|
Search the dblp DataBase
Jun Kogure:
[Publications]
[Author Rank by year]
[Co-authors]
[Prefers]
[Cites]
[Cited by]
Publications of Author
- Tetsuya Izu, Jun Kogure, Masayuki Noro, Kazuhiro Yokoyama
Efficient Implementation of Schoof's Algorithm. [Citation Graph (0, 0)][DBLP] ASIACRYPT, 1998, pp:66-79 [Conf]
- Tetsuya Izu, Jun Kogure, Masayuki Noro, Kazuhiro Yokoyama
Parameters for Secure Elliptic Curve Cryptosystem - Improvements on Schoof's Algorithm. [Citation Graph (0, 0)][DBLP] Public Key Cryptography, 1998, pp:253-257 [Conf]
- Tetsuya Izu, Jun Kogure, Kazuhiro Yokoyama
Efficient Implementation of Schoof's Algorithm in Case of Characteristic 2. [Citation Graph (0, 0)][DBLP] Public Key Cryptography, 2000, pp:210-222 [Conf]
- Tetsuya Izu, Jun Kogure, Takeshi Shimoyama
CAIRN 2: An FPGA Implementation of the Sieving Step in the Number Field Sieve Method. [Citation Graph (0, 0)][DBLP] CHES, 2007, pp:364-377 [Conf]
- Tetsuya Izu, Jun Kogure, Takeshi Koshiba, Takeshi Shimoyama
Low-density attack revisited. [Citation Graph (0, 0)][DBLP] Des. Codes Cryptography, 2007, v:43, n:1, pp:47-59 [Journal]
Search in 0.002secs, Finished in 0.002secs
|