Zobrazeno 1 - 10
of 144
pro vyhledávání: '"Kazuo Sakiyama"'
Autor:
Haruka Hirata, Daiki Miyahara, Victor Arribas, Yang Li, Noriyuki Miura, Svetla Nikova, Kazuo Sakiyama
Publikováno v:
Transactions on Cryptographic Hardware and Embedded Systems, Vol 2024, Iss 1 (2023)
Deploying cryptography on embedded systems requires security against physical attacks. At CHES 2019, M&M was proposed as a combined countermeasure applying masking against SCAs and information-theoretic MAC tags against FAs. In this paper, we show th
Externí odkaz:
https://doaj.org/article/a74c918c27dc42adac9230dff74f7dc7
Publikováno v:
Applied Sciences, Vol 12, Iss 9, p 4135 (2022)
Artificial intelligence (AI) is progressing rapidly, and in this trend, edge AI has been researched intensively. However, much less work has been performed around the security of edge AI. Machine learning models are a mass of intellectual property, a
Externí odkaz:
https://doaj.org/article/dead16d12a6f4d2d91d1b72945acbc6d
Publikováno v:
Applied Sciences, Vol 8, Iss 10, p 1898 (2018)
Various electronic devices are increasingly being connected to the Internet. Meanwhile, security problems, such as fake silicon chips, still exist. The significance of verifying the authenticity of these devices has led to the proposal of side-channe
Externí odkaz:
https://doaj.org/article/67bdf02ff41b44a297a04207c83a14af
Publikováno v:
The Scientific World Journal, Vol 2015 (2015)
In general, conventional Arbiter-based Physically Unclonable Functions (PUFs) generate responses with low unpredictability. The N-XOR Arbiter PUF, proposed in 2007, is a well-known technique for improving this unpredictability. In this paper, we prop
Externí odkaz:
https://doaj.org/article/51bd96e096fe48ee83775a16a48bbfd3
Publikováno v:
The Scientific World Journal, Vol 2015 (2015)
Passive radio-frequency identification (RFID) tag has been used in many applications. While the RFID market is expected to grow, concerns about security and privacy of the RFID tag should be overcome for the future use. To overcome these issues, priv
Externí odkaz:
https://doaj.org/article/4f0e76ab40374cb6a34eaec52997e05f
Publikováno v:
Journal of Information Processing. 31:205-219
Publikováno v:
IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences. :289-299
Publikováno v:
ACM Transactions on Embedded Computing Systems; Sep2023, Vol. 22 Issue 5, p1-17, 17p
Publikováno v:
Innovative Security Solutions for Information Technology and Communications ISBN: 9783031326356
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::219741330200684d57884de767d970b1
https://doi.org/10.1007/978-3-031-32636-3_17
https://doi.org/10.1007/978-3-031-32636-3_17
Autor:
Kazuo Sakiyama, Yang Li
Publikováno v:
Encyclopedia of Cryptography, Security and Privacy ISBN: 9783642277399
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::286f72a3fc0e9c529bd18abfffa7d060
https://doi.org/10.1007/978-3-642-27739-9_1709-1
https://doi.org/10.1007/978-3-642-27739-9_1709-1