dblp.uni-trier.dewww.uni-trier.de

Kenji Koyama

List of publications from the DBLP Bibliography Server - FAQ
Coauthor Index - Ask others: ACM DL/Guide - CiteSeer - CSB - Google - MSN - Yahoo

2005
20EEKenji Koyama, Atsuhiro Nakamoto: Acute triangles in triangulations on the plane with minimum degree at least 4. Discrete Mathematics 303(1-3): 104-116 (2005)
2000
19 Kenji Koyama: On searching for solutions of the Diophantine equation x3 + y3 +2z3 = n. Math. Comput. 69(232): 1735-1742 (2000)
1999
18 Kenji Koyama, Yukio Tsuruoka, Noboru Kunihiro: Modulus Search for Elliptic Curve Cryptosystems. ASIACRYPT 1999: 1-7
17 Hiroshi Sekigawa, Kenji Koyama: Nonexistence conditions of a solution for the congruence x1k + ... + xsk = N (mod pn). Math. Comput. 68(227): 1283-1297 (1999)
1998
16EENoboru Kunihiro, Kenji Koyama: Equivalence of Counting the Number of Points on Elliptic Curve over the Ring Zn and Factoring n. EUROCRYPT 1998: 47-58
15 Shuichi Nishio, Kenji Koyama, Toru Nakamura: Temporal Differences in Eye and Mouth Movements Classifying Facial Expressions of Smiles. FG 1998: 206-213
1997
14 Kenji Koyama, Routo Terada: An Augmented Family of Cryptographic Parity Circuits. ISW 1997: 198-208
13 Kenji Koyama, Yukio Tsuruoka, Hiroshi Sekigawa: On searching for solutions of the Diophantine equation x3 + y3 + z3 = n. Math. Comput. 66(218): 841-851 (1997)
1995
12EEKenji Koyama: Fast RSA-type Schemes Based on Singular Cubic Curves y²+axy=m³(mod n). EUROCRYPT 1995: 329-340
1992
11EEKenji Koyama, Yukio Tsuruoka: Speeding up Elliptic Cryptosystems by Using a Signed Binary Window Method. CRYPTO 1992: 345-357
10EEKenji Koyama: Secure Conference Key Distribution Schemes for Conspiracy Attack. EUROCRYPT 1992: 449-453
1991
9EEKenji Koyama, Ueli M. Maurer, Tatsuaki Okamoto, Scott A. Vanstone: New Public-Key Schemes Based on Elliptic Curves over the Ring Zn. CRYPTO 1991: 252-266
1990
8 Kenji Koyama: Direct Demonstration of the Power to Break Public-Key Cryptosystems. AUSCRYPT 1990: 14-21
7 Kazuo Ohta, Kenji Koyama: Meet-in-the-Middle Attack on Digital Signature Schemes. AUSCRYPT 1990: 140-154
6 Hiroki Shizuya, Kenji Koyama, Toshiya Itoh: Demonstrating Possession without Revealing Factors and its Application. AUSCRYPT 1990: 273-293
5EEKenji Koyama, Routo Terada: Nonlinear Parity Circuits and their Cryptographic Applications. CRYPTO 1990: 582-600
4EEKazuo Ohta, Tatsuaki Okamoto, Kenji Koyama: Membership Authentication for Hierarchical Multigroups Using the Extended Fiat-Shamir Scheme. EUROCRYPT 1990: 446-457
1988
3EEKenji Koyama, Kazuo Ohta: Security of Improved Identity-Based Conference Key Distribution Systems. EUROCRYPT 1988: 11-19
1987
2EEKenji Koyama, Kazuo Ohta: Identity-based Conference Key Distribution Systems. CRYPTO 1987: 175-184
1980
1EEMakoto Amamiya, Naohisa Takahashi, Yutaka Ogawa, Kenji Koyama: An operating system kernel mechanism for the poly-processor system PPS-R. AFIPS National Computer Conference 1980: 147-156

Coauthor Index

1Makoto Amamiya [1]
2Toshiya Itoh [6]
3Noboru Kunihiro [16] [18]
4Ueli M. Maurer [9]
5Atsuhiro Nakamoto [20]
6Toru Nakamura [15]
7Shuichi Nishio [15]
8Yutaka Ogawa [1]
9Kazuo Ohta [2] [3] [4] [7]
10Tatsuaki Okamoto [4] [9]
11Hiroshi Sekigawa [13] [17]
12Hiroki Shizuya [6]
13Naohisa Takahashi [1]
14Routo Terada [5] [14]
15Yukio Tsuruoka [11] [13] [18]
16Scott A. Vanstone [9]

Colors in the list of coauthors

Copyright © Sun May 17 03:24:02 2009 by Michael Ley (ley@uni-trier.de)