Shigenori Uchiyama
According to our database1,
Shigenori Uchiyama
authored at least 39 papers
between 1998 and 2023.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
On csauthors.net:
Bibliography
2023
Cryptogr., March, 2023
2022
JSIAM Lett., 2022
2021
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2021
2019
Proceedings of the Advances in Information and Computer Security, 2019
2016
The optimal ate pairing over the Barreto-Naehrig curve via parallelizing elliptic nets.
JSIAM Lett., 2016
Faster Explicit Formulae for Computing Pairings via Elliptic Nets and Their Parallel Computation.
Proceedings of the Advances in Information and Computer Security, 2016
2015
JSIAM Lett., 2015
2014
The elliptic curve Diffie-Hellman problem and an equivalent hard problem for elliptic divisibility sequences.
JSIAM Lett., 2014
Scalar multiplication for twisted Edwards curves using the extended double-base number system.
JSIAM Lett., 2014
Implementation of an Elliptic Curve Scalar Multiplication Method Using Division Polynomials.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2014
2012
JSIAM Lett., 2012
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2012
Proceedings of the Pairing-Based Cryptography - Pairing 2012, 2012
2011
On the reduction attack against the algebraic surface public-key cryptosystem(ASC04).
JSIAM Lett., 2011
2010
Erratum to "Cryptanalysis of the birational permutation signature scheme over a non-commutative ring" [JSIAM Letters, 2 (2010), 85-88].
JSIAM Lett., 2010
Cryptanalysis of the birational permutation signature scheme over a non-commutative ring.
JSIAM Lett., 2010
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2010
An Improvement of Key Generation Algorithm for Gentry's Homomorphic Encryption Scheme.
Proceedings of the Advances in Information and Computer Security, 2010
2009
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2009
2008
IACR Cryptol. ePrint Arch., 2008
2007
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2007
Non-optimistic Secure Circuit Evaluation Based on ElGamal Encryption and Its Applications.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2007
2006
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2006
2005
Proceedings of the Information Security Applications, 6th International Workshop, 2005
2004
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2004
2003
Generating Secure Genus Two Hyperelliptic Curves Using Elkies' Point Counting Algorithm.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2003
2002
A New Factoring Method of Integers <i>N</i>=<i>p</i><sup>r</sup> ✕ <i>q</i> for Large <i>r</i>.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2002
Nonuniform Polynomial Time Algorithm to Solve Decisional Diffie-Hellman Problem in Finite Fields under Conjecture.
Proceedings of the Topics in Cryptology, 2002
2000
1998
Proceedings of the Advances in Cryptology - EUROCRYPT '98, International Conference on the Theory and Application of Cryptographic Techniques, Espoo, Finland, May 31, 1998
Proceedings of the Advances in Cryptology - EUROCRYPT '98, International Conference on the Theory and Application of Cryptographic Techniques, Espoo, Finland, May 31, 1998