• Publications
  • Influence
Implementation of Elliptic Curve Cryptographic Coprocessor over GF(2m) on an FPGA
We describe the implementation of an elliptic curve cryptographic (ECC) coprocessor over GF(2m) on an FPGA and also the result of simulations evaluating its LSI implementation. This coprocessor isExpand
  • 94
  • 14
Variety enhancement of PUF responses using the locations of random outputting RS latches
Physical Unclonable Functions (PUFs) are expected to represent an important solution for secure ID generation and authentication etc. In general, manufactured PUFs are considered to be more secureExpand
  • 29
  • 8
Fast Implementation of Public-Key Cryptography ona DSP TMS320C6201
We propose new fast implementation method of public-key cryptography suitable for DSP. We improved modular multiplication and elliptic doubling to increase speed. For modular multiplication, weExpand
  • 84
  • 7
  • Open Access
Efficient Countermeasures against Power Analysis for Elliptic Curve Cryptosystems
The power analysis on smart cards is a real threat for cryptographic applications. In spite of continuous efforts of previous countermeasures, recent improved and sophisticated attacks againstExpand
  • 32
  • 7
Address-Bit Differential Power Analysis of Cryptographic Schemes OK-ECDH and OK-ECDSA
The differential power analysis (DPA) is a powerful attack against the implementation of cryptographic schemes on mobile devices. This paper proposes an alternative DPA using the addresses ofExpand
  • 86
  • 6
  • Open Access
The Block Cipher SC2000
In this paper, we propose a new symmetric key block cipher SC2000 with 128-bit block length and 128-,192-,256- bit key lengths. The block cipher is constructed by piling two layers: one is a FeistelExpand
  • 36
  • 5
Security evaluation of bistable ring PUFs on FPGAs using differential and linear analysis
Physically Unclonable Function (PUF) is expected to be an innovation for anti-counterfeiting devices for secure ID generation, authentication, etc. In this paper, we propose novel methods ofExpand
  • 13
  • 4
  • Open Access
PIATS: A Partially Sanitizable Signature Scheme
In e-government or e-tax payment systems, appropriate alterations on digitally signed documents are required to hide personal information, namely privacy. Standard digital signature schemes do notExpand
  • 38
  • 3
DPA Countermeasure Based on the "Masking Method"
We propose a new differential power analysis (DPA) countermeasure based on the "masking method" proposed by Messerges [11]. We also evaluate the security of our method by introducing a new idea ofExpand
  • 40
  • 3
A Practical Countermeasure against Address-Bit Differential Power Analysis
The differential power analysis (DPA) enables an adversary to reveal the secret key hidden in a smart card by observing power consumption. The address-bit DPA is a typical example of DPA whichExpand
  • 58
  • 2