Yumi Sakemi

According to our database1, Yumi Sakemi authored at least 19 papers between 2008 and 2018.

Collaborative distances:
  • Dijkstra number2 of five.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2018
Secure and Long-Lived Wireless Sensor Network for Data Center Monitoring.
Proceedings of the 2018 IEEE 42nd Annual Computer Software and Applications Conference, 2018

2015
SPIKE: Scalable Peer Intermediaries for Key Establishment in Sensor Networks.
Proceedings of the 18th International Conference on Network-Based Information Systems, 2015

2014
Privacy-Preserving Technology for Secure Utilization of Sensor Data (Extended Abstract).
Proceedings of the Eighth International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing, 2014

A Spoofing Attack against a Cancelable Biometric Authentication Scheme.
Proceedings of the 28th IEEE International Conference on Advanced Information Networking and Applications, 2014

2013
Faster Scalar Multiplication for Elliptic Curve Cryptosystems.
Proceedings of the 16th International Conference on Network-Based Information Systems, 2013

2012
Solving a Discrete Logarithm Problem with Auxiliary Input on a 160-Bit Elliptic Curve.
Proceedings of the Public Key Cryptography - PKC 2012, 2012

2011
An Improvement of Twisted Ate Pairing Efficient for Multi-Pairing and Thread Computing.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2011

Detailed Cost Estimation of CNTW Forgery Attack against EMV Signature Scheme.
IEICE Trans. Inf. Syst., 2011

Solving DLP with Auxiliary Input over an Elliptic Curve Used in TinyTate Library.
Proceedings of the Information Security Theory and Practice. Security and Privacy of Mobile Devices in Wireless Communication, 2011

Solving a DLP with Auxiliary Input with the ρ-Algorithm.
Proceedings of the Information Security Applications - 12th International Workshop, 2011

Detailed Cost Estimation of CNTW Attack against EMV Signature Scheme.
Proceedings of the Financial Cryptography and Data Security, 2011

2010
Two Improvements of Twisted Ate Pairing with Barreto-Naehrig Curve by Dividing Miller's Algorithm.
Adv. Inf. Sci. Serv. Sci., 2010

Accelerating Cross Twisted Ate Pairing with Ordinary Pairing Friendly Curve of Composite Order That Has Two Large Prime Factors.
Proceedings of the 13th International Conference on Network-Based Information Systems, 2010

2009
Scalar Multiplication Using Frobenius Expansion over Twisted Elliptic Curve for Ate Pairing Based Cryptography.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2009

Integer Variable chi-Based Cross Twisted Ate Pairing and Its Optimization for Barreto-Naehrig Curve.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2009

Cross twisted Xate pairing with Barreto-Naehrig curve for multi-pairing technique.
Proceedings of the IEEE International Symposium on Information Theory, 2009

Accelerating Twisted Ate Pairing with Frobenius Map, Small Scalar Multiplication, and Multi-pairing.
Proceedings of the Information, Security and Cryptology, 2009

2008
Integer Variable chi-Based Ate Pairing.
Proceedings of the Pairing-Based Cryptography, 2008

Skew Frobenius Map and Efficient Scalar Multiplication for Pairing-Based Cryptography.
Proceedings of the Cryptology and Network Security, 7th International Conference, 2008


  Loading...