The SCEAS System
Navigation Menu

Search the dblp DataBase

Title:
Author:

Katsuyuki Okeya: [Publications] [Author Rank by year] [Co-authors] [Prefers] [Cites] [Cited by]

Publications of Author

  1. Katsuyuki Okeya
    Side Channel Attacks Against HMACs Based on Block-Cipher Based Hash Functions. [Citation Graph (0, 0)][DBLP]
    ACISP, 2006, pp:432-443 [Conf]
  2. Katsuyuki Okeya, Kouichi Sakurai
    On Insecurity of the Side Channel Attack Countermeasure Using Addition-Subtraction Chains under Distinguishability between Addition and Doubling. [Citation Graph (0, 0)][DBLP]
    ACISP, 2002, pp:420-435 [Conf]
  3. Katsuyuki Okeya, Tsuyoshi Takagi, Camille Vuillaume
    On the Exact Flexibility of the Flexible Countermeasure Against Side Channel Attacks. [Citation Graph (0, 0)][DBLP]
    ACISP, 2004, pp:466-477 [Conf]
  4. Katsuyuki Okeya, Tsuyoshi Takagi, Camille Vuillaume
    Efficient Representations on Koblitz Curves with Resistance to Side Channel Attacks. [Citation Graph (0, 0)][DBLP]
    ACISP, 2005, pp:218-229 [Conf]
  5. Katsuyuki Okeya, Tsuyoshi Takagi
    Security Analysis of CRT-Based Cryptosystems. [Citation Graph (0, 0)][DBLP]
    ACNS, 2004, pp:383-397 [Conf]
  6. Dong-Guk Han, Katsuyuki Okeya, Tae-Hyun Kim, Yoon Sung Hwang, Young-Ho Park, Souhwan Jung
    Cryptanalysis of the Countermeasures Using Randomized Binary Signed Digits. [Citation Graph (0, 0)][DBLP]
    ACNS, 2004, pp:398-413 [Conf]
  7. Camille Vuillaume, Katsuyuki Okeya
    Flexible Exponentiation with Resistance to Side Channel Attacks. [Citation Graph (0, 0)][DBLP]
    ACNS, 2006, pp:268-283 [Conf]
  8. Tae-Hyun Kim, Dong-Guk Han, Katsuyuki Okeya, Jongin Lim
    Generic Cryptanalysis of Combined Countermeasures with Randomized BSD Representations. [Citation Graph (0, 0)][DBLP]
    CARDIS, 2006, pp:119-134 [Conf]
  9. Katsuyuki Okeya, Kouichi Sakurai
    Efficient Elliptic Curve Cryptosystems from a Scalar Multiplication Algorithm with Recovery of the y-Coordinate on a Montgomery-Form Elliptic Curve. [Citation Graph (0, 0)][DBLP]
    CHES, 2001, pp:126-141 [Conf]
  10. Katsuyuki Okeya, Kouichi Sakurai
    Fast Multi-scalar Multiplication Methods on Elliptic Curves with Precomputation Strategy Using Montgomery Trick. [Citation Graph (0, 0)][DBLP]
    CHES, 2002, pp:564-578 [Conf]
  11. Katsuyuki Okeya, Tsuyoshi Takagi
    A More Flexible Countermeasure against Side Channel Attacks Using Window Method. [Citation Graph (0, 0)][DBLP]
    CHES, 2003, pp:397-410 [Conf]
  12. Katsuyuki Okeya, Tsuyoshi Takagi, Camille Vuillaume
    Short Memory Scalar Multiplication on Koblitz Curves. [Citation Graph (0, 0)][DBLP]
    CHES, 2005, pp:91-105 [Conf]
  13. Katsuyuki Okeya, Katja Schmidt-Samoa, Christian Spahn, Tsuyoshi Takagi
    Signed Binary Representations Revisited. [Citation Graph (0, 0)][DBLP]
    CRYPTO, 2004, pp:123-139 [Conf]
  14. Katsuyuki Okeya, Tsuyoshi Takagi
    The Width-w NAF Method Provides Small Memory and Fast Elliptic Scalar Multiplications Secure against Side Channel Attacks. [Citation Graph (0, 0)][DBLP]
    CT-RSA, 2003, pp:328-342 [Conf]
  15. Erik Dahmen, Katsuyuki Okeya, Tsuyoshi Takagi
    An Advanced Method for Joint Scalar Multiplications on Memory Constraint Devices. [Citation Graph (0, 0)][DBLP]
    ESAS, 2005, pp:189-204 [Conf]
  16. Katsuyuki Okeya, Tetsu Iwata
    Side Channel Attacks on Message Authentication Codes. [Citation Graph (0, 0)][DBLP]
    ESAS, 2005, pp:205-217 [Conf]
  17. Katsuyuki Okeya, Kunihiko Miyazaki, Kouichi Sakurai
    A Fast Scalar Multiplication Method with Randomized Projective Coordinates on a Montgomery-Form Elliptic Curve Secure against Side Channel Attacks. [Citation Graph (0, 0)][DBLP]
