Cryptographers' World
 

Eiji Okamoto


Author's Web Page Link

7 papers in database with 195 citations 

Editor of 2 conference proceedings books

H-number: 4

Conference Proceedings

 
1. Bimal K. RoyEiji Okamoto, editors, Progress in Cryptology - INDOCRYPT 2000, First International Conference in Cryptology in India, Calcutta, India, December 10-13, 2000, Proceedings. Springer, 2000. ISBN 3-540-41452-5.
[Papers]

Find this book on amazon.com , amazon.co.uk, amazon.ca, amazon.de, amazon.fr, Google Books or Wikipedia.

2. Kwok-Yan LamEiji OkamotoChaoping Xing, editors, Advances in Cryptology - ASIACRYPT '99, International Conference on the Theory and Applications of Cryptology and Information Security, Singapore, November 14-18, 1999, Proceedings. Springer, 1999. ISBN 3-540-66666-4.
[Papers]

Find this book on amazon.com , amazon.co.uk, amazon.ca, amazon.de, amazon.fr, Google Books or Wikipedia.

Conference Papers

[Sort papers chronologically] [Sort papers by citations count]

1. Jean-Luc Beuchat,  Nicolas Brisebarre,  Jérémie Detrey,  Eiji Okamoto,  Arithmetic Operators for Pairing-Based Cryptography, pp. 239 - 255, CHES 2007.

[Electronic Edition][Cited 16 times ]

2. Mike Burmester,  Yvo Desmedt,  Hiroshi Doi,  Masahiro Mambo,  Eiji Okamoto,  Mitsuru Tada,  Yuko Yoshifuji,  A Structured ElGamal-Type Multisignature Scheme, pp. 466 - 483, PKC 2000.

[Electronic Edition][Cited 54 times Red Star]

3. Masahiro Mambo,  Kouichi Sakurai,  Eiji Okamoto,  How to Utilize the Transformability of Digital Signatures for Solving the Oracle Problem, pp. 322 - 333, ASIACRYPT 1996.

[Electronic Edition][Cited 6 times ]

4. Yukiyasu Tsunoo,  Eiji Okamoto,  Tomohiko Uyematsu,  Ciphertext Only Attack for One-way Function of the MAP Using One Ciphertext, pp. 369 - 382, CRYPTO 1994.

[Electronic Edition][Cited 1 times ]

5. Eiji Okamoto,  Substantial Number of Cryptographic Keys and Its Application to Encryption Designs, pp. 361 - 373, EUROCRYPT 1988.

[Electronic Edition][No citation]

6. Eiji Okamoto,  Key Distribution Systems Based on Identification Information, pp. 194 - 202, CRYPTO 1987.

[Electronic Edition][Cited 118 times Red StarRed Star]

7. Eiji Okamoto,  K. Nakamura,  Lifetimes of Keys in Cryptographic Key Management Systems, pp. 246 - 259, CRYPTO 1985.

[Electronic Edition][No citation]



Database status:
3755 authors,
5428 conference papers from 177 conference proceedings,
559 journal papers from 8 journals
Highly Cited...