Cryptographers' World
 

Tetsuya Izu



11 papers in database with 283 citations Star

H-number: 6

Journal Papers

[Sort papers chronologically] [Sort papers by citations count]

 
1. Tetsuya Izu,  Jun Kogure,  Takeshi Koshiba,  Takeshi Shimoyama,  Low-density attack revisited, Designs, Codes and Cryptography, Volume 43(1), pp. 47 - 59, Springer, 2007.

[Electronic Edition][Cited 2 times ]

Conference Papers

[Sort papers chronologically] [Sort papers by citations count]

1. Tetsuya Izu,  Jun Kogure,  Takeshi Shimoyama,  CAIRN 2: An FPGA Implementation of the Sieving Step in the Number Field Sieve Method, pp. 364 - 377, CHES 2007.

[Electronic Edition][Cited 3 times ]

2. Kouichi Itoh,  Tetsuya Izu,  Masahiko Takenaka,  Improving the Randomized Initial Point Countermeasure Against DPA, pp. 459 - 469, ACNS 2006.

[Electronic Edition][Cited 5 times ]

3. Kouichi Itoh,  Tetsuya Izu,  Masahiko Takenaka,  A Practical Countermeasure against Address-Bit Differential Power Analysis, pp. 382 - 396, CHES 2003.

[Electronic Edition][Cited 30 times ]

4. Tetsuya Izu,  Tsuyoshi Takagi,  Exceptional Procedure Attack on Elliptic Curve Cryptosystems, pp. 224 - 239, PKC 2003.

[Electronic Edition][Cited 21 times ]

5. Tetsuya Izu,  Bodo Möller,  Tsuyoshi Takagi,  Improved Elliptic Curve Multiplication Methods Resistant against Side Channel Attacks, pp. 296 - 313, INDOCRYPT 2002.

[Electronic Edition][Cited 38 times ]

6. Kouichi Itoh,  Tetsuya Izu,  Masahiko Takenaka,  Address-Bit Differential Power Analysis of Cryptographic Schemes OK-ECDH and OK-ECDSA, pp. 129 - 143, CHES 2002.

[Electronic Edition][Cited 47 times ]

7. Tetsuya Izu,  Tsuyoshi Takagi,  A Fast Parallel Elliptic Curve Multiplication Resistant against Side Channel Attacks, pp. 280 - 296, PKC 2002.

[Electronic Edition][Cited 110 times Red StarRed Star]

8. Tetsuya Izu,  Jun Kogure,  Kazuhiro Yokoyama,  Efficient Implementation of Schoof's Algorithm in Case of Characteristic 2, pp. 210 - 222, PKC 2000.

[Electronic Edition][No citation]

9. Tetsuya Izu,  Jun Kogure,  Masayuki Noro,  Kazuhiro Yokoyama,  Efficient Implementation of Schoof's Algorithm, pp. 66 - 79, ASIACRYPT 1998.

[Electronic Edition][Cited 26 times ]

10. Tetsuya Izu,  Jun Kogure,  Masayuki Noro,  Kazuhiro Yokoyama,  Parameters for Secure Elliptic Curve Cryptosystem - Improvements on Schoof's Algorithm, pp. 253 - 257, PKC 1998.

[Electronic Edition][Cited 1 times ]



Database status:
3755 authors,
5428 conference papers from 177 conference proceedings,
559 journal papers from 8 journals
Highly Cited...