Hideki Imai
According to our database1,
Hideki Imai
authored at least 371 papers
between 1972 and 2020.
Collaborative distances:
Collaborative distances:
Awards
IEEE Fellow
IEEE Fellow 1992, "For contributions to the theory of coded modulation and two-dimensional codes.".
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
-
on zbmath.org
-
on viaf.org
-
on id.loc.gov
-
on d-nb.info
On csauthors.net:
Bibliography
2020
Aggregate Message Authentication Codes with Detecting Functionality from Biorthogonal Codes.
Proceedings of the IEEE International Symposium on Information Theory, 2020
2017
Partially Wildcarded Ciphertext-Policy Attribute-Based Encryption and Its Performance Evaluation.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2017
How to Make Traitor Tracing Schemes Secure against a Content Comparison Attack in Actual Services.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2017
2016
Time-specific encryption from forward-secure encryption: generic and direct constructions.
Int. J. Inf. Sec., 2016
2015
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2015
Proceedings of the Security and Trust Management - 11th International Workshop, 2015
2014
Efficient Constructions of Deterministic Encryption from Hybrid Encryption and Code-Based PKE.
Int. J. Netw. Secur., 2014
In search of secure domain parameters under strong diffie-hellman and related assumptions.
Proceedings of the International Symposium on Information Theory and its Applications, 2014
2013
A Theoretical Framework for Constructing Matching Algorithms Secure against Wolf Attack.
IEICE Trans. Inf. Syst., 2013
Proceedings of the SECRYPT 2013, 2013
Efficient and Fully Secure Forward Secure Ciphertext-Policy Attribute-Based Encryption.
Proceedings of the Information Security, 16th International Conference, 2013
2012
IEEE Trans. Inf. Theory, 2012
IEEE Trans. Inf. Theory, 2012
Generic cryptographic weakness of <i>k</i>-normal Boolean functions in certain stream ciphers and cryptanalysis of grain-128.
Period. Math. Hung., 2012
Internal state recovery of keystream generator LILI-128 based on a novel weakness of the employed Boolean function.
Inf. Process. Lett., 2012
Internal state recovery of grain-v1 employing normality order of the filter function.
IET Inf. Secur., 2012
A Numerical Evaluation of Entanglement Sharing Protocols Using Quantum LDPC CSS Codes.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2012
Proceedings of the Security and Cryptography for Networks - 8th International Conference, 2012
Proceedings of the International Symposium on Information Theory and its Applications, 2012
HB<sup>♭</sup> protocol for lightweight authentication; Its information theoretic indistinguishability against MITM attack watching reader's response.
Proceedings of the International Symposium on Information Theory and its Applications, 2012
Proceedings of the Information Security and Cryptology - ICISC 2012, 2012
2011
Proceedings of the Encyclopedia of Cryptography and Security, 2nd Ed., 2011
Threshold Anonymous Password-Authenticated Key Exchange Secure against Insider Attacks.
IEICE Trans. Inf. Syst., 2011
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2011
Universally Composable and Statistically Secure Verifiable Secret Sharing Scheme Based on Pre-Distributed Data.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2011
Proceedings of the 2011 IEEE International Symposium on Information Theory Proceedings, 2011
Proceedings of the 2011 IEEE International Symposium on Information Theory Proceedings, 2011
Proceedings of the 6th International Conference for Internet Technology and Secured Transactions, 2011
Proceedings of the 7th Cyber Security and Information Intelligence Research Workshop, 2011
2010
Purpose-restricted Anonymous Mobile Communications Using Anonymous Signatures in Online Credential Systems.
Wirel. Pers. Commun., 2010
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2010
An RSA-Based Leakage-Resilient Authenticated Key Exchange Protocol Secure against Replacement Attacks, and Its Extensions.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2010
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2010
Dual-Policy Attribute Based Encryption: Simultaneous Access Control with Ciphertext and Key Policies.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2010
IEICE Electron. Express, 2010
Homophonic Coding Design for Communication Systems Employing the Encoding-Encryption Paradigm
CoRR, 2010
Proceedings of the Towards Trustworthy Elections, New Directions in Electronic Voting, 2010
Proceedings of the Information Security Applications - 11th International Workshop, 2010
Proceedings of the International Symposium on Information Theory and its Applications, 2010
How to distinguish on-line dictionary attacks and password mis-typing in two-factor authentication.
