Mambo M | Japan Advanced Inst. Sci. And Technol. Ishikawa‐ken Jpn
スポンサーリンク
概要
関連著者
-
Mambo M
Japan Advanced Inst. Sci. And Technol. Ishikawa‐ken Jpn
-
OKAMOTO Eiji
School of Engineering, Hokkaido Tokai University
-
Okamoto E
Institute Of Information Sciences And Electronics University Of Tsukuba
-
Mambo Masahiro
School Of Inform. Sci. Japan Advanced Institute Of Science And Technology
-
Okamoto Eiji
Department Of Computer Science And Engineering Nagoya Institute Of Technology
-
静谷 啓樹
東北大大学院情報科学研究科
-
Mambo Masahiro
School Of Information Science Japan Advanced Institute Of Science And Technology
-
Mambo Masahiro
Information Synergy Center And Graduate School Of Information Sciences Tohoku University
-
Shizuya Hiroki
Information Synergy Center And Graduate School Of Information Sciences Tohoku University
-
Uyematsu T
The Dept. Of Communications And Integrated Systems Tokyo Institute Of Technology
-
Uyematsu T
The Author Is With The Department Of Electrical And Electronic Engineering Tokyo Institute Of Techno
-
UYEMATSU Tomohiko
School of Information Science, Japan Advanced Institute of Science and Technology Ishikawa
-
Usuda Keisuke
School Of Inform. Sci. Japan Advanced Institute Of Science And Technology:ntt
-
Usuda Kazuto
Faculty Of Science And Technology Keio University:(present Address)ntt Communications Corporation
-
KONOMA Chisato
Graduate School of Information Sciences, Tohoku University
-
KIM Seungjoo
The author is with the Korea Information Security Agency
-
Won Dongho
The Author Is With The Department Of Information Engineering Sungkyunkwan University
-
Konoma Chisato
Graduate School Of Information Sciences Tohoku University:(present Address)ntt Software Corporation
-
Mambo Masahiro
Education Center For Information Processing And Graduate School Of Information Sciences Tohoku Unive
-
Shizuya Hiroki
The Author Is With Education Center For Information Processing Tohoku University
-
USUDA Keisuke
School of Inform. Sci., Japan Advanced Institute of Science and Technology
-
OKAMOTO Eiji
the School of Information Science, Japan Advanced Institute of Science and Technology
-
Tada Mitsuru
The Authors Are With The School Of Information Science Japan Advanced Institute Of Science And Techn
-
Mambo Masahiro
The Authors Are With The Department Of Computer And Mathematical Sciences The Graduate School Of Inf
-
Mambo Masahiro
The School Of Information Science Japan Advanced Institute Of Science And Technology
-
Shizuya Hiroki
Education Center For Information Processing And Graduate School Of Information Sciences Tohoku Unive
-
Okamoto T
Univ. Tsukuba Tsukuba‐shi Jpn
-
USUDA Keisuke
the School of Information Science, Japan Advanced Institute of Science andTechnology
-
OKAMOTO Takeshi
The authors are with the School of Information Science, Japan Advanced Institute of Science and Tech
-
WON Dongho
The author is with the Department of Information Engineering, Sungkyunkwan University
-
Kim Seungjoo
Korea Information Security Agency
-
Won Dongho
Dept.of Information Eng., Sungkyunkwan University
-
Okamoto Eiji
The School Of Information Science Japan Advanced Institute Of Science And Technology
-
Okamoto Takeshi
The Authors Are With The Department Of Knowledge-based Information Engineering Toyohashi University
著作論文
- Proposal of an Automatic Signature Scheme Using a Compiler (Special Section on Cryptography and Information Security)
- Permutation Cipher Scheme Using Polynomials over a Field
- Proxy Signatures: Delegation of the Power to Sign Messages (Special Section on Information Theory and Its Applications)
- The Computational Difficulty of Solving Cryptographic Primitive Problems Related to the Discrete Logarithm Problem(Public Key Cryptography)(Cryptography and Information Security)
- Complexity Analysis of the Cryptographic Primitive Problems through Square-Root Exponent(Discrete Mathematics and Its Applications)
- On the Security of the Okamoto-Tanaka ID-Based Key Exchange Scheme against Active Attacks : Special Section on Cryptography and Information Security
- On the Security of the Okamoto-Tanaka ID-Based Key Exchange Scheme against Active Attacks
- Proxy Cryptosystems: Delegation of the Power to Decrypt Ciphertexts (Special Section on Cryptography and Information Security)