楕円暗号の初期研究

  1. On ordinary elliptic curve cryptosystems,
    IEICE Japan Tech. Rep. ISEC91-29(1991-09), 1-8.
  2. On the Impementation of Ordinary Elliptic Curve Cryptosystems,
    The 1992 Symposium on Cryptography and Information Security SCIS92-2A, Jan. 1992.
  3. On constructing multiplicative function of a normal base,
    The 14th Symposium on Information Theory and Its Applications Dec. 1991, 29-32.
  4. Construction of elliptic curves for secure cryptosystems,
    IEICE Japan Tech. Rep., ISEC92-9(1992-07), 1-12.
  5. Elliptic curves suitable for cryptosystems,
    The 1993 Symposium on Cryptography and Information Security, SCIS93-10B, Jan. 1993.
  6. Fast elliptic curve cryptosystems,
    IEICE Japan Tech. Rep.,ISEC93-7(1993-07), 1-8.
  7. Weakness in message recovery signature schemes based on discrete logarithm problems 1,
    IEICE Japan Tech. Rep., ISEC95-11(1995-07), 47-58.
  8. Weakness in message recovery signature schemes based on discrete logarithm problems 2,
    IEICE Japan Tech. Rep., ISEC95-35(1995-12), 31-38.
  9. Strengthened message recovery signature scheme,
    The 1996 Symposium on Cryptography and Information Security, SCIS96-2C, Jan. 1996.
  10. Signature equation suitable for message recovery schemes,
    The 1996 Engineering Sciences Society Conference of IEICE A-266, Mar.(1996), 268.
  11. A message recovery signature scheme equivalent to DSA,
    IEICE Japan Tech. Rep.,ISEC96-14(1996-07), 73-84.
  12. On the security relation among elliptic curve signature schemes,
    The 1996 Engineering Sciences Society Conference of IEICE A-165, Sept.(1996), 166.
  13. A trapdoor generating algorithm for elliptic curve ElGamal signature schemes,
    The 1997 Symposium on Cryptography and Information Security, SCIS97-12B, Jan. 1997.
Top