2005 |
20 | EE | Kenji Koyama,
Atsuhiro Nakamoto:
Acute triangles in triangulations on the plane with minimum degree at least 4.
Discrete Mathematics 303(1-3): 104-116 (2005) |
2000 |
19 | | Kenji Koyama:
On searching for solutions of the Diophantine equation x3 + y3 +2z3 = n.
Math. Comput. 69(232): 1735-1742 (2000) |
1999 |
18 | | Kenji Koyama,
Yukio Tsuruoka,
Noboru Kunihiro:
Modulus Search for Elliptic Curve Cryptosystems.
ASIACRYPT 1999: 1-7 |
17 | | Hiroshi Sekigawa,
Kenji Koyama:
Nonexistence conditions of a solution for the congruence x1k + ... + xsk = N (mod pn).
Math. Comput. 68(227): 1283-1297 (1999) |
1998 |
16 | EE | Noboru Kunihiro,
Kenji Koyama:
Equivalence of Counting the Number of Points on Elliptic Curve over the Ring Zn and Factoring n.
EUROCRYPT 1998: 47-58 |
15 | | Shuichi Nishio,
Kenji Koyama,
Toru Nakamura:
Temporal Differences in Eye and Mouth Movements Classifying Facial Expressions of Smiles.
FG 1998: 206-213 |
1997 |
14 | | Kenji Koyama,
Routo Terada:
An Augmented Family of Cryptographic Parity Circuits.
ISW 1997: 198-208 |
13 | | Kenji Koyama,
Yukio Tsuruoka,
Hiroshi Sekigawa:
On searching for solutions of the Diophantine equation x3 + y3 + z3 = n.
Math. Comput. 66(218): 841-851 (1997) |
1995 |
12 | EE | Kenji Koyama:
Fast RSA-type Schemes Based on Singular Cubic Curves y²+axy=m³(mod n).
EUROCRYPT 1995: 329-340 |
1992 |
11 | EE | Kenji Koyama,
Yukio Tsuruoka:
Speeding up Elliptic Cryptosystems by Using a Signed Binary Window Method.
CRYPTO 1992: 345-357 |
10 | EE | Kenji Koyama:
Secure Conference Key Distribution Schemes for Conspiracy Attack.
EUROCRYPT 1992: 449-453 |
1991 |
9 | EE | Kenji Koyama,
Ueli M. Maurer,
Tatsuaki Okamoto,
Scott A. Vanstone:
New Public-Key Schemes Based on Elliptic Curves over the Ring Zn.
CRYPTO 1991: 252-266 |
1990 |
8 | | Kenji Koyama:
Direct Demonstration of the Power to Break Public-Key Cryptosystems.
AUSCRYPT 1990: 14-21 |
7 | | Kazuo Ohta,
Kenji Koyama:
Meet-in-the-Middle Attack on Digital Signature Schemes.
AUSCRYPT 1990: 140-154 |
6 | | Hiroki Shizuya,
Kenji Koyama,
Toshiya Itoh:
Demonstrating Possession without Revealing Factors and its Application.
AUSCRYPT 1990: 273-293 |
5 | EE | Kenji Koyama,
Routo Terada:
Nonlinear Parity Circuits and their Cryptographic Applications.
CRYPTO 1990: 582-600 |
4 | EE | Kazuo Ohta,
Tatsuaki Okamoto,
Kenji Koyama:
Membership Authentication for Hierarchical Multigroups Using the Extended Fiat-Shamir Scheme.
EUROCRYPT 1990: 446-457 |
1988 |
3 | EE | Kenji Koyama,
Kazuo Ohta:
Security of Improved Identity-Based Conference Key Distribution Systems.
EUROCRYPT 1988: 11-19 |
1987 |
2 | EE | Kenji Koyama,
Kazuo Ohta:
Identity-based Conference Key Distribution Systems.
CRYPTO 1987: 175-184 |
1980 |
1 | EE | Makoto Amamiya,
Naohisa Takahashi,
Yutaka Ogawa,
Kenji Koyama:
An operating system kernel mechanism for the poly-processor system PPS-R.
AFIPS National Computer Conference 1980: 147-156 |