Cryptographers' World
 

Kenji Koyama



13 papers in database with 366 citations Star

H-number: 8

Conference Papers

[Sort papers chronologically] [Sort papers by citations count]

1. Kenji Koyama,  Yukio Tsuruoka,  Noboru Kunihiro,  Modulus Search for Elliptic Curve Cryptosystems, pp. 1 - 7, ASIACRYPT 1999.

[Electronic Edition][Cited 2 times ]

2. Noboru Kunihiro,  Kenji Koyama,  Equivalence of Counting the Number of Points on Elliptic Curve over the Ring Z, pp. 47 - 58, EUROCRYPT 1998.

[Electronic Edition][Cited 12 times ]

3. Kenji Koyama,  Fast RSA-type Schemes Based on Singular Cubic Curves y²+axy=m³(mod n), pp. 329 - 340, EUROCRYPT 1995.

[Electronic Edition][Cited 13 times ]

4. Kenji Koyama,  Secure Conference Key Distribution Schemes for Conspiracy Attack, pp. 449 - 453, EUROCRYPT 1992.

[Electronic Edition][Cited 23 times ]

5. Kenji Koyama,  Yukio Tsuruoka,  Speeding up Elliptic Cryptosystems by Using a Signed Binary Window Method, pp. 345 - 357, CRYPTO 1992.

[Electronic Edition][Cited 92 times Red Star]

6. Kenji Koyama,  Ueli M. Maurer,  Tatsuaki Okamoto,  Scott A. Vanstone,  New Public-Key Schemes Based on Elliptic Curves over the Ring Z, pp. 252 - 266, CRYPTO 1991.

[Electronic Edition][Cited 145 times Red StarRed Star]

7. Kazuo Ohta,  Tatsuaki Okamoto,  Kenji Koyama,  Membership Authentication for Hierarchical Multigroups Using the Extended Fiat-Shamir Scheme, pp. 446 - 457, EUROCRYPT 1990.

[Electronic Edition][Cited 19 times ]

8. Kenji Koyama,  Routo Terada,  Nonlinear Parity Circuits and their Cryptographic Applications, pp. 582 - 600, CRYPTO 1990.

[Electronic Edition][Cited 4 times ]

9. Kazuo Ohta,  Kenji Koyama,  Meet-in-the-Middle Attack on Digital Signature Schemes, pp. 140 - 154, ASIACRYPT 1990.

[Electronic Edition][Cited 9 times ]

10. Kenji Koyama,  Direct Demonstration of the Power to Break Public-Key Cryptosystems, pp. 14 - 21, ASIACRYPT 1990.

[Electronic Edition][Cited 6 times ]

11. Hiroki Shizuya,  Kenji Koyama,  Toshiya Itoh,  Demonstrating Possession without Revealing Factors and its Application, pp. 273 - 293, ASIACRYPT 1990.

[Electronic Edition][Cited 3 times ]

12. Kenji Koyama,  Kazuo Ohta,  Security of Improved Identity-Based Conference Key Distribution Systems, pp. 11 - 19, EUROCRYPT 1988.

[Electronic Edition][Cited 32 times ]

13. Kenji Koyama,  Kazuo Ohta,  Identity-based Conference Key Distribution Systems, pp. 175 - 184, CRYPTO 1987.

[Electronic Edition][Cited 6 times ]



Database status:
3755 authors,
5428 conference papers from 177 conference proceedings,
559 journal papers from 8 journals
Highly Cited...