2009 |
225 | EE | Rui Zhang,
Goichiro Hanaoka,
Hideki Imai:
A generic construction of useful client puzzles.
ASIACCS 2009: 70-79 |
224 | EE | Takahiro Matsuda,
Goichiro Hanaoka,
Kanta Matsuura,
Hideki Imai:
An Efficient Encapsulation Scheme from Near Collision Resistant Pseudorandom Generators and Its Application to IBE-to-PKE Transformations.
CT-RSA 2009: 16-31 |
223 | EE | Manabu Inuma,
Akira Otsuka,
Hideki Imai:
Theoretical framework for constructing matching algorithms in biometric authentication systems
CoRR abs/0904.1284: (2009) |
2008 |
222 | | Sihan Qing,
Hideki Imai,
Guilin Wang:
Information and Communications Security, 9th International Conference, ICICS 2007, Zhengzhou, China, December 12-15, 2007, Proceedings
Springer 2008 |
221 | EE | SeongHan Shin,
Kazukuni Kobara,
Hideki Imai:
A security framework for personal networks.
COMSWARE 2008: 682-690 |
220 | EE | Hisashi Oguma,
Akira Yoshioka,
Makoto Nishikawa,
Rie Shigetomi,
Akira Otsuka,
Hideki Imai:
New Attestation Based Security Architecture for In-Vehicle Communication.
GLOBECOM 2008: 1909-1914 |
219 | EE | Huanfei Ma,
Qinghui Lan,
Haibin Kan,
Hideki Imai:
A Novel Quaternion Design Construction For STBC.
ICC 2008: 2791-2795 |
218 | EE | Takahiro Matsuda,
Goichiro Hanaoka,
Kanta Matsuura,
Hideki Imai:
Simple CCA-Secure Public Key Encryption from Any Non-Malleable Identity-Based Encryption.
ICISC 2008: 1-19 |
217 | EE | Goichiro Hanaoka,
Hideki Imai,
Kazuto Ogawa,
Hajime Watanabe:
Chosen Ciphertext Secure Public Key Encryption with a Simple Structure.
IWSEC 2008: 20-33 |
216 | EE | Rui Zhang,
Hideki Imai:
Strong Anonymous Signatures.
Inscrypt 2008: 60-71 |
215 | EE | Hideki Imai,
Manabu Hagiwara:
Error-correcting codes and cryptography.
Appl. Algebra Eng. Commun. Comput. 19(3): 213-228 (2008) |
214 | EE | Hanane Fathi,
SeongHan Shin,
Kazukuni Kobara,
Hideki Imai:
Protocols for purpose-restricted anonymous communications in IP-based wireless networks.
Computer Communications 31(15): 3662-3671 (2008) |
213 | EE | Ryo Nojima,
Hideki Imai,
Kazukuni Kobara,
Kirill Morozov:
Semantic security for the McEliece cryptosystem without random oracles.
Des. Codes Cryptography 49(1-3): 289-305 (2008) |
212 | EE | Hideki Imai,
Goichiro Hanaoka,
Ueli M. Maurer,
Yuliang Zheng:
Introduction to the Special Issue on Information Theoretic Security.
IEEE Transactions on Information Theory 54(6): 2405-2407 (2008) |
211 | EE | Anderson C. A. Nascimento,
João Barros,
Stefan Skludarek,
Hideki Imai:
The Commitment Capacity of the Gaussian Channel Is Infinite.
IEEE Transactions on Information Theory 54(6): 2785-2789 (2008) |
210 | EE | SeongHan Shin,
Kazukuni Kobara,
Hideki Imai:
A Secure Authenticated Key Exchange Protocol for Credential Services.
IEICE Transactions 91-A(1): 139-149 (2008) |
209 | EE | Kunihiko Miyazaki,
Goichiro Hanaoka,
Hideki Imai:
Invisibly Sanitizable Digital Signature Scheme.
IEICE Transactions 91-A(1): 392-402 (2008) |
208 | EE | Kazukuni Kobara,
Hideki Imai:
IVs to Skip for Immunizing WEP against FMS Attack.
IEICE Transactions 91-B(1): 164-171 (2008) |
207 | EE | Masashi Une,
Akira Otsuka,
Hideki Imai:
Wolf Attack Probability: A Theoretical Security Measure in Biometric Authentication Systems.
IEICE Transactions 91-D(5): 1380-1389 (2008) |
206 | EE | SeongHan Shin,
Kazukuni Kobara,
Hideki Imai:
RSA-Based Password-Authenticated Key Exchange, Revisited.
IEICE Transactions 91-D(5): 1424-1438 (2008) |
205 | EE | Yang Cui,
Kazukuni Kobara,
Kanta Matsuura,
Hideki Imai:
Lightweight Privacy-Preserving Authentication Protocols Secure against Active Attack in an Asymmetric Way.
IEICE Transactions 91-D(5): 1457-1465 (2008) |
204 | EE | Takahiro Matsuda,
Nuttapong Attrapadung,
Goichiro Hanaoka,
Kanta Matsuura,
Hideki Imai:
A Strongly Unforgeable Signature under the CDH Assumption without Collision Resistant Hash Functions.
IEICE Transactions 91-D(5): 1466-1476 (2008) |
203 | EE | Valery I. Korzhik,
Hideki Imai,
Junji Shikata,
Guillermo Morales-Luna,
Ekaterina Gerling:
On the Use of Bhattacharyya Distance as a Measure of the Detectability of Steganographic Systems.
T. Data Hiding and Multimedia Security 3: 23-32 (2008) |
2007 |
202 | EE | Shigenori Yamakawa,
Yang Cui,
Kazukuni Kobara,
Manabu Hagiwara,
Hideki Imai:
On the Key-Privacy Issue of McEliece Public-Key Encryption.
AAECC 2007: 168-177 |
201 | EE | Koji Nuida,
Satoshi Fujitsu,
Manabu Hagiwara,
Takashi Kitagawa,
Hajime Watanabe,
Kazuto Ogawa,
Hideki Imai:
An Improvement of Tardos's Collusion-Secure Fingerprinting Codes with Very Short Lengths.
AAECC 2007: 80-89 |
200 | EE | Ronald Cramer,
Goichiro Hanaoka,
Dennis Hofheinz,
Hideki Imai,
Eike Kiltz,
Rafael Pass,
Abhi Shelat,
Vinod Vaikuntanathan:
Bounded CCA2-Secure Encryption.
ASIACRYPT 2007: 502-518 |
199 | EE | Rui Zhang,
Hideki Imai:
Generic Combination of Public Key Encryption with Keyword Search and Public Key Encryption.
