The SCEAS System
Navigation Menu

Search the dblp DataBase


Kenji Koyama: [Publications] [Author Rank by year] [Co-authors] [Prefers] [Cites] [Cited by]

Publications of Author

  1. Kenji Koyama, Kazuo Ohta
    Identity-based Conference Key Distribution Systems. [Citation Graph (1, 0)][DBLP]
    CRYPTO, 1987, pp:175-184 [Conf]
  2. Kenji Koyama
    Direct Demonstration of the Power to Break Public-Key Cryptosystems. [Citation Graph (0, 0)][DBLP]
    AUSCRYPT, 1990, pp:14-21 [Conf]
  3. Kenji Koyama, Yukio Tsuruoka, Noboru Kunihiro
    Modulus Search for Elliptic Curve Cryptosystems. [Citation Graph (0, 0)][DBLP]
    ASIACRYPT, 1999, pp:1-7 [Conf]
  4. Kazuo Ohta, Kenji Koyama
    Meet-in-the-Middle Attack on Digital Signature Schemes. [Citation Graph (0, 0)][DBLP]
    AUSCRYPT, 1990, pp:140-154 [Conf]
  5. Hiroki Shizuya, Kenji Koyama, Toshiya Itoh
    Demonstrating Possession without Revealing Factors and its Application. [Citation Graph (0, 0)][DBLP]
    AUSCRYPT, 1990, pp:273-293 [Conf]
  6. Kenji Koyama, Ueli M. Maurer, Tatsuaki Okamoto, Scott A. Vanstone
    New Public-Key Schemes Based on Elliptic Curves over the Ring Zn. [Citation Graph (0, 0)][DBLP]
    CRYPTO, 1991, pp:252-266 [Conf]
  7. Kenji Koyama, Routo Terada
    Nonlinear Parity Circuits and their Cryptographic Applications. [Citation Graph (0, 0)][DBLP]
    CRYPTO, 1990, pp:582-600 [Conf]
  8. Kenji Koyama, Yukio Tsuruoka
    Speeding up Elliptic Cryptosystems by Using a Signed Binary Window Method. [Citation Graph (0, 0)][DBLP]
    CRYPTO, 1992, pp:345-357 [Conf]
  9. Kenji Koyama
    Secure Conference Key Distribution Schemes for Conspiracy Attack. [Citation Graph (0, 0)][DBLP]
    EUROCRYPT, 1992, pp:449-453 [Conf]
  10. Kenji Koyama
    Fast RSA-type Schemes Based on Singular Cubic Curves y²+axy=m³(mod n). [Citation Graph (0, 0)][DBLP]
    EUROCRYPT, 1995, pp:329-340 [Conf]
  11. Kenji Koyama, Kazuo Ohta
    Security of Improved Identity-Based Conference Key Distribution Systems. [Citation Graph (0, 0)][DBLP]
    EUROCRYPT, 1988, pp:11-19 [Conf]
  12. Noboru Kunihiro, Kenji Koyama
    Equivalence of Counting the Number of Points on Elliptic Curve over the Ring Zn and Factoring n. [Citation Graph (0, 0)][DBLP]
    EUROCRYPT, 1998, pp:47-58 [Conf]
  13. Kazuo Ohta, Tatsuaki Okamoto, Kenji Koyama
    Membership Authentication for Hierarchical Multigroups Using the Extended Fiat-Shamir Scheme. [Citation Graph (0, 0)][DBLP]
    EUROCRYPT, 1990, pp:446-457 [Conf]
  14. Shuichi Nishio, Kenji Koyama, Toru Nakamura
    Temporal Differences in Eye and Mouth Movements Classifying Facial Expressions of Smiles. [Citation Graph (0, 0)][DBLP]
    FG, 1998, pp:206-213 [Conf]
  15. Kenji Koyama, Routo Terada
    An Augmented Family of Cryptographic Parity Circuits. [Citation Graph (0, 0)][DBLP]
    ISW, 1997, pp:198-208 [Conf]
  16. Kenji Koyama, Atsuhiro Nakamoto
    Acute triangles in triangulations on the plane with minimum degree at least 4. [Citation Graph (0, 0)][DBLP]
    Discrete Mathematics, 2005, v:303, n:1-3, pp:104-116 [Journal]
  17. Kenji Koyama
    On searching for solutions of the Diophantine equation x3 + y3 +2z3 = n. [Citation Graph (0, 0)][DBLP]
    Math. Comput., 2000, v:69, n:232, pp:1735-1742 [Journal]
  18. Kenji Koyama, Yukio Tsuruoka, Hiroshi Sekigawa
    On searching for solutions of the Diophantine equation x3 + y3 + z3 = n. [Citation Graph (0, 0)][DBLP]
    Math. Comput., 1997, v:66, n:218, pp:841-851 [Journal]
  19. Hiroshi Sekigawa, Kenji Koyama
    Nonexistence conditions of a solution for the congruence x1k + ... + xsk = N (mod pn). [Citation Graph (0, 0)][DBLP]
    Math. Comput., 1999, v:68, n:227, pp:1283-1297 [Journal]

  20. An operating system kernel mechanism for the poly-processor system PPS-R. [Citation Graph (, )][DBLP]

Search in 0.003secs, Finished in 0.004secs
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
System created by [] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002