Ogata Wakaha | Tokyo Inst. Of Technol. Tokyo Jpn
スポンサーリンク
概要
関連著者
-
Ogata Wakaha
Tokyo Inst. Of Technol. Tokyo Jpn
-
OGATA Wakaha
Tokyo Institute of Technology
-
Ogata Wakaha
Department Of Computer Engineering Faculty Of Engineering Himeji Institute Of Technology
-
Ogata Wakaha
Faculty Of Engineering Tokyo Institute Of Technology
-
Ogata Wakaha
Faculty Of Engineering Himeji Institute Of Technology
-
Ogata Wakaha
Himeji Institute Of Technology
-
Phong Le
Tokyo Inst. Of Technol. Tokyo Jpn
-
PHONG Le
Tokyo Institute of Technology
-
Kurosawa Kaoru
Ibaraki Univ. Hitachi‐shi Jpn
-
TERANISHI Isamu
NEC Corporation
-
ARAKI Toshinori
Tokyo Institute of Technology
-
SASAHARA Ryota
Tokyo Institute of Technology
-
Araki Toshinori
Tokyo Inst. Of Technol.
-
Teranishi Isamu
Nec Corp.
-
ITOH Kouichi
FUJITSU LABORATORIES Ltd.
-
YAMAMOTO Dai
FUJITSU LABORATORIES Ltd.
-
YAJIMA Jun
FUJITSU LABORATORIES Ltd.
-
KUROSAWA Kaoru
Ibaraki University
-
Matsuo S
Ntt Data Corp. Tokyo Jpn
-
OBA Tatsumi
Tokyo Institute of Technology
-
Matsumoto Naoya
Tokyo Institute Of Technology:(present Office)ntt Communications
-
Shimoyama Takeshi
Secure Computing Lab. Fujitsu Laboratories Ltd.
-
Itoh Kouichi
Secure Computing Lab. Fujitsu Laboratories Ltd.
-
Izu Tetsuya
Secure Computing Lab. Fujitsu Laboratories Ltd.
-
TAKENAKA Masahiko
Secure Computing Lab., FUJITSU LABORATORIES Ltd.
-
Takenaka Masahiko
Secure Computing Lab. Fujitsu Laboratories Ltd.
-
Matsuo Shin'ichiro
Ntt Data Corporation
-
OYAMA Takuro
Tokyo Institute of Technology
-
ISHIDA Natsuki
Tokyo Institute of Technology
-
Matsuo Shin'ichiro
Tokyo Institute Of Technology
-
YAMAMOTO Dan
Tokyo Institute of Technology
-
Teranishi Isamu
Nec Kawasaki‐shi Jpn
-
Takenaka M
Secure Computing Lab. Fujitsu Laboratories Ltd.
-
Phong Le
National Institute Of Information And Communications Technology (nict)
著作論文
- Electronic Ticket Scheme for ITS(Special Section on Cryptography and Information Security)
- Comments on the Security Proofs of Some Signature Schemes Based on Factorization(Information Security)
- New RSA-Based (Selectively) Convertible Undeniable Signature Schemes
- New Identity-Based Blind Signature and Blind Decryption Scheme in the Standard Model
- Collision-Based Power Attack for RSA with Small Public Exponent
- Forgery Attacks on Time-Stamp, Signed PDF and X.509 Certificate
- General Conversion for Obtaining Strongly Existentially Unforgeable Signatures
- On Some Variations of Kurosawa-Desmedt Public-Key Encryption Scheme(Cryptography and Information Security)
- Efficient Divisible Voting Scheme(Application)(Cryptography and Information Security)
- Efficient Almost Secure 1-Round Message Transmission Schemes for 3t+1 Channels
- k out of n Oblivious Transfer without Random Oracles (Protocol) (Cryptography and Information Security)
- Relationship between Standard Model Plaintext Awareness and Message Hiding
- A General Model of Structured Multisignatures with Message Flexibility(Signatures,Cryptography and Information Security)
- Provably Secure On-Line Secret Sharing Scheme
- Matching Oblivious Transfer : How to Exchange Valuable Data(Special Section on Cryptography and Information Security)
- k out of n Oblivious Transfer without Random Oracles
- A Simple and Efficient Secret Sharing Scheme Secure against Cheating
- Undeniable and Unpretendable Signatures