Yuichi Hayashi
Orcid: 0000-0002-1160-8156
  According to our database1,
  Yuichi Hayashi
  authored at least 75 papers
  between 2008 and 2025.
  
  
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
On csauthors.net:
Bibliography
  2025
CHIRP: Compact and High-Performance FPGA Implementation of Unified Hardware Accelerators for Ring-Binary-LWE-based PQC.
    
  
    ACM Trans. Reconfigurable Technol. Syst., June, 2025
    
  
    IACR Cryptol. ePrint Arch., 2025
    
  
    IEEE Access, 2025
    
  
A Non-Invasive Contactless Detection of Recycled Microcontrollers Based on Side-Channel Analysis.
    
  
    Proceedings of the 23rd IEEE Interregional NEWCAS Conference, 2025
    
  
Detection of Hardware Trojans Using a Capacitance Sensor Focused on Parasitic Coupling Between Wires.
    
  
    Proceedings of the 23rd IEEE Interregional NEWCAS Conference, 2025
    
  
Amplifying Electromagnetic Leakage by Hardware Trojans Through Cable Geometry Manipulation.
    
  
    Proceedings of the IEEE International Symposium on Hardware Oriented Security and Trust, 2025
    
  
Current consumption model for more efficient side-channel tolerant design at FPGA design stage.
    
  
    Proceedings of the 30th Asia and South Pacific Design Automation Conference, 2025
    
  
  2024
    Proceedings of the 14th International Workshop on the Electromagnetic Compatibility of Integrated Circuits, 2024
    
  
Experimental Evaluation for Detecting Aging Effect on Microcontrollers based on Side-Channel Analysis.
    
  
    Proceedings of the 14th International Workshop on the Electromagnetic Compatibility of Integrated Circuits, 2024
    
  
Current Consumption Modeling of Logic Cells Based on Measurements for Side-channel Attack Simulation.
    
  
    Proceedings of the 14th International Workshop on the Electromagnetic Compatibility of Integrated Circuits, 2024
    
  
Fundamental Study on Detecting Hardware Trojans in Printed Circuit Boards Using Ring Oscillators.
    
  
    Proceedings of the 14th International Workshop on the Electromagnetic Compatibility of Integrated Circuits, 2024
    
  
  2023
Remote Fault Injection Attack against Cryptographic Modules via Intentional Electromagnetic Interference from an Antenna.
    
  
    Proceedings of the 2023 Workshop on Attacks and Solutions in Hardware Security, 2023
    
  
  2022
    Proceedings of the Advances in Information and Computer Security, 2022
    
  
    Proceedings of the Progress in Cryptology, 2022
    
  
  2021
    New Gener. Comput., 2021
    
  
    J. Cryptogr. Eng., 2021
    
  
    IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2021
    
  
  2020
    Theor. Comput. Sci., 2020
    
  
Comparison of Pearson correlation coefficient and distance correlation in Correlation Power Analysis on Digital Multiplier.
    
  
    Proceedings of the 43rd International Convention on Information, 2020
    
  
  2019
Electromagnetic Information Extortion from Electronic Devices Using Interceptor and Its Countermeasure.
    
  
    IACR Trans. Cryptogr. Hardw. Embed. Syst., 2019
    
  
Fundamental Study on the Effects of Connector Torque Value on the Change of Inductance at the Contact Boundary.
    
  
    IEICE Trans. Electron., 2019
    
  
    Proceedings of 8th International Workshop on Security Proofs for Embedded Systems, 2019
    
  
    Proceedings of the Smart Card Research and Advanced Applications, 2019
    
  
  2018
A Demonstration of a HT-Detection Method Based on Impedance Measurements of the Wiring Around ICs.
    
  
    IEEE Trans. Circuits Syst. II Express Briefs, 2018
    
  
A 286 F<sup>2</sup>/Cell Distributed Bulk-Current Sensor and Secure Flush Code Eraser Against Laser Fault Injection Attack on Cryptographic Processor.
    
  
    IEEE J. Solid State Circuits, 2018
    
  
    IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2018
    
  
    Proceedings of the 12th USENIX Workshop on Offensive Technologies, 2018
    
  
    Proceedings of the WALCOM: Algorithms and Computation - 12th International Conference, 2018
    
  
    Proceedings of the Unconventional Computation and Natural Computation, 2018
    
  
A 286F<sup>2</sup>/cell distributed bulk-current sensor and secure flush code eraser against laser fault injection attack.
    
  
    Proceedings of the 2018 IEEE International Solid-State Circuits Conference, 2018
    
  
Practical and Easy-to-Understand Card-Based Implementation of Yao's Millionaire Protocol.
    
