Naofumi Homma
Orcid: 0000-0003-0864-3126
According to our database1,
Naofumi Homma
authored at least 164 papers
between 2001 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
On csauthors.net:
Bibliography
2024
IACR Trans. Cryptogr. Hardw. Embed. Syst., 2024
Perceived Information Revisited II: Information-Theoretical Analysis of Deep-Learning Based Side-Channel Attacks.
IACR Cryptol. ePrint Arch., 2024
IACR Commun. Cryptol., 2024
Comparative Analysis and Implementation of Jump Address Masking for Preventing TEE Bypassing Fault Attacks.
Proceedings of the 19th International Conference on Availability, Reliability and Security, 2024
2023
IEEE Trans. Circuits Syst. II Express Briefs, October, 2023
IACR Trans. Cryptogr. Hardw. Embed. Syst., 2023
IACR Trans. Cryptogr. Hardw. Embed. Syst., 2023
Crystalor: Persistent Memory Encryption Mechanism with Optimized Metadata Structure and Fast Crash Recovery.
IACR Cryptol. ePrint Arch., 2023
IACR Cryptol. ePrint Arch., 2023
Proceedings of the 53rd IEEE International Symposium on Multiple-Valued Logic, 2023
2022
IEEE Trans. Inf. Forensics Secur., 2022
IACR Trans. Cryptogr. Hardw. Embed. Syst., 2022
One Truth Prevails: A Deep-learning Based Single-Trace Power Analysis on RSA-CRT with Windowed Exponentiation.
IACR Trans. Cryptogr. Hardw. Embed. Syst., 2022
Bypassing Isolated Execution on RISC-V using Side-Channel-Assisted Fault-Injection and Its Countermeasure.
IACR Trans. Cryptogr. Hardw. Embed. Syst., 2022
Perceived Information Revisited New Metrics to Evaluate Success Rate of Side-Channel Attacks.
IACR Trans. Cryptogr. Hardw. Embed. Syst., 2022
IEEE Trans. Circuits Syst. II Express Briefs, 2022
Efficient Formal Verification of Galois-Field Arithmetic Circuits Using ZDD Representation of Boolean Polynomials.
IEEE Trans. Comput. Aided Des. Integr. Circuits Syst., 2022
On the Success Rate of Side-Channel Attacks on Masked Implementations: Information-Theoretical Bounds and Their Practical Usage.
IACR Cryptol. ePrint Arch., 2022
High-Speed Hardware Architecture for Post-Quantum Diffie-Hellman Key Exchange Based on Residue Number System.
Proceedings of the IEEE International Symposium on Circuits and Systems, 2022
Proceedings of the 25th Euromicro Conference on Digital System Design, 2022
2021
Diffusional Side-Channel Leakage From Unrolled Lightweight Block Ciphers: A Case Study of Power Analysis on PRINCE.
IEEE Trans. Inf. Forensics Secur., 2021
Imbalanced Data Problems in Deep Learning-Based Side-Channel Attacks: Analysis and Solution.
IEEE Trans. Inf. Forensics Secur., 2021
J. Cryptogr. Eng., 2021
An Algebraic Approach to Verifying Galois-Field Arithmetic Circuits with Multiple-Valued Characteristics.
IEICE Trans. Inf. Syst., 2021
Fault-Injection Attacks against NIST's Post-Quantum Cryptography Round 3 KEM Candidates.
IACR Cryptol. ePrint Arch., 2021
Toward Optimal Deep-Learning Based Side-Channel Attacks: Probability Concentration Inequality Loss and Its Usage.
IACR Cryptol. ePrint Arch., 2021
A Systematic Design Methodology of Formally Proven Side-Channel-Resistant Cryptographic Hardware.
IEEE Des. Test, 2021
Proceedings of the 51st IEEE International Symposium on Multiple-Valued Logic, 2021
Extraction of Binarized Neural Network Architecture and Secret Parameters Using Side-Channel Information.
Proceedings of the IEEE International Symposium on Circuits and Systems, 2021
2020
IACR Trans. Cryptogr. Hardw. Embed. Syst., 2020
IEEE Trans. Circuits Syst. II Express Briefs, 2020
IEEE Trans. Computers, 2020
IACR Cryptol. ePrint Arch., 2020
Debiasing Method for Efficient Ternary Fuzzy Extractors and Ternary Physically Unclonable Functions.
Proceedings of the 50th IEEE International Symposium on Multiple-Valued Logic, 2020
Effective Formal Verification for Galois-field Arithmetic Circuits with Multiple-Valued Characteristics.
