研究成果

Contents

著書(分担執筆)

  1. 崎山一男 著,菅原健 著,李陽 著, “暗号ハードウェアのセキュリティ,” ISBN 978-4-339-02894-2, コロナ社, 174pages, (May., 2019).
  2. Kazuo Sakiyama, Yu Sasaki, and Yang Li, “Security of Block Ciphers: From Algorithm Design to Hardware Implementation,” ISBN 978-1-118-66001-0, Wiley, (Jul., 2015).
  3. Junko Takahashi, Toshinori Fukunaga, Shigeto Gomisawa, Yang Li, Kazuo Sakiyama, and Kazuo Ohta, “Fault Injection and Key Retrieval Experiments on Evaluation Board,” Chapter in Marc Joye and Michael Tunstall editors, Fault Analysis in Cryptography, ISBN 978-3-642-29656-7, Springer, pp.313-331 (Jul., 2012).

学術論文(査読あり)

  1. Akiko Toh, Yang Li, Kazuo Sakiyama, Takeshi Sugawara, “Fingerprinting Light Emitting Diodes Using Spectrometer,” IET Electronics Letters, Vol.55, Issue 24, pp.1295–1297, 2019.
  2. Takeshi Sugawara, Yang Li, and Kazuo Sakiyama, “Probing Attack of Share-Serial Threshold Implementation of AES,” IET Electronics Letters, Vol.55, Issue 9, pp.517-519, May, 2019.
  3. Jingyi Feng, Hua Chen, Yang Li, Zhipeng Jiao, Wei Xi, “A Framework for Evaluation and Analysis on Infection Countermeasures Against Fault Attacks,” IEEE Transactions on Information Forensics and Security, 2020/15, pp. 391-406, 2019.

