Eiji Okamoto

From MaRDI portal
(Redirected from Person:244665)



List of research outcomes

This list is not complete and representing at the moment only items from zbMATH Open and arXiv. We are working on additional sources - please check back here soon!

PublicationDate of PublicationType
Computing fixed argument pairings with the elliptic net algorithm
JSIAM Letters
2019-03-18Paper
A privacy-enhanced access log management mechanism in SSO systems from nominative signatures
International Journal of Applied Cryptography
2018-11-26Paper
Secure multi-party computation using polarizing cards2018-10-24Paper
Algorithms and Arithmetic Operators for Computing the ηT Pairing in Characteristic Three
IEEE Transactions on Computers
2017-08-08Paper
Fast Architectures for the \eta_T Pairing over Small-Characteristic Supersingular Elliptic Curves
IEEE Transactions on Computers
2017-07-27Paper
Approach to Pairing Inversions Without Solving Miller Inversion
IEEE Transactions on Information Theory
2017-07-12Paper
Size-Hiding Computation for Multiple Parties
Advances in Cryptology – ASIACRYPT 2016
2017-01-06Paper
Revocable decentralized multi-authority functional encryption
Progress in Cryptology – INDOCRYPT 2016
2016-12-21Paper
Multi-party computation with small shuffle complexity using regular polygon cards
Provable Security
2016-01-27Paper
A short fail-stop signature scheme from factoring
Provable Security
2015-09-29Paper
Computer-aided decision-making with trust relations and trust domains (cryptographic applications)
Journal Of Logic And Computation
2014-04-01Paper
Constructing symmetric pairings over supersingular elliptic curves with embedding degree three
Pairing-Based Cryptography – Pairing 2013
2014-02-18Paper
Cryptographic pairings based on elliptic nets
Advances in Information and Computer Security
2011-11-10Paper
New constructions of public-key encryption schemes from conjugacy search problems
Information Security and Cryptology
2011-07-29Paper
High-Speed Software Implementation of the Optimal Ate Pairing over Barreto–Naehrig Curves
Lecture Notes in Computer Science
2010-11-26Paper
New identity-based proxy re-encryption schemes to prevent collusion attacks
Lecture Notes in Computer Science
2010-11-26Paper
Strongly unforgeable ID-based signatures without random oracles
International Journal of Applied Cryptography
2010-09-22Paper
FPGA and ASIC implementations of the \(\eta _T\) pairing in characteristic three
Computers and Electrical Engineering
2010-04-07Paper
A fast signature scheme based on new on-line computation
Lecture Notes in Computer Science
2010-02-09Paper
Hardware Accelerator for the Tate Pairing in Characteristic Three Based on Karatsuba-Ofman Multipliers
Lecture Notes in Computer Science
2009-11-10Paper
A Comparison between Hardware Accelerators for the Modified Tate Pairing over $\mathbb{F}_{2^m}$ and $\mathbb{F}_{3^m}$
Pairing-Based Cryptography – Pairing 2008
2009-02-10Paper
ECDSA-Verifiable Signcryption Scheme with Signature Verification on the Signcrypted Message
Information Security and Cryptology
2009-02-10Paper
Efficient ID-Based Digital Signatures with Message Recovery
Cryptology and Network Security
2008-04-15Paper
Optimised Versions of the Ate and Twisted Ate Pairings
Cryptography and Coding
2008-03-07Paper
Verifier-Key-Flexible Universal Designated-Verifier Signatures
Cryptography and Coding
2008-03-07Paper
A Coprocessor for the Final Exponentiation of the η T Pairing in Characteristic Three
Arithmetic of Finite Fields
2007-11-15Paper
A Novel Range Test
Information Security and Privacy
2007-09-07Paper
scientific article; zbMATH DE number 5180844 (Why is no real title available?)2007-08-20Paper
Coding and Cryptography
Lecture Notes in Computer Science
2007-05-02Paper
Information Security and Cryptology
Lecture Notes in Computer Science
2006-11-14Paper
Cryptology and Network Security
Lecture Notes in Computer Science
2006-11-14Paper
Cryptosystems based on elliptic curve pairing2006-06-22Paper
One-way and two-party authenticated ID-based key agreement protocols using pairing2006-06-22Paper
Information Security and Cryptology - ICISC 2003
Lecture Notes in Computer Science
2005-12-27Paper
scientific article; zbMATH DE number 2048538 (Why is no real title available?)2004-03-01Paper
scientific article; zbMATH DE number 1950332 (Why is no real title available?)2003-07-17Paper
scientific article; zbMATH DE number 1941234 (Why is no real title available?)2003-06-29Paper
scientific article; zbMATH DE number 1759337 (Why is no real title available?)2003-01-25Paper
scientific article; zbMATH DE number 1500497 (Why is no real title available?)2002-08-05Paper
scientific article; zbMATH DE number 1612524 (Why is no real title available?)2001-07-01Paper
scientific article; zbMATH DE number 1420971 (Why is no real title available?)2000-08-24Paper
scientific article; zbMATH DE number 1440075 (Why is no real title available?)2000-05-07Paper
scientific article; zbMATH DE number 1406794 (Why is no real title available?)2000-03-01Paper
scientific article; zbMATH DE number 1222364 (Why is no real title available?)1999-06-27Paper
scientific article; zbMATH DE number 1189399 (Why is no real title available?)1999-03-02Paper
scientific article; zbMATH DE number 1107682 (Why is no real title available?)1998-04-03Paper
scientific article; zbMATH DE number 1304307 (Why is no real title available?)1998-01-01Paper
A construction of codes with exponential error bounds on arbitrary discrete memoryless channels
IEEE Transactions on Information Theory
1997-10-28Paper
scientific article; zbMATH DE number 4070799 (Why is no real title available?)1988-01-01Paper


Research outcomes over time


This page was built for person: Eiji Okamoto