KUROSAWA Kaoru | Department of Computer and Information Sciences, Ibaraki University
スポンサーリンク
概要
- KUROSAWA Kaoruの詳細を見る
- 同名の論文著者
- Department of Computer and Information Sciences, Ibaraki Universityの論文著者
関連著者
-
KUROSAWA Kaoru
Department of Computer and Information Sciences, Ibaraki University
-
Kurosawa Kaoru
Department Of Behavioral Sciences Faculty Of Letters Chiba University
-
Kurosawa Kaoru
Department Of Computer And Information Sciences Ibaraki University
-
IWATA Tetsu
Department of Computer and Information Sciences, Ibaraki University
-
Iwata Tetsu
Department Of Computational Science And Engineering Nagoya University
-
Kurosawa Kaoru
Department Of Mechanical Engineering For Production Faculty Of Engineering Tokyo Institute Of Techno
-
Honda Tsutomu
Department Of Mechanical Engineering For Production Faculty Of Engineering Tokyo Institute Of Techno
-
SASADA Tadashi
Department of Mechanical Engineering for Production, Faculty of Engineering, Tokyo Institute of Tech
-
Sasada Tadashi
Department Of Mechanical Engineering For Production Faculty Of Engineering Tokyo Institute Of Techno
-
Honda Tsutomu
Department Of Mechanical Engineering For Production Faculty Of Engineering Tokyo Institute Of Techno
-
Sasada Tadashi
Department Of Mechanical Engineering For Production Faculty Of Engineering Tokyo Institute Of Techno
-
黒沢 馨
The Authors Are With The Department Of Communication And Integrated Systems Tokyo Institute Of Techn
-
黒沢 馨
Tokyo Institute Of Technology
-
KAMADA Masaru
Department of Computer and Information Sciences, Faculty of Engineering, Ibaraki University
-
Ohtaki Yasuhiro
Department of Computer and Information Sciences, Ibaraki University
-
Kamada M
Department Of Computer And Information Sciences Ibaraki University
-
Kamada Masaru
Department Of Computer And Information Sciences Faculty Of Engineering Ibaraki University
-
Ohtaki Yasuhiro
Department Of Computer And Information Sciences Ibaraki University
-
DUONG Quang
Department of Communications and Integrated Systems, Tokyo Institute of Technology
-
Duong Quang
Department Of Communications And Integrated Systems Tokyo Institute Of Technology
-
Kamada Masaru
Department Of Information And Sciences Seikei University
-
Yagi Tohru
Department Of Communications And Integrated Systems Tokyo Institute Of Technology
-
Iwata T
Department Of Computer And Information Sciences Ibaraki University
-
Iwata Tetsu
Department Of Computer And Information Sciences Ibaraki University
-
Iwata T
Ibaraki Univ. Hitachi‐shi Jpn
-
Iwata Tetsu
Nagoya University
-
Yagi Takuma
The Authors Are With The Department Of Computer Sciences Kitami Institute Of Technology
-
Ogata Wakaha
Department Of Computer Engineering Faculty Of Engineering Himeji Institute Of Technology
-
Ogata Wakaha
Faculty Of Engineering Tokyo Institute Of Technology
-
OKAMOTO Shusuke
Department of Computer and Information Sciences, Ibaraki University
-
Okamoto Shusuke
Faculty Of Science And Technology Seikei University
-
Okamoto Shusuke
Department Of Computer And Information Sciences Ibaraki University
-
Duong Q
Natl. Inst. Of Info. And Com. Tech. Koganei‐shi Jpn
-
Duong Quang
Department Of Information And Network Systems Natl. Inst. Of Info And Com. Tech.
-
Iwata T
Nagoya University
-
Ogata Wakaha
Faculty Of Engineering Himeji Institute Of Technology
-
Ogata Wakaha
Himeji Institute Of Technology
-
Kurosawa Kaoru
Department Of Electrical And Electronic Engineering Faculty Of Engineering Tokyo Institute Of Techno
-
HENG Swee-Huay
Faculty of Information Science and Technology, Multimedia University
-
Heng Swee-huay
Faculty Of Information Science And Technology Multimedia University
著作論文
- On the Security of a MAC by Mitchell(Symmetric Key Cryptography)(Cryptography and Information Security)
- TMAC : Two-Key CBC MAC
- A Network Game Based on Fair Random Numbers(Cyberworlds)
- A Scheme for Partial Disclosure of Transaction Log(Application)(Cryptography and Information Security)
- On the Correctness of Security Proofs for the 3GPP Confidentiality and Integrity Algorithms(Discrete Mathematics and Its Applications)
- How to Design Efficient Multiple-Use 1-out-n Oblivious Transfer (Protocol) (Cryptography and Information Security)
- Hoe to Improve Interpolation Attack(Symmetric Key Cryptography)(Cryptography and Information Security)
- On the Pseudorandomness of KASUMI Type Permutations(Discrete Mathematics and Its Applications)
- Inclusion Relations of Boolean Functions Satisfying PC(l) of Order k(Special Section on Cryptography and Information Security)
- Some new results on nonperfect secret sharing schemes
- A.C. Characteristics of the Electroviscous Effect
- Transient Pressure-Drop Fluctuatins in Electroviscous Effect
- Electroviscous Effect in Liquid Crystals
- The Electroviscous Effect in the MBBA Liquid Crystal
- k-Resilient Identity-Based Encryption in the Standard Model(Public Key Cryptography, Cryptography and Information Security)