IMAI Hideki | Chuo University
スポンサーリンク
概要
関連著者
-
IMAI Hideki
Chuo University
-
Kobara Kazukuni
Information And Systems Institute Of Industrial Science The University Of Tokyo
-
Kobara K
Research Center For Information Security (rcis) National Institute Of Advanced Industrial Science &a
-
Kobara K
Research Center For Information Security (rcis):national Institute Of Advanced Industrial Science An
-
Kobara Kazukuni
National Inst. Advanced Industrial Sci. & Technol. (aist) Tokyo Jpn
-
Kobara Kazukuni
Imai Laboratory Information And Systems Institute Of Industrial Science University Of Tokyo
-
Imai H
Research Center For Information Security (rcis):national Institute Of Advanced Industrial Science An
-
Imai Hideki
Faculty Of Science And Engineering Chuo University:research Center For Information Security (rcis) N
-
Imai H
Univ. Tokyo Tokyo
-
Imai H
National Inst. Of Advanced Industrial Sci. And Technol. Tokyo Jpn
-
Imai H
Chuo University
-
Hanaoka Goichiro
Institute Of Industrial Science The University Of Tokyo
-
Hanaoka Goichiro
3rd Department Institute Of Industrial Science The University Of Tokyo
-
Hanaoka G
National Institute Of Advanced Industrial Science And Technology
-
Kobara K
Univ. Tokyo Tokyo Jpn
-
Shin Seonghan
Research Center For Information Security (rcis):national Institute Of Advanced Industrial Science An
-
IMAI Hideki
Research Center for Information Security (RCIS), National Institute of Advanced Industrial Science a
-
IMAI Hideki
Institute of Industrial Science, The University of Tokyo
-
Hanaoka Goichiro
Research Center For Information Security (rcis) National Institute Of Advanced Industrial Science &a
-
Imai Hideki
Research Center For Information Security (rcis) National Institute Of Advanced Industrial Science &a
-
Imai Hideki
Institute Of Industrial Science The University Of Tokyo
-
Imai Hideki
Institute Of Industrial Science Interfaculty Initiative For Information Studies University Of Tokyo
-
KOBARA Kazukuni
Research Center for Information Security (RCIS), National Institute of Advanced Industrial Science a
-
Kobara Kazukuni
Research Center For Information Security (rcis) National Institute Of Advanced Industrial Science &a
-
Shin Seonghan
Research Center For Information Security (rcis) National Institute Of Advanced Industrial Science An
-
Zhang Rui
National Institute Of Advanced Industrial Science And Technology (aist)
-
Zhang R
Univ. Tokushima School Of Medicine Tokushima Jpn
-
Matsuura Kanta
Univ. Tokyo Tokyo Jpn
-
Zhang R
Yale Univ. Ct Usa
-
SHIN SeongHan
Research Center for Information Security (RCIS), National Institute of Advanced Industrial Science a
-
Kobara Kazukuni
Institute Of Industrial Science The University Of Tokyo
-
CUI Yang
National Institute of Advanced Industrial Science and Technology (AIST)
-
Cui Yang
Research Center For Information Security (rcis) National Institute Of Advanced Industrial Science &a
-
Attrapadung Nuttapong
Aist Tokyo Jpn
-
MATSUURA Kanta
Institute of Industrial and Science, The University of Tokyo
-
CUI Yang
Institute of Industrial and Science (IIS), the University of Tokyo
-
ATTRAPADUNG Nuttapong
AIST
-
Hanaoka Goichiro
National Inst. Of Advanced Industrial Sci. And Technol. Tokyo Jpn
-
Matsuura Kanta
Institute Of Industrial And Science The University Of Tokyo
-
HANAOKA Goichiro
Research Center for Information Security, National Institute of Advanced Industrial Science and Tech
-
HANAOKA Goichiro
