Publications
Search

Publications :: Search

Show author

On this page you see the details of the selected author.

    Author information
    First name: Tetsutaro
    Last name: Kobayashi
    DBLP: 34/4882
    Rating: (not rated yet)
    Bookmark:

    Below you find the publications which have been written by this author.

    Show item 1 to 24 of 24  
    Select a publication
    Show Title Venue Rating Date
    Conference paper
    Yutaro Kiyomura, Akiko Inoue, Yuto Kawahara, Masaya Yasuda, Tsuyoshi Takagi, Tetsutaro Kobayashi.
    Secure and Efficient Pairing at 256-Bit Security Level.
    Applied Cryptography and Network Security - 15th International Conference, ACNS 2017, Kanazawa, Japan, July 10-12, 2017, Proceedings 2017 (0) 2017
    Conference paper
    Kazuki Yoneyama, Reo Yoshida, Yuto Kawahara, Tetsutaro Kobayashi, Hitoshi Fuji, Tomohide Yamamoto.
    Multi-Cast Key Distribution: Scalable, Dynamic and Provably Secure Construction.
    IACR Cryptology ePrint Archive 2016, Volume 2016 (0) 2016
    Conference paper
    Kazuki Yoneyama, Reo Yoshida, Yuto Kawahara, Tetsutaro Kobayashi, Hitoshi Fuji, Tomohide Yamamoto.
    Multi-cast Key Distribution: Scalable, Dynamic and Provably Secure Construction.
    Provable Security - 10th International Conference, ProvSec 2016, Nanjing, China, November 10-11, 2016, Proceedings 2016 (0) 2016
    Conference paper
    Kenichiro Hayasaka, Kazumaro Aoki, Tetsutaro Kobayashi, Tsuyoshi Takagi.
    A construction of 3-dimensional lattice sieve for number field sieve over F_{p^n}.
    IACR Cryptology ePrint Archive 2015, Volume 2015 (0) 2015
    Conference paper
    Atsushi Fujioka, Fumitaka Hoshino, Tetsutaro Kobayashi, Koutarou Suzuki, Berkant Ustaoglu, Kazuki Yoneyama.
    id-eCK Secure ID-Based Authenticated Key Exchange on Symmetric and Asymmetric Pairing.
    IEICE Transactions 2013, Volume 96 (0) 2013
    Conference paper
    Tadanori Teruya, Kazutaka Saito, Naoki Kanayama, Yuto Kawahara, Tetsutaro Kobayashi, Eiji Okamoto.
    Constructing Symmetric Pairings over Supersingular Elliptic Curves with Embedding Degree Three.
    Pairing-Based Cryptography - Pairing 2013 - 6th International Conference, Beijing, China, November 22-24, 2013, Revised Selected Papers 2014 (0) 2013
    Conference paper
    Kenichiro Hayasaka, Kazumaro Aoki, Tetsutaro Kobayashi, Tsuyoshi Takagi.
    An Experiment of Number Field Sieve for Discrete Logarithm Problem over GF(p 12).
    Number Theory and Cryptography - Papers in Honor of Johannes Buchmann on the Occasion of His 60th Birthday 2013 (0) 2013
    Journal article
    Jae Hong Seo, Tetsutaro Kobayashi, Miyako Ohkubo, Koutarou Suzuki.
    Anonymous Hierarchical Identity-Based Encryption with Short Ciphertexts.
    IEICE Transactions 2011, Volume 94 (0) 2011
    Journal article
    Yuto Kawahara, Tetsutaro Kobayashi, Gen Takahashi, Tsuyoshi Takagi.
    Faster MapToPoint on Supersingular Elliptic Curves in Characteristic 3.
    IEICE Transactions 2011, Volume 94 (0) 2011
    Conference paper
    Go Yamamoto, Tetsutaro Kobayashi.
    Self-correctors for Cryptographic Modules.
    Cryptography and Coding - 13th IMA International Conference, IMACC 2011, Oxford, UK, December 12-15, 2011. Proceedings 2011 (0) 2011
    Conference paper
    Naoki Ogura, Go Yamamoto, Tetsutaro Kobayashi, Shigenori Uchiyama.
    An Improvement of Key Generation Algorithm for Gentry's Homomorphic Encryption Scheme.
