Name
Playground
About
FAQ
GitHub
Playground
Shortest Path Finder
Community Detector
Connected Papers
Author Trending
Vickram Vathulya
Claudia Calabrese
Yanqiu Wang
Maria Concetta Palumbo
Osmando Pereira Junior
Jhonathan Pinzon
Giovanni Venturelli
Chen Ma
Radu Timofte
Kuanrui Yin
Home
/
Author
/
SHIGENORI UCHIYAMA
Author Info
Open Visualization
Name
Affiliation
Papers
SHIGENORI UCHIYAMA
Department of Mathematics and Information Sciences, Tokyo Metropolitan University, Hachioji, Tokyo, Japan
27
Collaborators
Citations
PageRank
34
371
40.90
Referers
Referees
References
679
212
185
Search Limit
100
679
Publications (27 rows)
Collaborators (34 rows)
Referers (100 rows)
Referees (100 rows)
Title
Citations
PageRank
Year
A note on the prime factorization method by Nemec et al.
0
0.34
2019
Faster Explicit Formulae for Computing Pairings via Elliptic Nets and Their Parallel Computation.
0
0.34
2016
Computing fixed argument pairings with the elliptic net algorithm
0
0.34
2014
Primality testing of Woodall numbers
0
0.34
2014
Implementation Of An Elliptic Curve Scalar Multiplication Method Using Division Polynomials
0
0.34
2014
A Note On The Pairing Computation Using Normalized Miller Functions
2
0.37
2012
The tate-lichtenbaum pairing on a hyperelliptic curve via hyperelliptic nets
1
0.36
2012
On the reduction attack against the algebraic surface public-key cryptosystem(ASC04)
0
0.34
2011
Cryptographic pairings based on elliptic nets
3
0.49
2011
Erratum to "Cryptanalysis of the birational permutation signature scheme over a non-commutative ring" [JSIAM Letters, 2 (2010), 85-88]
0
0.34
2010
An improvement of key generation algorithm for Gentry's homomorphic encryption scheme
6
1.01
2010
NZMATH 1.0
0
0.34
2010
On Patarin'S Attack Against The Lic Scheme
0
0.34
2010
Simple Remarks On Carmichael Numbers
0
0.34
2009
Cryptanalysis of the birational permutation signature scheme over a non-commutative ring.
0
0.34
2009
Remarks on the Attack of Fouque et al. against the lIC Scheme.
0
0.34
2008
Non-optimistic Secure Circuit Evaluation Based on ElGamal Encryption and Its Applications
3
0.70
2007
The Vanstone-Zuccherato Schemes Revisited
0
0.34
2007
Candidate One-Way Functions On Non-Supersingular Elliptic Curves
2
0.37
2006
Candidate One-Way Functions on Non-Supersingular Elliptic Curves*A preliminary version was presented at ISEC2003 [22].
2
0.38
2006
Efficient, non-optimistic secure circuit evaluation based on the elgamal encryption
1
0.36
2005
Analysis Of Baby-Step Giant-Step Algorithms For Non-Uniform Distributions
0
0.34
2004
Generating Secure Genus Two Hyperelliptic Curves Using Elkies' Point Counting Algorithm
1
0.38
2003
Nonuniform Polynomial Time Algorithm to Solve Decisional Diffie-Hellman Problem in Finite Fields under Conjecture
1
0.65
2002
Quantum Public-Key Cryptosystems
28
1.30
2000
A New Public-Key Cryptosystem as Secure as Factoring
312
28.90
1998
Security of an Identity-Based Cryptosystem and the Related Reductions
9
0.88
1998
1