Dr. Katsuyuki Okeya

E-mail: okeya@itslab.inf.kyushu-u.ac.jp

Affiliation:

Hitachi, Ltd., Systems Development Laboratory Security Systems Research Dept.


Resume:

Education
Apr. 1990 - Mar. 1994Toyama University
(Mar. 1994) Bachelor of Science in Mathematics (B.S.)
Apr. 1994 - Mar. 1998Graduate School of Kyushu University
(Mar. 1996) Master of Science in Mathematics (M.S.)
Apr. 2002 - Mar. 2004Graduate School of Information Science and Electrical Engineering, Kyushu University
(Mar. 2004) Doctor of Engineering (Dr.Eng.)
Professional Experience
Apr. 1998 - Jul. 2001Hitachi, Ltd., Software Division
Jul. 2001 - presentHitachi, Ltd., Systems Development Laboratory

Scientific Activities:

Serve in the technical program committee of
  • CHES 2003 (The Fifth International Workshop on Cryptographic Hardware and Embedded Systems), Cologne, Germany, Sept. 8-10, 2003

  • My publications:

    Refereed conference papers
    1. Katsuyuki Okeya, Tsuyoshi Takagi, Camille Vuillaume, ``On the Importance of $\Delta$ in SFLASH (NESSIE Finalist)'', to appear in International Conference on Information Technology (ITCC 2004).
    2. Katsuyuki Okeya, Dong-Guk Han, ``Side Channel Attack on Ha-Moon's Countermeasure of Randomized Signed Scalar Multiplication'', Indocrypt 2003, LNCS 2904, pp.334-348, (2003).
    3. Katsuyuki Okeya, Tsuyoshi Takagi, ``A More Flexible Countermeasure against Side Channel Attacks using Window Method'', Cryptographic Hardware and Embedded System (CHES 2003), LNCS 2779, pp.397-410, (2003).
    4. Katsuyuki Okeya, Tsuyoshi Takagi, ``The Width-w NAF Method Provides Small Memory and Fast Elliptic Scalar Multiplications Secure against Side Channel Attacks'', RSA conference cryptographer's track (CT-RSA 2003), LNCS 2612, pp.328-342, (2003).
    5. Katsyuki Okeya, Kouichi Sakurai, ``A Multiple Power Analysis Breaks the Advanced Version of the Randomized Addition-Subtraction Chains Countermeasure against Side Channel Attacks'', in the proceedings of 2003 IEEE Information Theory Workshop (ITW 2003), pp.175-178, (2003).
    6. Katsuyuki Okeya, Kouichi Sakurai, ``A Second-Order DPA Attack Breaks a Window-method based Countermeasure against Side Channel Attacks'', Information Security Conference (ISC 2002), LNCS2433, pp.389-401, (2002).
    7. Katsuyuki Okeya, Kouichi Sakurai, ``Fast Multi-Scalar Multiplication Methods on Elliptic Curves with Precomputation Strategy using Montgomery Trick'', Cryptographic Hardware and Embedded System (CHES 2002), LNCS2523, pp.564-578, (2002).
    8. Katsuyuki Okeya, Kouichi Sakurai, ``On Insecurity of the Side Channel Attack Countermeasure using Addition-Subtraction Chains under Distinguishability between Addition and Doubling'', Information Security and Privacy, 7th Australasian Conference (ACISP 2002), LNCS2384, pp.420-435, (2002).
    9. Katsuyuki Okeya, Kunihiko Miyazaki, Kouichi Sakurai, ``A Fast Scalar Multiplication Method with Randomized Projective Coordinates on a Montgomery-form Elliptic Curve Secure against Side Channel Attacks'', The 4th International Conference on Information Security and Cryptology (ICISC 2001), LNCS2288, pp.428-439, (2002).
    10. Katsuyuki Okeya, Kouichi Sakurai, ``Efficient Elliptic Curve Cryptosystems from a Scalar Multiplication Algorithm with Recovery of the $y$-Coordinate on a Montgomery-Form Elliptic Curve'', Cryptographic Hardware and Embedded System (CHES 2001), LNCS2162, pp.126-141, (2001).
    11. Katsuyuki Okeya, Kouichi Sakurai, ``Power Analysis Breaks Elliptic Curve Cryptosystems even Secure against the Timing Attack'', Progress in Cryptology - INDOCRYPT 2000, LNCS1977, pp.178-190, (2000).
    12. Katsuyuki Okeya, Hiroyuki Kurumatani, Kouichi Sakurai, ``Elliptic Curves with the Montgomery-Form and Their Cryptographic Applications'', Public Key Cryptography (PKC 2000), LNCS1751, pp.238-257, (2000).
    Refereed journal pepars
    1. Katsuyuki Okeya, Tsuyoshi Takagi, ``SCA-resistant and Fast Elliptic Scalar Multiplication based on wNAF'', IEICE Trans. Fundamentals, Special Section on Cryptography and Information Security 2004. pp.75-84, (2004).
    2. Katsuyuki Okeya, Kouichi Sakurai, ``A Second-Order Differential Power Analysis Breaks a Window-method based Countermeasure against Side Channel Attacks'', IPSJ Jour., Vol.44, No.8, Special Issue on Computer Security: Combating Emerging Threats, pp.1938-1946, (2003). (In Japanese)
    3. Katsuyuki Okeya, Kouichi Sakurai, ``A Multiple Power Analysis Breaks the Advanced Version of the Randomized Addition-Subtraction Chains Countermeasure against Side Channel Attacks'', IPSJ Jour., Vol.44, No.8, Special Issue on Computer Security: Combating Emerging Threats, pp.1924-1937, (2003). (In Japanese)
    4. Katsuyuki Okeya, Kouichi Sakurai, ``A Simple Power Attack On a Randomized Addition-Subtraction Chains Method for Elliptic Curve Cryptosystems'', IEICE Trans. Fundamentals, Special Section on Discrete Mathematics and Its Applications 2003, pp.1171-1180, (2003).
    5. Katsuyuki Okeya, Kouichi Sakurai, ``Use of Montgomery Trick in Precomputation of Multi-Scalar Multiplication in Elliptic Curve Cryptosystem'', IEICE Trans. Fundamentals, Vol.E86-A No.1 Special Section on Cryptography and Information Security 2003, pp.98-112, (2003).
    6. Katsuyuki Okeya, Kunihiko Miyazaki, Kouichi Sakurai, ``A Note on the Number of Montgomery-form Elliptic Curves for Cryptosystem'', Japan Jour. of Industrial and Applied Mathematics, Vol.12, No.4, pp.255-268, (2002). (In Japanese)
    7. Katsuyuki Okeya, Kunihiko Miyazaki, Kouichi Sakurai, ``An Efficient Countermeasure to Side Channel Attacks on ECC using Randomized Projective Coordinates - A Theoretical Approach'', IPSJ Jour., Vol.43, No.8, pp.2631-2643, (2002). (In Japanese)
    8. Katsuyuki Okeya, Kouichi Sakurai, ``A Scalar Multiplication Algorithm with Recovery of the y-Coordinate on the Montgomery Form and Analysis of Efficiency for Elliptic Curve Cryptosystems'', IEICE Trans. Fundamentals, Vol.E85-A No.1 Special Section on Cryptography and Information Security 2002, pp.84-93, (2002).
    Doctor thesis
    1. ``A Study on Side Channel Cryptanalysis in Elliptic Curve Cryptosystems'', Graduate School of Information Science and Electrical Engineering, Kyushu University, (2004). abstract