Junko Takahashi
According to our database1,
Junko Takahashi
authored at least 34 papers
between 2007 and 2023.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
On csauthors.net:
Bibliography
2023
IACR Trans. Cryptogr. Hardw. Embed. Syst., 2023
2022
IACR Trans. Cryptogr. Hardw. Embed. Syst., 2022
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2022
2021
J. Inf. Process., 2021
J. Cryptogr. Eng., 2021
Fault-Injection Attacks against NIST's Post-Quantum Cryptography Round 3 KEM Candidates.
IACR Cryptol. ePrint Arch., 2021
2020
Proceedings of the 92nd IEEE Vehicular Technology Conference, 2020
Proceedings of the Advances in Information and Computer Security, 2020
2019
Automotive Security on Abnormal Vehicle Behavior Using Only Fabricated Informative CAN Messages.
J. Inf. Process., 2019
Proceedings of 8th International Workshop on Security Proofs for Embedded Systems, 2019
2018
Proceedings of the 2018 IEEE International Symposium on Hardware Oriented Security and Trust, 2018
2017
J. Cryptogr. Eng., 2017
2015
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2015
An Adaptive Multiple-Fault Injection Attack on Microcontrollers and a Countermeasure.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2015
2014
Proceedings of the Information Security and Cryptology - ICISC 2014, 2014
Tile Before Multiplication: An Efficient Strategy to Optimize DSP Multiplier for Accelerating Prime Field ECC for NIST Curves.
Proceedings of the 51st Annual Design Automation Conference 2014, 2014
A Multiple-Fault Injection Attack by Adaptive Timing Control Under Black-Box Conditions and a Countermeasure.
Proceedings of the Constructive Side-Channel Analysis and Secure Design, 2014
2013
Gastric Lymph Node Cancer Detection of Multiple Features Classifier for Pathology Diagnosis Support System.
Proceedings of the IEEE International Conference on Systems, 2013
Highly Accurate Key Extraction Method for Access-Driven Cache Attacks Using Correlation Coefficient.
Proceedings of the Information Security and Privacy - 18th Australasian Conference, 2013
2012
Proceedings of the Fault Analysis in Cryptography, 2012
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2012
2011
IACR Cryptol. ePrint Arch., 2011
2010
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2010
IACR Cryptol. ePrint Arch., 2010
Proceedings of the Information Security and Cryptology - ICISC 2010, 2010
Proceedings of the Cryptographic Hardware and Embedded Systems, 2010
2009
Proceedings of the Sixth International Workshop on Fault Diagnosis and Tolerance in Cryptography, 2009
2008
Proceedings of the Fifth International Workshop on Fault Diagnosis and Tolerance in Cryptography, 2008
2007
IACR Cryptol. ePrint Arch., 2007
Proceedings of the Fourth International Workshop on Fault Diagnosis and Tolerance in Cryptography, 2007