Proceedings of the International Symposium on Information Theory and its Applications, 2010
Proceedings of the International Symposium on Information Theory and its Applications, 2010
A low complexity authentication protocol based on pseudorandomness, randomness and homophonic coding.
Proceedings of the International Symposium on Information Theory and its Applications, 2010
A generic weakness of the k-normal Boolean functions exposed to dedicated algebraic attack.
Proceedings of the International Symposium on Information Theory and its Applications, 2010
Proceedings of the IEEE International Symposium on Information Theory, 2010
Proceedings of the Global Communications Conference, 2010
Proceedings of the Global Communications Conference, 2010
A Note on a Fatal Error of Optimized LFC Private Information Retrieval Scheme and Its Corrected Results.
Proceedings of the Financial Cryptography and Data Security, 2010
2009
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2009
IEICE Trans. Inf. Syst., 2009
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2009
IEICE Trans. Commun., 2009
Smallest Size of Circulant Matrix for Regular (3, <i>L</i>) and (4, <i>L</i>) Quasi-Cyclic LDPC Codes with Girth 6.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2009
IEICE Trans. Inf. Syst., 2009
Formal Security Treatments for IBE-to-Signature Transformation: Relations among Security Notions.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2009
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2009
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2009
Information-Theoretically Secure Oblivious Polynomial Evaluation in the Commodity-Based Model.
IACR Cryptol. ePrint Arch., 2009
IACR Cryptol. ePrint Arch., 2009
An approach for stream ciphers design based on joint computing over random and secret data.
Computing, 2009
Proceedings of the 2009 IEEE Wireless Communications and Networking Conference, 2009
Proceedings of the IEEE Vehicular Networking Conference, 2009
Proceedings of the Pairing-Based Cryptography, 2009
Proceedings of the Information Security, 12th International Conference, 2009
Proceedings of the Cryptography and Coding, 2009
Proceedings of the Information and Communications Security, 11th International Conference, 2009
Proceedings of IEEE International Conference on Communications, 2009
Theoretical Framework for Constructing Matching Algorithms in Biometric Authentication Systems.
Proceedings of the Advances in Biometrics, Third International Conference, 2009
An Efficient Encapsulation Scheme from Near Collision Resistant Pseudorandom Generators and Its Application to IBE-to-PKE Transformations.
Proceedings of the Topics in Cryptology, 2009
A Matching Algorithm Secure against the Wolf Attack in Biometric Authentication Systems.
Proceedings of the Biometric ID Management and Multimodal Communication, 2009
Proceedings of the Information Security and Cryptology - 5th International Conference, 2009
Proceedings of the 2009 ACM Symposium on Information, 2009
Proceedings of the Applied Cryptography and Network Security, 7th International Conference, 2009
Proceedings of the Applied Algebra, 2009
Proceedings of the Applied Algebra, 2009
2008
IEEE Trans. Inf. Theory, 2008
IEEE Trans. Inf. Theory, 2008
On the Use of Bhattacharyya Distance as a Measure of the Detectability of Steganographic Systems.
Trans. Data Hiding Multim. Secur., 2008
Wolf Attack Probability: A Theoretical Security Measure in Biometric Authentication Systems.
IEICE Trans. Inf. Syst., 2008
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2008
IEICE Trans. Inf. Syst., 2008
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2008
IEICE Trans. Commun., 2008
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2008
A Strongly Unforgeable Signature under the CDH Assumption without Collision Resistant Hash Functions.
IEICE Trans. Inf. Syst., 2008
Lightweight Privacy-Preserving Authentication Protocols Secure against Active Attack in an Asymmetric Way.
IEICE Trans. Inf. Syst., 2008
IACR Cryptol. ePrint Arch., 2008
IACR Cryptol. ePrint Arch., 2008
Des. Codes Cryptogr., 2008
Protocols for purpose-restricted anonymous communications in IP-based wireless networks.
Comput. Commun., 2008
Proceedings of the Advances in Information and Computer Security, 2008
Simple CCA-Secure Public Key Encryption from Any Non-Malleable Identity-Based Encryption.
