|
Search the dblp DataBase
Kouichi Itoh:
[Publications]
[Author Rank by year]
[Co-authors]
[Prefers]
[Cites]
[Cited by]
Publications of Author
- Kouichi Itoh, Tetsuya Izu, Masahiko Takenaka
Improving the Randomized Initial Point Countermeasure Against DPA. [Citation Graph (0, 0)][DBLP] ACNS, 2006, pp:459-469 [Conf]
- Kouichi Itoh, Tetsuya Izu, Masahiko Takenaka
Efficient Countermeasures against Power Analysis for Elliptic Curve Cryptosystems. [Citation Graph (0, 0)][DBLP] CARDIS, 2004, pp:99-114 [Conf]
- Kouichi Itoh, Tetsuya Izu, Masahiko Takenaka
Address-Bit Differential Power Analysis of Cryptographic Schemes OK-ECDH and OK-ECDSA. [Citation Graph (0, 0)][DBLP] CHES, 2002, pp:129-143 [Conf]
- Kouichi Itoh, Tetsuya Izu, Masahiko Takenaka
A Practical Countermeasure against Address-Bit Differential Power Analysis. [Citation Graph (0, 0)][DBLP] CHES, 2003, pp:382-396 [Conf]
- Kouichi Itoh, Masahiko Takenaka, Naoya Torii, Syouji Temma, Yasushi Kurihara
Fast Implementation of Public-Key Cryptography ona DSP TMS320C6201. [Citation Graph (0, 0)][DBLP] CHES, 1999, pp:61-72 [Conf]
- Kouichi Itoh, Jun Yajima, Masahiko Takenaka, Naoya Torii
DPA Countermeasures by Improving the Window Method. [Citation Graph (0, 0)][DBLP] CHES, 2002, pp:303-317 [Conf]
- Souichi Okada, Naoya Torii, Kouichi Itoh, Masahiko Takenaka
Implementation of Elliptic Curve Cryptographic Coprocessor over GF(2m) on an FPGA. [Citation Graph (0, 0)][DBLP] CHES, 2000, pp:25-40 [Conf]
- Takeshi Shimoyama, Hitoshi Yanami, Kazuhiro Yokoyama, Masahiko Takenaka, Kouichi Itoh, Jun Yajima, Naoya Torii, Hidema Tanaka
The Block Cipher SC2000. [Citation Graph (0, 0)][DBLP] FSE, 2001, pp:312-327 [Conf]
- Kazuyoshi Furukawa, Masahiko Takenaka, Kouichi Itoh
A Fast RSA Implementation on Itanium 2 Processor. [Citation Graph (0, 0)][DBLP] ICICS, 2006, pp:507-518 [Conf]
- Xianyong Cheng, Iwaki Akiyama, Kouichi Itoh, Yi Wang, N. Taniguchi, M. Nakajima
Automated Detection of Breast Tumors in Ultrasonic Image Using Fuzzy Reasoning. [Citation Graph (0, 0)][DBLP] ICIP (3), 1997, pp:420-423 [Conf]
- Xianyong Cheng, Iwaki Akiyama, Kouichi Itoh, Yi Wang, N. Taniguchi, M. Nakajima
Automated Detection of Breast Tumors in Ultrasonic Images Using Fuzzy Reasoning. [Citation Graph (0, 0)][DBLP] ICIP (3), 1997, pp:412-415 [Conf]
- Kouichi Itoh, Masahiko Takenaka, Naoya Torii
DPA Countermeasure Based on the "Masking Method". [Citation Graph (0, 0)][DBLP] ICISC, 2001, pp:440-456 [Conf]
- Motohiko Tanino, Marie-Anne Debily, Takuro Tamura, Teruyoshi Hishiki, Osamu Ogasawara, Katsuji Murakawa, Shoko Kawamoto, Kouichi Itoh, Shinya Watanabe, Sandro José De Souza, Sandrine Imbeaud, Esther Graudens, Eric Eveno, Phillip Hilton, Yukio Sudo, Janet Kelso, Kazuho Ikeo, Tadashi Imanishi, Takashi Gojobori, Charles Auffray, Winston Hide, Kousaku Okubo
The Human Anatomic Gene Expression Library (H-ANGEL), the H-Inv integrative display of human gene expression across disparate technologies and platforms. [Citation Graph (0, 0)][DBLP] Nucleic Acids Research, 2005, v:33, n:Database-Issue, pp:567-572 [Journal]
- Xiangyong Cheng, Iwaki Akiyama, Yi Wang, Kouichi Itoh
Breast tumor diagnostic system using three-dimensional ultrasonic echography. [Citation Graph (0, 0)][DBLP] Systems and Computers in Japan, 1999, v:30, n:2, pp:1-10 [Journal]
A Very Compact Hardware Implementation of the MISTY1 Block Cipher. [Citation Graph (, )][DBLP]
Small Secret Key Attack on a Variant of RSA (Due to Takagi). [Citation Graph (, )][DBLP]
A Very Compact Hardware Implementation of the KASUMI Block Cipher. [Citation Graph (, )][DBLP]
Search in 0.003secs, Finished in 0.004secs
|