Proceedings of the 50th IEEE International Symposium on Multiple-Valued Logic, 2020
Proceedings of the IEEE International Symposium on Circuits and Systems, 2020
Proceedings of the IEEE/ACM International Conference On Computer Aided Design, 2020
Proceedings of the Constructive Side-Channel Analysis and Secure Design, 2020
Practical Side-Channel Based Model Extraction Attack on Tree-Based Machine Learning Algorithm.
Proceedings of the Applied Cryptography and Network Security Workshops, 2020
2019
Efficient Fuzzy Extractors Based on Ternary Debiasing Method for Biased Physically Unclonable Functions.
IEEE Trans. Circuits Syst. I Regul. Pap., 2019
Tackling Biased PUFs Through Biased Masking: A Debiasing Method for Efficient Fuzzy Extractor.
IEEE Trans. Computers, 2019
Highly efficient GF(2<sup>8</sup>) inversion circuit based on hybrid GF representations.
J. Cryptogr. Eng., 2019
Proceedings of 8th International Workshop on Security Proofs for Embedded Systems, 2019
Proceedings of the 2019 IEEE 49th International Symposium on Multiple-Valued Logic (ISMVL), 2019
Proceedings of the IEEE International Symposium on Circuits and Systems, 2019
2018
Proceedings of the 2018 International Symposium on VLSI Design, 2018
Proceedings of the 48th IEEE International Symposium on Multiple-Valued Logic, 2018
Proceedings of the 48th IEEE International Symposium on Multiple-Valued Logic, 2018
On Masked Galois-Field Multiplication for Authenticated Encryption Resistant to Side Channel Analysis.
Proceedings of the Constructive Side-Channel Analysis and Secure Design, 2018
Proceedings of the PROOFS 2018, 2018
2017
IEEE Trans. Computers, 2017
Design Methodology and Validity Verification for a Reactive Countermeasure Against EM Attacks.
J. Cryptol., 2017
J. Cryptogr. Eng., 2017
Power Analysis on Unrolled Architecture with Points-of-Interest Search and Its Application to PRINCE Block Cipher.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2017
Hierarchical Formal Verification Combining Algebraic Transformation with PPRM Expansion and Its Application to Masked Cryptographic Processors.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2017
IEICE Trans. Inf. Syst., 2017
IEICE Electron. Express, 2017
Proceedings of the 2017 IEEE Trustcom/BigDataSE/ICESS, Sydney, Australia, August 1-4, 2017, 2017
Proceedings of the 18th International Symposium on Quality Electronic Design, 2017
A Systematic Design of Tamper-Resistant Galois-Field Arithmetic Circuits Based on Threshold Implementation with (d + 1) Input Shares.
Proceedings of the 47th IEEE International Symposium on Multiple-Valued Logic, 2017
Proceedings of the 2017 IEEE European Symposium on Security and Privacy Workshops, 2017
Automatic generation of formally-proven tamper-resistant Galois-field multipliers based on generalized masking scheme.
Proceedings of the Design, Automation & Test in Europe Conference & Exhibition, 2017
Toward More Efficient DPA-Resistant AES Hardware Architecture Based on Threshold Implementation.
Proceedings of the Constructive Side-Channel Analysis and Secure Design, 2017
Multiple-Valued Debiasing for Physically Unclonable Functions and Its Application to Fuzzy Extractors.
Proceedings of the Constructive Side-Channel Analysis and Secure Design, 2017
2016
A Formal Verification Method of Error Correction Code Processors Over Galois-Field Arithmetic.
J. Multiple Valued Log. Soft Comput., 2016
A High Throughput/Gate AES Hardware Architecture by Compressing Encryption and Decryption Datapaths - Toward Efficient CBC-Mode Implementation.
IACR Cryptol. ePrint Arch., 2016
IEEE J. Emerg. Sel. Topics Circuits Syst., 2016
Formal Design of Pipelined GF Arithmetic Circuits and Its Application to Cryptographic Processors.
Proceedings of the 46th IEEE International Symposium on Multiple-Valued Logic, 2016
2015
A Silicon-Level Countermeasure Against Fault Sensitivity Analysis and Its Evaluation.
IEEE Trans. Very Large Scale Integr. Syst., 2015
J. Multiple Valued Log. Soft Comput., 2015
IEICE Trans. Commun., 2015
Efficient DFA on SPN-Based Block Ciphers and Its Application to the LED Block Cipher.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2015
An Adaptive Multiple-Fault Injection Attack on Microcontrollers and a Countermeasure.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2015
Highly Efficient GF(2<sup>8</sup>) Inversion Circuit Based on Redundant GF Arithmetic and Its Application to AES Design.
IACR Cryptol. ePrint Arch., 2015
Improved Power Analysis on Unrolled Architecture and Its Application to PRINCE Block Cipher.
