研究成果

著書(分担執筆)

  1. 崎山一男 著,菅原健 著,李陽 著, “暗号ハードウェアのセキュリティ,” ISBN 978-4-339-02894-2, コロナ社, 174pages, (May., 2019).
  2. Kazuo Sakiyama, Yu Sasaki, and Yang Li, “Security of Block Ciphers: From Algorithm Design to Hardware Implementation,” ISBN 978-1-118-66001-0, Wiley, (Jul., 2015).
  3. Junko Takahashi, Toshinori Fukunaga, Shigeto Gomisawa, Yang Li, Kazuo Sakiyama, and Kazuo Ohta, “Fault Injection and Key Retrieval Experiments on Evaluation Board,” Chapter in Marc Joye and Michael Tunstall editors, Fault Analysis in Cryptography, ISBN 978-3-642-29656-7, Springer, pp.313-331 (Jul., 2012).

学術論文(査読あり)

  1. Daisuke Fujimoto, Takumi Okamoto, Yang Li, Youngwoo Kim and Yuichi Hayashi, ”Evaluation of Statistical Fault Analysis using Input Timing Violation of Sequential Circuit on Cryptographic Module under IEM” Transactions on Electromagnetic Compatibility, 7 pages, accepted.
  2. Go Takatoi, Takeshi Sugawara, Kazuo Sakiyama, Yuko Hara-Azumi, and Yang Li, “The Limits of Timing Analysis and SEMA on Distinguishing Similar Activation Functions of Embedded Deep Neural Networks,” Appl. Sci. 2022, 12(9), 4135, (2022).
  3. Go TAKAMI, Takeshi SUGAWARA, Kazuo SAKIYAMA, Yang LI, Mixture-Based 5-Round Physical Attack against AES: Attack Proposal and Noise Evaluation, IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences, 2022, E105.A 巻, 3 号, p. 289-299, 公開日 2022/03/01, [早期公開] 公開日 2021/09/30, Online ISSN 1745-1337, Print ISSN 0916-8508, https://doi.org/10.1587/transfun.2021CIP0016.
  4. 羽田野凌太, 平田 遼, 松田航平, 三浦典之, 李陽, 崎山一男, “LFI検知回路に対するサイドチャネル攻撃耐性評価,” 電子情報通信学会論文誌(A), Vol. J104-A, No.5, pp.118-126, (2021).
  5. Kohei Matsuda, Sho Tada, Makoto Nagata, Yuichi Komano, Yang Li, Takeshi Sugawara, Mitsugu Iwamoto, Kazuo Ohta, Kazuo Sakiyama, Noriyuki Miura, “An IC-level countermeasure against laser fault injection attack by information leakage sensing based on laser-induced opto-electric bulk current density,” J. Appl. Phys. 59, SGGL02, 12pages, 2020.
  6. Akiko Toh, Yang Li, Kazuo Sakiyama, Takeshi Sugawara, “Fingerprinting Light Emitting Diodes Using Spectrometer,” IET Electronics Letters, Vol.55, Issue 24, pp.1295–1297, 2019.
  7. Takeshi Sugawara, Yang Li, and Kazuo Sakiyama, “Probing Attack of Share-Serial Threshold Implementation of AES,” IET Electronics Letters, Vol.55, Issue 9, pp.517-519, May, 2019.
  8. Jingyi Feng, Hua Chen, Yang Li, Zhipeng Jiao, Wei Xi, “A Framework for Evaluation and Analysis on Infection Countermeasures Against Fault Attacks,” IEEE Transactions on Information Forensics and Security, 2020/15, pp. 391-406, 2019.
  9. Yang Li, Momoka Kasuya, and Kazuo Sakiyama, “Comprehensive Evaluation on an ID-Based Side-Channel Authentication with FPGA-Based AES,” Appl. Sci. 2018, 8(10), 1898, (Oct., 2018).
  10. Ruyan Wang, Xiaohan Meng, Yang Li, Jian Wang, “Towards Optimized DFA Attacks on AES under Multibyte Random Fault Model,” Security and Communication Networks 2018, 2870475, 1-9, Aug. 2018.
  11. Sen Xu, Xiangjun Lu, Kaiyu Zhang, Yang Li, Lei Wang, Weijia Wang, Haihua Gu, Zheng Guo, Junrong Liu, and Dawu Gu, “Similar Operation Template Attack on RSA-CRT as a Case Study” Science China Information Sciences, 61/ 32111, 1-17, 2018/03