Proceedings of the Information Security and Cryptology, 2008
Proceedings of IEEE International Conference on Communications, 2008
Proceedings of the Global Communications Conference, 2008. GLOBECOM 2008, New Orleans, LA, USA, 30 November, 2008
Proceedings of the Third International Conference on COMmunication System softWAre and MiddlewaRE (COMSWARE 2008), 2008
Proceedings of the Information Security and Cryptology, 4th International Conference, 2008
2007
IEEE Trans. Inf. Theory, 2007
Modeling Bit Flipping Decoding Based on Nonorthogonal Check Sums With Application to Iterative Decoding Attack of McEliece Cryptosystem.
IEEE Trans. Inf. Theory, 2007
An Efficient and Leakage-Resilient RSA-Based Authenticated Key Exchange Protocol with Tight Security Reduction.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2007
Key-Insulated Public Key Encryption with Auxiliary Helper Key: Model, Constructions and Formal Security Proofs.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2007
IEICE Trans. Inf. Syst., 2007
Traitor Tracing Scheme Secure against Adaptive Key Exposure and its Application to Anywhere TV Service.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2007
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2007
Practical Broadcast Encryption from Graph-Theoretic Techniques and Subset-Incremental-Chain Structure.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2007
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2007
Security evaluation of certain broadcast encryption schemes employing a generalized time-memory-data trade-off.
IEEE Commun. Lett., 2007
Comparative Studies in Key Disagreement Correction Process on Wireless Key Agreement System.
Proceedings of the Information Security Applications, 8th International Workshop, 2007
A Privacy Protection Scheme for a Scalable Control Method in Context-Dependent Services.
Proceedings of the Research in Cryptology, Second Western European Workshop, 2007
A CDH-Based Strongly Unforgeable Signature Without Collision Resistant Hash Function.
Proceedings of the Provable Security, 2007
Proceedings of the Provable Security, 2007
Proceedings of the IEEE 18th International Symposium on Personal, 2007
Lightweight Asymmetric Privacy-Preserving Authentication Protocols Secure against Active Attack.
Proceedings of the Fifth Annual IEEE International Conference on Pervasive Computing and Communications, 2007
Proceedings of the Knowledge-Based Intelligent Information and Engineering Systems, 2007
Proceedings of the Knowledge-Based Intelligent Information and Engineering Systems, 2007
Proceedings of the IEEE International Symposium on Information Theory, 2007
Proceedings of the IEEE International Symposium on Information Theory, 2007
Proceedings of the Information Hiding, 9th International Workshop, 2007
Proceedings of the Information Theoretic Security - Second International Conference, 2007
Efficient Oblivious Transfer Protocols Achieving a Non-zero Rate from Any Non-trivial Noisy Correlation.
Proceedings of the Information Theoretic Security - Second International Conference, 2007
Proceedings of the Advances in Biometrics, International Conference, 2007
Proceedings of the Fast Software Encryption, 14th International Workshop, 2007
Proceedings of the Financial Cryptography and Data Security, 2007
Proceedings of the Information Security and Cryptology, Third SKLOIS Conference, 2007
A Tracing Algorithm for Short 2-Secure Probabilistic Fingerprinting Codes Strongly Protecting Innocent Users.
Proceedings of the 4th IEEE Consumer Communications and Networking Conference, 2007
Generic Combination of Public Key Encryption with Keyword Search and Public Key Encryption.
Proceedings of the Cryptology and Network Security, 6th International Conference, 2007
Proceedings of the Applied Algebra, 2007
An Improvement of Tardos's Collusion-Secure Fingerprinting Codes with Very Short Lengths.
Proceedings of the Applied Algebra, 2007
2006
IEEE J. Sel. Areas Commun., 2006
Inf. Media Technol., 2006
A Dynamical Bifurcation of Distinguishability in Thermalization Processes, from Classical to Quantum.
Inf. Media Technol., 2006
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2006
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2006
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2006
Key-Dependent Weak IVs and Weak Keys in WEP - How to Trace Conditions Back to Their Patterns - .
