楕円暗号の初期研究
- On ordinary elliptic curve cryptosystems,
IEICE Japan Tech. Rep. ISEC91-29(1991-09), 1-8.
- On the Impementation of Ordinary Elliptic Curve Cryptosystems,
The 1992 Symposium on Cryptography and Information Security SCIS92-2A, Jan. 1992.
- On constructing multiplicative function of a normal base,
The 14th Symposium on Information Theory and Its Applications Dec. 1991, 29-32.
- Construction of elliptic curves for secure cryptosystems,
IEICE Japan Tech. Rep., ISEC92-9(1992-07), 1-12.
- Elliptic curves suitable for cryptosystems,
The 1993 Symposium on Cryptography and Information Security, SCIS93-10B, Jan. 1993.
- Fast elliptic curve cryptosystems,
IEICE Japan Tech. Rep.,ISEC93-7(1993-07), 1-8.
- Weakness in message recovery signature schemes based on discrete logarithm problems 1,
IEICE Japan Tech. Rep., ISEC95-11(1995-07), 47-58.
- Weakness in message recovery signature schemes based on discrete logarithm problems 2,
IEICE Japan Tech. Rep., ISEC95-35(1995-12), 31-38.
- Strengthened message recovery signature scheme,
The 1996 Symposium on Cryptography and Information Security, SCIS96-2C, Jan. 1996.
- Signature equation suitable for message recovery schemes,
The 1996 Engineering Sciences Society Conference of IEICE A-266, Mar.(1996), 268.
- A message recovery signature scheme equivalent to DSA,
IEICE Japan Tech. Rep.,ISEC96-14(1996-07), 73-84.
- On the security relation among elliptic curve signature schemes,
The 1996 Engineering Sciences Society Conference of IEICE A-165, Sept.(1996), 166.
- A trapdoor generating algorithm for elliptic curve ElGamal signature schemes,
The 1997 Symposium on Cryptography and Information Security, SCIS97-12B, Jan. 1997.