  4. Yang Li, Momoka Kasuya, and Kazuo Sakiyama, “Comprehensive Evaluation on an ID-Based Side-Channel Authentication with FPGA-Based AES,” Appl. Sci. 2018, 8(10), 1898, (Oct., 2018).
  5. Ruyan Wang, Xiaohan Meng, Yang Li, Jian Wang, “Towards Optimized DFA Attacks on AES under Multibyte Random Fault Model,” Security and Communication Networks 2018, 2870475, 1-9, Aug. 2018.
  6. Sen Xu, Xiangjun Lu, Kaiyu Zhang, Yang Li, Lei Wang, Weijia Wang, Haihua Gu, Zheng Guo, Junrong Liu, and Dawu Gu, “Similar Operation Template Attack on RSA-CRT as a Case Study” Science China Information Sciences, 61/ 32111, 1-17, 2018/03
  7. Yang Li, Mengting Chen, and Jian Wang, “Another Security Evaluation of SPA Countermeasures for AES Key Expansion in IoT devices” Journal of Information Science & Engineering, 33/ 4, 1085-1100, 2017/07
  8. Yang Li, Mengting Chen, Zhe Liu, and Jian Wang, “Reduction of Fault Injection Times for Blind Fault Attack on SPN Block Ciphers” ACM Transactions on Embedded Computing Systems, TECS, 16/ 2, 1-20, 2017/04
  9. Shugo Mikami, Dai Watanabe, Yang Li, and Kazuo Sakiyama, “Fully Integrated Passive UHF RFID Tag for Hash-Based Mutual Authentication Protocol,” The Scientific World Journal, Hindawi, Volume 2015 (2015), Article ID 498610, 11 pages, (Aug., 2015).
  10. Sho Endo, Yang Li, Naofumi Homma, Kazuo Sakiyama, Kazuo Ohta, Daisuke Fujimoto, Makoto Nagata, Toshihiro Katashita, Jean-Luc Danger, and Takafumi Aoki, “A Silicon-level Countermeasure against Fault Sensitivity Analysis and Its Evaluation,” IEEE Trans. Very Large Scale Integr. (VLSI) Syst., Vol.23, No.8, pp.1429-1438, (Aug., 2015).
  11. 中曽根俊貴, 李陽, 岩本貢, 太田和夫, 崎山一男, “クロック間衝突を漏洩モデルとする新たなサイドチャネル解析と並列実装AES暗号ハードウェアにおける弱い鍵,” 電子情報通信学会論文誌(A), Vol.J97-A, No.11, pp.695-703, (Nov., 2014).
  12. Christophe Clavier, Jean-Luc Danger, Guillaume Duc, M. Abdelaziz Elaabid, Benoît Gérard, Sylvain Guilley, Annelie Heuser, Michael Kasper, Yang Li, Victor Lomné, Daisuke Nakatsu, Kazuo Ohta, Kazuo Sakiyama, Laurent Sauvage, Werner Schindler, Marc Stöttinger, Nicolas Veyrat-Charvillon, Matthieu Walle, Antoine Wurcker, “Practical improvements of side-channel attacks on AES: feedback from the 2nd DPA contest,” J. Cryptographic Engineering, Vol.4(1), pp.1-16, (Apr., 2014).
  13. Kazuo Sakiyama, Yang Li, Shigeto Gomisawa, Yu-ichi Hayashi, Mitsugu Iwamoto, Naofumi Homma, Takafumi Aoki, and Kazuo Ohta, “Practical DFA Strategy for AES Under Limited-Access Conditions,” Journal of Information Processing, Vol.55, No.2, (Feb., 2014).
  14. Dai Yamamoto, Kazuo Sakiyama, Mitsugu Iwamoto, Kazuo Ohta, Masahiko Takenaka, and Kouichi Itoh, “Variety Enhancement of PUF Responses Using the Locations of Random Outputting RS Latches,” J. Cryptographic Engineering, Vol.3(4), pp.197-211, (Nov., 2013).
  15. Yang Li, Kazuo Ohta, and Kazuo Sakiyama, “A New Type of Fault-Based Attack: Fault Behavior Analysis,” IEICE Trans. Fundam. Electron. Commun. Comput. Sci., Vol.E96-A, No.1, pp.177-184, (Jan., 2013).
  16. 小池彩歌, 李陽, 中津大介, 太田和夫, 崎山一男, “複数の要因に対する新たな故障感度解析,” 電子情報通信学会論文誌(A), Vol.J95-A, No.10, pp.751-755, (Oct., 2012).
  17. Kazuo Sakiyama, Yang Li, Mitsugu Iwamoto, and Kazuo Ohta, “Information-Theoretic Approach to Optimal Differential Fault Analysis,” IEEE Trans. Inf. Forensic Secur., Vol.7, No.1, pp.109-120, (Feb., 2012).
  18. Yang Li, Kazuo Ohta, and Kazuo Sakiyama, “New Fault-Based Side-Channel Attack Using Fault Sensitivity,” IEEE Trans. Inf. Forensic Secur., Vol.7, No.1, pp.88-97, (Feb., 2012).
  19. Yang Li, Kazuo Ohta, and Kazuo Sakiyama, “Toward Effective Countermeasures Against an Improved Fault Sensitivity Analysis,” IEICE Trans. Fundam. Electron. Commun. Comput. Sci., Vol.A95-A, No.1, pp.234-241, (Jan., 2012).
  20. Kazuo Sakiyama, Miroslav Knežević, Junfeng Fan, Bart Preneel, and Ingrid Verbauwhede, “Tripartite Modular Multiplication,” Integration-VLSI J., Vol.44, Issue 4, pp.259-269, (Apr., 2011).
  21. Yang Li, Kazuo Sakiyama, Shinichi Kawamura, and Kazuo Ohta, “Power Analysis against a DPA-resistant S-box Implementation Based on the Fourier Transform,” IEICE Trans. Fundam. Electron. Commun. Comput. Sci., Vol.A94-A, No.1, pp.191-199, (Jan., 2011).

解説論文,レビュー論文

  1. 崎山一男, “サイドチャネル攻撃と耐タンパー技術,” 電子情報通信学会知識ベース, 1群-3編-14章, (2019年7月).
  2. 菅原健, 崎山一男, “組込機器のセキュリティを脅かすレーザーフォールト攻撃,” レーザー研究, レーザー学会誌, Vol.77, No.6, pp.305-309, (2019年6月).
  3. 崎山一男, 太田和夫, “暗号への脅威「サイドチャネル攻撃」とその対策,”「科学」報告・解説, 岩波書店, Vol.78, No.10, pp.1080-1083, (2008年10月).(訂正箇所)

国際会議プロシーディングス等(査読あり)

