FUKUSHIMA Kazuhide | KDDI R & D Laboratories Inc.
スポンサーリンク
概要
関連著者
-
FUKUSHIMA Kazuhide
KDDI R & D Laboratories Inc.
-
KIYOMOTO Shinsaku
KDDI R & D Laboratories Inc.
-
TANAKA Toshiaki
KDDI R & D Laboratories Inc.
-
Fukushima Kazuhide
Kddi R&d Laboratories Inc.
-
Fukushima Kazuhide
KDDI R&D Laboratories, Inc.
-
Kiyomoto Shinsaku
Kddi R&d Laboratories Inc.
-
Tanaka Toshiaki
Kddi R&d Laboratories Inc.
-
KIYOMOTO Shinsaku
KDDI R&D Laboratories, Inc.
-
Tanaka Toshiaki
KDDI R&D Laboratories, Inc.
-
Sakurai Kouichi
Kyushu Univ. Fukuoka‐shi Jpn
-
Kurihara Jun
Kddi R&d Laboratories Inc.
-
SAKURAI Kouichi
Dept. of Computer Science and Communication Engineering, Kyushu University
-
Sakurai Kouichi
Kyushu Univ. Fukuoka Jpn
-
Sakurai Kouichi
Information Technology And Security Group Department Of Computer Science And Communication Engineeri
-
Miyake Yutaka
Kddi R & D Labs. Inc.
-
Sakurai Kouichi
Dept. Of Computer Science And Communication Engineering Kyushu University
-
NAKANO Yuto
KDDI R&D Laboratories
-
FUKUSHIMA Kazuhide
KDDI R&D Laboratories
-
田中 俊昭
株式会社 Kddi研究所
-
田中 俊昭
(株)KDDI研究所
-
Sakurai Kouichi
Department Of Computer Science And Communication Engineering Faculty Of Information Science And Elec
-
Sakurai Kouichi
Kyushu University
-
Tanaka T
Kddi R & D Laboratories Inc.
-
Sakurai Kouichi
Department Of Applied Science Faculty Of Engineering 36 Kyushu University
-
Tanaka Toshiaki
Information Security Laboratory Kddi R&d Laboratories Inc.
-
Tanaka Toshiaki
Kddi Rd Laboratories Inc.
-
MIYAKE Yutaka
KDDI R&D Laboratories, Inc.
-
NAKANO Yuto
KDDI R&D Laboratories
-
ISHIGURO Tsukasa
KDDI R&D Laboratories
-
TANAKA Toshiaki
KDDI R&D Laboratories
-
ISHIGURO Tsukasa
KDDI R&D Laboratories
-
HOMMA Naofumi
GSIS, Tohoku University
-
AOKI Takafumi
GSIS, Tohoku University
-
HIBIKI Takafumi
GSIS, Tohoku University
著作論文
- Analysis of Program Obfuscation Schemes with Variable Encoding Technique
- On Effectiveness of Clock Control in Stream Ciphers(Information Theory and Its Applications)
- A Fast (k, L, n)-Threshold Ramp Secret Sharing Scheme
- Design of Anonymous Attribute Authentication Mechanism
- A-7-3 Revocation and Addition Mechanisms for Fast (k, n)-Threshold Schemes
- On a Fast (K, n)-Threshold Secret Sharing Scheme
- Analysis of Program Obfuscation Schemes with Variable Encoding Technique
- A Fast (3, n)-Threshold Secret Sharing Scheme Using Exclusive-OR Operations
- Design of τ-Gradual Key-Management Schemes for Mobile Content Distribution (特集:ユビキタス時代を支えるモバイル通信と高度交通システム)
- An Obfuscation Scheme Using Affine Transformation and Its Implementation (特集:ユビキタス社会を支えるコンピュータセキュリティ技術)
- Improved Subset Difference Method with Ternary Tree
- Software Protection Combined with Tamper-Proof Device
- Optimization of Group Key Management Structure with a Client Join-Leave Mechanism
- Fast Implementation of KCipher-2 for Software and Hardware
- Chosen-IV Correlation Power Analysis on KCipher-2 Hardware and a Masking-Based Countermeasure
- An Obfuscation Scheme Using Affine Transformation and Its Implementation
- An Obfuscation Scheme Using Affine Transformation and Its Implementation
- Optimization of Group Key Management Structure with a Client Join-Leave Mechanism