BibTeX records: Yumi Sakemi

download as .bib file

@inproceedings{DBLP:conf/compsac/AkiyamaMMSK18,
  author       = {Toyokazu Akiyama and
                  Morito Matsuoka and
                  Kazuhiro Matsuda and
                  Yumi Sakemi and
                  Hisashi Kojima},
  editor       = {Sorel Reisman and
                  Sheikh Iqbal Ahamed and
                  Claudio Demartini and
                  Thomas M. Conte and
                  Ling Liu and
                  William R. Claycomb and
                  Motonori Nakamura and
                  Edmundo Tovar and
                  Stelvio Cimato and
                  Chung{-}Horng Lung and
                  Hiroki Takakura and
                  Ji{-}Jiang Yang and
                  Toyokazu Akiyama and
                  Zhiyong Zhang and
                  Md. Kamrul Hasan},
  title        = {Secure and Long-Lived Wireless Sensor Network for Data Center Monitoring},
  booktitle    = {2018 {IEEE} 42nd Annual Computer Software and Applications Conference,
                  {COMPSAC} 2018, Tokyo, Japan, 23-27 July 2018, Volume 2},
  pages        = {559--564},
  publisher    = {{IEEE} Computer Society},
  year         = {2018},
  url          = {https://doi.org/10.1109/COMPSAC.2018.10295},
  doi          = {10.1109/COMPSAC.2018.10295},
  timestamp    = {Mon, 19 Aug 2024 08:42:01 +0200},
  biburl       = {https://dblp.org/rec/conf/compsac/AkiyamaMMSK18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/nbis/SakemiTI15,
  author       = {Yumi Sakemi and
                  Masahiko Takenaka and
                  Tetsuya Izu},
  editor       = {Leonard Barolli and
                  Makoto Takizawa and
                  Hui{-}Huang Hsu and
                  Tomoya Enokido and
                  Fatos Xhafa},
  title        = {{SPIKE:} Scalable Peer Intermediaries for Key Establishment in Sensor
                  Networks},
  booktitle    = {18th International Conference on Network-Based Information Systems,
                  NBis 2015, Taipei, Taiwan, September 2-4, 2015},
  pages        = {634--639},
  publisher    = {{IEEE} Computer Society},
  year         = {2015},
  url          = {https://doi.org/10.1109/NBiS.2015.94},
  doi          = {10.1109/NBIS.2015.94},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/nbis/SakemiTI15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/aina/IzuSTT14,
  author       = {Tetsuya Izu and
                  Yumi Sakemi and
                  Masahiko Takenaka and
                  Naoya Torii},
  editor       = {Leonard Barolli and
                  Kin Fun Li and
                  Tomoya Enokido and
                  Fatos Xhafa and
                  Makoto Takizawa},
  title        = {A Spoofing Attack against a Cancelable Biometric Authentication Scheme},
  booktitle    = {28th {IEEE} International Conference on Advanced Information Networking
                  and Applications, {AINA} 2014, Victoria, BC, Canada, May 13-16, 2014},
  pages        = {234--239},
  publisher    = {{IEEE} Computer Society},
  year         = {2014},
  url          = {https://doi.org/10.1109/AINA.2014.33},
  doi          = {10.1109/AINA.2014.33},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/aina/IzuSTT14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/imis/IzuOSTT14,
  author       = {Tetsuya Izu and
                  Takao Ogura and
                  Yumi Sakemi and
                  Masahiko Takenaka and
                  Hiroshi Tsuda},
  title        = {Privacy-Preserving Technology for Secure Utilization of Sensor Data
                  (Extended Abstract)},
  booktitle    = {Eighth International Conference on Innovative Mobile and Internet
                  Services in Ubiquitous Computing, {IMIS} 2014, Birmingham, United
                  Kingdom, 2-4 July, 2014},
  pages        = {583},
  publisher    = {{IEEE} Computer Society},
  year         = {2014},
  url          = {https://doi.org/10.1109/IMIS.2014.86},
  doi          = {10.1109/IMIS.2014.86},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/imis/IzuOSTT14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/nbis/SakemiIS13,
  author       = {Yumi Sakemi and
                  Tetsuya Izu and
                  Masaaki Shirase},
  editor       = {Leonard Barolli and
                  Tomoya Enokido and
                  Fatos Xhafa and
                  Makoto Takizawa and
                  James J. Park},
  title        = {Faster Scalar Multiplication for Elliptic Curve Cryptosystems},
  booktitle    = {16th International Conference on Network-Based Information Systems,
                  NBiS 2013, Seo-gu, Gwangju, CA, Korea (South), September 4-6, 2013},
  pages        = {523--527},
  publisher    = {{IEEE} Computer Society},
  year         = {2013},
  url          = {https://doi.org/10.1109/NBiS.2013.87},
