The SCEAS System
| |||||||

## Search the dblp DataBase
Kenji Koyama:
[Publications]
[Author Rank by year]
[Co-authors]
[Prefers]
[Cites]
[Cited by]
## Publications of Author- Kenji Koyama, Kazuo Ohta
**Identity-based Conference Key Distribution Systems.**[Citation Graph (1, 0)][DBLP] CRYPTO, 1987, pp:175-184 [Conf] - Kenji Koyama
**Direct Demonstration of the Power to Break Public-Key Cryptosystems.**[Citation Graph (0, 0)][DBLP] AUSCRYPT, 1990, pp:14-21 [Conf] - Kenji Koyama, Yukio Tsuruoka, Noboru Kunihiro
**Modulus Search for Elliptic Curve Cryptosystems.**[Citation Graph (0, 0)][DBLP] ASIACRYPT, 1999, pp:1-7 [Conf] - Kazuo Ohta, Kenji Koyama
**Meet-in-the-Middle Attack on Digital Signature Schemes.**[Citation Graph (0, 0)][DBLP] AUSCRYPT, 1990, pp:140-154 [Conf] - Hiroki Shizuya, Kenji Koyama, Toshiya Itoh
**Demonstrating Possession without Revealing Factors and its Application.**[Citation Graph (0, 0)][DBLP] AUSCRYPT, 1990, pp:273-293 [Conf] - Kenji Koyama, Ueli M. Maurer, Tatsuaki Okamoto, Scott A. Vanstone
**New Public-Key Schemes Based on Elliptic Curves over the Ring Z**[Citation Graph (0, 0)][DBLP]_{n}. CRYPTO, 1991, pp:252-266 [Conf] - Kenji Koyama, Routo Terada
**Nonlinear Parity Circuits and their Cryptographic Applications.**[Citation Graph (0, 0)][DBLP] CRYPTO, 1990, pp:582-600 [Conf] - Kenji Koyama, Yukio Tsuruoka
**Speeding up Elliptic Cryptosystems by Using a Signed Binary Window Method.**[Citation Graph (0, 0)][DBLP] CRYPTO, 1992, pp:345-357 [Conf] - Kenji Koyama
**Secure Conference Key Distribution Schemes for Conspiracy Attack.**[Citation Graph (0, 0)][DBLP] EUROCRYPT, 1992, pp:449-453 [Conf] - Kenji Koyama
**Fast RSA-type Schemes Based on Singular Cubic Curves y²+axy=m³(mod n).**[Citation Graph (0, 0)][DBLP] EUROCRYPT, 1995, pp:329-340 [Conf] - Kenji Koyama, Kazuo Ohta
**Security of Improved Identity-Based Conference Key Distribution Systems.**[Citation Graph (0, 0)][DBLP] EUROCRYPT, 1988, pp:11-19 [Conf] - Noboru Kunihiro, Kenji Koyama
**Equivalence of Counting the Number of Points on Elliptic Curve over the Ring Z**[Citation Graph (0, 0)][DBLP]_{n}and Factoring n. EUROCRYPT, 1998, pp:47-58 [Conf] - Kazuo Ohta, Tatsuaki Okamoto, Kenji Koyama
**Membership Authentication for Hierarchical Multigroups Using the Extended Fiat-Shamir Scheme.**[Citation Graph (0, 0)][DBLP] EUROCRYPT, 1990, pp:446-457 [Conf] - Shuichi Nishio, Kenji Koyama, Toru Nakamura
**Temporal Differences in Eye and Mouth Movements Classifying Facial Expressions of Smiles.**[Citation Graph (0, 0)][DBLP] FG, 1998, pp:206-213 [Conf] - Kenji Koyama, Routo Terada
**An Augmented Family of Cryptographic Parity Circuits.**[Citation Graph (0, 0)][DBLP] ISW, 1997, pp:198-208 [Conf] - Kenji Koyama, Atsuhiro Nakamoto
**Acute triangles in triangulations on the plane with minimum degree at least 4.**[Citation Graph (0, 0)][DBLP] Discrete Mathematics, 2005, v:303, n:1-3, pp:104-116 [Journal] - Kenji Koyama
**On searching for solutions of the Diophantine equation x**[Citation Graph (0, 0)][DBLP]^{3}+ y^{3}+2z^{3}= n. Math. Comput., 2000, v:69, n:232, pp:1735-1742 [Journal] - Kenji Koyama, Yukio Tsuruoka, Hiroshi Sekigawa
**On searching for solutions of the Diophantine equation x**[Citation Graph (0, 0)][DBLP]^{3}+ y^{3}+ z^{3}= n. Math. Comput., 1997, v:66, n:218, pp:841-851 [Journal] - Hiroshi Sekigawa, Kenji Koyama
**Nonexistence conditions of a solution for the congruence x1**[Citation Graph (0, 0)][DBLP]^{k}+ ... + xs^{k}= N (mod p^{n}). Math. Comput., 1999, v:68, n:227, pp:1283-1297 [Journal] **An operating system kernel mechanism for the poly-processor system PPS-R.**[Citation Graph (, )][DBLP]
Search in 0.003secs, Finished in 0.004secs | |||||||

| |||||||

| |||||||

System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002 for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002 |