#### Filter Results:

- Full text PDF available (7)

#### Publication Year

1992

2019

- This year (1)
- Last 5 years (12)
- Last 10 years (17)

#### Publication Type

#### Co-author

#### Journals and Conferences

Learn More

- Keisuke Hakuta, Hisayoshi Sato, Tsuyoshi Takagi
- J. Mathematical Cryptology
- 2010

In elliptic curve cryptosystems, scalar multiplications performed on the curves have much effect on the efficiency of the schemes, and many efficient methods have been proposed. In particular,… (More)

- Keisuke Hakuta
- 2017

The present paper deals with permutations induced by tame automorphisms over finite fields. The first main result is a formula for determining the sign of the permutation induced by a given… (More)

- Keisuke Hakuta
- 2017

In this paper, we investigate the sign of permutations induced by the Anick automorphism and the Nagata-Anick automorphism over finite fields. We shall prove that if the Anick automorphism and the… (More)

Summary form only given. Optical processes with strong-coupling and quantum-coherence are opening various new possibilities beyond the limit of conventional optical processes. Recently we have… (More)

- Keisuke Hakuta, Yosuke Katoh, Hisayoshi Sato, Tsuyoshi Takagi
- ICISC
- 2012

Batch verification is a method for verifying digital signatures at once. Batch verification can reduce the computational cost compared to that of verifying each signature one by one, and in… (More)

We study the translational motion of an atom in the vicinity of a weakly driven nanofiber with two fiber-Bragg-grating mirrors. We find that the spatial dependences of the force, the friction… (More)

- Keisuke Hakuta
- 2018

We study distance functions on the set of ordinary (or non-supersingular) elliptic curves in short Weierstrass form (or simplified Weierstrass form) over a finite field of characteristic three.… (More)

Secure Comparison Protocol with Encrypted Output and the Computation for Proceeding 2 Bits-by-2 Bits

- Takumi Kobayashi, Keisuke Hakuta
- WISA
- 2018

A secure comparison protocol computes a comparison result between private information from inputs without leakage of the information. It is a very important factor in many potential applications such… (More)

- Keisuke Hakuta, Hisayoshi Sato, Tsuyoshi Takagi
- ISPEC
- 2008

In elliptic curve cryptosystems, scalar multiplications performed on the curves have much effect on the efficiency of the schemes, and many efficient methods have been proposed. In particular,… (More)

- Keisuke Hakuta
- Int. J. Math. Mathematical Sciences
- 2015

Elliptic curves have a wide variety of applications in computational number theory such as elliptic curve cryptography, pairing based cryptography, primality tests, and integer factorization. Mishra… (More)