Network


Latest external collaboration on country level. Dive into details by clicking on the dots.

Hotspot


Dive into the research topics where Kazuyoshi Furukawa is active.

Publication


Featured researches published by Kazuyoshi Furukawa.


international conference on information and communication security | 2006

A fast RSA implementation on itanium 2 processor

Kazuyoshi Furukawa; Masahiko Takenaka; Kouichi Itoh

We show the fastest implementation result of RSA on Itanium 2. For realizing the fast implementation, we improved the implementation algorithm of Montgomery multiplication proposed by Itoh et al. By using our implementation algorithm, pilepine delay is decreased than previous one on Itanium 2. And we implemented this algorithm with highly optimized for parallel processing. Our code can execute 4 instructions per cycle (At maximum, 6 instructions are executed per cycle on Itanium 2), and its probability of pipeline stalling is just only 5%. Our RSA implementation using this code performs 32 times per second of 4096-bit RSA decryption with CRT on Itanium 2 at 900MHz. As a result, our implementation of RSA is the fastest on Itanium2. This is 3.1 times faster than IPP, a software library developed by Intel, in the best case.


network-based information systems | 2017

High-Speed Forensic Technology Against Targeted Cyber Attacks (Extended Abstract)

Yuki Unno; Takanori Oikawa; Kazuyoshi Furukawa; Masanobu Morinaga; Masahiko Takenaka; Tetsuya Izu

This paper introduces the high-speed forensics technology that promptly analyzes the damage after the targeted cyber attack had been detected and visualizes the whole picture of the attack by binding the communication packets and users’ logs.


innovative mobile and internet services in ubiquitous computing | 2013

Improving the Confidential Data Totalization

Kazuyoshi Furukawa; Masahiko Takenaka; Tetsuya Izu

With a rapid spread of the cloud computing, confidential data totalization technologies are becoming more important. In 2011, Ushida et al. proposed a confidential data totalization technique based on the value distortion, in which each data in a formulaic corss-tabulation table is randomized by a random data shared in a pre-provided random data table, and the cloud server is able to totalize the data by summing randomized data since the sum of the randomized table data is known to the server. So the cloud server does not require any specific functions for totalizing randomized data and no information is leaked to the cloud server. However, there are tow problems. The first problem is data leakage from randomized table data if the same random table is used twice or more. The second problem is the difficulty of appending new rows or columns to the random data table without reproviding them to the users. This paper introduces solutions for these problems: a table updating method for the random table and and a table extending method for the random table without any re-provisions. With the proposed solutions, the cost of the the secure table data analysis method for the update and the extension can be reduced extremely.


Archive | 2014

NODE DEVICE AND COMMUNICATION CONTROL METHOD

Tetsuya Izu; Yumi Sakemi; Kazuyoshi Furukawa; Hisashi Kojima; Masahiko Takenaka


Archive | 2010

Elliptic curve arithmetic processing unit and elliptic curve arithmetic processing program and method

Kouichi Itoh; Dai Yamamoto; Tetsuya Izu; Masahiko Takenaka; Kazuyoshi Furukawa


Archive | 2008

Modular multiplication calculation apparatus used for Montgomery method

Kazuyoshi Furukawa; Masahiko Takenaka


Archive | 2014

ENCRYPTION PROCESSING DEVICE AND AUTHENTICATION METHOD

Takao Ochiai; Kouichi Itoh; Dai Yamamoto; Kazuyoshi Furukawa; Masahiko Takenaka


Archive | 2010

CONTENTS PROCESSING DEVICE AND CONTENTS PARTIAL INTEGRITY ASSURANCE METHOD

Kazuyoshi Furukawa; Tetsuya Izu; Masahiko Takenaka; Masaya Yasuda


Archive | 2009

Embedded device having countermeasure function against fault attack

Kazuyoshi Furukawa; Kouichi Itoh; Masahiko Takenaka


Archive | 2013

Key setting method, node, and network system

Kazuyoshi Furukawa; Hisashi Kojima; Masahiko Takenaka; Tetsuya Izu

Collaboration


Dive into the Kazuyoshi Furukawa's collaboration.

Researchain Logo
Decentralizing Knowledge