Search the dblp DataBase
Katsuyuki Okeya :
[Publications ]
[Author Rank by year ]
[Co-authors ]
[Prefers ]
[Cites ]
[Cited by ]
Publications of Author
Katsuyuki Okeya Side Channel Attacks Against HMACs Based on Block-Cipher Based Hash Functions. [Citation Graph (0, 0)][DBLP ] ACISP, 2006, pp:432-443 [Conf ] Katsuyuki Okeya , Kouichi Sakurai On Insecurity of the Side Channel Attack Countermeasure Using Addition-Subtraction Chains under Distinguishability between Addition and Doubling. [Citation Graph (0, 0)][DBLP ] ACISP, 2002, pp:420-435 [Conf ] Katsuyuki Okeya , Tsuyoshi Takagi , Camille Vuillaume On the Exact Flexibility of the Flexible Countermeasure Against Side Channel Attacks. [Citation Graph (0, 0)][DBLP ] ACISP, 2004, pp:466-477 [Conf ] Katsuyuki Okeya , Tsuyoshi Takagi , Camille Vuillaume Efficient Representations on Koblitz Curves with Resistance to Side Channel Attacks. [Citation Graph (0, 0)][DBLP ] ACISP, 2005, pp:218-229 [Conf ] Katsuyuki Okeya , Tsuyoshi Takagi Security Analysis of CRT-Based Cryptosystems. [Citation Graph (0, 0)][DBLP ] ACNS, 2004, pp:383-397 [Conf ] Dong-Guk Han , Katsuyuki Okeya , Tae-Hyun Kim , Yoon Sung Hwang , Young-Ho Park , Souhwan Jung Cryptanalysis of the Countermeasures Using Randomized Binary Signed Digits. [Citation Graph (0, 0)][DBLP ] ACNS, 2004, pp:398-413 [Conf ] Camille Vuillaume , Katsuyuki Okeya Flexible Exponentiation with Resistance to Side Channel Attacks. [Citation Graph (0, 0)][DBLP ] ACNS, 2006, pp:268-283 [Conf ] Tae-Hyun Kim , Dong-Guk Han , Katsuyuki Okeya , Jongin Lim Generic Cryptanalysis of Combined Countermeasures with Randomized BSD Representations. [Citation Graph (0, 0)][DBLP ] CARDIS, 2006, pp:119-134 [Conf ] Katsuyuki Okeya , Kouichi Sakurai Efficient Elliptic Curve Cryptosystems from a Scalar Multiplication Algorithm with Recovery of the y-Coordinate on a Montgomery-Form Elliptic Curve. [Citation Graph (0, 0)][DBLP ] CHES, 2001, pp:126-141 [Conf ] Katsuyuki Okeya , Kouichi Sakurai Fast Multi-scalar Multiplication Methods on Elliptic Curves with Precomputation Strategy Using Montgomery Trick. [Citation Graph (0, 0)][DBLP ] CHES, 2002, pp:564-578 [Conf ] Katsuyuki Okeya , Tsuyoshi Takagi A More Flexible Countermeasure against Side Channel Attacks Using Window Method. [Citation Graph (0, 0)][DBLP ] CHES, 2003, pp:397-410 [Conf ] Katsuyuki Okeya , Tsuyoshi Takagi , Camille Vuillaume Short Memory Scalar Multiplication on Koblitz Curves. [Citation Graph (0, 0)][DBLP ] CHES, 2005, pp:91-105 [Conf ] Katsuyuki Okeya , Katja Schmidt-Samoa , Christian Spahn , Tsuyoshi Takagi Signed Binary Representations Revisited. [Citation Graph (0, 0)][DBLP ] CRYPTO, 2004, pp:123-139 [Conf ] Katsuyuki Okeya , Tsuyoshi Takagi The Width-w NAF Method Provides Small Memory and Fast Elliptic Scalar Multiplications Secure against Side Channel Attacks. [Citation Graph (0, 0)][DBLP ] CT-RSA, 2003, pp:328-342 [Conf ] Erik Dahmen , Katsuyuki Okeya , Tsuyoshi Takagi An Advanced Method for Joint Scalar Multiplications on Memory Constraint Devices. [Citation Graph (0, 0)][DBLP ] ESAS, 2005, pp:189-204 [Conf ] Katsuyuki Okeya , Tetsu Iwata Side Channel Attacks on Message Authentication Codes. [Citation Graph (0, 0)][DBLP ] ESAS, 2005, pp:205-217 [Conf ] Katsuyuki Okeya , Kunihiko Miyazaki , Kouichi Sakurai A Fast Scalar Multiplication Method with Randomized Projective Coordinates on a Montgomery-Form Elliptic Curve Secure against Side Channel