The SCEAS System
Navigation Menu

Search the dblp DataBase

Title:
Author:

Kouichi Itoh: [Publications] [Author Rank by year] [Co-authors] [Prefers] [Cites] [Cited by]

Publications of Author

  1. Kouichi Itoh, Tetsuya Izu, Masahiko Takenaka
    Improving the Randomized Initial Point Countermeasure Against DPA. [Citation Graph (0, 0)][DBLP]
    ACNS, 2006, pp:459-469 [Conf]
  2. Kouichi Itoh, Tetsuya Izu, Masahiko Takenaka
    Efficient Countermeasures against Power Analysis for Elliptic Curve Cryptosystems. [Citation Graph (0, 0)][DBLP]
    CARDIS, 2004, pp:99-114 [Conf]
  3. Kouichi Itoh, Tetsuya Izu, Masahiko Takenaka
    Address-Bit Differential Power Analysis of Cryptographic Schemes OK-ECDH and OK-ECDSA. [Citation Graph (0, 0)][DBLP]
    CHES, 2002, pp:129-143 [Conf]
  4. Kouichi Itoh, Tetsuya Izu, Masahiko Takenaka
    A Practical Countermeasure against Address-Bit Differential Power Analysis. [Citation Graph (0, 0)][DBLP]
    CHES, 2003, pp:382-396 [Conf]
  5. Kouichi Itoh, Masahiko Takenaka, Naoya Torii, Syouji Temma, Yasushi Kurihara
    Fast Implementation of Public-Key Cryptography ona DSP TMS320C6201. [Citation Graph (0, 0)][DBLP]
    CHES, 1999, pp:61-72 [Conf]
  6. Kouichi Itoh, Jun Yajima, Masahiko Takenaka, Naoya Torii
    DPA Countermeasures by Improving the Window Method. [Citation Graph (0, 0)][DBLP]
    CHES, 2002, pp:303-317 [Conf]
  7. Souichi Okada, Naoya Torii, Kouichi Itoh, Masahiko Takenaka
    Implementation of Elliptic Curve Cryptographic Coprocessor over GF(2m) on an FPGA. [Citation Graph (0, 0)][DBLP]
    CHES, 2000, pp:25-40 [Conf]
  8. Takeshi Shimoyama, Hitoshi Yanami, Kazuhiro Yokoyama, Masahiko Takenaka, Kouichi Itoh, Jun Yajima, Naoya Torii, Hidema Tanaka
    The Block Cipher SC2000. [Citation Graph (0, 0)][DBLP]
    FSE, 2001, pp:312-327 [Conf]
  9. Kazuyoshi Furukawa, Masahiko Takenaka, Kouichi Itoh
    A Fast RSA Implementation on Itanium 2 Processor. [Citation Graph (0, 0)][DBLP]
    ICICS, 2006, pp:507-518 [Conf]
  10. Xianyong Cheng, Iwaki Akiyama, Kouichi Itoh, Yi Wang, N. Taniguchi, M. Nakajima
    Automated Detection of Breast Tumors in Ultrasonic Image Using Fuzzy Reasoning. [Citation Graph (0, 0)][DBLP]
    ICIP (3), 1997, pp:420-423 [Conf]
  11. Xianyong Cheng, Iwaki Akiyama, Kouichi Itoh, Yi Wang, N. Taniguchi, M. Nakajima
    Automated Detection of Breast Tumors in Ultrasonic Images Using Fuzzy Reasoning. [Citation Graph (0, 0)][DBLP]
    ICIP (3), 1997, pp:412-415 [Conf]
  12. Kouichi Itoh, Masahiko Takenaka, Naoya Torii
    DPA Countermeasure Based on the "Masking Method". [Citation Graph (0, 0)][DBLP]
    ICISC, 2001, pp:440-456 [Conf]
  13. Motohiko Tanino, Marie-Anne Debily, Takuro Tamura, Teruyoshi Hishiki, Osamu Ogasawara, Katsuji Murakawa, Shoko Kawamoto, Kouichi Itoh, Shinya Watanabe, Sandro José De Souza, Sandrine Imbeaud, Esther Graudens, Eric Eveno, Phillip Hilton, Yukio Sudo, Janet Kelso, Kazuho Ikeo, Tadashi Imanishi, Takashi Gojobori, Charles Auffray, Winston Hide, Kousaku Okubo
    The Human Anatomic Gene Expression Library (H-ANGEL), the H-Inv integrative display of human gene expression across disparate technologies and platforms. [Citation Graph (0, 0)][DBLP]
    Nucleic Acids Research, 2005, v:33, n:Database-Issue, pp:567-572 [Journal]
  14. Xiangyong Cheng, Iwaki Akiyama, Yi Wang, Kouichi Itoh
    Breast tumor diagnostic system using three-dimensional ultrasonic echography. [Citation Graph (0, 0)][DBLP]
    Systems and Computers in Japan, 1999, v:30, n:2, pp:1-10 [Journal]

  15. A Very Compact Hardware Implementation of the MISTY1 Block Cipher. [Citation Graph (, )][DBLP]


  16. Small Secret Key Attack on a Variant of RSA (Due to Takagi). [Citation Graph (, )][DBLP]


  17. A Very Compact Hardware Implementation of the KASUMI Block Cipher. [Citation Graph (, )][DBLP]


Search in 0.002secs, Finished in 0.004secs
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002