• Publications
  • Influence
Implementation of Elliptic Curve Cryptographic Coprocessor over GF(2m) on an FPGA
We describe the implementation of an elliptic curve cryptographic (ECC) coprocessor over GF(2m) on an FPGA and also the result of simulations evaluating its LSI implementation. This coprocessor isExpand
  • 94
  • 14
Elliptic Curve Cryptosystem
This paper describes elliptic curve cryptosystems (ECCs), which are expected to become the next-generation public key cryptosystems, and also describes Fujitsu Laboratories’ study of ECCs. ECCsExpand
  • 160
  • 12
  • Open Access
Fast Implementation of Public-Key Cryptography ona DSP TMS320C6201
We propose new fast implementation method of public-key cryptography suitable for DSP. We improved modular multiplication and elliptic doubling to increase speed. For modular multiplication, weExpand
  • 84
  • 7
  • Open Access
The Block Cipher SC2000
In this paper, we propose a new symmetric key block cipher SC2000 with 128-bit block length and 128-,192-,256- bit key lengths. The block cipher is constructed by piling two layers: one is a FeistelExpand
  • 36
  • 5
Security evaluation of bistable ring PUFs on FPGAs using differential and linear analysis
Physically Unclonable Function (PUF) is expected to be an innovation for anti-counterfeiting devices for secure ID generation, authentication, etc. In this paper, we propose novel methods ofExpand
  • 13
  • 4
  • Open Access
DPA Countermeasure Based on the "Masking Method"
We propose a new differential power analysis (DPA) countermeasure based on the "masking method" proposed by Messerges [11]. We also evaluate the security of our method by introducing a new idea ofExpand
  • 40
  • 3
A new method for enhancing variety and maintaining reliability of PUF responses and its evaluation on ASICs
Physically unclonable functions (PUFs) are expected to provide a breakthrough in anti-counterfeiting devices for secure ID generation and authentication, etc. Factory-manufactured PUFs are generallyExpand
  • 8
  • 2
DPA Countermeasures by Improving the Window Method
We propose three differential power analysis (DPA) countermeasures for securing the public key cryptosystems. All countermeasures are based on the window method, and can be used in both RSA andExpand
  • 62
  • 1
  • Open Access
Design of high-speed and area-efficient Montgomery modular multiplier for RSA algorithm
High-speed and area-efficient Montgomery modular multipliers for RSA algorithm has been developed for digital signature and user authentication in high-speed network and smart card systems.Expand
  • 10
  • 1
A Spoofing Attack against a Cancelable Biometric Authentication Scheme
ID/password-based authentication is commonly used in network services. Some users set different ID/password pairs for different services, but other users reuse a pair of ID/password to otherExpand
  • 6
  • 1