CANS 2007: 159-174 |
198 | EE | Makoto Sugita,
Mitsuru Kawazoe,
Ludovic Perret,
Hideki Imai:
Algebraic Cryptanalysis of 58-Round SHA-1.
FSE 2007: 349-365 |
197 | EE | Jun Furukawa,
Hideki Imai:
An Efficient Aggregate Shuffle Argument Scheme.
Financial Cryptography 2007: 260-274 |
196 | EE | Masashi Une,
Akira Otsuka,
Hideki Imai:
Wolf Attack Probability: A New Security Measure in Biometric Authentication Systems.
ICB 2007: 396-406 |
195 | EE | Kazuto Ogawa,
Go Ohtake,
Goichiro Hanaoka,
Hideki Imai:
Trade-Off Traitor Tracing.
INDOCRYPT 2007: 331-340 |
194 | EE | SeongHan Shin,
Kazukuni Kobara,
Hideki Imai:
A Secure Threshold Anonymous Password-Authenticated Key Exchange Protocol.
IWSEC 2007: 444-458 |
193 | EE | Koji Nuida,
Manabu Hagiwara,
Hajime Watanabe,
Hideki Imai:
Optimization of Tardos's Fingerprinting Codes in a Viewpoint of Memory Amount.
Information Hiding 2007: 279-293 |
192 | EE | Rui Zhang,
Goichiro Hanaoka,
Hideki Imai:
Orthogonality between Key Privacy and Data Privacy, Revisited.
Inscrypt 2007: 313-327 |
191 | EE | Takahiro Matsuda,
Goichiro Hanaoka,
Kanta Matsuura,
Hideki Imai:
A Practical Provider Authentication System for Bidirectional Broadcast Service.
KES (3) 2007: 967-974 |
190 | EE | Kazuto Ogawa,
Goichiro Hanaoka,
Kazukuni Kobara,
Kanta Matsuura,
Hideki Imai:
Anonymous Pay-TV System with Secure Revenue Sharing.
KES (3) 2007: 984-991 |
189 | EE | Yang Cui,
Kazukuni Kobara,
Kanta Matsuura,
Hideki Imai:
Lightweight Asymmetric Privacy-Preserving Authentication Protocols Secure against Active Attack.
PerCom Workshops 2007: 223-228 |
188 | EE | Yang Cui,
Eiichiro Fujisaki,
Goichiro Hanaoka,
Hideki Imai,
Rui Zhang:
Formal Security Treatments for Signatures from Identity-Based Encryption.
ProvSec 2007: 218-227 |
187 | EE | Takahiro Matsuda,
Nuttapong Attrapadung,
Goichiro Hanaoka,
Kanta Matsuura,
Hideki Imai:
A CDH-Based Strongly Unforgeable Signature Without Collision Resistant Hash Function.
ProvSec 2007: 68-84 |
186 | EE | Rei Yoshida,
Rie Shigetomi,
Kazuki Yoshizoe,
Akira Otsuka,
Hideki Imai:
A Privacy Protection Scheme for a Scalable Control Method in Context-Dependent Services.
WEWoRC 2007: 1-12 |
185 | EE | Toru Hashimoto,
Takashi Itoh,
Masazumi Ueba,
Hisato Iwai,
Hideichi Sasaoka,
Kazukuni Kobara,
Hideki Imai:
Comparative Studies in Key Disagreement Correction Process on Wireless Key Agreement System.
WISA 2007: 173-187 |
184 | EE | Marc P. C. Fossorier,
Kazukuni Kobara,
Hideki Imai:
Modeling Bit Flipping Decoding Based on Nonorthogonal Check Sums With Application to Iterative Decoding Attack of McEliece Cryptosystem.
IEEE Transactions on Information Theory 53(1): 402-411 (2007) |
183 | EE | Marc P. C. Fossorier,
Miodrag J. Mihaljevic,
Hideki Imai:
Modeling Block Decoding Approaches for the Fast Correlation Attack.
IEEE Transactions on Information Theory 53(12): 4728-4737 (2007) |
182 | EE | Nuttapong Attrapadung,
Hideki Imai:
Practical Broadcast Encryption from Graph-Theoretic Techniques and Subset-Incremental-Chain Structure.
IEICE Transactions 90-A(1): 187-203 (2007) |
181 | EE | SeongHan Shin,
Kazukuni Kobara,
Hideki Imai:
An Efficient and Leakage-Resilient RSA-Based Authenticated Key Exchange Protocol with Tight Security Reduction.
IEICE Transactions 90-A(2): 474-490 (2007) |
180 | EE | Kazuto Ogawa,
Goichiro Hanaoka,
Hideki Imai:
Traitor Tracing Scheme Secure against Adaptive Key Exposure and its Application to Anywhere TV Service.
IEICE Transactions 90-A(5): 1000-1011 (2007) |
179 | EE | Miodrag J. Mihaljevic,
Marc P. C. Fossorier,
Hideki Imai:
Birthday Paradox Based Security Analysis of Certain Broadcast Encryption Schemes.
IEICE Transactions 90-A(6): 1248-1251 (2007) |
178 | EE | Nuttapong Attrapadung,
Jun Furukawa,
Takeshi Gomi,
Goichiro Hanaoka,
Hideki Imai,
Rui Zhang:
Efficient Identity-Based Encryption with Tight Security Reduction.
IEICE Transactions 90-A(9): 1803-1813 (2007) |
177 | EE | Thi Lan Anh Phan,
Goichiro Hanaoka,
Kanta Matsuura,
Hideki Imai:
Key-Insulated Public Key Encryption with Auxiliary Helper Key: Model, Constructions and Formal Security Proofs.
IEICE Transactions 90-A(9): 1814-1829 (2007) |
176 | EE | Kazuto Ogawa,
Goichiro Hanaoka,
Hideki Imai:
Extension of Broadcasting Service by Using Electronic Tokens.
IEICE Transactions 90-D(11): 1741-1750 (2007) |
2006 |
175 | | Marc P. C. Fossorier,
Hideki Imai,
Shu Lin,
Alain Poli:
Applied Algebra, Algebraic Algorithms and Error-Correcting Codes, 16th International Symposium, AAECC-16, Las Vegas, NV, USA, February 20-24, 2006, Proceedings
Springer 2006 |
174 | EE | Goichiro Hanaoka,
Yumiko Hanaoka,
Manabu Hagiwara,
Hajime Watanabe,
Hideki Imai:
Unconditionally Secure Chaffing-and-Winnowing: A Relationship Between Encryption and Authentication.
AAECC 2006: 154-162 |
173 | EE | Yang Cui,
Kazukuni Kobara,
Hideki Imai:
On Achieving Chosen Ciphertext Security with Decryption Errors.