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2006
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2006
IEICE Trans. Inf. Syst., 2006
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2006
A Generic Construction of CCA-Secure Cryptosystems without NIZKP for a Bounded Number of Decryption Queries.
IACR Cryptol. ePrint Arch., 2006
A Novel Algorithm for Solving the LPN Problem and its Application to Security Evaluation of the HB Protocol for RFID Authentication.
IACR Cryptol. ePrint Arch., 2006
Optimal probabilistic fingerprinting codes using optimal finite random variables related to numerical quadrature
CoRR, 2006
Comput. J., 2006
Proceedings of the Progressin Cryptology, 2006
Privacy Enhanced and Light Weight RFID System without Tag Synchronization and Exhaustive Search.
Proceedings of the IEEE International Conference on Systems, 2006
Proceedings of the IEEE International Conference on Systems, 2006
Proceedings of the IEEE International Conference on Systems, 2006
Proceedings of the Public Key Cryptography, 2006
A Leakage-Resilient and Forward-Secure Authenticated Key Exchange Protocol for Private Personal Area Networks.
Proceedings of the IEEE 17th International Symposium on Personal, 2006
Proceedings of the LATIN 2006: Theoretical Informatics, 2006
Proceedings of the Information Security, 9th International Conference, 2006
Proceedings of the Proceedings 2006 IEEE International Symposium on Information Theory, 2006
Proceedings of the Proceedings 2006 IEEE International Symposium on Information Theory, 2006
Proceedings of the Proceedings 2006 IEEE International Symposium on Information Theory, 2006
Proceedings of the Progress in Cryptology, 2006
An Algorithm for Solving the LPN Problem and Its Application to Security Evaluation of the HB Protocols for RFID Authentication.
Proceedings of the Progress in Cryptology, 2006
Proceedings of the Information and Communications Security, 8th International Conference, 2006
Proceedings of the Automata, Languages and Programming, 33rd International Colloquium, 2006
Proceedings of the Global Telecommunications Conference, 2006. GLOBECOM '06, San Francisco, CA, USA, 27 November, 2006
Proceedings of the Computational Intelligence and Security, International Conference, 2006
Proceedings of the 2006 ACM Symposium on Information, Computer and Communications Security, 2006
Forward-Secure and Searchable Broadcast Encryption with Short Ciphertexts and Private Keys.
Proceedings of the Advances in Cryptology, 2006
Proceedings of the Architecture of Computing Systems, 2006
Adaptively Secure Traitor Tracing Against Key Exposure and Its Application to Anywhere TV Service.
Proceedings of the Information Security and Privacy, 11th Australasian Conference, 2006
Generic Transforms to Acquire CCA-Security for Identity Based Encryption: The Cases of FOpkc and REACT.
Proceedings of the Information Security and Privacy, 11th Australasian Conference, 2006
Proceedings of the Applied Algebra, 2006
A General Formulation of Algebraic and Fast Correlation Attacks Based on Dedicated Sample Decimation.
Proceedings of the Applied Algebra, 2006
Unconditionally Secure Chaffing-and-Winnowing: A Relationship Between Encryption and Authentication.
Proceedings of the Applied Algebra, 2006
Proceedings of the Applied Algebra, 2006
Proceedings of the Applied Algebra, 2006
2005
Quantum Inf. Comput., 2005
Leakage-resilient security architecture for mobile IPv6 in wireless overlay networks.
IEEE J. Sel. Areas Commun., 2005
A Simple Leakage-Resilient Authenticated Key Establishment Protocol, Its Extensions, and Applications.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2005
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2005
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2005
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2005
IEEE Commun. Lett., 2005
Security Proof of "Efficient and Leakage-Resilient Authenticated Key Transport Protocol Based on RSA".
IACR Cryptol. ePrint Arch., 2005
Time-Data-Memory Trade-Off Based Cryptanalysis of Certain Broadcast Encryption Schemes.
IACR Cryptol. ePrint Arch., 2005
IACR Cryptol. ePrint Arch., 2005
Proceedings of the WEWoRC 2005, 2005
Proceedings of the IEEE Wireless Communications and Networking Conference, 2005
Proceedings of the Progress in Cryptology, 2005
Proceedings of the Computer Network Security, 2005
Proceedings of the 2005 IEEE International Symposium on Information Theory, 2005
Proceedings of the 2005 IEEE International Symposium on Information Theory, 2005
Cryptanalysis of Keystream Generator by Decimated Sample Based Algebraic and Fast Correlation Attacks.
