Publication: IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences Publication Date: 2010/06/01 Vol. E93-ANo. 6pp. 1140-1147 Type of Manuscript: Special Section PAPER (Special Section on Discrete Mathematics and Its Applications) Category: Cryptography and Information Security Keyword: affine coordinates, elliptic curve cryptosystem, precomputation, scalar multiplication,
Publication: IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences Publication Date: 2010/01/01 Vol. E93-ANo. 1pp. 180-187 Type of Manuscript: Special Section PAPER (Special Section on Cryptography and Information Security) Category: Mathematics Keyword: modular multiplication, RSA, efficient implementation, low-end device, double-size technique,
Publication: IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences Publication Date: 2009/08/01 Vol. E92-ANo. 8pp. 1851-1858 Type of Manuscript: Special Section PAPER (Special Section on Discrete Mathematics and Its Applications) Category: Theory Keyword: Montgomery multiplication, double-size technique, RSA, efficient implementation, smartcard,
Publication: IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences Publication Date: 2008/01/01 Vol. E91-ANo. 1pp. 203-210 Type of Manuscript: Special Section PAPER (Special Section on Cryptography and Information Security) Category: Implementation Keyword: Montgomery multiplication, RSA, crypto-coprocessor, smartcard,
Publication: IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences Publication Date: 2006/05/01 Vol. E89-ANo. 5pp. 1362-1369 Type of Manuscript: Special Section PAPER (Special Section on Discrete Mathematics and Its Applications) Category: Keyword: elliptic curve cryptosystems, Koblitz curves, smartcard, side channel attacks, SPA countermeasure,
Cryptanalysis of Ha-Moon's Countermeasure of Randomized Signed Scalar Multiplication Katsuyuki OKEYADong-Guk HAN
Publication: IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences Publication Date: 2005/05/01 Vol. E88-ANo. 5pp. 1140-1147 Type of Manuscript: Special Section PAPER (Special Section on Discrete Mathematics and Its Applications) Category: Keyword: elliptic curve cryptosystems, side channel attacks, SPA, DPA, Ha-Moon's countermeasure, finite Markov chain,
Publication: IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences Publication Date: 2005/01/01 Vol. E88-ANo. 1pp. 123-131 Type of Manuscript: Special Section PAPER (Special Section on Cryptography and Information Security) Category: Tamper-Resistance Keyword: asymmetric signature, SFLASH, side channel attacks, SHA-1, C*, C*--, hidden monomial problem,
Publication: IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences Publication Date: 2004/01/01 Vol. E87-ANo. 1pp. 75-84 Type of Manuscript: Special Section PAPER (Special Section on Cryptography and Information Security) Category: Asymmetric Cipher Keyword: elliptic curve cryptosystem, side channel attacks, width-w NAF, smart card,
Use of Montgomery Trick in Precomputation of Multi-Scalar Multiplication in Elliptic Curve Cryptosystems Katsuyuki OKEYAKouichi SAKURAI
Publication: IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences Publication Date: 2003/01/01 Vol. E86-ANo. 1pp. 98-112 Type of Manuscript: Special Section PAPER (Special Section on Cryptography and Information Security) Category: Asymmetric Ciphers Keyword: elliptic curve cryptography, multi-scalar multiplication, precomputation, Montgomery trick, simultaneous,
A Scalar Multiplication Algorithm with Recovery of the y-Coordinate on the Montgomery Form and Analysis of Efficiency for Elliptic Curve Cryptosystems Katsuyuki OKEYAKouichi SAKURAI
Publication: IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences Publication Date: 2002/01/01 Vol. E85-ANo. 1pp. 84-93 Type of Manuscript: Special Section PAPER (Special Section on Cryptography and Information Security) Category: Keyword: elliptic curve cryptosystem, Montgomery form, fast scalar multiplication, y-coordinate recovery,