|
Search the dblp DataBase
Masahiko Takenaka:
[Publications]
[Author Rank by year]
[Co-authors]
[Prefers]
[Cites]
[Cited by]
Publications of Author
- Masahiko Takenaka, Takeshi Shimoyama, Takeshi Koshiba
Theoretical Analysis of chi2 Attack on RC6. [Citation Graph (0, 0)][DBLP] ACISP, 2003, pp:142-153 [Conf]
- Kouichi Itoh, Tetsuya Izu, Masahiko Takenaka
Improving the Randomized Initial Point Countermeasure Against DPA. [Citation Graph (0, 0)][DBLP] ACNS, 2006, pp:459-469 [Conf]
- Kouichi Itoh, Tetsuya Izu, Masahiko Takenaka
Efficient Countermeasures against Power Analysis for Elliptic Curve Cryptosystems. [Citation Graph (0, 0)][DBLP] CARDIS, 2004, pp:99-114 [Conf]
- Kouichi Itoh, Tetsuya Izu, Masahiko Takenaka
Address-Bit Differential Power Analysis of Cryptographic Schemes OK-ECDH and OK-ECDSA. [Citation Graph (0, 0)][DBLP] CHES, 2002, pp:129-143 [Conf]
- Kouichi Itoh, Tetsuya Izu, Masahiko Takenaka
A Practical Countermeasure against Address-Bit Differential Power Analysis. [Citation Graph (0, 0)][DBLP] CHES, 2003, pp:382-396 [Conf]
- Kouichi Itoh, Masahiko Takenaka, Naoya Torii, Syouji Temma, Yasushi Kurihara
Fast Implementation of Public-Key Cryptography ona DSP TMS320C6201. [Citation Graph (0, 0)][DBLP] CHES, 1999, pp:61-72 [Conf]
- Kouichi Itoh, Jun Yajima, Masahiko Takenaka, Naoya Torii
DPA Countermeasures by Improving the Window Method. [Citation Graph (0, 0)][DBLP] CHES, 2002, pp:303-317 [Conf]
- Souichi Okada, Naoya Torii, Kouichi Itoh, Masahiko Takenaka
Implementation of Elliptic Curve Cryptographic Coprocessor over GF(2m) on an FPGA. [Citation Graph (0, 0)][DBLP] CHES, 2000, pp:25-40 [Conf]
- Takeshi Shimoyama, Masahiko Takenaka, Takeshi Koshiba
Multiple Linear Cryptanalysis of a Reduced Round RC6. [Citation Graph (0, 0)][DBLP] FSE, 2002, pp:76-88 [Conf]
- Takeshi Shimoyama, Hitoshi Yanami, Kazuhiro Yokoyama, Masahiko Takenaka, Kouichi Itoh, Jun Yajima, Naoya Torii, Hidema Tanaka
The Block Cipher SC2000. [Citation Graph (0, 0)][DBLP] FSE, 2001, pp:312-327 [Conf]
- Kazuyoshi Furukawa, Masahiko Takenaka, Kouichi Itoh
A Fast RSA Implementation on Itanium 2 Processor. [Citation Graph (0, 0)][DBLP] ICICS, 2006, pp:507-518 [Conf]
- Tetsuya Izu, Nobuyuki Kanaya, Masahiko Takenaka, Takashi Yoshioka
PIATS: A Partially Sanitizable Signature Scheme. [Citation Graph (0, 0)][DBLP] ICICS, 2005, pp:72-83 [Conf]
- Kouichi Itoh, Masahiko Takenaka, Naoya Torii
DPA Countermeasure Based on the "Masking Method". [Citation Graph (0, 0)][DBLP] ICISC, 2001, pp:440-456 [Conf]
- Tetsuya Izu, Noboru Kunihiro, Kazuo Ohta, Masahiko Takenaka, Takashi Yoshioka
A Sanitizable Signature Scheme with Aggregation. [Citation Graph (0, 0)][DBLP] ISPEC, 2007, pp:51-64 [Conf]
- Shingo Fujimoto, Masahiko Takenaka
Adoption of the IPsec-VPN for the Ubiquitous Network. [Citation Graph (0, 0)][DBLP] SAINT, 2006, pp:78-81 [Conf]
- Masahiko Takenaka, Takeshi Shimoyama, Takeshi Koshiba
Theoretical Analysis of chi2 Attack on RC6. [Citation Graph (0, 0)][DBLP] IEICE Transactions, 2004, v:87, n:1, pp:28-36 [Journal]
Analysis on Bleichenbacher's Forgery Attack. [Citation Graph (, )][DBLP]
Yet Another Sanitizable Signature from Bilinear Maps. [Citation Graph (, )][DBLP]
Experimental Results on Cheon's Algorithm. [Citation Graph (, )][DBLP]
Multiple Designated Verifiers Signatures Reconsidered. [Citation Graph (, )][DBLP]
How to Forge a Time-Stamp Which Adobe's Acrobat Accepts. [Citation Graph (, )][DBLP]
Sanitizable and Deletable Signature. [Citation Graph (, )][DBLP]
Search in 0.022secs, Finished in 0.023secs
|