CUI Yang | National Institute of Advanced Industrial Science and Technology (AIST)
スポンサーリンク
概要
関連著者
-
IMAI Hideki
Chuo University
-
Imai H
National Inst. Of Advanced Industrial Sci. And Technol. Tokyo Jpn
-
Imai Hideki
Faculty Of Science And Engineering Chuo University:research Center For Information Security (rcis) N
-
CUI Yang
National Institute of Advanced Industrial Science and Technology (AIST)
-
Cui Yang
Research Center For Information Security (rcis) National Institute Of Advanced Industrial Science &a
-
Kobara K
Research Center For Information Security (rcis) National Institute Of Advanced Industrial Science &a
-
Kobara K
Research Center For Information Security (rcis):national Institute Of Advanced Industrial Science An
-
Kobara Kazukuni
National Inst. Advanced Industrial Sci. & Technol. (aist) Tokyo Jpn
-
Kobara Kazukuni
Information And Systems Institute Of Industrial Science The University Of Tokyo
-
Kobara Kazukuni
Imai Laboratory Information And Systems Institute Of Industrial Science University Of Tokyo
-
CUI Yang
Institute of Industrial and Science (IIS), the University of Tokyo
-
IMAI Hideki
Institute of Industrial Science, The University of Tokyo
-
Kobara Kazukuni
Institute Of Industrial Science The University Of Tokyo
-
Imai Hideki
Institute Of Industrial Science The University Of Tokyo
-
Imai Hideki
Institute Of Industrial Science Interfaculty Initiative For Information Studies University Of Tokyo
-
IMAI Hideki
Research Center for Information Security (RCIS), National Institute of Advanced Industrial Science a
-
Hanaoka Goichiro
Research Center For Information Security (rcis) National Institute Of Advanced Industrial Science &a
-
Hanaoka Goichiro
Institute Of Industrial Science The University Of Tokyo
-
Hanaoka Goichiro
3rd Department Institute Of Industrial Science The University Of Tokyo
-
Imai Hideki
Research Center For Information Security (rcis) National Institute Of Advanced Industrial Science &a
-
Hanaoka G
National Institute Of Advanced Industrial Science And Technology
-
Hanaoka Goichiro
National Inst. Of Advanced Industrial Sci. And Technol. Tokyo Jpn
-
KOBARA Kazukuni
Research Center for Information Security (RCIS), National Institute of Advanced Industrial Science a
-
HANAOKA Goichiro
National Institute of Advanced Industrial Science and Technology
-
CUI Yang
Research Center for Information Security (RCIS), National Institute of Advanced Industrial Science &
-
MATSUURA Kanta
Institute of Industrial and Science, The University of Tokyo
-
Kobara Kazukuni
Research Center For Information Security (rcis) National Institute Of Advanced Industrial Science &a
-
Cui Yang
Research Center For Information Security (rcis) National Institute Of Advanced Industrial Science &a
-
Matsuura Kanta
Univ. Tokyo Tokyo Jpn
-
Matsuura Kanta
Institute Of Industrial And Science The University Of Tokyo
-
HANAOKA Goichiro
Research Center for Information Security, National Institute of Advanced Industrial Science and Tech
-
IMAI Hideki
National Institute of Advanced Industrial Science and Technology
-
Zhang Rui
National Institute Of Advanced Industrial Science And Technology (aist)
-
Zhang R
Univ. Tokushima School Of Medicine Tokushima Jpn
-
Zhang Rui
National Inst. Advanced Industrial Sci. And Technol. Tokyo Jpn
-
Imai Hideki
National Inst. Of Advanced Industrial Sci. & Technol. (aist) Tokyo Jpn
-
FUJISAKI Eiichiro
NTT Information Sharing Platform Laboratories, NTT Corporation
-
Zhang R
Yale Univ. Ct Usa
-
Imai Hideki
National Inst. Advanced Industrial Sci. And Technol. Tokyo Jpn
-
Fujisaki Eiichiro
Ntt Information Sharing Platform Laboratories Ntt Corporation
-
Imai Hideki
National Astronomical Observatory
-
Fujisaki Eiichiro
Ntt Information Sharing Platform Laboratories Ntt Corp.
著作論文
- Lightweight Privacy-Preserving Authentication Protocols Secure against Active Attack in an Asymmetric Way
- Asymmetric RFID System Secure against Active Attack
- The MAC-based Construction of Strong Multiple Encryption
- Efficient Strong Multiple Encryption from Relaxed Conditions
- Shielding Asymmetric Cryptosystems from Decryption Failures
- A Bandwidth-Saving Public Key Encryption Conversion Scheme
- CCA-Secure Public Key Encryption without Group-Dependent Hash Functions
- Formal Security Treatments for IBE-to-Signature Transformation : Relations among Security Notions