  doi          = {10.1109/NBIS.2013.87},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/nbis/SakemiIS13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pkc/SakemiHITY12,
  author       = {Yumi Sakemi and
                  Goichiro Hanaoka and
                  Tetsuya Izu and
                  Masahiko Takenaka and
                  Masaya Yasuda},
  editor       = {Marc Fischlin and
                  Johannes Buchmann and
                  Mark Manulis},
  title        = {Solving a Discrete Logarithm Problem with Auxiliary Input on a 160-Bit
                  Elliptic Curve},
  booktitle    = {Public Key Cryptography - {PKC} 2012 - 15th International Conference
                  on Practice and Theory in Public Key Cryptography, Darmstadt, Germany,
                  May 21-23, 2012. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7293},
  pages        = {595--608},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-30057-8\_35},
  doi          = {10.1007/978-3-642-30057-8\_35},
  timestamp    = {Mon, 16 Nov 2020 15:55:52 +0100},
  biburl       = {https://dblp.org/rec/conf/pkc/SakemiHITY12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieicet/SakemiNTM11,
  author       = {Yumi Sakemi and
                  Yasuyuki Nogami and
                  Shoichi Takeuchi and
                  Yoshitaka Morikawa},
  title        = {An Improvement of Twisted Ate Pairing Efficient for Multi-Pairing
                  and Thread Computing},
  journal      = {{IEICE} Trans. Fundam. Electron. Commun. Comput. Sci.},
  volume       = {94-A},
  number       = {6},
  pages        = {1356--1367},
  year         = {2011},
  url          = {https://doi.org/10.1587/transfun.E94.A.1356},
  doi          = {10.1587/TRANSFUN.E94.A.1356},
  timestamp    = {Sat, 11 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ieicet/SakemiNTM11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieicet/IzuST11,
  author       = {Tetsuya Izu and
                  Yumi Sakemi and
                  Masahiko Takenaka},
  title        = {Detailed Cost Estimation of {CNTW} Forgery Attack against {EMV} Signature
                  Scheme},
  journal      = {{IEICE} Trans. Inf. Syst.},
  volume       = {94-D},
  number       = {11},
  pages        = {2111--2118},
  year         = {2011},
  url          = {https://doi.org/10.1587/transinf.E94.D.2111},
  doi          = {10.1587/TRANSINF.E94.D.2111},
  timestamp    = {Sat, 11 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ieicet/IzuST11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fc/IzuMNST11,
  author       = {Tetsuya Izu and
                  Yoshitaka Morikawa and
                  Yasuyuki Nogami and
                  Yumi Sakemi and
                  Masahiko Takenaka},
  editor       = {George Danezis and
                  Sven Dietrich and
                  Kazue Sako},
  title        = {Detailed Cost Estimation of {CNTW} Attack against {EMV} Signature
                  Scheme},
  booktitle    = {Financial Cryptography and Data Security - {FC} 2011 Workshops, {RLCPS}
                  and {WECSR} 2011, Rodney Bay, St. Lucia, February 28 - March 4, 2011,
                  Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {7126},
  pages        = {13--26},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-3-642-29889-9\_3},
  doi          = {10.1007/978-3-642-29889-9\_3},
  timestamp    = {Tue, 14 May 2019 10:00:38 +0200},
  biburl       = {https://dblp.org/rec/conf/fc/IzuMNST11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wisa/SakemiITY11,
  author       = {Yumi Sakemi and
                  Tetsuya Izu and
                  Masahiko Takenaka and
                  Masaya Yasuda},
  editor       = {Souhwan Jung and
                  Moti Yung},
  title        = {Solving a {DLP} with Auxiliary Input with the {\(\rho\)}-Algorithm},
  booktitle    = {Information Security Applications - 12th International Workshop, {WISA}
                  2011, Jeju Island, Korea, August 22-24, 2011. Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {7115},
  pages        = {98--108},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-3-642-27890-7\_8},
  doi          = {10.1007/978-3-642-27890-7\_8},
  timestamp    = {Tue, 14 May 2019 10:00:35 +0200},
  biburl       = {https://dblp.org/rec/conf/wisa/SakemiITY11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wistp/SakemiITY11,
  author       = {Yumi Sakemi and
                  Tetsuya Izu and
                  Masahiko Takenaka and
                  Masaya Yasuda},
  editor       = {Claudio A. Ardagna and
                  Jianying Zhou},
  title        = {Solving {DLP} with Auxiliary Input over an Elliptic Curve Used in
                  TinyTate Library},
  booktitle    = {Information Security Theory and Practice. Security and Privacy of
                  Mobile Devices in Wireless Communication - 5th {IFIP} {WG} 11.2 International
                  Workshop, {WISTP} 2011, Heraklion, Crete, Greece, June 1-3, 2011.
