Otsuka Akira | National Inst. Advanced Industrial Sci. And Technol. Tokyo Jpn
スポンサーリンク
概要
関連著者
-
Otsuka Akira
National Inst. Advanced Industrial Sci. And Technol. Tokyo Jpn
-
Imai Hideki
National Astronomical Observatory
-
INUMA Manabu
National Institute of Advanced Industrial Science and Technology (AIST)
-
Nascimento A
Univ. Tokyo Tokyo Jpn
-
MUELER-QUADE Joern
Universitaet Karlsruhe Institut fuer Algorithmen und Kognitive Systeme
-
Imai Hideki
Faculty Of Science And Engineering Chuo University:research Center For Information Security (rcis) N
-
Otsuka A
Ipa Tokyo Jpn
-
DOWSLEY Rafael
Department of Electrical Engineering, University of Brasilia
-
MÜLLER-QUADE Jörn
Universität Karlsruhe, Institut für Algorithmen und Kognitive Systeme
-
OTSUKA Akira
National Institute of Advanced Industrial Science and Technology (AIST)
-
Hanaoka Goichiro
Institute Of Industrial Science The University Of Tokyo
-
Hanaoka Goichiro
3rd Department Institute Of Industrial Science The University Of Tokyo
-
Nascimento Anderson
Department Of Electrical Engineering University Of Brasilia
-
Imai Hideki
3rd Department Institute Of Industrial Science The University Of Tokyo
-
Imai Hideki
National Inst. Of Advanced Industrial Sci. & Technol. (aist) Tokyo Jpn
-
Hanaoka G
National Institute Of Advanced Industrial Science And Technology
-
Hanaoka Goichiro
National Inst. Of Advanced Industrial Sci. And Technol. Tokyo Jpn
-
Dowsley Rafael
Department Of Electrical Engineering University Of Brasilia
-
Imai Hideki
National Inst. Advanced Industrial Sci. And Technol. Tokyo Jpn
-
Imai Hideki
Faculty Of Engineering Yokohama National University
-
Muller-quade Jorn
Universitat Karlsruhe Institut Fur Algorithmen Und Kognitive Systeme
-
IMAI Hideki
Faculty of Science and Engineering, Chuo University
著作論文
- Universally Composable and Statistically Secure Verifiable Secret Sharing Scheme Based on Pre-Distributed Data
- A Theoretical Framework for Constructing Matching Algorithms Secure against Wolf Attack
- A Theoretical Framework for Constructing Matching Algorithms Secure against Wolf Attack