- Yasuyuki Sakai, Kouichi Sakurai, "On the Vulnerability of Exponent Recodings for the Exponentiation against Side Channel Attacks," IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences, E88A, No.1, pp.154-160, 2005.
- Yasuyuki Sakai, Kouichi Sakurai, "Timing Attacks against a Parallelized RSA Implementation," IPSJ Journal, Vol. 45, No. 8, pp.1813-1822, 2004.
- Yasuyuki Sakai, Kouichi Sakurai, "An Efficient Representation of Scalars for Simultaneous Elliptic Scalar Multiplication," IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences, E86-A, No.5, pp.1135-1146, 2003.
- Yasuyuki Sakai, Kouichi Sakurai, "Speeding Up Elliptic Scalar Multiplication Using Multidoubling," IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences, E85-A, No.5, pp.1075-1083, 2002.
- Yasuyuki Sakai, Kouichi Sakurai, "Efficient Scalar Multiplications on Elliptic Curves with Direct Computations of Several Doublings," IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences, E84-A, No.1, pp.120-129, 2001.
- Yasuyuki Sakai, Kouichi Sakurai, "On the Practical Performance of Hyperelliptic Curve Cryptosystems in Software Implementation," IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences, E83-A, No.4, pp.692-703, 2000.
- Yasuyuki Sakai,Kouichi Sakurai, "A Software Implementation of Hyperelliptic Cryptosystems over Finite Fields F2n," IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences, J82-A, No.8, pp.1305-1306, 1999.
- Yasuyuki Sakai, Hirokazu Ishizuka, Kouichi Sakurai, "A security of a watermarking for copyright protection using wavelet transform", IPSJ Journal, Vol.38, No.12, pp.2640-2647, 1997.

- Yasuyuki Sakai, Kouichi Sakurai, "A New Attack with Side Channel Leakage during Exponent Recoding Computations," Cryptographic Hardware and Embedded Systems -- CHES 2004, Lecture Notes in Computer Science 3156, pp.298-311, Springer-Verlag, 2004.
- Yasuyuki Sakai, Kouichi Sakurai, "Timing Attack Against Implementation of a Parallel Algorithm for Modular Exponentiation," First International Conference -- ACNS 2003, Lecture Notes in Computer Science 2846, pp.319-330, Springer-Verlag, 2003.
- Yasuyuki Sakai, Kouichi Sakurai, "Algorithms for Efficient Simultaneous Elliptic Scalar Multiplication with Reduced Joint Hamming Weight Representation of Scalars," 5th International Conference -- ISC 2002, Lecture Notes in Computer Science 2433 pp.484-499, Springer-Verlag, 2002.
- Yasuyuki Sakai, Kouichi Sakurai, "On the Power of Multidoubling in Speeding Up Elliptic Scalar Multiplication," Eighth Annual Workshop on Selected Areas in Cryptography -- SAC 2001, Lecture Notes in Computer Science 2259, pp.268-283, Springer-Verlag, 2001.
- Yasuyuki Sakai, Kouichi Sakurai, "Efficient Scalar Multiplications on Elliptic Curves without Repeated Doublings and Their Practical Performance," The 5th Australian Conference on Information Security and Privacy -- ACISP 2000, Lecture Notes in Computer Science 1841, pp.314-324, Springer-Verlag, 2000.
- Yasuyuki Sakai, Kouichi Sakurai, "Over Fp vs. over F2n and on Pentium vs. on Alpha in Software Implementation of Hyperelliptic Curve Cryptosystems," The 2nd International Conference on Information Security and Cryptology -- ICISC '99, Lecture Notes in Computer Science 1787, Springer-Verlag, pp.82-101, 2000.
- Yasuyuki Sakai, Kouichi Sakurai, "Design of Hyperelliptic Cryptosystems in Small Characteristic and a Software Implementation over F2n," Advances in Cryptology -- ASIACRYPT '98, Lecture Notes in Computer Science 1514, pp.80-94, Springer-Verlag, 1998.
- Yasuyuki Sakai, Kouichi Sakurai, Hirokazu Ishizuka, "Secure Hyperelliptic Cryptosystems and their Performance," First International Workshop on Practice and Theory in Public Key Cryptography -- PKC'98, Lecture Notes in Computer Science 1431, pp.164--181, Springer-Verlag, 1998.
- Yasuyuki Sakai, Kouichi Sakurai, Hirokazu Ishizuka, "On Weak RSA-Keys Produced from Pretty Good Privacy," International Conference on Information and Communications Security -- ICICS '97, Lecture Notes in Computer Science 1334, pp.314-324, Springer-Verlag, 1997.

- SCIS Award, (2000.1.24) "Efficient Algorithms for Elliptic Curve Cryptosystems"