2009 | ||
---|---|---|
225 | EE | Rui Zhang, Goichiro Hanaoka, Hideki Imai: A generic construction of useful client puzzles. ASIACCS 2009: 70-79 |
224 | EE | Takahiro Matsuda, Goichiro Hanaoka, Kanta Matsuura, Hideki Imai: An Efficient Encapsulation Scheme from Near Collision Resistant Pseudorandom Generators and Its Application to IBE-to-PKE Transformations. CT-RSA 2009: 16-31 |
223 | EE | Manabu Inuma, Akira Otsuka, Hideki Imai: Theoretical framework for constructing matching algorithms in biometric authentication systems CoRR abs/0904.1284: (2009) |
2008 | ||
222 | Sihan Qing, Hideki Imai, Guilin Wang: Information and Communications Security, 9th International Conference, ICICS 2007, Zhengzhou, China, December 12-15, 2007, Proceedings Springer 2008 | |
221 | EE | SeongHan Shin, Kazukuni Kobara, Hideki Imai: A security framework for personal networks. COMSWARE 2008: 682-690 |
220 | EE | Hisashi Oguma, Akira Yoshioka, Makoto Nishikawa, Rie Shigetomi, Akira Otsuka, Hideki Imai: New Attestation Based Security Architecture for In-Vehicle Communication. GLOBECOM 2008: 1909-1914 |
219 | EE | Huanfei Ma, Qinghui Lan, Haibin Kan, Hideki Imai: A Novel Quaternion Design Construction For STBC. ICC 2008: 2791-2795 |
218 | EE | Takahiro Matsuda, Goichiro Hanaoka, Kanta Matsuura, Hideki Imai: Simple CCA-Secure Public Key Encryption from Any Non-Malleable Identity-Based Encryption. ICISC 2008: 1-19 |
217 | EE | Goichiro Hanaoka, Hideki Imai, Kazuto Ogawa, Hajime Watanabe: Chosen Ciphertext Secure Public Key Encryption with a Simple Structure. IWSEC 2008: 20-33 |
216 | EE | Rui Zhang, Hideki Imai: Strong Anonymous Signatures. Inscrypt 2008: 60-71 |
215 | EE | Hideki Imai, Manabu Hagiwara: Error-correcting codes and cryptography. Appl. Algebra Eng. Commun. Comput. 19(3): 213-228 (2008) |
214 | EE | Hanane Fathi, SeongHan Shin, Kazukuni Kobara, Hideki Imai: Protocols for purpose-restricted anonymous communications in IP-based wireless networks. Computer Communications 31(15): 3662-3671 (2008) |
213 | EE | Ryo Nojima, Hideki Imai, Kazukuni Kobara, Kirill Morozov: Semantic security for the McEliece cryptosystem without random oracles. Des. Codes Cryptography 49(1-3): 289-305 (2008) |
212 | EE | Hideki Imai, Goichiro Hanaoka, Ueli M. Maurer, Yuliang Zheng: Introduction to the Special Issue on Information Theoretic Security. IEEE Transactions on Information Theory 54(6): 2405-2407 (2008) |
211 | EE | Anderson C. A. Nascimento, João Barros, Stefan Skludarek, Hideki Imai: The Commitment Capacity of the Gaussian Channel Is Infinite. IEEE Transactions on Information Theory 54(6): 2785-2789 (2008) |
210 | EE | SeongHan Shin, Kazukuni Kobara, Hideki Imai: A Secure Authenticated Key Exchange Protocol for Credential Services. IEICE Transactions 91-A(1): 139-149 (2008) |
209 | EE | Kunihiko Miyazaki, Goichiro Hanaoka, Hideki Imai: Invisibly Sanitizable Digital Signature Scheme. IEICE Transactions 91-A(1): 392-402 (2008) |
208 | EE | Kazukuni Kobara, Hideki Imai: IVs to Skip for Immunizing WEP against FMS Attack. IEICE Transactions 91-B(1): 164-171 (2008) |
