Information Theoretical Secure Oblivious Polynomial Evaluation : Model, Bounds and Constructions
スポンサーリンク
概要
- 論文の詳細を見る
- 2003-12-15
著者
-
Nascimento A
Univ. Tokyo Tokyo Jpn
-
NASCIMENTO Anderson
Imai Laboratory, Information and Systems, Institute of Industrial Science, University of Tokyo
-
OTSUKA Akira
IPA Information-technology
-
MUELER-QUADE Joern
Universitaet Karlsruhe Institut fuer Algorithmen und Kognitive Systeme
-
HANAOKA Goichiro
Imai Laboratory, Information and Systems, Institute of Industrial Science, University of Tokyo
-
IMAI Hideki
Imai Laboratory, Information and Systems, Institute of Industrial Science, University of Tokyo
-
Otsuka Akira
Department Of Physical Therapy Faculty Of Health Sciences Prefectural University Of Hiroshima
-
Otsuka A
Ipa Tokyo Jpn
-
IMAI Hideki
University of Tokyo
-
Hanaoka Goichiro
3rd Department Institute Of Industrial Science The University Of Tokyo
-
Nascimento Anderson
Imai Laboratory Information And Systems Institute Of Industrial Science University Of Tokyo
-
Imai H
Research Center For Information Security (rcis) National Institute Of Advanced Industrial Science An
-
Imai Hideki
3rd Department Institute Of Industrial Science The University Of Tokyo
-
Hanaoka G
National Institute Of Advanced Industrial Science And Technology
-
Otsuka A
Department Of Physical Therapy Faculty Of Health Sciences Prefectural University Of Hiroshima
-
Muller-quade Jorn
Universitat Karlsruhe Institut Fur Algorithmen Und Kognitive Systeme
関連論文
- 新しい義手の考え方の1例 : 能動装飾義手ハンドの開発
- 5指駆動型筋電義手と筋シナジーモデルに基づく制御法
- 関節拘縮発生予防を目的とした超音波療法の効果 : ラット足関節ギプス固定モデルを用いたトレッドミル走行での検討
- 578 足趾接地状態の不良と身体機能の関連性について(第一報)(骨・関節系理学療法,一般演題(ポスター発表演題),第43回日本理学療法学術大会)
- くぐり動作における身体接触の実証的研究 : 発達障害児は物にぶつかることが多い
- 1154 幼児のくぐり動作における身体接触の実証的研究 : 軽度発達障害児はぶつかることが多い(神経系理学療法,一般演題(ポスター発表演題),第43回日本理学療法学術大会)
- ターニケットによる駆血時間の違いがラットヒラメ筋の筋萎縮に与える影響
- ターニケットによる駆血が廃用性筋萎縮に与える影響 : ラットによる実験的研究
- 体内力源前腕能動装飾義肢の開発 (第30回バイオメカニズム学術講演会 SOBIM2009 予稿集)
- 廃用性筋萎縮に対する予防的運動療法の影響 : ラット実験モデルを用いて
- 1-P1-19 より装飾性と機能性を目指した前腕体内力源能動義手の開発(切断,ポスター,一般演題,リハビリテーション医学の進歩"評価から治療介入へ",第45回日本リハビリテーション医学会学術集会)
- 1623 つま先が上がる靴下が拇趾床間距離に与える影響について(生活環境支援系理学療法,一般演題(ポスター発表演題),第43回日本理学療法学術大会)
- 1490 ターニケットによる駆血が廃用性筋萎縮に与える影響 : ラットによる実験的研究(理学療法基礎系,一般演題(ポスター発表演題),第43回日本理学療法学術大会)
- 651 関節拘縮を予防するために必要な関節可動域運動の検討 : ラットにおける実験的研究(物理療法,一般演題(ポスター発表演題),第43回日本理学療法学術大会)
- 443 砂浜裸足歩行の動作筋電図評価(理学療法基礎系,一般演題(ポスター発表演題),第43回日本理学療法学術大会)
- 305 福祉用具の研究開発に理学療法士が関わる意義(生活環境支援系理学療法,一般演題(ポスター発表演題),第43回日本理学療法学術大会)
- 乳幼児の四肢自発運動の経時的変化 : 上肢と下肢の比較および左右差に着目して
- 広島県東部3市における乳幼児健康診査後の支援体制と連携について
- 学術大会長挨拶(ヒューマン・マシン・システムを考える,広島保健福祉学会第8回学術大会)
- ビデオ解析による脳性麻痺児の自発運動の変化について
- 偏KL情報量に基づく変数選択法と生体電極選定への応用
- 関節固定後に最大可動域運動で生じる抵抗力とその要因の検討 : ラット足関節を用いた実験的研究
- Information Theoretical Secure Oblivious Polynomial Evaluation : Model, Bounds and Constructions
- The Effect of ROM Exercise on Rats with Denervation and Joint Contracture
- Extension of Broadcasting Service by Using Electronic Tokens(Contents Technology and Web Information Systems)
- Traitor Tracing Scheme Secure against Adaptive Key Exposure and its Application to Anywhere TV Service(Discrete Mathematics and Its Applications)
