Author of the publication

Modulus Search for Elliptic Curve Cryptosystems.

, , and . ASIACRYPT, volume 1716 of Lecture Notes in Computer Science, page 1-7. Springer, (1999)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

On searching for solutions of the Diophantine equation x3 + y3 +2z3 = n.. Math. Comput., 69 (232): 1735-1742 (2000)Identity-based Conference Key Distribution Systems., and . CRYPTO, volume 293 of Lecture Notes in Computer Science, page 175-184. Springer, (1987)A knowledge transfer model: From zero-knowledge to full-knowledge., and . ALT, page 187-195. Ohmsha, (1991)Secure Conference Key Distribution Schemes for Conspiracy Attack.. EUROCRYPT, volume 658 of Lecture Notes in Computer Science, page 449-453. Springer, (1992)Nonlinear Parity Circuits and their Cryptographic Applications., and . CRYPTO, volume 537 of Lecture Notes in Computer Science, page 582-600. Springer, (1990)Demonstrating Possession without Revealing Factors and its Application., , and . AUSCRYPT, volume 453 of Lecture Notes in Computer Science, page 273-293. Springer, (1990)Acute triangles in triangulations on the plane with minimum degree at least 4., and . Discret. Math., 303 (1-3): 104-116 (2005)An interactive knowledge transfer model and analysis of "Mastermind" game., and . ALT, page 196-206. Ohmsha, (1991)An operating system kernel mechanism for the poly-processor system PPS-R., , , and . AFIPS National Computer Conference, volume 49 of AFIPS Conference Proceedings, page 147-156. AFIPS Press, (1980)New Public-Key Schemes Based on Elliptic Curves over the Ring Zn., , , and . CRYPTO, volume 576 of Lecture Notes in Computer Science, page 252-266. Springer, (1991)