2007 |
5 | EE | Tetsuya Izu,
Jun Kogure,
Takeshi Shimoyama:
CAIRN 2: An FPGA Implementation of the Sieving Step in the Number Field Sieve Method.
CHES 2007: 364-377 |
4 | EE | Tetsuya Izu,
Jun Kogure,
Takeshi Koshiba,
Takeshi Shimoyama:
Low-density attack revisited.
Des. Codes Cryptography 43(1): 47-59 (2007) |
2000 |
3 | | Tetsuya Izu,
Jun Kogure,
Kazuhiro Yokoyama:
Efficient Implementation of Schoof's Algorithm in Case of Characteristic 2.
Public Key Cryptography 2000: 210-222 |
1998 |
2 | EE | Tetsuya Izu,
Jun Kogure,
Masayuki Noro,
Kazuhiro Yokoyama:
Efficient Implementation of Schoof's Algorithm.
ASIACRYPT 1998: 66-79 |
1 | EE | Tetsuya Izu,
Jun Kogure,
Masayuki Noro,
Kazuhiro Yokoyama:
Parameters for Secure Elliptic Curve Cryptosystem - Improvements on Schoof's Algorithm.
Public Key Cryptography 1998: 253-257 |