Articoli con mandati relativi all'accesso pubblico - Kazuo SakiyamaUlteriori informazioni
Non disponibili pubblicamente: 5
Reconfigurable modular arithmetic logic unit supporting high-performance RSA and ECC over GF (p)
K Sakiyama, N Mentens, L Batina, B Preneel, I Verbauwhede
International Journal of Electronics 94 (5), 501-514, 2007
Mandati: Research Foundation (Flanders)
Optimized software implementations of ASCON, Grain-128AEAD, and TinyJambu on ARM Cortex-M0
T Kitahara, R Hira, Y Hara-Azumi, D Miyahara, Y Li, K Sakiyama
2022 Tenth International Symposium on Computing and Networking Workshops …, 2022
Mandati: Japan Science and Technology Agency
Compact public-key implementations for RFID and Sensor Nodes
L Batina, K Sakiyama, IMR Verbauwhede
Secure Integrated Circuits and Systems, 179-195, 2009
Mandati: Research Foundation (Flanders)
Examining vulnerability of hls-designed chaskey-12 circuits to power side-channel attacks
S Inagaki, M Yang, Y Li, K Sakiyama, Y Hara-Azumi
2022 23rd International Symposium on Quality Electronic Design (ISQED), 1-1, 2022
Mandati: Japan Science and Technology Agency
Recovering Memory Access Sequence with Differential Flush+ Reload Attack
Z Yuan, Y Li, K Sakiyama, T Sugawara, J Wang
Information Security Practice and Experience: 14th International Conference …, 2018
Mandati: National Natural Science Foundation of China
Disponibili pubblicamente: 18
Elliptic-curve-based security processor for RFID
YK Lee, K Sakiyama, L Batina, I Verbauwhede
IEEE Transactions on Computers 57 (11), 1514-1527, 2008
Mandati: Research Foundation (Flanders)
Multicore curve-based cryptoprocessor with reconfigurable modular arithmetic logic units over GF (2^ n)
K Sakiyama, L Batina, B Preneel, I Verbauwhede
IEEE Transactions on Computers 56 (9), 1269-1282, 2007
Mandati: Research Foundation (Flanders)
Fair and consistent hardware evaluation of fourteen round two SHA-3 candidates
M Knezevic, K Kobayashi, J Ikegami, S Matsuo, A Satoh, Ü Kocabas, ...
IEEE Transactions on Very Large Scale Integration (VLSI) Systems 20 (5), 827-840, 2011
Mandati: Research Foundation (Flanders)
Elliptic curve cryptography on embedded multicore systems
J Fan, K Sakiyama, I Verbauwhede
Design Automation for Embedded Systems 12, 231-242, 2008
Mandati: Research Foundation (Flanders)
Montgomery modular multiplication algorithm on multi-core systems
J Fan, K Sakiyama, I Verbauwhede
2007 IEEE Workshop on Signal Processing Systems, 261-266, 2007
Mandati: Research Foundation (Flanders)
Tripartite modular multiplication
K Sakiyama, M Knežević, J Fan, B Preneel, I Verbauwhede
Integration 44 (4), 259-269, 2011
Mandati: Research Foundation (Flanders)
Modular Reduction in GF(2 n ) without Pre-computational Phase
M Knežević, K Sakiyama, J Fan, I Verbauwhede
Arithmetic of Finite Fields: 2nd International Workshop, WAIFI 2008 Siena …, 2008
Mandati: Research Foundation (Flanders)
Public-key cryptography on the top of a needle
L Batina, N Mentens, K Sakiyama, B Preneel, I Verbauwhede
2007 IEEE International Symposium on Circuits and Systems (ISCAS), 1831-1834, 2007
Mandati: Research Foundation (Flanders)
High-performance public-key cryptoprocessor for wireless mobile applications
K Sakiyama, L Batina, B Preneel, I Verbauwhede
Mobile networks and applications 12, 245-258, 2007
Mandati: Research Foundation (Flanders)
On the high-throughput implementation of ripemd-160 hash algorithm
M Knezzevic, K Sakiyama, YK Lee, I Verbauwhede
2008 International Conference on Application-Specific Systems, Architectures …, 2008
Mandati: Research Foundation (Flanders)
HW/SW co-design for public-key cryptosystems on the 8051 micro-controller
K Sakiyama, L Batina, B Preneel, I Verbauwhede
Computers & Electrical Engineering 33 (5-6), 324-332, 2007
Mandati: Research Foundation (Flanders)
A side-channel attack resistant programmable PKC coprocessor for embedded applications
N Mentens, K Sakiyama, L Batina, B Preneel, I Verbauwhede
2007 International Conference on Embedded Computer Systems: Architectures …, 2007
Mandati: Research Foundation (Flanders)
The limits of SEMA on distinguishing similar activation functions of embedded deep neural networks
G Takatoi, T Sugawara, K Sakiyama, Y Hara-Azumi, Y Li
Applied Sciences 12 (9), 4135, 2022
Mandati: Japan Science and Technology Agency
Software evaluation for second round candidates in NIST lightweight cryptography
R Hira, T Kitahara, D Miyahara, Y Hara-Azumi, Y Li, K Sakiyama
Journal of Information Processing 31, 205-219, 2023
Mandati: Japan Science and Technology Agency
Fpga design for algebraic tori-based public-key cryptography
J Fan, L Batina, K Sakiyama, I Verbauwhede
Proceedings of the conference on Design, automation and test in Europe, 1292 …, 2008
Mandati: Research Foundation (Flanders)
Le informazioni sulla pubblicazione e sul finanziamento vengono stabilite automaticamente da un software