  12. Yang Li, Mengting Chen, and Jian Wang, “Another Security Evaluation of SPA Countermeasures for AES Key Expansion in IoT devices” Journal of Information Science & Engineering, 33/ 4, 1085-1100, 2017/07
  13. Yang Li, Mengting Chen, Zhe Liu, and Jian Wang, “Reduction of Fault Injection Times for Blind Fault Attack on SPN Block Ciphers” ACM Transactions on Embedded Computing Systems, TECS, 16/ 2, 1-20, 2017/04
  14. Shugo Mikami, Dai Watanabe, Yang Li, and Kazuo Sakiyama, “Fully Integrated Passive UHF RFID Tag for Hash-Based Mutual Authentication Protocol,” The Scientific World Journal, Hindawi, Volume 2015 (2015), Article ID 498610, 11 pages, (Aug., 2015).
  15. Sho Endo, Yang Li, Naofumi Homma, Kazuo Sakiyama, Kazuo Ohta, Daisuke Fujimoto, Makoto Nagata, Toshihiro Katashita, Jean-Luc Danger, and Takafumi Aoki, “A Silicon-level Countermeasure against Fault Sensitivity Analysis and Its Evaluation,” IEEE Trans. Very Large Scale Integr. (VLSI) Syst., Vol.23, No.8, pp.1429-1438, (Aug., 2015).
  16. 中曽根俊貴, 李陽, 岩本貢, 太田和夫, 崎山一男, “クロック間衝突を漏洩モデルとする新たなサイドチャネル解析と並列実装AES暗号ハードウェアにおける弱い鍵,” 電子情報通信学会論文誌(A), Vol.J97-A, No.11, pp.695-703, (Nov., 2014).
  17. Christophe Clavier, Jean-Luc Danger, Guillaume Duc, M. Abdelaziz Elaabid, Benoît Gérard, Sylvain Guilley, Annelie Heuser, Michael Kasper, Yang Li, Victor Lomné, Daisuke Nakatsu, Kazuo Ohta, Kazuo Sakiyama, Laurent Sauvage, Werner Schindler, Marc Stöttinger, Nicolas Veyrat-Charvillon, Matthieu Walle, Antoine Wurcker, “Practical improvements of side-channel attacks on AES: feedback from the 2nd DPA contest,” J. Cryptographic Engineering, Vol.4(1), pp.1-16, (Apr., 2014).
  18. Kazuo Sakiyama, Yang Li, Shigeto Gomisawa, Yu-ichi Hayashi, Mitsugu Iwamoto, Naofumi Homma, Takafumi Aoki, and Kazuo Ohta, “Practical DFA Strategy for AES Under Limited-Access Conditions,” Journal of Information Processing, Vol.55, No.2, (Feb., 2014).
  19. Yang Li, Kazuo Ohta, and Kazuo Sakiyama, “A New Type of Fault-Based Attack: Fault Behavior Analysis,” IEICE Trans. Fundam. Electron. Commun. Comput. Sci., Vol.E96-A, No.1, pp.177-184, (Jan., 2013).
  20. 小池彩歌, 李陽, 中津大介, 太田和夫, 崎山一男, “複数の要因に対する新たな故障感度解析,” 電子情報通信学会論文誌(A), Vol.J95-A, No.10, pp.751-755, (Oct., 2012).
  21. Kazuo Sakiyama, Yang Li, Mitsugu Iwamoto, and Kazuo Ohta, “Information-Theoretic Approach to Optimal Differential Fault Analysis,” IEEE Trans. Inf. Forensic Secur., Vol.7, No.1, pp.109-120, (Feb., 2012).
  22. Yang Li, Kazuo Ohta, and Kazuo Sakiyama, “New Fault-Based Side-Channel Attack Using Fault Sensitivity,” IEEE Trans. Inf. Forensic Secur., Vol.7, No.1, pp.88-97, (Feb., 2012).
  23. Yang Li, Kazuo Ohta, and Kazuo Sakiyama, “Toward Effective Countermeasures Against an Improved Fault Sensitivity Analysis,” IEICE Trans. Fundam. Electron. Commun. Comput. Sci., Vol.A95-A, No.1, pp.234-241, (Jan., 2012).
  24. Yang Li, Kazuo Sakiyama, Shinichi Kawamura, and Kazuo Ohta, “Power Analysis against a DPA-resistant S-box Implementation Based on the Fourier Transform,” IEICE Trans. Fundam. Electron. Commun. Comput. Sci., Vol.A94-A, No.1, pp.191-199, (Jan., 2011).