- Effect of a 30-Minute Twice Daily Prolonged Stretch for the Prevention of Joint Contractures in Rats
- Preliminary Report : Another Perspective on the Effect of Prolonged Stretching for Joint Contractures
- The Influence of Spinal Cord Injury and Peripheral Nerve Injury on Muscle Elasticity in Contractures of the Soleus Muscle of Rats
- The Boundary of the Vastus Medialis Oblique and the Vastus Medialis Longus
- Digitally Signed Document Sanitizing Scheme with Disclosure Condition Control(Application)(Cryptography and Information Security)
- Unconditionally Secure Chaffing-and-Winnowing
- 静止立位時の足趾接地状態が歩行に与える影響
- The MAC-based Construction of Strong Multiple Encryption
- ID-based Encryption for Directed Acyclic Graph Hierarchies : Unification of Key-evolving Encryption Primitives (Extended Abstract)
- Towards Removing Random Oracles from OAEP
- How to Protect Peer-to-Peer Online Games from Cheats
- An Algorithm for Cryptanalysis of Certain Keystream Generators Suitable for High-Speed Software and Hardware Implementations : Special Section on Cryptography and Information Security
- A Novel Fast Correlation Attack Suitable for Simple Hardare Implementation
- Multilevel Coded 16-QAM Modulation with Multistage Decoding and Unequal Error Protection
- A Family of Fast Dedicated One-Way Hash Functions Based on Linear Cellular Automata over GF(q) (Special Section on Cryptography and Information Security)
- A Family of Fast Keystream Generators Based on Programmable Linear Cellular Automata over GF(q) and Time-Variant Table (Special Section on Cryptography and Information Security)
- CCA-Secure Public Key Encryption without Group-Dependent Hash Functions
- Formal Security Treatments for IBE-to-Signature Transformation : Relations among Security Notions
- A Strongly Unforgeable Signature under the CDH Assumption without Collision Resistant Hash Functions
- Key-Insulated Public Key Encryption with Auxiliary Helper Key : Model, Constructions and Formal Security Proofs(Information Theory and Its Applications)
- Efficient Identity-Based Encryption with Tight Security Reduction(Information Theory and Its Applications)
- A New Key-Insulated Public Key Encryption Scheme with Auxiliary Helper Key
- Security Tightness Evaluation of Fujisaki-Okamoto Conversion in Identity Based Encryption
- Relations among Notions of Security for Identity Based Encryption Schemes (特集:ユビキタス社会を支えるコンピュータセキュリティ技術)
- Towards Security Enhancement with Efficient Reduction for Identity Based Encryption
- CCA-secure IBE Scheme with Tight Security Reduction based on the Gap BDH Assumption
- A Remark on GEM
- An Implementation of KPS with Distributed Trust
- Performance of SUD and MUD Interference Cancellation Receivers in Single-Cell and Multi-Cell CDMA Systems(Wireless Communication Technology)
- Sliced Onion Routing Scheme and its Aptitude for Sender-Identifiable Environments
- Optimally Mastering Keys in Various Broadcast Encryption Schemes
- Personal Entropy from Graphical Passwords : Methods for Quantification and Practical Key Generation(Cryptography and Information Security)(Information Theory and Its Applications)