Proceedings of the Progress in Cryptology, 2005
A Simplified Leakage-Resilient Authenticated Key Exchange Protocol with Optimal Memory Size.
Proceedings of the Networking, 2005
Proceedings of the Information Systems Security, First International Conference, 2005
Proceedings of the Global Telecommunications Conference, 2005. GLOBECOM '05, St. Louis, Missouri, USA, 28 November, 2005
Proceedings of the Public Key Infrastructure, 2005
Proceedings of the Digital Rights Management: Technologies, 2005
Proceedings of the Digital Rights Management: Technologies, 2005
Proceedings of the Topics in Cryptology, 2005
Proceedings of the Information Security and Cryptology, First SKLOIS Conference, 2005
Proceedings of the 2005 IEEE Symposium on Computational Intelligence and Games (CIG05), 2005
Novel method for implementation of certain key management schemes to minimize secret storage.
Proceedings of the 2nd IEEE Consumer Communications and Networking Conference, 2005
Graph-Decomposition-Based Frameworks for Subset-Cover Broadcast Encryption and Efficient Instantiations.
Proceedings of the Advances in Cryptology, 2005
Proceedings of the Applied Cryptography and Network Security, 2005
Proceedings of the Applied Cryptography and Network Security, 2005
Proceedings of the Applied Cryptography and Network Security, 2005
2004
IEEE Trans. Commun., 2004
On the suboptimality of iterative decoding for turbo-like and LDPC codes with cycles in their graph representation.
IEEE Trans. Commun., 2004
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2004
Managing Encryption and Key Publication Independently in Digital Rights Management Systems.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2004
IACR Cryptol. ePrint Arch., 2004
IACR Cryptol. ePrint Arch., 2004
Proceedings of the Information Security Applications, 5th International Workshop, 2004
Application of trust-metrics for evaluating performance system in ad-hoc networks with privacy.
Proceedings of the 2004 IEEE Wireless Communications and Networking Conference , 2004
Proceedings of the Security in Communication Networks, 4th International Conference, 2004
Proceedings of the 2004 IEEE International Symposium on Information Theory, 2004
Proceedings of the Information and Communications Security, 6th International Conference, 2004
Proceedings of the Topics in Cryptology, 2004
A Public-Key Black-Box Traitor Tracing Scheme with Sublinear Ciphertext Size Against Self-Defensive Pirates.
Proceedings of the Advances in Cryptology, 2004
Proceedings of the Advances in Cryptology, 2004
Proceedings of the Applied Cryptography and Network Security, 2004
Unconditionally Non-interactive Verifiable Secret Sharing Secure against Faulty Majorities in the Commodity Based Model.
Proceedings of the Applied Cryptography and Network Security, 2004
Information Theoretically Secure Oblivious Polynomial Evaluation: Model, Bounds, and Constructions.
Proceedings of the Information Security and Privacy: 9th Australasian Conference, 2004
2003
On the one-wayness against chosen-plaintext attacks of the Loidreau's modified McEliece PKC.
IEEE Trans. Inf. Theory, 2003
Best Truncated and Impossible Differentials of Feistel Block Ciphers with S-D (Substitution and Diffusion) or D-S Round Functions.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2003
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2003
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2003
IACR Cryptol. ePrint Arch., 2003
IACR Cryptol. ePrint Arch., 2003
IACR Cryptol. ePrint Arch., 2003
Proceedings of the 2003 ACM Workshop on XML Security, Fairfax, VA, USA, October 31, 2003, 2003
Unconditionally Secure Homomorphic Pre-distributed Bit Commitment and Secure Two-Party Computations.
