Akashi Satoh
According to our database1,
Akashi Satoh
authored at least 73 papers
between 1992 and 2022.
Collaborative distances:
Collaborative distances:
Timeline
1995
2000
2005
2010
2015
2020
0
5
10
1
2
3
3
3
1
1
1
2
1
2
2
1
1
2
4
2
2
2
3
7
11
5
2
1
2
2
1
1
2
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
On csauthors.net:
Bibliography
2022
Non intrusive current and power factor sensor with energy harvesting for maintenance-free operation.
Proceedings of the 2022 IEEE Sensors, Dallas, TX, USA, October 30 - Nov. 2, 2022, 2022
Proceedings of the 11th IEEE Global Conference on Consumer Electronics, 2022
2019
Proceedings of the IEEE 8th Global Conference on Consumer Electronics, 2019
2018
Proceedings of the IEEE 7th Global Conference on Consumer Electronics, 2018
2017
Proceedings of the IEEE 6th Global Conference on Consumer Electronics, 2017
Security evaluation of cryptographic modules against side-channel attack using a biased data set.
Proceedings of the IEEE 6th Global Conference on Consumer Electronics, 2017
2016
Comparison of side-channel attack on cryptographic cirucits between old and new technology FPGAs.
Proceedings of the IEEE 5th Global Conference on Consumer Electronics, 2016
Proceedings of the IEEE 5th Global Conference on Consumer Electronics, 2016
Clock glitch generator on SAKURA-G for fault injection attack against a cryptographic circuit.
Proceedings of the IEEE 5th Global Conference on Consumer Electronics, 2016
Proceedings of the IEEE 5th Global Conference on Consumer Electronics, 2016
2015
Side-channel Attack user reference architecture board SAKURA-W for security evaluation of IC card.
Proceedings of the IEEE 4th Global Conference on Consumer Electronics, 2015
Proceedings of the IEEE 4th Global Conference on Consumer Electronics, 2015
2014
Evaluation of Physical Unclonable Functions for 28-nm Process Field-Programmable Gate Arrays.
J. Inf. Process., 2014
Proceedings of the IEEE 3rd Global Conference on Consumer Electronics, 2014
Proceedings of the IEEE 3rd Global Conference on Consumer Electronics, 2014
2013
Bitstream Protection in Dynamic Partial Reconfiguration Systems Using Authenticated Encryption.
IEICE Trans. Inf. Syst., 2013
A Fast Power Current Simulation of Cryptographic VLSI Circuits for Side Channel Attack Evaluation.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2013
2012
IEEE Trans. Very Large Scale Integr. Syst., 2012
Evaluation of Information Leakage from Cryptographic Hardware via Common-Mode Current.
IEICE Trans. Electron., 2012
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2012
2011
IEEE Trans. Very Large Scale Integr. Syst., 2011
J. Cryptogr. Eng., 2011
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2011
Proceedings of the 2011 International Conference on Reconfigurable Computing and FPGAs, 2011
A fast power current analysis methodology using capacitor charging model for side channel attack evaluation.
Proceedings of the HOST 2011, 2011
2010
IEEE Trans. Computers, 2010
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2010
IEICE Electron. Express, 2010
Quantitative and Statistical Performance Evaluation of Arbiter Physical Unclonable Functions on FPGAs.
Proceedings of the ReConFig'10: 2010 International Conference on Reconfigurable Computing and FPGAs, 2010
Proceedings of the HOST 2010, 2010
2009
IEEE Trans. Computers, 2009
Mechanism behind Information Leakage in Electromagnetic Analysis of Cryptographic Modules.
Proceedings of the Information Security Applications, 10th International Workshop, 2009
Proceedings of the IEEE Workshop on Signal Processing Systems, 2009
Proceedings of the International Symposium on Circuits and Systems (ISCAS 2009), 2009
Proceedings of the International Symposium on Circuits and Systems (ISCAS 2009), 2009
Proceedings of the 19th European Conference on Circuit Theory and Design, 2009
Proceedings of the 19th European Conference on Circuit Theory and Design, 2009
Proceedings of the Cryptographic Hardware and Embedded Systems, 2009
2008
A High-Resolution Phase-Based Waveform Matching and Its Application to Side-Channel Attacks.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2008
Proceedings of the Information Security Applications, 9th International Workshop, 2008
Proceedings of the ReConFig'08: 2008 International Conference on Reconfigurable Computing and FPGAs, 2008
Bitstream Encryption and Authentication Using AES-GCM in Dynamically Reconfigurable Systems.
Proceedings of the Advances in Information and Computer Security, 2008
Proceedings of the International Symposium on Circuits and Systems (ISCAS 2008), 2008
Proceedings of the International Symposium on Circuits and Systems (ISCAS 2008), 2008
Enhanced power analysis attack using chosen message against RSA hardware implementations.
Proceedings of the International Symposium on Circuits and Systems (ISCAS 2008), 2008
Proceedings of the 26th International Conference on Computer Design, 2008
Proceedings of the FPL 2008, 2008
Bitstream encryption and authentication with AES-GCM in dynamically reconfigurable systems.
Proceedings of the FPL 2008, 2008
Proceedings of the Cryptographic Hardware and Embedded Systems, 2008
Proceedings of the Cryptographic Hardware and Embedded Systems, 2008
2007
Integr., 2007
Proceedings of the Information Security, 10th International Conference, 2007
Proceedings of the International Symposium on Circuits and Systems (ISCAS 2007), 2007
Proceedings of the International Symposium on Circuits and Systems (ISCAS 2007), 2007
Proceedings of the International Symposium on Circuits and Systems (ISCAS 2007), 2007
SPA against an FPGA-Based RSA Implementation with a High-Radix Montgomery Multiplier.
Proceedings of the International Symposium on Circuits and Systems (ISCAS 2007), 2007
2006
Proceedings of the International Symposium on Circuits and Systems (ISCAS 2006), 2006
Proceedings of the Cryptographic Hardware and Embedded Systems, 2006
2005
Proceedings of the Information Security, 8th International Conference, 2005
2004
IEEE Trans. Very Large Scale Integr. Syst., 2004
2003
IEEE Trans. Computers, 2003
Hardware-Focused Performance Comparison for the Standard Block Ciphers AES, Camellia, and Triple-DES.
Proceedings of the Information Security, 6th International Conference, 2003
Proceedings of the Cryptographic Hardware and Embedded Systems, 2003
2002
Proceedings of the Information Security, 5th International Conference, 2002
Proceedings of the Cryptographic Hardware and Embedded Systems, 2002
2001
Proceedings of the Advances in Cryptology, 2001
2000
High-Speed MARS Hardware.
Proceedings of the Third Advanced Encryption Standard Candidate Conference, 2000
1997
Proceedings of the Information Security, First International Workshop, 1997
Proceedings of the Proceedings 1997 International Conference on Computer Design: VLSI in Computers & Processors, 1997
1992
IEEE J. Solid State Circuits, September, 1992
IEEE J. Solid State Circuits, April, 1992