OHTA Kazuo | NTT Laboratories
スポンサーリンク
概要
関連著者
-
OHTA Kazuo
NTT Laboratories
-
AOKI Kazumaro
NTT Laboratories
-
AOKI Kazumaro
NTT Communications Corporation
-
Aoki K
Ntt Corp. Yokosuka‐shi Jpn
-
Ohta K
Univ. Electro‐communications Chofu‐shi Jpn
-
Moriai S
Nippon Telegraph And Telephone Corp. Yokosuka‐shi Jpn
-
MORIAI Shiho
NTT Laboratories
-
Okamoto Tatsuaki
Ntt Laboratories
-
Okamoto T
Ntt Corp. Yokosuka‐shi Jpn
-
Kanda M
Nippon Telegraph And Telephone Corporation
-
Matsui Mika
Graduate School Of Science And Engineering Yamaguchi University
-
Ueda H
Ntt Laboratories
-
KANDA Masayuki
NTT Laboratories
-
UEDA Hiroki
NTT Laboratories
-
TAKASHIMA Youichi
NTT Laboratories
-
MATSUMOTO Tsutomu
Yokohama National University
-
MATSUI Mitsuru
Mitsubishi Electric Corporation
-
MORIAI Shiho
Information & Communication Security Project, Telecommunications Advancement Organization of Japan
-
Morita Hikaru
Ntt Laboratories Ntt Corporation
-
Matsui M
Graduate School Of Science And Engineering Yamaguchi University
-
Morita H
Ntt Corp. Yokosuka‐shi Jpn
-
Matsumoto Tsutomu
Yokohama National Univ. Yokohama‐shi Jpn
-
ODAGI Hideki
The Graduate School of Information Systems, University of Electro-Communications
-
Odagi Hideki
The Graduate School Of Information Systems University Of Electro-communications:yamaha Corporation
著作論文
- E2-A New 128-Bit Block Cipher(Special Section on Cryptography and Information Security)
- Strict Evaluation of the Maximum Average of Differential Probability and the Maximum Average of Linear Probability (Special Section on Cryptography and Information Security)
- Linear Cryptanalysis of FEAL (Special Section on Cryptography and Information Security)
- Key-Dependency of Linear Probability of RC5 (Special Section on Cryptography and Information Security)
- The Best Linear Expression Search of FEAL (Special Section on Cryptography and Information Security)
- One-Time Zero-Knowledge Authentications and Their Applications to Untraceable Electronic Cash (Special Section on Cryptography and Information Security)
- Collision Search of a Hash Function by Using Random Mapping (Special Section on Cryptography and Information Security)
- Multi-Signature Schemes Secure against Active Insider Attacks (Special Section on Cryptography and Information Security)
- Security of the Extended Fiat-Shamir Schemes (Special Section on Cryptography and Information Security)