Ogata Wakaha | Faculty Of Engineering Tokyo Institute Of Technology
スポンサーリンク
概要
関連著者
-
Ogata Wakaha
Department Of Computer Engineering Faculty Of Engineering Himeji Institute Of Technology
-
Ogata Wakaha
Faculty Of Engineering Tokyo Institute Of Technology
-
Ogata Wakaha
Faculty Of Engineering Himeji Institute Of Technology
-
Ogata Wakaha
Himeji Institute Of Technology
-
Ogata Wakaha
Tokyo Inst. Of Technol. Tokyo Jpn
-
OGATA Wakaha
Tokyo Institute of Technology
-
PHONG Le
Tokyo Institute of Technology
-
KUROSAWA Kaoru
Faculty of Engineering, Tokyo Institute of Technology
-
Phong Le
Tokyo Inst. Of Technol. Tokyo Jpn
-
TERANISHI Isamu
NEC Corporation
-
ARAKI Toshinori
Tokyo Institute of Technology
-
SASAHARA Ryota
Tokyo Institute of Technology
-
Kurosawa Kaoru
Faculty Of Engineering Tokyo Institute Of Technology
-
Araki Toshinori
Tokyo Inst. Of Technol.
-
Teranishi Isamu
Nec Corp.
-
ITOH Kouichi
FUJITSU LABORATORIES Ltd.
-
YAMAMOTO Dai
FUJITSU LABORATORIES Ltd.
-
YAJIMA Jun
FUJITSU LABORATORIES Ltd.
-
黒沢 馨
The Authors Are With The Department Of Communication And Integrated Systems Tokyo Institute Of Techn
-
黒沢 馨
Tokyo Institute Of Technology
-
KUROSAWA Kaoru
Department of Computer and Information Sciences, Ibaraki University
-
OKADA Koji
Faculty of Engineering, Tokyo Institute of Technology
-
OGATA Wakaha
Faculty of Engineering, Himeji Institute of Technology
-
SAKANO Keiichi
Matsushita Electric Industrial Co., LTD
-
Matsuo S
Ntt Data Corp. Tokyo Jpn
-
OBA Tatsumi
Tokyo Institute of Technology
-
Matsumoto Naoya
Tokyo Institute Of Technology:(present Office)ntt Communications
-
Shimoyama Takeshi
Secure Computing Lab. Fujitsu Laboratories Ltd.
-
Itoh Kouichi
Secure Computing Lab. Fujitsu Laboratories Ltd.
-
Okada K
Faculty Of Engineering Tokyo Institute Of Technology
-
Izu Tetsuya
Secure Computing Lab. Fujitsu Laboratories Ltd.
-
Kurosawa Kaoru
Department Of Computer And Information Sciences Ibaraki University
-
Sakano Keiichi
Matsushita Electric Industrial Co. Ltd
-
KUROSAWA Kaoru
Tokyo Institute of Technology
-
TAKENAKA Masahiko
Secure Computing Lab., FUJITSU LABORATORIES Ltd.
-
Takenaka Masahiko
Secure Computing Lab. Fujitsu Laboratories Ltd.
-
Matsuo Shin'ichiro
Ntt Data Corporation
-
OYAMA Takuro
Tokyo Institute of Technology
-
ISHIDA Natsuki
Tokyo Institute of Technology
-
Matsuo Shin'ichiro
Tokyo Institute Of Technology
-
Katayama Yutaka
Mitsubishi Electric Corporation
-
Okada Koji
Faculty Of Engineering Nagoya Unibersity
-
Ogata Wakaha
The Author Is With Tokyo Institute Of Technology
-
Teranishi Isamu
Nec Kawasaki‐shi Jpn
-
Kurosawa Kaoru
Department Of Electrical And Electronic Engineering Faculty Of Engineering Tokyo Institute Of Techno
-
Kurosawa Kaoru
Department Of Behavioral Sciences Faculty Of Letters Chiba University
-
Takenaka M
Secure Computing Lab. Fujitsu Laboratories Ltd.
著作論文
- Analysis on Secret Sharing Schemes with Non-Graphical Access Structures (Special Section on Cryptography and Information Security)
- Electronic Ticket Scheme for ITS(Special Section on Cryptography and Information Security)
- Comments on the Security Proofs of Some Signature Schemes Based on Factorization(Information Security)
- New Identity-Based Blind Signature and Blind Decryption Scheme in the Standard Model
- Collision-Based Power Attack for RSA with Small Public Exponent
- Forgery Attacks on Time-Stamp, Signed PDF and X.509 Certificate
- General Conversion for Obtaining Strongly Existentially Unforgeable Signatures
- On Some Variations of Kurosawa-Desmedt Public-Key Encryption Scheme(Cryptography and Information Security)
- Efficient Divisible Voting Scheme(Application)(Cryptography and Information Security)
- Some new results on nonperfect secret sharing schemes
- Efficient Almost Secure 1-Round Message Transmission Schemes for 3t+1 Channels
- k out of n Oblivious Transfer without Random Oracles (Protocol) (Cryptography and Information Security)
- Relationship between Standard Model Plaintext Awareness and Message Hiding
- Provably Secure On-Line Secret Sharing Scheme
- On Claw Free Families (Special Section on Cryptography and Information Security)
- Matching Oblivious Transfer : How to Exchange Valuable Data(Special Section on Cryptography and Information Security)
- k out of n Oblivious Transfer without Random Oracles
- On the Practical Secret Sharing Scheme : Special Section on Cryptography and Information Security
- Reshufflable and Laziness Tolerant Mental Card Game Protocol (Special Section on Cryptography and Information Security)
- A Simple and Efficient Secret Sharing Scheme Secure against Cheating