Light Commands: Laser-Based Audio Injection Attacks on Voice-Controllable Systems T Sugawara, B Cyr, S Rampazzi, D Genkin, K Fu Proceedings of the 29th USENIX Conference on Security Symposium, 2631-2648, 2020 | 205 | 2020 |
An on-chip glitchy-clock generator for testing fault injection attacks S Endo, T Sugawara, N Homma, T Aoki, A Satoh Journal of Cryptographic Engineering 1, 265-270, 2011 | 102 | 2011 |
Reversing stealthy dopant-level circuits T Sugawara, D Suzuki, R Fujii, S Tawa, R Hori, M Shiozaki, T Fujino Cryptographic Hardware and Embedded Systems–CHES 2014: 16th International …, 2014 | 95 | 2014 |
High-performance concurrent error detection scheme for AES hardware A Satoh, T Sugawara, N Homma, T Aoki Cryptographic Hardware and Embedded Systems–CHES 2008: 10th International …, 2008 | 87 | 2008 |
Fair and consistent hardware evaluation of fourteen round two SHA-3 candidates M Knezevic, K Kobayashi, J Ikegami, S Matsuo, A Satoh, Ü Kocabas, ... IEEE Transactions on Very Large Scale Integration (VLSI) Systems 20 (5), 827-840, 2011 | 74 | 2011 |
Oscillator without a combinatorial loop and its threat to FPGA in data centre T Sugawara, K Sakiyama, S Nashimoto, D Suzuki, T Nagatsuka Electronics Letters 55 (11), 640-642, 2019 | 72 | 2019 |
On measurable side-channel leaks inside ASIC design primitives T Sugawara, D Suzuki, M Saeki, M Shiozaki, T Fujino Cryptographic Hardware and Embedded Systems-CHES 2013: 15th International …, 2013 | 64 | 2013 |
Minalpher v1 Y Sasaki, Y Todo, K Aoki, Y Naito, T Sugawara, Y Murakami, M Matsui, ... CAESAR Round 1, 2014 | 57* | 2014 |
High-speed pipelined hardware architecture for Galois counter mode A Satoh, T Sugawara, T Aoki Information Security: 10th International Conference, ISC 2007, Valparaíso …, 2007 | 57 | 2007 |
High-performance hardware architectures for Galois counter mode A Satoh, T Sugawara, T Aoki IEEE Transactions on Computers 58 (7), 917-930, 2008 | 53 | 2008 |
3-Share Threshold Implementation of AES S-box without Fresh Randomness T Sugawara IACR Transactions on Cryptographic Hardware and Embedded Systems, 123-145, 2019 | 51 | 2019 |
SAEB: A Lightweight Blockcipher-Based AEAD Mode of Operation Y Naito, M Matsui, T Sugawara, D Suzuki IACR Transactions on Cryptographic Hardware and Embedded Systems, 192-217, 2018 | 48 | 2018 |
Non-invasive EMI-based fault injection attack against cryptographic modules Y Hayashi, N Homma, T Sugawara, T Mizuki, T Aoki, H Sone 2011 IEEE International Symposium on Electromagnetic Compatibility, 763-767, 2011 | 44 | 2011 |
You Can't See Me: Physical Removal Attacks on LiDAR-based Autonomous Vehicles Driving Frameworks Y Cao, SH Bhupathiraju, P Naghavi, T Sugawara, ZM Mao, S Rampazzi arXiv preprint arXiv:2210.09482, 2022 | 43 | 2022 |
A 286 F²/Cell Distributed Bulk-Current Sensor and Secure Flush Code Eraser Against Laser Fault Injection Attack on Cryptographic Processor K Matsuda, T Fujii, N Shoji, T Sugawara, K Sakiyama, Y Hayashi, ... IEEE Journal of Solid-State Circuits, 2018 | 42* | 2018 |
Biasing power traces to improve correlation power analysis attacks Y Kim, T Sugawara, N Homma, T Aoki, A Satoh First International Workshop on Constructive Side-Channel Analysis and …, 2010 | 42 | 2010 |
Sensor CON-Fusion: Defeating Kalman Filter in Signal Injection Attack S Nashimoto, D Suzuki, T Sugawara, K Sakiyama Proceedings of the 2018 on Asia Conference on Computer and Communications …, 2018 | 36 | 2018 |
High-performance ASIC implementations of the 128-bit block cipher CLEFIA T Sugawara, N Homma, T Aoki, A Satoh 2008 IEEE International Symposium on Circuits and Systems (ISCAS), 2925-2928, 2008 | 35 | 2008 |
Spectrum analysis on cryptographic modules to counteract side-channel attacks T Sugawara, Y Hayashi, N Homma, T Mizuki, T Aoki, H Sone, A Satoh EMC 9, 21-24, 2009 | 32 | 2009 |
Lightweight authenticated encryption mode suitable for threshold implementation Y Naito, Y Sasaki, T Sugawara Advances in Cryptology–EUROCRYPT 2020 12106, 705, 2020 | 31 | 2020 |