Proceedings of the Information Security, 6th International Conference, 2003
Proceedings of the Information Security, 6th International Conference, 2003
Proceedings of the Information and Communications Security, 5th International Conference, 2003
Proceedings of the 2003 ACM workshop on Digital rights management 2003, Washington, 2003
Proceedings of the Advances in Cryptology - ASIACRYPT 2003, 9th International Conference on the Theory and Application of Cryptology and Information Security, Taipei, Taiwan, November 30, 2003
Sequential Key Derivation Patterns for Broadcast Encryption and Key Predistribution Schemes.
Proceedings of the Advances in Cryptology - ASIACRYPT 2003, 9th International Conference on the Theory and Application of Cryptology and Information Security, Taipei, Taiwan, November 30, 2003
Round Optimal Distributed Key Generation of Threshold Cryptosystem Based on Discrete Logarithm Problem.
Proceedings of the Applied Cryptography and Network Security, 2003
Proceedings of the Information Security and Privacy, 8th Australasian Conference, 2003
Proceedings of the Information Security and Privacy, 8th Australasian Conference, 2003
Proceedings of the Applied Algebra, 2003
2002
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2002
Effect of Noisy Estimation on Turbo-Coded Modulation over Flat Rayleigh Fading Channels.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2002
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2002
Pretty-Simple Password-Authenticated Key-Exchange Protocol Proven to be Secure in the Standard Model.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2002
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2002
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2002
Equivalence between semantic security and indistinguishability against chosen ciphertext attacks.
IACR Cryptol. ePrint Arch., 2002
IACR Cryptol. ePrint Arch., 2002
A Hierarchical Non-interactive Key-Sharing Scheme with Low Memory Size and High Resistance against Collusion Attacks.
Comput. J., 2002
Two Alerts for Design of Certain Stream Ciphers: Trapped LFSR and Weak Resilient Function over GF(q).
Proceedings of the Selected Areas in Cryptography, 2002
New Chosen-Plaintext Attacks on the One-Wayness of the Modified McEliece PKC Proposed at Asiacrypt 2000.
Proceedings of the Public Key Cryptography, 2002
Efficient and Unconditionally Secure Digital Signatures and a Security Analysis of a Multireceiver Authentication Code.
Proceedings of the Public Key Cryptography, 2002
Proceedings of the 2002 IEEE Information Theory Workshop, 2002
Proceedings of the Information Security, 5th International Conference, 2002
Proceedings of the Information Security, 5th International Conference, 2002
Unconditionally Secure Key Insulated Cryptosystems: Models, Bounds and Constructions.
Proceedings of the Information and Communications Security, 4th International Conference, 2002
Digital Timestamps for Dispute Settlement in Electronic Commerce: Generation, Verification, and Renewal.
Proceedings of the ICEIS 2002, 2002
Proceedings of the IEEE International Conference on Communications, 2002
Proceedings of the Advances in Cryptology - EUROCRYPT 2002, International Conference on the Theory and Applications of Cryptographic Techniques, Amsterdam, The Netherlands, April 28, 2002
2001
IEEE Trans. Commun., 2001
Electron. Notes Discret. Math., 2001
Proceedings of the Public Key Cryptography, 2001
Proceedings of the Public Key Cryptography, 2001
Proceedings of the IEEE International Conference on Communications, 2001
Proceedings of the Fast Software Encryption, 8th International Workshop, 2001
Proceedings of the Topics in Cryptology, 2001
Security of Reduced Version of the Block Cipher Camellia against Truncated and Impossible Differential Cryptanalysis.
Proceedings of the Advances in Cryptology, 2001
2000
MDPSK-OFDM with highly power-efficient block codes for frequency-selective fading channels.
IEEE Trans. Veh. Technol., 2000
Multilevel coded modulation for unequal error protection and multistage decoding .I. Symmetric constellations.
IEEE Trans. Commun., 2000
Multilevel coded modulation for unequal error protection and multistage decoding. II. Asymmetric constellations.
IEEE Trans. Commun., 2000
Performance of the deliberate clipping with adaptive symbol selection for strictly band-limited OFDM systems.
IEEE J. Sel. Areas Commun., 2000
IEEE Commun. Lett., 2000
Relating Differential Distribution Tables to Other Properties of of Substitution Boxes.
Des. Codes Cryptogr., 2000
A Practical Implementation of Hierarchically Structured Key Predistribution System and Its Evaluation.
