Izu Tetsuya | Fujitsu Laboratories Ltd.
スポンサーリンク
概要
関連著者
-
Izu Tetsuya
Fujitsu Laboratories Ltd.
-
TAKENAKA MASAHIKO
FUJITSU LABORATORIES LTD
-
IZU Tetsuya
FUJITSU LABORATORIES Ltd. and FUJITSU Ltd.
-
Izu Tetsuya
Fujitsu Ltd. Kawasaki‐shi Jpn
-
SHIMOYAMA Takeshi
FUJITSU LABORATORIES Ltd
-
ITOH Kouichi
FUJITSU LABORATORIES Ltd.
-
KUNIHIRO Noboru
University of Electro-Communica-tions
-
SHINOHARA Naoyuki
National Institute of Information and Communications Technology
-
SAKEMI Yumi
Okayama University
-
Takagi Tsuyoshi
School Of Systems Information Science Future University-hakodate
-
Kunihiro Noboru
University Of Tokyo
-
NAKAJIMA Toshiya
Fujitsu Ltd.
-
Itoh Kouichi
Secure Computing Lab. Fujitsu Laboratories Ltd.
-
Lim Jongin
Center For Information And Security Technologies (cist) Korea University
-
Izu Tetsuya
Secure Computing Lab. Fujitsu Laboratories Ltd.
-
Han Dong
Center For Information And Security Technologies (cist) Korea University
-
Takenaka Masahiko
Secure Computing Lab. Fujitsu Laboratories Ltd.
-
Takenaka Masahiko
Fujitsu Laboratories Ltd.
-
SAKURAI Kouichi
Computer Science and Communication Engineering
-
Sakurai Kouichi
Computer & Information Systems Laboratory Mitsubishi Electric Corporation
-
Shinohara Naoyuki
National Inst. Of Information And Communications Technol. Koganei‐shi Jpn
-
Takenaka M
Secure Computing Lab. Fujitsu Laboratories Ltd.
-
Yasuda Masaya
FUJITSU LABORATORIES LTD.
著作論文
- Extending Bleichenbachers Forgery Attack
- Reduction Optimal Trinomials for Efficient Software Implementation of the ηT Pairing
- A Practical Countermeasure against Address-bit Differential Power Analysis (特集:プライバシを保護するコンピュータセキュリティ技術)
- A Note on the Lattice Factoring Method (Cryptography and Information Security)
- Small Secret CRT-Exponent Attacks on Takagi's RSA
- A Note on the Lattice Factoring Method
- Side Channel Cryptanalysis on XTR Public Key Cryptosystem(Discrete Mathematics and Its Applications)
- Detailed Cost Estimation of CNTW Forgery Attack against EMV Signature Scheme
- Experimental Analysis of Cheon's Algorithm against Pairing-friendly Curves
- Extending Bleichenbacher's Forgery Attack