关注
shigeo MITSUNARI
shigeo MITSUNARI
Cybozu Labs, Inc.
在 nifty.com 的电子邮件经过验证
标题
引用次数
引用次数
年份
A new traitor tracing
S Mitsunari, R Sakai, M Kasahara
IEICE transactions on fundamentals of electronics, communications and …, 2002
4112002
High-speed software implementation of the optimal ate pairing over Barreto–Naehrig curves
JL Beuchat, JE González-Díaz, S Mitsunari, E Okamoto, ...
Pairing-Based Cryptography-Pairing 2010: 4th International Conference …, 2010
2702010
Multi-core implementation of the Tate pairing over supersingular elliptic curves
JL Beuchat, E López-Trejo, L Martínez-Ramos, S Mitsunari, ...
International Conference on Cryptology and Network Security, 413-432, 2009
732009
Software implementation of an attribute-based encryption scheme
E Zavattoni, LJD Perez, S Mitsunari, AH Sánchez-Ramırez, T Teruya, ...
IEEE Transactions on Computers 64 (5), 1429-1441, 2014
622014
Efficient two-level homomorphic encryption in prime-order bilinear groups and a fast implementation in webassembly
N Attrapadung, G Hanaoka, S Mitsunari, Y Sakai, K Shimizu, T Teruya
Proceedings of the 2018 on Asia Conference on Computer and Communications …, 2018
302018
A fast implementation of the optimal ate pairing over BN curve on Intel Haswell processor
S Mitsunari
Cryptology ePrint Archive, 2013
282013
Privacy-preserving search for chemical compound databases
K Shimizu, K Nuida, H Arai, S Mitsunari, N Attrapadung, M Hamada, ...
BMC bioinformatics 16, 1-14, 2015
212015
A Fast Implementation of Pairing in Characteristic Three on Intel Core 2 Duo Processor
M Shigeo
Cryptology ePrint Archive, 2009
102009
The vector decomposition problem
M Yoshida, S Mitsunari, T Fujiwara
IEICE transactions on fundamentals of electronics, communications and …, 2010
82010
A timed-release key management scheme for backward recovery
M Yoshida, S Mitsunari, T Fujiwara
International Conference on Information Security and Cryptology, 3-14, 2005
82005
Time-Capsule Encryption
M Yoshida, S Mitsunari, T Fujiwara
IEICE Technical Report; IEICE Tech. Rep. 104 (527), 1-5, 2004
52004
Arbitrary univariate function evaluation and re-encryption protocols over lifted-elgamal type ciphertexts
K Nuida, S Ohata, S Mitsunari, N Attrapadung
Cryptology ePrint Archive, 2019
22019
Efficient software implementation of GMT6-672 and GMT8-542 pairing-friendly curves for a 128-bit security level
Z Song, J Sakamoto, S Mitsunari, N Yoshida, R Anzai, T Matsumoto
International Conference on Applied Cryptography and Network Security, 461-478, 2022
12022
Software implementation of the optimal ate pairing over Barreto-Naehrig curves
S Mitsunari
Symposium on Cryptography and Information Security (SCIS 2012), 2012
12012
An Extension of Traitor Tracing Scheme Using Weil-Pairing on Elliptic curves
S MITSUNARI
ISEC 2002 (50), 117-122, 2002
2002
Software implementation of Attribute-Based Encryption: Appendixes
E Zavattoni, LJD Perez, S Mitsunari, AH Sánchez-Ramırez, T Teruya
Special Section on Cryptography and Information Security
M MAMBO, S ARITA, CM CHENG, K FUKUSHIMA, G HANAOKA, ...
Supporting Information for Privacy-preserving search for chemical compound databases
K Shimizu, K Nuida, H Arai, S Mitsunari, N Attrapadung, M Hamada, ...
系统目前无法执行此操作,请稍后再试。
文章 1–18