default search action
Yusuke Nozaki
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2023
- [c52]Yusuke Nozaki, Shu Takemoto, Masaya Yoshikawa:
Hamming Weight aware Fault Analysis for Lightweight Cryptography TWINE. CCIOT 2023: 59-63 - [c51]Yusuke Nozaki, Shu Takemoto, Yoshiya Ikezaki, Masaya Yoshikawa:
Security Evaluation of Glitch Based Authentication Function for Edge AI. GCCE 2023: 790-791 - [c50]Shu Takemoto, Yoshiya Ikezaki, Yusuke Nozaki, Masaya Yoshikawa:
Machine Learning Based Power Analysis for Simon with Secure Mechanism. ICCAE 2023: 26-29 - [c49]Yusuke Nozaki, Shu Takemoto, Yoshiya Ikezaki, Masaya Yoshikawa:
Deep Learning Based Side-Channel Analysis for Lightweight Cipher PRESENT. ICCAE 2023: 570-574 - [c48]Masato Sato, Yusuke Nozaki, Masaya Yoshikawa:
Implementation and Evaluation of the Lightweight Cipher SPARKLE. ICECC 2023: 105-108 - [c47]Ryo Kumagai, Shu Takemoto, Yusuke Nozaki, Masaya Yoshikawa:
Explainable AI based Adversarial Examples and its Evaluation. ICECC 2023: 220-225 - [c46]Yusuke Nozaki, Shu Takemoto, Masaya Yoshikawa:
Tamper Resistance Evaluation of Midori128 against Differential Power Analysis. ICKII 2023: 157-160 - 2022
- [c45]Daichi Hirose, Shu Takemoto, Yusuke Nozaki, Masaya Yoshikawa:
Authenticated Encryption based Secure In-vehicle System against DoS Attacks. GCCE 2022: 44-45 - [c44]Shu Takemoto, Yoshiya Ikezaki, Yusuke Nozaki, Masaya Yoshikawa:
AI Hardware Oriented Trojan Detection Architecture. ICECC 2022: 9-15 - 2021
- [c43]Shu Takemoto, Yoshiya Ikezaki, Yusuke Nozaki, Masaya Yoshikawa:
Hardware Trojan for Lightweight Cryptoraphy Elephant. GCCE 2021: 944-945 - [c42]Yusuke Nozaki, Shu Takemoto, Yoshiya Ikezaki, Masaya Yoshikawa:
Performance Evaluation of Unrolled Cipher based Glitch PUF Implemented on Virtex-7. ISDCS 2021: 1-4 - [c41]Yusuke Nozaki, Masaya Yoshikawa:
Neural Network Based Glitch Physically Unclonable Function. UEMCON 2021: 160-164 - 2020
- [c40]Yusuke Nozaki, Masaya Yoshikawa:
Unrolled PRINCE Cipher based Glitch Physically Unclonable Function. ICISS 2020: 3-7 - [c39]Yusuke Nozaki, Masaya Yoshikawa:
Tamper Resistance Evaluation of TWINE Implemented on 8-bit Microcontroller. ICSIM 2020: 226-231
2010 – 2019
- 2019
- [c38]Shu Takemoto, Yusuke Nozaki, Masaya Yoshikawa:
Statistical Power Analysis for IoT Device Oriented Encryption with Glitch Canceller. IWCIA 2019: 73-76 - [c37]Shu Takemoto, Kanata Nishida, Yusuke Nozaki, Masaya Yoshikawa, Shinya Honda, Ryo Kurachi:
Performance Evaluation of CAESAR Authenticated Encryption on SROS2. AICCC 2019: 168-172 - [c36]Yusuke Nozaki, Masaya Yoshikawa:
Countermeasure of Lightweight Physical Unclonable Function Against Side-Channel Attack. CCC 2019: 30-34 - [c35]Yusuke Nozaki, Masaya Yoshikawa:
Secret Sharing Schemes Based Secure Authentication for Physical Unclonable Function. ICCCS 2019: 445-449 - [c34]Masaya Yoshikawa, Yusuke Nozaki:
Side-Channel Analysis for Searchable Encryption System and its Security Evaluation. CSE/EUC 2019: 465-469 - [c33]Shu Takemoto, Yusuke Nozaki, Masaya Yoshikawa:
Evaluation of the Hiding-Countermeasure PRINCE Using Differential Power Analysis. GCCE 2019: 164-165 - [c32]Kanata Nishida, Yusuke Nozaki, Masaya Yoshikawa:
Security Evaluation of Counter Synchronization Method for CAN Against DoS Attack. GCCE 2019: 166-167 - [c31]Yusuke Nozaki, Masaya Yoshikawa:
Quantitative Performance Evaluation of PL PUF and RO PUF with ASIC Implementation. GCCE 2019: 1127-1128 - [c30]Taichi Umeda, Yusuke Nozaki, Masaya Yoshikawa:
Scalability and Performance Evaluation of GA Based Modeling Analysis for RO PUF. GCCE 2019: 1133-1134 - [c29]Yusuke Nozaki, Masaya Yoshikawa:
Side-Channel Resistance Evaluation Method using Statistical Tests for Physical Unclonable Function. ICAIIC 2019: 189-194 - [c28]Yusuke Nozaki, Masaya Yoshikawa:
Security Evaluation of Ring Oscillator PUF Against Genetic Algorithm Based Modeling Attack. IMIS 2019: 338-347 - 2018
- [c27]Susumu Matsumi, Yusuke Nozaki, Masaya Yoshikawa:
Feature Extraction Driven Modeling Attack Against Double Arbiter PUF and Its Evaluation. AICCC 2018: 94-99 - [c26]Yusuke Nozaki, Masaya Yoshikawa:
