Masahiko Takenaka
According to our database1,
Masahiko Takenaka
authored at least 56 papers
between 1999 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
2000
2005
2010
2015
2020
0
1
2
3
4
5
6
7
8
9
1
3
1
1
2
2
1
1
1
1
1
1
2
3
4
2
2
6
3
1
1
3
3
1
1
1
3
2
1
1
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
On csauthors.net:
Bibliography
2024
2019
Analysis of Actual Propagation Behavior of WannaCry Within an Intranet (Extended Abstract).
Proceedings of the Advances in Networked-based Information Systems, 2019
2017
Proceedings of the Advances in Network-Based Information Systems, 2017
Recovering Attacks Against Linear Sketch in Fuzzy Signature Schemes of ACNS 2015 and 2016.
Proceedings of the Information Security Practice and Experience, 2017
2016
TOPASE: Detection and Prevention of Brute Force Attacks with Disciplined IPs from IDS Logs.
J. Inf. Process., 2016
Experimental Evaluation on the Resistance of Latch PUFs Implemented on ASIC against FIB-Based Invasive Attacks.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2016
EURASIP J. Inf. Secur., 2016
2015
A new method for enhancing variety and maintaining reliability of PUF responses and its evaluation on ASICs.
J. Cryptogr. Eng., 2015
Proceedings of the 18th International Conference on Network-Based Information Systems, 2015
Proceedings of the IFIP/IEEE International Symposium on Integrated Network Management, 2015
Proceedings of the 10th International Conference for Internet Technology and Secured Transactions, 2015
2014
IACR Cryptol. ePrint Arch., 2014
A Technique Using PUFs for Protecting Circuit Layout Designs against Reverse Engineering.
Proceedings of the Advances in Information and Computer Security, 2014
Privacy-Preserving Technology for Secure Utilization of Sensor Data (Extended Abstract).
Proceedings of the Eighth International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing, 2014
Security Evaluation of Bistable Ring PUFs on FPGAs using Differential and Linear Analysis.
Proceedings of the 2014 Federated Conference on Computer Science and Information Systems, 2014
Proceedings of the 28th IEEE International Conference on Advanced Information Networking and Applications, 2014
2013
J. Commun., 2013
Variety enhancement of PUF responses using the locations of random outputting RS latches.
J. Cryptogr. Eng., 2013
Proceedings of the Seventh International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing, 2013
Evaluation of ASIC Implementation of Physical Random Number Generators Using RS Latches.
Proceedings of the Smart Card Research and Advanced Applications, 2013
2012
Solving a Discrete Logarithm Problem with Auxiliary Input on a 160-Bit Elliptic Curve.
Proceedings of the Public Key Cryptography - PKC 2012, 2012
Proceedings of the Sixth International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing, 2012
2011
J. Inf. Process., 2011
IEICE Trans. Inf. Syst., 2011
Proceedings of the Information Security Theory and Practice. Security and Privacy of Mobile Devices in Wireless Communication, 2011
Proceedings of the Information Security Applications - 12th International Workshop, 2011
Time Estimation of Cheon's Algorithm over Elliptic Curves on Finite Fields with Characteristic 3.
Proceedings of the Fifth International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing, 2011
Proceedings of the Financial Cryptography and Data Security, 2011
Uniqueness Enhancement of PUF Responses Based on the Locations of Random Outputting RS Latches.
Proceedings of the Cryptographic Hardware and Embedded Systems - CHES 2011 - 13th International Workshop, Nara, Japan, September 28, 2011
Proceedings of the 25th IEEE International Conference on Advanced Information Networking and Applications, 2011
2010
A Prototype System for Ensuring Integrity of Extracted Video Data (Extended Abstract).
Proceedings of the Advances in Information and Computer Security, 2010
Proceedings of the ARES 2010, 2010
2009
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2009
Proceedings of the The Forth International Conference on Availability, 2009
2008
Proceedings of the Information Security Applications, 9th International Workshop, 2008
2007
Proceedings of the Information Security Practice and Experience, 2007
Proceedings of the Cryptography and Coding, 2007
Proceedings of the The Second International Conference on Availability, 2007
2006
Proceedings of the 2006 International Symposium on Applications and the Internet (SAINT 2006), 2006
Proceedings of the Information and Communications Security, 8th International Conference, 2006
Proceedings of the Applied Cryptography and Network Security, 4th International Conference, 2006
2005
Design Optimization of a High-Speed, Area-Efficient and Low-Power Montgomery Modular Multiplier for RSA Algorithm.
IEICE Trans. Electron., 2005
Proceedings of the Information and Communications Security, 7th International Conference, 2005
2004
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2004
Proceedings of the Smart Card Research and Advanced Applications VI, 2004
2003
Proceedings of the Cryptographic Hardware and Embedded Systems, 2003
2002
Proceedings of the Fast Software Encryption, 9th International Workshop, 2002
Proceedings of the Cryptographic Hardware and Embedded Systems, 2002
Address-Bit Differential Power Analysis of Cryptographic Schemes OK-ECDH and OK-ECDSA.
Proceedings of the Cryptographic Hardware and Embedded Systems, 2002
2001
Proceedings of the Information Security and Cryptology, 2001
Proceedings of the Fast Software Encryption, 8th International Workshop, 2001
2000
Implementation of Elliptic Curve Cryptographic Coprocessor over GF(2<sup>m</sup>) on an FPGA.
Proceedings of the Cryptographic Hardware and Embedded Systems, 2000
1999
Proceedings of the Cryptographic Hardware and Embedded Systems, 1999