Naofumi Homma
Tohoku University
H-index: 30
Asia-Japan
Top articles of Naofumi Homma
Title | Journal | Author(s) | Publication Date |
---|---|---|---|
Secure computing device, secure computing method, and program | 2024/2/13 | ||
Perceived Information Revisited II: Information-Theoretical Analysis of Deep-Learning Based Side-Channel Attacks | Cryptology ePrint Archive | Akira Ito Rei Ueno Naofumi Homma | 2024 |
Fallen Sanctuary: A Higher-Order and Leakage-Resilient Rekeying Scheme | IACR Transactions on Cryptographic Hardware and Embedded Systems | Rei Ueno Naofumi Homma Akiko Inoue Kazuhiko Minematsu | 2024 |
Authenticated encryption apparatus, authenticated decryption apparatus, authenticated encryption system, method, and computer readable medium | 2023/5/4 | ||
Side-Channel Attacks on Unrolled Implementation of Trivium | IEICE Technical Report; IEICE Tech. Rep. | Soichiro Kobayashi Rei Ueno Yosuke Todo Naofumi Homma | 2023/7/17 |
Memory processing apparatus, memory verification apparatus, memory updating apparatus, memory protection system, method, and computer readable medium | 2023/4/27 | ||
Side-channel analysis against SecOC-compliant AES-CMAC | IEEE Transactions on Circuits and Systems II: Express Briefs | Katsumi Ebina Rei Ueno Naofumi Homma | 2023/6/21 |
How Secure is Exponent-blinded RSA–CRT with Sliding Window Exponentiation? | IACR Transactions on Cryptographic Hardware and Embedded Systems | Rei Ueno Naofumi Homma | 2023/3/6 |
Multiple-valued plaintext-checking side-channel attacks on post-quantum kems | IACR Transactions on Cryptographic Hardware and Embedded Systems | Yutaro Tanaka Rei Ueno Keita Xagawa Akira Ito Junko Takahashi | 2023/6/9 |
Crystalor: Recoverable Memory Encryption Mechanism with Optimized Metadata Structure | Cryptology ePrint Archive | Rei Ueno Hiromichi Haneda Naofumi Homma Akiko Inoue Kazuhiko Minematsu | 2023 |
Homomorphic encryption for stochastic computing | Journal of Cryptographic Engineering | Ryusuke Koseki Akira Ito Rei Ueno Mehdi Tibouchi Naofumi Homma | 2023/6 |
AIHWS 2023 | Applied Cryptography and Network Security Workshops: ACNS 2023 Satellite Workshops, ADSC, AIBlock, AIHWS, AIoTS, CIMSS, Cloud S&P, SCI, SecMT, SiMLA, Kyoto, Japan, June 19–22, 2023, Proceedings | Lejla Batina Stjepan Picek Shivam Bhasin Ileana Buhan Lukasz Chmielewski | 2023/10/3 |
Formal Analysis of Non-profiled Deep-learning Based Side-channel Attacks | Cryptology ePrint Archive | Akira Ito Rei Ueno Rikuma Tanaka Naofumi Homma | 2023 |
Efficient DFA-Resistant AES Hardware Based on Concurrent Fault Detection Scheme | Rei Ueno Yusuke Yagyu Naofumi Homma | 2023/5/22 | |
Hardware Supply Chain Security and EM Tricks | Makoto Nagata Naofumi Homma Yuichi Hayashi | 2023/9/4 | |
Bypassing isolated execution on risc-v using side-channel-assisted fault-injection and its countermeasure | IACR Transactions on Cryptographic Hardware and Embedded Systems | Shoei Nashimoto Daisuke Suzuki Rei Ueno Naofumi Homma | 2022 |
ELM: A low-latency and scalable memory encryption scheme | IEEE Transactions on Information Forensics and Security | Akiko Inoue Kazuhiko Minematsu Maya Oda Rei Ueno Naofumi Homma | 2022/7/4 |
Efficient modular polynomial multiplier for NTT accelerator of Crystals-Kyber | Yuma Itabashi Rei Ueno Naofumi Homma | 2022/8/31 | |
Curse of re-encryption: a generic power/EM analysis on post-quantum KEMs | IACR Transactions on Cryptographic Hardware and Embedded Systems | Rei Ueno Keita Xagawa Yutaro Tanaka Akira Ito Junko Takahashi | 2022 |
AES S-box hardware with efficiency improvement based on linear mapping optimization | IEEE Transactions on Circuits and Systems II: Express Briefs | Ayano Nakashima Rei Ueno Naofumi Homma | 2022/6/23 |