  
    Proceedings of the Combinatorial Optimization and Applications, 2018
    
  
    Proceedings of the 5th ACM on ASIA Public-Key Cryptography Workshop, 2018
    
  
  2017
Design Methodology and Validity Verification for a Reactive Countermeasure Against EM Attacks.
    
  
    J. Cryptol., 2017
    
  
    J. Cryptogr. Eng., 2017
    
  
    IEICE Electron. Express, 2017
    
  
    IACR Cryptol. ePrint Arch., 2017
    
  
    Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security, 2017
    
  
    Proceedings of the Advances in Cryptology - ASIACRYPT 2017, 2017
    
  
  2016
    Proceedings of the Theory and Practice of Natural Computing - 5th International Conference, 2016
    
  
Necessary and Sufficient Numbers of Cards for Securely Computing Two-Bit Output Functions.
    
  
    Proceedings of the Paradigms in Cryptology - Mycrypt 2016. Malicious and Exploratory Cryptology, 2016
    
  
    Proceedings of the 2016 IEEE Asian Hardware-Oriented Security and Trust, 2016
    
  
    Proceedings of the 3rd ACM International Workshop on ASIA Public-Key Cryptography, 2016
    
  
  2015
    IEICE Trans. Commun., 2015
    
  
    IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2015
    
  
An Adaptive Multiple-Fault Injection Attack on Microcontrollers and a Countermeasure.
    
  
    IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2015
    
  
    Proceedings of the Theory and Practice of Natural Computing, 2015
    
  
    Proceedings of the Theory and Applications of Models of Computation, 2015
    
  
Fundamental study on randomized processing in cryptographic IC using variable clock against Correlation Power Analysis.
    
  
    Proceedings of the 10th International Workshop on the Electromagnetic Compatibility of Integrated Circuits, 2015
    
  
    Proceedings of the 52nd Annual Design Automation Conference, 2015
    
  
Basic Study on the Method for Real-Time Video Streaming with Low Latency and High Bandwidth Efficiency.
    
  
    Proceedings of the 39th Annual Computer Software and Applications Conference, 2015
    
  
A DPA/DEMA/LEMA-resistant AES cryptographic processor with supply-current equalizer and micro EM probe sensor.
    
  
    Proceedings of the 20th Asia and South Pacific Design Automation Conference, 2015
    
  
  2014
    J. Inf. Process., 2014
    
  
Investigation of Noise Interference due to Connector Contact Failure in a Coaxial Cable.
    
  
    IEICE Trans. Electron., 2014
    
  
Power Noise Measurements of Cryptographic VLSI Circuits Regarding Side-Channel Information Leakage.
    
  
    IEICE Trans. Electron., 2014
    
  
    IACR Cryptol. ePrint Arch., 2014
    
  
A local EM-analysis attack resistant cryptographic engine with fully-digital oscillator-based tamper-access sensor.
    
  
    Proceedings of the Symposium on VLSI Circuits, 2014
    
  
    Proceedings of the 2014 IEEE International Symposium on Hardware-Oriented Security and Trust, 2014
    
  
A Multiple-Fault Injection Attack by Adaptive Timing Control Under Black-Box Conditions and a Countermeasure.
    
  
    Proceedings of the Constructive Side-Channel Analysis and Secure Design, 2014
    
  
EM Attack Is Non-invasive? - Design Methodology and Validity Verification of EM Attack Sensor.
    
  
    Proceedings of the Cryptographic Hardware and Embedded Systems - CHES 2014, 2014
    
  
A Threat for Tablet PCs in Public Space: Remote Visualization of Screen Images Using EM Emanation.
    
  
    Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security, 2014
    
  
  2013
    IEICE Trans. Electron., 2013
    
  
Study on Information Leakage of Input Key due to Frequency Fluctuation of RC Oscillator in Keyboard.
    
  
    IEICE Trans. Commun., 2013
    
  
    Proceedings of the Foundations and Practice of Security - 6th International Symposium, 2013
    
  
Transient analysis of EM radiation associated with information leakage from cryptographic ICs.
    
  
    Proceedings of the 9th International Workshop on Electromagnetic Compatibility of Integrated Circuits, 2013
    
  
  2012
    IEICE Trans. Electron., 2012
    
  
Evaluation of Information Leakage from Cryptographic Hardware via Common-Mode Current.
    
  
    IEICE Trans. Electron., 2012
    
  
  2011
Analysis of Electromagnetic Radiation from Transmission Line with Loose Contact of Connector.
    
  
    IEICE Trans. Electron., 2011
    
  
    IEICE Trans. Electron., 2011
    
  
  2009
The Effect of Position of a Connector Contact Failure on Electromagnetic Near-Field around a Coaxial Cable.
    
  
    IEICE Trans. Commun., 2009
    
  
Mechanism behind Information Leakage in Electromagnetic Analysis of Cryptographic Modules.
    
  
    Proceedings of the Information Security Applications, 10th International Workshop, 2009
    
  
  2008
Fundamental Measurement of Electromagnetic Field Radiated from a Coaxial Transmission Line Caused by Connector Contact Failure.
    
  
    IEICE Trans. Electron., 2008