default search action
Naoki Kanayama
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2010 – 2019
- 2017
- [j15]Kazumasa Shinagawa, Takaaki Mizuki, Jacob C. N. Schuldt, Koji Nuida, Naoki Kanayama, Takashi Nishide, Goichiro Hanaoka, Eiji Okamoto:
Card-Based Protocols Using Regular Polygon Cards. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 100-A(9): 1900-1909 (2017) - 2016
- [j14]Kazumasa Shinagawa, Takaaki Mizuki, Jacob C. N. Schuldt, Koji Nuida, Naoki Kanayama, Takashi Nishide, Goichiro Hanaoka, Eiji Okamoto:
Secure Computation Protocols Using Polarizing Cards. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 99-A(6): 1122-1131 (2016) - [j13]Keisuke Hasegawa, Naoki Kanayama, Takashi Nishide, Eiji Okamoto:
Software Library for Ciphertext/Key-Policy Functional Encryption with Simple Usability. J. Inf. Process. 24(5): 764-771 (2016) - [j12]Hiroshi Onuki, Tadanori Teruya, Naoki Kanayama, Shigenori Uchiyama:
The optimal ate pairing over the Barreto-Naehrig curve via parallelizing elliptic nets. JSIAM Lett. 8: 9-12 (2016) - [c15]Hiroshi Onuki, Tadanori Teruya, Naoki Kanayama, Shigenori Uchiyama:
Faster Explicit Formulae for Computing Pairings via Elliptic Nets and Their Parallel Computation. IWSEC 2016: 319-334 - 2015
- [c14]Keisuke Hasegawa, Naoki Kanayama, Takashi Nishide, Eiji Okamoto:
Software Implementation of Ciphertext-Policy Functional Encryption with Simple Usability. ICITCS 2015: 1-4 - [c13]Yusuke Kanbara, Tadanori Teruya, Naoki Kanayama, Takashi Nishide, Eiji Okamoto:
Software Implementation of a Pairing Function for Public Key Cryptosystems. ICITCS 2015: 1-5 - [c12]Kazumasa Shinagawa, Takaaki Mizuki, Jacob C. N. Schuldt, Koji Nuida, Naoki Kanayama, Takashi Nishide, Goichiro Hanaoka, Eiji Okamoto:
Secure Multi-Party Computation Using Polarizing Cards. IWSEC 2015: 281-297 - [c11]Kazumasa Shinagawa, Takaaki Mizuki, Jacob C. N. Schuldt, Koji Nuida, Naoki Kanayama, Takashi Nishide, Goichiro Hanaoka, Eiji Okamoto:
Multi-party Computation with Small Shuffle Complexity Using Regular Polygon Cards. ProvSec 2015: 127-146 - 2014
- [j11]Naoki Kanayama, Yang Liu, Eiji Okamoto, Kazutaka Saito, Tadanori Teruya, Shigenori Uchiyama:
Implementation of an Elliptic Curve Scalar Multiplication Method Using Division Polynomials. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 97-A(1): 300-302 (2014) - [j10]Yang Liu, Naoki Kanayama, Kazutaka Saito, Tadanori Teruya, Shigenori Uchiyama, Eiji Okamoto:
Computing fixed argument pairings with the elliptic net algorithm. JSIAM Lett. 6: 69-72 (2014) - 2013
- [c10]Tadanori Teruya, Kazutaka Saito, Naoki Kanayama, Yuto Kawahara, Tetsutaro Kobayashi, Eiji Okamoto:
Constructing Symmetric Pairings over Supersingular Elliptic Curves with Embedding Degree Three. Pairing 2013: 97-112 - 2012
- [j9]Naoki Ogura, Shigenori Uchiyama, Naoki Kanayama, Eiji Okamoto:
A Note on the Pairing Computation Using Normalized Miller Functions. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 95-A(1): 196-203 (2012) - [j8]Naoki Kanayama, Eiji Okamoto:
Approach to Pairing Inversions Without Solving Miller Inversion. IEEE Trans. Inf. Theory 58(2): 1248-1253 (2012) - 2011
- [j7]Naoki Kanayama, Tadanori Teruya, Eiji Okamoto:
Scalar Multiplication on Pairing Friendly Elliptic Curves. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 94-A(6): 1285-1292 (2011) - [c9]Naoki Ogura, Naoki Kanayama, Shigenori Uchiyama, Eiji Okamoto:
Cryptographic Pairings Based on Elliptic Nets. IWSEC 2011: 65-78 - 2010
- [i2]Naoki Ogura, Naoki Kanayama, Shigenori Uchiyama, Eiji Okamoto:
Cryptographic Pairings Based on Elliptic Nets. IACR Cryptol. ePrint Arch. 2010: 353 (2010)
2000 – 2009
- 2009
- [j6]Seiichi Matsuda, Naoki Kanayama, Florian Hess, Eiji Okamoto:
Optimised Versions of the Ate and Twisted Ate Pairings. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 92-A(7): 1660-1667 (2009) - 2008
- [j5]Bagus Santoso, Noboru Kunihiro, Naoki Kanayama, Kazuo Ohta:
Factorization of Square-Free Integers with High Bits Known. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 91-A(1): 306-315 (2008) - 2007
- [j4]Naoki Kanayama, Shigenori Uchiyama:
The Vanstone-Zuccherato Schemes Revisited. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 90-A(12): 2903-2907 (2007) - [c8]Seiichi Matsuda, Naoki Kanayama, Florian Hess, Eiji Okamoto:
Optimised Versions of the Ate and Twisted Ate Pairings. IMACC 2007: 302-312 - [i1]Seiichi Matsuda, Naoki Kanayama, Florian Hess, Eiji Okamoto:
Optimised versions of the Ate and Twisted Ate Pairings. IACR Cryptol. ePrint Arch. 2007: 13 (2007) - 2006
- [c7]Bagus Santoso, Noboru Kunihiro, Naoki Kanayama, Kazuo Ohta:
Factorization of Square-Free Integers with High Bits Known. VIETCRYPT 2006: 115-130 - 2004
- [j3]Koh-ichi Nagao, Shigenori Uchiyama, Naoki Kanayama, Kazuto Matsuo:
Analysis of Baby-Step Giant-Step Algorithms for Non-uniform Distributions. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 87-A(1): 10-17 (2004) - 2003
- [j2]Naoki Kanayama, Koh-ichi Nagao, Shigenori Uchiyama:
Generating Secure Genus Two Hyperelliptic Curves Using Elkies' Point Counting Algorithm. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 86-A(4): 919-927 (2003)
1990 – 1999
- 1998
- [j1]Makoto Kaneko, Naoki Kanayama, Toshio Tsuji:
Active antenna for contact sensing. IEEE Trans. Robotics Autom. 14(2): 278-291 (1998) - 1997
- [c6]Naoki Kanayama, Makoto Kaneko, Toshio Tsuji:
On 3D vision based active antenna. ICRA 1997: 143-148 - 1996
- [c5]Makoto Kaneko, Naoki Kanayama, Toshio Tsuji:
Vision based active antenna. ICRA 1996: 2555-2560 - [c4]Naoki Kanayama, Makoto Kaneko, Toshio Tsuji:
Vision based active antenna-basic considerations on two-points detecting method. IROS 1996: 444-449 - 1995
- [c3]Makoto Kaneko, Naoki Kanayama, Toshio Tsuji:
3-D Active Antenna for Contact Sensing. ICRA 1995: 1113-1119 - [c2]Makoto Kaneko, Naoki Kanayama, Toshio Tsuji:
A new consideration on active antenna. IROS (2) 1995: 524-529 - [c1]Makoto Kaneko, Naoki Kanayama, Toshio Tsuji:
Experimental Approach on Artificial Active Antenna. ISER 1995: 222-230
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-08-05 20:26 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint