The SCEAS System
| |||||||

## Search the dblp DataBase
Katsuyuki Okeya:
[Publications]
[Author Rank by year]
[Co-authors]
[Prefers]
[Cites]
[Cited by]
## Publications of Author- Katsuyuki Okeya
**Side Channel Attacks Against HMACs Based on Block-Cipher Based Hash Functions.**[Citation Graph (0, 0)][DBLP] ACISP, 2006, pp:432-443 [Conf] - Katsuyuki Okeya, Kouichi Sakurai
**On Insecurity of the Side Channel Attack Countermeasure Using Addition-Subtraction Chains under Distinguishability between Addition and Doubling.**[Citation Graph (0, 0)][DBLP] ACISP, 2002, pp:420-435 [Conf] - Katsuyuki Okeya, Tsuyoshi Takagi, Camille Vuillaume
**On the Exact Flexibility of the Flexible Countermeasure Against Side Channel Attacks.**[Citation Graph (0, 0)][DBLP] ACISP, 2004, pp:466-477 [Conf] - Katsuyuki Okeya, Tsuyoshi Takagi, Camille Vuillaume
**Efficient Representations on Koblitz Curves with Resistance to Side Channel Attacks.**[Citation Graph (0, 0)][DBLP] ACISP, 2005, pp:218-229 [Conf] - Katsuyuki Okeya, Tsuyoshi Takagi
**Security Analysis of CRT-Based Cryptosystems.**[Citation Graph (0, 0)][DBLP] ACNS, 2004, pp:383-397 [Conf] - Dong-Guk Han, Katsuyuki Okeya, Tae-Hyun Kim, Yoon Sung Hwang, Young-Ho Park, Souhwan Jung
**Cryptanalysis of the Countermeasures Using Randomized Binary Signed Digits.**[Citation Graph (0, 0)][DBLP] ACNS, 2004, pp:398-413 [Conf] - Camille Vuillaume, Katsuyuki Okeya
**Flexible Exponentiation with Resistance to Side Channel Attacks.**[Citation Graph (0, 0)][DBLP] ACNS, 2006, pp:268-283 [Conf] - Tae-Hyun Kim, Dong-Guk Han, Katsuyuki Okeya, Jongin Lim
**Generic Cryptanalysis of Combined Countermeasures with Randomized BSD Representations.**[Citation Graph (0, 0)][DBLP] CARDIS, 2006, pp:119-134 [Conf] - Katsuyuki Okeya, Kouichi Sakurai
**Efficient Elliptic Curve Cryptosystems from a Scalar Multiplication Algorithm with Recovery of the y-Coordinate on a Montgomery-Form Elliptic Curve.**[Citation Graph (0, 0)][DBLP] CHES, 2001, pp:126-141 [Conf] - Katsuyuki Okeya, Kouichi Sakurai
**Fast Multi-scalar Multiplication Methods on Elliptic Curves with Precomputation Strategy Using Montgomery Trick.**[Citation Graph (0, 0)][DBLP] CHES, 2002, pp:564-578 [Conf] - Katsuyuki Okeya, Tsuyoshi Takagi
**A More Flexible Countermeasure against Side Channel Attacks Using Window Method.**[Citation Graph (0, 0)][DBLP] CHES, 2003, pp:397-410 [Conf] - Katsuyuki Okeya, Tsuyoshi Takagi, Camille Vuillaume
**Short Memory Scalar Multiplication on Koblitz Curves.**[Citation Graph (0, 0)][DBLP] CHES, 2005, pp:91-105 [Conf] - Katsuyuki Okeya, Katja Schmidt-Samoa, Christian Spahn, Tsuyoshi Takagi
**Signed Binary Representations Revisited.**[Citation Graph (0, 0)][DBLP] CRYPTO, 2004, pp:123-139 [Conf] - Katsuyuki Okeya, Tsuyoshi Takagi
**The Width-w NAF Method Provides Small Memory and Fast Elliptic Scalar Multiplications Secure against Side Channel Attacks.**[Citation Graph (0, 0)][DBLP] CT-RSA, 2003, pp:328-342 [Conf] - Erik Dahmen, Katsuyuki Okeya, Tsuyoshi Takagi
**An Advanced Method for Joint Scalar Multiplications on Memory Constraint Devices.**[Citation Graph (0, 0)][DBLP] ESAS, 2005, pp:189-204 [Conf] - Katsuyuki Okeya, Tetsu Iwata
**Side Channel Attacks on Message Authentication Codes.**[Citation Graph (0, 0)][DBLP] ESAS, 2005, pp:205-217 [Conf] - Katsuyuki Okeya, Kunihiko Miyazaki, Kouichi Sakurai
**A Fast Scalar Multiplication Method with Randomized Projective Coordinates on a Montgomery-Form Elliptic Curve Secure against Side Channel Attacks.