Cryptographers' World
 

Katsuyuki Okeya


Author's Web Page Link

16 papers in database with 438 citations Star

H-number: 10

Conference Papers

[Sort papers chronologically] [Sort papers by citations count]

1. Praveen Gauravaram,  Katsuyuki Okeya,  An Update on the Side Channel Cryptanalysis of MACs Based on Cryptographic Hash Functions, pp. 393 - 403, INDOCRYPT 2007.

[Electronic Edition][Cited 7 times ]

2. Johannes Buchmann,  Erik Dahmen,  Elena Klintsevich,  Katsuyuki Okeya,  Camille Vuillaume,  Merkle Signatures with Virtually Unlimited Signature Capacity, pp. 31 - 45, ACNS 2007.

[Electronic Edition][Cited 13 times ]

3. Hirotaka Yoshida,  Dai Watanabe,  Katsuyuki Okeya,  Jun Kitahara,  Hongjun Wu,  Özgül Küçük,  Bart Preneel,  MAME: A Compression Function with Reduced Hardware Requirements, pp. 148 - 165, CHES 2007.

[Electronic Edition][Cited 8 times ]

4. Camille Vuillaume,  Katsuyuki Okeya,  Flexible Exponentiation with Resistance to Side Channel Attacks, pp. 268 - 283, ACNS 2006.

[Electronic Edition][Cited 8 times ]

5. Masayuki Yoshino,  Katsuyuki Okeya,  Camille Vuillaume,  Unbridle the Bit-Length of a Crypto-coprocessor with Montgomery Multiplication, pp. 188 - 202, SAC 2006.

[Electronic Edition][Cited 5 times ]

6. Katsuyuki Okeya,  Tsuyoshi Takagi,  Camille Vuillaume,  Short Memory Scalar Multiplication on Koblitz Curves, pp. 91 - 105, CHES 2005.

[Electronic Edition][IACR Online ArchiveIACR Online Archive][Cited 10 times ]

7. Katsuyuki Okeya,  Katja Schmidt-Samoa,  Christian Spahn,  Tsuyoshi Takagi,  Signed Binary Representations Revisited, pp. 123 - 139, CRYPTO 2004.

[Electronic Edition][IACR Online ArchiveIACR Online Archive][Cited 69 times Red Star]

8. Katsuyuki Okeya,  Tsuyoshi Takagi,  Security Analysis of CRT-Based Cryptosystems, pp. 383 - 397, ACNS 2004.

[Electronic Edition][Cited 6 times ]

9. Dong-Guk Han,  Katsuyuki Okeya,  Tae-Hyun Kim,  Yoon Sung Hwang,  Young-Ho Park,  Souhwan Jung,  Cryptanalysis of the Countermeasures Using Randomized Binary Signed Digits, pp. 398 - 413, ACNS 2004.

[Electronic Edition][Cited 4 times ]

10. Katsuyuki Okeya,  Dong-Guk Han,  Side Channel Attack on Ha-Moon's Countermeasure of Randomized Signed Scalar Multiplication, pp. 334 - 348, INDOCRYPT 2003.

[Electronic Edition][Cited 16 times ]

11. Katsuyuki Okeya,  Tsuyoshi Takagi,  A More Flexible Countermeasure against Side Channel Attacks Using Window Method, pp. 397 - 410, CHES 2003.

[Electronic Edition][Cited 26 times ]

12. Katsuyuki Okeya,  Tsuyoshi Takagi,  The Width-w NAF Method Provides Small Memory and Fast Elliptic Scalar Multiplications Secure against Side Channel Attacks, pp. 328 - 342, CT-RSA 2003.

[Electronic Edition][Cited 58 times Red Star]

13. Katsuyuki Okeya,  Kouichi Sakurai,  Fast Multi-scalar Multiplication Methods on Elliptic Curves with Precomputation Strategy Using Montgomery Trick, pp. 564 - 578, CHES 2002.

[Electronic Edition][Cited 12 times ]

14. Katsuyuki Okeya,  Kouichi Sakurai,  Efficient Elliptic Curve Cryptosystems from a Scalar Multiplication Algorithm with Recovery of the y-Coordinate on a Montgomery-Form Elliptic Curve, pp. 126 - 141, CHES 2001.

[Electronic Edition][Cited 34 times ]

15. Katsuyuki Okeya,  Kouichi Sakurai,  Power Analysis Breaks Elliptic Curve Cryptosystems even Secure against the Timing Attack, pp. 178 - 190, INDOCRYPT 2000.

[Electronic Edition][Cited 116 times Red StarRed Star]

16. Katsuyuki Okeya,  Hiroyuki Kurumatani,  Kouichi Sakurai,  Elliptic Curves with the Montgomery-Form and Their Cryptographic Applications, pp. 238 - 257, PKC 2000.

[Electronic Edition][Cited 46 times ]



Database status:
3755 authors,
5428 conference papers from 177 conference proceedings,
559 journal papers from 8 journals
Highly Cited...