Keyword : public key cryptography


Insecurity of a Certificateless Aggregate Signature Scheme
Han SHEN Jianhua CHEN Hao HU Jian SHEN 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2016/02/01
Vol. E99-A  No. 2 ; pp. 660-662
Type of Manuscript:  LETTER
Category: Cryptography and Information Security
Keyword: 
certificatelesspublic key cryptographyaggregate signatureprovably security
 Summary | Full Text:PDF

Analysis and Improvement of MaTRU Public Key Cryptosystem
Jeong Eun SONG Tae Youn HAN Mun-Kyu LEE 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2015/04/01
Vol. E98-A  No. 4 ; pp. 982-991
Type of Manuscript:  PAPER
Category: Cryptography and Information Security
Keyword: 
public key cryptographyNTRUMaTRUpolynomial ring
 Summary | Full Text:PDF

Improvement on a Knapsack-Based Probabilistic Encryption Scheme
Baocang WANG Fagen LI Yupu HU 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2014/01/01
Vol. E97-A  No. 1 ; pp. 421-424
Type of Manuscript:  LETTER
Category: Cryptography and Information Security
Keyword: 
public key cryptographyknapsack problemsecurity analysistrapdoor knapsack
 Summary | Full Text:PDF

Cryptanalysis of a GL(r,Zn)-Based Public Key System
Abdel Alim KAMAL Amr YOUSSEF 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2012/04/01
Vol. E95-A  No. 4 ; pp. 829-831
Type of Manuscript:  LETTER
Category: Cryptography and Information Security
Keyword: 
general linear groupcryptanalysispublic key cryptography
 Summary | Full Text:PDF

Fault Analysis of the NTRUEncrypt Cryptosystem
Abdel Alim KAMAL Amr YOUSSEF 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2011/04/01
Vol. E94-A  No. 4 ; pp. 1156-1158
Type of Manuscript:  LETTER
Category: Cryptography and Information Security
Keyword: 
NTRUside channel attacksfault analysispublic key cryptography
 Summary | Full Text:PDF

Invisibly Sanitizable Signature without Pairings
Dae Hyun YUM Pil Joong LEE 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2009/06/01
Vol. E92-A  No. 6 ; pp. 1541-1543
Type of Manuscript:  LETTER
Category: Cryptography and Information Security
Keyword: 
sanitizable signaturepublic key cryptographyinformation disclosureprivacy
 Summary | Full Text:PDF

Finding a Basis Conversion Matrix via Prime Gauss Period Normal Basis
Yasuyuki NOGAMI Ryo NAMBA Yoshitaka MORIKAWA 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2009/06/01
Vol. E92-A  No. 6 ; pp. 1500-1507
Type of Manuscript:  PAPER
Category: Information Theory
Keyword: 
public key cryptographyextension fieldGauss period normal basisbasis conversion
 Summary | Full Text:PDF

Efficient Squaring of Large Integers
Wu-Chuan YANG Peng-Yueh HSEIH Chi-Sung LAIH 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2004/05/01
Vol. E87-A  No. 5 ; pp. 1189-1192
Type of Manuscript:  Special Section LETTER (Special Section on Discrete Mathematics and Its Applications)
Category: 
Keyword: 
public key cryptographyalgorithmbig integersquaringmultiplication
 Summary | Full Text:PDF

Temporary Mobile User Certificate for Mobile Information Services in UMTS
Byung-Rae LEE Kyung-Ah CHANG Tai-Yun KIM 
Publication:   IEICE TRANSACTIONS on Communications
Publication Date: 2000/08/25
Vol. E83-B  No. 8 ; pp. 1880-1886
Type of Manuscript:  Special Section PAPER (Special Issue on Personal, Indoor and Mobile Radio Communications)
Category: 
Keyword: 
certificateauthenticationUMTSASPeCTpublic key cryptography
 Summary | Full Text:PDF

A Small and Fast Software Implementation of Elliptic Curve Cryptosystems over GF(p) on a 16-Bit Microcomputer
Toshio HASEGAWA Junko NAKAJIMA Mitsuru MATSUI 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 1999/01/25
Vol. E82-A  No. 1 ; pp. 98-106
Type of Manuscript:  Special Section PAPER (Special Section on Cryptography and Information Security)
Category: 
Keyword: 
public key cryptographyelliptic curve cryptosystemGF(p)16-bit microcomputerimplementation
 Summary | Full Text:PDF

Secure Electronic Sealed-Bid Auction Protocol with Public Key Cryptography
Michiharu KUDO 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 1998/01/25
Vol. E81-A  No. 1 ; pp. 20-27
Type of Manuscript:  Special Section PAPER (Special Section on Cryptography and Information Security)
Category: 
Keyword: 
sealed-bid auctionprotocolpublic key cryptographycertificatenetwork service
 Summary | Full Text:PDF

Improved Common-Multiplicand Multiplication and Fast Exponentiation by Exponent Decomposition
Sung-Ming YEN 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 1997/06/25
Vol. E80-A  No. 6 ; pp. 1160-1163
Type of Manuscript:  LETTER
Category: Information Security
Keyword: 
arithmetic algorithmexponentiationmultiplicationpublic key cryptography
 Summary | Full Text:PDF