Toru Akishita

According to our database1, Toru Akishita authored at least 20 papers between 2001 and 2021.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2021
Robust Image Hashing for Detecting Small Tampering Using a Hyperrectangular Region.
Proceedings of the IEEE International Workshop on Information Forensics and Security, 2021

Adversarial Attacks for Tabular Data: Application to Fraud Detection and Imbalanced Data.
Proceedings of the Workshop on Artificial Intelligence Safety 2021 (SafeAI 2021) co-located with the Thirty-Fifth AAAI Conference on Artificial Intelligence (AAAI 2021), 2021

2018
Inverse gating for low energy encryption.
Proceedings of the 2018 IEEE International Symposium on Hardware Oriented Security and Trust, 2018

2016
Round gating for low energy block ciphers.
Proceedings of the 2016 IEEE International Symposium on Hardware Oriented Security and Trust, 2016

Improved Differential Fault Analysis on Camellia-128.
Proceedings of the Constructive Side-Channel Analysis and Secure Design, 2016

2015
Midori: A Block Cipher for Low Energy (Extended Version).
IACR Cryptol. ePrint Arch., 2015

Midori: A Block Cipher for Low Energy.
Proceedings of the Advances in Cryptology - ASIACRYPT 2015 - 21st International Conference on the Theory and Application of Cryptology and Information Security, Auckland, New Zealand, November 29, 2015

2011
Very Compact Hardware Implementations of the Blockcipher CLEFIA.
Proceedings of the Selected Areas in Cryptography - 18th International Workshop, 2011

Piccolo: An Ultra-Lightweight Blockcipher.
Proceedings of the Cryptographic Hardware and Embedded Systems - CHES 2011 - 13th International Workshop, Nara, Japan, September 28, 2011

2008
A Practical DPA Countermeasure with BDD Architecture.
Proceedings of the Smart Card Research and Advanced Applications, 2008

2007
The 128-Bit Blockcipher CLEFIA (Extended Abstract).
Proceedings of the Fast Software Encryption, 14th International Workshop, 2007

2006
Efficient Hyperelliptic Curve Cryptosystems Using Theta Divisors.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2006

SPA-Resistant Scalar Multiplication on Hyperelliptic Curve Cryptosystems Combining Divisor Decomposition Technique and Joint Regular Form.
Proceedings of the Cryptographic Hardware and Embedded Systems, 2006

Power Analysis to ECC Using Differential Power Between Multiplication and Squaring.
Proceedings of the Smart Card Research and Advanced Applications, 2006

2005
On the Optimal Parameter Choice for Elliptic Curve Cryptosystems Using Isogeny.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2005

Zero-Value Register Attack on Elliptic Curve Cryptosystem.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2005

2004
Some Improved Algorithms for Hyperelliptic Curve Cryptosystems Using Degenerate Divisors.
Proceedings of the Information Security and Cryptology, 2004

2003
Novel Efficient Implementations of Hyperelliptic Curve Cryptosystems using Degenerate Divisors.
IACR Cryptol. ePrint Arch., 2003

Zero-Value Point Attacks on Elliptic Curve Cryptosystem.
Proceedings of the Information Security, 6th International Conference, 2003

2001
Fast Simultaneous Scalar Multiplication on Elliptic Curve with Montgomery Form.
Proceedings of the Selected Areas in Cryptography, 8th Annual International Workshop, 2001


  Loading...