AAECC 2006: 173-182 |
172 | EE | Peng Yang,
Takashi Kitagawa,
Goichiro Hanaoka,
Rui Zhang,
Kanta Matsuura,
Hideki Imai:
Applying Fujisaki-Okamoto to Identity-Based Encryption.
AAECC 2006: 183-192 |
171 | EE | Manabu Hagiwara,
Goichiro Hanaoka,
Hideki Imai:
A Short Random Fingerprinting Code Against a Small Number of Pirates.
AAECC 2006: 193-202 |
170 | EE | Miodrag J. Mihaljevic,
Marc P. C. Fossorier,
Hideki Imai:
A General Formulation of Algebraic and Fast Correlation Attacks Based on Dedicated Sample Decimation.
AAECC 2006: 203-214 |
169 | EE | Kazuto Ogawa,
Goichiro Hanaoka,
Hideki Imai:
Adaptively Secure Traitor Tracing Against Key Exposure and Its Application to Anywhere TV Service.
ACISP 2006: 123-135 |
168 | EE | Takashi Kitagawa,
Peng Yang,
Goichiro Hanaoka,
Rui Zhang,
Hajime Watanabe,
Kanta Matsuura,
Hideki Imai:
Generic Transforms to Acquire CCA-Security for Identity Based Encryption: The Cases of FOpkc and REACT.
ACISP 2006: 348-359 |
167 | EE | Masayuki Abe,
Yang Cui,
Hideki Imai,
Kaoru Kurosawa:
Tag-KEM from Set Partial Domain One-Way Permutations.
ACISP 2006: 360-370 |
166 | EE | Jian Wang,
Miodrag J. Mihaljevic,
Lein Harn,
Hideki Imai:
A Hierarchical Key Management Approach for Secure Multicast.
ARCS 2006: 422-434 |
165 | EE | Kunihiko Miyazaki,
Goichiro Hanaoka,
Hideki Imai:
Digitally signed document sanitizing scheme based on bilinear maps.
ASIACCS 2006: 343-354 |
164 | EE | Nuttapong Attrapadung,
Jun Furukawa,
Hideki Imai:
Forward-Secure and Searchable Broadcast Encryption with Short Ciphertexts and Private Keys.
ASIACRYPT 2006: 161-177 |
163 | EE | Nuttapong Attrapadung,
Jun Furukawa,
Takeshi Gomi,
Goichiro Hanaoka,
Hideki Imai,
Rui Zhang:
Efficient Identity-Based Encryption with Tight Security Reduction.
CANS 2006: 19-36 |
162 | EE | SeongHan Shin,
Kazukuni Kobara,
Hideki Imai:
An Elliptic Curve Based Authenticated Key Agreement Protocol for Wireless Security.
CIS 2006: 767-777 |
161 | EE | SeongHan Shin,
Hanane Fathi,
Mohamed Imine,
Kazukuni Kobara,
Neeli R. Prasad,
Hideki Imai:
A New Security Architecture for Personal Networks.
GLOBECOM 2006 |
160 | EE | Jun Furukawa,
Kaoru Kurosawa,
Hideki Imai:
An Efficient Compiler from Sigma-Protocol to 2-Move Deniable Zero-Knowledge.
ICALP (2) 2006: 46-57 |
159 | EE | Tatsuyuki Matsushita,
Hideki Imai:
Hierarchical Key Assignment for Black-Box Tracing with Efficient Ciphertext Size.
ICICS 2006: 92-111 |
158 | EE | Ryo Nojima,
Kazukuni Kobara,
Hideki Imai:
Efficient Shared-Key Authentication Scheme from Any Weak Pseudorandom Function.
INDOCRYPT 2006: 303-316 |
157 | EE | Marc P. C. Fossorier,
Miodrag J. Mihaljevic,
Hideki Imai,
Yang Cui,
Kanta Matsuura:
An Algorithm for Solving the LPN Problem and Its Application to Security Evaluation of the HB Protocols for RFID Authentication.
INDOCRYPT 2006: 48-62 |
156 | EE | SeongHan Shin,
Kazukuni Kobara,
Hideki Imai:
An Authentication and Key Exchange Protocol for Secure Credential Services.
ISC 2006: 443-458 |
155 | EE | Nuttapong Attrapadung,
Yang Cui,
David Galindo,
Goichiro Hanaoka,
Ichiro Hasuo,
Hideki Imai,
Kanta Matsuura,
Peng Yang,
Rui Zhang:
Relations Among Notions of Security for Identity Based Encryption Schemes.
LATIN 2006: 130-141 |
154 | EE | Goichiro Hanaoka,
Yumiko Hanaoka,
Hideki Imai:
Parallel Key-Insulated Public Key Encryption.
Public Key Cryptography 2006: 105-122 |
153 | EE | Thi Lan Anh Phan,
Yumiko Hanaoka,
Goichiro Hanaoka,
Kanta Matsuura,
Hideki Imai:
Reducing the Spread of Damage of Key Exposures in Key-Insulated Encryption.
VIETCRYPT 2006: 366-384 |
152 | EE | Koji Nuida,
Manabu Hagiwara,
Hajime Watanabe,
Hideki Imai:
Optimal probabilistic fingerprinting codes using optimal finite random variables related to numerical quadrature
CoRR abs/cs/0610036: (2006) |
151 | EE | Goichiro Hanaoka,
Junji Shikata,
Yumiko Hanaoka,
Hideki Imai:
Unconditionally Secure Anonymous Encryption and Group Authentication.
Comput. J. 49(3): 310-321 (2006) |
150 | EE | Hanane Fathi,
SeongHan Shin,
Kazukuni Kobara,
Shyam S. Chakraborty,
Hideki Imai,
Ramjee Prasad:
LR-AKE-Based AAA for Network Mobility (NEMO) Over Wireless Links.
IEEE Journal on Selected Areas in Communications 24(9): 1725-1737 (2006) |
149 | EE | Makoto Sugita,
Mitsuru Kawazoe,
Hideki Imai:
Relation between the XL Algorithm and Gröbner Basis Algorithms.
IEICE Transactions 89-A(1): 11-18 (2006) |
148 | EE | Tetsutaro Kobayashi,
Kazumaro Aoki,
Hideki Imai:
Efficient Algorithms for Tate Pairing.
IEICE Transactions 89-A(1): 134-143 (2006) |
147 | EE | Masayuki Abe,
Hideki Imai:
Flaws in Robust Optimistic Mix-Nets and Stronger Security Notions.
IEICE Transactions 89-A(1): 99-105 (2006) |
146 | EE | Jun Furukawa,
Hideki Imai:
An Efficient Group Signature Scheme from Bilinear Maps.
