DSpace

Future University Hakodate Academic Archive >

Browsing by Author 高木 剛

Jump to: 0-9 A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
or enter first few letters:   
Sort by: In order: Results/Page Authors/Record:
Showing results 36 to 55 of 67
Issue DateTitleAuthor(s)Paper
2006Further Security Analysis of XTRHan, Dong-Guk; Takagi, Tsuyoshi; Lim, C.
2006Generalized Powering Functions and Their Application to Digital SignaturesSato, Hisayoshi; Takagi, Tsuyoshi; Tezuka, Satoru; Takaragi, Kazuo
Sep-2009GF(3^n)上の関数体篩法の実装実験林, 卓也; 白勢, 政明; 高木, 剛
2006GPS携帯電話を用いたマルチベンダ対応チャットとスケジューラの実装石山, 慎; 佐々木, 準人; 渡辺, 雅人; 新美, 礼彦; 高木, 剛; 小西, 修; 宮本, 衛市; 高橋, 修
Jun-2006GPS携帯電話を用いたマルチベンダ対応チャットとスケジューラの実装石山, 慎; 佐々木, 準人; 渡辺, 雅人; 新美, 礼彦; 高木, 剛; 小西, 修; 宮本, 衛市; 高橋, 修
Jun-2006GPS携帯電話を用いたマルチベンダ対応チャットとスケジューラの実装”石山, 慎; 佐々木, 準人; 渡辺, 雅人; 新美, 礼彦; 高木, 剛; 小西, 修; 宮本, 衛市; 高橋, 修
Mar-2009Identity-Based Hybrid SigncryptionLi, Fagen; Shirase, Masaaki; Takagi, Tsuyoshi
2005Insider Impersonation-MIM Attack to Tripartite Key Agreement Scheme and An Efficient Protocol for Multiple KeysWang, Lihua; Okamoto, Takeshi; Takagi, Tsuyoshi; Okamoto, Eiji
2005k-Resilient ID-Based Key Distribution Schemes from PairingTso, Raylin; Okamoto, Takeshi; Takagi, Tsuyoshi; Okamoto, Eiji
Oct-2008Key Management Using Certificateless Public Key Cryptography in Ad Hoc NetworksLi, Fagen; Shirase, Masaaki; Takagi, Tsuyoshi
Sep-2008Network Forensics on Mobile Ads-Hoc NetworksOtaka, Akira; Takagi, Tsuyoshi; Takahashi, Osamu
2006New Security Problem in RFID Systems ”Tag Killing”Han, Dong-Guk; Takagi, Tsuyoshi; Kim, Howon; Chung, Kyo Il
Dec-2008On the Security of Online/Offline Signatures and Multisignatures from ACISP'06Li, Fagen; Shirase, Masaaki; Takagi, Tsuyoshi
2005Paillier's Cryptosystem Modulo p2q and its Applications to Trapdoor Commitment SchemeTakagi, Tsuyoshi; Schmidt-Samoa, Katja
2006Power Analysis to ECC Using Differential Power between Multiplication and SquaringAkishita, Toru; Takagi, Tsuyoshi
2007Privacy-Preserving Two-Party K-Means Clustering Via Secure ApproximationSu, Chunhua; Bao, Feng; Zhou, Jianying; Takagi, Tsuyoshi; Sakurai, Kouichi
2006Radix-r Non-Adjacent Form and Its Application to Pairing-Based CryptosystemTakagi, Tsuyoshi; Reis, David; Yen, Sung-Ming; Wu, Bo-Ching
2006Security Analysis of CRT-Based CryptosystemsOkeya, Katsuyuki; Takagi, Tsuyoshi
2006Security Analysis of the SPA-Resistant Fractional Width MethodOkeya, Katsuyuki; Takagi, Tsuyoshi; Vuillaume, Camille
2005Short-Memory Scalar Multiplication on Koblitz CurvesTakagi, Tsuyoshi; Okeya, Katsuyuki; Vuillaume, Camille
Showing results 36 to 55 of 67

 

Copyright © 2010-2012 FUTURE UNIVERSITY HAKODATE.
DSpace Software Copyright © 2002-2010  Duraspace