National Institute of Advanced Industrial Science and Technology
-
IMAI Hideki
National Institute of Advanced Industrial Science and Technology
-
HANAOKA Goichiro
Institute of Industrial Science, The University of Tokyo
-
ZHANG Rui
Institute of Industrial Science, University of Tokyo
-
Imai Hideki
National Inst. Of Advanced Industrial Sci. & Technol. (aist) Tokyo Jpn
-
Imai Hideki
National Inst. Advanced Industrial Sci. And Technol. Tokyo Jpn
-
Imai Hideki
National Astronomical Observatory
-
Zhang Rui
Institute Of Industrial Science University Of Tokyo
-
IMAI Hideki
Information and Systems, Institute of Industrial Science, The university of Tokyo
-
ATTRAPADUNG Nuttapong
Institute of Industrial Science, The University of Tokyo
-
Furukawa J
Nec Corp. Kawasaki‐shi Jpn
-
Attrapadung Nuttapong
Institute Of Industrial Science The University Of Tokyo
-
Imai Hideki
Information & Systems Institute Of Industrial Science The University Of Tokyo
-
YANG Peng
Institute of Industrial Science, The University of Tokyo
-
SHIN SeongHan
Information and Systems, Institute of Industrial Science, The University of Tokyo
-
FURUKAWA Jun
NEC Corporation
-
KITAGAWA Takashi
Research Center for Information Security, National Institute of Advanced Industrial Science and Tech
-
WATANABE Hajime
Research Center for Information Security, National Institute of Advanced Industrial Science and Tech
-
Yang Peng
Univ. Tokyo Tokyo Jpn
-
Yang Peng
Institute Of Industrial Science The University Of Tokyo
-
Imai Hideki
Chuo Univ. Tokyo Jpn
-
Kitagawa Takashi
Research Center For Information Security (rcis) National Institute Of Advanced Industrial Science An
-
WATANABE Hajime
National Institute of Advanced Industrial Science and Technology
-
Furukawa Jun
Nec Corp.
-
Fossorier Marc
Department Of Electrical Engineering University Of Hawaii
-
IMAI Hideki
University of Tokyo
-
Phan Thi
Department Of Informatics And Electronics Institute Of Industrial Science The University Of Tokyo
-
FATHI Hanane
Research Center for Information Security, AIST
-
TABET Abdelilah
Information and Systems, Institute of Industrial Science, The university of Tokyo
-
CUI Yang
Research Center for Information Security (RCIS), National Institute of Advanced Industrial Science &
-
Mihaljevic Miodrag
Mathematical Institute, Serbian Academy of Science and Arts
-
Cui Yang
Research Center For Information Security (rcis) National Institute Of Advanced Industrial Science &a
-
Zhang Rui
National Inst. Advanced Industrial Sci. And Technol. Tokyo Jpn
-
Fathi Hanane
Research Center For Information Security Aist
-
Mihaljevic Miodrag
Mathematical Institute Of Serbian Academy Of Sciences And Arts:research Center For Information Secur
-
Tabet Abdelilah
Information And Systems Institute Of Industrial Science The University Of Tokyo
-
GOMI Takeshi
University of Tokyo
-
AKAO Masato
Institute of Industrial Science, the University of Tokyo
-
YAMANAKA Shinji
Institute of Industrial Science, the University of Tokyo
-
HAGIWARA Manabu
Research Center for Information Security (RCIS), National Institute of Advanced Industrial Science a
-
Yamanaka Shinji
Institute Of Industrial Science The University Of Tokyo:(present Address)corporate Research & De
-
Akao Masato
Institute Of Industrial Science The University Of Tokyo
-
Hagiwara Manabu
Research Center For Information Security (rcis) National Institute Of Advanced Industrial Science An
-
Imai Hideki
Aist
-
Fossorier Marc