207 | EE | Masashi Une, Akira Otsuka, Hideki Imai: Wolf Attack Probability: A Theoretical Security Measure in Biometric Authentication Systems. IEICE Transactions 91-D(5): 1380-1389 (2008) |
206 | EE | SeongHan Shin, Kazukuni Kobara, Hideki Imai: RSA-Based Password-Authenticated Key Exchange, Revisited. IEICE Transactions 91-D(5): 1424-1438 (2008) |
205 | EE | Yang Cui, Kazukuni Kobara, Kanta Matsuura, Hideki Imai: Lightweight Privacy-Preserving Authentication Protocols Secure against Active Attack in an Asymmetric Way. IEICE Transactions 91-D(5): 1457-1465 (2008) |
204 | EE | Takahiro Matsuda, Nuttapong Attrapadung, Goichiro Hanaoka, Kanta Matsuura, Hideki Imai: A Strongly Unforgeable Signature under the CDH Assumption without Collision Resistant Hash Functions. IEICE Transactions 91-D(5): 1466-1476 (2008) |
203 | EE | Valery I. Korzhik, Hideki Imai, Junji Shikata, Guillermo Morales-Luna, Ekaterina Gerling: On the Use of Bhattacharyya Distance as a Measure of the Detectability of Steganographic Systems. T. Data Hiding and Multimedia Security 3: 23-32 (2008) |
2007 | ||
202 | EE | Shigenori Yamakawa, Yang Cui, Kazukuni Kobara, Manabu Hagiwara, Hideki Imai: On the Key-Privacy Issue of McEliece Public-Key Encryption. AAECC 2007: 168-177 |
201 | EE | Koji Nuida, Satoshi Fujitsu, Manabu Hagiwara, Takashi Kitagawa, Hajime Watanabe, Kazuto Ogawa, Hideki Imai: An Improvement of Tardos's Collusion-Secure Fingerprinting Codes with Very Short Lengths. AAECC 2007: 80-89 |
200 | EE | Ronald Cramer, Goichiro Hanaoka, Dennis Hofheinz, Hideki Imai, Eike Kiltz, Rafael Pass, Abhi Shelat, Vinod Vaikuntanathan: Bounded CCA2-Secure Encryption. ASIACRYPT 2007: 502-518 |
199 | EE | Rui Zhang, Hideki Imai: Generic Combination of Public Key Encryption with Keyword Search and Public Key Encryption. CANS 2007: 159-174 |
198 | EE | Makoto Sugita, Mitsuru Kawazoe, Ludovic Perret, Hideki Imai: Algebraic Cryptanalysis of 58-Round SHA-1. FSE 2007: 349-365 |
197 | EE | Jun Furukawa, Hideki Imai: An Efficient Aggregate Shuffle Argument Scheme. Financial Cryptography 2007: 260-274 |
196 | EE | Masashi Une, Akira Otsuka, Hideki Imai: Wolf Attack Probability: A New Security Measure in Biometric Authentication Systems. ICB 2007: 396-406 |
195 | EE | Kazuto Ogawa, Go Ohtake, Goichiro Hanaoka, Hideki Imai: Trade-Off Traitor Tracing. INDOCRYPT 2007: 331-340 |
194 | EE | SeongHan Shin, Kazukuni Kobara, Hideki Imai: A Secure Threshold Anonymous Password-Authenticated Key Exchange Protocol. IWSEC 2007: 444-458 |
193 | EE | Koji Nuida, Manabu Hagiwara, Hajime Watanabe, Hideki Imai: Optimization of Tardos's Fingerprinting Codes in a Viewpoint of Memory Amount. Information Hiding 2007: 279-293 |
192 | EE | Rui Zhang, Goichiro Hanaoka, Hideki Imai: Orthogonality between Key Privacy and Data Privacy, Revisited. Inscrypt 2007: 313-327 |
191 | EE | Takahiro Matsuda, Goichiro Hanaoka, Kanta Matsuura, Hideki Imai: A Practical Provider Authentication System for Bidirectional Broadcast Service. KES (3) 2007: 967-974 |
190 | EE | Kazuto Ogawa, Goichiro Hanaoka, Kazukuni Kobara, Kanta Matsuura, Hideki Imai: Anonymous Pay-TV System with Secure Revenue Sharing. KES (3) 2007: 984-991 |
