Shin-ichi Kawamura

Affiliations:
  • Toshiba Corporation, Kawasaki, Japan


According to our database1, Shin-ichi Kawamura authored at least 27 papers between 1986 and 2023.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2023
Non-Profiled Deep Learning-Based Side-Channel Analysis With Only One Network Training.
IEEE Access, 2023

2021
Efficient Algorithms for Sign Detection in RNS Using Approximate Reciprocals.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2021

2019
RNS Montgomery reduction algorithms using quadratic residuosity.
J. Cryptogr. Eng., 2019

2016
A Secure Communication Network Infrastructure Based on Quantum Key Distribution Technology.
IEICE Trans. Commun., 2016

Exact Error Bound of Cox-Rower Architecture for RNS Arithmetic.
IACR Cryptol. ePrint Arch., 2016

2014
Evaluation of Physical Unclonable Functions for 28-nm Process Field-Programmable Gate Arrays.
J. Inf. Process., 2014

2011
Power Analysis against a DPA-Resistant S-Box Implementation Based on the Fourier Transform.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2011

2010
BS-CPA: Built-In Determined Sub-Key Correlation Power Analysis.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2010

2009
Built-in Determined Sub-key Correlation Power Analysis.
IACR Cryptol. ePrint Arch., 2009

Security Evaluation of a DPA-Resistant S-Box Based on the Fourier Transform.
Proceedings of the Information and Communications Security, 11th International Conference, 2009

2008
Provably Secure Multisignatures in Formal Security Model and Their Optimality.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2008

2007
Toward the Fair Anonymous Signatures: Deniable Ring Signatures.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2007

2006
Special Section on Cryptography and Information Security.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2006

Formal Security Model of Multisignatures.
Proceedings of the Information Security, 9th International Conference, 2006

2005
An SPA-Based Extension of Schindler's Timing Attack against RSA Using CRT.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2005

On the Security of Probabilistic Multisignature Schemes and Their Optimality.
Proceedings of the Progress in Cryptology, 2005

2003
On the Security of Nested SPN Cipher against the Differential and Linear Cryptanalysis.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2003

RNS Montgomery Multiplication Algorithm for Duplicate Processing of Base Transformations.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2003

2001
Security Assessment of Hierocrypt and Rijndael against the Differential and Linear Cryptanalysis (Extended Abstract).
IACR Cryptol. ePrint Arch., 2001

Implementation of RSA Algorithm Based on RNS Montgomery Multiplication.
Proceedings of the Cryptographic Hardware and Embedded Systems, 2001

2000
The Block Cipher Hierocrypt.
Proceedings of the Selected Areas in Cryptography, 7th Annual International Workshop, 2000

Cox-Rower Architecture for Fast Parallel Montgomery Multiplication.
Proceedings of the Advances in Cryptology, 2000

Performance Evaluation of AES Finalists on the High-End Smart Card.
Proceedings of the Third Advanced Encryption Standard Candidate Conference, 2000

1993
Fast Server-Aided Secret Computation Protocols for Modular Exponentiation.
IEEE J. Sel. Areas Commun., 1993

1991
Cryptanalysis of Several Conference Key Distribution Schemes.
Proceedings of the Advances in Cryptology, 1991

1988
A Fast Modular Arithmetic Algorithm Using a Residue Table (Extended Abstract).
Proceedings of the Advances in Cryptology, 1988

1986
A TAP selection algorithm for adaptive filters.
Proceedings of the IEEE International Conference on Acoustics, 1986


  Loading...