• Publications
  • Influence
A More Compact Representation of XTR Cryptosystem
TLDR
We propose a new variant of XTR cryptosystem over finite fields with characteristic three whose compression ratio is 1/6. Expand
  • 15
  • 4
  • PDF
Efficient Implementation of Pairing-Based Cryptography on a Sensor Node
TLDR
We improved the speed of pairing over MICAz by using a new efficient multiplication specialized for ATmega128L, called the block comb method and several optimization techniques. Expand
  • 33
  • 3
  • PDF
Side Channel Attacks and Countermeasures on Pairing Based Cryptosystems over Binary Fields
TLDR
Pairings on elliptic curves have been used as cryptographic primitives for the development of new applications such as identity based schemes. Expand
  • 28
  • 3
  • PDF
Countermeasures against Power Analysis Attacks for the NTRU Public Key Cryptosystem
TLDR
We show that a typical software implementation of NTRU is vulnerable to the simple power analysis and the correlation power analysis including a second-order power attack. Expand
  • 31
  • 3
Improved Computation of Square Roots in Specific Finite Fields
TLDR
In this paper, we study exponentiation in the specific finite fields F, with very special exponents such as those that occur in algorithms for computing square roots. Expand
  • 22
  • 3
Side Channel Attack on Ha-Moon's Countermeasure of Randomized Signed Scalar Multiplication
TLDR
We propose a novel attack against Ha-Moon’s countermeasure against side channel attacks in elliptic curve cryptosystems, and show that the counterme measure is vulnerable to the proposed attack. Expand
  • 18
  • 2
Some Analysis of Radix-r Representations
  • D. Han, T. Takagi
  • Mathematics, Computer Science
  • IACR Cryptol. ePrint Arch.
  • 2005
TLDR
We deal with the radix-r representation used for the scalar multiplication of pairing-based cryptosystems with characteristic r and propose a secure countermeasure. Expand
  • 7
  • 2
  • PDF
TinyECCK: Efficient Elliptic Curve Cryptography Implementation over GF(2m) on 8-Bit Micaz Mote
TLDR
In this paper, we revisit a generally accepted opinion: implementing Elliptic Curve Cryptosystem (ECC) over GF(2m) on sensor motes using small word size is not appropriate because XOR multiplication is not efficiently supported by current low-powered microprocessors. Expand
  • 49
  • 1
  • PDF
Chosen ciphertext Simple Power Analysis on software 8-bit implementation of ring-LWE encryption
  • Aesun Park, D. Han
  • Computer Science
  • IEEE Asian Hardware-Oriented Security and Trust…
  • 1 December 2016
TLDR
We propose the first SPA attack on an unprotected ring-LWE public-key scheme, which is optimized by the Roy et al. scheme. Expand
  • 16
  • 1