国際会議プロシーディングス等(査読あり)

  1. Tomoaki Kitahara, Ryota Hira, Yuko Hara-Azumi, Daiki Miyahara, Yang Li, and Kazuo Sakiyama, “Optimized Software Implementations of Ascon, Grain-128AEAD, and TinyJambu on ARM Cortex-M,” In Proc. International Symposium on Computing and Networking, CANDAR Workshops (CANDARW’22), IEEE, pp.XXX-YYY, (Nov., 2022).
  2. Saya Inagaki, Mingyu Yang, Yang Li, Kazuo Sakiyama, and Yuko Hara-Azumi, “Examining Vulnerability of HLS-designed Chaskey-12 Circuits to Power Side-Channel Attacks,” International Symposium on Quality Electronic Design (ISQED’22), IEEE, pp.XXX-YYY, (Apr., 2022).
  3. R. Kudo, T. Sugawara, K. Sakiyama, Y. Hara-Azumi and Y. Li, “Revisiting System Noise in Side-Channel Attacks: Mutual Assistant SCA vs. Genetic Algorithm,” 2021 Asian Hardware Oriented Security and Trust Symposium (AsianHOST), 2021, pp. 1-6, doi: 10.1109/AsianHOST53231.2021.9699725.
  4. Tomoki Uemura, Yohei Watanabe, Yang Li, Noriyuki Miura, Iwamoto Mitsugu, Kazuo Sakiyama, Kazuo Ohta, “A Key Recovery Algorithm Using Random Key Leakage from AES Key Schedule, ” The International Symposium on Information Theory and Its Applications (ISITA2020), 2020, to appear.
  5. Go Takatoi, Takeshi Sugawara, Kazuo Sakiyama, and Yang Li, “Simple Electromagnetic Analysis Against Activation Functions of Deep Neural Networks,” In Proc. Artificial Intelligence in Hardware Security (AIHWS’20), LNCS 12418, pp. 181-197, Springer, Cham. (Oct., 2020).
  6. Tsubasa Takaki, Yang Li, Kazuo Sakiyama, Shoei Nashimoto, Daisuke Suzuki, and Takeshi Sugawara, “An Optimized Implementation of AES-GCM for FPGA Acceleration Using High-Level Synthesis,” In Proc. Global Conference on Consumer Electronics (GCCE’20), IEEE, pp. pp.176-180, (Oct., 2020).
  7. T. Sugawara, T. Onuma, and Y. Li, “Signal Injection Attack on Time-to-Digital Converter and Its Application to Physically Unclonable Function,” The 15th International Workshop on Security (IWSEC 2020), 2020, eprint.
  8. Yang Li, Ryota Hatano, Sho Tada, Kohei Matsuda, Noriyuki Miura, Takeshi Sugawara, and Kazuo Sakiyama, “Side-Channel Leakage of Alarm Signal for a Bulk-Current-Based Laser Sensor,” In Proc. International Conference on Information Security and Cryptology (Inscrypt’19), LNCS 12020, Springer-Verlag. (Dec., 2019).
  9. Kohei Matsuda, Sho Tada, Makoto Nagata, Yang Li, Takeshi Sugawara, Mitsugu Iwamoto, Kazuo Ohta, Kazuo Sakiyama, and Noriyuki Miura, “An Information Leakage Sensor Based on Measurement of Laser-Induced Opto-Electric Bulk Current Density,” In Extended Abstracts of International Conference on Solid State Devices and Materials (SSDM’19), M-1-03, pp. 501-502, (Sep., 2019).
  10. Muhammad Salman, Yang Li, Jian Wang, “A Graphical PIN Entry System with Shoulder Surfing Resistance”, 2019 IEEE 4th International Conference on Signal and Image Processing, pp. 203-207, 2019/07
  11. Zhiwei Yuan, Yang Li, Kazuo Sakiyama, Takeshi Sugawara, and Jian Wang, “Recovering Memory Access Sequence with Differential Flush+Reload Attack,” In Proc. International Conference on Information Security Practice and Experience (ISPEC’18), LNCS 11125, Springer-Verlag, pp.424-439, (Sep., 2018).
