Junichi Sakamoto

Orcid: 0000-0002-5316-7555

According to our database1, Junichi Sakamoto authored at least 14 papers between 2005 and 2023.

Collaborative distances:
  • Dijkstra number2 of five.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2023
A Trial to Embed RAM Encryption Scheme in Cryptographic Programs.
J. Inf. Process., 2023

Non-Profiled Deep Learning-Based Side-Channel Analysis With Only One Network Training.
IEEE Access, 2023

Application of Profiled Analysis to ADC-Based Remote Side-Channel Attacks.
Proceedings of the 9th Intl Conference on Big Data Security on Cloud, 2023

Effective Layout Design for Laser Fault Sensor on FPGA.
Proceedings of the 2023 Workshop on Attacks and Solutions in Hardware Security, 2023

2022
Constructing software countermeasures against instruction manipulation attacks: an approach based on vulnerability evaluation using fault simulator.
Clust. Comput., 2022

Efficient Software Implementation of GMT6-672 and GMT8-542 Pairing-Friendly Curves for a 128-Bit Security Level.
Proceedings of the Applied Cryptography and Network Security Workshops, 2022

2021
Key Agreement Over Inter-Process Communication.
IEEE Access, 2021

2020
RAM Encryption Mechanism without Hardware Support.
J. Inf. Process., 2020

Laser-Induced Controllable Instruction Replacement Fault Attack.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2020

How to Code Data Integrity Verification Secure Against Single-Spot-Laser-Induced Instruction Manipulation Attacks.
Proceedings of the 17th IEEE/ACS International Conference on Computer Systems and Applications, 2020

2019
Low-Latency Pairing Processor Architecture Using Fully-Unrolled Quotient Pipelining Montgomery Multiplier.
Proceedings of the Asian Hardware Oriented Security and Trust Symposium, 2019

2016
Laser irradiation on EEPROM sense amplifiers enhances side-channel leakage of read bits.
Proceedings of the 2016 IEEE Asian Hardware-Oriented Security and Trust, 2016

2006
Adequate RSSI Determination Method by Making Use of SVM for Indoor Localization.
Proceedings of the Knowledge-Based Intelligent Information and Engineering Systems, 2006

2005
Indoor Location Determination Using a Topological Model.
Proceedings of the Knowledge-Based Intelligent Information and Engineering Systems, 2005


  Loading...