Yasuyuki Sakai
E-mail: sakai@itslab.inf.kyushu-u.ac.jp
Affiliation:
Mitsubishi Electric Corporation, Senior Researcher, Information Technology R&D Center.
Publications:
Refereed journal pepars
- Yasuyuki Sakai, Kouichi Sakurai,
"On the Vulnerability of Exponent Recodings for the
Exponentiation against Side Channel Attacks,"
IEICE Transactions on Fundamentals of Electronics, Communications and
Computer Sciences,
E88A,
No.1,
pp.154-160,
2005.
- Yasuyuki Sakai, Kouichi Sakurai,
"Timing Attacks against a Parallelized RSA Implementation,"
IPSJ Journal,
Vol. 45,
No. 8,
pp.1813-1822,
2004.
- Yasuyuki Sakai, Kouichi Sakurai,
"An Efficient Representation of Scalars for Simultaneous
Elliptic Scalar Multiplication,"
IEICE Transactions on Fundamentals of Electronics, Communications and
Computer Sciences,
E86-A,
No.5,
pp.1135-1146,
2003.
- Yasuyuki Sakai, Kouichi Sakurai,
"Speeding Up Elliptic Scalar Multiplication Using Multidoubling,"
IEICE Transactions on Fundamentals
of Electronics, Communications and Computer Sciences,
E85-A,
No.5,
pp.1075-1083,
2002.
- Yasuyuki Sakai, Kouichi Sakurai,
"Efficient Scalar Multiplications on Elliptic Curves with Direct Computations
of Several Doublings,"
IEICE Transactions on Fundamentals of Electronics,
Communications and Computer Sciences,
E84-A,
No.1,
pp.120-129,
2001.
- Yasuyuki Sakai, Kouichi Sakurai,
"On the Practical Performance of Hyperelliptic Curve Cryptosystems
in Software Implementation,"
IEICE Transactions on Fundamentals of Electronics, Communications
and Computer Sciences,
E83-A,
No.4,
pp.692-703,
2000.
- Yasuyuki Sakai,Kouichi Sakurai,
"A Software Implementation of Hyperelliptic Cryptosystems over
Finite Fields F2n,"
IEICE Transactions on Fundamentals of Electronics, Communications
and Computer Sciences,
J82-A,
No.8,
pp.1305-1306,
1999.
- Yasuyuki Sakai, Hirokazu Ishizuka, Kouichi Sakurai,
"A security of a watermarking for copyright protection using wavelet transform",
IPSJ Journal,
Vol.38,
No.12,
pp.2640-2647,
1997.
Refereed conference papers
- Yasuyuki Sakai, Kouichi Sakurai,
"A New Attack with Side Channel Leakage during Exponent Recoding Computations,"
Cryptographic Hardware and Embedded Systems -- CHES 2004,
Lecture Notes in Computer Science 3156,
pp.298-311,
Springer-Verlag,
2004.
- Yasuyuki Sakai, Kouichi Sakurai,
"Timing Attack Against Implementation of a Parallel Algorithm for
Modular Exponentiation,"
First International Conference -- ACNS 2003,
Lecture Notes in Computer Science 2846,
pp.319-330,
Springer-Verlag,
2003.
- Yasuyuki Sakai, Kouichi Sakurai,
"Algorithms for Efficient Simultaneous Elliptic Scalar
Multiplication with Reduced Joint Hamming Weight Representation of Scalars,"
5th International Conference -- ISC 2002,
Lecture Notes in Computer Science 2433
pp.484-499,
Springer-Verlag,
2002.
- Yasuyuki Sakai, Kouichi Sakurai,
"On the Power of Multidoubling in Speeding Up Elliptic
Scalar Multiplication,"
Eighth Annual Workshop on Selected Areas in Cryptography -- SAC 2001,
Lecture Notes in Computer Science 2259,
pp.268-283,
Springer-Verlag,
2001.
- Yasuyuki Sakai, Kouichi Sakurai,
"Efficient Scalar Multiplications on Elliptic Curves without Repeated Doublings
and Their Practical Performance,"
The 5th Australian Conference on Information Security and Privacy -- ACISP 2000,
Lecture Notes in Computer Science 1841,
pp.314-324,
Springer-Verlag,
2000.
- Yasuyuki Sakai, Kouichi Sakurai,
"Over Fp vs. over F2n and on Pentium vs. on Alpha in Software Implementation
of Hyperelliptic Curve Cryptosystems,"
The 2nd International Conference on Information Security
and Cryptology -- ICISC '99,
Lecture Notes in Computer Science 1787,
Springer-Verlag,
pp.82-101,
2000.
- Yasuyuki Sakai, Kouichi Sakurai,
"Design of Hyperelliptic Cryptosystems in Small Characteristic and a Software
Implementation over F2n,"
Advances in Cryptology -- ASIACRYPT '98,
Lecture Notes in Computer Science 1514,
pp.80-94,
Springer-Verlag,
1998.
- Yasuyuki Sakai, Kouichi Sakurai, Hirokazu Ishizuka,
"Secure Hyperelliptic Cryptosystems and their Performance,"
First International Workshop on Practice and Theory in Public Key
Cryptography -- PKC'98,
Lecture Notes in Computer Science 1431,
pp.164--181,
Springer-Verlag,
1998.
- Yasuyuki Sakai, Kouichi Sakurai, Hirokazu Ishizuka,
"On Weak RSA-Keys Produced from Pretty Good Privacy,"
International Conference on Information and Communications Security -- ICICS '97,
Lecture Notes in Computer Science 1334,
pp.314-324,
Springer-Verlag,
1997.
Awards
- SCIS Award, (2000.1.24)
"Efficient Algorithms for Elliptic Curve Cryptosystems"