default search action
Eiji Okamoto
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
showing all ?? records
2020 – today
- 2023
- [j79]Keisuke Asano, Mamoru Okumura, Takumi Abe, Eiji Okamoto, Tetsuya Yamamoto:
High-Quality Secure Wireless Transmission Scheme Using Polar Codes and Radio-Wave Encrypted Modulation. IEICE Trans. Commun. 106(4): 374-383 (2023) - [j78]Kenya Tomita, Mamoru Okumura, Eiji Okamoto:
Demonstration of Chaos-Based Radio Encryption Modulation Scheme through Wired Transmission Experiments. IEICE Trans. Commun. 106(8): 686-695 (2023) - [j77]Eiji Okamoto:
Foreword. IEICE Trans. Commun. 106(9): 723 (2023) - [j76]Keisuke Asano, Takumi Abe, Kenta Kato, Eiji Okamoto, Tetsuya Yamamoto:
High-Quality and Low-Complexity Polar-Coded Radio-Wave Encrypted Modulation Utilizing Multipurpose Frozen Bits. IEICE Trans. Commun. 106(10): 987-996 (2023) - [c151]Eiji Okamoto, Yuma Yamashita, Yohei Satoh, Mitsuhiro Nakadai, Takamasa Itahashi, Shiro Yamakawa:
Performance Comparison of Channel Coding Methods for Optical Satellite Data Relay System. PIMRC 2023: 1-6 - 2022
- [j75]Kaga Tomoki, Mamoru Okumura, Eiji Okamoto, Tetsuya Yamamoto:
Multi-Level Encrypted Transmission Scheme Using Hybrid Chaos and Linear Modulation. IEICE Trans. Commun. 105-B(5): 638-647 (2022) - [j74]Mamoru Okumura, Keisuke Asano, Takumi Abe, Eiji Okamoto, Tetsuya Yamamoto:
Performance Improvement of Radio-Wave Encrypted MIMO Communications Using Average LLR Clipping. IEICE Trans. Commun. 105-B(8): 931-943 (2022) - 2021
- [j73]Naoki Ishikawa, Jehad M. Hamamreh, Eiji Okamoto, Chao Xu, Lixia Xiao:
Artificially Time-Varying Differential MIMO for Achieving Practical Physical Layer Security. IEEE Open J. Commun. Soc. 2: 2180-2194 (2021) - [c150]Mamoru Okumura, Kaga Tomoki, Eiji Okamoto, Tetsuya Yamamoto:
Chaos-Based Interleave Division Multiple Access Scheme with Physical Layer Security. CCNC 2021: 1-2 - 2020
- [c149]Hayato Ishikawa, Eiji Okamoto, Hiraku Okada, Satoshi Makido:
Performance improvement of V2I uplink transmission on far vehicles using frequency scheduling-based cooperative V2V relay transmission. CCNC 2020: 1-6 - [c148]Yoshihiro Masuda, Eiji Okamoto, Tetsuya Yamamoto:
Low Complexity Decoding of Downlink Chaos NOMA Scheme with Physical Layer Security. CCNC 2020: 1-6 - [c147]Yusaku Shiomitsu, Eiji Okamoto, Manabu Mikami, Hitoshi Yoshino:
Poster: Performance analysis of early HARQ retransmission scheme in highway environments. VNC 2020: 1-2
2010 – 2019
- 2019
- [j72]Eiji Okamoto, Manabu Mikami, Hitoshi Yoshino:
Performance Comparison of Multi-User Shared Multiple Access Scheme in Uplink Channels. IEICE Trans. Commun. 102-B(8): 1458-1466 (2019) - [c146]Hayato Ishikawa, Eiji Okamoto, Shouhei Okamoto, Hiraku Okada, Satoshi Makido:
Performance Analysis of Uplink V2I Cooperative Transmission Scheme in Practical Road Environments. ICOIN 2019: 98-102 - [c145]Ryo Hasegawa, Eiji Okamoto, Hiroyuki Tsuji, Amane Miura:
Performance Analysis of a Terrestrial/UAV Integrated Mobile Communications System Using Code Division Multiplexing in Natural Disasters. ICOIN 2019: 103-107 - [c144]Yoshihiro Masuda, Eiji Okamoto, Keita Ito, Tetsuya Yamamoto:
An Uplink Non-Orthogonal Multiple Access Scheme Having Physical Layer Security Based on Chaos Modulation. ICOIN 2019: 136-140 - [c143]Keita Ito, Yoshihiro Masuda, Eiji Okamoto:
A Chaos MIMO-Based Polar Concatenation Code for Secure Channel Coding. ICOIN 2019: 262-267 - [c142]Yusaku Shiomitsu, Eiji Okamoto, Manabu Mikami, Hitoshi Yoshino:
Poster: Effective frame configuration of 5G URLLC using open-loop HARQ for autonomous driving. VNC 2019: 1-2 - 2018
- [j71]Naoto Horiike, Eiji Okamoto, Tetsuya Yamamoto:
A downlink non-orthogonal multiple access scheme having physical layer security. EURASIP J. Wirel. Commun. Netw. 2018: 205 (2018) - [j70]Hikaru Tsuchida, Takashi Nishide, Eiji Okamoto:
Expressive Ciphertext-Policy Attribute-Based Encryption with Fast Decryption. J. Internet Serv. Inf. Secur. 8(4): 37-56 (2018) - [c141]Kengo Sasaki, Eiji Okamoto:
A Study on Indoor Dimming Method Utilizing Outside Light for Power Saving. APSIPA 2018: 1847-1852 - [c140]Naoto Horiike, Hiroki Kitagawa, Eiji Okamoto, Tetsuya Yamamoto:
Chaos MIMO-based downlink non-orthogonal multiple access scheme with physical layer security. CCNC 2018: 1-7 - [c139]Eiji Okamoto, Naoto Horiike, Tetsuya Yamamoto:
Large-Scale Grant-Free Sparse Chaos Code Multiple Access Scheme for 5G IoT. VTC Fall 2018: 1-5 - [i32]Takeshi Okamoto, Raylin Tso, Michitomo Yamaguchi, Eiji Okamoto:
A k-out-of-n Ring Signature with Flexible Participation for Signers. IACR Cryptol. ePrint Arch. 2018: 728 (2018) - 2017
- [j69]Kazumasa Shinagawa, Takaaki Mizuki, Jacob C. N. Schuldt, Koji Nuida, Naoki Kanayama, Takashi Nishide, Goichiro Hanaoka, Eiji Okamoto:
Card-Based Protocols Using Regular Polygon Cards. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 100-A(9): 1900-1909 (2017) - [j68]Yukou Kobayashi, Naoto Yanai, Kazuki Yoneyama, Takashi Nishide, Goichiro Hanaoka, Kwangjo Kim, Eiji Okamoto:
Provably Secure Gateway Threshold Password-Based Authenticated Key Exchange Secure against Undetectable On-Line Dictionary Attack. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 100-A(12): 2991-3006 (2017) - [j67]Sanami Nakagawa, Takashi Nishide, Eiji Okamoto, Keita Emura, Goichiro Hanaoka, Yusuke Sakai, Akihisa Kodate:
A privacy-enhanced access log management mechanism in SSO systems from nominative signatures. Int. J. Appl. Cryptogr. 3(4): 394-406 (2017) - [j66]Hiroki Kitagawa, Eiji Okamoto:
Performance improvement of non-orthogonal multiple access scheme using code division multiplexing. Int. J. Distributed Sens. Networks 13(11) (2017) - [j65]Nuray At, Jean-Luc Beuchat, Eiji Okamoto, Ismail San, Teppei Yamazaki:
A low-area unified hardware architecture for the AES and the cryptographic hash function Grøstl. J. Parallel Distributed Comput. 106: 106-120 (2017) - [c138]Naoto Horiike, Eiji Okamoto, Tetsuya Yamamoto:
Performance improvement of multi-user chaos MIMO transmission scheme using dirty paper coding. APCC 2017: 1-6 - [c137]Takuya Kitamura, Kazumasa Shinagawa, Takashi Nishide, Eiji Okamoto:
One-time Programs with Cloud Storage and Its Application to Electronic Money. APKC@AsiaCCS 2017: 25-30 - [c136]Naoto Horiike, Eiji Okamoto, Tetsuya Yamamoto:
Performance improvement of chaos MIMO transmission scheme by LDPC code concatenation using symbol MAP detection and STBC. ICOIN 2017: 200-205 - [c135]Hiroki Kitagawa, Eiji Okamoto:
Performance improvement of non-orthogonal multiple access scheme using code division multiplexing. ICOIN 2017: 327-331 - [c134]Tomohiro Akiyoshi, Eiji Okamoto, Hiroyuki Tsuji, Amane Miura:
Performance improvement of satellite/terrestrial integrated mobile communication system using unmanned aerial vehicle cooperative communications. ICOIN 2017: 417-422 - [c133]Eiji Okamoto, Hiraku Okada, Yoshinao Ishii, Satoshi Makido:
Performance Improvement of Low-Latency V2I Uplink Using Superposed Cooperative V2V Transmission. VTC Fall 2017: 1-5 - [c132]Eiji Okamoto, Naoto Horiike, Tetsuya Yamamoto:
Sparse chaos code multiple access scheme achieving larger capacity and physical layer security. WPMC 2017: 604-610 - 2016
- [j64]Kazumasa Shinagawa, Takaaki Mizuki, Jacob C. N. Schuldt, Koji Nuida, Naoki Kanayama, Takashi Nishide, Goichiro Hanaoka, Eiji Okamoto:
Secure Computation Protocols Using Polarizing Cards. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 99-A(6): 1122-1131 (2016) - [j63]Hidekazu Murata, Eiji Okamoto, Manabu Mikami, Akihiro Okazaki, Satoshi Suyama, Takamichi Inoue, Jun Mashino, Tetsuya Yamamoto, Makoto Taromaru:
Radio Access Technologies for Fifth Generation Mobile Communications System: Review of Recent Research and Developments in Japan. IEICE Trans. Commun. 99-B(8): 1638-1647 (2016) - [j62]Eiji Okamoto, Hiroyuki Tsuji:
Application of Non-Orthogonal Multiple Access Scheme for Satellite Downlink in Satellite/Terrestrial Integrated Mobile Communication System with Dual Satellites. IEICE Trans. Commun. 99-B(10): 2146-2155 (2016) - [j61]Nobuaki Kitajima, Naoto Yanai, Takashi Nishide, Goichiro Hanaoka, Eiji Okamoto:
Fail-Stop Signatures for Multiple-Signers: Definitions, Constructions, and Their Extensions. J. Inf. Process. 24(2): 275-291 (2016) - [j60]Keisuke Hasegawa, Naoki Kanayama, Takashi Nishide, Eiji Okamoto:
Software Library for Ciphertext/Key-Policy Functional Encryption with Simple Usability. J. Inf. Process. 24(5): 764-771 (2016) - [c131]Kazumasa Shinagawa, Koji Nuida, Takashi Nishide, Goichiro Hanaoka, Eiji Okamoto:
Size-Hiding Computation for Multiple Parties. ASIACRYPT (2) 2016: 937-966 - [c130]Hikaru Tsuchida, Takashi Nishide, Eiji Okamoto, Kwangjo Kim:
Revocable Decentralized Multi-Authority Functional Encryption. INDOCRYPT 2016: 248-265 - [c129]Kazumasa Shinagawa, Koji Nuida, Takashi Nishide, Goichiro Hanaoka, Eiji Okamoto:
Committed AND protocol using three cards with more handy shuffle. ISITA 2016: 700-702 - [c128]Eiji Okamoto, Keisuke Kunitomo, Hidenori Akita, Takuma Kyo:
A Cooperative V2I Uplink Transmission Scheme Utilizing V2V Network Coding. VTC Spring 2016: 1-5 - [e8]Sihan Qing, Eiji Okamoto, Kwangjo Kim, Dongmei Liu:
Information and Communications Security - 17th International Conference, ICICS 2015, Beijing, China, December 9-11, 2015, Revised Selected Papers. Lecture Notes in Computer Science 9543, Springer 2016, ISBN 978-3-319-29813-9 [contents] - 2015
- [j59]Eiji Okamoto, Yuma Inaba:
A Chaos MIMO Transmission Scheme Using Turbo Principle for Secure Channel-Coded Transmission. IEICE Trans. Commun. 98-B(8): 1482-1491 (2015) - [j58]Manato Horiba, Eiji Okamoto, Toshiko Shinohara, Katsuhiko Matsumura:
An Accurate Indoor-Localization Scheme with NLOS Detection and Elimination Exploiting Stochastic Characteristics. IEICE Trans. Commun. 98-B(9): 1758-1767 (2015) - [j57]Nasato Goto, Akira Kanaoka, Masayuki Okada, Eiji Okamoto:
METRO: Measurement of End-to-End Route Trust. J. Inf. Process. 23(5): 613-622 (2015) - [c127]Hidekazu Murata, Eiji Okamoto, Manabu Mikami, Akihiro Okazaki, Satoshi Suyama, Takamichi Inoue, Jun Mashino, Tetsuya Yamamoto, Makoto Taromaru:
R&D activities for 5G in IEICE technical committee on radio communication systems. APCC 2015: 250-256 - [c126]Yu Liu, Nasato Goto, Akira Kanaoka, Eiji Okamoto:
Privacy Preserved Rule-Based Risk Analysis through Secure Multi-party Computation. AsiaJCIS 2015: 77-84 - [c125]Nobuaki Kitajima, Naoto Yanai, Takashi Nishide, Goichiro Hanaoka, Eiji Okamoto:
Constructions of Fail-Stop Signatures for Multi-signer Setting. AsiaJCIS 2015: 112-123 - [c124]Keisuke Hasegawa, Naoki Kanayama, Takashi Nishide, Eiji Okamoto:
Software Implementation of Ciphertext-Policy Functional Encryption with Simple Usability. ICITCS 2015: 1-4 - [c123]Yusuke Kanbara, Tadanori Teruya, Naoki Kanayama, Takashi Nishide, Eiji Okamoto:
Software Implementation of a Pairing Function for Public Key Cryptosystems. ICITCS 2015: 1-5 - [c122]Manato Horiba, Eiji Okamoto, Toshiko Shinohara, Katsuhiko Matsumura:
An improved NLOS detection scheme using stochastic characteristics for indoor localization. ICOIN 2015: 478-482 - [c121]Naoto Yanai, Masahiro Mambo, Kazuma Tanaka, Takashi Nishide, Eiji Okamoto:
Another Look at Aggregate Signatures: Their Capability and Security on Network Graphs. INTRUST 2015: 32-48 - [c120]Kazumasa Shinagawa, Takaaki Mizuki, Jacob C. N. Schuldt, Koji Nuida, Naoki Kanayama, Takashi Nishide, Goichiro Hanaoka, Eiji Okamoto:
Secure Multi-Party Computation Using Polarizing Cards. IWSEC 2015: 281-297 - [c119]Kazumasa Shinagawa, Takaaki Mizuki, Jacob C. N. Schuldt, Koji Nuida, Naoki Kanayama, Takashi Nishide, Goichiro Hanaoka, Eiji Okamoto:
Multi-party Computation with Small Shuffle Complexity Using Regular Polygon Cards. ProvSec 2015: 127-146 - [c118]Yukou Kobayashi, Naoto Yanai, Kazuki Yoneyama, Takashi Nishide, Goichiro Hanaoka, Kwangjo Kim, Eiji Okamoto:
Gateway Threshold Password-based Authenticated Key Exchange Secure against Undetectable On-line Dictionary Attack. SECRYPT 2015: 39-52 - [c117]Eiji Okamoto:
An Improved Proportional Fair Scheduling in Downlink Non-Orthogonal Multiple Access System. VTC Fall 2015: 1-5 - 2014
- [j56]Naoki Kanayama, Yang Liu, Eiji Okamoto, Kazutaka Saito, Tadanori Teruya, Shigenori Uchiyama:
Implementation of an Elliptic Curve Scalar Multiplication Method Using Division Polynomials. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 97-A(1): 300-302 (2014) - [j55]Naoto Yanai, Eikoh Chida, Masahiro Mambo, Eiji Okamoto:
A CDH-based Ordered Multisignature Scheme Provably Secure without Random Oracles. J. Inf. Process. 22(2): 366-375 (2014) - [j54]Masayuki Okada, Nasato Goto, Akira Kanaoka, Eiji Okamoto:
Transparent Probabilistic Packet Marking. J. Inf. Process. 22(4): 609-616 (2014) - [j53]Yang Liu, Naoki Kanayama, Kazutaka Saito, Tadanori Teruya, Shigenori Uchiyama, Eiji Okamoto:
Computing fixed argument pairings with the elliptic net algorithm. JSIAM Lett. 6: 69-72 (2014) - [j52]Simon Kramer, Rajeev Goré, Eiji Okamoto:
Computer-aided decision-making with trust relations and trust domains (cryptographic applications). J. Log. Comput. 24(1): 19-54 (2014) - [j51]Nuray At, Jean-Luc Beuchat, Eiji Okamoto, Ismail San, Teppei Yamazaki:
Compact Hardware Implementations of ChaCha, BLAKE, Threefish, and Skein on FPGA. IEEE Trans. Circuits Syst. I Regul. Pap. 61-I(2): 485-498 (2014) - [c116]Nasato Goto, Akira Kanaoka, Masayuki Okada, Eiji Okamoto:
METRO: Measurement of End-to-End Route Trust. AsiaJCIS 2014: 31-38 - [c115]Eiji Okamoto, Manato Horiba, Keita Nakashima, Toshiko Shinohara, Katsuhiko Matsumura:
Particle swarm optimization-based low-complexity three-dimensional UWB localization scheme. ICUFN 2014: 120-124 - [c114]Naoto Yanai, Masahiro Mambo, Eiji Okamoto:
A CDH-based ordered multisignature scheme in the standard model with better efficiency. ISITA 2014: 236-240 - [c113]Takashi Yamakawa, Nobuaki Kitajima, Takashi Nishide, Goichiro Hanaoka, Eiji Okamoto:
A Short Fail-Stop Signature Scheme from Factoring. ProvSec 2014: 309-316 - [c112]Sanami Nakagawa, Keita Emura, Goichiro Hanaoka, Akihisa Kodate, Takashi Nishide, Eiji Okamoto, Yusuke Sakai:
A Privacy-Enhanced Access Log Management Mechanism in SSO Systems from Nominative Signatures. TrustCom 2014: 565-574 - 2013
- [j50]Yuta Koshimizu, Eiji Okamoto:
An Efficient Channel Estimation Scheme Using Walsh Pilots in Bi-directional Wireless OFDM Relay Systems with Analog Network Coding. IEICE Trans. Commun. 96-B(8): 2119-2130 (2013) - [j49]Ichita Higurashi, Akira Kanaoka, Masahiko Kato, Eiji Okamoto:
Detection of Unexpected Services and Communication Paths in Networked Systems. Inf. Media Technol. 8(4): 1251-1258 (2013) - [j48]Ichita Higurashi, Akira Kanaoka, Masahiko Kato, Eiji Okamoto:
Detection of Unexpected Services and Communication Paths in Networked Systems. J. Inf. Process. 21(4): 632-639 (2013) - [j47]Xun Yi, Eiji Okamoto:
Practical Internet voting system. J. Netw. Comput. Appl. 36(1): 378-387 (2013) - [c111]Masayuki Okada, Nasato Goto, Akira Kanaoka, Eiji Okamoto:
A Device for Transparent Probabilistic Packet Marking. COMPSAC Workshops 2013: 242-247 - [c110]Yoshinori Mitamura, Tetsuya Yano, Eiji Okamoto:
A magnetic fluid seal for rotary blood pumps: Image and computational analyses of behaviors of magnetic fluids. EMBC 2013: 663-666 - [c109]Eiji Okamoto, Sakiko Kikuchi, Yoshinori Mitamura:
Evaluation of titanium mesh electrode using for transcutaneous intrabody communication by tissue-electrode impedance. EMBC 2013: 667-670 - [c108]Naoto Yanai, Masahiro Mambo, Eiji Okamoto:
An Ordered Multisignature Scheme Under the CDH Assumption Without Random Oracles. ISC 2013: 367-377 - [c107]Akihisa Tanaka, Eiji Okamoto, Hiroyuki Tsuji, Yoshiyuki Fujino:
Interference-aware weighting scheme for satellite/terrestrial integrated mobile communication system. IWCMC 2013: 1803-1808 - [c106]Yusuke Niwa, Akira Kanaoka, Eiji Okamoto:
Construction of a Multi-domain Functional Encryption System on Functional Information Infrastructure. NBiS 2013: 105-112 - [c105]Tadanori Teruya, Kazutaka Saito, Naoki Kanayama, Yuto Kawahara, Tetsutaro Kobayashi, Eiji Okamoto:
Constructing Symmetric Pairings over Supersingular Elliptic Curves with Embedding Degree Three. Pairing 2013: 97-112 - [i31]Nuray At, Jean-Luc Beuchat, Eiji Okamoto, Ismail San, Teppei Yamazaki:
Compact Hardware Implementations of ChaCha, BLAKE, Threefish, and Skein on FPGA. IACR Cryptol. ePrint Arch. 2013: 113 (2013) - 2012
- [j46]Lihua Wang, Licheng Wang, Masahiro Mambo, Eiji Okamoto:
Identity-Based Proxy Cryptosystems with Revocability and Hierarchical Confidentialities. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 95-A(1): 70-88 (2012) - [j45]Naoki Ogura, Shigenori Uchiyama, Naoki Kanayama, Eiji Okamoto:
A Note on the Pairing Computation Using Normalized Miller Functions. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 95-A(1): 196-203 (2012) - [j44]Yoshitoshi Yamashita, Eiji Okamoto, Yasunori Iwanami, Yozo Shoji, Morio Toyoshima, Yoshihisa Takayama:
A Markov-Based Satellite-to-Ground Optical Channel Model and Its Effective Coding Scheme. IEICE Trans. Commun. 95-B(1): 254-262 (2012) - [j43]Eiji Okamoto:
A Chaos MIMO Transmission Scheme for Channel Coding and Physical-Layer Security. IEICE Trans. Commun. 95-B(4): 1384-1392 (2012) - [j42]Kazutaka Fukuda, Eiji Okamoto:
Performance Improvement of IMR-Based NLOS Detection in Indoor Ultra Wide-Band TOA Localization. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 95-A(10): 1658-1666 (2012) - [j41]Naoto Yanai, Raylin Tso, Masahiro Mambo, Eiji Okamoto:
A Certificateless Ordered Sequential Aggregate Signature Scheme Secure against Super Adverssaries. J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl. 3(1/2): 30-54 (2012) - [j40]Sk. Md. Mizanur Rahman, M. Anwar Hossain, Hussein T. Mouftah, Abdulmotaleb El-Saddik, Eiji Okamoto:
Chaos-cryptography based privacy preservation technique for video surveillance. Multim. Syst. 18(2): 145-155 (2012) - [j39]Naoki Kanayama, Eiji Okamoto:
Approach to Pairing Inversions Without Solving Miller Inversion. IEEE Trans. Inf. Theory 58(2): 1248-1253 (2012) - [c104]Kazutaka Fukuda, Eiji Okamoto:
Performance improvement of TOA localization using IMR-based NLOS detection in sensor networks. ICOIN 2012: 13-18 - [c103]Eiji Okamoto:
A secure cooperative relay transmission using chaos MIMO scheme. ICUFN 2012: 374-378 - [c102]Ichita Higurashi, Akira Kanaoka, Masahiko Kato, Eiji Okamoto:
Discovery of Unexpected Services and Communication Paths in Networked Systems. SafeConfig 2012: 169-178 - [c101]Masahiko Kato, Takumi Matsunami, Akira Kanaoka, Hiroshi Koide, Eiji Okamoto:
Tracing Advanced Persistent Threats in Networked Systems. SafeConfig 2012: 179-187 - [c100]Xun Yi, Raylin Tso, Eiji Okamoto:
Identity-based Password-Authenticated Key Exchange for Client/Server Model. SECRYPT 2012: 45-54 - [c99]Yuta Koshimizu, Eiji Okamoto:
An Effective Channel Estimation Scheme for Bi-Directional Two-Timeslot OFDM Relay Transmission Using Analog Network Coding. VTC Spring 2012: 1-5 - [i30]Nuray At, Jean-Luc Beuchat, Eiji Okamoto, Ismail San, Teppei Yamazaki:
A Low-Area Unified Hardware Architecture for the AES and the Cryptographic Hash Function Grøstl. IACR Cryptol. ePrint Arch. 2012: 535 (2012) - 2011
- [j38]Naoki Kanayama, Tadanori Teruya, Eiji Okamoto:
Scalar Multiplication on Pairing Friendly Elliptic Curves. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 94-A(6): 1285-1292 (2011) - [j37]Yasuhiro Fuwa, Eiji Okamoto, Yasunori Iwanami:
An Effective Downlink Resource Allocation Scheme Based on MIMO-OFDMA-CDM in Cellular System. IEICE Trans. Commun. 94-B(12): 3550-3558 (2011) - [j36]Jean-Luc Beuchat, Eiji Okamoto, Teppei Yamazaki:
A low-area unified hardware architecture for the AES and the cryptographic hash function ECHO. J. Cryptogr. Eng. 1(2): 101-121 (2011) - [j35]Jean-Luc Beuchat, Jérémie Detrey, Nicolas Estibals, Eiji Okamoto, Francisco Rodríguez-Henríquez:
Fast Architectures for the \eta_T Pairing over Small-Characteristic Supersingular Elliptic Curves. IEEE Trans. Computers 60(2): 266-281 (2011) - [c98]Xun Yi, Eiji Okamoto:
Practical Remote End-to-End Voting Scheme. EGOVIS 2011: 386-400 - [c97]Masayuki Okada, Yasuharu Katsuno, Akira Kanaoka, Eiji Okamoto:
32-bit as Number Based IP Traceback. IMIS 2011: 628-633 - [c96]Naoto Yanai, Raylin Tso, Masahiro Mambo, Eiji Okamoto:
Certificateless Ordered Sequential Aggregate Signature Scheme. INCoS 2011: 662-667 - [c95]Naoki Ogura, Naoki Kanayama, Shigenori Uchiyama, Eiji Okamoto:
Cryptographic Pairings Based on Elliptic Nets. IWSEC 2011: 65-78 - [c94]Alberto Moreno, Eiji Okamoto:
BlueSnarf Revisited: OBEX FTP Service Directory Traversal. Networking Workshops 2011: 155-166 - [c93]Sk. Md. Mizanur Rahman, Md. Mehedi Masud, Carlisle Adams, Khalil El-Khatib, Hussein T. Mouftah, Eiji Okamoto:
Cryptographic security models for eHealth P2P database management systems network. PST 2011: 164-173 - [c92]Xun Yi, Raylin Tso, Eiji Okamoto:
Three-party Password-authenticated Key Exchange without Random Oracles. SECRYPT 2011: 15-24 - [c91]Eiji Okamoto:
A Chaos MIMO Transmission Scheme for Secure Communications on Physical Layer. VTC Spring 2011: 1-5 - [c90]Eiji Okamoto, Hiroyuki Tsuji, Yoshiyuki Fujino:
Performance improvement of OFDMA cellular system using code division multiplexing in satellite/terrestrial integrated mobile communication system. WPMC 2011: 1-5 - [c89]