189 | EE | Yang Cui, Kazukuni Kobara, Kanta Matsuura, Hideki Imai: Lightweight Asymmetric Privacy-Preserving Authentication Protocols Secure against Active Attack. PerCom Workshops 2007: 223-228 |
188 | EE | Yang Cui, Eiichiro Fujisaki, Goichiro Hanaoka, Hideki Imai, Rui Zhang: Formal Security Treatments for Signatures from Identity-Based Encryption. ProvSec 2007: 218-227 |
187 | EE | Takahiro Matsuda, Nuttapong Attrapadung, Goichiro Hanaoka, Kanta Matsuura, Hideki Imai: A CDH-Based Strongly Unforgeable Signature Without Collision Resistant Hash Function. ProvSec 2007: 68-84 |
186 | EE | Rei Yoshida, Rie Shigetomi, Kazuki Yoshizoe, Akira Otsuka, Hideki Imai: A Privacy Protection Scheme for a Scalable Control Method in Context-Dependent Services. WEWoRC 2007: 1-12 |
185 | EE | Toru Hashimoto, Takashi Itoh, Masazumi Ueba, Hisato Iwai, Hideichi Sasaoka, Kazukuni Kobara, Hideki Imai: Comparative Studies in Key Disagreement Correction Process on Wireless Key Agreement System. WISA 2007: 173-187 |
184 | EE | Marc P. C. Fossorier, Kazukuni Kobara, Hideki Imai: Modeling Bit Flipping Decoding Based on Nonorthogonal Check Sums With Application to Iterative Decoding Attack of McEliece Cryptosystem. IEEE Transactions on Information Theory 53(1): 402-411 (2007) |
183 | EE | Marc P. C. Fossorier, Miodrag J. Mihaljevic, Hideki Imai: Modeling Block Decoding Approaches for the Fast Correlation Attack. IEEE Transactions on Information Theory 53(12): 4728-4737 (2007) |
182 | EE | Nuttapong Attrapadung, Hideki Imai: Practical Broadcast Encryption from Graph-Theoretic Techniques and Subset-Incremental-Chain Structure. IEICE Transactions 90-A(1): 187-203 (2007) |
181 | EE | SeongHan Shin, Kazukuni Kobara, Hideki Imai: An Efficient and Leakage-Resilient RSA-Based Authenticated Key Exchange Protocol with Tight Security Reduction. IEICE Transactions 90-A(2): 474-490 (2007) |
180 | EE | Kazuto Ogawa, Goichiro Hanaoka, Hideki Imai: Traitor Tracing Scheme Secure against Adaptive Key Exposure and its Application to Anywhere TV Service. IEICE Transactions 90-A(5): 1000-1011 (2007) |
179 | EE | Miodrag J. Mihaljevic, Marc P. C. Fossorier, Hideki Imai: Birthday Paradox Based Security Analysis of Certain Broadcast Encryption Schemes. IEICE Transactions 90-A(6): 1248-1251 (2007) |
178 | EE | Nuttapong Attrapadung, Jun Furukawa, Takeshi Gomi, Goichiro Hanaoka, Hideki Imai, Rui Zhang: Efficient Identity-Based Encryption with Tight Security Reduction. IEICE Transactions 90-A(9): 1803-1813 (2007) |
177 | EE | Thi Lan Anh Phan, Goichiro Hanaoka, Kanta Matsuura, Hideki Imai: Key-Insulated Public Key Encryption with Auxiliary Helper Key: Model, Constructions and Formal Security Proofs. IEICE Transactions 90-A(9): 1814-1829 (2007) |
176 | EE | Kazuto Ogawa, Goichiro Hanaoka, Hideki Imai: Extension of Broadcasting Service by Using Electronic Tokens. IEICE Transactions 90-D(11): 1741-1750 (2007) |
2006 | ||
175 | Marc P. C. Fossorier, Hideki Imai, Shu Lin, Alain Poli: Applied Algebra, Algebraic Algorithms and Error-Correcting Codes, 16th International Symposium, AAECC-16, Las Vegas, NV, USA, February 20-24, 2006, Proceedings Springer 2006 | |
174 | EE | Goichiro Hanaoka, Yumiko Hanaoka, Manabu Hagiwara, Hajime Watanabe, Hideki Imai: Unconditionally Secure Chaffing-and-Winnowing: A Relationship Between Encryption and Authentication. AAECC 2006: 154-162 |
173 | EE | Yang Cui, Kazukuni Kobara, Hideki Imai: On Achieving Chosen Ciphertext Security with Decryption Errors. AAECC 2006: 173-182 |
172 | EE | Peng Yang, Takashi Kitagawa, Goichiro Hanaoka, Rui Zhang, Kanta Matsuura, Hideki Imai: Applying Fujisaki-Okamoto to Identity-Based Encryption. AAECC 2006: 183-192 |
171 | EE | Manabu Hagiwara, Goichiro Hanaoka, Hideki Imai: A Short Random Fingerprinting Code Against a Small Number of Pirates. AAECC 2006: 193-202 |
170 | EE | Miodrag J. Mihaljevic, Marc P. C. Fossorier, Hideki Imai: A General Formulation of Algebraic and Fast Correlation Attacks Based on Dedicated Sample Decimation. AAECC 2006: 203-214 |
169 | EE | Kazuto Ogawa, Goichiro Hanaoka, Hideki Imai: Adaptively Secure Traitor Tracing Against Key Exposure and Its Application to Anywhere TV Service. ACISP 2006: 123-135 |
168 | EE | Takashi Kitagawa, Peng Yang, Goichiro Hanaoka, Rui Zhang, Hajime Watanabe, Kanta Matsuura, Hideki Imai: Generic Transforms to Acquire CCA-Security for Identity Based Encryption: The Cases of FOpkc and REACT. ACISP 2006: 348-359 |
167 | EE | Masayuki Abe, Yang Cui, Hideki Imai, Kaoru Kurosawa: Tag-KEM from Set Partial Domain One-Way Permutations. ACISP 2006: 360-370 |
166 | EE | Jian Wang, Miodrag J. Mihaljevic, Lein Harn, Hideki Imai: A Hierarchical Key Management Approach for Secure Multicast. ARCS 2006: 422-434 |
165 | EE | Kunihiko Miyazaki, Goichiro Hanaoka, Hideki Imai: Digitally signed document sanitizing scheme based on bilinear maps. ASIACCS 2006: 343-354 |
164 | EE | Nuttapong Attrapadung, Jun Furukawa, Hideki Imai: Forward-Secure and Searchable Broadcast Encryption with Short Ciphertexts and Private Keys. ASIACRYPT 2006: 161-177 |
163 | EE | Nuttapong Attrapadung, Jun Furukawa, Takeshi Gomi, Goichiro Hanaoka, Hideki Imai, Rui Zhang: Efficient Identity-Based Encryption with Tight Security Reduction. CANS 2006: 19-36 |
162 | EE | SeongHan Shin, Kazukuni Kobara, Hideki Imai: An Elliptic Curve Based Authenticated Key Agreement Protocol for Wireless Security. CIS 2006: 767-777 |
161 | EE | SeongHan Shin, Hanane Fathi, Mohamed Imine, Kazukuni Kobara, Neeli R. Prasad, Hideki Imai: A New Security Architecture for Personal Networks. GLOBECOM 2006 |
160 | EE | Jun Furukawa, Kaoru Kurosawa, Hideki Imai: An Efficient Compiler from Sigma-Protocol to 2-Move Deniable Zero-Knowledge. ICALP (2) 2006: 46-57 |
159 | EE | Tatsuyuki Matsushita, Hideki Imai: Hierarchical Key Assignment for Black-Box Tracing with Efficient Ciphertext Size. ICICS 2006: 92-111 |
158 | EE | Ryo Nojima, Kazukuni Kobara, Hideki Imai: Efficient Shared-Key Authentication Scheme from Any Weak Pseudorandom Function. INDOCRYPT 2006: 303-316 |
157 | EE | Marc P. C. Fossorier, Miodrag J. Mihaljevic, Hideki Imai, Yang Cui, Kanta Matsuura: An Algorithm for Solving the LPN Problem and Its Application to Security Evaluation of the HB Protocols for RFID Authentication. INDOCRYPT 2006: 48-62 |
