What a lovely hat
Is it made out of
tin foil
?
DBLP data
CryptoDB
Cryptobib
Katsuyuki Okeya
Google Scholar
24
publications in security and cryptology related venues
Year
Venue
Title
2009
conf/ctrsa
Recursive Double-Size Modular Multiplications without Extra Cost for Their Quotients.
Masayuki Yoshino
Katsuyuki Okeya
Camille Vuillaume
2008
conf/wisa
Public Key Authentication with Memory Tokens.
Camille Vuillaume
Katsuyuki Okeya
Erik Dahmen
Johannes Buchmann
2008
conf/icics
Side Channel Analysis of Some Hash Based MACs: A Response to SHA-3 Requirements.
Praveen Gauravaram
Katsuyuki Okeya
2008
conf/cans
Skew Frobenius Map and Efficient Scalar Multiplication for Pairing-Based Cryptography.
Yumi Sakemi
Yasuyuki Nogami
Katsuyuki Okeya
Hidehiro Katou
Yoshitaka Morikawa
2007
conf/acisp
Double-Size Bipartite Modular Multiplication.
Masayuki Yoshino
Katsuyuki Okeya
Camille Vuillaume
2007
conf/acisp
Affine Precomputation with Sole Inversion in Elliptic Curve Cryptography.
Erik Dahmen
Katsuyuki Okeya
Daniel Schepers
2007
conf/acns
Merkle Signatures with Virtually Unlimited Signature Capacity.
Johannes Buchmann
Erik Dahmen
Elena Klintsevich
Katsuyuki Okeya
Camille Vuillaume
2007
conf/ches
MAME: A Compression Function with Reduced Hardware Requirements.
Hirotaka Yoshida
Dai Watanabe
Katsuyuki Okeya
Jun Kitahara
Hongjun Wu
Özgül Küçük
Bart Preneel
2006
conf/acisp
Side Channel Attacks Against HMACs Based on Block-Cipher Based Hash Functions.
Katsuyuki Okeya
2006
conf/acns
Flexible Exponentiation with Resistance to Side Channel Attacks.
Camille Vuillaume
Katsuyuki Okeya
2006
conf/sacrypt
Unbridle the Bit-Length of a Crypto-coprocessor with Montgomery Multiplication.
Masayuki Yoshino
Katsuyuki Okeya
Camille Vuillaume
2005
conf/acisp
Efficient Representations on Koblitz Curves with Resistance to Side Channel Attacks.
Katsuyuki Okeya
Tsuyoshi Takagi
Camille Vuillaume
2005
conf/ches
Short Memory Scalar Multiplication on Koblitz Curves.
Katsuyuki Okeya
Tsuyoshi Takagi
Camille Vuillaume
2004
conf/acisp
On the Exact Flexibility of the Flexible Countermeasure Against Side Channel Attacks.
Katsuyuki Okeya
Tsuyoshi Takagi
Camille Vuillaume
2004
conf/crypto
Signed Binary Representations Revisited.
Katsuyuki Okeya
Katja Schmidt-Samoa
Christian Spahn
Tsuyoshi Takagi
2004
conf/acns
Cryptanalysis of the Countermeasures Using Randomized Binary Signed Digits.
Dong-Guk Han
Katsuyuki Okeya
Tae Hyun Kim
Yoon Sung Hwang
Young-Ho Park
Souhwan Jung
2004
conf/acns
Security Analysis of CRT-Based Cryptosystems.
Katsuyuki Okeya
Tsuyoshi Takagi
2003
conf/ches
A More Flexible Countermeasure against Side Channel Attacks Using Window Method.
Katsuyuki Okeya
Tsuyoshi Takagi
2003
conf/ctrsa
The Width-w NAF Method Provides Small Memory and Fast Elliptic Scalar Multiplications Secure against Side Channel Attacks.
Katsuyuki Okeya
Tsuyoshi Takagi
2002
conf/acisp
On Insecurity of the Side Channel Attack Countermeasure Using Addition-Subtraction Chains under Distinguishability between Addition and Doubling.
