2007 | ||
---|---|---|
2 | EE | Takeru Ishihara, Hiroshi Aono, Sadayuki Hongo, Junji Shikata: Construction of Threshold (Hybrid) Encryption in the Random Oracle Model: How to Construct Secure Threshold Tag-KEM from Weakly Secure Threshold KEM. ACISP 2007: 259-273 |
1 | EE | Nobuyuki Sugio, Hiroshi Aono, Sadayuki Hongo, Toshinobu Kaneko: A Study on Higher Order Differential Attack of KASUMI. IEICE Transactions 90-A(1): 14-21 (2007) |
1 | Sadayuki Hongo | [1] [2] |
2 | Takeru Ishihara | [2] |
3 | Toshinobu Kaneko | [1] |
4 | Junji Shikata | [2] |
5 | Nobuyuki Sugio | [1] |