  12. Ruyan Wang, Xiaohan Meng, Yang Li, Jian Wang, “Improved Differential Fault Analysis on Authenticated Encryption of PAEQ-128”, International Conferences on Information Security and Cryptology 2018 (Inscript’18), pp. 183-199, 2018/12
  13. Yang Li, Shuang Wang, Zhibin Wang, and Jian Wang, “A Strict Key Enumeration Algorithm for Dependent Score Lists of Side-Channel Attacks” In Proc. 16th Smart Card Research and Advanced Application Conference, (Cardis’17), Springer, pp. 51-69, 2018/01
  14. Shuang Wang, Yang Li, and Jian Wang, “A New Key Rank Estimation Method to Investigate Dependent Key Lists of Side Channel Attacks” In Proc. Asian Hardware Oriented Security and Trust Symposium (AsianHOST’17), IEEE pp. 1-6, 2017/10
  15. Yang Li, Mengting Chen, and Jian Wang, “Introduction to side-channel attacks and fault attacks”, In Proc. Electromagnetic Compatibility 2016 Asia-Pacific International Symposium (APEMC’16), IEEE, pp.573-575, 2016/09
  16. Mengting Chen, Yang Li, and Jian Wang, “Another SPA Key Recovery Against Random Order Countermeasures for AES Key Expansion”, In Proc. International Conference on Cloud Computing and Security (ICCCS’16) Springer, pp. 322-334, 2016/06
  17. Yang Li, Shugo Mikami, Dai Watanabe, Kazuo Ohta, and Kazuo Sakiyama, “Single-Chip Implementation and Evaluation of Passive UHF RFID Tag with Hash-Based Mutual Authentication,” In Proc. Workshop on RFID Security (RFIDsec’14 Asia), IOS Press, pp.3-15, (Nov., 2014).
  18. Yang Li, Toshiki Nakasone, and Kazuo Sakiyama, “Software and Hardware Co-Verification for Privacy-Enhanced Passive UHF RFID Tags,” In Proc. 2014 IEEE International Symposium on Electromagnetic Compatibility (EMC’14), IEEE, pp.752-757 (Aug., 2014).
  19. Yang Li, Toshiki Nakasone, Kazuo Ohta, Kazuo Sakiyama, “Privacy-Mode Switching: Toward Flexible Privacy Protection for RFID Tags in Internet of Things,” In Proc. The 11th Annual IEEE Consumer Communications & Networking Conference (CCNC’14), IEEE, pp.519-520, (Jan., 2014).
  20. Yang Li, Yu-ichi Hayashi, Arisa Matsubara, Naofumi Homma, Takafumi Aoki, Kazuo Ohta and Kazuo Sakiyama, “Yet Another Fault-Based Leakage in Non-Uniform Faulty Ciphertexts,” In Proc. The Sixth International Symposium on Foundations & Practice of Security (FPS’13), LNCS 8352, pp.272-287, Springer-Verlag, (Oct., 2013).
  21. Toshiki Nakasone, Kazuo Sakiyama, Yang Li, and Kazuo Ohta, “Exploration of the CC-EMA Attack Towards Efficient Evaluation of EM Information Leakage,” In Proc. International Symposium on Electromagnetic Compatibility (EMC EUROPE) 2013, IEEE, pp.411-414, (Sep., 2013).
  22. Yu Sasaki, Yang Li, Hikaru Sakamoto and Kazuo Sakiyama, “Coupon Collector’s Problem for Fault Analysis — High Tolerance for Noisy Fault Injections,” In Proc. Financial Cryptography and Data Security 2013 (FC’13), LNCS 7859, Springer-Verlag, pp.213-220 (Apr., 2013).
  23. Yang Li, Sho Endo, Nicolas Debande, Naofumi Homma, Takafumi Aoki, Thanh-Ha Le, Jean-Luc Danger, Kazuo Ohta, Kazuo Sakiyama, “Exploring the Relations Between Fault Sensitivity and Power Consumption,” In Proc. Constructive Side-Channel Analysis and Secure Design (COSADE’13), LNCS 7864, Springer-Verlag, pp.137-153 (Mar., 2013).