    ICISC, 2001, pp:428-439 [Conf]
  18. Katsuyuki Okeya, Dong-Guk Han
    Side Channel Attack on Ha-Moon's Countermeasure of Randomized Signed Scalar Multiplication. [Citation Graph (0, 0)][DBLP]
    INDOCRYPT, 2003, pp:334-348 [Conf]
  19. Katsuyuki Okeya, Kouichi Sakurai
    Power Analysis Breaks Elliptic Curve Cryptosystems even Secure against the Timing Attack. [Citation Graph (0, 0)][DBLP]
    INDOCRYPT, 2000, pp:178-190 [Conf]
  20. Katsuyuki Okeya, Kouichi Sakurai
    A Second-Order DPA Attack Breaks a Window-Method Based Countermeasure against Side Channel Attacks. [Citation Graph (0, 0)][DBLP]
    ISC, 2002, pp:389-401 [Conf]
  21. Katsuyuki Okeya, Tsuyoshi Takagi, Camille Vuillaume
    On the Importance of Protecting Delta in SFLASH against Side Channel Attacks. [Citation Graph (0, 0)][DBLP]
    ITCC (2), 2004, pp:560-568 [Conf]
  22. Katsuyuki Okeya, Hiroyuki Kurumatani, Kouichi Sakurai
    Elliptic Curves with the Montgomery-Form and Their Cryptographic Applications. [Citation Graph (0, 0)][DBLP]
    Public Key Cryptography, 2000, pp:238-257 [Conf]
  23. Katsuyuki Okeya, Tsuyoshi Takagi
    SCA-Resistant and Fast Elliptic Scalar Multiplication Based on wNAF. [Citation Graph (0, 0)][DBLP]
    IEICE Transactions, 2004, v:87, n:1, pp:75-84 [Journal]
  24. Katsuyuki Okeya, Tsuyoshi Takagi, Camille Vuillaume
    On the Importance of Protecting in SFLASH against Side Channel Attacks. [Citation Graph (0, 0)][DBLP]
    IEICE Transactions, 2005, v:88, n:1, pp:123-131 [Journal]
  25. Katsuyuki Okeya, Tsuyoshi Takagi
    Security analysis of CRT-based cryptosystems. [Citation Graph (0, 0)][DBLP]
    Int. J. Inf. Sec., 2006, v:5, n:3, pp:177-185 [Journal]
  26. Erik Dahmen, Katsuyuki Okeya, Daniel Schepers
    Affine Precomputation with Sole Inversion in Elliptic Curve Cryptography. [Citation Graph (0, 0)][DBLP]
    ACISP, 2007, pp:245-258 [Conf]
  27. Masayuki Yoshino, Katsuyuki Okeya, Camille Vuillaume
    Double-Size Bipartite Modular Multiplication. [Citation Graph (0, 0)][DBLP]
    ACISP, 2007, pp:230-244 [Conf]
  28. Johannes Buchmann, Erik Dahmen, Elena Klintsevich, Katsuyuki Okeya, Camille Vuillaume
    Merkle Signatures with Virtually Unlimited Signature Capacity. [Citation Graph (0, 0)][DBLP]
    ACNS, 2007, pp:31-45 [Conf]
  29. Hirotaka Yoshida, Dai Watanabe, Katsuyuki Okeya, Jun Kitahara, Hongjun Wu, Özgül Küçük, Bart Preneel
    MAME: A Compression Function with Reduced Hardware Requirements. [Citation Graph (0, 0)][DBLP]
    CHES, 2007, pp:148-165 [Conf]
  30. Masayuki Yoshino, Katsuyuki Okeya, Camille Vuillaume
    Unbridle the Bit-Length of a Crypto-coprocessor with Montgomery Multiplication. [Citation Graph (0, 0)][DBLP]
    Selected Areas in Cryptography, 2006, pp:188-202 [Conf]

  31. Skew Frobenius Map and Efficient Scalar Multiplication for Pairing-Based Cryptography. [Citation Graph (, )][DBLP]


  32. A Black Hen Lays White Eggs. [Citation Graph (, )][DBLP]


  33. Recursive Double-Size Modular Multiplications without Extra Cost for Their Quotients. [Citation Graph (, )][DBLP]


  34. Side Channel Analysis of Some Hash Based MACs: A Response to SHA-3 Requirements. [Citation Graph (, )][DBLP]


  35. An Update on the Side Channel Cryptanalysis of MACs Based on Cryptographic Hash Functions. [Citation Graph (, )][DBLP]


  36. Width-3 Joint Sparse Form. [Citation Graph (, )][DBLP]


  37. Public Key Authentication with Memory Tokens. [Citation Graph (, )][DBLP]


  38. Digital Signatures Out of Second-Preimage Resistant Hash Functions. [Citation Graph (, )][DBLP]


Search in 0.003secs, Finished in 0.005secs
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002