IEICE Transactions 89-A(5): 1328-1338 (2006) |
145 | EE | Rie Shigetomi,
Akira Otsuka,
Jun Furukawa,
Keith Martin,
Hideki Imai:
A Provably Secure Refreshable Partially Anonymous Token and Its Applications.
IEICE Transactions 89-A(5): 1396-1406 (2006) |
144 | EE | Kazukuni Kobara,
Hideki Imai:
Key-Dependent Weak IVs and Weak Keys in WEP - How to Trace Conditions Back to Their Patterns - .
IEICE Transactions 89-A(8): 2198-2206 (2006) |
143 | EE | Abdulrahman Alharby,
Hideki Imai:
Security Protocols Protection Based on Anomaly Detection.
IEICE Transactions 89-D(1): 189-200 (2006) |
2005 |
142 | EE | Jun Furukawa,
Hideki Imai:
An Efficient Group Signature Scheme from Bilinear Maps.
ACISP 2005: 455-467 |
141 | EE | Abdulrahman Alharby,
Hideki Imai:
IDS False Alarm Reduction Using Continuous and Discontinuous Patterns.
ACNS 2005: 192-205 |
140 | EE | SeongHan Shin,
Kazukuni Kobara,
Hideki Imai:
Efficient and Leakage-Resilient Authenticated Key Transport Protocol Based on RSA.
ACNS 2005: 269-284 |
139 | EE | Rui Zhang,
Jun Furukawa,
Hideki Imai:
Short Signature and Universal Designated Verifier Signature Without Random Oracles.
ACNS 2005: 483-498 |
138 | EE | Nuttapong Attrapadung,
Hideki Imai:
Graph-Decomposition-Based Frameworks for Subset-Cover Broadcast Encryption and Efficient Instantiations.
ASIACRYPT 2005: 100-120 |
137 | EE | Yumiko Hanaoka,
Goichiro Hanaoka,
Junji Shikata,
Hideki Imai:
Identity-Based Hierarchical Strongly Key-Insulated Encryption and Its Application.
ASIACRYPT 2005: 495-514 |
136 | EE | Haruhiro Yoshimoto,
Rie Shigetomi,
Hideki Imai:
How to Protect Peer-to-Peer Online Games from Cheats.
CIG 2005 |
135 | EE | Rui Zhang,
Hideki Imai:
Improvements on Security Proofs of Some Identity Based Encryption Schemes.
CISC 2005: 28-41 |
134 | EE | Yang Cui,
Kazukuni Kobara,
Hideki Imai:
A Generic Conversion with Optimal Redundancy.
CT-RSA 2005: 104-117 |
133 | EE | Miodrag J. Mihaljevic,
Marc P. C. Fossorier,
Hideki Imai:
Security Weaknesses of Certain Broadcast Encryption Schemes.
DRMTICS 2005: 228-245 |
132 | EE | Miodrag J. Mihaljevic,
Marc P. C. Fossorier,
Hideki Imai:
A Novel Broadcast Encryption Based on Time-Bound Cryptographic Keys.
DRMTICS 2005: 258-276 |
131 | EE | SeongHan Shin,
Kazukuni Kobara,
Hideki Imai:
A Lower-Bound of Complexity for RSA-Based Password-Authenticated Key Exchange.
EuroPKI 2005: 191-205 |
130 | EE | Jian Wang,
Lein Harn,
Hideki Imai:
Key Management for Multicast Fingerprinting.
ICISS 2005: 191-204 |
129 | EE | SeongHan Shin,
Kazukuni Kobara,
Hideki Imai:
A Simplified Leakage-Resilient Authenticated Key Exchange Protocol with Optimal Memory Size.
ICN (2) 2005: 944-952 |
128 | EE | Miodrag J. Mihaljevic,
Marc P. C. Fossorier,
Hideki Imai:
Cryptanalysis of Keystream Generator by Decimated Sample Based Algebraic and Fast Correlation Attacks.
INDOCRYPT 2005: 155-168 |
127 | EE | Abdulrahman Alharby,
Hideki Imai:
Hybrid Intrusion Detection Model Based on Ordered Sequences.
MMM-ACNS 2005: 352-365 |
126 | EE | Hideki Imai:
Trends and Challenges for Securer Cryptography in Practice.
Mycrypt 2005: 1 |
125 | | SeongHan Shin,
Kazukuni Kobara,
Hideki Imai:
A Secure Network Storage System with Information Privacy.
WEWoRC 2005: 22-31 |
124 | EE | Hideki Imai,
Atsuhiro Yamagishi:
Cryptrec.
Encyclopedia of Cryptography and Security 2005 |
123 | EE | Kazuto Ogawa,
Goichiro Hanaoka,
Hideki Imai:
A Secure Traitor Tracing Scheme against Key Exposure
CoRR abs/cs/0508011: (2005) |
122 | EE | Hanane Fathi,
SeongHan Shin,
Kazukuni Kobara,
Shyam S. Chakraborty,
Hideki Imai,
Ramjee Prasad:
Leakage-resilient security architecture for mobile IPv6 in wireless overlay networks.
IEEE Journal on Selected Areas in Communications 23(11): 2182-2193 (2005) |
121 | EE | Kunihiko Miyazaki,
Mitsuru Iwamura,
Tsutomu Matsumoto,
Ryôichi Sasaki,
Hiroshi Yoshiura,
Satoru Tezuka,
Hideki Imai:
Digitally Signed Document Sanitizing Scheme with Disclosure Condition Control.
IEICE Transactions 88-A(1): 239-246 (2005) |
120 | EE | JaeGwi Choi,
Goichiro Hanaoka,
KyungHyune Rhee,
Hideki Imai:
How to Break COT-Based Fingerprinting Schemes and Design New One.
IEICE Transactions 88-A(10): 2800-2807 (2005) |
119 | EE | SeongHan Shin,
Kazukuni Kobara,
Hideki Imai:
A Simple Leakage-Resilient Authenticated Key Establishment Protocol, Its Extensions, and Applications.
IEICE Transactions 88-A(3): 736-754 (2005) |
118 | EE | Tatsuyuki Matsushita,
Hideki Imai:
A Flexible-Revocation Scheme for Efficient Public-Key Black-Box Traitor Tracing.
IEICE Transactions 88-A(4): 1055-1062 (2005) |
2004 |
117 | EE | Goichiro Hanaoka,
Hideki Imai,
Jörn Müller-Quade,
Anderson C. A. Nascimento,
Akira Otsuka,
Andreas Winter:
Information Theoretically Secure Oblivious Polynomial Evaluation: Model, Bounds, and Constructions.