**[Citation Graph (0, 0)][DBLP] ICISC, 2001, pp:428-439 [Conf] - Katsuyuki Okeya, Dong-Guk Han
**Side Channel Attack on Ha-Moon's Countermeasure of Randomized Signed Scalar Multiplication.**[Citation Graph (0, 0)][DBLP] INDOCRYPT, 2003, pp:334-348 [Conf] - Katsuyuki Okeya, Kouichi Sakurai
**Power Analysis Breaks Elliptic Curve Cryptosystems even Secure against the Timing Attack.**[Citation Graph (0, 0)][DBLP] INDOCRYPT, 2000, pp:178-190 [Conf] - Katsuyuki Okeya, Kouichi Sakurai
**A Second-Order DPA Attack Breaks a Window-Method Based Countermeasure against Side Channel Attacks.**[Citation Graph (0, 0)][DBLP] ISC, 2002, pp:389-401 [Conf] - Katsuyuki Okeya, Tsuyoshi Takagi, Camille Vuillaume
**On the Importance of Protecting Delta in SFLASH against Side Channel Attacks.**[Citation Graph (0, 0)][DBLP] ITCC (2), 2004, pp:560-568 [Conf] - Katsuyuki Okeya, Hiroyuki Kurumatani, Kouichi Sakurai
**Elliptic Curves with the Montgomery-Form and Their Cryptographic Applications.**[Citation Graph (0, 0)][DBLP] Public Key Cryptography, 2000, pp:238-257 [Conf] - Katsuyuki Okeya, Tsuyoshi Takagi
**SCA-Resistant and Fast Elliptic Scalar Multiplication Based on wNAF.**[Citation Graph (0, 0)][DBLP] IEICE Transactions, 2004, v:87, n:1, pp:75-84 [Journal] - Katsuyuki Okeya, Tsuyoshi Takagi, Camille Vuillaume
**On the Importance of Protecting in SFLASH against Side Channel Attacks.**[Citation Graph (0, 0)][DBLP] IEICE Transactions, 2005, v:88, n:1, pp:123-131 [Journal] - Katsuyuki Okeya, Tsuyoshi Takagi
**Security analysis of CRT-based cryptosystems.**[Citation Graph (0, 0)][DBLP] Int. J. Inf. Sec., 2006, v:5, n:3, pp:177-185 [Journal] - Erik Dahmen, Katsuyuki Okeya, Daniel Schepers
**Affine Precomputation with Sole Inversion in Elliptic Curve Cryptography.**[Citation Graph (0, 0)][DBLP] ACISP, 2007, pp:245-258 [Conf] - Masayuki Yoshino, Katsuyuki Okeya, Camille Vuillaume
**Double-Size Bipartite Modular Multiplication.**[Citation Graph (0, 0)][DBLP] ACISP, 2007, pp:230-244 [Conf] - Johannes Buchmann, Erik Dahmen, Elena Klintsevich, Katsuyuki Okeya, Camille Vuillaume
**Merkle Signatures with Virtually Unlimited Signature Capacity.**[Citation Graph (0, 0)][DBLP] ACNS, 2007, pp:31-45 [Conf] - Hirotaka Yoshida, Dai Watanabe, Katsuyuki Okeya, Jun Kitahara, Hongjun Wu, Özgül Küçük, Bart Preneel
**MAME: A Compression Function with Reduced Hardware Requirements.**[Citation Graph (0, 0)][DBLP] CHES, 2007, pp:148-165 [Conf] - Masayuki Yoshino, Katsuyuki Okeya, Camille Vuillaume
**Unbridle the Bit-Length of a Crypto-coprocessor with Montgomery Multiplication.**[Citation Graph (0, 0)][DBLP] Selected Areas in Cryptography, 2006, pp:188-202 [Conf] **Skew Frobenius Map and Efficient Scalar Multiplication for Pairing-Based Cryptography.**[Citation Graph (, )][DBLP]**A Black Hen Lays White Eggs.**[Citation Graph (, )][DBLP]**Recursive Double-Size Modular Multiplications without Extra Cost for Their Quotients.**[Citation Graph (, )][DBLP]**Side Channel Analysis of Some Hash Based MACs: A Response to SHA-3 Requirements.**[Citation Graph (, )][DBLP]**An Update on the Side Channel Cryptanalysis of MACs Based on Cryptographic Hash Functions.**[Citation Graph (, )][DBLP]**Width-3 Joint Sparse Form.**[Citation Graph (, )][DBLP]**Public Key Authentication with Memory Tokens.**[Citation Graph (, )][DBLP]**Digital Signatures Out of Second-Preimage Resistant Hash Functions.**[Citation Graph (, )][DBLP]
Search in 0.005secs, Finished in 0.008secs | |||||||

| |||||||

| |||||||

System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002 for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002 |