Attacks. [Citation Graph (0, 0)][DBLP ] ICISC, 2001, pp:428-439 [Conf ] Katsuyuki Okeya , Dong-Guk Han Side Channel Attack on Ha-Moon's Countermeasure of Randomized Signed Scalar Multiplication. [Citation Graph (0, 0)][DBLP ] INDOCRYPT, 2003, pp:334-348 [Conf ] Katsuyuki Okeya , Kouichi Sakurai Power Analysis Breaks Elliptic Curve Cryptosystems even Secure against the Timing Attack. [Citation Graph (0, 0)][DBLP ] INDOCRYPT, 2000, pp:178-190 [Conf ] Katsuyuki Okeya , Kouichi Sakurai A Second-Order DPA Attack Breaks a Window-Method Based Countermeasure against Side Channel Attacks. [Citation Graph (0, 0)][DBLP ] ISC, 2002, pp:389-401 [Conf ] Katsuyuki Okeya , Tsuyoshi Takagi , Camille Vuillaume On the Importance of Protecting Delta in SFLASH against Side Channel Attacks. [Citation Graph (0, 0)][DBLP ] ITCC (2), 2004, pp:560-568 [Conf ] Katsuyuki Okeya , Hiroyuki Kurumatani , Kouichi Sakurai Elliptic Curves with the Montgomery-Form and Their Cryptographic Applications. [Citation Graph (0, 0)][DBLP ] Public Key Cryptography, 2000, pp:238-257 [Conf ] Katsuyuki Okeya , Tsuyoshi Takagi SCA-Resistant and Fast Elliptic Scalar Multiplication Based on wNAF. [Citation Graph (0, 0)][DBLP ] IEICE Transactions, 2004, v:87, n:1, pp:75-84 [Journal ] Katsuyuki Okeya , Tsuyoshi Takagi , Camille Vuillaume On the Importance of Protecting in SFLASH against Side Channel Attacks. [Citation Graph (0, 0)][DBLP ] IEICE Transactions, 2005, v:88, n:1, pp:123-131 [Journal ] Katsuyuki Okeya , Tsuyoshi Takagi Security analysis of CRT-based cryptosystems. [Citation Graph (0, 0)][DBLP ] Int. J. Inf. Sec., 2006, v:5, n:3, pp:177-185 [Journal ] Erik Dahmen , Katsuyuki Okeya , Daniel Schepers Affine Precomputation with Sole Inversion in Elliptic Curve Cryptography. [Citation Graph (0, 0)][DBLP ] ACISP, 2007, pp:245-258 [Conf ] Masayuki Yoshino , Katsuyuki Okeya , Camille Vuillaume Double-Size Bipartite Modular Multiplication. [Citation Graph (0, 0)][DBLP ] ACISP, 2007, pp:230-244 [Conf ] Johannes Buchmann , Erik Dahmen , Elena Klintsevich , Katsuyuki Okeya , Camille Vuillaume Merkle Signatures with Virtually Unlimited Signature Capacity. [Citation Graph (0, 0)][DBLP ] ACNS, 2007, pp:31-45 [Conf ] Hirotaka Yoshida , Dai Watanabe , Katsuyuki Okeya , Jun Kitahara , Hongjun Wu , Özgül Küçük , Bart Preneel MAME: A Compression Function with Reduced Hardware Requirements. [Citation Graph (0, 0)][DBLP ] CHES, 2007, pp:148-165 [Conf ] Masayuki Yoshino , Katsuyuki Okeya , Camille Vuillaume Unbridle the Bit-Length of a Crypto-coprocessor with Montgomery Multiplication. [Citation Graph (0, 0)][DBLP ] Selected Areas in Cryptography, 2006, pp:188-202 [Conf ] Skew Frobenius Map and Efficient Scalar Multiplication for Pairing-Based Cryptography. [Citation Graph (, )][DBLP ] A Black Hen Lays White Eggs. [Citation Graph (, )][DBLP ] Recursive Double-Size Modular Multiplications without Extra Cost for Their Quotients. [Citation Graph (, )][DBLP ] Side Channel Analysis of Some Hash Based MACs: A Response to SHA-3 Requirements. [Citation Graph (, )][DBLP ] An Update on the Side Channel Cryptanalysis of MACs Based on Cryptographic Hash Functions. [Citation Graph (, )][DBLP ] Width-3 Joint Sparse Form. [Citation Graph (, )][DBLP ] Public Key Authentication with Memory Tokens. [Citation Graph (, )][DBLP ] Digital Signatures Out of Second-Preimage Resistant Hash Functions. [Citation Graph (, )][DBLP ] Search in 0.005secs, Finished in 0.008secs