Imai Hideki | 3rd Department Institute Of Industrial Science The University Of Tokyo
スポンサーリンク
概要
関連著者
-
Imai Hideki
3rd Department Institute Of Industrial Science The University Of Tokyo
-
Imai H
Research Center For Information Security (rcis) National Institute Of Advanced Industrial Science An
-
Hanaoka Goichiro
3rd Department Institute Of Industrial Science The University Of Tokyo
-
Hanaoka G
National Institute Of Advanced Industrial Science And Technology
-
Shikata Junji
Graduate School Of Environment And Information Sciences Yokohama National University
-
IMAI Hideki
University of Tokyo
-
Zheng Y
Univ. North Carolina Charlotte Nc Usa
-
Zheng Yuliang
Department Of Software And Information Systems
-
Shikata J
The Graduate School Of Environment And Information Sciences Yokohama National University
-
SHIKATA Junji
Graduate School of Environment and Information Sciences, Yokohama National University
-
Otsuka A
Ipa Tokyo Jpn
-
IMAI Hideki
The author is with Institute of Industrial Sience, the University of Tokyo
-
IMAI Hideki
3rd Department, Institute of Industrial Science, University of Tokyo
-
IMAI Hideki
Institute of Industrial Science, The University of Tokyo
-
ZHENG Yuliang
Department of Software and Information Systems UNC
-
Hanaoka Goichiro
Institute Of Industrial Science The University Of Tokyo
-
Imai Hideki
Institute Of Industrial Science The University Of Tokyo
-
SHIKATA Junji
Dept. of Electrical and computer Engineering, Yokohama National University
-
HANAOKA Goichiro
The authors are with the 3rd Department, Institute of Industrial Science the University of Tokyo
-
ZHENG Yuliang
The author is with the School of Network Computing, Monash University
-
Imai Hideki
Institute Of Industrial Science Interfaculty Initiative For Information Studies University Of Tokyo
-
Nishioka T
Mitsubishi Electric Corp. Kamakura‐shi Jpn
-
Shikata Junji
Dept. Of Electrical And Computer Engineering Yokohama National University
-
Nascimento A
Univ. Tokyo Tokyo Jpn
-
MUELER-QUADE Joern
Universitaet Karlsruhe Institut fuer Algorithmen und Kognitive Systeme
-
Fossorier Marc
ハワイ大学電気工学科
-
Fossorier Marc
University Of Hawaii At Manoa Dept.electrical Engineering Usa.
-
Fossorier M
University Of Hawaii
-
Fossorier Marc
The Author Is With The University Of Hawaii Department Of Electrical Engineering
-
Hanaoka Goichiro
Research Center For Information Security (rcis) National Institute Of Advanced Industrial Science &a
-
Otsuka Akira
Institute Of Industrial Science University Of Tokyo
-
Fossorier Marc
University Of Hawai At Manoa Dept.of Electrical Engineering
-
Mihaljevic M
Sony Computer Sci. Lab. Inc. Tokyo Jpn
-
NISHIOKA Tsuyoshi
The author is with Information Technology R&D Center, Mitsubishi Electric Corporation
-
HANAOKA Goichiro
University of Tokyo
-
HANAOKA Goichiro
the 3rd Department, Institute of Industrial Science, The University of Tokyo
-
IMAI Hideki
the 3rd Department, Institute of Industrial Science, The University of Tokyo
-
Fossorier M
Univ. Hawaii Hi Usa
-
HANAOKA Yumiko
NTT DoCoMo, Inc.
-
HANAOKA Yumiko
Security Systems Group, Network Management Development Department, NTT DoCoMo
-
Hanaoka Yumiko
Security Systems Group Network Management Development Department Ntt Docomo
-
Fossorier M
The Author Is With The University Of Hawaii Department Of Electrical Engineering
-
Muller-quade Jorn
Universitat Karlsruhe Institut Fur Algorithmen Und Kognitive Systeme
-
NISHIOKA Tsuyoshi
The author is with Information Technology R&D Center, Mitsubishi Electric Corporation
-
Imai Hideki
Dept. of Electrical and computer Engineering, Yokohama National University
-
Shikata Junji
Institute of Industrial Science, University of Tokyo
-
MATSUMOTO Tsutomu
Graduate School of Environment and Information Sciences, Yokohama National University
-
NASCIMENTO Anderson
Imai Laboratory, Information and Systems, Institute of Industrial Science, University of Tokyo
-
OTSUKA Akira
IPA Information-technology
-
HANAOKA Goichiro
Imai Laboratory, Information and Systems, Institute of Industrial Science, University of Tokyo
-
IMAI Hideki
Imai Laboratory, Information and Systems, Institute of Industrial Science, University of Tokyo
-
Imai H
Univ. Tokyo Tokyo Jpn
-
Imai Hideki
Faculty Of Science And Engineering Chuo University:research Center For Information Security (rcis) N
-
Otsuka Akira
Department Of Physical Therapy Faculty Of Health Sciences Prefectural University Of Hiroshima
-
Cheng S
Lakehead Univ. Ontario Can
-
DOWSLEY Rafael
Department of Electrical Engineering, University of Brasilia
-
MÜLLER-QUADE Jörn
Universität Karlsruhe, Institut für Algorithmen und Kognitive Systeme
-
IMAI Hideki
the Institute of Industrial Science, The University of Tokyo
-
HANAOKA Goichiro
Institute of Industrial Science, The University of Tokyo
-
TAKESHITA Oscar
3rd Department, Institute of Industrial Science, University of Tokyo
-
NISHIOKA Tsuyoshi
Information Technology R&D Center, Mitsubishi Electric Corporation
-
Nascimento Anderson
Department Of Electrical Engineering University Of Brasilia
-
Nascimento Anderson
Imai Laboratory Information And Systems Institute Of Industrial Science University Of Tokyo
-
MIHALJEVIC Miodrag
The author is with the Mathematical Institute, Serbian Academy of Science and Arts
-
Mihaljevic Miodrag
Mathematical Institute, Serbian Academy of Science and Arts
-
Imai Hideki
National Inst. Of Advanced Industrial Sci. & Technol. (aist) Tokyo Jpn
-
Shikata Junji
The Authors Are With The Institute Of Industrial Science The University Of Tokyo
-
Naito Mitsuru
Japan Forest Civil Engineering Consultants
-
Mihaljevic Miodrag
Mathematical Institute Of Serbian Academy Of Sciences And Arts:research Center For Information Secur
-
Mihaljevic Miodrag
The Advanced Telecommunication Laboratory Sony Computer Science Laboratories Inc.