Katsuyuki Okeya
Kouichi Sakurai
2002
conf/ches
Fast Multi-scalar Multiplication Methods on Elliptic Curves with Precomputation Strategy Using Montgomery Trick.
Katsuyuki Okeya
Kouichi Sakurai
2001
conf/icisc
A Fast Scalar Multiplication Method with Randomized Projective Coordinates on a Montgomery-Form Elliptic Curve Secure against Side Channel Attacks.
Katsuyuki Okeya
Kunihiko Miyazaki
Kouichi Sakurai
2001
conf/ches
Efficient Elliptic Curve Cryptosystems from a Scalar Multiplication Algorithm with Recovery of the y-Coordinate on a Montgomery-Form Elliptic Curve.
Katsuyuki Okeya
Kouichi Sakurai
2000
conf/pkc
Elliptic Curves with the Montgomery-Form and Their Cryptographic Applications.
Katsuyuki Okeya
Hiroyuki Kurumatani
Kouichi Sakurai
Coauthors
Bart Preneel
(1)
Camille Vuillaume
(9)
Christian Spahn
(1)
Dai Watanabe
(1)
Daniel Schepers
(1)
Dong-Guk Han
(1)
Elena Klintsevich
(1)
Erik Dahmen
(3)
Hidehiro Katou
(1)
Hirotaka Yoshida
(1)
Hiroyuki Kurumatani
(1)
Hongjun Wu
(1)
Johannes Buchmann
(2)
Jun Kitahara
(1)
Katja Schmidt-Samoa
(1)
Katsuyuki Okeya
(24)
Kouichi Sakurai
(5)
Kunihiko Miyazaki
(1)
Masayuki Yoshino
(3)
Özgül Küçük
(1)
Praveen Gauravaram
(1)
Souhwan Jung
(1)
Tae Hyun Kim
(1)
Tsuyoshi Takagi
(7)
Yasuyuki Nogami
(1)
Yoon Sung Hwang
(1)
Yoshitaka Morikawa
(1)
Young-Ho Park
(1)
Yumi Sakemi
(1)
Filters
Crypto
Eurocrypt
Asiacrypt
Public Key Cryptography
Theory of Cryptography
Journal of Cryptology
Transactions on Symmetric Cryptology
Transactions on Cryptographic Hardware and Embedded Computing
Communications in Cryptology
Fast Software Encryption
Cryptographic Hardware and Embedded Computing Conference
Usenix Security
IEEE Security and Privacy
ACM CCS
Network and Distributed System Security
Financial cryptography
Cryptographer's Track at RSA Conference (CT-RSA)
ESORICS
IEEE Transactions on Information Forensics and Security
Computers & Security
Journal of Information Security and Applications
IEEE Conference on Blockchains and Cryptocurrency (ICBC)
Asia CCS
European Security & privacy
Symposium on Useful Privacy and Security
Privacy Enhancing Technologies
Security and Privacy in Communication Networks
Cryptology and Network Security
Annual Computer Security Applications Conference
Dependable Systems and Networks
IEEE Computer Security Foundations Workshop
IEEE Conference and Communications and Network Security
International Conference on Applied Cryptography and Network Security
Selected Areas in Cryptology
International Conference on Information Security and Cryptology (ICISC)
International Conference on Information and Communication (ICICS)
IFIP International Information Security Conference (SEC)
Conference on Security and Privacy in Wireless and Mobile Networks (WISEC)
IEEE International Symposium on Hardware Oriented Security and Trust
New Security Paradigms Workshop
Information Hiding and Multimedia Security Workshop
Australasian Conference on Information Security and Privacy
AfricaCrypt
LatinCrypt
International Conference on Cyber Security and Resilience
Asia Joint Conference on information Security
International Conference on information Security Applications
ACM Asia Public-Key Cryptography Workshop
International Workshop on Lightweight Cryptography for Security and Privacy
Workshop on Fault Detection and Tolerance in Cryptography
International Conference on Blockchain Technology and Emerging Technologies
Provable Security
Cloud Computing Security Workshop (CCSW)
International Workshop on Security (IWSEC)
International Conference on Information System Security (ICISS)
Select all
Unselect all
Years:
to