  1. Tomoki Uemura, Yohei Watanabe, Yang Li, Noriyuki Miura, Iwamoto Mitsugu, Kazuo Sakiyama, Kazuo Ohta, “A Key Recovery Algorithm Using Random Key Leakage from AES Key Schedule, ” The International Symposium on Information Theory and Its Applications (ISITA2020), 2020, to appear. 
  2. T. Sugawara, T. Onuma, and Y. Li, “Signal Injection Attack on Time-to-Digital Converter and Its Application to Physically Unclonable Function,” The 15th International Workshop on Security (IWSEC 2020), 2020, eprint.
  3. Yang Li, Ryota Hatano, Sho Tada, Kohei Matsuda, Noriyuki Miura, Takeshi Sugawara, and Kazuo Sakiyama, “Side-Channel Leakage of Alarm Signal for a Bulk-Current-Based Laser Sensor,” In Proc. International Conference on Information Security and Cryptology (Inscrypt’19), LNCS 12020, Springer-Verlag. (Dec., 2019).
  4. Kohei Matsuda, Sho Tada, Makoto Nagata, Yang Li, Takeshi Sugawara, Mitsugu Iwamoto, Kazuo Ohta, Kazuo Sakiyama, and Noriyuki Miura, “An Information Leakage Sensor Based on Measurement of Laser-Induced Opto-Electric Bulk Current Density,” In Extended Abstracts of International Conference on Solid State Devices and Materials (SSDM’19), M-1-03, pp. 501-502, (Sep., 2019).
  5. Muhammad Salman, Yang Li, Jian Wang, “A Graphical PIN Entry System with Shoulder Surfing Resistance”, 2019 IEEE 4th International Conference on Signal and Image Processing, pp. 203-207, 2019/07
  6. Zhiwei Yuan, Yang Li, Kazuo Sakiyama, Takeshi Sugawara, and Jian Wang, “Recovering Memory Access Sequence with Differential Flush+Reload Attack,” In Proc. International Conference on Information Security Practice and Experience (ISPEC’18), LNCS 11125, Springer-Verlag, pp.424-439, (Sep., 2018).
  7. Ruyan Wang, Xiaohan Meng, Yang Li, Jian Wang, “Improved Differential Fault Analysis on Authenticated Encryption of PAEQ-128”,  International Conferences on Information Security and Cryptology 2018 (Inscript’18), pp. 183-199, 2018/12
  8. Yang Li, Shuang Wang, Zhibin Wang, and Jian Wang, “A Strict Key Enumeration Algorithm for Dependent Score Lists of Side-Channel Attacks” In Proc. 16th Smart Card Research and Advanced Application Conference, (Cardis’17), Springer, pp. 51-69, 2018/01
  9. Shuang Wang, Yang Li, and Jian Wang, “A New Key Rank Estimation Method to Investigate Dependent Key Lists of Side Channel Attacks” In Proc. Asian Hardware Oriented Security and Trust Symposium (AsianHOST’17), IEEE pp. 1-6, 2017/10
  10. Yang Li, Mengting Chen, and Jian Wang, “Introduction to side-channel attacks and fault attacks”, In Proc. Electromagnetic Compatibility 2016 Asia-Pacific International Symposium (APEMC’16), IEEE, pp.573-575, 2016/09
  11. Mengting Chen, Yang Li, and Jian Wang, “Another SPA Key Recovery Against Random Order Countermeasures for AES Key Expansion”, In Proc. International Conference on Cloud Computing and Security (ICCCS’16) Springer, pp. 322-334, 2016/06
  12. Yang Li, Shugo Mikami, Dai Watanabe, Kazuo Ohta, and Kazuo Sakiyama, “Single-Chip Implementation and Evaluation of Passive UHF RFID Tag with Hash-Based Mutual Authentication,” In Proc. Workshop on RFID Security (RFIDsec’14 Asia), IOS Press, pp.3-15, (Nov., 2014).
  13. Yang Li, Toshiki Nakasone, and Kazuo Sakiyama, “Software and Hardware Co-Verification for Privacy-Enhanced Passive UHF RFID Tags,” In Proc. 2014 IEEE International Symposium on Electromagnetic Compatibility (EMC’14), IEEE, pp.752-757 (Aug., 2014).
  14. Yang Li, Toshiki Nakasone, Kazuo Ohta, Kazuo Sakiyama, “Privacy-Mode Switching: Toward Flexible Privacy Protection for RFID Tags in Internet of Things,” In Proc. The 11th Annual IEEE Consumer Communications & Networking Conference (CCNC’14), IEEE, pp.519-520, (Jan., 2014).
  15. Yang Li, Yu-ichi Hayashi, Arisa Matsubara, Naofumi Homma, Takafumi Aoki, Kazuo Ohta and Kazuo Sakiyama, “Yet Another Fault-Based Leakage in Non-Uniform Faulty Ciphertexts,” In Proc. The Sixth International Symposium on Foundations & Practice of Security (FPS’13), LNCS 8352, pp.272-287, Springer-Verlag, (Oct., 2013).
