Katsuyuki Okeya

From MaRDI portal
Person:957692


List of research outcomes

This list is not complete and representing at the moment only items from zbMATH Open and arXiv. We are working on additional sources - please check back here soon!

PublicationDate of PublicationType
Short-Memory Scalar Multiplication for Koblitz Curves
IEEE Transactions on Computers
2017-11-10Paper
Generic Cryptanalysis of Combined Countermeasures with Randomized BSD Representations
Smart Card Research and Advanced Applications
2015-11-11Paper
A more flexible countermeasure against side channel attacks using window method.
Lecture Notes in Computer Science
2010-03-09Paper
Recursive Double-Size Modular Multiplications without Extra Cost for Their Quotients
Topics in Cryptology – CT-RSA 2009
2009-04-29Paper
Merkle Signatures with Virtually Unlimited Signature Capacity
Applied Cryptography and Network Security
2009-03-10Paper
Affine Precomputation with Sole Inversion in Elliptic Curve Cryptography
Information Security and Privacy
2009-03-06Paper
Double-Size Bipartite Modular Multiplication
Information Security and Privacy
2009-03-06Paper
Public Key Authentication with Memory Tokens
Information Security Applications
2009-02-24Paper
Skew Frobenius Map and Efficient Scalar Multiplication for Pairing–Based Cryptography
Cryptology and Network Security
2009-01-09Paper
All harmonic numbers less than \(10^{14}\)
Japan Journal of Industrial and Applied Mathematics
2008-12-01Paper
Digital Signatures Out of Second-Preimage Resistant Hash Functions
Post-Quantum Cryptography
2008-11-11Paper
An Update on the Side Channel Cryptanalysis of MACs Based on Cryptographic Hash Functions
Lecture Notes in Computer Science
2008-04-11Paper
Progress in Cryptology - INDOCRYPT 2003
Lecture Notes in Computer Science
2007-11-29Paper
Unbridle the Bit-Length of a Crypto-coprocessor with Montgomery Multiplication
Selected Areas in Cryptography
2007-11-29Paper
Side Channel Attacks Against HMACs Based on Block-Cipher Based Hash Functions
Information Security and Privacy
2007-09-07Paper
Applied Cryptography and Network Security
Lecture Notes in Computer Science
2007-05-02Paper
Information Security and Privacy
Lecture Notes in Computer Science
2006-06-22Paper
Information Security and Privacy
Lecture Notes in Computer Science
2005-09-07Paper
Advances in Cryptology – CRYPTO 2004
Lecture Notes in Computer Science
2005-08-23Paper
Applied Cryptography and Network Security
Lecture Notes in Computer Science
2005-06-13Paper
Applied Cryptography and Network Security
Lecture Notes in Computer Science
2005-06-13Paper
scientific article; zbMATH DE number 1979310 (Why is no real title available?)
 
2003-09-11Paper
scientific article; zbMATH DE number 1962161 (Why is no real title available?)
 
2003-08-10Paper
scientific article; zbMATH DE number 1950359 (Why is no real title available?)
 
2003-07-17Paper
scientific article; zbMATH DE number 1941254 (Why is no real title available?)
 
2003-06-29Paper
scientific article; zbMATH DE number 1878328 (Why is no real title available?)
 
2003-03-09Paper
scientific article; zbMATH DE number 1759670 (Why is no real title available?)
 
2002-11-23Paper
scientific article; zbMATH DE number 1440061 (Why is no real title available?)
 
2001-10-03Paper
scientific article; zbMATH DE number 1583944 (Why is no real title available?)
 
2001-04-03Paper


Research outcomes over time


This page was built for person: Katsuyuki Okeya