Kohtaro Tadaki

According to our database1, Kohtaro Tadaki authored at least 42 papers between 2002 and 2022.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2022
An effectivization of the law of large numbers for algorithmically random sequences and its absolute speed limit of convergence.
CoRR, 2022

2016
Proposal of the Multivariate Public Key Cryptosystem Relying on the Difficulty of Factoring a Product of Two Large Prime Numbers.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2016

2015
Cryptography and Algorithmic Randomness.
Theory Comput. Syst., 2015

2014
Phase Transition and Strong Predictability.
Proceedings of the Unconventional Computation and Natural Computation, 2014

2013
Spectral Representation of Some Computably Enumerable Sets with an Application to Quantum Provability.
Proceedings of the Unconventional Computation and Natural Computation, 2013

2012
A Chaitin $$\Upomega$$ number based on compressible strings.
Nat. Comput., 2012

A statistical mechanical interpretation of algorithmic information theory III: composite systems and fixed points.
Math. Struct. Comput. Sci., 2012

Construction of the Tsujii-Shamir-Kasahara (TSK) Type Multivariate Public Key Cryptosystem, which relies on the Difficulty of Prime Factorization.
IACR Cryptol. ePrint Arch., 2012

Scheme overcoming incompatibility of privacy and utilization of personal data.
Proceedings of the International Symposium on Information Theory and its Applications, 2012

Phase Transition between Unidirectionality and Bidirectionality.
Proceedings of the Computation, Physics and Beyond, 2012

2011
A Computational Complexity-Theoretic Elaboration of Weak Truth-Table Reducibility
CoRR, 2011

Robustness of statistical mechanical interpretation of algorithmic information theory.
Proceedings of the 2011 IEEE Information Theory Workshop, 2011

2010
Theory of one-tape linear-time Turing machines.
Theor. Comput. Sci., 2010

Key-Generation Algorithms for Linear Piece In Hand Matrix Method.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2010

Dually-Perturbed Matsumoto-Imai Signature (DPMS) Scheme.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2010

Proposal of a Signature Scheme based on STS Trapdoor.
IACR Cryptol. ePrint Arch., 2010

A new representation of Chaitin Ωnumber based on compressible strings
CoRR, 2010

A New Representation of Chaitin Omega Number Based on Compressible Strings.
Proceedings of the Unconventional Computation - 9th International Conference, 2010

Properties of optimal prefix-free machines as instantaneous codes.
Proceedings of the 2010 IEEE Information Theory Workshop, 2010

Clarifying the specification of linear Piece In Hand matrix method.
Proceedings of the International Symposium on Information Theory and its Applications, 2010

Two-sided multiplications are reduced to one-sided multiplication in linear piece in hand matrix methods.
Proceedings of the International Symposium on Information Theory and its Applications, 2010

A knapsack cryptosystem based on multiple knapsacks.
Proceedings of the International Symposium on Information Theory and its Applications, 2010

The Hausdorff dimension of the halting self-similar sets of T-universal prefix-free machines.
Proceedings of the IEEE International Symposium on Information Theory, 2010

2009
Security Enhancement of Various MPKCs by 2-Layer Nonlinear Piece in Hand Method.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2009

Proposal of PPS Multivariate Public Key Cryptosystems.
IACR Cryptol. ePrint Arch., 2009

Partial Randomness and Dimension of Recursively Enumerable Reals.
Proceedings of the Mathematical Foundations of Computer Science 2009, 2009

Fixed Point Theorems on Partial Randomness.
Proceedings of the Logical Foundations of Computer Science, International Symposium, 2009

Fixed Points on Partial Randomness.
Proceedings of the 6th Workshop on Fixed Points in Computer Science, 2009

Chaitin Omega Numbers and Halting Problems.
Proceedings of the Mathematical Theory and Computational Practice, 2009

2008
Nonlinear Piece In Hand Matrix Method for Enhancing Security of Multivariate Public Key Cryptosystems.
IACR Cryptol. ePrint Arch., 2008

Nonlinear Piece In Hand Perturbation Vector Method for Enhancing Security of Multivariate Public Key Cryptosystems.
IACR Cryptol. ePrint Arch., 2008

Equivalent characterizations of partial randomness for a recursively enumerable real
CoRR, 2008

The Tsallis entropy and the Shannon entropy of a universal probability
CoRR, 2008

A statistical mechanical interpretation of algorithmic information theory
CoRR, 2008

2007
Proposal for Piece in Hand Matrix: General Concept for Enhancing Security of Multivariate Public Key Cryptosystems.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2007

A Statistical Mechanical Interpretation of Instantaneous Codes.
Proceedings of the IEEE International Symposium on Information Theory, 2007

2006
An extension of Chaitin's halting probability Omega to a measurement operator in an infinite dimensional quantum system.
Math. Log. Q., 2006

Proposal for Piece In Hand Matrix Ver.2: General Concept for Enhancing Security of Multivariate Public Key Cryptosystems.
IACR Cryptol. ePrint Arch., 2006

2004
Piece In Hand Concept for Enhancing the Security of Multivariate Type Public Key Cryptosystems: Public Key Without Containing All the Information of Secret Key.
IACR Cryptol. ePrint Arch., 2004

An extension of Chaitin's halting probability Omega to measurement operator in infinite dimensional quantum system
CoRR, 2004

2002
Upper bound by Kolmogorov complexity for the probability in computable POVM measurement
CoRR, 2002

A Generalization of Chaitin's Halting Probability \Omega and Halting Self-Similar Sets
CoRR, 2002


  Loading...