DSpace

Future University Hakodate Academic Archive >

Browsing by Author 高木 剛

Jump to: 0-9 A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
or enter first few letters:   
Sort by: In order: Results/Page Authors/Record:
Showing results 24 to 43 of 67
Issue DateTitleAuthor(s)Paper
Apr-2009Certificateless Hybrid SigncryptionLi, Fagen; Shirase, Masaaki; Takagi, Tsuyoshi
2005Collision Attack on XTR and a Countermeasure with Fixed PatternHan, Dong-Guk; Takagi, Tsuyoshi; Kim, Tae Hyun; Kim, Howon; Chung, Kyo Il
Apr-2007Compressed XTRShirase, Masaaki; Han, Dong-Guk; Hibino, Yasushi; Kim, Howon; Takagi, Tsuyoshi
2006Defeating Simple Power Analysis on Koblitz CurvesVuillaume, Camille; Okeya, Katsuyuki; Takagi, Tsuyoshi
2007Efficient Conjunctive Keyword-Searchable Encryption SSNDS-07Ryu, Eun-Kyung; Takagi, Tsuyoshi
2006Efficient Hyperelliptic Curve Cryptosystems using Theta DivisorsKatagi, Masanobu; Akishita, Toru; Kitamura, Izuru; Takagi, Tsuyoshi
1-May-2009Efficient Implementation of Pairing-Based Cryptography on a Sensor NodeShirase, Masaaki; Miyazaki, Yukinori; Takagi, Tsuyoshi; Han, Dong-Guk; Choi, Dooho
2006Efficient Implementation of Tate Pairing on a Mobile Phone using JavaKawahara, Yuto; Takagi, Tsuyoshi; Okamoto, Eiji
Dec-2008Efficient Multi-PKG ID-Based Signcryption for Ad Hoc NetworksLi, Fagen; Shirase, Masaaki; Takagi, Tsuyoshi
2005Efficient Representations on Koblitz Curves with Resistance to Side Channel AttacksOkeya, Katsuyuki; Takagi, Tsuyoshi; Vuillaume, Camille; none
2006Efficient Selectively Convertible Undeniable Signature Without Random racleKurosawa, Kaoru; Takagi, Tsuyoshi
Dec-2008Efficient Signcryption Key Encapsulation without Random OraclesLi, Fagen; Shirase, Masaaki; Takagi, Tsuyoshi
2006Further Security Analysis of XTRHan, Dong-Guk; Takagi, Tsuyoshi; Lim, C.
2006Generalized Powering Functions and Their Application to Digital SignaturesSato, Hisayoshi; Takagi, Tsuyoshi; Tezuka, Satoru; Takaragi, Kazuo
Sep-2009GF(3^n)上の関数体篩法の実装実験林, 卓也; 白勢, 政明; 高木, 剛
2006GPS携帯電話を用いたマルチベンダ対応チャットとスケジューラの実装石山, 慎; 佐々木, 準人; 渡辺, 雅人; 新美, 礼彦; 高木, 剛; 小西, 修; 宮本, 衛市; 高橋, 修
Jun-2006GPS携帯電話を用いたマルチベンダ対応チャットとスケジューラの実装石山, 慎; 佐々木, 準人; 渡辺, 雅人; 新美, 礼彦; 高木, 剛; 小西, 修; 宮本, 衛市; 高橋, 修
Jun-2006GPS携帯電話を用いたマルチベンダ対応チャットとスケジューラの実装”石山, 慎; 佐々木, 準人; 渡辺, 雅人; 新美, 礼彦; 高木, 剛; 小西, 修; 宮本, 衛市; 高橋, 修
Mar-2009Identity-Based Hybrid SigncryptionLi, Fagen; Shirase, Masaaki; Takagi, Tsuyoshi
2005Insider Impersonation-MIM Attack to Tripartite Key Agreement Scheme and An Efficient Protocol for Multiple KeysWang, Lihua; Okamoto, Takeshi; Takagi, Tsuyoshi; Okamoto, Eiji
Showing results 24 to 43 of 67

 

Copyright © 2010-2012 FUTURE UNIVERSITY HAKODATE.
DSpace Software Copyright © 2002-2010  Duraspace