                  Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6633},
  pages        = {116--127},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-3-642-21040-2\_8},
  doi          = {10.1007/978-3-642-21040-2\_8},
  timestamp    = {Mon, 21 Mar 2022 18:09:53 +0100},
  biburl       = {https://dblp.org/rec/conf/wistp/SakemiITY11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/aiss/SakemiKTNM10,
  author       = {Yumi Sakemi and
                  Hidehiro Kato and
                  Shoichi Takeuchi and
                  Yasuyuki Nogami and
                  Yoshitaka Morikawa},
  title        = {Two Improvements of Twisted Ate Pairing with Barreto-Naehrig Curve
                  by Dividing Miller's Algorithm},
  journal      = {Adv. Inf. Sci. Serv. Sci.},
  volume       = {2},
  number       = {4},
  pages        = {1--13},
  year         = {2010},
  url          = {http://www.aicit.org/aiss/ppl/01\_AISS2-149017IP.pdf},
  timestamp    = {Wed, 20 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/aiss/SakemiKTNM10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/nbis/SakemiNINM10,
  author       = {Yumi Sakemi and
                  Kazushi Nishii and
                  Tetsuya Izuta and
                  Yasuyuki Nogami and
                  Yoshitaka Morikawa},
  editor       = {Tomoya Enokido and
                  Fatos Xhafa and
                  Leonard Barolli and
                  Makoto Takizawa and
                  Minoru Uehara and
                  Arjan Durresi},
  title        = {Accelerating Cross Twisted Ate Pairing with Ordinary Pairing Friendly
                  Curve of Composite Order That Has Two Large Prime Factors},
  booktitle    = {The 13th International Conference on Network-Based Information Systems,
                  NBiS 2010, Takayama, Gifu, Japan, 14-16 September 2010},
  pages        = {552--557},
  publisher    = {{IEEE} Computer Society},
  year         = {2010},
  url          = {https://doi.org/10.1109/NBiS.2010.89},
  doi          = {10.1109/NBIS.2010.89},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/nbis/SakemiNINM10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieicet/NogamiSONAM09,
  author       = {Yasuyuki Nogami and
                  Yumi Sakemi and
                  Takumi Okimoto and
                  Kenta Nekado and
                  Masataka Akane and
                  Yoshitaka Morikawa},
  title        = {Scalar Multiplication Using Frobenius Expansion over Twisted Elliptic
                  Curve for Ate Pairing Based Cryptography},
  journal      = {{IEICE} Trans. Fundam. Electron. Commun. Comput. Sci.},
  volume       = {92-A},
  number       = {1},
  pages        = {182--189},
  year         = {2009},
  url          = {https://doi.org/10.1587/transfun.E92.A.182},
  doi          = {10.1587/TRANSFUN.E92.A.182},
  timestamp    = {Sat, 11 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ieicet/NogamiSONAM09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieicet/NogamiSKAM09,
  author       = {Yasuyuki Nogami and
                  Yumi Sakemi and
                  Hidehiro Kato and
                  Masataka Akane and
                  Yoshitaka Morikawa},
  title        = {Integer Variable chi-Based Cross Twisted Ate Pairing and Its Optimization
                  for Barreto-Naehrig Curve},
  journal      = {{IEICE} Trans. Fundam. Electron. Commun. Comput. Sci.},
  volume       = {92-A},
  number       = {8},
  pages        = {1859--1867},
  year         = {2009},
  url          = {https://doi.org/10.1587/transfun.E92.A.1859},
  doi          = {10.1587/TRANSFUN.E92.A.1859},
  timestamp    = {Sat, 11 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ieicet/NogamiSKAM09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icisc/SakemiTNM09,