Department of Electrical Engineering, University of Hawaii
-
IMAI Hideki
Imai Laboratory, Information and Systems, Institute of Industrial Science, University of Tokyo
-
Imai Hideki
Aist Tokyo Jpn
-
OGAWA Kazuto
Science & Technical Research Laboratories, Japan Broadcasting Corporation
-
Kobara Kazukuni
Institute Of Industrial Sciences The University Of Tokyo
-
PRASAD Neeli
Center for TeleInFrastruktur (CTIF), Aalborg University
-
FATHI Hanane
National Institute of Advanced Industrial Science and Technology (AIST)
-
SHIN SeongHan
National Institute of Advanced Industrial Science and Technology (AIST)
-
TABET Abdelilah
Imai Lab., Institute of Industrial Science, The university of Tokyo
-
SHIN SeongHan
Imai Lab., Institute of Industrial Science, The university of Tokyo
-
SHIN SeongHan
Institute of Industrial Science, The University of Tokyo
-
Prasad Neeli
Center For Teleinfrastruktur (ctif) Aalborg University
-
Zhang Rui
Research Center For Information Security (rcis) National Institute Of Advanced Industrial Science An
-
Ogawa K
Science & Technology Research Laboratories Japan Broadcasting Corporation
-
Ogawa Kazuto
Science & Technical Research Laboratories Japan Broadcasting Corporation
-
Sugita Makoto
Ntt Network Innovation Laboratories Ntt Corporation
-
Furukawa Jun
Nec Kawasaki‐shi Jpn
-
FUJISAKI Eiichiro
NTT Information Sharing Platform Laboratories, NTT Corporation
-
MATSUDA Takahiro
University of Tokyo
-
HANAOKA Goichiro
AIST
-
MATSUURA Kanta
University of Tokyo
-
MATSUURA Kanta
Department of Informatics and Electronics, Institute of Industrial Science, The University of Tokyo
-
ATTRAPADUNG Nuttapong
University of Tokyo
-
PHAN Thi
The University of Tokyo
-
MATSUURA Kanta
The University of Tokyo
-
GUI YANG
Institute of Industrial Science, The University of Tokyo
-
GOMI Takeshi
Institute of Industrial Science, University of Tokyo
-
FURUKAWA Jun
Institute of Industrial Science, University of Tokyo
-
HANAOKA Goichiro
NEC Corporation
-
TAMURA Jin
University of Tokyo
-
KOBARA Kazukuni
University of Tokyo
-
ATTRAPADUNG Nuttapong
Imai Laboratory, Information and Systems, Institute of Industrial Science, University of Tokyo
-
Gui Yang
Institute Of Industrial Science The University Of Tokyo
-
Tamura Jin
Institute Of Industrial Science The University Of Tokyo
-
ZHANG Rui
University of Tokyo
-
NUIDA Koji
Research Center for Information Security (RCIS), National Institute of Advanced Industrial Science a
-
FUJITSU Satoshi
Science & Technical Research Laboratories, Japan Broadcasting Corporation
-
Fujitsu Satoshi
Science & Technical Research Laboratories Japan Broadcasting Corporation
-
Attrapadung Nuttapong
Imai Laboratory Information And Systems Institute Of Industrial Science University Of Tokyo
-
HANAOKA Yumiko
NTT DoCoMo, Inc.
-
Hanaoka Yumiko
Security Systems Group Network Management Development Department Ntt Docomo
-
Nuida Koji
Research Center For Information Security (rcis) National Institute Of Advanced Industrial Science An
-
Furukawa Jun
Institute Of Industrial Science University Of Tokyo:nec Corporation
-
Fujisaki Eiichiro
Ntt Information Sharing Platform Laboratories Ntt Corporation
-
Imai Hideki
Faculty Of Engineering Yokohama National University
-
Kitagawa Takashi
Research Center For Information Security (rcis) National Institute Of Advanced Industrial Science An
-
KOBARA Kazukuni
Chuo University
-
Fujisaki Eiichiro
Ntt Information Sharing Platform Laboratories Ntt Corp.
