Synthical
Your space
Profile
Activity
Favorites
Folders
Feeds
All articles
Simple
Original
Articles by
Rei Ueno
Perceived Information Revisited II: Information-Theoretical Analysis of Deep-Learning Based Side-Channel Attacks
28 January 2024 by
Akira Ito
and
others
Cryptography and Security
,
Attacks and Cryptanalysis
Crystalor: Recoverable Memory Encryption Mechanism with Optimized Metadata Structure
23 January 2024 by
Rei Ueno
and
others
Cryptography and Security
,
Cryptology
Fallen Sanctuary: A Higher-Order and Leakage-Resilient Rekeying Scheme
4 December 2023 by
Rei Ueno
and
others
Cryptography and Security
,
Cryptology
Formal Analysis of Non-profiled Deep-learning Based Side-channel Attacks
16 October 2023 by
Akira Ito
and
others
Cryptography and Security
,
Attacks and Cryptanalysis
SCARF: A Low-Latency Block Cipher for Secure Cache-Randomization
14 May 2023 by
Federico Canale
and
others
Cryptography and Security
,
Cryptology
Multiple-Valued Plaintext-Checking Side-Channel Attacks on Post-Quantum KEMs
16 April 2023 by
Yutaro Tanaka
and
others
Cryptography and Security
,
Cryptology
On the Success Rate of Side-Channel Attacks on Masked Implementations: Information-Theoretical Bounds and Their Practical Usage
6 September 2022 by
Akira Ito
and
others
Cryptography and Security
,
Cryptology
ELM : A Low-Latency and Scalable Memory Encryption Scheme
19 July 2022 by
Akiko Inoue
and
others
Cryptography and Security
,
Cryptology
A Next-Generation Liquid Xenon Observatory for Dark Matter and Neutrino Physics
4 March 2022 by
Jelle Aalbers
and
others
at
Brookhaven National Laboratory
Instrumentation and Detectors
,
Cosmology and Nongalactic Astrophysics
Curse of Re-encryption: A Generic Power/EM Analysis on Post-Quantum KEMs
14 October 2021 by
Rei Ueno
and
others
Cryptography and Security
,
Cryptology
Toward Optimal Deep-Learning Based Side-Channel Attacks: Probability Concentration Inequality Loss and Its Usage
20 September 2021 by
Akira Ito
and
others
Cryptography and Security
,
Cryptology
Fault-Injection Attacks against NIST's Post-Quantum Cryptography Round 3 KEM Candidates
16 September 2021 by
Keita Xagawa
and
others
Cryptography and Security
,
Cryptology
Bypassing Isolated Execution on RISC-V with Fault Injection
29 September 2020 by
Subaru Nashimoto
and
others
Cryptography and Security
,
Cryptology
A High Throughput/Gate AES Hardware Architecture by Compressing Encryption and Decryption Datapaths --- Toward Efficient CBC-Mode Implementation
6 June 2016 by
Rei Ueno
and
others
Cryptography and Security
,
Cryptology
Highly Efficient GF(2^8) Inversion Circuit Based on Redundant GF Arithmetic and Its Application to AES Design
1 August 2015 by
Rei Ueno
and
others
Cryptography and Security
,
Cryptology