2008 |
8 | EE | Jun Kurihara,
Shinsaku Kiyomoto,
Kazuhide Fukushima,
Toshiaki Tanaka:
A New (k, n)-Threshold Secret Sharing Scheme and Its Extension.
ISC 2008: 455-470 |
7 | EE | Kazuhide Fukushima,
Shinsaku Kiyomoto,
Toshiaki Tanaka,
Kouichi Sakurai:
Ternary Subset Difference Method and Its Quantitative Analysis.
WISA 2008: 225-239 |
6 | EE | Jun Kurihara,
Shinsaku Kiyomoto,
Kazuhide Fukushima,
Toshiaki Tanaka:
A Fast (3, n)-Threshold Secret Sharing Scheme Using Exclusive-OR Operations.
IEICE Transactions 91-A(1): 127-138 (2008) |
5 | EE | Kazuhide Fukushima,
Shinsaku Kiyomoto,
Toshiaki Tanaka,
Kouichi Sakurai:
Analysis of Program Obfuscation Schemes with Variable Encoding Technique.
IEICE Transactions 91-A(1): 316-329 (2008) |
4 | EE | Jun Kurihara,
Shinsaku Kiyomoto,
Kazuhide Fukushima,
Toshiaki Tanaka:
On a Fast (k, n)-Threshold Secret Sharing Scheme.
IEICE Transactions 91-A(9): 2365-2378 (2008) |
2007 |
3 | EE | Shinsaku Kiyomoto,
Kazuhide Fukushima,
Toshiaki Tanaka,
Kouichi Sakurai:
On Effectiveness of Clock Control in Stream Ciphers.
IEICE Transactions 90-A(9): 1780-1787 (2007) |
2006 |
2 | EE | Kazuhide Fukushima,
Shinsaku Kiyomoto,
Toshiaki Tanaka:
Evaluation of Dual-Structure Key-management Scheme Suitable for Mobile Services.
MDM 2006: 17 |
2003 |
1 | EE | Kazuhide Fukushima,
Kouichi Sakurai:
A Software Fingerprinting Scheme for Java Using Classfiles Obfuscation.
WISA 2003: 303-316 |