- Managing Encryption and Key Publication Independently in Digital Rights Management Systems (Applications) (Cryptography and Information Security)
- On Evaluating the Entropy of Graphical Passwords
- Discussions on Unconditionally Secure VSS Robust against Dishonest Majority
- Discussions on Unconditionally Secure VSS Robust against Dishonest Majority
- An Unconditionally Secure Electronic Cash Scheme with Computational Untraceability(Special Section on Cryptography and Information Security)
- A Digital Signature Scheme on ID-Based Key-Sharing Infrastructures : Special Section on Cryptography and Information Security
- Unconditionally Secure Authenticated Encryption(Discrete Mathematics and Its Applications)
- Efficient Unconditionally Secure Digital Signatures (Asymmetric Cipher) (Cryptography and Information Security)
- Efficient Unconditionally Secure Digital Signatures
- A Traitor Traceable Conference System with Dynamic Sender(Special Section on Cryptography and Information Security)
- Efficient Unconditionally Secure Digital Signatures and a Security Analysis of a Multireceiver Authentication Code
- Improving the Secure Electronic Transaction Protocol by Using Signcryption
- Optimal Unconditionally Secure ID-Based Key Distribution Scheme for Large-Scaled Networks : Special Section on Cryptography and Information Security
- An Optimization of Credit-Based Payment for Electronic Toll Collection Systems
- The Kinesiological Effect of Japanese Geta Clogs on Gait : A Pilot Study
- Deforestation and Degradation of Natural Resources in Ethiopia : Forest Management Implications from a Case Study in the Belete-Gera Forest
- The Therapeutic Effects of Independent Eating for the Severely Physically Disabled
- An Efficient Anonymous Authentication Scheme with No Unlinkability
- 関節拘縮に対する中間位固定の影響 : ラット足関節を用いた実験的研究
- The Role of Arbiters for Unconditionally Secure Authentication(Discrete Mathematics and Its Applications)
- New Short Signature Scheme without Random Oracles
- 一日30分の持続伸張がラット足関節拘縮の発生予防に与える影響
- AT-2-2 A Survey on Recent Advances in Broadcast Encryption
- 人間工学的機能的把持装具の開発・研究
- 可操作性による歩行分析
- 一日12時間の関節固定がラット足関節拘縮発生に与える影響
- 駆血と固定が筋萎縮に与える影響 : ラットを用いた実験的研究
- 虚血再灌流後に起こる骨格筋の変化 : ラットによる実験的研究
- 駆血再灌流後の運動負荷が骨格筋に与える影響 : ラットを用いた実験的研究
- 座位保持時間が高齢者の起立-歩行動作に与える影響
- Universally Composable and Statistically Secure Verifiable Secret Sharing Scheme Based on Pre-Distributed Data
- Adaptive Array Antenna Based on Spatial Spectral Estimation Using Maximum Entropy Method (Special Issue on Adaptive Signal Processing in Mobile Radio Communications)
- Preventive Effects of Antioxidants on Muscle Atrophy Induced by Ischemic Reperfusion
- 成人脳性麻痺者の椅子からの立ち上がり動作の研究
- Effects of Differences in Touch Height and Touch Load on Postural Control During Static Standing
- Oblivious Transfer Based on the McEliece Assumptions
- Effect of Differences in Room Brightness on Postural Control during Light Touch Contact
- VRを利用した筋電義手操作トレーニングシステムの開発と仮想 Box and Block Test の実現
- Do Positions Affect Perceptual Judgment during Reaching?
- 中枢神経障害にともなう関節拘縮を考える : 関節固定にともなう関節拘縮との比較を通して
- 関節固定後早期における前十字靱帯破断強度の検討
- 2B2-4 把持力増大機構を有する5指駆動型筋電義手(OS10:生体モデリングとロボットシステム)