Naofumi Homma

Naofumi Homma

Tohoku University

H-index: 30

Asia-Japan

About Naofumi Homma

Naofumi Homma, With an exceptional h-index of 30 and a recent h-index of 22 (since 2020), a distinguished researcher at Tohoku University,

His recent articles reflect a diverse array of research interests and contributions to the field:

Secure computing device, secure computing method, and program

Perceived Information Revisited II: Information-Theoretical Analysis of Deep-Learning Based Side-Channel Attacks

Fallen Sanctuary: A Higher-Order and Leakage-Resilient Rekeying Scheme

Authenticated encryption apparatus, authenticated decryption apparatus, authenticated encryption system, method, and computer readable medium

Side-Channel Attacks on Unrolled Implementation of Trivium

Memory processing apparatus, memory verification apparatus, memory updating apparatus, memory protection system, method, and computer readable medium

Side-channel analysis against SecOC-compliant AES-CMAC

How Secure is Exponent-blinded RSA–CRT with Sliding Window Exponentiation?

Naofumi Homma Information

University

Position

___

Citations(all)

3139

Citations(since 2020)

1459

Cited By

2163

hIndex(all)

30

hIndex(since 2020)

22

i10Index(all)

86

i10Index(since 2020)

48

Email

University Profile Page

Tohoku University

Google Scholar

View Google Scholar Profile

Top articles of Naofumi Homma

Title

Journal

Author(s)

Publication Date

Secure computing device, secure computing method, and program

2024/2/13

Perceived Information Revisited II: Information-Theoretical Analysis of Deep-Learning Based Side-Channel Attacks

Cryptology ePrint Archive

Akira Ito

Rei Ueno

Naofumi Homma

2024

Fallen Sanctuary: A Higher-Order and Leakage-Resilient Rekeying Scheme

IACR Transactions on Cryptographic Hardware and Embedded Systems

Rei Ueno

Naofumi Homma

Akiko Inoue

Kazuhiko Minematsu

2024

Authenticated encryption apparatus, authenticated decryption apparatus, authenticated encryption system, method, and computer readable medium

2023/5/4

Side-Channel Attacks on Unrolled Implementation of Trivium

IEICE Technical Report; IEICE Tech. Rep.

Soichiro Kobayashi

Rei Ueno

Yosuke Todo

Naofumi Homma

2023/7/17

Memory processing apparatus, memory verification apparatus, memory updating apparatus, memory protection system, method, and computer readable medium

2023/4/27

Side-channel analysis against SecOC-compliant AES-CMAC

IEEE Transactions on Circuits and Systems II: Express Briefs

Katsumi Ebina

Rei Ueno

Naofumi Homma

2023/6/21

How Secure is Exponent-blinded RSA–CRT with Sliding Window Exponentiation?

IACR Transactions on Cryptographic Hardware and Embedded Systems

Rei Ueno

Naofumi Homma

2023/3/6

Multiple-valued plaintext-checking side-channel attacks on post-quantum kems

IACR Transactions on Cryptographic Hardware and Embedded Systems

Yutaro Tanaka

Rei Ueno

Keita Xagawa

Akira Ito

Junko Takahashi

...

2023/6/9

Crystalor: Recoverable Memory Encryption Mechanism with Optimized Metadata Structure

Cryptology ePrint Archive

Rei Ueno

Hiromichi Haneda

Naofumi Homma

Akiko Inoue

Kazuhiko Minematsu

2023

Homomorphic encryption for stochastic computing

Journal of Cryptographic Engineering

Ryusuke Koseki

Akira Ito

Rei Ueno

Mehdi Tibouchi

Naofumi Homma

2023/6

AIHWS 2023

Applied Cryptography and Network Security Workshops: ACNS 2023 Satellite Workshops, ADSC, AIBlock, AIHWS, AIoTS, CIMSS, Cloud S&P, SCI, SecMT, SiMLA, Kyoto, Japan, June 19–22, 2023, Proceedings

Lejla Batina

Stjepan Picek

Shivam Bhasin

Ileana Buhan

Lukasz Chmielewski

...

2023/10/3

Formal Analysis of Non-profiled Deep-learning Based Side-channel Attacks

Cryptology ePrint Archive

Akira Ito

Rei Ueno

Rikuma Tanaka

Naofumi Homma

2023

Efficient DFA-Resistant AES Hardware Based on Concurrent Fault Detection Scheme

Rei Ueno

Yusuke Yagyu

Naofumi Homma

2023/5/22

Hardware Supply Chain Security and EM Tricks

Makoto Nagata

Naofumi Homma

Yuichi Hayashi

2023/9/4

Bypassing isolated execution on risc-v using side-channel-assisted fault-injection and its countermeasure

IACR Transactions on Cryptographic Hardware and Embedded Systems

Shoei Nashimoto

Daisuke Suzuki

Rei Ueno

Naofumi Homma

2022

ELM: A low-latency and scalable memory encryption scheme

IEEE Transactions on Information Forensics and Security

Akiko Inoue

Kazuhiko Minematsu

Maya Oda

Rei Ueno

Naofumi Homma

2022/7/4

Efficient modular polynomial multiplier for NTT accelerator of Crystals-Kyber

Yuma Itabashi

Rei Ueno

Naofumi Homma

2022/8/31

Curse of re-encryption: a generic power/EM analysis on post-quantum KEMs

IACR Transactions on Cryptographic Hardware and Embedded Systems

Rei Ueno

Keita Xagawa

Yutaro Tanaka

Akira Ito

Junko Takahashi

...

2022

AES S-box hardware with efficiency improvement based on linear mapping optimization

IEEE Transactions on Circuits and Systems II: Express Briefs

Ayano Nakashima

Rei Ueno

Naofumi Homma

2022/6/23

See List of Professors in Naofumi Homma University(Tohoku University)

Co-Authors

H-index: 36
Shivam Bhasin

Shivam Bhasin

Nanyang Technological University

H-index: 32
Noriyuki Miura

Noriyuki Miura

Osaka University

H-index: 24
Yu-ichi HAYASHI

Yu-ichi HAYASHI

Nara Institute of Science and Technology

academic-engine