Kazuyoshi Furukawa
Fujitsu
Network
Latest external collaboration on country level. Dive into details by clicking on the dots.
Publication
Featured researches published by Kazuyoshi Furukawa.
international conference on information and communication security | 2006
Kazuyoshi Furukawa; Masahiko Takenaka; Kouichi Itoh
We show the fastest implementation result of RSA on Itanium 2. For realizing the fast implementation, we improved the implementation algorithm of Montgomery multiplication proposed by Itoh et al. By using our implementation algorithm, pilepine delay is decreased than previous one on Itanium 2. And we implemented this algorithm with highly optimized for parallel processing. Our code can execute 4 instructions per cycle (At maximum, 6 instructions are executed per cycle on Itanium 2), and its probability of pipeline stalling is just only 5%. Our RSA implementation using this code performs 32 times per second of 4096-bit RSA decryption with CRT on Itanium 2 at 900MHz. As a result, our implementation of RSA is the fastest on Itanium2. This is 3.1 times faster than IPP, a software library developed by Intel, in the best case.
network-based information systems | 2017
Yuki Unno; Takanori Oikawa; Kazuyoshi Furukawa; Masanobu Morinaga; Masahiko Takenaka; Tetsuya Izu
This paper introduces the high-speed forensics technology that promptly analyzes the damage after the targeted cyber attack had been detected and visualizes the whole picture of the attack by binding the communication packets and users’ logs.
innovative mobile and internet services in ubiquitous computing | 2013
Kazuyoshi Furukawa; Masahiko Takenaka; Tetsuya Izu
With a rapid spread of the cloud computing, confidential data totalization technologies are becoming more important. In 2011, Ushida et al. proposed a confidential data totalization technique based on the value distortion, in which each data in a formulaic corss-tabulation table is randomized by a random data shared in a pre-provided random data table, and the cloud server is able to totalize the data by summing randomized data since the sum of the randomized table data is known to the server. So the cloud server does not require any specific functions for totalizing randomized data and no information is leaked to the cloud server. However, there are tow problems. The first problem is data leakage from randomized table data if the same random table is used twice or more. The second problem is the difficulty of appending new rows or columns to the random data table without reproviding them to the users. This paper introduces solutions for these problems: a table updating method for the random table and and a table extending method for the random table without any re-provisions. With the proposed solutions, the cost of the the secure table data analysis method for the update and the extension can be reduced extremely.
Archive | 2014
Tetsuya Izu; Yumi Sakemi; Kazuyoshi Furukawa; Hisashi Kojima; Masahiko Takenaka
Archive | 2010
Kouichi Itoh; Dai Yamamoto; Tetsuya Izu; Masahiko Takenaka; Kazuyoshi Furukawa
Archive | 2008
Kazuyoshi Furukawa; Masahiko Takenaka
Archive | 2014
Takao Ochiai; Kouichi Itoh; Dai Yamamoto; Kazuyoshi Furukawa; Masahiko Takenaka
Archive | 2010
Kazuyoshi Furukawa; Tetsuya Izu; Masahiko Takenaka; Masaya Yasuda
Archive | 2009
Kazuyoshi Furukawa; Kouichi Itoh; Masahiko Takenaka
Archive | 2013
Kazuyoshi Furukawa; Hisashi Kojima; Masahiko Takenaka; Tetsuya Izu