2008 | ||
---|---|---|
16 | EE | Dai Yamamoto, Jun Yajima, Kouichi Itoh: A Very Compact Hardware Implementation of the MISTY1 Block Cipher. CHES 2008: 315-330 |
15 | EE | Kouichi Itoh, Noboru Kunihiro, Kaoru Kurosawa: Small Secret Key Attack on a Variant of RSA (Due to Takagi). CT-RSA 2008: 387-406 |
2006 | ||
14 | EE | Kouichi Itoh, Tetsuya Izu, Masahiko Takenaka: Improving the Randomized Initial Point Countermeasure Against DPA. ACNS 2006: 459-469 |
13 | EE | Kazuyoshi Furukawa, Masahiko Takenaka, Kouichi Itoh: A Fast RSA Implementation on Itanium 2 Processor. ICICS 2006: 507-518 |
2005 | ||
12 | EE | Motohiko Tanino, Marie-Anne Debily, Takuro Tamura, Teruyoshi Hishiki, Osamu Ogasawara, Katsuji Murakawa, Shoko Kawamoto, Kouichi Itoh, Shinya Watanabe, Sandro José de Souza, Sandrine Imbeaud, Esther Graudens, Eric Eveno, Phillip Hilton, Yukio Sudo, Janet Kelso, Kazuho Ikeo, Tadashi Imanishi, Takashi Gojobori, Charles Auffray, Winston Hide, Kousaku Okubo: The Human Anatomic Gene Expression Library (H-ANGEL), the H-Inv integrative display of human gene expression across disparate technologies and platforms. Nucleic Acids Research 33(Database-Issue): 567-572 (2005) |
2004 | ||
11 | Kouichi Itoh, Tetsuya Izu, Masahiko Takenaka: Efficient Countermeasures against Power Analysis for Elliptic Curve Cryptosystems. CARDIS 2004: 99-114 | |
2003 | ||
10 | EE | Kouichi Itoh, Tetsuya Izu, Masahiko Takenaka: A Practical Countermeasure against Address-Bit Differential Power Analysis. CHES 2003: 382-396 |
2002 | ||
9 | EE | Kouichi Itoh, Tetsuya Izu, Masahiko Takenaka: Address-Bit Differential Power Analysis of Cryptographic Schemes OK-ECDH and OK-ECDSA. CHES 2002: 129-143 |
8 | EE | Kouichi Itoh, Jun Yajima, Masahiko Takenaka, Naoya Torii: DPA Countermeasures by Improving the Window Method. CHES 2002: 303-317 |
2001 | ||
7 | EE | Takeshi Shimoyama, Hitoshi Yanami, Kazuhiro Yokoyama, Masahiko Takenaka, Kouichi Itoh, Jun Yajima, Naoya Torii, Hidema Tanaka: The Block Cipher SC2000. FSE 2001: 312-327 |
6 | EE | Kouichi Itoh, Masahiko Takenaka, Naoya Torii: DPA Countermeasure Based on the "Masking Method". ICISC 2001: 440-456 |
2000 | ||
5 | EE | Souichi Okada, Naoya Torii, Kouichi Itoh, Masahiko Takenaka: Implementation of Elliptic Curve Cryptographic Coprocessor over GF(2m) on an FPGA. CHES 2000: 25-40 |
1999 | ||
4 | EE | Kouichi Itoh, Masahiko Takenaka, Naoya Torii, Syouji Temma, Yasushi Kurihara: Fast Implementation of Public-Key Cryptography ona DSP TMS320C6201. CHES 1999: 61-72 |
3 | EE | Xiangyong Cheng, Iwaki Akiyama, Yi Wang, Kouichi Itoh: Breast tumor diagnostic system using three-dimensional ultrasonic echography. Systems and Computers in Japan 30(2): 1-10 (1999) |
1997 | ||
2 | EE | Xianyong Cheng, Iwaki Akiyama, Kouichi Itoh, Yi Wang, N. Taniguchi, M. Nakajima: Automated Detection of Breast Tumors in Ultrasonic Images Using Fuzzy Reasoning. ICIP (3) 1997: 412-415 |
1 | EE | Xianyong Cheng, Iwaki Akiyama, Kouichi Itoh, Yi Wang, N. Taniguchi, M. Nakajima: Automated Detection of Breast Tumors in Ultrasonic Image Using Fuzzy Reasoning. ICIP (3) 1997: 420-423 |