KUNIHIRO Noboru | The University of Tokyo
スポンサーリンク
概要
関連著者
-
KUNIHIRO Noboru
The University of Tokyo
-
Kunihiro Noboru
The University Of Electro-communications
-
OHTA Kazuo
University of Electro-Communications
-
SASAKI Yu
University of Electro-Communications
-
OHTA Kazuo
The University of Electro-Communications
-
WANG Lei
University of Electro-Communications
-
Ohta Kazuo
Department Of Informatics The University Of Electro-communications
-
Kunihiro Noboru
Univ. Tokyo Kashiwa‐shi Jpn
-
ITOH Kouichi
FUJITSU LABORATORIES Ltd.
-
YAJIMA Jun
FUJITSU LABORATORIES Ltd.
-
KOMANO Yuichi
Toshiba Corporation
-
SAKIYAMA Kazuo
University of Electro-Communications
-
SASAKI Yu
NTT Information Sharing Platform Laboratories, NTT Corporation
-
KUROSAWA Kaoru
Ibaraki University
-
SHINOHARA Naoyuki
National Institute of Information and Communications Technology
-
IZU Tetsuya
FUJITSU LABORATORIES Ltd. and FUJITSU Ltd.
-
Naito Yusuke
University Of Electro-communications
-
WANG Lei
The University of Electro-Communications
-
AOKI Kazumaro
NTT Information Sharing Platform Laboratories, NTT Corporation
-
IWASAKI Terutoshi
Chuo University
-
NAITO Yusuke
The University of Electro-Communications
-
SASAKI Yu
The University of Electro-Communications
-
SHIMOYAMA Takeshi
FUJITSU LABORATORIES LTD.
-
PEYRIN Thomas
Versailles Saint-Quentin-en-Yvelines University
-
Aoki Kazumaro
Ntt Information Sharing Platform Laboratories Ntt Corporation
-
Kurosawa Kaoru
Ibaraki Univ. Hitachi‐shi Jpn
-
HANATANI Yoshikazu
TOSHIBA Corporation
-
Sasaki Yu
Ntt Information Sharing Platform Laboratories Ntt Corporation
-
Komano Yuichi
Toshiba Corp. Kawasaki‐shi Jpn
-
Sasaki Yu
Ntt Information Sharing Platform Laboratories Ntt Corp.
-
Aoki Kazumaro
Ntt Informating Sharing Platform Laboratories Ntt Corporation
-
Sasaki Yu
Ntt Informating Sharing Platform Laboratories Ntt Corporation
-
SHIMOYAMA Takeshi
FUJITSU LABORATORIES Ltd
著作論文
- New Conditions for Secure Knapsack Schemes against Lattice Attack
- Cryptanalysis of Two MD5-Based Authentication Protocols: APOP and NMAC
- Small Secret CRT-Exponent Attacks on Takagis RSA
- Practical Password Recovery Attacks on MD4 Based Prefix and Hybrid Authentication Protocols
- A Strict Evaluation on the Number of Conditions for SHA-1 Collision Search
- Small Secret Key Attack on a Takagi's Variant of RSA
- Provably Secure Untraceable Electronic Cash against Insider Attacks(Discrete Mathematics and Its Applications)