Follow
Takeshi Sugawara
Takeshi Sugawara
Verified email at uec.ac.jp
Title
Cited by
Cited by
Year
Light Commands: Laser-Based Audio Injection Attacks on Voice-Controllable Systems
T Sugawara, B Cyr, S Rampazzi, D Genkin, K Fu
Proceedings of the 29th USENIX Conference on Security Symposium, 2631-2648, 2020
2242020
An on-chip glitchy-clock generator for testing fault injection attacks
S Endo, T Sugawara, N Homma, T Aoki, A Satoh
Journal of Cryptographic Engineering 1, 265-270, 2011
1082011
Reversing stealthy dopant-level circuits
T Sugawara, D Suzuki, R Fujii, S Tawa, R Hori, M Shiozaki, T Fujino
Cryptographic Hardware and Embedded Systems–CHES 2014: 16th International …, 2014
962014
High-performance concurrent error detection scheme for AES hardware
A Satoh, T Sugawara, N Homma, T Aoki
Cryptographic Hardware and Embedded Systems–CHES 2008: 10th International …, 2008
882008
Oscillator without a combinatorial loop and its threat to FPGA in data centre
T Sugawara, K Sakiyama, S Nashimoto, D Suzuki, T Nagatsuka
Electronics Letters 55 (11), 640-642, 2019
792019
Fair and consistent hardware evaluation of fourteen round two SHA-3 candidates
M Knezevic, K Kobayashi, J Ikegami, S Matsuo, A Satoh, Ü Kocabas, ...
IEEE Transactions on Very Large Scale Integration (VLSI) Systems 20 (5), 827-840, 2011
762011
You Can't See Me: Physical Removal Attacks on LiDAR-based Autonomous Vehicles Driving Frameworks
Y Cao, SH Bhupathiraju, P Naghavi, T Sugawara, ZM Mao, S Rampazzi
arXiv preprint arXiv:2210.09482, 2022
752022
On measurable side-channel leaks inside ASIC design primitives
T Sugawara, D Suzuki, M Saeki, M Shiozaki, T Fujino
Cryptographic Hardware and Embedded Systems-CHES 2013: 15th International …, 2013
652013
Minalpher v1
Y Sasaki, Y Todo, K Aoki, Y Naito, T Sugawara, Y Murakami, M Matsui, ...
CAESAR Round 1, 2014
58*2014
High-speed pipelined hardware architecture for Galois counter mode
A Satoh, T Sugawara, T Aoki
Information Security: 10th International Conference, ISC 2007, Valparaíso …, 2007
572007
High-performance hardware architectures for Galois counter mode
A Satoh, T Sugawara, T Aoki
IEEE Transactions on Computers 58 (7), 917-930, 2008
562008
3-Share Threshold Implementation of AES S-box without Fresh Randomness
T Sugawara
IACR Transactions on Cryptographic Hardware and Embedded Systems, 123-145, 2019
532019
SAEB: A Lightweight Blockcipher-Based AEAD Mode of Operation
Y Naito, M Matsui, T Sugawara, D Suzuki
IACR Transactions on Cryptographic Hardware and Embedded Systems, 192-217, 2018
512018
Non-invasive EMI-based fault injection attack against cryptographic modules
Y Hayashi, N Homma, T Sugawara, T Mizuki, T Aoki, H Sone
2011 IEEE International Symposium on Electromagnetic Compatibility, 763-767, 2011
472011
A 286 F²/Cell Distributed Bulk-Current Sensor and Secure Flush Code Eraser Against Laser Fault Injection Attack on Cryptographic Processor
K Matsuda, T Fujii, N Shoji, T Sugawara, K Sakiyama, Y Hayashi, ...
IEEE Journal of Solid-State Circuits, 2018
45*2018
Biasing power traces to improve correlation power analysis attacks
Y Kim, T Sugawara, N Homma, T Aoki, A Satoh
First International Workshop on Constructive Side-Channel Analysis and …, 2010
432010
Sensor CON-Fusion: Defeating Kalman Filter in Signal Injection Attack
S Nashimoto, D Suzuki, T Sugawara, K Sakiyama
Proceedings of the 2018 on Asia Conference on Computer and Communications …, 2018
422018
High-performance ASIC implementations of the 128-bit block cipher CLEFIA
T Sugawara, N Homma, T Aoki, A Satoh
2008 IEEE International Symposium on Circuits and Systems (ISCAS), 2925-2928, 2008
352008
Spectrum analysis on cryptographic modules to counteract side-channel attacks
T Sugawara, Y Hayashi, N Homma, T Mizuki, T Aoki, H Sone, A Satoh
EMC 9, 21-24, 2009
342009
Lightweight authenticated encryption mode suitable for threshold implementation
Y Naito, Y Sasaki, T Sugawara
Advances in Cryptology–EUROCRYPT 2020 12106, 705, 2020
332020
The system can't perform the operation now. Try again later.
Articles 1–20