MISC - NOGAMI Yasuyuki
-
2014 ( 19 ) 1 - 4 2014.1
-
Pseudo 8-sparse multiplication for efficient ate-based pairing on Barreto-Naehrig curve
Yuki Mori, Shoichi Akagi, Yasuyuki Nogami, Masaaki Shirase
Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) 8365 186 - 198 2014
-
有限体上のロジスティック写像による生成系列に対する長周期を保証するための条件
土屋和由, 野上保之
日本応用数理学会年会講演予稿集(CD-ROM) 2014 2014
-
A Binary Sequence Generated by Legendre Symbol and Primitive Polynomial over Odd Characteristic
NOGAMI Yasuyuki, UEHARA Satoshi, TADA Kazuki
IEICE technical report. Information theory 113 ( 58 ) 5 - 8 2013.5
-
A Smaller Final Exponentiation for Tate and Ate Pairings with Barreto-Naehrig Curve
Yuki Kono, Taichi Sumo, Yasuyuki Nogami
2013 16TH INTERNATIONAL CONFERENCE ON NETWORK-BASED INFORMATION SYSTEMS (NBIS 2013) 518 - 522 2013
-
A Binarization of Geometric Sequences with Legendre Symbol and Its Autocorrelation
Yasuyuki Nogami, Kazuki Tada, Satoshi Uehara
SIXTH INTERNATIONAL WORKSHOP ON SIGNAL DESIGN AND ITS APPLICATIONS IN COMMUNICATIONS 28 - 31 2013
-
Safe Primeを法とした素体上のロジスティック写像による生成系列に関する一考察
宮崎武, 荒木俊輔, 上原聡, 野上保之
日本応用数理学会年会講演予稿集(CD-ROM) 2013 2013
-
2012 ( 3 ) 493 - 500 2012.10
-
Yasuyuki Nogami, Hidehiro Kato, Kenta Nekado, Satoshi Uehara, Yoshitaka Morikawa
IEEE TRANSACTIONS ON INFORMATION THEORY 58 ( 7 ) 4936 - 4947 2012.7
-
Finding a Basis Conversion Matrix Using a Polynomial Basis Derived by a Small Multiplicative Cyclic Group
Yasuyuki Nogami, Hidehiro Kato, Kenta Nekado, Satoshi Uehara, Yoshitaka Morikawa
IEEE TRANSACTIONS ON INFORMATION THEORY 58 ( 7 ) 4936 - 4947 2012.7
-
An Approach for Constructing Primitive Polynomials of Degree 2^i over Odd Characteristic Prime Field
NOGAMI Yasuyuki, TAKAI Yusuke, KOBAYASHI Shigeki, SUGIMURA Tatsuo, UEHARA Satoshi
Technical report of IEICE. ISEC 112 ( 39 ) 19 - 24 2012.5
-
2011 ( 3 ) 349 - 354 2011.10
-
Freeman曲線を用いたXateおよびR–ateペアリングのための定義体における乗算アルゴリズム
根角 健太, 湯浅 達也, 野上 保之, 森川 良孝
コンピュータセキュリティシンポジウム2009 (CSS2009) 論文集 2009 1 - 6 2011.10
-
SubBytes Transform for AES Adopting Inversion in F_{(2^4)^2} with Redundantly Represented Basis
2011 ( 3 ) 343 - 348 2011.10
-
Memory Saving Implementation of Cyclic Vector Multiplication Algorithm
TAKAHASHI Ryosuke, NEKADO Kenta, TAKAI Yusuke, NOGAMI Yasuyuki, KAGOTANI Hiroto, NARITA Takashi
IEICE technical report 111 ( 125 ) 145 - 150 2011.7
-
Memory Saving Implementation of Cyclic Vector Multiplication Algorithm
TAKAHASHI Ryosuke, NEKADO Kenta, TAKAI Yusuke, NOGAMI Yasuyuki, KAGOTANI Hiroto, NARITA Takashi
IEICE technical report 111 ( 124 ) 145 - 150 2011.7
-
Memory Saving Implementation of Cyclic Vector Multiplication Algorithm
TAKAHASHI Ryosuke, NEKADO Kenta, TAKAI Yusuke, NOGAMI Yasuyuki, KAGOTANI Hiroto, NARITA Takashi
IEICE technical report 111 ( 126 ) 145 - 150 2011.7
-
Memory Saving Implementation of Cyclic Vector Multiplication Algorithm
TAKAHASHI Ryosuke, NEKADO Kenta, TAKAI Yusuke, NOGAMI Yasuyuki, KAGOTANI Hiroto, NARITA Takashi
IEICE technical report 111 ( 123 ) 145 - 150 2011.7
-
Memory Saving Implementation of Cyclic Vector Multiplication Algorithm
2011 ( 23 ) 1 - 6 2011.7
-
Memory Saving Implementation of Cyclic Vector Multiplication Algorithm
2011 ( 23 ) 1 - 6 2011.7