| 2008 |
| 8 | EE | Jun Kurihara,
Shinsaku Kiyomoto,
Kazuhide Fukushima,
Toshiaki Tanaka:
A New (k, n)-Threshold Secret Sharing Scheme and Its Extension.
ISC 2008: 455-470 |
| 7 | EE | Kazuhide Fukushima,
Shinsaku Kiyomoto,
Toshiaki Tanaka,
Kouichi Sakurai:
Ternary Subset Difference Method and Its Quantitative Analysis.
WISA 2008: 225-239 |
| 6 | EE | Jun Kurihara,
Shinsaku Kiyomoto,
Kazuhide Fukushima,
Toshiaki Tanaka:
A Fast (3, n)-Threshold Secret Sharing Scheme Using Exclusive-OR Operations.
IEICE Transactions 91-A(1): 127-138 (2008) |
| 5 | EE | Kazuhide Fukushima,
Shinsaku Kiyomoto,
Toshiaki Tanaka,
Kouichi Sakurai:
Analysis of Program Obfuscation Schemes with Variable Encoding Technique.
IEICE Transactions 91-A(1): 316-329 (2008) |
| 4 | EE | Jun Kurihara,
Shinsaku Kiyomoto,
Kazuhide Fukushima,
Toshiaki Tanaka:
On a Fast (k, n)-Threshold Secret Sharing Scheme.
IEICE Transactions 91-A(9): 2365-2378 (2008) |
| 2007 |
| 3 | EE | Shinsaku Kiyomoto,
Kazuhide Fukushima,
Toshiaki Tanaka,
Kouichi Sakurai:
On Effectiveness of Clock Control in Stream Ciphers.
IEICE Transactions 90-A(9): 1780-1787 (2007) |
| 2006 |
| 2 | EE | Kazuhide Fukushima,
Shinsaku Kiyomoto,
Toshiaki Tanaka:
Evaluation of Dual-Structure Key-management Scheme Suitable for Mobile Services.
MDM 2006: 17 |
| 2003 |
| 1 | EE | Kazuhide Fukushima,
Kouichi Sakurai:
A Software Fingerprinting Scheme for Java Using Classfiles Obfuscation.
WISA 2003: 303-316 |