ACISP 2004: 62-73 |
116 | EE | Anderson C. A. Nascimento,
Jörn Müller-Quade,
Akira Otsuka,
Goichiro Hanaoka,
Hideki Imai:
Unconditionally Non-interactive Verifiable Secret Sharing Secure against Faulty Majorities in the Commodity Based Model.
ACNS 2004: 355-368 |
115 | EE | Rui Zhang,
Goichiro Hanaoka,
Hideki Imai:
On the Security of Cryptosystems with All-or-Nothing Transform.
ACNS 2004: 76-90 |
114 | EE | Tatsuyuki Matsushita,
Hideki Imai:
A Public-Key Black-Box Traitor Tracing Scheme with Sublinear Ciphertext Size Against Self-Defensive Pirates.
ASIACRYPT 2004: 260-275 |
113 | EE | Gwénolé Ars,
Jean-Charles Faugère,
Hideki Imai,
Mitsuru Kawazoe,
Makoto Sugita:
Comparison Between XL and Gröbner Basis Algorithms.
ASIACRYPT 2004: 338-353 |
112 | EE | Anderson C. A. Nascimento,
Jörn Müller-Quade,
Hideki Imai:
Bit String Commitment Reductions with a Non-zero Rate.
CT-RSA 2004: 179-193 |
111 | EE | Miodrag J. Mihaljevic,
Marc P. C. Fossorier,
Hideki Imai:
Secret-Public Storage Trade-Off for Broadcast Encryption Key Management.
ICICS 2004: 375-387 |
110 | EE | Rui Zhang,
Goichiro Hanaoka,
Junji Shikata,
Hideki Imai:
On the Security of Multiple Encryption or CCA-security+CCA-security=CCA-security?
Public Key Cryptography 2004: 360-374 |
109 | EE | Miodrag J. Mihaljevic,
Hideki Imai:
The Decimated Sample Based Improved Algebraic Attacks on the Nonlinear Filters.
SCN 2004: 310-323 |
108 | EE | Mira Kim,
Kazukuni Kobara,
Hideki Imai:
Dynamic Fingerprinting over Broadcast Using Revocation Scheme.
WISA 2004: 251-263 |
107 | EE | Motohiko Isaka,
Marc P. C. Fossorier,
Hideki Imai:
On the suboptimality of iterative decoding for turbo-like and LDPC codes with cycles in their graph representation.
IEEE Transactions on Communications 52(5): 845-854 (2004) |
106 | EE | Tadashi Minowa,
Hideki Ochiai,
Hideki Imai:
Phase-noise effects on turbo trellis-coded over M-ary coherent channels.
IEEE Transactions on Communications 52(8): 1333-1343 (2004) |
105 | EE | Goichiro Hanaoka,
Junji Shikata,
Yuliang Zheng,
Hideki Imai:
Efficient Unconditionally Secure Digital Signatures.
IEICE Transactions 87-A(1): 120-130 (2004) |
104 | EE | Goichiro Hanaoka,
Kazuto Ogawa,
Itsuro Murota,
Go Ohtake,
Keigo Majima,
Seiichi Gohshi,
Kimiyuki Oyamada,
Seiichi Namba,
Hideki Imai:
Managing Encryption and Key Publication Independently in Digital Rights Management Systems.
IEICE Transactions 87-A(1): 160-172 (2004) |
2003 |
103 | EE | Anderson C. A. Nascimento,
Akira Otsuka,
Hideki Imai,
Jörn Müller-Quade:
Unconditionally Secure Homomorphic Pre-distributed Commitments.
AAECC 2003: 87-97 |
102 | EE | Goichiro Hanaoka,
Kazuto Ogawa,
Itsuro Murota,
Go Ohtake,
Keigo Majima,
Kimiyuki Oyamada,
Seiichi Gohshi,
Seiichi Namba,
Hideki Imai:
Separating Encryption and Key Issuance in Digital Rights Management Systems.
ACISP 2003: 365-376 |
101 | EE | Masayuki Abe,
Hideki Imai:
Flaws in Some Robust Optimistic Mix-Nets.
ACISP 2003: 39-50 |
100 | EE | Rui Zhang,
Hideki Imai:
Round Optimal Distributed Key Generation of Threshold Cryptosystem Based on Discrete Logarithm Problem.
ACNS 2003: 96-110 |
99 | EE | SeongHan Shin,
Kazukuni Kobara,
Hideki Imai:
Leakage-Resilient Authenticated Key Establishment Protocols.
ASIACRYPT 2003: 155-172 |
98 | EE | Nuttapong Attrapadung,
Kazukuni Kobara,
Hideki Imai:
Sequential Key Derivation Patterns for Broadcast Encryption and Key Predistribution Schemes.
ASIACRYPT 2003: 374-391 |
97 | EE | Nuttapong Attrapadung,
Kazukuni Kobara,
Hideki Imai:
Broadcast encryption with short keys and transmissions.
Digital Rights Management Workshop 2003: 55-66 |
96 | EE | Yang Cui,
Kazukuni Kobara,
Hideki Imai:
Compact Conversion Schemes for the Probabilistic OW-PCA Primitives.
ICICS 2003: 269-279 |
95 | EE | Andreas Winter,
Anderson C. A. Nascimento,
Hideki Imai:
Commitment Capacity of Discrete Memoryless Channels.
IMA Int. Conf. 2003: 35-51 |
94 | EE | Anderson C. A. Nascimento,
Jörn Müller-Quade,
Akira Otsuka,
Goichiro Hanaoka,
Hideki Imai:
Unconditionally Secure Homomorphic Pre-distributed Bit Commitment and Secure Two-Party Computations.
ISC 2003: 151-164 |
93 | EE | Goichiro Hanaoka,
Junji Shikata,
Yumiko Hanaoka,
Hideki Imai:
The Role of Arbiters in Asymmetric Authentication Schemes.
ISC 2003: 428-441 |
92 | EE | Yodai Watanabe,
Junji Shikata,
Hideki Imai:
Equivalence between Semantic Security and Indistinguishability against Chosen Ciphertext Attacks.
Public Key Cryptography 2003: 71-84 |
91 | EE | Rie Shigetomi,
Akira Otsuka,
Hideki Imai:
Anonymous authentication scheme for XML security standard with Refreshable Tokens.
XML Security 2003: 86-93 |
90 | EE | Andreas Winter,
Anderson C. A. Nascimento,
Hideki Imai:
Commitment Capacity of Discrete Memoryless Channels
CoRR cs.CR/0304014: (2003) |
89 | | Kazukuni Kobara,
Hideki Imai:
On the one-wayness against chosen-plaintext attacks of the Loidreau's modified McEliece PKC.