Security Evaluation of a Lightweight Cipher SPECK against Round Addition DFA. AICCC 2018: 100-105 - [c25]Kazuya Shibagaki, Taichi Umeda, Yusuke Nozaki, Masaya Yoshikawa:
Feasibility Evaluation of Neural Network Physical Unclonable Function. GCCE 2018: 712-713 - [c24]Yusuke Nozaki, Masaya Yoshikawa:
Shuffling Based Side-Channel Countermeasure for Energy Harvester. GCCE 2018: 714-715 - [c23]Taichi Umeda, Kazuya Shibagaki, Yusuke Nozaki, Masaya Yoshikawa:
Lethal Genes Aware Genetic Programming Analysis for RO PUF. GCCE 2018: 758-759 - [c22]Yusuke Nozaki, Masaya Yoshikawa:
EM based machine learning attack for XOR arbiter PUF. ICMLSC 2018: 19-23 - [c21]Masaya Yoshikawa, Yusuke Nozaki:
Lightweight Cipher Aware Countermeasure Using Random Number Masks and Its Evaluation. ICVISP 2018: 55:1-55:5 - [c20]Masaya Yoshikawa, Yoshiya Ikezaki, Yusuke Nozaki:
Implementation of Searchable Encryption System with Dedicated Hardware and its Evaluation. UEMCON 2018: 218-221 - 2017
- [c19]Masaya Yoshikawa, Yusuke Nozaki:
Hierarchical power analysis attack for falsification detection cipher. CCWC 2017: 1-6 - [c18]Yoshiya Ikezaki, Yusuke Nozaki, Hideki Nagata, Masaya Yoshikawa:
FPGA implementation technique for power consumption aware tamper resistance accelerator of lightweight PUF. GCCE 2017: 1-2 - [c17]Yusuke Nozaki, Yoshiya Ikezaki, Hideki Nagata, Masaya Yoshikawa:
Power analysis for a lightweight authenticated encryption SIMON-JAMBU. GCCE 2017: 1-2 - [c16]Yusuke Nozaki, Masaya Yoshikawa:
Tamper resistance evaluation of PUF implementation against machine learning attack. ICBEA 2017: 1-6 - [c15]Yusuke Nozaki, Masaya Yoshikawa:
Statistical fault analysis for a lightweight cipher midori. ICIA 2017: 236-241 - [c14]Masaya Yoshikawa, Yusuke Nozaki:
Helper Data Aware Cloning Method for Physical Unclonable Function. SmartCloud 2017: 47-51 - [c13]Masaya Yoshikawa, Yusuke Nozaki:
Electromagnetic analysis method for ultra low power cipher Midori. UEMCON 2017: 70-75 - 2016
- [c12]Masaya Yoshikawa, Yusuke Nozaki, Kensaku Asahi:
Vulnerability Evaluation Accelerator for Lightweight Ciphers. BigDataSecurity/HPSC/IDS 2016: 377-381 - [c11]Masaya Yoshikawa, Yusuke Nozaki, Kensaku Asahi:
Multiple Rounds Aware Power Analysis Attack for a Lightweight Cipher SIMECK. BigDataService 2016: 252-256 - [c10]Yoshiya Ikezaki, Yusuke Nozaki, Masaya Yoshikawa:
Deep learning attack for physical unclonable function. GCCE 2016: 1-2 - [c9]Yusuke Nozaki, Yoshiya Ikezaki, Masaya Yoshikawa:
Hardware Trojan for an authenticated encryption Minalpher. GCCE 2016: 1-2 - [c8]Masaya Yoshikawa, Yusuke Nozaki:
Two Stage Fault Analysis against a Falsification Detection Cipher Minalpher. SmartCloud 2016: 79-84 - 2015
- [j1]Masaya Yoshikawa, Kyota Sugioka, Yusuke Nozaki, Kensaku Asahi:
Secure in-vehicle Systems using Authentication. Int. J. Networked Distributed Comput. 3(3): 159-166 (2015) - [c7]Masaya Yoshikawa, Kyota Sugioka, Yusuke Nozaki, Kensaku Asahi:
Secure in-vehicle systems against Trojan attacks. ICIS 2015: 29-33 - [c6]Takato Iwase, Yusuke Nozaki, Masaya Yoshikawa, Takeshi Kumaki:
Detection technique for hardware Trojans using machine learning in frequency domain. GCCE 2015: 185-186 - [c5]Kohei Nohara, Yusuke Nozaki, Masaya Yoshikawa:
Hardware Trojan for ultra lightweight block cipher Piccolo. GCCE 2015: 202-203 - [c4]Yusuke Nozaki, Kensaku Asahi, Masaya Yoshikawa:
Statistical fault analysis for a lightweight block cipher TWINE. GCCE 2015: 477-478 - [c3]Yusuke Nozaki, Toshiya Asai, Kensaku Asahi, Masaya Yoshikawa:
Power analysis for clock fluctuation LSI. SNPD 2015: 167-170 - [c2]Masaya Yoshikawa, Yusuke Nozaki, Toshiya Asai, Kensaku Asahi:
Frequency Domain Aware Power Analysis Attack against Random Clock LSI for Secure Automotive Embedded Systems. VTC Fall 2015: 1-5 - 2014
- [c1]Yusuke Nozaki, Kensaku Asahi, Masaya Yoshikawa:
PUF ID generation method for modeling attacks. GCCE 2014: 393-394
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-04-25 05:48 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint