|
Search the dblp DataBase
Akashi Satoh:
[Publications]
[Author Rank by year]
[Co-authors]
[Prefers]
[Cites]
[Cited by]
Publications of Author
- Akashi Satoh, Nobuyuki Ooba, Kohji Takano, Edward D'Avignon
High-Speed MARS Hardware. [Citation Graph (0, 0)][DBLP] AES Candidate Conference, 2000, pp:305-316 [Conf]
- Akashi Satoh, Sumio Morioka, Kohji Takano, Seiji Munetoh
A Compact Rijndael Hardware Architecture with S-Box Optimization. [Citation Graph (0, 0)][DBLP] ASIACRYPT, 2001, pp:239-254 [Conf]
- Sumio Morioka, Akashi Satoh
An Optimized S-Box Circuit Architecture for Low Power AES Design. [Citation Graph (0, 0)][DBLP] CHES, 2002, pp:172-186 [Conf]
- Akashi Satoh, Sumio Morioka
Unified Hardware Architecture for 128-Bit Block Ciphers AES and Camellia. [Citation Graph (0, 0)][DBLP] CHES, 2003, pp:304-318 [Conf]
- Naofumi Homma, Sei Nagashima, Yuichi Imai, Takafumi Aoki, Akashi Satoh
High-Resolution Side-Channel Attack Using Phase-Based Waveform Matching. [Citation Graph (0, 0)][DBLP] CHES, 2006, pp:187-200 [Conf]
- W. K. Luk, Y. Katayama, Wei Hwang, M. Wordeman, T. Kirihata, Akashi Satoh, Seiji Munetoh, H. Wong, B. El-Kareh, P. Xiao, Rajiv V. Joshi
Development of a High Bandwidth Merged Logic/DRAM Multimedia Chip. [Citation Graph (0, 0)][DBLP] ICCD, 1997, pp:279-285 [Conf]
- Sumio Morioka, Akashi Satoh
A 10 Gbps Full-AES Crypto Design with a Twisted-BDD S-Box Architecture. [Citation Graph (0, 0)][DBLP] ICCD, 2002, pp:98-103 [Conf]
- Akashi Satoh, Y. Kobayashi, H. Niijima, Nobuyuki Ooba, Seiji Munetoh, S. Sone
A High-Speed Small RSA Encryption LSI with Low Power Dissipation. [Citation Graph (0, 0)][DBLP] ISW, 1997, pp:174-187 [Conf]
- Akashi Satoh, Sumio Morioka
Small and High-Speed Hardware Architectures for the 3GPP Standard Cipher KASUMI. [Citation Graph (0, 0)][DBLP] ISC, 2002, pp:48-62 [Conf]
- Akashi Satoh, Sumio Morioka
Hardware-Focused Performance Comparison for the Standard Block Ciphers AES, Camellia, and Triple-DES. [Citation Graph (0, 0)][DBLP] ISC, 2003, pp:252-266 [Conf]
- Akashi Satoh
Hardware Architecture and Cost Estimates for Breaking SHA-1. [Citation Graph (0, 0)][DBLP] ISC, 2005, pp:259-273 [Conf]
- Akashi Satoh, Tadanobu Inoue
ASIC-Hardware-Focused Comparison for Hash Functions MD5, RIPEMD-160, and SHS. [Citation Graph (0, 0)][DBLP] ITCC (1), 2005, pp:532-537 [Conf]
- Shigenori Shimizu, Hiroshi Ishikawa, Akashi Satoh, Toru Aihara
On-demand design service innovations. [Citation Graph (0, 0)][DBLP] IBM Journal of Research and Development, 2004, v:48, n:5-6, pp:751-766 [Journal]
- Akashi Satoh, Tadanobu Inoue
ASIC-hardware-focused comparison for hash functions MD5, RIPEMD-160, and SHS. [Citation Graph (0, 0)][DBLP] Integration, 2007, v:40, n:1, pp:3-10 [Journal]
- Akashi Satoh, Kohji Takano
A Scalable Dual-Field Elliptic Curve Cryptographic Processor. [Citation Graph (0, 0)][DBLP] IEEE Trans. Computers, 2003, v:52, n:4, pp:449-460 [Journal]
- Sumio Morioka, Akashi Satoh
A 10-Gbps full-AES crypto design with a twisted BDD S-Box architecture. [Citation Graph (0, 0)][DBLP] IEEE Trans. VLSI Syst., 2004, v:12, n:7, pp:686-691 [Journal]
- Atsushi Miyamoto, Naofumi Homma, Takafumi Aoki, Akashi Satoh
SPA against an FPGA-Based RSA Implementation with a High-Radix Montgomery Multiplier. [Citation Graph (0, 0)][DBLP] ISCAS, 2007, pp:1847-1850 [Conf]
- Akashi Satoh
High-Speed Parallel Hardware Architecture for Galois Counter Mode. [Citation Graph (0, 0)][DBLP] ISCAS, 2007, pp:1863-1866 [Conf]
- Sei Nagashima, Naofumi Homma, Yuichi Imai, Takafumi Aoki, Akashi Satoh
DPA Using Phase-Based Waveform Matching against Random-Delay Countermeasure. [Citation Graph (0, 0)][DBLP] ISCAS, 2007, pp:1807-1810 [Conf]
- Takeshi Sugawara, Naofumi Homma, Takafumi Aoki, Akashi Satoh
A High-Performance ASIC Implementation of the 64-bit Block Cipher CAST-128. [Citation Graph (0, 0)][DBLP] ISCAS, 2007, pp:1859-1862 [Conf]
- Akashi Satoh, Takeshi Sugawara, Takafumi Aoki
High-Speed Pipelined Hardware Architecture for Galois Counter Mode. [Citation Graph (0, 0)][DBLP] ISC, 2007, pp:118-129 [Conf]
High-Performance Concurrent Error Detection Scheme for AES Hardware. [Citation Graph (, )][DBLP]
Collision-Based Power Analysis of Modular Exponentiation Using Chosen-Message Pairs. [Citation Graph (, )][DBLP]
A Design Methodology for a DPA-Resistant Cryptographic LSI with RSL Techniques. [Citation Graph (, )][DBLP]
Chosen-message SPA attacks against FPGA-based RSA hardware implementations. [Citation Graph (, )][DBLP]
Bitstream encryption and authentication with AES-GCM in dynamically reconfigurable systems. [Citation Graph (, )][DBLP]
Systematic design of high-radix Montgomery multipliers for RSA processors. [Citation Graph (, )][DBLP]
Enhanced power analysis attack using chosen message against RSA hardware implementations. [Citation Graph (, )][DBLP]
High-performance ASIC implementations of the 128-bit block cipher CLEFIA. [Citation Graph (, )][DBLP]
ASIC hardware implementations for 512-bit hash function Whirlpool. [Citation Graph (, )][DBLP]
Bitstream Encryption and Authentication Using AES-GCM in Dynamically Reconfigurable Systems. [Citation Graph (, )][DBLP]
Compact ASIC Architectures for the 512-Bit Hash Function Whirlpool. [Citation Graph (, )][DBLP]
Mechanism behind Information Leakage in Electromagnetic Analysis of Cryptographic Modules. [Citation Graph (, )][DBLP]
Is the differential frequency-based attack effective against random delay insertion? [Citation Graph (, )][DBLP]
Enhanced Correlation Power Analysis Using Key Screening Technique. [Citation Graph (, )][DBLP]
Search in 0.025secs, Finished in 0.027secs
|