Yusuke Nozaki

Orcid: 0000-0003-1369-8500

According to our database1, Yusuke Nozaki authored at least 53 papers between 2014 and 2023.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of five.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2023
Tamper Resistance Evaluation of Midori128 against Differential Power Analysis.
Proceedings of the 6th IEEE International Conference on Knowledge Innovation and Invention, 2023

Implementation and Evaluation of the Lightweight Cipher SPARKLE.
Proceedings of the 6th International Conference on Electronics, 2023

Explainable AI based Adversarial Examples and its Evaluation.
Proceedings of the 6th International Conference on Electronics, 2023

Machine Learning Based Power Analysis for Simon with Secure Mechanism.
Proceedings of the 15th International Conference on Computer and Automation Engineering, 2023

Deep Learning Based Side-Channel Analysis for Lightweight Cipher PRESENT.
Proceedings of the 15th International Conference on Computer and Automation Engineering, 2023

Security Evaluation of Glitch Based Authentication Function for Edge AI.
Proceedings of the 12th IEEE Global Conference on Consumer Electronics, 2023

Hamming Weight aware Fault Analysis for Lightweight Cryptography TWINE.
Proceedings of the 8th International Conference on Cloud Computing and Internet of Things, 2023

2022
AI Hardware Oriented Trojan Detection Architecture.
Proceedings of the ICECC 2022: The 5th International Conference on Electronics, Communications and Control Engineering, Higashi-ku, Japan, March 25, 2022

Authenticated Encryption based Secure In-vehicle System against DoS Attacks.
Proceedings of the 11th IEEE Global Conference on Consumer Electronics, 2022

2021
Neural Network Based Glitch Physically Unclonable Function.
Proceedings of the 12th IEEE Annual Ubiquitous Computing, 2021

Performance Evaluation of Unrolled Cipher based Glitch PUF Implemented on Virtex-7.
Proceedings of the 4th International Symposium on Devices, Circuits and Systems, 2021

Hardware Trojan for Lightweight Cryptoraphy Elephant.
Proceedings of the 10th IEEE Global Conference on Consumer Electronics, 2021

2020
Tamper Resistance Evaluation of TWINE Implemented on 8-bit Microcontroller.
Proceedings of the ICSIM '20: The 3rd International Conference on Software Engineering and Information Management, 2020

Unrolled PRINCE Cipher based Glitch Physically Unclonable Function.
Proceedings of the ICISS 2020: The 3rd International Conference on Information Science and System, 2020

2019
Security Evaluation of Ring Oscillator PUF Against Genetic Algorithm Based Modeling Attack.
Proceedings of the Innovative Mobile and Internet Services in Ubiquitous Computing, 2019

Side-Channel Resistance Evaluation Method using Statistical Tests for Physical Unclonable Function.
Proceedings of the International Conference on Artificial Intelligence in Information and Communication, 2019

Scalability and Performance Evaluation of GA Based Modeling Analysis for RO PUF.
Proceedings of the IEEE 8th Global Conference on Consumer Electronics, 2019

Evaluation of the Hiding-Countermeasure PRINCE Using Differential Power Analysis.
Proceedings of the IEEE 8th Global Conference on Consumer Electronics, 2019

Quantitative Performance Evaluation of PL PUF and RO PUF with ASIC Implementation.
Proceedings of the IEEE 8th Global Conference on Consumer Electronics, 2019

Security Evaluation of Counter Synchronization Method for CAN Against DoS Attack.
Proceedings of the IEEE 8th Global Conference on Consumer Electronics, 2019

Side-Channel Analysis for Searchable Encryption System and its Security Evaluation.
Proceedings of the 2019 IEEE International Conference on Computational Science and Engineering, 2019

Secret Sharing Schemes Based Secure Authentication for Physical Unclonable Function.
Proceedings of the IEEE 4th International Conference on Computer and Communication Systems, 2019

Countermeasure of Lightweight Physical Unclonable Function Against Side-Channel Attack.
Proceedings of the Cybersecurity and Cyberforensics Conference, 2019

Performance Evaluation of CAESAR Authenticated Encryption on SROS2.
Proceedings of the AICCC 2019: 2nd Artificial Intelligence and Cloud Computing Conference, 2019

Statistical Power Analysis for IoT Device Oriented Encryption with Glitch Canceller.
Proceedings of the 11th IEEE International Workshop on Computational Intelligence and Applications, 2019

