#### Filter Results:

- Full text PDF available (3)

#### Publication Year

2008

2012

#### Publication Type

#### Co-author

#### Publication Venue

#### Key Phrases

Learn More

- Kenta Nekado, Yasuyuki Nogami, Hidehiro Katou, Yoshitaka Morikawa
- IEICE Transactions
- 2011

- Yasuyuki Nogami, Kenta Nekado, Tetsumi Toyota, Naoto Hongo, Yoshitaka Morikawa
- IEICE Transactions
- 2011

- Yasuyuki Nogami, Yumi Sakemi, Takumi Okimoto, Kenta Nekado, Masataka Akane, Yoshitaka Morikawa
- IEICE Transactions
- 2009

- Kenta Nekado, Yasuyuki Nogami, Kengo Iokibe
- IWSEC
- 2012

Recently, pairing-based cryptographies such as ID-based cryptography and group signature have been studied. For fast pairing calculation, not only pairing algorithms but also arithmetic operations in extension field must be efficiently carried out. The authors show efficient arithmetic operations of extension field for Xate pairing especially with Freemanâ€¦ (More)

- Yasuyuki Nogami, Hidehiro Katou, Kenta Nekado, Satoshi Uehara, Yoshitaka Morikawa
- IEEE Transactions on Information Theory
- 2012

Several methods for finding a basis conversion matrix between two different bases in an extension field have been proposed. Among them, the one based on Gauss period normal basis (GNB) is on average the most efficient. However, since it needs to construct a certain tower field , some inefficient cases in which the towering degree becomes large have beenâ€¦ (More)

- H. Kato, Y. Nogami, T. Yoshida, K. Nekado, S. Takeuchi, Y. Morikawa
- 2008 Third International Conference onâ€¦
- 2008

This paper first introduces cyclic vector multiplication algorithm (CVMA) that is a multiplication algorithm in extension field. Then, it is also introduced that CVMA is useful under the tight restrictions of pairing-based cryptographies. Then, this paper points out a problem about the calculation cost of CVMA. For this problem, this paper proposes anâ€¦ (More)

- Kenta Nekado, Tatsuya Yuasa, Yasuyuki Nogami, Yoshitaka Morikawa
- 2010 13th International Conference on Networkâ€¦
- 2010

Many public-key cryptographers have recently focused on cryptographic schemes based on pairing, which is a bilinear map from two elliptic curve groups to a group in an extension field. In order to provide efficient pairings, several kinds of pairing-friendly curves have been proposed. Since most of the pairing-friendly curves are defined over a certainâ€¦ (More)

Recent cryptographic applications such as elliptic curve cryptography and pairing-based cryptography often need arithmetic operations, especially vector multiplications in a certain extension field of large order. Thus, the authors have proposed cyclic vector multiplication algorithm (CVMA) with prime Gauss period normal basis (GNB) for acceleratingâ€¦ (More)