![]() |
| 2007 | ||
|---|---|---|
| 5 | EE | Shingo Orihara, Yukio Tsuruoka, Kenji Takahashi: Certificate-less user authentication with consent. Digital Identity Management 2007: 11-16 |
| 2006 | ||
| 4 | EE | Shingo Orihara, Yukio Tsuruoka, Kenji Takahashi: Trusted-link: web-link enhancement for integrity and trustworthiness. Digital Identity Management 2006: 17-24 |
| 1999 | ||
| 3 | Kenji Koyama, Yukio Tsuruoka, Noboru Kunihiro: Modulus Search for Elliptic Curve Cryptosystems. ASIACRYPT 1999: 1-7 | |
| 1997 | ||
| 2 | Kenji Koyama, Yukio Tsuruoka, Hiroshi Sekigawa: On searching for solutions of the Diophantine equation x3 + y3 + z3 = n. Math. Comput. 66(218): 841-851 (1997) | |
| 1992 | ||
| 1 | EE | Kenji Koyama, Yukio Tsuruoka: Speeding up Elliptic Cryptosystems by Using a Signed Binary Window Method. CRYPTO 1992: 345-357 |
| 1 | Kenji Koyama | [1] [2] [3] |
| 2 | Noboru Kunihiro | [3] |
| 3 | Shingo Orihara | [4] [5] |
| 4 | Hiroshi Sekigawa | [2] |
| 5 | Kenji Takahashi | [4] [5] |