Keyword : elliptic curve


A One-Round Certificateless Authenticated Group Key Agreement Protocol for Mobile Ad Hoc Networks
Dongxu CHENG Jianwei LIU Zhenyu GUAN Tao SHANG 
Publication:   IEICE TRANSACTIONS on Information and Systems
Publication Date: 2016/11/01
Vol. E99-D  No. 11 ; pp. 2716-2722
Type of Manuscript:  PAPER
Category: Information Network
Keyword: 
certificateless cryptographygroup key agreementmobile Ad Hoc networkselliptic curve
 Summary | Full Text:PDF(324.7KB)

Implementation of an Elliptic Curve Scalar Multiplication Method Using Division Polynomials
Naoki KANAYAMA Yang LIU Eiji OKAMOTO Kazutaka SAITO Tadanori TERUYA Shigenori UCHIYAMA 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2014/01/01
Vol. E97-A  No. 1 ; pp. 300-302
Type of Manuscript:  Special Section LETTER (Special Section on Cryptography and Information Security)
Category: 
Keyword: 
elliptic curvedivision polynomialscalar multiplicationelliptic net
 Summary | Full Text:PDF(71.2KB)

New Concrete Relation between Trace, Definition Field, and Embedding Degree
Shoujiro HIRASAWA Atsuko MIYAJI 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2011/06/01
Vol. E94-A  No. 6 ; pp. 1368-1374
Type of Manuscript:  Special Section PAPER (Special Section on Discrete Mathematics and Its Applications)
Category: 
Keyword: 
elliptic curveembedding degree
 Summary | Full Text:PDF(237.3KB)

The Vector Decomposition Problem
Maki YOSHIDA Shigeo MITSUNARI Toru FUJIWARA 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2010/01/01
Vol. E93-A  No. 1 ; pp. 188-193
Type of Manuscript:  Special Section PAPER (Special Section on Cryptography and Information Security)
Category: Mathematics
Keyword: 
computational problemvector decomposition problemcomputational Diffie-Hellman problemelliptic curvepairing
 Summary | Full Text:PDF(190.9KB)

Identity-Based Authenticated Key Agreement Protocols without Bilinear Pairings
Xuefei CAO Weidong KOU Yong YU Rong SUN 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2008/12/01
Vol. E91-A  No. 12 ; pp. 3833-3836
Type of Manuscript:  LETTER
Category: Cryptography and Information Security
Keyword: 
identity-based cryptographyauthenticated key agreementbilinear pairingelliptic curve
 Summary | Full Text:PDF(82KB)

A Method for Building More Non-supersingular Elliptic Curves Suitable for Pairing-based Cryptosystems
Shi CUI Pu DUAN ChoongWah CHAN 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2005/09/01
Vol. E88-A  No. 9 ; pp. 2468-2470
Type of Manuscript:  LETTER
Category: Information Security
Keyword: 
non-supersingularelliptic curvetate pairingMNT curvespairing-based cryptosystems
 Summary | Full Text:PDF(68.2KB)

Efficient Scalar Multiplication on Montgomery-Form Elliptic Curves
Yuichi FUTA Motoji OHMORI 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2004/08/01
Vol. E87-A  No. 8 ; pp. 2126-2136
Type of Manuscript:  PAPER
Category: Information Security
Keyword: 
elliptic curveMontgomery-form elliptic curvescalar multiplicationfixed point
 Summary | Full Text:PDF(503.6KB)

Efficient Arithmetic in Optimal Extension Fields Using Simultaneous Multiplication
Mun-Kyu LEE Kunsoo PARK 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2003/05/01
Vol. E86-A  No. 5 ; pp. 1316-1321
Type of Manuscript:  LETTER
Category: Information Security
Keyword: 
cryptographyelliptic curveoptimal extension fieldfinite field
 Summary | Full Text:PDF(240.7KB)

A New Traitor Tracing
Shigeo MITSUNARI Ryuichi SAKAI Masao KASAHARA 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2002/02/01
Vol. E85-A  No. 2 ; pp. 481-484
Type of Manuscript:  PAPER
Category: Information Security
Keyword: 
traitor tracingWeil pairingelliptic curve
 Summary | Full Text:PDF(180.6KB)

Multiple Scalar-Multiplication Algorithm over Elliptic Curve
Kunio KOBAYASHI Hikaru MORITA Mitsuari HAKUTA 
Publication:   IEICE TRANSACTIONS on Information and Systems
Publication Date: 2001/02/01
Vol. E84-D  No. 2 ; pp. 271-276
Type of Manuscript:  PAPER
Category: Applications of Information Security Techniques
Keyword: 
multiple scalar multiplicationelliptic curve
 Summary | Full Text:PDF(393.4KB)

On the Complexity of Constructing an Elliptic Curve of a Given Order
Masato YAMAMICHI Masahiro MAMBO Hiroki SHIZUYA 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2001/01/01
Vol. E84-A  No. 1 ; pp. 140-145
Type of Manuscript:  Special Section PAPER (Special Section on Cryptography and Information Security)
Category: 
Keyword: 
elliptic curvefunction classcomputational complexity
 Summary | Full Text:PDF(215.8KB)

Constructing Identity-Based Key Distribution Systems over Elliptic Curves
Hisao SAKAZAKI Eiji OKAMOTO Masahiro MAMBO 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 1998/10/25
Vol. E81-A  No. 10 ; pp. 2138-2143
Type of Manuscript:  Special Section PAPER (Special Section on Information Theory and Its Applications)
Category: Security
Keyword: 
ID-based key distribution systemselliptic curve message recovery signature
 Summary | Full Text:PDF(530.5KB)

Improved Elliptic Curve Methods for Factoring and Their Performance
Hidenori KUWAKADO Kenji KOYAMA 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 1997/01/25
Vol. E80-A  No. 1 ; pp. 25-33
Type of Manuscript:  Special Section PAPER (Special Section on Cryptography and Information Security)
Category: 
Keyword: 
factorizationelliptic curvebirthday paradox
 Summary | Full Text:PDF(589.8KB)

Elliptic Curve Cryptosytems and Their Applications
Kenji KOYAMA Tatsuaki OKAMOTO 
Publication:   IEICE TRANSACTIONS on Information and Systems
Publication Date: 1992/01/25
Vol. E75-D  No. 1 ; pp. 50-57
Type of Manuscript:  Special Section PAPER (Special Section on Theoretical Foundations of Computing)
Category: 
Keyword: 
public-key cryptosystemelliptic curvefactoring
 Summary | Full Text:PDF(643.5KB)