Nozaki, Yusuke
285  results:
Search for persons X
?
1

Countermeasure using Physically Unclonable Function for Har..:

, In: 2024 10th International Conference on Applied System Innovation (ICASI),
 
?
2

Tamper Resistance Evaluation of Midori128 against Different..:

, In: 2023 IEEE 6th International Conference on Knowledge Innovation and Invention (ICKII),
 
?
3

Deep Learning Based Side-Channel Analysis for Lightweight C..:

, In: 2023 15th International Conference on Computer and Automation Engineering (ICCAE),
Nozaki, Yusuke ; Takemoto, Shu ; Ikezaki, Yoshiya. - p. 570-574 , 2023
 
?
4

Machine Learning Based Power Analysis for Simon with Secure..:

, In: 2023 15th International Conference on Computer and Automation Engineering (ICCAE),
 
?
5

Explainable AI based Adversarial Examples and its Evaluatio:

, In: Proceedings of the 2023 6th International Conference on Electronics, Communications and Control Engineering,
Kumagai, Ryo ; Takemoto, Shu ; Nozaki, Yusuke. - p. 220-225 , 2023
 
?
6

Hamming Weight aware Fault Analysis for Lightweight Cryptog..:

, In: Proceedings of the 2023 8th International Conference on Cloud Computing and Internet of Things,
 
?
7

Implementation and Evaluation of the Lightweight Cipher SPA..:

, In: Proceedings of the 2023 6th International Conference on Electronics, Communications and Control Engineering,
 
?
8

Generation Method of Error-Specific Adversarial Examples Us..:

, In: 2023 11th International Conference on Information and Education Technology (ICIET),
Kumagai, Ryo ; Takemoto, Shu ; Nozaki, Yusuke. - p. 557-561 , 2023
 
?
9

Security Evaluation of Glitch Based Authentication Function..:

, In: 2023 IEEE 12th Global Conference on Consumer Electronics (GCCE),
Nozaki, Yusuke ; Takemoto, Shu ; Ikezaki, Yoshiya. - p. 790-791 , 2023
 
?
10

Deep Learning Power Analysis for Midori128 with Hiding Coun..:

, In: 2022 IEEE 2nd International Conference on Electronic Technology, Communication and Information (ICETCI),
Takemoto, Shu ; Miwa, Shunsuke ; Ikezaki, Yoshiya.. - p. 291-294 , 2022
 
?
11

Invisible Trigger Based Backdoor Attack and Its Evaluation:

, In: 2022 6th International Conference on Imaging, Signal Processing and Communications (ICISPC),
 
?
 
?
13

Authenticated Encryption based Secure In-vehicle System aga..:

, In: 2022 IEEE 11th Global Conference on Consumer Electronics (GCCE),
 
?
14

Tweakable Cryptography-Based Physically Unclonable Function:

, In: 2022 7th International Conference on Information and Network Technologies (ICINT),
 
?
15

AI Hardware Oriented Trojan Detection Architecture:

, In: The 2022 5th International Conference on Electronics, Communications and Control Engineering,
 
1-15