Proceedings of the Information Security, Third International Workshop, 2000
Proceedings of the Global Telecommunications Conference, 2000. GLOBECOM 2000, San Francisco, CA, USA, 27 November, 2000
Proceedings of the Global Telecommunications Conference, 2000. GLOBECOM 2000, San Francisco, CA, USA, 27 November, 2000
Proceedings of the Fast Software Encryption, 7th International Workshop, 2000
Proceedings of the CCS 2000, 2000
CRYPTREC Project - Cryptographic Evaluation Project for the Japanese Electronic Government.
Proceedings of the Advances in Cryptology, 2000
Proceedings of the Advances in Cryptology, 2000
Relationships among Differential, Truncated Differential, Impossible Differential Cryptanalyses against Word-Oriented Block Ciphers like RIJNDAEL, E2.
Proceedings of the Third Advanced Encryption Standard Candidate Conference, 2000
1999
Reduced complexity iterative decoding of low-density parity check codes based on belief propagation.
IEEE Trans. Commun., 1999
Eur. Trans. Telecommun., 1999
Shared Generation of Random Number with Timestamp: How to Cope with the Leakage of the CA's Secret.
Proceedings of the Public Key Cryptography, 1999
Active Rebooting Method for Proactivized System: How to Enhance the Security against Latent Virus Attacks.
Proceedings of the Information Security, Second International Workshop, 1999
Proceedings of the Information Security, Second International Workshop, 1999
Proceedings of the Information and Communication Security, Second International Conference, 1999
Optimal Construction of Unconditionally Secure ID-Based Key Sharing Scheme for Large-Scale Networks.
Proceedings of the Information and Communication Security, Second International Conference, 1999
Proceedings of the Financial Cryptography, 1999
Proceedings of the Advances in Cryptology, 1999
Optimizing the Menezes-Okamoto-Vanstone (MOV) Algorithm for Non-supersingular Elliptic Curves.
Proceedings of the Advances in Cryptology, 1999
An Efficient Hierarchical Identity-Based Key-Sharing Method Resistant against Collusion-Attacks.
Proceedings of the Advances in Cryptology, 1999
Critical Noise for Convergence of Iterative Probabilistic Decoding with Belief Propagation in Cryptographic Applications.
Proceedings of the Applied Algebra, 1999
1998
On block-coded modulation using unequal error protection codes over Rayleigh-fading channels.
IEEE Trans. Commun., 1998
IEEE Trans. Commun., 1998
Inf. Process. Lett., 1998
Proceedings of the Worldwide Computing and Its Applications, International Conference, 1998
A Cellular Automaton Based Fast One-Way Hash Function Suitable for Hardware Implementation.
Proceedings of the Public Key Cryptography, 1998
Proceedings of the Proceedings IEEE INFOCOM '98, The Conference on Computer Communications, Seventeenth Annual Joint Conference of the IEEE Computer and Communications Societies, Gateway to the 21st Century, San Francisco, CA, USA, March 29, 1998
A successive carrier-transmission model for narrow-band subliminal channels.
Proceedings of the 1st International Conference on Information Security and Cryptology, 1998
Proceedings of the 1998 IEEE International Conference on Communications, 1998
Proceedings of the Information Security and Privacy, Third Australasian Conference, 1998
1997
Proceedings of the Information and Communication Security, First International Conference, 1997
Proceedings of the Information and Communication Security, First International Conference, 1997
1996
IEEE Trans. Inf. Theory, 1996
Limiting the Visible Space Visual Secret Sharing Schemes and Their Application to Human Identification.
Proceedings of the Advances in Cryptology, 1996
1995
IEEE Trans. Computers, 1995
Integrated receiver structure of staged decoder and CCI canceller for CDMA with multilevel coded modulation.
Eur. Trans. Telecommun., 1995
1994
Multiuser detection scheme based on canceling cochannel interference for MFSK/FH-SSMA system.
IEEE J. Sel. Areas Commun., 1994
Design of pseudonoise sequences with good odd and even correlation properties for DS/CDMA.
IEEE J. Sel. Areas Commun., 1994
Proceedings of the Advances in Cryptology - ASIACRYPT '94, 4th International Conference on the Theory and Applications of Cryptology, Wollongong, Australia, November 28, 1994
1993
Generalized concatenated codes for channels where unidirectional byte errors are predominant.