Proceedings of the Lightweight Cryptography for Security and Privacy, 2015
Formal Design of Galois-Field Arithmetic Circuits Based on Polynomial Ring Representation.
Proceedings of the 2015 IEEE International Symposium on Multiple-Valued Logic, 2015
Proceedings of the 2015 IEEE International Symposium on Multiple-Valued Logic, 2015
Proceedings of the 52nd Annual Design Automation Conference, 2015
A DPA/DEMA/LEMA-resistant AES cryptographic processor with supply-current equalizer and micro EM probe sensor.
Proceedings of the 20th Asia and South Pacific Design Automation Conference, 2015
2014
Toward Formal Design of Practical Cryptographic Hardware Based on Galois Field Arithmetic.
IEEE Trans. Computers, 2014
J. Inf. Process., 2014
Formal Design of Arithmetic Circuits over Galois Fields Based on Normal Basis Representations.
IEICE Trans. Inf. Syst., 2014
Chosen-IV Correlation Power Analysis on KCipher-2 Hardware and a Masking-Based Countermeasure.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2014
Power Noise Measurements of Cryptographic VLSI Circuits Regarding Side-Channel Information Leakage.
IEICE Trans. Electron., 2014
EM Attack Is Non-Invasive? - Design Methodology and Validity Verification of EM Attack Sensor.
IACR Cryptol. ePrint Arch., 2014
A local EM-analysis attack resistant cryptographic engine with fully-digital oscillator-based tamper-access sensor.
Proceedings of the Symposium on VLSI Circuits, 2014
An Efficient Approach to Verifying Galois-Field Arithmetic Circuits of Higher Degrees and Its Application to ECC Decoders.
Proceedings of the IEEE 44th International Symposium on Multiple-Valued Logic, 2014
A hierarchical formal approach to verifying side-channel resistant cryptographic processors.
Proceedings of the 2014 IEEE International Symposium on Hardware-Oriented Security and Trust, 2014
Proceedings of the 2014 IEEE International Symposium on Hardware-Oriented Security and Trust, 2014
A Multiple-Fault Injection Attack by Adaptive Timing Control Under Black-Box Conditions and a Countermeasure.
Proceedings of the Constructive Side-Channel Analysis and Secure Design, 2014
A Threat for Tablet PCs in Public Space: Remote Visualization of Screen Images Using EM Emanation.
Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security, 2014
2013
A Graph-Based Approach to Designing Parallel Multipliers over Galois Fields Based on Normal Basis Representations.
Proceedings of the 43rd IEEE International Symposium on Multiple-Valued Logic, 2013
Proceedings of the Foundations and Practice of Security - 6th International Symposium, 2013
Transient analysis of EM radiation associated with information leakage from cryptographic ICs.
Proceedings of the 9th International Workshop on Electromagnetic Compatibility of Integrated Circuits, 2013
Proceedings of the Constructive Side-Channel Analysis and Secure Design, 2013
Proceedings of the Constructive Side-Channel Analysis and Secure Design, 2013
2012
IEEE Trans. Very Large Scale Integr. Syst., 2012
A Formal Approach to Designing Cryptographic Processors Based on $GF(2^m)$ Arithmetic Circuits.
IEEE Trans. Inf. Forensics Secur., 2012
Evaluation of Information Leakage from Cryptographic Hardware via Common-Mode Current.
IEICE Trans. Electron., 2012
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2012
Proceedings of the 15th International Symposium on Wireless Personal Multimedia Communications, 2012
Formal Design of Multiple-Valued Arithmetic Algorithms over Galois Fields and Its Application to Cryptographic Processor.
Proceedings of the 42nd IEEE International Symposium on Multiple-Valued Logic, 2012
Proceedings of the Information Security and Cryptology - ICISC 2012, 2012
An Efficient Countermeasure against Fault Sensitivity Analysis Using Configurable Delay Blocks.
Proceedings of the 2012 Workshop on Fault Diagnosis and Tolerance in Cryptography, 2012
2011
IEEE Trans. Very Large Scale Integr. Syst., 2011
J. Cryptogr. Eng., 2011
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2011
Proceedings of the 41st IEEE International Symposium on Multiple-Valued Logic, 2011
Enhancement of simple electro-magnetic attacks by pre-characterization in frequency domain and demodulation techniques.
Proceedings of the Design, Automation and Test in Europe, 2011
2010
IEEE Trans. Computers, 2010
IEICE Trans. Inf. Syst., 2010
IEICE Electron. Express, 2010
Proceedings of the 40th IEEE International Symposium on Multiple-Valued Logic, 2010
2009
Systematic Approach to Designing Multiple-Valued Arithmetic Circuits Based on Arithmetic Description Language.
J. Multiple Valued Log. Soft Comput., 2009
Mechanism behind Information Leakage in Electromagnetic Analysis of Cryptographic Modules.
Proceedings of the Information Security Applications, 10th International Workshop, 2009
Proceedings of the ISMVL 2009, 2009
Proceedings of the International Symposium on Circuits and Systems (ISCAS 2009), 2009
Proceedings of the 19th European Conference on Circuit Theory and Design, 2009
Proceedings of the 19th European Conference on Circuit Theory and Design, 2009
2008
A Systematic Approach for Designing Redundant Arithmetic Adders Based on Counter Tree Diagrams.
IEEE Trans. Computers, 2008
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2008
A High-Resolution Phase-Based Waveform Matching and Its Application to Side-Channel Attacks.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2008
Proceedings of the Information Security Applications, 9th International Workshop, 2008
Proceedings of the ReConFig'08: 2008 International Conference on Reconfigurable Computing and FPGAs, 2008
High-Level Design of Multiple-Valued Arithmetic Circuits Based on Arithmetic Description Language.
Proceedings of the 38th IEEE International Symposium on Multiple-Valued Logic (ISMVL 2008), 2008
Proceedings of the International Symposium on Circuits and Systems (ISCAS 2008), 2008
Proceedings of the International Symposium on Circuits and Systems (ISCAS 2008), 2008
Enhanced power analysis attack using chosen message against RSA hardware implementations.
Proceedings of the International Symposium on Circuits and Systems (ISCAS 2008), 2008
Proceedings of the 26th International Conference on Computer Design, 2008
Proceedings of the FPL 2008, 2008
Proceedings of the Cryptographic Hardware and Embedded Systems, 2008
Proceedings of the Cryptographic Hardware and Embedded Systems, 2008
2007
J. Multiple Valued Log. Soft Comput., 2007
Synthesis of current mirrors based on evolutionary graph generation with transmigration capability.
IEICE Electron. Express, 2007
Algorithm-Level Optimization of Multiple-Valued Arithmetic Circuits Using Counter Tree Diagrams.
Proceedings of the 37th International Symposium on Multiple-Valued Logic, 2007
Proceedings of the International Symposium on Circuits and Systems (ISCAS 2007), 2007
Proceedings of the International Symposium on Circuits and Systems (ISCAS 2007), 2007
SPA against an FPGA-Based RSA Implementation with a High-Radix Montgomery Multiplier.
Proceedings of the International Symposium on Circuits and Systems (ISCAS 2007), 2007
Proceedings of the 25th International Conference on Computer Design, 2007
2006
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2006
Systematic Interpretation of Redundant Arithmetic Adders in Binary and Multiple-Valued Logic.
IEICE Trans. Electron., 2006
Algorithm-level interpretation of fast adder structures in binary and multiple-valued logic.
Proceedings of the 36th IEEE International Symposium on Multiple-Valued Logic (ISMVL 2006), 2006
Proceedings of the Cryptographic Hardware and Embedded Systems, 2006
2005
J. Multiple Valued Log. Soft Comput., 2005
2004
Proceedings of the Parallel Problem Solving from Nature, 2004
Design and Verification of Parallel Multipliers Using Arithmetic Description Language: ARITH.
Proceedings of the 34th IEEE International Symposium on Multiple-Valued Logic (ISMVL 2004), 2004
A systematic approach for analyzing fast addition algorithms using counter tree diagrams.
Proceedings of the 2004 International Symposium on Circuits and Systems, 2004
Proceedings of the 6th NASA / DoD Workshop on Evolvable Hardware (EH 2004), 2004
2003
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2003
A framework of evolutionary graph generation system and its application to circuit synthesis.
Proceedings of the 2003 International Symposium on Circuits and Systems, 2003
VLSI circuit design using an object-oriented framework of evolutionary graph generation system.
Proceedings of the IEEE Congress on Evolutionary Computation, 2003
2002
IEEE Trans. Evol. Comput., 2002
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2002
Evolutionary Graph Generation System and Its Application to Bit-Serial Arithmetic Circuit Synthesis.
Proceedings of the Parallel Problem Solving from Nature, 2002
Graph-based individual representation for evolutionary synthesis of arithmetic circuits.
Proceedings of the 2002 Congress on Evolutionary Computation, 2002
2001
Evolutionary graph generation system with transmigration capability for arithmetic circuit design.
Proceedings of the 2001 International Symposium on Circuits and Systems, 2001
Proceedings of the 2001 8th IEEE International Conference on Electronics, 2001