-
Hanaoka Goichiro
Institute of Industrial, University of Tokyo
-
Imai Hideki
Institute of Industrial, University of Tokyo
著作論文
- Anonymous Password-Authenticated Key Exchange: New Construction and Its Extensions
- Unconditionally Secure Chaffing-and-Winnowing
- An RSA-Based Leakage-Resilient Authenticated Key Exchange Protocol Secure against Replacement Attacks, and Its Extensions
- Anonymous Password-Authenticated Key Exchange : New Construction and Its Extensions
- A Secure Construction for Threshold Anonymous Password-Authenticated Key Exchange
- A New Security Architecture for Personal Networks and Its Performance Evaluation
- RSA-Based Password-Authenticated Key Exchange, Revisited
- A Secure Authenticated Key Exchange Protocol for Credential Services
- An Efficient and Leakage-Resilient RSA-Based Authenticated Key Exchange Protocol with Tight Security Reduction(Information Security)
- New Security Architecture for Mobile IPv6 Networks
- Notes on Formal Methods Used for Verification of the Security Properties of Protocols Used in Wireless Environment
- A Leakage-Resilient Network Storage System
- Security Analysis of Password-based Protocols via FDR and AVISPA
- A Simple Leakage-Resilient Authenticated Key Establishment Protocol, Its Extensions, and Applications(Information Security)
- An Efficient Leakage-Resilient Authenticated Key Exchange Protocol
- A Secure and Lightweight Authenticated Key Exchange Protocol for Wireless Networks
- Lightweight Privacy-Preserving Authentication Protocols Secure against Active Attack in an Asymmetric Way
- Asymmetric RFID System Secure against Active Attack
- The MAC-based Construction of Strong Multiple Encryption
- Efficient Strong Multiple Encryption from Relaxed Conditions
- ID-based Encryption for Directed Acyclic Graph Hierarchies : Unification of Key-evolving Encryption Primitives (Extended Abstract)
- Shielding Asymmetric Cryptosystems from Decryption Failures
- A Bandwidth-Saving Public Key Encryption Conversion Scheme
- Towards Removing Random Oracles from OAEP
- Best Truncated and Impossible Differentials of Feistel Block Ciphers with S-D (Substitution and Diffusion) or D-S Round Functions(Special Section on Cryptography and Information Security)
- An Efficient 2-Secure and Short Random Fingerprint Code and Its Security Evaluation
- Birthday Paradox Based Security Analysis of Certain Broadcast Encryption Schemes(Information Security)
- A Novel Approach to Algebraic and Fast Correlation Attacks for Cryptanalysis of Certain Keystream Generators
- CCA-Secure Public Key Encryption without Group-Dependent Hash Functions
- Formal Security Treatments for IBE-to-Signature Transformation : Relations among Security Notions
- A Strongly Unforgeable Signature under the CDH Assumption without Collision Resistant Hash Functions
- Key-Insulated Public Key Encryption with Auxiliary Helper Key : Model, Constructions and Formal Security Proofs(Information Theory and Its Applications)
- Efficient Identity-Based Encryption with Tight Security Reduction(Information Theory and Its Applications)
- A New Key-Insulated Public Key Encryption Scheme with Auxiliary Helper Key
- Security Tightness Evaluation of Fujisaki-Okamoto Conversion in Identity Based Encryption
- Searchable Public-key Broadcast Encryption
- Relations among Notions of Security for Identity Based Encryption Schemes (特集:ユビキタス社会を支えるコンピュータセキュリティ技術)
- Towards Security Enhancement with Efficient Reduction for Identity Based Encryption
- CCA-secure IBE Scheme with Tight Security Reduction based on the Gap BDH Assumption
- A Remark on GEM
- Sliced Onion Routing Scheme and its Aptitude for Sender-Identifiable Environments
- Optimally Mastering Keys in Various Broadcast Encryption Schemes
- Personal Entropy from Graphical Passwords : Methods for Quantification and Practical Key Generation(Cryptography and Information Security)(Information Theory and Its Applications)
- On Evaluating the Entropy of Graphical Passwords
- New Short Signature Scheme without Random Oracles
- Security Analysis of Two Augmented Password-Authenticated Key Exchange Protocols
- Threshold Anonymous Password-Authenticated Key Exchange Secure against Insider Attacks