Yuto Nakano

According to our database1, Yuto Nakano authored at least 30 papers between 2006 and 2023.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2023
An Ultra-High Throughput AES-Based Authenticated Encryption Scheme for 6G: Design and Implementation.
Proceedings of the Computer Security - ESORICS 2023, 2023

2022
Extracting the Secrets of OpenSSL with RAMBleed.
Sensors, 2022

Rocca: An Efficient AES-based Encryption Scheme for Beyond 5G (Full version).
IACR Cryptol. ePrint Arch., 2022

2021
Rocca: An Efficient AES-based Encryption Scheme for Beyond 5G.
IACR Trans. Symmetric Cryptol., 2021

Automatic Security Inspection Framework for Trustworthy Supply Chain.
Proceedings of the 19th IEEE/ACIS International Conference on Software Engineering Research, 2021

2020
Consideration on Data Conformance Toward Building Trust in Supply Chain.
Proceedings of the 2020 European Conference on Networks and Communications, 2020

Single-Trace Side-Channel Analysis on Polynomial-Based MAC Schemes.
Proceedings of the Constructive Side-Channel Analysis and Secure Design, 2020

2019
A Framework for Secure and Trustworthy Data Management in Supply Chain.
Proceedings of the Mobile Web and Intelligent Information Systems, 2019

A Framework for Blockchain-Based Verification of Integrity and Authenticity.
Proceedings of the Trust Management XIII - 13th IFIP WG 11.11 International Conference, 2019

Evaluation of Side-Channel Key-Recovery Attacks on LoRaWAN End-Device.
Proceedings of the Information Systems Security and Privacy - 5th International Conference, 2019

Experiment on Side-Channel Key-Recovery using a Real LPWA End-device.
Proceedings of the 5th International Conference on Information Systems Security and Privacy, 2019

2018
An Evaluation Framework for Fastest Oblivious RAM.
Proceedings of the 3rd International Conference on Internet of Things, 2018

Active Attack Against Oblivious RAM.
Proceedings of the 32nd IEEE International Conference on Advanced Information Networking and Applications, 2018

2016
Delay PUF Assessment Method Based on Side-Channel and Modeling Analyzes: The Final Piece of All-in-One Assessment Methodology.
Proceedings of the 2016 IEEE Trustcom/BigDataSE/ISPA, 2016

2014
Comparison of Access Pattern Protection Schemes and Proposals for Efficient Implementation.
IEICE Trans. Inf. Syst., 2014

Fast Implementation of KCipher-2 for Software and Hardware.
IEICE Trans. Inf. Syst., 2014

Chosen-IV Correlation Power Analysis on KCipher-2 Hardware and a Masking-Based Countermeasure.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2014

A Pre-processing Composition for Secret Key Recovery on Android Smartphone.
Proceedings of the Information Security Theory and Practice. Securing the Internet of Things, 2014

A Multiple-server Efficient Reusable Proof of Data Possesion from Private Information Retrieval Techniques.
Proceedings of the SECRYPT 2014, 2014

Key Extraction Attack Using Statistical Analysis of Memory Dump Data.
Proceedings of the Risks and Security of Internet and Systems, 2014

Data Storage on the Cloud under User Control.
Proceedings of the IEEE 6th International Conference on Cloud Computing Technology and Science, 2014

2013
LMM - A Common Component for Software License Management on Cloud.
Proceedings of the SECRYPT 2013, 2013

Chosen-IV Correlation Power Analysis on KCipher-2 and a Countermeasure.
Proceedings of the Constructive Side-Channel Analysis and Secure Design, 2013

2012
Memory Access Pattern Protection for Resource-Constrained Devices.
Proceedings of the Smart Card Research and Advanced Applications, 2012

2011
MASHA - Low Cost Authentication with a New Stream Cipher.
Proceedings of the Information Security, 14th International Conference, 2011

Analysis of Message Injection in Stream Cipher-Based Hash Functions.
Proceedings of the Applied Cryptography and Network Security, 2011

2010
On a Construction of Stream-cipher-based Hash Functions.
Proceedings of the SECRYPT 2010, 2010

Stream Cipher-Based Hash Function and Its Security.
Proceedings of the e-Business and Telecommunications - 7th International Joint Conference, 2010

Single Sign-on Techniques with PKI-based Authentication for Mobile Phones.
Proceedings of the 2010 International Conference on Security & Management, 2010

2006
Redundancy of the Wang-Yu Sufficient Conditions.
IACR Cryptol. ePrint Arch., 2006


  Loading...