  24. Yang Li, Kazuo Ohta, and Kazuo Sakiyama, “An Extension of Fault Sensitivity Analysis Based on Clockwise Collision,” In Proc. International Conferences on Information Security and Cryptology 2012 (Inscript’12), LNCS 7763, Springer-Verlag, pp.46-59, (Nov., 2012).
  25. Toshiki Nakasone, Yang Li, Yu Sasaki, Mitsugu Iwamoto, Kazuo Ohta, and Kazuo Sakiyama, “Key-Dependent Weakness of AES-Based Ciphers Under Clockwise Collision Distinguisher,” In Proc. International Conference on Information Security and Cryptology 2012 (ICISC’12), LNCS 7839, Springer-Verlag, pp.395-409, (Nov., 2012).
  26. Sho Endo, Yang Li, Naofumi Homma, Kazuo Sakiyama, Kazuo Ohta and Takafumi Aoki, “An Efficient Countermeasure against Fault Sensitivity Analysis Using Configurable Delay Blocks,” In Proc. Workshop on Fault Diagnosis and Tolerance in Cryptography (FDTC’12), IEEE, pp.95-102, (Sep., 2012).
  27. Yu-ichi Hayashi, Shigeto Gomisawa, Yang Li, Naofumi Homma, Kazuo Sakiyama, Takafumi Aoki, and Kazuo Ohta, “Intentional Electromagnetic Interference for Fault Analysis on AES Block Cipher IC,” In Proc. International Workshop on Electromagnetic Compatibility of Integrated Circuits (EMCCOMPO’11), IEEE, pp.235-240, (Nov., 2011).
  28. Amir Moradi, Oliver Mischke, Christof Paar, Yang Li, Kazuo Ohta, Kazuo Sakiyama, “On the Power of Fault Sensitivity Analysis and Collision Side-Channel Attack in a Combined Setting,” In Proc. Workshop on Cryptographic Hardware and Embedded Systems (CHES’11), LNCS 6917, Springer-Verlag, pp.292-311, (Sep., 2011).
  29. Hikaru Sakamoto, Yang Li, Kazuo Ohta, and Kazuo Sakiyama, “Fault Sensitivity Analysis Against Elliptic Curve Cryptosystems,” In Proc. Workshop on Fault Diagnosis and Tolerance in Cryptography (FDTC’11), IEEE, pp.11-20, (Sep., 2011).
  30. Yang Li, Kazuo Ohta, and Kazuo Sakiyama, “Revisit Fault Sensitivity Analysis on WDDL-AES,” In Proc. International Symposium on Hardware-Oriented Security and Trust (HOST’11), IEEE, pp.148-153, (Jun., 2011).
  31. Yu Sasaki, Yang Li, Lei Wang, Kazuo Sakiyama, and Kazuo Ohta, “Non-Full-Active Super-Sbox Analysis: Applications to ECHO and Grøstl,” In Proc. Advances in Cryptology — ASIACRYPT’10, LNCS 6477, Springer-Verlag, pp.38-55, (Dec., 2010).
  32. Daisuke Nakatsu, Yang Li, Kazuo Sakiyama, and Kazuo Ohta, “Combination of SW Countermeasure and CPU Modification on FPGA Against Power Analysis,” In Proc. International Workshop on Information Security Applications (WISA’10), LNCS 6513, Springer-Verlag, pp.258-272, (Aug., 2010).
  33. Yang Li, Kazuo Sakiyama, Shigeto Gomisawa, Toshinori Fukunaga, Junko Takahashi, and Kazuo Ohta, “Fault Sensitivity Analysis,” In Proc. Workshop on Cryptographic Hardware and Embedded Systems (CHES’10), LNCS 6225, Springer-Verlag, pp.320-334, (Aug., 2010).
  34. Yang Li, Kazuo Sakiyama, Lejla Batina, Daisuke Nakatsu, and Kazuo Ohta, “Power Variance Analysis Breaks a Masked ASIC Implementations of AES,” In Proc. Design, Automation and Test in Europe (DATE’10), ACM, pp.1059-1064, (Mar., 2010).
  35. Yang Li, Kazuo Sakiyama, Shinichi Kawamura, Yuichi Komano, and Kazuo Ohta, “Security Evaluation of a DPA-resistant S-box Based on the Fourier Transform,” In Proc. International Conference on Information and Communications Security (ICICS’09), LNCS 5927, Springer-Verlag, pp.3-16, (Dec., 2009).