  16. Toshiki Nakasone, Kazuo Sakiyama, Yang Li, and Kazuo Ohta, “Exploration of the CC-EMA Attack Towards Efficient Evaluation of EM Information Leakage,” In Proc. International Symposium on Electromagnetic Compatibility (EMC EUROPE) 2013, IEEE, pp.411-414, (Sep., 2013).
  17. Yu Sasaki, Yang Li, Hikaru Sakamoto and Kazuo Sakiyama, “Coupon Collector’s Problem for Fault Analysis — High Tolerance for Noisy Fault Injections,” In Proc. Financial Cryptography and Data Security 2013 (FC’13), LNCS 7859, Springer-Verlag, pp.213-220 (Apr., 2013).
  18. Yang Li, Sho Endo, Nicolas Debande, Naofumi Homma, Takafumi Aoki, Thanh-Ha Le, Jean-Luc Danger, Kazuo Ohta, Kazuo Sakiyama, “Exploring the Relations Between Fault Sensitivity and Power Consumption,” In Proc. Constructive Side-Channel Analysis and Secure Design (COSADE’13), LNCS 7864, Springer-Verlag, pp.137-153 (Mar., 2013).
  19. Yang Li, Kazuo Ohta, and Kazuo Sakiyama, “An Extension of Fault Sensitivity Analysis Based on Clockwise Collision,” In Proc. International Conferences on Information Security and Cryptology 2012 (Inscript’12), LNCS 7763, Springer-Verlag, pp.46-59, (Nov., 2012).
  20. Toshiki Nakasone, Yang Li, Yu Sasaki, Mitsugu Iwamoto, Kazuo Ohta, and Kazuo Sakiyama, “Key-Dependent Weakness of AES-Based Ciphers Under Clockwise Collision Distinguisher,” In Proc. International Conference on Information Security and Cryptology 2012 (ICISC’12), LNCS 7839, Springer-Verlag, pp.395-409, (Nov., 2012).
  21. Sho Endo, Yang Li, Naofumi Homma, Kazuo Sakiyama, Kazuo Ohta and Takafumi Aoki, “An Efficient Countermeasure against Fault Sensitivity Analysis Using Configurable Delay Blocks,” In Proc. Workshop on Fault Diagnosis and Tolerance in Cryptography (FDTC’12), IEEE, pp.95-102, (Sep., 2012).
  22. Yu-ichi Hayashi, Shigeto Gomisawa, Yang Li, Naofumi Homma, Kazuo Sakiyama, Takafumi Aoki, and Kazuo Ohta, “Intentional Electromagnetic Interference for Fault Analysis on AES Block Cipher IC,” In Proc. International Workshop on Electromagnetic Compatibility of Integrated Circuits (EMCCOMPO’11), IEEE, pp.235-240, (Nov., 2011).
  23. Amir Moradi, Oliver Mischke, Christof Paar, Yang Li, Kazuo Ohta, Kazuo Sakiyama, “On the Power of Fault Sensitivity Analysis and Collision Side-Channel Attack in a Combined Setting,” In Proc. Workshop on Cryptographic Hardware and Embedded Systems (CHES’11), LNCS 6917, Springer-Verlag, pp.292-311, (Sep., 2011).
  24. Hikaru Sakamoto, Yang Li, Kazuo Ohta, and Kazuo Sakiyama, “Fault Sensitivity Analysis Against Elliptic Curve Cryptosystems,” In Proc. Workshop on Fault Diagnosis and Tolerance in Cryptography (FDTC’11), IEEE, pp.11-20, (Sep., 2011).
  25. Yang Li, Kazuo Ohta, and Kazuo Sakiyama, “Revisit Fault Sensitivity Analysis on WDDL-AES,” In Proc. International Symposium on Hardware-Oriented Security and Trust (HOST’11), IEEE, pp.148-153, (Jun., 2011).
  26. Yu Sasaki, Yang Li, Lei Wang, Kazuo Sakiyama, and Kazuo Ohta, “Non-Full-Active Super-Sbox Analysis: Applications to ECHO and Grøstl,” In Proc. Advances in Cryptology — ASIACRYPT’10, LNCS 6477, Springer-Verlag, pp.38-55, (Dec., 2010).
  27. Daisuke Nakatsu, Yang Li, Kazuo Sakiyama, and Kazuo Ohta, “Combination of SW Countermeasure and CPU Modification on FPGA Against Power Analysis,” In Proc. International Workshop on Information Security Applications (WISA’10), LNCS 6513, Springer-Verlag, pp.258-272, (Aug., 2010).
  28. Yang Li, Kazuo Sakiyama, Shigeto Gomisawa, Toshinori Fukunaga, Junko Takahashi, and Kazuo Ohta, “Fault Sensitivity Analysis,” In Proc. Workshop on Cryptographic Hardware and Embedded Systems (CHES’10), LNCS 6225, Springer-Verlag, pp.320-334, (Aug., 2010).
  29. Yang Li, Kazuo Sakiyama, Lejla Batina, Daisuke Nakatsu, and Kazuo Ohta, “Power Variance Analysis Breaks a Masked ASIC Implementations of AES,” In Proc. Design, Automation and Test in Europe (DATE’10), ACM, pp.1059-1064, (Mar., 2010).
  30. Yang Li, Kazuo Sakiyama, Shinichi Kawamura, Yuichi Komano, and Kazuo Ohta, “Security Evaluation of a DPA-resistant S-box Based on the Fourier Transform,” In Proc. International Conference on Information and Communications Security (ICICS’09), LNCS 5927, Springer-Verlag, pp.3-16, (Dec., 2009).