IEEE Transactions on Information Theory 49(12): 3160-3168 (2003) |
2002 |
88 | EE | Goichiro Hanaoka,
Junji Shikata,
Yumiko Hanaoka,
Hideki Imai:
Unconditionally Secure Anonymous Encryption and Group Authentication.
ASIACRYPT 2002: 81-99 |
87 | EE | Junji Shikata,
Goichiro Hanaoka,
Yuliang Zheng,
Hideki Imai:
Security Notions for Unconditionally Secure Signature Schemes.
EUROCRYPT 2002: 434-449 |
86 | | Kanta Matsuura,
Hideki Imai:
Digital Timestamps for Dispute Settlement in Electronic Commerce: Generation, Verification, and Renewal.
ICEIS 2002: 962-967 |
85 | EE | Yumiko Hanaoka,
Goichiro Hanaoka,
Junji Shikata,
Hideki Imai:
Unconditionally Secure Key Insulated Cryptosystems: Models, Bounds and Constructions.
ICICS 2002: 85-96 |
84 | EE | Rie Shigetomi,
Akira Otsuka,
Takahide Ogawa,
Hideki Imai:
An Anonymous Loan System Based on Group Signature Scheme.
ISC 2002: 244-256 |
83 | EE | Shoko Yonezawa,
Goichiro Hanaoka,
Junji Shikata,
Hideki Imai:
Traceability Schemes for Signed Documents.
ISC 2002: 257-271 |
82 | EE | Kazukuni Kobara,
Hideki Imai:
New Chosen-Plaintext Attacks on the One-Wayness of the Modified McEliece PKC Proposed at Asiacrypt 2000.
Public Key Cryptography 2002: 237-251 |
81 | EE | Goichiro Hanaoka,
Junji Shikata,
Yuliang Zheng,
Hideki Imai:
Efficient and Unconditionally Secure Digital Signatures and a Security Analysis of a Multireceiver Authentication Code.
Public Key Cryptography 2002: 64-79 |
80 | EE | Paul Camion,
Miodrag J. Mihaljevic,
Hideki Imai:
Two Alerts for Design of Certain Stream Ciphers: Trapped LFSR and Weak Resilient Function over GF(q).
Selected Areas in Cryptography 2002: 196-213 |
79 | EE | Goichiro Hanaoka,
Tsuyoshi Nishioka,
Yuliang Zheng,
Hideki Imai:
A Hierarchical Non-interactive Key-Sharing Scheme with Low Memory Size and High Resistance against Collusion Attacks.
Comput. J. 45(3): 293-303 (2002) |
2001 |
78 | EE | Makoto Sugita,
Kazukuni Kobara,
Hideki Imai:
Security of Reduced Version of the Block Cipher Camellia against Truncated and Impossible Differential Cryptanalysis.
ASIACRYPT 2001: 193-207 |
77 | EE | Yuji Watanabe,
Goichiro Hanaoka,
Hideki Imai:
Efficient Asymmetric Public-Key Traitor Tracing without Trusted Agents.
CT-RSA 2001: 392-407 |
76 | EE | Miodrag J. Mihaljevic,
Marc P. C. Fossorier,
Hideki Imai:
Fast Correlation Attack Algorithm with List Decoding and an Application.
FSE 2001: 196-210 |
75 | EE | Kazukuni Kobara,
Hideki Imai:
Semantically Secure McEliece Public-Key Cryptosystems-Conversions for McEliece PKC.
Public Key Cryptography 2001: 19-35 |
74 | EE | Hirotaka Komaki,
Yuji Watanabe,
Goichiro Hanaoka,
Hideki Imai:
Efficient Asymmetric Self-Enforcement Scheme with Public Traceability.
Public Key Cryptography 2001: 225-239 |
73 | EE | Jörn Müller-Quade,
Hideki Imai:
More Robust Multiparty Protocols with Oblivious Transfer
CoRR cs.CR/0101020: (2001) |
72 | EE | Kazukuni Kobara,
Hideki Imai:
Pretty-Simple Password-Authenticated Key-Exchange Protocol
CoRR cs.CR/0110024: (2001) |
71 | EE | Anderson C. A. Nascimento,
Jörn Müller-Quade,
Hideki Imai:
Quantum Identification Protocol with Technologically Bounded Parties.
Electronic Notes in Discrete Mathematics 6: 15-24 (2001) |
2000 |
70 | | Hideki Imai,
Yuliang Zheng:
Public Key Cryptography, Third International Workshop on Practice and Theory in Public Key Cryptography, PKC 2000, Melbourne, Victoria, Australia, January 18-20, 2000, Proceedings
Springer 2000 |
69 | EE | Yuji Watanabe,
Hideki Imai:
Reducing the round complexity of a sealed-bid auction protocol with an off-line TTP.
ACM Conference on Computer and Communications Security 2000: 80-86 |
68 | | Makoto Sugita,
Kazukuni Kobara,
Kazuhiro Uehara,
Shuji Kubota,
Hideki Imai:
Relationships among Differential, Truncated Differential, Impossible Differential Cryptanalyses against Word-Oriented Block Ciphers like RIJNDAEL, E2.
AES Candidate Conference 2000: 242-254 |
67 | EE | Goichiro Hanaoka,
Junji Shikata,
Yuliang Zheng,
Hideki Imai:
Unconditionally Secure Digital Signature Schemes Admitting Transferability.
ASIACRYPT 2000: 130-142 |
66 | EE | Hideki Imai,
Atsuhiro Yamagishi:
CRYPTREC Project - Cryptographic Evaluation Project for the Japanese Electronic Government.
ASIACRYPT 2000: 399-400 |
65 | EE | Miodrag J. Mihaljevic,
Marc P. C. Fossorier,
Hideki Imai:
A Low-Complexity and High-Performance Algorithm for the Fast Correlation Attack.
FSE 2000: 196-212 |
64 | EE | Daisuke Nojiri,
Goichiro Hanaoka,
Hideki Imai:
A Practical Implementation of Hierarchically Structured Key Predistribution System and Its Evaluation.
ISW 2000: 224-236 |
63 | EE | Jörn Müller-Quade,
Hideki Imai:
Anonymous Oblivious Transfer
CoRR cs.CR/0011004: (2000) |
62 | | Xian-Mo Zhang,
Yuliang Zheng,
Hideki Imai:
Relating Differential Distribution Tables to Other Properties of of Substitution Boxes.