-
Otsuka Akira
National Inst. Advanced Industrial Sci. And Technol. Tokyo Jpn
-
OTSUKA Akira
the Institute of Industrial Science, The University of Tokyo
-
HANAOKA Goichiro
the Institute of Industrial Science, The University of Tokyo
-
SHIKATA Junji
the Institute of Industrial Science, The University of Tokyo
-
SHIKATA Junji
the 3rd Department, Institute of Industrial Science, The University of Tokyo
-
ZHENG Yuliang
the Department of Software and Information Systems, University of North Carolina
-
SHIKATA Junji
University of Tokyo
-
ZHENG Yuliang
University of North Carolina at Charlotte
-
ZHENG Yuliang
the Peninsula School of Computing and Information Technology Monash University
-
SUZUKI Joe
The authors are with the Graduate School of Science, Osaka University
-
Cheng Sheauchi
Japan Forest Civil Engineering Consultants
-
Hiwatashi Yukio
Japan Forest Civil Engineering Consultants
-
Imai Hideki
Japan Forest Civil Engineering Consultants
-
Numata Tatsuka
Japan Forest Civil Engineering Consultants
-
Otsuka A
Department Of Physical Therapy Faculty Of Health Sciences Prefectural University Of Hiroshima
-
Suzuki Joe
The Authors Are With The Department Of Mathematics Graduate School Of Science Osaka University
-
Suzuki Joe
The Authors Are With The Graduate School Of Science Osaka University
-
Matsumoto Tsutomu
Graduate School Of Engineering Yokohama National University:graduate School Of Environment And Infor
-
Takeshita O
3rd Department Institute Of Industrial Science University Of Tokyo
-
Hanaoka Goichiro
National Inst. Of Advanced Industrial Sci. And Technol. Tokyo Jpn
-
Dowsley Rafael
Department Of Electrical Engineering University Of Brasilia
-
Imai Hideki
National Inst. Advanced Industrial Sci. And Technol. Tokyo Jpn
-
Imai Hideki
The Institute Of Industrial Science The University Of Tokyo
-
Imai Hideki
3rd Department Institute Of Industrial Science University Of Tokyo
-
Imai Hideki
National Astronomical Observatory
-
Nishioka Tsuyoshi
Information Technology R&d Center Mitsubishi Electric Corporation
著作論文
- Information Theoretical Secure Oblivious Polynomial Evaluation : Model, Bounds and Constructions
- On Strictly Geometrically Uniform Codes: Construction and New Codes
- An Algorithm for Cryptanalysis of Certain Keystream Generators Suitable for High-Speed Software and Hardware Implementations : Special Section on Cryptography and Information Security
- A Novel Fast Correlation Attack Suitable for Simple Hardare Implementation
- Discussions on Unconditionally Secure VSS Robust against Dishonest Majority
- Discussions on Unconditionally Secure VSS Robust against Dishonest Majority
- An Unconditionally Secure Electronic Cash Scheme with Computational Untraceability(Special Section on Cryptography and Information Security)
- A Digital Signature Scheme on ID-Based Key-Sharing Infrastructures : Special Section on Cryptography and Information Security
- Unconditionally Secure Authenticated Encryption(Discrete Mathematics and Its Applications)
- Efficient Unconditionally Secure Digital Signatures (Asymmetric Cipher) (Cryptography and Information Security)
- Efficient Unconditionally Secure Digital Signatures
- A Traitor Traceable Conference System with Dynamic Sender(Special Section on Cryptography and Information Security)
- Efficient Unconditionally Secure Digital Signatures and a Security Analysis of a Multireceiver Authentication Code
- Improving the Secure Electronic Transaction Protocol by Using Signcryption
- Optimal Unconditionally Secure ID-Based Key Distribution Scheme for Large-Scaled Networks : Special Section on Cryptography and Information Security
- An Optimization of Credit-Based Payment for Electronic Toll Collection Systems
- Realizing the Menezes-Okamoto-Vanstone (MOV) Reduction Efficiently for Ordinary Elliptic Curves
- Deforestation and Degradation of Natural Resources in Ethiopia : Forest Management Implications from a Case Study in the Belete-Gera Forest
- The Role of Arbiters for Unconditionally Secure Authentication(Discrete Mathematics and Its Applications)
- Information-Theoretically Secure Key Insulated Encryption : Models, Bounds and Constructions(Cryptography and Information Security)(Information Theory and Its Applications)
- Universally Composable and Statistically Secure Verifiable Secret Sharing Scheme Based on Pre-Distributed Data