| Year | Rank | Type | Title / Venue / Authors |
|---|---|---|---|
| 2019 | J | jnl |
J. Inf. Process.
|
| 2018 | — | conf |
HOST
|
| 2018 | — | conf |
COMPSAC (2)
|
| 2018 | J | jnl |
IEICE Trans. Fundam. Electron. Commun. Comput. Sci.
|
| 2018 | J | jnl |
Int. J. Inf. Sec.
|
| 2018 | — | conf |
IIAI-AAI
|
| 2018 | — | conf |
NBiS
|
| 2017 | J | jnl |
J. Inf. Process.
|
| 2017 | J | jnl |
J. Cryptogr. Eng.
|
| 2016 | J | jnl |
IACR Cryptol. ePrint Arch.
|
| 2016 | C | conf |
ProvSec
|
| 2015 | J | jnl |
IEICE Trans. Fundam. Electron. Commun. Comput. Sci.
|
| 2015 | J | jnl |
IEICE Trans. Fundam. Electron. Commun. Comput. Sci.
|
| 2014 | — | conf |
COSADE
|
| 2013 | Misc | conf |
Highly Accurate Key Extraction Method for Access-Driven Cache Attacks Using Correlation Coefficient.
ACISP
|
| 2005 | — | conf |
SAINT Workshops
|
| 2003 | J | jnl |
Ann. des Télécommunications
|
| 2002 | — | conf |
ECSQ
|
| 2000 | — | conf |
ICPADS Workshops
|