    Advances in Information and Computer Security - 5th International Workshop on Security, IWSEC 2010, Kobe, Japan, November 22-24, 2010. Proceedings 2010 (0) 2010
    Conference paper
    Fumitaka Hoshino, Tetsutaro Kobayashi, Koutarou Suzuki.
    Anonymizable Signature and Its Construction from Pairings.
    Pairing-Based Cryptography - Pairing 2010 - 4th International Conference, Yamanaka Hot Spring, Japan, December 2010. Proceedings 2010 (0) 2010
    Conference paper
    Koutarou Suzuki, Fumitaka Hoshino, Tetsutaro Kobayashi.
    Relinkable Ring Signature.
    Cryptology and Network Security, 8th International Conference, CANS 2009, Kanazawa, Japan, December 12-14, 2009. Proceedings 2009 (0) 2009
    Conference paper
    Jae Hong Seo, Tetsutaro Kobayashi, Miyako Ohkubo, Koutarou Suzuki.
    Anonymous Hierarchical Identity-Based Encryption with Constant Size Ciphertexts.
    Public Key Cryptography - PKC 2009, 12th International Conference on Practice and Theory in Public Key Cryptography, Irvine, CA, USA, March 18-20, 2009. Proceedings 2009 (0) 2009
    Conference paper
    Gen Takahashi, Fumitaka Hoshino, Tetsutaro Kobayashi.
    Efficient GF(3m) Multiplication Algorithm for eta T Pairing.
    IACR Cryptology ePrint Archive 2007, Volume 2007 (0) 2007
    Conference paper
    Tetsutaro Kobayashi, Eiichiro Fujisaki.
    Security of ESIGN-PSS.
    IEICE Transactions 2007, Volume 90 (0) 2007
    Conference paper
    Fumitaka Hoshino, Tetsutaro Kobayashi, Kazumaro Aoki.
    Compressed Jacobian Coordinates for OEF.
    Progressin Cryptology - VIETCRYPT 2006, First International Conferenceon Cryptology in Vietnam, Hanoi, Vietnam, September 25-28, 2006, Revised Selected Papers 2006 (0) 2006
    Conference paper
    Taiichi Saito, Fumitaka Hoshino, Shigenori Uchiyama, Tetsutaro Kobayashi.
    Candidate One-Way Functions on Non-Supersingular Elliptic Curves.
    IEICE Transactions 2006, Volume 89 (0) 2006
    Conference paper
    Tetsutaro Kobayashi, Kazumaro Aoki, Hideki Imai.
    Efficient Algorithms for Tate Pairing.
    IEICE Transactions 2006, Volume 89 (0) 2006
    Conference paper
    Hideo Yamamoto, Tetsutaro Kobayashi, Masahiro Morita, Ryuji Yamada.
    Public-Key-Based High-Speed Payment (Electronic Money) System Using Contact-Less Smart Cards.
    Smart Card Programming and Security, International Conference on Research in Smart Cards, E-smart 2001, Cannes, France, September 19-21, 2001, Proceedings 2001 (0) 2001
    Conference paper
    Kazumaro Aoki, Fumitaka Hoshino, Tetsutaro Kobayashi.
    A Cyclic Window Algorithm for ECC Defined over Extension Fields.
    Information and Communications Security, Third International Conference, ICICS 2001, Xian, China, November 13-16, 2001 2001 (0) 2001
    Conference paper
    Kazumaro Aoki, Fumitaka Hoshino, Tetsutaro Kobayashi, Hiroaki Oguro.
    Elliptic Curve Arithmetic Using SIMD.
    Information Security, 4th International Conference, ISC 2001, Malaga, Spain, October 1-3, 2001, Proceedings 2001 (0) 2001
    Conference paper
    Fumitaka Hoshino, Masayuki Abe, Tetsutaro Kobayashi.
    Lenient/Strict Batch Verification in Several Groups.
    Information Security, 4th International Conference, ISC 2001, Malaga, Spain, October 1-3, 2001, Proceedings 2001 (0) 2001
    Conference paper
    Tetsutaro Kobayashi, Hikaru Morita, Kunio Kobayashi, Fumitaka Hoshino.
    Fast Elliptic Curve Algorithm Combining Frobenius Map and Table Reference to Adapt to Higher Characteristic.
    EUROCRYPT 1999 (0) 1999
    Show item 1 to 24 of 24  

    Your query returned 24 matches in the database.