Search

Your search keyword '"Okamoto, Takeshi"' showing total 25 results

Search Constraints

Start Over You searched for: Author "Okamoto, Takeshi" Remove constraint Author: "Okamoto, Takeshi" Topic algorithm analysis and problem complexity Remove constraint Topic: algorithm analysis and problem complexity
25 results on '"Okamoto, Takeshi"'

Search Results

1. Identity-Based Encryption: How to Decrypt Multiple Ciphertexts Using a Single Decryption Key.

2. The Tate Pairing Via Elliptic Nets.

3. Provably Secure Pairing-Based Convertible Undeniable Signature with Short Signature Length.

4. Eta Pairing Computation on General Divisors over Hyperelliptic Curves y2 = x7 − x ±1.

5. On Pairing Inversion Problems.

6. Remarks on Cheon's Algorithms for Pairing-Related Problems.

7. On the Minimal Embedding Field.

8. Fair Blind Signatures Revisited.

9. Proxy Re-encryption Systems for Identity-Based Encryption.

10. The Importance of the Final Exponentiation in Pairings When Considering Fault Attacks.

11. Instruction Set Extensions for Pairing-Based Cryptography.

12. Implementing Cryptographic Pairings over Barreto-Naehrig Curves.

13. Constructing Pairing-Friendly Genus 2 Curves with Ordinary Jacobians.

14. Zeta Function and Cryptographic Exponent of Supersingular Curves of Genus 2.

15. Hyperelliptic Pairings.

16. General and Efficient Certificateless Public Key Encryption Constructions.

17. Certificateless Public Key Encryption in the Selective-ID Security Model (Without Random Oracles).

18. Fully Collusion Secure Dynamic Broadcast Encryption with Constant-Size Ciphertexts or Decryption Keys.

19. Practical Time Capsule Signatures in the Standard Model from Bilinear Maps.

20. Public Key Encryption with Conjunctive Keyword Search and Its Extension to a Multi-user System.

21. Insider Impersonation-MIM Attack to Tripartite Key Agreement Scheme and an Efficient Protocol for Multiple Keys.

22. Practical Strong Designated Verifier Signature Schemes Based on Double Discrete Logarithms.

23. A Fast Signature Scheme Based on New On-line Computation.

24. Supersingular Elliptic Curves in Cryptography.

25. Bilinear Groups of Composite Order.

Catalog

Books, media, physical & digital resources