Iwata Tetsu | Department Of Computational Science And Engineering Nagoya University
スポンサーリンク
概要
- IWATA Tetsuの詳細を見る
- 同名の論文著者
- Department Of Computational Science And Engineering Nagoya Universityの論文著者
関連著者
-
Iwata Tetsu
Department Of Computational Science And Engineering Nagoya University
-
Kurosawa Kaoru
Department Of Behavioral Sciences Faculty Of Letters Chiba University
-
IWATA Tetsu
Department of Computer and Information Sciences, Ibaraki University
-
Kurosawa Kaoru
Department Of Computer And Information Sciences Ibaraki University
-
KUROSAWA Kaoru
Department of Computer and Information Sciences, Ibaraki University
-
黒沢 馨
The Authors Are With The Department Of Communication And Integrated Systems Tokyo Institute Of Techn
-
黒沢 馨
Tokyo Institute Of Technology
-
Yagi Tohru
Department Of Communications And Integrated Systems Tokyo Institute Of Technology
-
Iwata T
Department Of Computer And Information Sciences Ibaraki University
-
Iwata Tetsu
Department Of Computer And Information Sciences Ibaraki University
-
Iwata T
Ibaraki Univ. Hitachi‐shi Jpn
-
Iwata Tetsu
Nagoya University
-
MITSUDA Atsushi
Department of Computational Science and Engineering, Nagoya University
-
NAKAMURA Shungo
Department of Computational Science and Engineering, Nagoya University
-
Mitsuda Atsushi
Department Of Computational Science And Engineering Nagoya University
-
Nakamura Shungo
Department Of Computational Science And Engineering Nagoya University
-
Yagi Takuma
The Authors Are With The Department Of Computer Sciences Kitami Institute Of Technology
-
DUONG Quang
Department of Communications and Integrated Systems, Tokyo Institute of Technology
-
Duong Quang
Department Of Information And Network Systems Natl. Inst. Of Info And Com. Tech.
-
Duong Quang
Department Of Communications And Integrated Systems Tokyo Institute Of Technology
-
Iwata T
Nagoya University
著作論文
- On the Security of a MAC by Mitchell(Symmetric Key Cryptography)(Cryptography and Information Security)
- Tweakable Pseudorandom Permutation from Generalized Feistel Structure
- MPP Characteristics of Variants of Merkle-Damgard Iterated Hash Functions
- TMAC: Two-Key CBC MAC (Symmetric Cipher) (Cryptography and Information Security)
- TMAC : Two-Key CBC MAC
- On the Correctness of Security Proofs for the 3GPP Confidentiality and Integrity Algorithms(Discrete Mathematics and Its Applications)
- Hoe to Improve Interpolation Attack(Symmetric Key Cryptography)(Cryptography and Information Security)
- On the Pseudorandomness of KASUMI Type Permutations(Discrete Mathematics and Its Applications)
- Inclusion Relations of Boolean Functions Satisfying PC(l) of Order k(Special Section on Cryptography and Information Security)
- On the Universal Hash Functions in Luby-Rackott Cipher (Symmetric Cipher) (Cryptography and Information Security)
- On the Universal Hash Functions in Luby-Rackoff Cipher