, 10th International Conference
                  on Cryptology in India, New Delhi, India, December 13-16, 2009. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5922},
  pages        = {104--118},
  publisher    = {Springer},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-3-642-10628-6\_7},
  doi          = {10.1007/978-3-642-10628-6\_7},
  timestamp    = {Tue, 14 May 2019 10:00:51 +0200},
  biburl       = {https://dblp.org/rec/conf/indocrypt/RebeiroMTF09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fdtc/TakahashiF08,
  author       = {Junko Takahashi and
                  Toshinori Fukunaga},
  editor       = {Luca Breveglieri and
                  Shay Gueron and
                  Israel Koren and
                  David Naccache and
                  Jean{-}Pierre Seifert},
  title        = {Improved Differential Fault Analysis on {CLEFIA}},
  booktitle    = {Fifth International Workshop on Fault Diagnosis and Tolerance in Cryptography,
                  2008, {FDTC} 2008, Washington, DC, USA, 10 August 2008},
  pages        = {25--34},
  publisher    = {{IEEE} Computer Society},
  year         = {2008},
  url          = {https://doi.org/10.1109/FDTC.2008.14},
  doi          = {10.1109/FDTC.2008.14},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/fdtc/TakahashiF08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fdtc/TakahashiFY07,
  author       = {Junko Takahashi and
                  Toshinori Fukunaga and
                  Kimihiro Yamakoshi},
  editor       = {Luca Breveglieri and
                  Shay Gueron and
                  Israel Koren and
                  David Naccache and
                  Jean{-}Pierre Seifert},
  title        = {{DFA} Mechanism on the {AES} Key Schedule},
  booktitle    = {Fourth International Workshop on Fault Diagnosis and Tolerance in
                  Cryptography, 2007, {FDTC} 2007: Vienna, Austria, 10 September 2007},
  pages        = {62--74},
  publisher    = {{IEEE} Computer Society},
  year         = {2007},
  url          = {https://doi.org/10.1109/FDTC.2007.4318986},
  doi          = {10.1109/FDTC.2007.4318986},
  timestamp    = {Wed, 16 Oct 2019 14:14:49 +0200},
  biburl       = {https://dblp.org/rec/conf/fdtc/TakahashiFY07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/TakahashiF07,
  author       = {Junko Takahashi and
                  Toshinori Fukunaga},
  title        = {Differential Fault Analysis on the {AES} Key Schedule},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {480},
  year         = {2007},
  url          = {http://eprint.iacr.org/2007/480},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/TakahashiF07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
a service of  Schloss Dagstuhl - Leibniz Center for Informatics