IEICE Technical Committee Submission System
Conference Schedule
Online Proceedings
[Sign in]
Tech. Rep. Archives
    [Japanese] / [English] 
( Committee/Place/Topics  ) --Press->
( Paper Keywords:  /  Column:Title Auth. Affi. Abst. Keyword ) --Press->

All Technical Committee Conferences  (All Years)

Search Results: Conference Papers
 Conference Papers (Available on Advance Programs)  (Sort by: Date Descending)
 Results 1 - 6 of 6  /   
Committee Date Time Place Paper Title / Authors Abstract Paper #
ISEC, WBS, IT 2017-03-09
Tokyo TOKAI University Elliptic Curves Subjected to the GHS Attack on Composite Degree Extension Fields of Odd Characteristic Part II
Tappei Kobayashi (Chuo Univ.), Tsutomu Iijima (Koden Electronics), Jinhui Chao (Chuo Univ.) IT2016-105 ISEC2016-95 WBS2016-81
The GHS attack to elliptic/hyperelliptic curves cryptosystem is an attack to solve discrete logarithm problems (DLP) in ... [more] IT2016-105 ISEC2016-95 WBS2016-81
ISEC, IT, WBS 2015-03-02
Fukuoka The University of Kitakyushu Analysis on isomorphism classes of elliptic curves subjected to GHS attack over prime degree extensions of finite fields with odd characteristic
Takayuki Hosogaya (Chuo Univ.), Tsutomu Iijima (Koden), Mahoro Shimura (Tokai Univ.), Jinhui Chao (Chuo Univ.) IT2014-76 ISEC2014-89 WBS2014-68
The GHS attack is known to map the discrete logarithm problem (DLP) in the Jacobian of a curve $C_0$ defined over the $d... [more] IT2014-76 ISEC2014-89 WBS2014-68
ISEC, LOIS, SITE 2014-11-21
Hyogo   Elliptic curves subjected to the GHS attack over prime degree extension fields in odd characteristic
Tsutomu Iijima (Koden), Jinhui Chao (Chuo Univ) ISEC2014-59 SITE2014-50 LOIS2014-29
One of the most powerful attacks to elliptic curve and hyperelliptic based cryptosystems defined over an extension of a ... [more] ISEC2014-59 SITE2014-50 LOIS2014-29
ISEC, IT, WBS 2011-03-04
Osaka Osaka University Construction of non-hyperelliptic coverings for elliptic curves on extension fields
Hiroyuki Hara (Chuo Univ.), Tsutomu Iijima, Mahoro Shimura (Tokai Univ.), Jinhui Chao (Chuo Univ.) IT2010-92 ISEC2010-96 WBS2010-71
The GHS attack transfers the discrete logarithm problem(DLP) in the group of rational points of an elliptic curve over a... [more] IT2010-92 ISEC2010-96 WBS2010-71
ISEC, IT, WBS 2011-03-04
Osaka Osaka University GHS attack to elliptic curves on cubic fields of odd characteristic using B.Smith's hyperellptic-to-nonhyperelliptic transform
Kazuki Ohkawa (Chuo Univ.), Tsutomu Iijima, Jinhui Chao (Chuo Univ.) IT2010-93 ISEC2010-97 WBS2010-72
GHS attack to elliptic curves over cubic fields with hyperelliptic covering of genus three is not effective.In this pape... [more] IT2010-93 ISEC2010-97 WBS2010-72
ISEC, IPSJ-CSEC, SITE 2005-07-21
Iwate Iwate Prefectural University On Security of Superelliptic Curves and Cab Curves Based Cryptosystems against GHS Weil Descent Attack
Tsutomu Iijima, Mahoro Shimura, Jinhui Chao (Chuo Univ.), Shigeo Tsujii (IISEC)
 [more] ISEC2005-16 SITE2005-14
 Results 1 - 6 of 6  /   
Choose a download format for default settings. [NEW !!]
Text format pLaTeX format CSV format BibTeX format
Copyright and reproduction : All rights are reserved and no part of this publication may be reproduced or transmitted in any form or by any means, electronic or mechanical, including photocopy, recording, or any information storage and retrieval system, without permission in writing from the publisher. Notwithstanding, instructors are permitted to photocopy isolated articles for noncommercial classroom use without fee. (License No.: 10GA0019/12GB0052/13GB0056/17GB0034/18GB0034)

[Return to Top Page]

[Return to IEICE Web Page]

The Institute of Electronics, Information and Communication Engineers (IEICE), Japan