学会口頭発表(上記以外のもの, 査読なし)

  1. 羽田野凌太, 平田遼, 松田航平, 三浦典之, 李陽, 崎山一男, “レーザー検知回路から漏洩するサイドチャネル情報の考察,” 2020年暗号と情報セキュリティシンポジウム (SCIS2020), 3E3-2, 7 pages, (Jan., 2020).
  2. 高見豪, 菅原健, 崎山一男, 李陽, “AESへの5ラウンドの物理攻撃の可能性の考察,” 2020年暗号と情報セキュリティシンポジウム (SCIS2020), 3E3-1, 8 pages, (Jan., 2020).
  3. 杉本悠馬, 菅原健, 崎山一男, 李陽, “無線通信から収集した電磁波を用いたテンプレート攻撃研究,” 2020年暗号と情報セキュリティシンポジウム (SCIS2020), 3E3-5, 6 pages, (Jan., 2020).
  4. 高木翼, 李陽, 崎山一男, 菅原健, 梨本翔永, 鈴木大輔, “FPGAを用いた秘匿アクセラレーションの実装評価,” 2020年暗号と情報セキュリティシンポジウム (SCIS2020), 3C3-1, 7 pages, (Jan., 2020).
  5. 藤聡子, 土屋彩夏, 李陽, 崎山一男, 菅原健, “調光機能のある LEDの個体識別,” 2020年暗号と情報セキュリティシンポジウム (SCIS2020), 3E1-3, 6 pages, (Jan., 2020).
  6. 植村友紀, 李陽, 三浦典之, 岩本貢, 崎山一男, 太田和夫, “鍵のランダムな漏洩に対する AES 鍵スケジュール復元アルゴリズム,” 2020年暗号と情報セキュリティシンポジウム (SCIS2020), 2B1-1, 7 pages, (Jan., 2020).
  7. 羽田野凌太, 李陽, 多田捷, 松田航平, 三浦典之, 菅原健, 崎山一男, “レーザーフォールト注入攻撃への対策が施されたAES暗号チップの脆弱性評価,” IEICE2019年ソサイエティ大会, (Sep., 2019).
  8. 土屋彩夏, 藤聡子, 李陽, 崎山一男, 菅原健, “積分球による光量の均一化に基づくLEDの個体識別,” IEICE2019年ソサイエティ大会, (Sep., 2019).
  9. 高見豪, 菅原健, 崎山一男, 李陽, “AESに対する5ラウンド攻撃の物理攻撃への応用検討,” IEICE2019年ソサイエティ大会, (Sep., 2019).
  10. Yang Li, Natsu Shoji, Takeshi Sugawara, Kazuo Sakiyama, “Investigation of Information Leakage from A Laser Fault Injection Sensor,” IEICE2019年総合大会, (Mar., 2019).
  11. 鈴木大輔, 梨本翔永, 永塚智之, 高木翼, 李陽, 崎山一男, 菅原健, “FPGA搭載サーバにおける秘匿アクセラレーション,” 2019年暗号と情報セキュリティシンポジウム (SCIS2019), 1D1-2, 8 pages, (Jan., 2019).
  12. 藤聡子, 李陽, 崎山一男, 菅原健, “分光スペクトルを用いたLEDの個体識別における電流変化の影響,” 2019年暗号と情報セキュリティシンポジウム (SCIS2019), 3D4-2, 6 pages, (Jan., 2019).
  13. 伊藤駿輔, 菅原健, 崎山一男, 李陽, “AESの指定したラウンド間差分の平文探索アルゴリズムの改良,” IEICE2018年ソサイエティ大会, (Sep., 2018).
  14. 羽田野凌太, 庄司奈津, 李陽, 菅原健, 崎山一男, “AES暗号への故障差分攻撃のモデル化と攻撃回数の評価,” IEICE2018年ソサイエティ大会, (Sep., 2018).
  15. 西山優太, 李陽, 崎山一男, 菅原健, “様々な実験条件におけるジャイロセンサのセンサなりすまし攻撃に関する基礎的検討,” IEICE2018年ソサイエティ大会, (Sep., 2018).
  16. 藤聡子, 李陽, 崎山一男, 菅原健, “分光器を用いたLEDの個体識別に向けた基礎的研究,” IEICE2018年ソサイエティ大会, (Sep., 2018).
  17. カイ云峰, 李陽, 町田卓謙, 崎山一男, “AESハードウェア実装の任意ラウンドにおける消費電力制御,” 2015年暗号と情報セキュリティシンポジウム (SCIS2015), 3A2-2, 7 pages, (Jan., 2015).
  18. 松原有沙, 李 陽, 林 優一, 崎山一男, “サイドチャネル認証に向けた基礎的考察,” ISEC2014-10, pp.1-8, (Jul., 2014).
  19. Yang Li and Kazuo Sakiyama, “Toward Practical Solution to Unsuccessful Write Operation on Non-Volatile Memory of Passive RFID Tags,” Poster Session, ASIACCS2014 (Jun., 2014).
  20. Yang Li, Toshiki Nakasone, and Kazuo Sakiyama, “Toward Applications of SRAM Retention Time as Battery-Less Timer for RFID Tags,” Poster Session, IWSEC2013 (Nov., 2013).
  21. 松原有沙, 蒯 云峰, 李 陽, 中曽根俊貴, 太田和夫, 崎山一男, “AES暗号回路における信号遷移回数を用いたサイドチャネル情報に関する考察,” ISEC2013-45, pp.331-338, (Jul., 2013).
  22. Yang Li, Hikaru Sakamoto, Iwamasa Nishikado, Takafumi Saito, Kazuo Ohta, Kazuo Sakiyama, “Toward Flexible Privacy Protection for RFID Tags Using Privacy-Mode Switching,” IEICE2013年総合大会, (Mar., 2013).
  23. 中曽根俊貴, 李 陽, 崎山一男, “システム上にあるSRAMの電荷保持時間とPUF特性を利用したDoS攻撃対策,” IEICE2013年総合大会, (Mar., 2013).
  24. 佐々木悠, 李 陽, 阪本光, 崎山一男, “クーポンコレクタ問題を利用したノイズに強い飽和フォールト攻撃,” IEICE2013年総合大会, (Mar., 2013).
  25. 松原有沙, 李 陽, 太田和夫, 崎山一男, “故障混入時のAES暗号ハードウェアの脆弱性について,” IEICE2013年総合大会(学生ポスターセッション), (Mar., 2013).
  26. 遠藤翔, 李陽, 本間尚文, 崎山一男, 藤本大介, 永田真, 太田和夫, 青木孝文, “故障感度隠蔽のための効率的な対策とその評価,” 2013年暗号と情報セキュリティシンポジウム (SCIS2013), 1E1-5, 8 pages, (Jan., 2013).
  27. 松原有沙, 李 陽, 太田和夫, 崎山一男, “Mechanism Analysis for Non-Uniform Mapping of Faulty S-box –Case Study of AES-COMP–,” 2013年暗号と情報セキュリティシンポジウム (SCIS2013), 3E3-1, 6 pages, (Jan., 2013).
  28. 中曽根俊貴, 李 陽, 佐々木悠, 岩本 貢, 太田和夫, 崎山一男, “CC-EMAとCEMAの攻撃性能の比較,” 2013年暗号と情報セキュリティシンポジウム (SCIS2013), 3E3-2, 8 pages, (Jan., 2013).
  29. Toshiki Nakasone, Daisuke Nakatsu, Yang Li, Kazuo Ohta, and Kazuo Sakiyama, “Locality Randomization for EMA-Resistant AES Hardware,” In Proc. Triangle Symposium on Advanced ICT 2012 (TriSAI’12), 4 pages, (Sep., 2012).
  30. Yang Li, Daisuke Nakatsu, Kazuo Ohta, and Kazuo Sakiyama, “Key Recovery with Less Power Traces Using DPA Contest Data,” Poster Session, CHES2012 (Sep., 2012).
  31. 李 陽, 太田和夫, 崎山一男, “Sensitive-Data Dependency of Faulty Behavior and Its Application,” 2012年暗号と情報セキュリティシンポジウム (SCIS2012), 3C1-3E, 7 pages, (Feb., 2012)
  32. 中曽根俊貴, 中津大介, 李 陽, 太田和夫, 崎山一男, “クロック間衝突を利用した電磁波解析,” 2012年暗号と情報セキュリティシンポジウム (SCIS2012), 3C1-1, 8 pages, (Feb., 2012)
  33. 小池彩歌, 李 陽, 中津大介, 太田和夫, 崎山一男, “IRドロップを利用した故障感度解析と高温環境下における影響,” 2012年暗号と情報セキュリティシンポジウム (SCIS2012), 2C3-3, 7 pages, (Jan., 2012)
  34. 中津大介, 李 陽, 太田和夫, 崎山一男, “テンプレートを利用した時系列電力解析,” 2012年暗号と情報セキュリティシンポジウム (SCIS2012), 2C2-5, 6 pages, (Jan., 2012)
  35. 李 陽, 太田和夫, 崎山一男, “[招待講演]マスク対策AESに対する誤り暗号文を用いた故障感度解析~CHES2011での発表のレビュー~,” ISEC2011-66, p.25, (Dec., 2011).
  36. 阪本光, 李陽, 太田和夫, 崎山一男, “クロック間衝突を用いた楕円曲線暗号実装に対する故障感度解析,” ISEC2011-49, pp.101-108, (Nov., 2011).
  37. Toshiki Nakasone, Daisuke Nakatsu, Yang Li, Kazuo Ohta, Kazuo Sakiyama, “First Experimental Results of Correlation-Enhanced EMA Collision Attack,” Poster Session, CHES2011 (Sep., 2011).
  38. 高柳真如, 佐々木悠, 李陽, 太田和夫, 崎山一男, “7 及び8 ラウンド既知鍵AES識別機の実装,” 2011年暗号と情報セキュリティシンポジウム (SCIS2011), 2B2-4, 7 pages, (Jan., 2011).
