default search action
BibTeX records: Yumi Sakemi
@inproceedings{DBLP:conf/compsac/AkiyamaMMSK18, author = {Toyokazu Akiyama and Morito Matsuoka and Kazuhiro Matsuda and Yumi Sakemi and Hisashi Kojima}, editor = {Sorel Reisman and Sheikh Iqbal Ahamed and Claudio Demartini and Thomas M. Conte and Ling Liu and William R. Claycomb and Motonori Nakamura and Edmundo Tovar and Stelvio Cimato and Chung{-}Horng Lung and Hiroki Takakura and Ji{-}Jiang Yang and Toyokazu Akiyama and Zhiyong Zhang and Md. Kamrul Hasan}, title = {Secure and Long-Lived Wireless Sensor Network for Data Center Monitoring}, booktitle = {2018 {IEEE} 42nd Annual Computer Software and Applications Conference, {COMPSAC} 2018, Tokyo, Japan, 23-27 July 2018, Volume 2}, pages = {559--564}, publisher = {{IEEE} Computer Society}, year = {2018}, url = {https://doi.org/10.1109/COMPSAC.2018.10295}, doi = {10.1109/COMPSAC.2018.10295}, timestamp = {Mon, 19 Aug 2024 08:42:01 +0200}, biburl = {https://dblp.org/rec/conf/compsac/AkiyamaMMSK18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/nbis/SakemiTI15, author = {Yumi Sakemi and Masahiko Takenaka and Tetsuya Izu}, editor = {Leonard Barolli and Makoto Takizawa and Hui{-}Huang Hsu and Tomoya Enokido and Fatos Xhafa}, title = {{SPIKE:} Scalable Peer Intermediaries for Key Establishment in Sensor Networks}, booktitle = {18th International Conference on Network-Based Information Systems, NBis 2015, Taipei, Taiwan, September 2-4, 2015}, pages = {634--639}, publisher = {{IEEE} Computer Society}, year = {2015}, url = {https://doi.org/10.1109/NBiS.2015.94}, doi = {10.1109/NBIS.2015.94}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/nbis/SakemiTI15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/aina/IzuSTT14, author = {Tetsuya Izu and Yumi Sakemi and Masahiko Takenaka and Naoya Torii}, editor = {Leonard Barolli and Kin Fun Li and Tomoya Enokido and Fatos Xhafa and Makoto Takizawa}, title = {A Spoofing Attack against a Cancelable Biometric Authentication Scheme}, booktitle = {28th {IEEE} International Conference on Advanced Information Networking and Applications, {AINA} 2014, Victoria, BC, Canada, May 13-16, 2014}, pages = {234--239}, publisher = {{IEEE} Computer Society}, year = {2014}, url = {https://doi.org/10.1109/AINA.2014.33}, doi = {10.1109/AINA.2014.33}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/aina/IzuSTT14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/imis/IzuOSTT14, author = {Tetsuya Izu and Takao Ogura and Yumi Sakemi and Masahiko Takenaka and Hiroshi Tsuda}, title = {Privacy-Preserving Technology for Secure Utilization of Sensor Data (Extended Abstract)}, booktitle = {Eighth International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing, {IMIS} 2014, Birmingham, United Kingdom, 2-4 July, 2014}, pages = {583}, publisher = {{IEEE} Computer Society}, year = {2014}, url = {https://doi.org/10.1109/IMIS.2014.86}, doi = {10.1109/IMIS.2014.86}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/imis/IzuOSTT14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/nbis/SakemiIS13, author = {Yumi Sakemi and Tetsuya Izu and Masaaki Shirase}, editor = {Leonard Barolli and Tomoya Enokido and Fatos Xhafa and Makoto Takizawa and James J. Park}, title = {Faster Scalar Multiplication for Elliptic Curve Cryptosystems}, booktitle = {16th International Conference on Network-Based Information Systems, NBiS 2013, Seo-gu, Gwangju, CA, Korea (South), September 4-6, 2013}, pages = {523--527}, publisher = {{IEEE} Computer Society}, year = {2013}, url = {https://doi.org/10.1109/NBiS.2013.87}, doi = {10.1109/NBIS.2013.87}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/nbis/SakemiIS13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pkc/SakemiHITY12, author = {Yumi Sakemi and Goichiro Hanaoka and Tetsuya Izu and Masahiko Takenaka and Masaya Yasuda}, editor = {Marc Fischlin and Johannes Buchmann and Mark Manulis}, title = {Solving a Discrete Logarithm Problem with Auxiliary Input on a 160-Bit Elliptic Curve}, booktitle = {Public Key Cryptography - {PKC} 2012 - 15th International Conference on Practice and Theory in Public Key Cryptography, Darmstadt, Germany, May 21-23, 2012. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7293}, pages = {595--608}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-30057-8\_35}, doi = {10.1007/978-3-642-30057-8\_35}, timestamp = {Mon, 16 Nov 2020 15:55:52 +0100}, biburl = {https://dblp.org/rec/conf/pkc/SakemiHITY12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieicet/SakemiNTM11, author = {Yumi Sakemi and Yasuyuki Nogami and Shoichi Takeuchi and Yoshitaka Morikawa}, title = {An Improvement of Twisted Ate Pairing Efficient for Multi-Pairing and Thread Computing}, journal = {{IEICE} Trans. Fundam. Electron. Commun. Comput. Sci.}, volume = {94-A}, number = {6}, pages = {1356--1367}, year = {2011}, url = {https://doi.org/10.1587/transfun.E94.A.1356}, doi = {10.1587/TRANSFUN.E94.A.1356}, timestamp = {Sat, 11 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ieicet/SakemiNTM11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieicet/IzuST11, author = {Tetsuya Izu and Yumi Sakemi and Masahiko Takenaka}, title = {Detailed Cost Estimation of {CNTW} Forgery Attack against {EMV} Signature Scheme}, journal = {{IEICE} Trans. Inf. Syst.}, volume = {94-D}, number = {11}, pages = {2111--2118}, year = {2011}, url = {https://doi.org/10.1587/transinf.E94.D.2111}, doi = {10.1587/TRANSINF.E94.D.2111}, timestamp = {Sat, 11 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ieicet/IzuST11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fc/IzuMNST11, author = {Tetsuya Izu and Yoshitaka Morikawa and Yasuyuki Nogami and Yumi Sakemi and Masahiko Takenaka}, editor = {George Danezis and Sven Dietrich and Kazue Sako}, title = {Detailed Cost Estimation of {CNTW} Attack against {EMV} Signature Scheme}, booktitle = {Financial Cryptography and Data Security - {FC} 2011 Workshops, {RLCPS} and {WECSR} 2011, Rodney Bay, St. Lucia, February 28 - March 4, 2011, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {7126}, pages = {13--26}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-3-642-29889-9\_3}, doi = {10.1007/978-3-642-29889-9\_3}, timestamp = {Tue, 14 May 2019 10:00:38 +0200}, biburl = {https://dblp.org/rec/conf/fc/IzuMNST11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisa/SakemiITY11, author = {Yumi Sakemi and Tetsuya Izu and Masahiko Takenaka and Masaya Yasuda}, editor = {Souhwan Jung and Moti Yung}, title = {Solving a {DLP} with Auxiliary Input with the {\(\rho\)}-Algorithm}, booktitle = {Information Security Applications - 12th International Workshop, {WISA} 2011, Jeju Island, Korea, August 22-24, 2011. Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {7115}, pages = {98--108}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-3-642-27890-7\_8}, doi = {10.1007/978-3-642-27890-7\_8}, timestamp = {Tue, 14 May 2019 10:00:35 +0200}, biburl = {https://dblp.org/rec/conf/wisa/SakemiITY11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wistp/SakemiITY11, author = {Yumi Sakemi and Tetsuya Izu and Masahiko Takenaka and Masaya Yasuda}, editor = {Claudio A. Ardagna and Jianying Zhou}, title = {Solving {DLP} with Auxiliary Input over an Elliptic Curve Used in TinyTate Library}, booktitle = {Information Security Theory and Practice. Security and Privacy of Mobile Devices in Wireless Communication - 5th {IFIP} {WG} 11.2 International Workshop, {WISTP} 2011, Heraklion, Crete, Greece, June 1-3, 2011. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6633}, pages = {116--127}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-3-642-21040-2\_8}, doi = {10.1007/978-3-642-21040-2\_8}, timestamp = {Mon, 21 Mar 2022 18:09:53 +0100}, biburl = {https://dblp.org/rec/conf/wistp/SakemiITY11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/aiss/SakemiKTNM10, author = {Yumi Sakemi and Hidehiro Kato and Shoichi Takeuchi and Yasuyuki Nogami and Yoshitaka Morikawa}, title = {Two Improvements of Twisted Ate Pairing with Barreto-Naehrig Curve by Dividing Miller's Algorithm}, journal = {Adv. Inf. Sci. Serv. Sci.}, volume = {2}, number = {4}, pages = {1--13}, year = {2010}, url = {http://www.aicit.org/aiss/ppl/01\_AISS2-149017IP.pdf}, timestamp = {Wed, 20 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/aiss/SakemiKTNM10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/nbis/SakemiNINM10, author = {Yumi Sakemi and Kazushi Nishii and Tetsuya Izuta and Yasuyuki Nogami and Yoshitaka Morikawa}, editor = {Tomoya Enokido and Fatos Xhafa and Leonard Barolli and Makoto Takizawa and Minoru Uehara and Arjan Durresi}, title = {Accelerating Cross Twisted Ate Pairing with Ordinary Pairing Friendly Curve of Composite Order That Has Two Large Prime Factors}, booktitle = {The 13th International Conference on Network-Based Information Systems, NBiS 2010, Takayama, Gifu, Japan, 14-16 September 2010}, pages = {552--557}, publisher = {{IEEE} Computer Society}, year = {2010}, url = {https://doi.org/10.1109/NBiS.2010.89}, doi = {10.1109/NBIS.2010.89}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/nbis/SakemiNINM10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieicet/NogamiSONAM09, author = {Yasuyuki Nogami and Yumi Sakemi and Takumi Okimoto and Kenta Nekado and Masataka Akane and Yoshitaka Morikawa}, title = {Scalar Multiplication Using Frobenius Expansion over Twisted Elliptic Curve for Ate Pairing Based Cryptography}, journal = {{IEICE} Trans. Fundam. Electron. Commun. Comput. Sci.