dblp.uni-trier.dewww.uni-trier.de

Yasuyuki Sakai

List of publications from the DBLP Bibliography Server - FAQ
Coauthor Index - Ask others: ACM DL/Guide - CiteSeer - CSB - Google - MSN - Yahoo

2006
13EEYasuyuki Sakai, Kouichi Sakurai: Simple Power Analysis on Fast Modular Reduction with Generalized Mersenne Prime for Elliptic Curve Cryptosystems. IEICE Transactions 89-A(1): 231-237 (2006)
2005
12EEYasuyuki Sakai, Kouichi Sakurai: Simple Power Analysis on Fast Modular Reduction with NIST Recommended Elliptic Curves. ICICS 2005: 169-180
11EEYasuyuki Sakai, Kouichi Sakurai: On the Vulnerability of Exponent Recodings for the Exponentiation against Side Channel Attacks. IEICE Transactions 88-A(1): 154-160 (2005)
2004
10EEYasuyuki Sakai, Kouichi Sakurai: A New Attack with Side Channel Leakage During Exponent Recoding Computations. CHES 2004: 298-311
2003
9EEYasuyuki Sakai, Kouichi Sakurai: Timing Attack against Implementation of a Parallel Algorithm for Modular Exponentiation. ACNS 2003: 319-330
2002
8EEYasuyuki Sakai, Kouichi Sakurai: Algorithms for Efficient Simultaneous Elliptic Scalar Multiplication with Reduced Joint Hamming Weight Representation of Scalars. ISC 2002: 484-500
2001
7EEYasuyuki Sakai, Kouichi Sakurai: On the Power of Multidoubling in Speeding Up Elliptic Scalar Multiplication. Selected Areas in Cryptography 2001: 268-283
2000
6 Yasuyuki Sakai, Kouichi Sakurai: Efficient Scalar Multiplications on Elliptic Curves without Repeated Doublings and Their Practical Performance. ACISP 2000: 59-73
1999
5EESadao Kurohashi, Yasuyuki Sakai: Semantic Analysis of Japanese Noun Phrases - A New Approach to Dictionary-Based Understanding. ACL 1999
4 Yasuyuki Sakai: Over Fp vs. over F2n and on Pentium vs. on Alpha in Software Implementation of Hyperelliptic Curve Cryptosystems. ICISC 1999: 82-101
1998
3EEYasuyuki Sakai, Kouichi Sakurai: Design of Hyperelliptic Cryptosystems in Small Characteristic and a Software Implementation over F2n. ASIACRYPT 1998: 80-94
2EEYasuyuki Sakai, Kouichi Sakurai, Hirokazu Ishizuka: Secure Hyperelliptic Cryptosystems and Their Performances. Public Key Cryptography 1998: 164-181
1997
1 Yasuyuki Sakai, Kouichi Sakurai, Hirokazu Ishizuka: On weak RSA-keys produced from Pretty Good Privacy. ICICS 1997: 314-324

Coauthor Index

1Hirokazu Ishizuka [1] [2]
2Sadao Kurohashi [5]
3Kouichi Sakurai [1] [2] [3] [6] [7] [8] [9] [10] [11] [12] [13]

Colors in the list of coauthors

Copyright © Sun May 17 03:24:02 2009 by Michael Ley (ley@uni-trier.de)