Junko Takahashi

According to our database1, Junko Takahashi authored at least 34 papers between 2007 and 2023.

Collaborative distances:
  • Dijkstra number2 of five.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2023
Multiple-Valued Plaintext-Checking Side-Channel Attacks on Post-Quantum KEMs.
IACR Trans. Cryptogr. Hardw. Embed. Syst., 2023

2022
Curse of Re-encryption: A Generic Power/EM Analysis on Post-Quantum KEMs.
IACR Trans. Cryptogr. Hardw. Embed. Syst., 2022

Machine Learning Based Hardware Trojan Detection Using Electromagnetic Emanation.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2022

2021
Timing Attack on Random Forests: Experimental Evaluation and Detailed Analysis.
J. Inf. Process., 2021

A method for constructing sliding windows leak from noisy cache timing information.
J. Cryptogr. Eng., 2021

Fault-Injection Attacks against NIST's Post-Quantum Cryptography Round 3 KEM Candidates.
IACR Cryptol. ePrint Arch., 2021

2020
Security Threat Analysis of Automotive Infotainment Systems.
Proceedings of the 92nd IEEE Vehicular Technology Conference, 2020

Timing Attack on Random Forests for Generating Adversarial Examples.
Proceedings of the Advances in Information and Computer Security, 2020

2019
Automotive Security on Abnormal Vehicle Behavior Using Only Fabricated Informative CAN Messages.
J. Inf. Process., 2019

Constructing Sliding Windows Leak from Noisy Cache Timing Information of OSS-RSA.
Proceedings of 8th International Workshop on Security Proofs for Embedded Systems, 2019

2018
An Overview of Cyber Security for Connected Vehicles.
IEICE Trans. Inf. Syst., 2018

Abnormal vehicle behavior induced using only fabricated informative CAN messages.
Proceedings of the 2018 IEEE International Symposium on Hardware Oriented Security and Trust, 2018

2017
Automotive Attacks and Countermeasures on LIN-Bus.
J. Inf. Process., 2017

Buffer overflow attack with multiple fault injection and a proven countermeasure.
J. Cryptogr. Eng., 2017

2015
Evaluation Method for Access-Driven Cache Attacks Using Correlation Coefficient.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2015

An Adaptive Multiple-Fault Injection Attack on Microcontrollers and a Countermeasure.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2015

2014
Fault Analysis on SIMON Family of Lightweight Block Ciphers.
Proceedings of the Information Security and Cryptology - ICISC 2014, 2014

Tile Before Multiplication: An Efficient Strategy to Optimize DSP Multiplier for Accelerating Prime Field ECC for NIST Curves.
Proceedings of the 51st Annual Design Automation Conference 2014, 2014

A Multiple-Fault Injection Attack by Adaptive Timing Control Under Black-Box Conditions and a Countermeasure.
Proceedings of the Constructive Side-Channel Analysis and Secure Design, 2014

2013
Gastric Lymph Node Cancer Detection of Multiple Features Classifier for Pathology Diagnosis Support System.
Proceedings of the IEEE International Conference on Systems, 2013

Highly Accurate Key Extraction Method for Access-Driven Cache Attacks Using Correlation Coefficient.
Proceedings of the Information Security and Privacy - 18th Australasian Conference, 2013

2012
Fault Injection and Key Retrieval Experiments on an Evaluation Board.
Proceedings of the Fault Analysis in Cryptography, 2012

Differential Fault Analysis on Stream Cipher MUGI.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2012

2011
Scalar Multiplication on Koblitz Curves using tau<sup>2</sup>-NAF.
IACR Cryptol. ePrint Arch., 2011

2010
Differential Fault Analysis on CLEFIA with 128, 192, and 256-Bit Keys.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2010

Differential Fault Analysis on AES with 192 and 256-Bit Keys.
IACR Cryptol. ePrint Arch., 2010

Efficient Differential Fault Analysis for AES.
IACR Cryptol. ePrint Arch., 2010

Fault Analysis on Stream Cipher MUGI.
Proceedings of the Information Security and Cryptology - ICISC 2010, 2010

Fault Sensitivity Analysis.
Proceedings of the Cryptographic Hardware and Embedded Systems, 2010

2009
Cache Timing Attacks on Clefia.
Proceedings of the Progress in Cryptology, 2009

Practical Fault Attack on a Cryptographic LSI with ISO/IEC 18033-3 Block Ciphers.
Proceedings of the Sixth International Workshop on Fault Diagnosis and Tolerance in Cryptography, 2009

2008
Improved Differential Fault Analysis on CLEFIA.
Proceedings of the Fifth International Workshop on Fault Diagnosis and Tolerance in Cryptography, 2008

2007
Differential Fault Analysis on the AES Key Schedule.
IACR Cryptol. ePrint Arch., 2007

DFA Mechanism on the AES Key Schedule.
Proceedings of the Fourth International Workshop on Fault Diagnosis and Tolerance in Cryptography, 2007


  Loading...