Get my own profile
Public access
View all20 articles
5 articles
available
not available
Based on funding mandates
Co-authors
Kazuo OhtaProfessor, The University of Electro-CommunicationsVerified email at uec.ac.jp
Ingrid VerbauwhedeKU LeuvenVerified email at esat.kuleuven.be
Yang LINanjing University of Aeronautics and AstronauticsVerified email at uec.ac.jp
Lejla Batina,Professor, applied cryptography and embedded systems security, Radboud University, The NetherlandsVerified email at cs.ru.nl
Mitsugu IwamotoThe University of Electro-CommunicationsVerified email at uec.ac.jp
Bart PreneelProfessor, KU LeuvenVerified email at esat.kuleuven.be
Takeshi SugawaraThe University of Electro-CommunicationsVerified email at uec.ac.jp
Noriyuki MiuraOsaka UniversityVerified email at ist.osaka-u.ac.jp
Naofumi HommaTohoku UniversityVerified email at riec.tohoku.ac.jp
Yu-ichi HAYASHINara Institute of Science and TechnologyVerified email at is.naist.jp
Nele MentensLeiden University and KU LeuvenVerified email at esat.kuleuven.be
Junfeng FanOpen Security ResearchVerified email at opsefy.com
Jean-Luc DangerLTCI, Télécom Paris, Institut Polytechnique de ParisVerified email at enst.fr
Patrick SchaumontWorcester Polytechnic InstituteVerified email at wpi.edu
Kohei MatsudaKobe UniversityVerified email at cs26.scitec.kobe-u.ac.jp
Shin'ichiro MatsuoResearch Professor of Computer Science, Georgetown UniversityVerified email at georgetown.edu
Miroslav KnezevicNXP SemiconductorsVerified email at nxp.com
Yuko HaraInstitute of Science TokyoVerified email at cad.ict.e.titech.ac.jp
Daiki MiyaharaThe University of Electro-CommunicationsVerified email at uec.ac.jp
Yuichi KomanoChiba Institute of TechnologyVerified email at ruri.waseda.jp