Name
Playground
About
FAQ
GitHub
Playground
Shortest Path Finder
Community Detector
Connected Papers
Author Trending
Claudia Calabrese
Johannes Ellinger
Maria Concetta Palumbo
Stefan Pulov
Jesús Capitán
Jhonathan Pinzon
Giovanni Venturelli
Chen Ma
Radu Timofte
Kuanrui Yin
Home
/
Author
/
NOZAKI, Y.
Author Info
Open Visualization
Name
Affiliation
Papers
NOZAKI, Y.
Dept. of Inf. Eng., Meijo Univ., Nagoya, Japan|c|
34
Collaborators
Citations
PageRank
20
5
11.62
Referers
Referees
References
10
190
97
Search Limit
100
190
Publications (34 rows)
Collaborators (20 rows)
Referers (10 rows)
Referees (100 rows)
Title
Citations
PageRank
Year
Secret Sharing Schemes Based Secure Authentication for Physical Unclonable Function
0
0.34
2019
Side-Channel Resistance Evaluation Method using Statistical Tests for Physical Unclonable Function
0
0.34
2019
Side-Channel Analysis for Searchable Encryption System and its Security Evaluation
0
0.34
2019
Quantitative Performance Evaluation of PL PUF and RO PUF with ASIC Implementation.
0
0.34
2019
Security Evaluation of Ring Oscillator PUF Against Genetic Algorithm Based Modeling Attack.
0
0.34
2019
Scalability and Performance Evaluation of GA Based Modeling Analysis for RO PUF.
0
0.34
2019
Evaluation of the Hiding-Countermeasure PRINCE Using Differential Power Analysis.
0
0.34
2019
Feature Extraction Driven Modeling Attack Against Double Arbiter PUF and Its Evaluation
0
0.34
2018
Em Based Machine Learning Attack For Xor Arbiter Puf
1
0.40
2018
Security Evaluation of a Lightweight Cipher SPECK against Round Addition DFA
0
0.34
2018
Lightweight Cipher Aware Countermeasure Using Random Number Masks And Its Evaluation
0
0.34
2018
Shuffling Based Side-Channel Countermeasure for Energy Harvester.
0
0.34
2018
Feasibility Evaluation of Neural Network Physical Unclonable Function.
0
0.34
2018
Lethal Genes Aware Genetic Programming Analysis for RO PUF.
0
0.34
2018
Implementation Of Searchable Encryption System With Dedicated Hardware And Its Evaluation
0
0.34
2018
Power analysis for a lightweight authenticated encryption SIMON-JAMBU.
0
0.34
2017
Hierarchical power analysis attack for falsification detection cipher
0
0.34
2017
Electromagnetic analysis method for ultra low power cipher Midori
0
0.34
2017
Tamper resistance evaluation of PUF implementation against machine learning attack
0
0.34
2017
Helper Data Aware Cloning Method for Physical Unclonable Function
0
0.34
2017
Statistical fault analysis for a lightweight cipher midori
1
0.36
2017
FPGA implementation technique for power consumption aware tamper resistance accelerator of lightweight PUF.
0
0.34
2017
Hardware Trojan For An Authenticated Encryption Minalpher
0
0.34
2016
Deep Learning Attack For Physical Unclonable Function
0
0.34
2016
Multiple Rounds Aware Power Analysis Attack for a Lightweight Cipher SIMECK
0
0.34
2016
Vulnerability Evaluation Accelerator for Lightweight Ciphers
0
0.34
2016
Detection technique for hardware Trojans using machine learning in frequency domain
3
0.39
2015
Power analysis for clock fluctuation LSI
0
0.34
2015
Frequency Domain Aware Power Analysis Attack Against Random Clock Lsi For Secure Automotive Embedded Systems
0
0.34
2015
Hardware Trojan For Ultra Lightweight Block Cipher Piccolo
0
0.34
2015
Secure in-vehicle systems against Trojan attacks
0
0.34
2015
Statistical fault analysis for a lightweight block cipher TWINE
0
0.34
2015
Secure In-Vehicle Systems Using Authentication
0
0.34
2015
PUF ID generation method for modeling attacks
0
0.34
2014
1