  39. 李 陽, 太田和夫, 崎山一男, “Self-Template Fault Sensitivity Analysis,” 2011年暗号と情報セキュリティシンポジウム (SCIS2011), 3D3-1, 8 pages, (Jan., 2011).
  40. 阪本光, 李 陽, 太田和夫, 崎山一男, “楕円曲線暗号実装に対するFault Sensitivity Analysis,” 2011年暗号と情報セキュリティシンポジウム (SCIS2011), 3D3-2, 8 pages, (Jan., 2011).
  41. Naoyuki Takayanagi, Yang Li, Kazuo Sakiyama, and Kazuo Ohta, “Effective Verification for Known-Key Distinguisher by Using Extended Differential Path,” In Proc. Triangle Symposium on Advanced ICT 2010 (TriSAI’10), pp.284-287, (Oct., 2010).
  42. 岩本 貢, 李 陽, 崎山一男, 太田和夫, “回転操作が可能な視覚復号型秘密分散法の一般的構成法,” ISEC2010-49, pp.67-74, (Sep., 2010).
  43. Yu Sasaki, Yang Li, Lei Wang, Kazuo Sakiyama, and Kazuo Ohta, “New Non-Ideal Properties of AES-Based Permutations: Applications to ECHO and Grøstl,” The Second SHA-3 Candidate Conference, (Aug., 2010).
  44. 五味澤重友, 泉 雅巳, 李 陽, 高橋順子, 福永利徳, 佐々木悠, 崎山一男, 太田和夫, “AES暗号実装へのフォールト解析攻撃における適用範囲の拡大と解析効率の向上,” 2010年暗号と情報セキュリティシンポジウム (SCIS’10), 2B1-1, 6 pages, (Jan., 2010).
  45. Yang Li, Shigeto Gomisawa, Kazuo Sakiyama, and Kazuo Ohta, “An Information Theoretic Perspective on the Differential Fault Analysis against AES,” 2010 Symposium on Cryptography and Information Security (SCIS’10), 2B1-2, 6 pages, (Jan., 2010).
  46. 中津大介, 李 陽, 崎山一男, 太田和夫, “DPA耐性のあるソフトウェア実装のための安全なCPU,” 2010年暗号と情報セキュリティシンポジウム (SCIS’10), 2B3-1, 6 pages, (Jan., 2010).
  47. 松田和也, 坂井祐介, 太田和夫, 崎山一男, “Katz らのLeakage Resilient t-time 署名の解析,” 2010年暗号と情報セキュリティシンポジウム (SCIS’10), 2B3-4, 6 pages, (Jan., 2010).
  48. Yang Li, Mitsugu Iwamoto, Kazuo Ohta, and Kazuo Sakiyama, “Visual Secret Sharing Schemes Allowing Arbitrary Rotation Angles of Shares,” In Proc. Triangle Symposium on Advanced ICT 2009 (TriSAI’09), Tokyo, Japan, pp.33-38, (Oct., 2009).
  49. Daisuke Nakatsu, Yang Li, Kazuo Sakiyama, and Kazuo Ohta, “Comparison of Masked S-boxes in Hardware Implementation,” In Proc. Triangle Symposium on Advanced ICT 2009 (TriSAI’09), Tokyo, Japan, pp.176-181, (Oct., 2009).
  50. Yang Li, Mitsugu Iwamoto, Kazuo Ohta, and Kazuo Sakiyama, “A Novel Construction Method for Visual Secret Sharing Schemes Allowing Rotation of Shares,” ISEC2009-5, pp.29-36, (May, 2009).
  51. Yang Li, Mengyu Zhu, Wang Lei, Kazuo Ohta, and Kazuo Sakiyama, “Visual Secret Sharing Schemes for Multiple Secret Images Allowing the 90-degree Rotation of Shares,” 2009 Symposium on Cryptography and Information Security (SCIS’09), 1F1-3, (Jan., 2009).

