2007 |
6 | EE | Takeru Ishihara,
Hiroshi Aono,
Sadayuki Hongo,
Junji Shikata:
Construction of Threshold (Hybrid) Encryption in the Random Oracle Model: How to Construct Secure Threshold Tag-KEM from Weakly Secure Threshold KEM.
ACISP 2007: 259-273 |
5 | EE | Masayuki Terada,
Kazuki Yoneyama,
Sadayuki Hongo,
Kazuo Ohta:
Modeling Agreement Problems in the Universal Composability Framework.
ICICS 2007: 350-361 |
4 | EE | Nobuyuki Sugio,
Hiroshi Aono,
Sadayuki Hongo,
Toshinobu Kaneko:
A Study on Higher Order Differential Attack of KASUMI.
IEICE Transactions 90-A(1): 14-21 (2007) |
2006 |
3 | EE | Masayuki Terada,
Kensaku Mori,
Sadayuki Hongo:
An Optimistic NBAC-Based Fair Exchange Method for Arbitrary Items.
CARDIS 2006: 105-118 |
2005 |
2 | EE | Masayuki Terada,
Kensaku Mori,
Kazuhiko Ishii,
Sadayuki Hongo,
Tomonori Usaka,
Noboru Koshizuka,
Ken Sakamura:
TENeT: A Framework for Distributed Smartcards.
SPC 2005: 3-17 |
1996 |
1 | EE | Sadayuki Hongo,
Noboru Sonehara,
Isamu Yoroizawa:
Edge-based binocular stereopsis algorithm--a matching mechanism with probabilistic feedback.
Neural Networks 9(3): 379-395 (1996) |