Author of the publication

On the Computational Sequence of Scalar Multiplication with Left-to-Right Recoded NAF and Sliding Window Technique.

, , and . IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 93-A (10): 1806-1812 (2010)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Laser Profiling for the Back-Side Fault Attacks: With a Practical Laser Skip Instruction Attack on AES., , and . CPSS@ASIACSS, page 99-103. ACM, (2015)Feasibility and Practicability of Standardized Cryptography on 4-bit Micro Controllers., , , , , and . Selected Areas in Cryptography, volume 7707 of Lecture Notes in Computer Science, page 184-201. Springer, (2012)Improvement on Ha-Moon Randomized Exponentiation Algorithm., , , and . ICISC, volume 3506 of Lecture Notes in Computer Science, page 154-167. Springer, (2004)On determining optimal parameters for testing devices against laser fault attacks., and . ISIC, page 1-4. IEEE, (2016)Modified Doubling Attack by Exploiting Chosen Ciphertext of Small Order., , and . IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 94-A (10): 1981-1990 (2011)Standardized Signature Algorithms on Ultra-constrained 4-Bit MCU., , , , , and . IWSEC, volume 7631 of Lecture Notes in Computer Science, page 37-50. Springer, (2012)SPA on MIST Exponentiation Algorithm with Multiple Computational Sequences., , and . CD-ARES Workshops, volume 8128 of Lecture Notes in Computer Science, page 222-235. Springer, (2013)On the Computational Sequence of Scalar Multiplication with Left-to-Right Recoded NAF and Sliding Window Technique., , and . IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 93-A (10): 1806-1812 (2010)Differential Fault Analysis on AES Key Schedule and Some Coutnermeasures., and . ACISP, volume 2727 of Lecture Notes in Computer Science, page 118-129. Springer, (2003)Memory Address Side-Channel Analysis on Exponentiation.. ICISC, volume 8949 of Lecture Notes in Computer Science, page 421-432. Springer, (2014)