Publications
Search

Publications :: Search

Show author

On this page you see the details of the selected author.

    Author information
    First name: Tetsutaro
    Last name: Kobayashi
    DBLP: 34/4882
    Rating: (not rated yet)
    Bookmark:

    Below you find the publications which have been written by this author.

    Show item 1 to 10 of 25  
    Select a publication
    Show Title Venue Rating Date
    Conference paper
    Yutaro Kiyomura, Akiko Inoue, Yuto Kawahara, Masaya Yasuda, Tsuyoshi Takagi, Tetsutaro Kobayashi.
    Secure and Efficient Pairing at 256-Bit Security Level.
    Applied Cryptography and Network Security - 15th International Conference, ACNS 2017, Kanazawa, Japan, July 10-12, 2017, Proceedings 2017 (0) 2017
    Conference paper
    Kazuki Yoneyama, Reo Yoshida, Yuto Kawahara, Tetsutaro Kobayashi, Hitoshi Fuji, Tomohide Yamamoto.
    Multi-Cast Key Distribution: Scalable, Dynamic and Provably Secure Construction.
    IACR Cryptology ePrint Archive 2016, Volume 2016 (0) 2016
    Conference paper
    Kazuki Yoneyama, Reo Yoshida, Yuto Kawahara, Tetsutaro Kobayashi, Hitoshi Fuji, Tomohide Yamamoto.
    Multi-cast Key Distribution: Scalable, Dynamic and Provably Secure Construction.
    Provable Security - 10th International Conference, ProvSec 2016, Nanjing, China, November 10-11, 2016, Proceedings 2016 (0) 2016
    Conference paper
    Kenichiro Hayasaka, Kazumaro Aoki, Tetsutaro Kobayashi, Tsuyoshi Takagi.
    A construction of 3-dimensional lattice sieve for number field sieve over F_{p^n}.
    IACR Cryptology ePrint Archive 2015, Volume 2015 (0) 2015
    Conference paper
    Atsushi Fujioka, Fumitaka Hoshino, Tetsutaro Kobayashi, Koutarou Suzuki, Berkant Ustaoglu, Kazuki Yoneyama.
    id-eCK Secure ID-Based Authenticated Key Exchange on Symmetric and Asymmetric Pairing.
    IEICE Transactions 2013, Volume 96 (0) 2013
    Conference paper
    Tadanori Teruya, Kazutaka Saito, Naoki Kanayama, Yuto Kawahara, Tetsutaro Kobayashi, Eiji Okamoto.
    Constructing Symmetric Pairings over Supersingular Elliptic Curves with Embedding Degree Three.
    Pairing-Based Cryptography - Pairing 2013 - 6th International Conference, Beijing, China, November 22-24, 2013, Revised Selected Papers 2014 (0) 2013
    Conference paper
    Kenichiro Hayasaka, Kazumaro Aoki, Tetsutaro Kobayashi, Tsuyoshi Takagi.
    An Experiment of Number Field Sieve for Discrete Logarithm Problem over GF(p 12).
    Number Theory and Cryptography - Papers in Honor of Johannes Buchmann on the Occasion of His 60th Birthday 2013 (0) 2013
    Journal article
    Jae Hong Seo, Tetsutaro Kobayashi, Miyako Ohkubo, Koutarou Suzuki.
    Anonymous Hierarchical Identity-Based Encryption with Short Ciphertexts.
    IEICE Transactions 2011, Volume 94 (0) 2011
    Journal article
    Yuto Kawahara, Tetsutaro Kobayashi, Gen Takahashi, Tsuyoshi Takagi.
    Faster MapToPoint on Supersingular Elliptic Curves in Characteristic 3.
    IEICE Transactions 2011, Volume 94 (0) 2011
    Conference paper
    Go Yamamoto, Tetsutaro Kobayashi.
    Self-correctors for Cryptographic Modules.
    Cryptography and Coding - 13th IMA International Conference, IMACC 2011, Oxford, UK, December 12-15, 2011. Proceedings 2011 (0) 2011
    Show item 1 to 10 of 25  

    Your query returned 25 matches in the database.