Shoichi Hirose

List of publications from the DBLP Bibliography Server - FAQ
Coauthor Index - Ask others: ACM DL/Guide - CiteSeer - CSB - Google - MSN - Yahoo
Home Page

18EEHidenori Kuwakado, Shoichi Hirose: Pseudorandom-Function Property of the Step-Reduced Compression Functions of SHA-256 and SHA-512. WISA 2008: 174-189
17EEShoichi Hirose: Security Analysis of DRBG Using HMAC in NIST SP 800-90. WISA 2008: 278-291
16EEShoichi Hirose: Collision Resistance of Double-Block-Length Hash Function against Free-Start Attack. IEICE Transactions 91-A(1): 74-82 (2008)
15EEShoichi Hirose, Je Hong Park, Aaram Yun: A Simple Variant of the Merkle-Damgård Scheme with a Permutation. ASIACRYPT 2007: 113-129
14EEShoichi Hirose: Some Plausible Constructions of Double-Block-Length Hash Functions. FSE 2006: 210-225
13EEShoichi Hirose: A Security Analysis of Double-Block-Length Hash Functions with the Rate 1. IEICE Transactions 89-A(10): 2575-2582 (2006)
12EEShoichi Hirose: Weak Security Notions of Cryptographic Unkeyed Hash Functions and Their Amplifiability. IEICE Transactions 88-A(1): 33-38 (2005)
11EEMitsuhiro Hattori, Shoichi Hirose, Susumu Yoshida: Complexity of Differential Attacks on SHA-0 with Various Message Schedules. IEICE Transactions 88-A(12): 3668-3671 (2005)
10EEKazuto Yano, Shoichi Hirose, Susumu Yoshida: Cancellation Moderating Factor Control for DS-CDMA Non-linear Interference Canceller with Antenna Diversity Reception. IEICE Transactions 88-A(7): 1921-1930 (2005)
9EEShoichi Hirose: Provably Secure Double-Block-Length Hash Functions in a Black-Box Model. ICISC 2004: 330-342
8EEShoichi Hirose, Susumu Yoshida: An Approximate Scheme of Oblivious Transfer with Probabilistic Receipt. IEICE Transactions 87-A(1): 280-281 (2004)
7EEShoichi Hirose: Yet Another Definition of Weak Collision Resistance and Its Analysis. ICISC 2003: 87-96
6EEMitsuhiro Hattori, Shoichi Hirose, Susumu Yoshida: Analysis of Double Block Length Hash Functions. IMA Int. Conf. 2003: 290-302
5EEShoichi Hirose: Secure Block Ciphers Are Not Sufficient for One-Way Hash Functions in the Preneel-Govaerts-Vandewalle Model. Selected Areas in Cryptography 2002: 339-352
4EEShoichi Hirose, Susumu Yoshida: A User Authentication Scheme with Identity and Location Privacy. ACISP 2001: 235-246
3 Shoichi Hirose, Kanta Matsuura: Enhancing the Resistence of a Provably Secure Key Agreement Protocol to a Denial-of-Service Attack. ICICS 1999: 169-182
2EEShoichi Hirose, Susumu Yoshida: An Authenticated Diffie-Hellman Key Agreement Protocol Secure Against Active Attacks. Public Key Cryptography 1998: 135-148
1EEShoichi Hirose, Katsuo Ikeda: A Conference Key Distribution System for the Star Configuration Based on the Discrete Logarithm Problem. Inf. Process. Lett. 62(4): 189-192 (1997)

Coauthor Index

1Mitsuhiro Hattori [6] [11]
2Katsuo Ikeda [1]
3Hidenori Kuwakado [18]
4Kanta Matsuura [3]
5Je Hong Park [15]
6Kazuto Yano [10]
7Susumu Yoshida [2] [4] [6] [8] [10] [11]
8Aaram Yun [15]

Colors in the list of coauthors

Copyright © Sun May 17 03:24:02 2009 by Michael Ley (ley@uni-trier.de)