Des. Codes Cryptography 19(1): 45-63 (2000) |
1999 |
61 | | Hideki Imai,
Yuliang Zheng:
Public Key Cryptography, Second International Workshop on Practice and Theory in Public Key Cryptography, PKC '99, Kamakura, Japan, March 1-3, 1999, Proceedings
Springer 1999 |
60 | | Marc P. C. Fossorier,
Hideki Imai,
Shu Lin,
Alain Poli:
Applied Algebra, Algebraic Algorithms and Error-Correcting Codes, 13th International Symposium, AAECC-13, Honolulu, Hawaii, USA, November 15-19, 1999, Proceedings
Springer 1999 |
59 | | Marc P. C. Fossorier,
Miodrag J. Mihaljevic,
Hideki Imai:
Critical Noise for Convergence of Iterative Probabilistic Decoding with Belief Propagation in Cryptographic Applications.
AAECC 1999: 282-293 |
58 | | Goichiro Hanaoka,
Tsuyoshi Nishioka,
Yuliang Zheng,
Hideki Imai:
An Efficient Hierarchical Identity-Based Key-Sharing Method Resistant against Collusion-Attacks.
ASIACRYPT 1999: 348-362 |
57 | | Junji Shikata,
Yuliang Zheng,
Joe Suzuki,
Hideki Imai:
Optimizing the Menezes-Okamoto-Vanstone (MOV) Algorithm for Non-supersingular Elliptic Curves.
ASIACRYPT 1999: 86-102 |
56 | EE | Ryuichi Harasawa,
Junji Shikata,
Joe Suzuki,
Hideki Imai:
Comparing the MOV and FR Reductions in Elliptic Curve Cryptography.
EUROCRYPT 1999: 190-205 |
55 | EE | Markus Breitbach,
Hideki Imai:
On Channel Capacity and Modulation of Watermarks in Digital Still Images.
Financial Cryptography 1999: 125-139 |
54 | | Goichiro Hanaoka,
Tsuyoshi Nishioka,
Yuliang Zheng,
Hideki Imai:
Optimal Construction of Unconditionally Secure ID-Based Key Sharing Scheme for Large-Scale Networks.
ICICS 1999: 157-168 |
53 | | Kazukuni Kobara,
Hideki Imai:
On the Channel Capacity of Narrow-Band Subliminal Channels.
ICICS 1999: 309-323 |
52 | EE | Yuji Watanabe,
Hideki Imai:
Active Rebooting Method for Proactivized System: How to Enhance the Security against Latent Virus Attacks.
ISW 1999: 118-135 |
51 | EE | Tsuyoshi Nishioka,
Goichiro Hanaoka,
Hideki Imai:
A New Digital Signature Scheme on ID-Based Key-Sharing Infrastructures.
ISW 1999: 259-270 |
50 | EE | Yuji Watanabe,
Hideki Imai:
Shared Generation of Random Number with Timestamp: How to Cope with the Leakage of the CA's Secret.
Public Key Cryptography 1999: 290-305 |
49 | EE | Yuliang Zheng,
Xian-Mo Zhang,
Hideki Imai:
Restriction, Terms and Nonlinearity of Boolean Functions.
Theor. Comput. Sci. 226(1-2): 207-223 (1999) |
1998 |
48 | | Hideki Imai,
Yuliang Zheng:
Public Key Cryptography, First International Workshop on Practice and Theory in Public Key Cryptography, PKC '98, Pacifico Yokohama, Japan, February 5-6, 1998, Proceedings
Springer 1998 |
47 | EE | Goichiro Hanaoka,
Yuliang Zheng,
Hideki Imai:
LITESET: A Light-Weight Secure Electronic Transaction Protocol.
ACISP 1998: 215-226 |
46 | | Kazukuni Kobara,
Hideki Imai:
A successive carrier-transmission model for narrow-band subliminal channels.
ICISC 1998: 179-187 |
45 | | Yuliang Zheng,
Hideki Imai:
Compact and Unforgeable Key Establishment over an ATM Network.
INFOCOM 1998: 411-418 |
44 | EE | Miodrag J. Mihaljevic,
Yuliang Zheng,
Hideki Imai:
A Cellular Automaton Based Fast One-Way Hash Function Suitable for Hardware Implementation.
Public Key Cryptography 1998: 217-233 |
43 | | Kanta Matsuura,
Yuliang Zheng,
Hideki Imai:
Compact and Flexible Resolution of CBT Multicast Key-Distribution.
WWCA 1998: 190-205 |
42 | EE | Yuliang Zheng,
Hideki Imai:
How to Construct Efficient Signcryption Schemes on Elliptic Curves.
Inf. Process. Lett. 68(5): 227-233 (1998) |
1997 |
41 | | Xian-Mo Zhang,
Yuliang Zheng,
Hideki Imai:
Duality of Boolean functions and its cryptographic significance.
ICICS 1997: 159-169 |
40 | | Kazukuni Kobara,
Hideki Imai:
Self-synchronized message randomization methods for subliminal channels.
ICICS 1997: 325-334 |
1996 |
39 | | Kazukuni Kobara,
Hideki Imai:
Limiting the Visible Space Visual Secret Sharing Schemes and Their Application to Human Identification.
ASIACRYPT 1996: 185-195 |
38 | | P. CharnKeitKong,
Hideki Imai,
Kazuhiko Yamaguchi:
On classes of rate k/(k+1) convolutional codes and their decoding techniques.
IEEE Transactions on Information Theory 42(6): 2181-2193 (1996) |
1995 |
37 | | Keiichi Iwamura,
Yasunori Dohi,
Hideki Imai:
A Design of Reed-Solomon Decoder with Systolic Array Structure.
IEEE Trans. Computers 44(1): 118-122 (1995) |
1994 |
36 | | Hideki Imai:
Information Security Aspects of Spread Spectrum Systems.
ASIACRYPT 1994: 193-208 |
1993 |
35 | | Hideki Imai,
Ronald L. Rivest,
Tsutomu Matsumoto:
Advances in Cryptology - ASIACRYPT '91, International Conference on the Theory and Applications of Cryptology, Fujiyoshida, Japan, November 11-14, 1991, Proceedings
Springer 1993 |
34 | | Yuichi Saitoh,
Ikuyo Ibe,
Hideki Imai:
Peak-Shift and Bit Error-Correction with Channel Side Information in Runlength-Limited Sequences.
AAECC 1993: 304-315 |
33 | | Young C. Yoon,
Ryuji Kohno,
Hideki Imai:
A Spread-Spectrum Multiaccess System with Cochannel Interference Cancellation for Multipath Fading Channels.
IEEE Journal on Selected Areas in Communications 11(7): 1067-1075 (1993) |
32 | | Yuichi Saitoh,
Hideki Imai:
Some Codes for Correcting and Detecting Unidirectional Byte Errors.
