Naoya Torii

According to our database1, Naoya Torii authored at least 19 papers between 1999 and 2022.

Collaborative distances:
  • Dijkstra number2 of five.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2022
Implementation and Evaluation of Ring Oscillator-based True Random Number Generator.
Int. J. Netw. Comput., 2022

Side-channel attack on COSO-based TRNG to estimate output bits.
Proceedings of the 2022 Tenth International Symposium on Computing and Networking, CANDAR 2022, 2022

2016
Experimental Evaluation on the Resistance of Latch PUFs Implemented on ASIC against FIB-Based Invasive Attacks.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2016

ASIC implementation of random number generators using SR latches and its evaluation.
EURASIP J. Inf. Secur., 2016

Evaluation of Latch-Based PUFs Implemented on 40 nm ASICs.
Proceedings of the Fourth International Symposium on Computing and Networking, 2016

Evaluation of Latch-based Physical Random Number Generator Implementation on 40 nm ASICs.
Proceedings of the 6th International Workshop on Trustworthy Embedded Devices, 2016

2015
A new method for enhancing variety and maintaining reliability of PUF responses and its evaluation on ASICs.
J. Cryptogr. Eng., 2015

2014
Dynamic Behavior of RS latches using FIB processing and probe connection.
IACR Cryptol. ePrint Arch., 2014

A Technique Using PUFs for Protecting Circuit Layout Designs against Reverse Engineering.
Proceedings of the Advances in Information and Computer Security, 2014

Security Evaluation of Bistable Ring PUFs on FPGAs using Differential and Linear Analysis.
Proceedings of the 2014 Federated Conference on Computer Science and Information Systems, 2014

A Spoofing Attack against a Cancelable Biometric Authentication Scheme.
Proceedings of the 28th IEEE International Conference on Advanced Information Networking and Applications, 2014

2013
Evaluation of ASIC Implementation of Physical Random Number Generators Using RS Latches.
Proceedings of the Smart Card Research and Advanced Applications, 2013

2012
Foreword.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2012

2005
Design Optimization of a High-Speed, Area-Efficient and Low-Power Montgomery Modular Multiplier for RSA Algorithm.
IEICE Trans. Electron., 2005

2002
DPA Countermeasures by Improving the Window Method.
Proceedings of the Cryptographic Hardware and Embedded Systems, 2002

2001
DPA Countermeasure Based on the "Masking Method".
Proceedings of the Information Security and Cryptology, 2001

The Block Cipher SC2000.
Proceedings of the Fast Software Encryption, 8th International Workshop, 2001

2000
Implementation of Elliptic Curve Cryptographic Coprocessor over GF(2<sup>m</sup>) on an FPGA.
Proceedings of the Cryptographic Hardware and Embedded Systems, 2000

1999
Fast Implementation of Public-Key Cryptography ona DSP TMS320C6201.
Proceedings of the Cryptographic Hardware and Embedded Systems, 1999


  Loading...