Volgen
Tatsuaki Okamoto
Tatsuaki Okamoto
NTT
Geen geverifieerd e-mailadres
Titel
Geciteerd door
Geciteerd door
Jaar
Reducing elliptic curve logarithms to logarithms in a finite field
AJ Menezes, T Okamoto, SA Vanstone
iEEE Transactions on information Theory 39 (5), 1639-1646, 1993
20451993
Fully secure functional encryption: Attribute-based encryption and (hierarchical) inner product encryption
A Lewko, T Okamoto, A Sahai, K Takashima, B Waters
Annual International Conference on the Theory and Applications of …, 2010
15042010
A practical secret voting scheme for large scale elections
A Fujioka, T Okamoto, K Ohta
International Workshop on the Theory and Application of Cryptographic …, 1992
13501992
Secure integration of asymmetric and symmetric encryption schemes
E Fujisaki, T Okamoto
Annual international cryptology conference, 537-554, 1999
12811999
A new public-key cryptosystem as secure as factoring
T Okamoto, S Uchiyama
International conference on the theory and applications of cryptographic …, 1998
9181998
Provably secure and practical identification schemes and corresponding signature schemes
T Okamoto
Annual international cryptology conference, 31-53, 1992
8211992
Statistical zero knowledge protocols to prove modular polynomial relations
E Fujisaki, T Okamoto
Annual International Cryptology Conference, 16-30, 1997
6461997
Universal electronic cash
T Okamoto, K Ohta
Annual international cryptology conference, 324-337, 1991
6431991
The gap-problems: A new class of problems for the security of cryptographic schemes
T Okamoto, D Pointcheval
International workshop on public key cryptography, 104-118, 2001
6022001
Fully secure functional encryption with general relations from the decisional linear assumption
T Okamoto, K Takashima
Annual cryptology conference, 191-208, 2010
5792010
RSA-OAEP is secure under the RSA assumption
E Fujisaki, T Okamoto, D Pointcheval, J Stern
Annual International Cryptology Conference, 260-274, 2001
4162001
Receipt-free electronic voting schemes for large scale elections
T Okamoto
International Workshop on Security Protocols, 25-35, 1997
3841997
How to enhance the security of public-key encryption at minimum cost
E Fujisaki, T Okamoto
International Workshop on Public Key Cryptography, 53-68, 1999
3821999
Provably secure partially blind signatures
M Abe, T Okamoto
Annual International Cryptology Conference, 271-286, 2000
3742000
Method and apparatus for implementing electronic cash
K Ohta, T Okamoto
US Patent 4,977,595, 1990
3581990
Hierarchical predicate encryption for inner-products
T Okamoto, K Takashima
International Conference on the Theory and Application of Cryptology and …, 2009
3472009
REACT: Rapid enhanced-security asymmetric cryptosystem transform
T Okamoto, D Pointcheval
Cryptographers’ Track at the RSA Conference, 159-174, 2001
3322001
An efficient divisible electronic cash scheme
T Okamoto
Annual International Cryptology Conference, 438-451, 1995
3201995
Secure integration of asymmetric and symmetric encryption schemes
E Fujisaki, T Okamoto
Journal of cryptology 26 (1), 80-101, 2013
2902013
New Public-Key Schemes Based on Elliptic Curves over the Ring Zn
K Koyama, UM Maurer, T Okamoto, SA Vanstone
Annual International Cryptology Conference, 252-266, 1991
2831991
Het systeem kan de bewerking nu niet uitvoeren. Probeer het later opnieuw.
Artikelen 1–20