IEEE Trans. Computers 42(5): 547-552 (1993) |
31 | | Yuichi Saitoh,
Hideki Imai:
Generalized concatenated codes for channels where unidirectional byte errors are predominant.
IEEE Transactions on Information Theory 39(3): 1014-1022 (1993) |
1992 |
30 | | Tsutomu Matsumoto,
Hideki Imai,
Chi-Sung Laih,
Sung-Ming Yen:
On Verifiable Implicit Asking Protocols for RSA Computation.
AUSCRYPT 1992: 296-307 |
29 | | Manuel Cerecedo,
Tsutomu Matsumoto,
Hideki Imai:
Non-Interactive Generation of Shared Pseudorandom Sequences.
AUSCRYPT 1992: 385-396 |
28 | EE | Keiichi Iwamura,
Tsutomu Matsumoto,
Hideki Imai:
High-Speed Implementation Methods for RSA Scheme.
EUROCRYPT 1992: 221-238 |
27 | EE | Keiichi Iwamura,
Tsutomu Matsumoto,
Hideki Imai:
Systolic-Arrays for Modular Exponentiation Using Montgomery Method (Extended Abstract).
EUROCRYPT 1992: 477-481 |
1991 |
26 | | Yuichi Saitoh,
Hideki Imai:
Random and Byte Error Correcting Codes for Asymmetric or Undirectional Error Control.
AAECC 1991: 403-413 |
25 | | Chaosheng Shu,
Tsutomu Matsumoto,
Hideki Imai:
A Multi-Purpose Proof System - for Identity and Membership Proofs.
ASIACRYPT 1991: 397-411 |
24 | EE | Ryuji Kohno,
Hideki Imai:
Combination of decoding of error-correcting codes and equalization for channels with intersymbol interference.
Discrete Applied Mathematics 33(1-3): 129-146 (1991) |
23 | | Yuichi Saitoh,
Hideki Imai:
Multiple unidirectional byte error-correcting codes.
IEEE Transactions on Information Theory 37(3): 903- (1991) |
1990 |
22 | | Ryuji Kohno,
Choonsik Yim,
Hideki Imai:
Trellis Coded Modulation Based on Time-Varying Mapping and Encoders for Utilitzing a Channel Intersymbol Interference.
AAECC 1990: 132-143 |
21 | | Kazuhiko Yamaguchi,
Hideki Imai:
Periodic Sequences for Absolute Type Shaft Encoders.
AAECC 1990: 36-45 |
20 | | Yuliang Zheng,
Tsutomu Matsumoto,
Hideki Imai:
Duality between Two Cryptographic Primitives.
AAECC 1990: 379-390 |
19 | | Yuichi Saitoh,
Hideki Imai:
Constructions of Codes Correcting Burst Asymmetric Errors.
AAECC 1990: 59-70 |
18 | EE | Yuliang Zheng,
Tsutomu Matsumoto,
Hideki Imai:
Structural Properties of One-way Hash Functions.
CRYPTO 1990: 285-302 |
17 | EE | Kwangjo Kim,
Tsutomu Matsumoto,
Hideki Imai:
A Recursive Construction Method of S-boxes Satisfying Strict Avalanche Criterion.
CRYPTO 1990: 564-574 |
16 | | Ryuji Kohno,
Hideki Imai,
Mitsutoshi Hatori,
Subbarayan Pasupathy:
Combination of an Adaptive Array Antenna and a Canceller of Interference for Direct-Sequence Spread-Spectrum Multiple-Access System.
IEEE Journal on Selected Areas in Communications 8(4): 675-681 (1990) |
15 | | Ryuji Kohno,
Hideki Imai,
Mitsutoshi Hatori,
Subbarayan Pasupathy:
An Adaptive Canceller of Cochannel Interference for Spread-Spectrum Multiple-Access Communication Networks in a Power Line.
IEEE Journal on Selected Areas in Communications 8(4): 691-699 (1990) |
14 | | Yuichi Saitoh,
Kazuhiko Yamaguchi,
Hideki Imai:
Some new binary codes correcting asymmetric/unidirectional errors.
IEEE Transactions on Information Theory 36(3): 645- (1990) |
1989 |
13 | EE | Yuliang Zheng,
Tsutomu Matsumoto,
Hideki Imai:
On the Construction of Block Ciphers Provably Secure and Not Relying on Any Unproved Hypotheses.
CRYPTO 1989: 461-480 |
12 | EE | Yuliang Zheng,
Tsutomu Matsumoto,
Hideki Imai:
Impossibility and Optimality Results on Constructing Pseudorandom Permutations (Extended Abstract).
EUROCRYPT 1989: 412-422 |
1988 |
11 | | Kazuhiko Yamaguchi,
Hideki Imai:
A Study on Imai-Hirakawa Trellis-Coded Modulation Schemes.
AAECC 1988: 443-453 |
10 | EE | Tsutomu Matsumoto,
Koki Kato,
Hideki Imai:
Speeding Up Secret Computations with Insecure Auxiliary Devices.
CRYPTO 1988: 497-506 |
9 | EE | Tsutomu Matsumoto,
Hideki Imai:
Public Quadratic Polynominal-Tuples for Efficient Signature-Verification and Message-Encryption.
EUROCRYPT 1988: 419-453 |
1987 |
8 | | Hideki Imai,
Tsutomu Matsumoto:
Coding Theory and its Applications in Japan.
AAECC 1987: 301-305 |
7 | EE | Tsutomu Matsumoto,
Hideki Imai:
On the Key Predistribution System: A Practical Solution to the Key Distribution Problem.
CRYPTO 1987: 185-193 |
6 | | Hirokazu Okano,
Hideki Imai:
A Construction Method of High-Speed Decoders Using ROMS's for Bose-Chaudhuri-Hocquenghem and Reed-Solomon Codes.
IEEE Trans. Computers 36(10): 1165-1171 (1987) |
1985 |
5 | | Hideki Imai,
Tsutomu Matsumoto:
Algebraic Methods for Constructing Asymmetric Cryptosystems.
AAECC 1985: 108-119 |
1984 |
4 | | Hideki Imai:
Multivariate polynomials in coding theory.
AAECC 1984: 36-60 |
1981 |
3 | | Susumu Suzuki,
Hideki Imai:
On Optimal Partition of a Query Set into Subsets Having the Consecutive Retrieval Property.
FODO 1981: 75-97 |
2 | | Hideki Imai,
Hiroshi Fujiya:
Generalized tensor product codes.
IEEE Transactions on Information Theory 27(2): 181-186 (1981) |
1977 |
1 | | Hideki Imai:
A Theory of Two-Dimensional Cyclic Codes
Information and Control 34(1): 1-21 (1977) |