A new traitor tracing S Mitsunari, R Sakai, M Kasahara IEICE transactions on fundamentals of electronics, communications and …, 2002 | 411 | 2002 |
High-speed software implementation of the optimal ate pairing over Barreto–Naehrig curves JL Beuchat, JE González-Díaz, S Mitsunari, E Okamoto, ... Pairing-Based Cryptography-Pairing 2010: 4th International Conference …, 2010 | 270 | 2010 |
Multi-core implementation of the Tate pairing over supersingular elliptic curves JL Beuchat, E López-Trejo, L Martínez-Ramos, S Mitsunari, ... International Conference on Cryptology and Network Security, 413-432, 2009 | 73 | 2009 |
Software implementation of an attribute-based encryption scheme E Zavattoni, LJD Perez, S Mitsunari, AH Sánchez-Ramırez, T Teruya, ... IEEE Transactions on Computers 64 (5), 1429-1441, 2014 | 62 | 2014 |
Efficient two-level homomorphic encryption in prime-order bilinear groups and a fast implementation in webassembly N Attrapadung, G Hanaoka, S Mitsunari, Y Sakai, K Shimizu, T Teruya Proceedings of the 2018 on Asia Conference on Computer and Communications …, 2018 | 30 | 2018 |
A fast implementation of the optimal ate pairing over BN curve on Intel Haswell processor S Mitsunari Cryptology ePrint Archive, 2013 | 28 | 2013 |
Privacy-preserving search for chemical compound databases K Shimizu, K Nuida, H Arai, S Mitsunari, N Attrapadung, M Hamada, ... BMC bioinformatics 16, 1-14, 2015 | 21 | 2015 |
A Fast Implementation of Pairing in Characteristic Three on Intel Core 2 Duo Processor M Shigeo Cryptology ePrint Archive, 2009 | 10 | 2009 |
The vector decomposition problem M Yoshida, S Mitsunari, T Fujiwara IEICE transactions on fundamentals of electronics, communications and …, 2010 | 8 | 2010 |
A timed-release key management scheme for backward recovery M Yoshida, S Mitsunari, T Fujiwara International Conference on Information Security and Cryptology, 3-14, 2005 | 8 | 2005 |
Time-Capsule Encryption M Yoshida, S Mitsunari, T Fujiwara IEICE Technical Report; IEICE Tech. Rep. 104 (527), 1-5, 2004 | 5 | 2004 |
Arbitrary univariate function evaluation and re-encryption protocols over lifted-elgamal type ciphertexts K Nuida, S Ohata, S Mitsunari, N Attrapadung Cryptology ePrint Archive, 2019 | 2 | 2019 |
Efficient software implementation of GMT6-672 and GMT8-542 pairing-friendly curves for a 128-bit security level Z Song, J Sakamoto, S Mitsunari, N Yoshida, R Anzai, T Matsumoto International Conference on Applied Cryptography and Network Security, 461-478, 2022 | 1 | 2022 |
Software implementation of the optimal ate pairing over Barreto-Naehrig curves S Mitsunari Symposium on Cryptography and Information Security (SCIS 2012), 2012 | 1 | 2012 |
An Extension of Traitor Tracing Scheme Using Weil-Pairing on Elliptic curves S MITSUNARI ISEC 2002 (50), 117-122, 2002 | | 2002 |
Software implementation of Attribute-Based Encryption: Appendixes E Zavattoni, LJD Perez, S Mitsunari, AH Sánchez-Ramırez, T Teruya | | |
Special Section on Cryptography and Information Security M MAMBO, S ARITA, CM CHENG, K FUKUSHIMA, G HANAOKA, ... | | |
Supporting Information for Privacy-preserving search for chemical compound databases K Shimizu, K Nuida, H Arai, S Mitsunari, N Attrapadung, M Hamada, ... | | |