スポンサーリンク
Research Center For Information Security (rcis) National Institute Of Advanced Industrial Science An | 論文
- Information Theoretical Secure Oblivious Polynomial Evaluation : Model, Bounds and Constructions
- Unconditionally Secure Chaffing-and-Winnowing
- Smallest Size of Circulant Matrix for Regular (3, L) and (4, L) Quasi-Cyclic LDPC Codes with Girth 6
- An RSA-Based Leakage-Resilient Authenticated Key Exchange Protocol Secure against Replacement Attacks, and Its Extensions
- Anonymous Password-Authenticated Key Exchange : New Construction and Its Extensions
- A Secure Construction for Threshold Anonymous Password-Authenticated Key Exchange
- A New Security Architecture for Personal Networks and Its Performance Evaluation
- RSA-Based Password-Authenticated Key Exchange, Revisited
- A Secure Authenticated Key Exchange Protocol for Credential Services
- An Efficient and Leakage-Resilient RSA-Based Authenticated Key Exchange Protocol with Tight Security Reduction(Information Security)
- An Efficient 2-Secure and Short Random Fingerprint Code and Its Security Evaluation
- Enhanced Cancelable Biometrics for Online Signature Verification
- An Algorithm for Cryptanalysis of Certain Keystream Generators Suitable for High-Speed Software and Hardware Implementations : Special Section on Cryptography and Information Security
- A Novel Fast Correlation Attack Suitable for Simple Hardare Implementation
- Security Tightness Evaluation of Fujisaki-Okamoto Conversion in Identity Based Encryption
- Towards Security Enhancement with Efficient Reduction for Identity Based Encryption
- Discussions on Unconditionally Secure VSS Robust against Dishonest Majority
- Discussions on Unconditionally Secure VSS Robust against Dishonest Majority
- An Unconditionally Secure Electronic Cash Scheme with Computational Untraceability(Special Section on Cryptography and Information Security)
- A Digital Signature Scheme on ID-Based Key-Sharing Infrastructures : Special Section on Cryptography and Information Security