Tetsutaro Kobayashi

According to our database1, Tetsutaro Kobayashi authored at least 28 papers between 1999 and 2018.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2018
Exposure-Resilient Identity-Based Dynamic Multi-Cast Key Distribution.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2018

2017
Secure and Efficient Pairing at 256-Bit Security Level.
Proceedings of the Applied Cryptography and Network Security, 2017

2016
Multi-Cast Key Distribution: Scalable, Dynamic and Provably Secure Construction.
IACR Cryptol. ePrint Arch., 2016

2015
A construction of 3-dimensional lattice sieve for number field sieve over F_{p^n}.
IACR Cryptol. ePrint Arch., 2015

2014
An experiment of number field sieve for discrete logarithm problem over $\text{GF}(p^n)$.
JSIAM Lett., 2014

2013
id-eCK Secure ID-Based Authenticated Key Exchange on Symmetric and Asymmetric Pairing.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2013

Constructing Symmetric Pairings over Supersingular Elliptic Curves with Embedding Degree Three.
Proceedings of the Pairing-Based Cryptography - Pairing 2013, 2013

An Experiment of Number Field Sieve for Discrete Logarithm Problem over GF(p 12).
Proceedings of the Number Theory and Cryptography, 2013

2011
Anonymous Hierarchical Identity-Based Encryption with Short Ciphertexts.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2011

Faster MapToPoint on Supersingular Elliptic Curves in Characteristic 3.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2011

Self-correctors for Cryptographic Modules.
Proceedings of the Cryptography and Coding - 13th IMA International Conference, 2011

2010
Anonymizable Signature and Its Construction from Pairings.
Proceedings of the Pairing-Based Cryptography - Pairing 2010, 2010

An Improvement of Key Generation Algorithm for Gentry's Homomorphic Encryption Scheme.
Proceedings of the Advances in Information and Computer Security, 2010

2009
Anonymous Hierarchical Identity-Based Encryption with Constant Size Ciphertexts.
Proceedings of the Public Key Cryptography, 2009

Relinkable Ring Signature.
Proceedings of the Cryptology and Network Security, 8th International Conference, 2009

2007
Security of ESIGN-PSS.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2007

Efficient GF(3m) Multiplication Algorithm for eta T Pairing.
IACR Cryptol. ePrint Arch., 2007

2006
Candidate One-Way Functions on Non-Supersingular Elliptic Curves.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2006

Efficient Algorithms for Tate Pairing.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2006

Compressed Jacobian Coordinates for OEF.
Proceedings of the Progressin Cryptology, 2006

2005
Using the Elliptic Curve Signature Algorithm (ECDSA) for XML Digital Signatures.
RFC, April, 2005

2003
Efficient τ-Adic Sliding Window Method on Elliptic Curve Cryptosystems.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2003

A Cyclic Window Algorithm for Elliptic Curves over OEF.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2003

Lenient/Strict Batch Verification in Several Groups.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2003

2001
Elliptic Curve Arithmetic Using SIMD.
Proceedings of the Information Security, 4th International Conference, 2001

A Cyclic Window Algorithm for ECC Defined over Extension Fields.
Proceedings of the Information and Communications Security, Third International Conference, 2001

Public-Key-Based High-Speed Payment (Electronic Money) System Using Contact-Less Smart Cards.
Proceedings of the Smart Card Programming and Security, 2001

1999
Fast Elliptic Curve Algorithm Combining Frobenius Map and Table Reference to Adapt to Higher Characteristic.
Proceedings of the Advances in Cryptology, 1999


  Loading...