Cryptology ePrint Archiv

  1. Yang Li, Daisuke Nakatsu, Qi Li, Kazuo Ohta, and Kazuo Sakiyama, “Clockwise Collision Analysis — Overlooked Side-Channel Leakage Inside Your Measurements,” Cryptology ePrint Archive, Report 2011/579, 2011.
  2. Shigeto Gomisawa, Yang Li, Junko Takahashi, Toshinori Fukunaga, Yu Sasaki, Kazuo Sakiyama, and Kazuo Ohta, “Efficient Differential Fault Analysis for AES,” Cryptology ePrint Archive, Report 2010/336, 2010.
  3. Yang Li, Shigeto Gomisawa, Kazuo Sakiyama, and Kazuo Ohta, “An Information Theoretic Perspective on the Differential Fault Analysis against AES,” Cryptology ePrint Archive, Report 2010/032, 2010.

その他の発表

  1. 李 陽, 崎山一男, “Single-Chip Implementation and Evaluation of Passive UHF RFID Tag with Hash-Based Mutual Authentication,” Hot Channel Workshop 2014, (2014年10月7日).
  2. 李 陽, 三上修吾, 渡辺 大, 太田和夫, 崎山一男, “RFIDシステムにおけるリレー攻撃対策,” Hot Channel Workshop 2014, (2014年4月23日).
  3. 李 陽, 崎山一男, “Single-Chip Implementation and Evaluation of A Privacy-Enhanced RFID Tag,” Hot Channel Workshop 2014, (2014年4月22日).
  4. 李 陽, 崎山一男, “Introduction to IAIK Demotag and Related Experiments on It,” Hot Channel Workshop 2013, (2013年11月25日).
  5. 松原有沙, 李 陽, 太田和夫, 崎山一男, “NU-FVAに基づく新たな鍵復元攻撃について,” Hot Channel Workshop 2013, (2013年4月11日).
  6. 李 陽, 中曽根俊貴, 崎山一男, “Toward Practically Secure and Flexible RFID Tags,” Hot Channel Workshop 2013, (2013年4月12日).

講演・チュートリアル・パネルディスカッション等

  1. Yang Li, Kazuo Sakiyama, “Review Fault Attacks on ECC Implementations with Fault Sensitivity Analysis,” A-SSCC 2015 レビュー講演, IEEE SSCS Japan/Kansai Chapter Technical Seminar, (2016年1月13日).
  2. Yang Li, Kazuo Sakiyama, “Review Fault Attacks on ECC Implementations with Fault Sensitivity Analysis,” IEEE Asian Solid-State Circuits Conference 2015, (A-SSCC’15), (Nov., 10th, 2015).
  3. 李 陽, 崎山一男, “Two Topics in Cryptographic Hardware: Coupon DFA and Secure RFID,” Compview暗号理論ワークショップ2013, (2013年2月21日).
  4. 崎山一男, 李 陽, ”故障感度解析の可能性,” Hot Channel Workshop 2012, (2012年9月5日).
  5. Kazuo Sakiyama, “A New Fault Analysis Attack (joint work with Yang Li and Kazuo Ohta),” 2010 Japan-Taiwan Joint Research Symposium on Cryptography and Next IT-society, (Nov., 16th, 2010).
  6. Kazuo Sakiyama, “Cryptanalysis and Side-channel Analysis – Approach to Optimal Differential Fault Analysis (joint work with Yang Li and Kazuo Ohta),” Forum Math-for-Industry 2010, (Oct., 22nd, 2010).