  author       = {Yumi Sakemi and
                  Shoichi Takeuchi and
                  Yasuyuki Nogami and
                  Yoshitaka Morikawa},
  editor       = {Dong Hoon Lee and
                  Seokhie Hong},
  title        = {Accelerating Twisted Ate Pairing with Frobenius Map, Small Scalar
                  Multiplication, and Multi-pairing},
  booktitle    = {Information, Security and Cryptology - {ICISC} 2009, 12th International
                  Conference, Seoul, Korea, December 2-4, 2009, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {5984},
  pages        = {47--64},
  publisher    = {Springer},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-3-642-14423-3\_4},
  doi          = {10.1007/978-3-642-14423-3\_4},
  timestamp    = {Tue, 14 May 2019 10:00:36 +0200},
  biburl       = {https://dblp.org/rec/conf/icisc/SakemiTNM09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isit/SakemiMNK09,
  author       = {Yumi Sakemi and
                  Yoshitaka Morikawa and
                  Yasuyuki Nogami and
                  Hidehiro Kato},
  title        = {Cross twisted Xate pairing with Barreto-Naehrig curve for multi-pairing
                  technique},
  booktitle    = {{IEEE} International Symposium on Information Theory, {ISIT} 2009,
                  June 28 - July 3, 2009, Seoul, Korea, Proceedings},
  pages        = {2386--2390},
  publisher    = {{IEEE}},
  year         = {2009},
  url          = {https://doi.org/10.1109/ISIT.2009.5205994},
  doi          = {10.1109/ISIT.2009.5205994},
  timestamp    = {Wed, 16 Oct 2019 14:14:48 +0200},
  biburl       = {https://dblp.org/rec/conf/isit/SakemiMNK09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cans/SakemiNOKM08,
  author       = {Yumi Sakemi and
                  Yasuyuki Nogami and
                  Katsuyuki Okeya and
                  Hidehiro Katou and
                  Yoshitaka Morikawa},
  editor       = {Matthew K. Franklin and
                  Lucas Chi Kwong Hui and
                  Duncan S. Wong},
  title        = {Skew Frobenius Map and Efficient Scalar Multiplication for Pairing-Based
                  Cryptography},
  booktitle    = {Cryptology and Network Security, 7th International Conference, {CANS}
                  2008, Hong-Kong, China, December 2-4, 2008. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5339},
  pages        = {226--239},
  publisher    = {Springer},
  year         = {2008},
  url          = {https://doi.org/10.1007/978-3-540-89641-8\_16},
  doi          = {10.1007/978-3-540-89641-8\_16},
  timestamp    = {Tue, 14 May 2019 10:00:50 +0200},
  biburl       = {https://dblp.org/rec/conf/cans/SakemiNOKM08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pairing/NogamiASKM08,
  author       = {Yasuyuki Nogami and
                  Masataka Akane and
                  Yumi Sakemi and
                  Hidehiro Katou and
                  Yoshitaka Morikawa},
  editor       = {Steven D. Galbraith and
                  Kenneth G. Paterson},
  title        = {Integer Variable chi-Based Ate Pairing},
  booktitle    = {Pairing-Based Cryptography - Pairing 2008, Second International Conference,
                  Egham, UK, September 1-3, 2008. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5209},
  pages        = {178--191},
  publisher    = {Springer},
  year         = {2008},
  url          = {https://doi.org/10.1007/978-3-540-85538-5\_13},
  doi          = {10.1007/978-3-540-85538-5\_13},
  timestamp    = {Tue, 14 May 2019 10:00:42 +0200},
  biburl       = {https://dblp.org/rec/conf/pairing/NogamiASKM08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}