The International Symposium on Information Theory and Its Applications

number title/author
We-PM-1-2.1Equivalent Secret Key Attack against Knapsack PKC based on Subset Sum Decision Problem
Ryuichi Sakai, Yasuyuki Murakami,
We-PM-1-2.2Security of Knapsack Cryptosystem Using Subset-Sum Decision Problem against Alternative-Solution Attack
Yasuyuki Murakami, Ryuichi Sakai,
We-PM-1-2.3Side-Channel Attack using Order 4 Element against Curve25519 on ATmega328P
Yoshinori Uetake, Akihiro Sanada, Takuya Kusaka, Yasuyuki Nogami, Leo Weissbart, Sylvain Duquesne,
We-PM-1-2.4A Study on the Parameter Size of the Montgomery Trick for ECDLP
Ken Ikuta, Sho Joichi, Kazuya Kobayashi, Md. Al-Amin Khandaker, Takuya Kusaka, Yasuyuki Nogami,
We-PM-1-2.5A Study on the Parameter of the Distinguished Point Method in Pollard’s Rho Method for ECDLP
Ken Ikuta, Sho Joichi, Kazuya Kobayashi, Md. Al-Amin Khandaker, Takuya Kusaka, Yasuyuki Nogami,