2007 | ||
---|---|---|
5 | EE | Shingo Orihara, Yukio Tsuruoka, Kenji Takahashi: Certificate-less user authentication with consent. Digital Identity Management 2007: 11-16 |
2006 | ||
4 | EE | Shingo Orihara, Yukio Tsuruoka, Kenji Takahashi: Trusted-link: web-link enhancement for integrity and trustworthiness. Digital Identity Management 2006: 17-24 |
1999 | ||
3 | Kenji Koyama, Yukio Tsuruoka, Noboru Kunihiro: Modulus Search for Elliptic Curve Cryptosystems. ASIACRYPT 1999: 1-7 | |
1997 | ||
2 | Kenji Koyama, Yukio Tsuruoka, Hiroshi Sekigawa: On searching for solutions of the Diophantine equation x3 + y3 + z3 = n. Math. Comput. 66(218): 841-851 (1997) | |
1992 | ||
1 | EE | Kenji Koyama, Yukio Tsuruoka: Speeding up Elliptic Cryptosystems by Using a Signed Binary Window Method. CRYPTO 1992: 345-357 |
1 | Kenji Koyama | [1] [2] [3] |
2 | Noboru Kunihiro | [3] |
3 | Shingo Orihara | [4] [5] |
4 | Hiroshi Sekigawa | [2] |
5 | Kenji Takahashi | [4] [5] |