}, volume = {92-A}, number = {1}, pages = {182--189}, year = {2009}, url = {https://doi.org/10.1587/transfun.E92.A.182}, doi = {10.1587/TRANSFUN.E92.A.182}, timestamp = {Sat, 11 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ieicet/NogamiSONAM09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieicet/NogamiSKAM09, author = {Yasuyuki Nogami and Yumi Sakemi and Hidehiro Kato and Masataka Akane and Yoshitaka Morikawa}, title = {Integer Variable chi-Based Cross Twisted Ate Pairing and Its Optimization for Barreto-Naehrig Curve}, journal = {{IEICE} Trans. Fundam. Electron. Commun. Comput. Sci.}, volume = {92-A}, number = {8}, pages = {1859--1867}, year = {2009}, url = {https://doi.org/10.1587/transfun.E92.A.1859}, doi = {10.1587/TRANSFUN.E92.A.1859}, timestamp = {Sat, 11 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ieicet/NogamiSKAM09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icisc/SakemiTNM09, author = {Yumi Sakemi and Shoichi Takeuchi and Yasuyuki Nogami and Yoshitaka Morikawa}, editor = {Dong Hoon Lee and Seokhie Hong}, title = {Accelerating Twisted Ate Pairing with Frobenius Map, Small Scalar Multiplication, and Multi-pairing}, booktitle = {Information, Security and Cryptology - {ICISC} 2009, 12th International Conference, Seoul, Korea, December 2-4, 2009, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {5984}, pages = {47--64}, publisher = {Springer}, year = {2009}, url = {https://doi.org/10.1007/978-3-642-14423-3\_4}, doi = {10.1007/978-3-642-14423-3\_4}, timestamp = {Tue, 14 May 2019 10:00:36 +0200}, biburl = {https://dblp.org/rec/conf/icisc/SakemiTNM09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isit/SakemiMNK09, author = {Yumi Sakemi and Yoshitaka Morikawa and Yasuyuki Nogami and Hidehiro Kato}, title = {Cross twisted Xate pairing with Barreto-Naehrig curve for multi-pairing technique}, booktitle = {{IEEE} International Symposium on Information Theory, {ISIT} 2009, June 28 - July 3, 2009, Seoul, Korea, Proceedings}, pages = {2386--2390}, publisher = {{IEEE}}, year = {2009}, url = {https://doi.org/10.1109/ISIT.2009.5205994}, doi = {10.1109/ISIT.2009.5205994}, timestamp = {Wed, 16 Oct 2019 14:14:48 +0200}, biburl = {https://dblp.org/rec/conf/isit/SakemiMNK09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cans/SakemiNOKM08, author = {Yumi Sakemi and Yasuyuki Nogami and Katsuyuki Okeya and Hidehiro Katou and Yoshitaka Morikawa}, editor = {Matthew K. Franklin and Lucas Chi Kwong Hui and Duncan S. Wong}, title = {Skew Frobenius Map and Efficient Scalar Multiplication for Pairing-Based Cryptography}, booktitle = {Cryptology and Network Security, 7th International Conference, {CANS} 2008, Hong-Kong, China, December 2-4, 2008. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5339}, pages = {226--239}, publisher = {Springer}, year = {2008}, url = {https://doi.org/10.1007/978-3-540-89641-8\_16}, doi = {10.1007/978-3-540-89641-8\_16}, timestamp = {Tue, 14 May 2019 10:00:50 +0200}, biburl = {https://dblp.org/rec/conf/cans/SakemiNOKM08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pairing/NogamiASKM08, author = {Yasuyuki Nogami and Masataka Akane and Yumi Sakemi and Hidehiro Katou and Yoshitaka Morikawa}, editor = {Steven D. Galbraith and Kenneth G. Paterson}, title = {Integer Variable chi-Based Ate Pairing}, booktitle = {Pairing-Based Cryptography - Pairing 2008, Second International Conference, Egham, UK, September 1-3, 2008. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5209}, pages = {178--191}, publisher = {Springer}, year = {2008}, url = {https://doi.org/10.1007/978-3-540-85538-5\_13}, doi = {10.1007/978-3-540-85538-5\_13}, timestamp = {Tue, 14 May 2019 10:00:42 +0200}, biburl = {https://dblp.org/rec/conf/pairing/NogamiASKM08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.