酒井 康行 (Yasuyuki Sakai)

sakai@itslab.inf.kyushu-u.ac.jp


所属

三菱電機株式会社 情報技術総合研究所

経歴

1992年(平成4年)3月 早稲田大学 大学院 理工学研究科 修了
1992年(平成4年)4月 三菱電機株式会社 情報技術総合研究所入社
現在に至る
2005年(平成17年)3月 九州大学大学院システム情報科学府博士後期課程 修了

   [受賞] SCIS論文賞, 受賞論文: "楕円曲線暗号系に対するソフトウエア向け高速算法"(2000年)

著作,出版物リスト

ジャーナル(査読有り)
  1. Yasuyuki Sakai, Kouichi Sakurai, "On the Vulnerability of Exponent Recodings for the Exponentiation against Side Channel Attacks," IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences, E88A, No.1, pp.154-160, 2005.
  2. Yasuyuki Sakai, Kouichi Sakurai, "Timing Attacks against a Parallelized RSA Implementation," IPSJ Journal, Vol. 45, No. 8, pp.1813-1822, 2004.
  3. Yasuyuki Sakai, Kouichi Sakurai, "An Efficient Representation of Scalars for Simultaneous Elliptic Scalar Multiplication," IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences, E86-A, No.5, pp.1135-1146, 2003.
  4. Yasuyuki Sakai, Kouichi Sakurai, "Speeding Up Elliptic Scalar Multiplication Using Multidoubling," IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences, E85-A, No.5, pp.1075-1083, 2002.
  5. Yasuyuki Sakai, Kouichi Sakurai, "Efficient Scalar Multiplications on Elliptic Curves with Direct Computations of Several Doublings," IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences, E84-A, No.1, pp.120-129, 2001.
  6. Yasuyuki Sakai, Kouichi Sakurai, "On the Practical Performance of Hyperelliptic Curve Cryptosystems in Software Implementation," IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences, E83-A, No.4, pp.692-703, 2000.
  7. Yasuyuki Sakai,Kouichi Sakurai, "A Software Implementation of Hyperelliptic Cryptosystems over Finite Fields F2n," IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences, J82-A, No.8, pp.1305-1306, 1999.
  8. 酒井 康行,石塚 裕一,櫻井 幸一, "著作権保護のためのウェーブレット変換を用いた電子透かし方式の安全性評価," 情報処理学会論文誌, Vol.38, No.12, pp.2640-2647, 1997.
国際会議(査読有り)
  1. Yasuyuki Sakai, Kouichi Sakurai, "A New Attack with Side Channel Leakage during Exponent Recoding Computations," Cryptographic Hardware and Embedded Systems -- CHES 2004, Lecture Notes in Computer Science 3156, pp.298-311, Springer-Verlag, 2004.
  2. Yasuyuki Sakai, Kouichi Sakurai, "Timing Attack Against Implementation of a Parallel Algorithm for Modular Exponentiation," First International Conference -- ACNS 2003, Lecture Notes in Computer Science 2846, pp.319-330, Springer-Verlag, 2003.
  3. Yasuyuki Sakai, Kouichi Sakurai, "Algorithms for Efficient Simultaneous Elliptic Scalar Multiplication with Reduced Joint Hamming Weight Representation of Scalars," 5th International Conference -- ISC 2002, Lecture Notes in Computer Science 2433 pp.484-499, Springer-Verlag, 2002.
  4. Yasuyuki Sakai, Kouichi Sakurai, "On the Power of Multidoubling in Speeding Up Elliptic Scalar Multiplication," Eighth Annual Workshop on Selected Areas in Cryptography -- SAC 2001, Lecture Notes in Computer Science 2259, pp.268-283, Springer-Verlag, 2001.
  5. Yasuyuki Sakai, Kouichi Sakurai, "Efficient Scalar Multiplications on Elliptic Curves without Repeated Doublings and Their Practical Performance," The 5th Australian Conference on Information Security and Privacy -- ACISP 2000, Lecture Notes in Computer Science 1841, pp.314-324, Springer-Verlag, 2000.
  6. Yasuyuki Sakai, Kouichi Sakurai, "Over Fp vs. over F2n and on Pentium vs. on Alpha in Software Implementation of Hyperelliptic Curve Cryptosystems," The 2nd International Conference on Information Security and Cryptology -- ICISC '99, Lecture Notes in Computer Science 1787, Springer-Verlag, pp.82-101, 2000.
  7. Yasuyuki Sakai, Kouichi Sakurai, "Design of Hyperelliptic Cryptosystems in Small Characteristic and a Software Implementation over F2n," Advances in Cryptology -- ASIACRYPT '98, Lecture Notes in Computer Science 1514, pp.80-94, Springer-Verlag, 1998.
  8. Yasuyuki Sakai, Kouichi Sakurai, Hirokazu Ishizuka, "Secure Hyperelliptic Cryptosystems and their Performance," First International Workshop on Practice and Theory in Public Key Cryptography -- PKC'98, Lecture Notes in Computer Science 1431, pp.164--181, Springer-Verlag, 1998.
  9. Yasuyuki Sakai, Kouichi Sakurai, Hirokazu Ishizuka, "On Weak RSA-Keys Produced from Pretty Good Privacy," International Conference on Information and Communications Security -- ICICS '97, Lecture Notes in Computer Science 1334, pp.314-324, Springer-Verlag, 1997.