Author of the publication

Modulus Search for Elliptic Curve Cryptosystems.

, , and . ASIACRYPT, volume 1716 of Lecture Notes in Computer Science, page 1-7. Springer, (1999)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Modulus Search for Elliptic Curve Cryptosystems., , and . ASIACRYPT, volume 1716 of Lecture Notes in Computer Science, page 1-7. Springer, (1999)Trusted-link: web-link enhancement for integrity and trustworthiness., , and . Digital Identity Management, page 17-24. ACM, (2006)Proposal and Evaluation of Dynamic Object-Oriented Programming., and . Syst. Comput. Jpn., 21 (5): 1-14 (1990)Cloud Computing - Current Status and Future Directions.. J. Inf. Process., 24 (2): 183-194 (2016)Three-Factor User Authentication Method Using Biometrics Challenge Response., and . Financial Cryptography, volume 7859 of Lecture Notes in Computer Science, page 395-396. Springer, (2013)SV-2FA: Two-factor user authentication with SMS and voiceprint challenge response., and . ICITST, page 283-287. IEEE, (2013)Certificate-less user authentication with consent., , and . Digital Identity Management, page 11-16. ACM, (2007)Architecture for Offloading Processes of Web Applications Based on Standardized Web Technologies., , , and . IEICE Trans. Commun., 97-B (6): 1234-1242 (2014)On searching for solutions of the Diophantine equation x3 + y3 + z3 = n., , and . Math. Comput., 66 (218): 841-851 (1997)Speeding up Elliptic Cryptosystems by Using a Signed Binary Window Method., and . CRYPTO, volume 740 of Lecture Notes in Computer Science, page 345-357. Springer, (1992)