What a lovely hat
Is it made out of
tin foil
?
DBLP data
CryptoDB
Cryptobib
Kouichi Itoh
Google Scholar
15
publications in security and cryptology related venues
Year
Venue
Title
2014
conf/asiajcis
Secret Sharing Scheme with Efficient Keyword Search for Cloud Storage.
Hiroaki Kikuchi
Kouichi Itoh
Mebae Ushida
Yuji Yamaoka
Takanori Oikawa
2012
journals/tifs
Guest Editorial Integrated Circuit and System Security.
Miodrag Potkonjak
Ramesh Karri
Ingrid Verbauwhede
Kouichi Itoh
2011
conf/acns
Exponent Blinding Does Not Always Lift (Partial) Spa Resistance to Higher-Level Security.
Werner Schindler
Kouichi Itoh
2011
conf/ches
Uniqueness Enhancement of PUF Responses Based on the Locations of Random Outputting RS Latches.
Dai Yamamoto
Kazuo Sakiyama
Mitsugu Iwamoto
Kazuo Ohta
Takao Ochiai
Masahiko Takenaka
Kouichi Itoh
2008
conf/ches
A Very Compact Hardware Implementation of the MISTY1 Block Cipher.
Dai Yamamoto
Jun Yajima
Kouichi Itoh
2008
conf/ctrsa
Small Secret Key Attack on a Variant of RSA (Due to Takagi).
Kouichi Itoh
Noboru Kunihiro
Kaoru Kurosawa
2006
conf/acns
Improving the Randomized Initial Point Countermeasure Against DPA.
Kouichi Itoh
Tetsuya Izu
Masahiko Takenaka
2006
conf/icics
A Fast RSA Implementation on Itanium 2 Processor.
Kazuyoshi Furukawa
Masahiko Takenaka
Kouichi Itoh
2003
conf/ches
A Practical Countermeasure against Address-Bit Differential Power Analysis.
Kouichi Itoh
Tetsuya Izu
Masahiko Takenaka
2002
conf/ches
DPA Countermeasures by Improving the Window Method.
Kouichi Itoh
Jun Yajima
Masahiko Takenaka
Naoya Torii
2002
conf/ches
Address-Bit Differential Power Analysis of Cryptographic Schemes OK-ECDH and OK-ECDSA.
Kouichi Itoh
Tetsuya Izu
Masahiko Takenaka
2001
conf/fse
The Block Cipher SC2000.
Takeshi Shimoyama
Hitoshi Yanami
Kazuhiro Yokoyama
Masahiko Takenaka
Kouichi Itoh
Jun Yajima
Naoya Torii
Hidema Tanaka
2001
conf/icisc
DPA Countermeasure Based on the "Masking Method".
Kouichi Itoh
Masahiko Takenaka
Naoya Torii
2000
conf/ches
Implementation of Elliptic Curve Cryptographic Coprocessor over GF(2<sup>m</sup>) on an FPGA.
Souichi Okada
Naoya Torii
Kouichi Itoh
Masahiko Takenaka
1999
conf/ches
Fast Implementation of Public-Key Cryptography ona DSP TMS320C6201.
Kouichi Itoh
Masahiko Takenaka
Naoya Torii
Syouji Temma
Yasushi Kurihara
Coauthors
Dai Yamamoto
(2)
Hidema Tanaka
(1)
Hiroaki Kikuchi
(1)
Hitoshi Yanami
(1)
Ingrid Verbauwhede
(1)
Jun Yajima
(3)
Kaoru Kurosawa
(1)
Kazuhiro Yokoyama
(1)
Kazuo Ohta
(1)
Kazuo Sakiyama
(1)
Kazuyoshi Furukawa
(1)
Kouichi Itoh
(15)
Masahiko Takenaka
(10)
Mebae Ushida
(1)
Miodrag Potkonjak
(1)
Mitsugu Iwamoto
(1)
Naoya Torii
(5)
Noboru Kunihiro
(1)
Ramesh Karri
(1)
Souichi Okada
(1)
Syouji Temma
(1)
Takanori Oikawa
(1)
Takao Ochiai
(1)
Takeshi Shimoyama
(1)
Tetsuya Izu
(3)
Werner Schindler
(1)
Yasushi Kurihara
(1)
Yuji Yamaoka
(1)
Filters
Crypto
Eurocrypt
Asiacrypt
Public Key Cryptography
Theory of Cryptography
Journal of Cryptology
Transactions on Symmetric Cryptology
Transactions on Cryptographic Hardware and Embedded Computing
Communications in Cryptology
Fast Software Encryption
Cryptographic Hardware and Embedded Computing Conference
Usenix Security
IEEE Security and Privacy
ACM CCS
Network and Distributed System Security
Financial cryptography
Cryptographer's Track at RSA Conference (CT-RSA)
ESORICS
IEEE Transactions on Information Forensics and Security
Computers & Security
Journal of Information Security and Applications
IEEE Conference on Blockchains and Cryptocurrency (ICBC)
Asia CCS
European Security & privacy
Symposium on Useful Privacy and Security
Privacy Enhancing Technologies
Security and Privacy in Communication Networks
Cryptology and Network Security
Annual Computer Security Applications Conference
Dependable Systems and Networks
IEEE Computer Security Foundations Workshop
IEEE Conference and Communications and Network Security
International Conference on Applied Cryptography and Network Security
Selected Areas in Cryptology
International Conference on Information Security and Cryptology (ICISC)
International Conference on Information and Communication (ICICS)
IFIP International Information Security Conference (SEC)
Conference on Security and Privacy in Wireless and Mobile Networks (WISEC)
IEEE International Symposium on Hardware Oriented Security and Trust
New Security Paradigms Workshop
Information Hiding and Multimedia Security Workshop
Australasian Conference on Information Security and Privacy
AfricaCrypt
LatinCrypt
International Conference on Cyber Security and Resilience
Asia Joint Conference on information Security
International Conference on information Security Applications
ACM Asia Public-Key Cryptography Workshop
International Workshop on Lightweight Cryptography for Security and Privacy
Workshop on Fault Detection and Tolerance in Cryptography
International Conference on Blockchain Technology and Emerging Technologies
Provable Security
Cloud Computing Security Workshop (CCSW)
International Workshop on Security (IWSEC)
International Conference on Information System Security (ICISS)
Select all
Unselect all
Years:
to