スポンサーリンク
Aist Tokyo Jpn | 論文
- Smallest Size of Circulant Matrix for Regular (3, L) and (4, L) Quasi-Cyclic LDPC Codes with Girth 6
- ID-based Encryption for Directed Acyclic Graph Hierarchies : Unification of Key-evolving Encryption Primitives (Extended Abstract)
- Flaws in Robust Optimistic Mix-Nets and Stronger Security Notions(Protocol, Cryptography and Information Security)
- A Strongly Unforgeable Signature under the CDH Assumption without Collision Resistant Hash Functions
- Efficient Identity-Based Encryption with Tight Security Reduction(Information Theory and Its Applications)
- Searchable Public-key Broadcast Encryption
- Relations among Notions of Security for Identity Based Encryption Schemes (特集:ユビキタス社会を支えるコンピュータセキュリティ技術)
- CCA-secure IBE Scheme with Tight Security Reduction based on the Gap BDH Assumption
- Optimally Mastering Keys in Various Broadcast Encryption Schemes
- Practical Broadcast Encryption from Graph-Theoretic Techniques and Subset-Incremental-Chain Structure(Application,Cryptography and Information Security)
- How to Break COT-Based Fingerprinting Schemes and Design New One(Cryptography and Information Security, Information Theory and Its Applications)