IEEE Trans. Inf. Theory, 1993
IEEE Trans. Computers, 1993
A Spread-Spectrum Multiaccess System with Cochannel Interference Cancellation for Multipath Fading Channels.
IEEE J. Sel. Areas Commun., 1993
Peak-Shift and Bit Error-Correction with Channel Side Information in Runlength-Limited Sequences.
Proceedings of the Applied Algebra, 1993
1992
Adaptive array antenna combined with tapped delay line using processing gain for spread-spectrum CDMA systems.
Proceedings of the Third IEEE International Symposium on Personal, 1992
Systolic-Arrays for Modular Exponentiation Using Montgomery Method (Extended Abstract).
Proceedings of the Advances in Cryptology, 1992
Proceedings of the Advances in Cryptology, 1992
Proceedings of the Advances in Cryptology, 1992
Proceedings of the Advances in Cryptology, 1992
1991
Combination of decoding of error-correcting codes and equalization for channels with intersymbol interference.
Discret. Appl. Math., 1991
Array Antenna Beamforming Based On Estimation Of Arrival Angles Using DFT On Spatial Domain.
Proceedings of the IEEE International Symposium On Personal, 1991
Proceedings of the Advances in Cryptology, 1991
Proceedings of the Advances in Cryptology, 1991
Random and Byte Error Correcting Codes for Asymmetric or Undirectional Error Control.
Proceedings of the Applied Algebra, 1991
1990
IEEE Trans. Inf. Theory, 1990
An Adaptive Canceller of Cochannel Interference for Spread-Spectrum Multiple-Access Communication Networks in a Power Line.
IEEE J. Sel. Areas Commun., 1990
Combination of an Adaptive Array Antenna and a Canceller of Interference for Direct-Sequence Spread-Spectrum Multiple-Access System.
IEEE J. Sel. Areas Commun., 1990
Image compression using a neural network with learning capability of variable function of a neural unit.
Proceedings of the Visual Communications and Image Processing '90: Fifth in a Series, 1990
Proceedings of the Advances in Cryptology, 1990
Proceedings of the Advances in Cryptology, 1990
Proceedings of the Applied Algebra, 1990
Proceedings of the Applied Algebra, 1990
Proceedings of the Applied Algebra, 1990
Trellis Coded Modulation Based on Time-Varying Mapping and Encoders for Utilitzing a Channel Intersymbol Interference.
Proceedings of the Applied Algebra, 1990
1989
An automatic equalizer including a Viterbi decoder for trellis coded modulation system.
Proceedings of the IEEE International Conference on Acoustics, 1989
Impossibility and Optimality Results on Constructing Pseudorandom Permutations (Extended Abstract).
Proceedings of the Advances in Cryptology, 1989
On the Construction of Block Ciphers Provably Secure and Not Relying on Any Unproved Hypotheses.
Proceedings of the Advances in Cryptology, 1989
1988
Public Quadratic Polynominal-Tuples for Efficient Signature-Verification and Message-Encryption.
Proceedings of the Advances in Cryptology, 1988
Proceedings of the Advances in Cryptology, 1988
Proceedings of the Applied Algebra, 1988
1987
A Construction Method of High-Speed Decoders Using ROMS's for Bose-Chaudhuri-Hocquenghem and Reed-Solomon Codes.
IEEE Trans. Computers, 1987
On the Key Predistribution System: A Practical Solution to the Key Distribution Problem.
Proceedings of the Advances in Cryptology, 1987
Proceedings of the Applied Algebra, 1987
1986
Proceedings of the IEEE International Conference on Acoustics, 1986
1985
IEEE Trans. Commun., 1985
Proceedings of the Algebraic Algorithms and Error-Correcting Codes, 1985
1984
1981
On Optimal Partition of a Query Set into Subsets Having the Consecutive Retrieval Property.
Proceedings of the Data Base File Organization, 1981
1977
IEEE Trans. Inf. Theory, 1977
IEEE Trans. Inf. Theory, 1977
1974
IEEE Trans. Inf. Theory, 1974
1973
1972