Sumio Morioka
Orcid: 0000-0001-7641-1904
According to our database1,
Sumio Morioka
authored at least 25 papers
between 1994 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
-
on orcid.org
On csauthors.net:
Bibliography
2024
Feasibility Study with Actual Space Rockets Towards Information Theoretically Secure Radio Communication.
Proceedings of the Intelligent Computing, 2024
2023
Proceedings of Work-in-Progress in Hardware and Software for Location Computation (WIPHAL 2023), 2023
2022
On Cryptographic Algorithms and Key Length for Delayed Disclosure Authentication of GNSS.
Proceedings of the 2022 International Conference on Localization and GNSS, 2022
2021
A Systematic Design Methodology of Formally Proven Side-Channel-Resistant Cryptographic Hardware.
IEEE Des. Test, 2021
2020
IEEE Trans. Computers, 2020
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2020
2017
Hierarchical Formal Verification Combining Algebraic Transformation with PPRM Expansion and Its Application to Masked Cryptographic Processors.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2017
Automatic generation of formally-proven tamper-resistant Galois-field multipliers based on generalized masking scheme.
Proceedings of the Design, Automation & Test in Europe Conference & Exhibition, 2017
2016
A High Throughput/Gate AES Hardware Architecture by Compressing Encryption and Decryption Datapaths - Toward Efficient CBC-Mode Implementation.
IACR Cryptol. ePrint Arch., 2016
2014
A hierarchical formal approach to verifying side-channel resistant cryptographic processors.
Proceedings of the 2014 IEEE International Symposium on Hardware-Oriented Security and Trust, 2014
2012
Proceedings of the Selected Areas in Cryptography, 19th International Conference, 2012
2011
Flexible architecture optimization and ASIC implementation of group signature algorithm using a customized HLS methodology.
Proceedings of the HOST 2011, 2011
2004
IEEE Trans. Very Large Scale Integr. Syst., 2004
2003
Hardware-Focused Performance Comparison for the Standard Block Ciphers AES, Camellia, and Triple-DES.
Proceedings of the Information Security, 6th International Conference, 2003
Proceedings of the Cryptographic Hardware and Embedded Systems, 2003
2002
Proceedings of the Information Security, 5th International Conference, 2002
Proceedings of the Cryptographic Hardware and Embedded Systems, 2002
2001
Towards Efficient Verification of Arithmetic Algorithms over Galois Fields GF(2<sup>m</sup>).
Proceedings of the Computer Aided Verification, 13th International Conference, 2001
Proceedings of the Advances in Cryptology, 2001
2000
Proceedings of the 2000 International Conference on Dependable Systems and Networks (DSN 2000) (formerly FTCS-30 and DCCA-8), 2000
Efficient Error Correction Code Configurations for Quasi-Nonvolatile Data Retention by DRAMs.
Proceedings of the 15th IEEE International Symposium on Defect and Fault-Tolerance in VLSI Systems (DFT 2000), 2000
1999
Proceedings of the IEEE International Conference On Computer Design, 1999
Fault-Tolerant Refresh Power Reduction of DRAMs for Quasi-Nonvolatile Data Retention.
Proceedings of the 14th International Symposium on Defect and Fault-Tolerance in VLSI Systems (DFT '99), 1999
1994
Automatic Correctness Proof of the Implementation of Synchronous Sequential Circuits Using an Algebraic Approach.
Proceedings of the Theorem Provers in Circuit Design, 1994