Okeya Katsuyuki | Systems Development Laboratory Hitachi Ltd.
スポンサーリンク
概要
関連著者
-
OKEYA Katsuyuki
Systems Development Laboratory, Hitachi Ltd.
-
Okeya Katsuyuki
Systems Development Laboratory Hitachi Ltd.
-
VUILLAUME Camille
Systems Development Laboratory, Hitachi Ltd.
-
Vuillaume Camille
Systems Development Laboratory Hitachi Ltd.
-
YOSHINO Masayuki
Systems Development Laboratory, Hitachi Ltd.
-
TAKAGI Tsuyoshi
Future University-Hakodate
-
Takagi Tsuyoshi
Future Univ.‐hakodate Hakodate‐shi Jpn
-
Yoshino Masayuki
Systems Development Laboratory Hitachi Ltd.
-
Takagi T
Fachbereich Informatik Technische Universitat Darmstadt
-
Vuillaume Camille
Fachbereich Informatik Technische Universitat Darmstadt
-
Sakurai Kouichi
Faculty Of Information Science And Electrical Engineering Kyushu University
-
Han Dong‐guk
Kookmin Univ. Seoul Kor
-
Han Dong
Center For Information And Security Technologies (cist) Korea University
-
Sakurai Kouichi
Faculty Of Computer Science And Communication Engineering Kyushu University
-
TAKAGI Tsuyoshi
Fachbereich Informatik, Technische Universitat Darmstadt
-
TAGAKI Tsuyoshi
Fachbereich Informatik, Technische Universitat Darmstadt
-
DAHMEN Erik
Technische Universitat Darmstadt, Fachbereich Informatik
-
Dahmen Erik
Technische Univ. Darmstadt Darmstadt Deu
-
Tagaki Tsuyoshi
Fachbereich Informatik Technische Universitat Darmstadt
-
Takagi Tsuyoshi
Fachbereich Informatik Technische Universitat Darmstadt
-
Sakurai Kouichi
Faculty Of Engineering Kyushu University
-
OKEYA Katsuyuki
Systems Development Laboratory, Hitachi, Ltd.
著作論文
- Recursive Double-Size Modular Multiplications from Euclidean and Montgomery Multipliers
- Faster Double-Size Bipartite Multiplication out of Montgomery Multipliers
- Montgomery Multiplication with Twice the Bit-Length of Multipliers
- Use of Montgomery Trick in Precomputation of Multi-Scalar Multiplication in Elliptic Curve Cryptosystems(Special Section on Cryptography and Information Security)
- SCA-Resistant and Fast Elliptic Scalar Multiplication Based on wNAF (Asymmetric Cipher) (Cryptography and Information Security)
- Defeating Simple Power Analysis on Koblitz Curves(Discrete Mathematics and Its Applications)
- Security Analysis of the SPA-Resistant Fractional Width Method(Elliptic Curve Cryptography, Cryptography and Information Security)
- Cryptanalysis of Ha-Moon's Countermeasure of Randomized Signed Scalar Multiplication(Discrete Mathematics and Its Applications)
- Side Channel Attacks against Hash-Based MACs with PGV Compression Functions
- On the Importance of Protecting Δ in SFLASH against Side Channel Attacks(Tamper-Resistance)(Cryptography and Information Security)
- A New Upper Bound for the Minimal Density of Joint Representations in Elliptic Curve Cryptosystems(Discrete Mathematics and Its Applications)