Cryptology ePrint Archive

  1. Yang Li, Daisuke Nakatsu, Qi Li, Kazuo Ohta, and Kazuo Sakiyama, “Clockwise Collision Analysis — Overlooked Side-Channel Leakage Inside Your Measurements,” Cryptology ePrint Archive, Report 2011/579, 2011.
  2. Shigeto Gomisawa, Yang Li, Junko Takahashi, Toshinori Fukunaga, Yu Sasaki, Kazuo Sakiyama, and Kazuo Ohta, “Efficient Differential Fault Analysis for AES,” Cryptology ePrint Archive, Report 2010/336, 2010.
  3. Yang Li, Shigeto Gomisawa, Kazuo Sakiyama, and Kazuo Ohta, “An Information Theoretic Perspective on the Differential Fault Analysis against AES,” Cryptology ePrint Archive, Report 2010/032, 2010.
  4. その他の発表

学会口頭発表(上記以外のもの, 査読なし)

  1. 李 陽, 崎山一男, “Single-Chip Implementation and Evaluation of Passive UHF RFID Tag with Hash-Based Mutual Authentication,” Hot Channel Workshop 2014, (2014年10月7日).
  2. 李 陽, 三上修吾, 渡辺 大, 太田和夫, 崎山一男, “RFIDシステムにおけるリレー攻撃対策,” Hot Channel Workshop 2014, (2014年4月23日).
  3. 李 陽, 崎山一男, “Single-Chip Implementation and Evaluation of A Privacy-Enhanced RFID Tag,” Hot Channel Workshop 2014, (2014年4月22日).
  4. 李 陽, 崎山一男, “Introduction to IAIK Demotag and Related Experiments on It,” Hot Channel Workshop 2013, (2013年11月25日).
  5. 松原有沙, 李 陽, 太田和夫, 崎山一男, “NU-FVAに基づく新たな鍵復元攻撃について,” Hot Channel Workshop 2013, (2013年4月11日).
  6. 李 陽, 中曽根俊貴, 崎山一男, “Toward Practically Secure and Flexible RFID Tags,” Hot Channel Workshop 2013, (2013年4月12日).

講演・チュートリアル・パネルディスカッション等

  1. Yang Li, Kazuo Sakiyama, “Review Fault Attacks on ECC Implementations with Fault Sensitivity Analysis,” A-SSCC 2015 レビュー講演, IEEE SSCS Japan/Kansai Chapter Technical Seminar, (2016年1月13日).
  2. Yang Li, Kazuo Sakiyama, “Review Fault Attacks on ECC Implementations with Fault Sensitivity Analysis,” IEEE Asian Solid-State Circuits Conference 2015, (A-SSCC’15), (Nov., 10th, 2015).
  3. 李 陽, 崎山一男, “Two Topics in Cryptographic Hardware: Coupon DFA and Secure RFID,” Compview暗号理論ワークショップ2013, (2013年2月21日).
  4. 崎山一男, 李 陽, ”故障感度解析の可能性,” Hot Channel Workshop 2012, (2012年9月5日).
  5. Kazuo Sakiyama, “A New Fault Analysis Attack (joint work with Yang Li and Kazuo Ohta),” 2010 Japan-Taiwan Joint Research Symposium on Cryptography and Next IT-society, (Nov., 16th, 2010).
  6. Kazuo Sakiyama, “Cryptanalysis and Side-channel Analysis – Approach to Optimal Differential Fault Analysis (joint work with Yang Li and Kazuo Ohta),” Forum Math-for-Industry 2010, (Oct., 22nd, 2010).