2018
Implementation of Searchable Encryption System with Dedicated Hardware and its Evaluation.
Proceedings of the 9th IEEE Annual Ubiquitous Computing, 2018

Lightweight Cipher Aware Countermeasure Using Random Number Masks and Its Evaluation.
Proceedings of the 2nd International Conference on Vision, Image and Signal Processing, 2018

EM based machine learning attack for XOR arbiter PUF.
Proceedings of the 2nd International Conference on Machine Learning and Soft Computing, 2018

Lethal Genes Aware Genetic Programming Analysis for RO PUF.
Proceedings of the IEEE 7th Global Conference on Consumer Electronics, 2018

Feasibility Evaluation of Neural Network Physical Unclonable Function.
Proceedings of the IEEE 7th Global Conference on Consumer Electronics, 2018

Shuffling Based Side-Channel Countermeasure for Energy Harvester.
Proceedings of the IEEE 7th Global Conference on Consumer Electronics, 2018

Security Evaluation of a Lightweight Cipher SPECK against Round Addition DFA.
Proceedings of the 2018 Artificial Intelligence and Cloud Computing Conference, 2018

Feature Extraction Driven Modeling Attack Against Double Arbiter PUF and Its Evaluation.
Proceedings of the 2018 Artificial Intelligence and Cloud Computing Conference, 2018

2017
Electromagnetic analysis method for ultra low power cipher Midori.
Proceedings of the 8th IEEE Annual Ubiquitous Computing, 2017

Helper Data Aware Cloning Method for Physical Unclonable Function.
Proceedings of the 2017 IEEE International Conference on Smart Cloud, 2017

Statistical fault analysis for a lightweight cipher midori.
Proceedings of the IEEE International Conference on Information and Automation, 2017

Tamper resistance evaluation of PUF implementation against machine learning attack.
Proceedings of the 2017 International Conference on Biometrics Engineering and Application, 2017

Power analysis for a lightweight authenticated encryption SIMON-JAMBU.
Proceedings of the IEEE 6th Global Conference on Consumer Electronics, 2017

FPGA implementation technique for power consumption aware tamper resistance accelerator of lightweight PUF.
Proceedings of the IEEE 6th Global Conference on Consumer Electronics, 2017

Hierarchical power analysis attack for falsification detection cipher.
Proceedings of the IEEE 7th Annual Computing and Communication Workshop and Conference, 2017

2016
Two Stage Fault Analysis against a Falsification Detection Cipher Minalpher.
Proceedings of the 2016 IEEE International Conference on Smart Cloud, 2016

Hardware Trojan for an authenticated encryption Minalpher.
Proceedings of the IEEE 5th Global Conference on Consumer Electronics, 2016

Deep learning attack for physical unclonable function.
Proceedings of the IEEE 5th Global Conference on Consumer Electronics, 2016

Multiple Rounds Aware Power Analysis Attack for a Lightweight Cipher SIMECK.
Proceedings of the Second IEEE International Conference on Big Data Computing Service and Applications, 2016

Vulnerability Evaluation Accelerator for Lightweight Ciphers.
Proceedings of the 2nd IEEE International Conference on Big Data Security on Cloud, 2016

2015
Secure in-vehicle Systems using Authentication.
Int. J. Networked Distributed Comput., 2015

Frequency Domain Aware Power Analysis Attack against Random Clock LSI for Secure Automotive Embedded Systems.
Proceedings of the IEEE 82nd Vehicular Technology Conference, 2015

Power analysis for clock fluctuation LSI.
Proceedings of the 16th IEEE/ACIS International Conference on Software Engineering, 2015

Statistical fault analysis for a lightweight block cipher TWINE.
Proceedings of the IEEE 4th Global Conference on Consumer Electronics, 2015

Hardware Trojan for ultra lightweight block cipher Piccolo.
Proceedings of the IEEE 4th Global Conference on Consumer Electronics, 2015

Detection technique for hardware Trojans using machine learning in frequency domain.
Proceedings of the IEEE 4th Global Conference on Consumer Electronics, 2015

Secure in-vehicle systems against Trojan attacks.
Proceedings of the 14th IEEE/ACIS International Conference on Computer and Information Science, 2015

2014
PUF ID generation method for modeling attacks.
Proceedings of the IEEE 3rd Global Conference on Consumer Electronics, 2014


  Loading...