156 | EE | SeongHan Shin, Kazukuni Kobara, Hideki Imai: An Authentication and Key Exchange Protocol for Secure Credential Services. ISC 2006: 443-458 |
155 | EE | Nuttapong Attrapadung, Yang Cui, David Galindo, Goichiro Hanaoka, Ichiro Hasuo, Hideki Imai, Kanta Matsuura, Peng Yang, Rui Zhang: Relations Among Notions of Security for Identity Based Encryption Schemes. LATIN 2006: 130-141 |
154 | EE | Goichiro Hanaoka, Yumiko Hanaoka, Hideki Imai: Parallel Key-Insulated Public Key Encryption. Public Key Cryptography 2006: 105-122 |
153 | EE | Thi Lan Anh Phan, Yumiko Hanaoka, Goichiro Hanaoka, Kanta Matsuura, Hideki Imai: Reducing the Spread of Damage of Key Exposures in Key-Insulated Encryption. VIETCRYPT 2006: 366-384 |
152 | EE | Koji Nuida, Manabu Hagiwara, Hajime Watanabe, Hideki Imai: Optimal probabilistic fingerprinting codes using optimal finite random variables related to numerical quadrature CoRR abs/cs/0610036: (2006) |
151 | EE | Goichiro Hanaoka, Junji Shikata, Yumiko Hanaoka, Hideki Imai: Unconditionally Secure Anonymous Encryption and Group Authentication. Comput. J. 49(3): 310-321 (2006) |
150 | EE | Hanane Fathi, SeongHan Shin, Kazukuni Kobara, Shyam S. Chakraborty, Hideki Imai, Ramjee Prasad: LR-AKE-Based AAA for Network Mobility (NEMO) Over Wireless Links. IEEE Journal on Selected Areas in Communications 24(9): 1725-1737 (2006) |
149 | EE | Makoto Sugita, Mitsuru Kawazoe, Hideki Imai: Relation between the XL Algorithm and Gröbner Basis Algorithms. IEICE Transactions 89-A(1): 11-18 (2006) |
148 | EE | Tetsutaro Kobayashi, Kazumaro Aoki, Hideki Imai: Efficient Algorithms for Tate Pairing. IEICE Transactions 89-A(1): 134-143 (2006) |
147 | EE | Masayuki Abe, Hideki Imai: Flaws in Robust Optimistic Mix-Nets and Stronger Security Notions. IEICE Transactions 89-A(1): 99-105 (2006) |
146 | EE | Jun Furukawa, Hideki Imai: An Efficient Group Signature Scheme from Bilinear Maps. IEICE Transactions 89-A(5): 1328-1338 (2006) |
145 | EE | Rie Shigetomi, Akira Otsuka, Jun Furukawa, Keith Martin, Hideki Imai: A Provably Secure Refreshable Partially Anonymous Token and Its Applications. IEICE Transactions 89-A(5): 1396-1406 (2006) |
144 | EE | Kazukuni Kobara, Hideki Imai: Key-Dependent Weak IVs and Weak Keys in WEP - How to Trace Conditions Back to Their Patterns - . IEICE Transactions 89-A(8): 2198-2206 (2006) |
143 | EE | Abdulrahman Alharby, Hideki Imai: Security Protocols Protection Based on Anomaly Detection. IEICE Transactions 89-D(1): 189-200 (2006) |
2005 | ||
142 | EE | Jun Furukawa, Hideki Imai: An Efficient Group Signature Scheme from Bilinear Maps. ACISP 2005: 455-467 |
141 | EE | Abdulrahman Alharby, Hideki Imai: IDS False Alarm Reduction Using Continuous and Discontinuous Patterns. ACNS 2005: 192-205 |
140 | EE | SeongHan Shin, Kazukuni Kobara, Hideki Imai: Efficient and Leakage-Resilient Authenticated Key Transport Protocol Based on RSA. ACNS 2005: 269-284 |
139 | EE | Rui Zhang, Jun Furukawa, Hideki Imai: Short Signature and Universal Designated Verifier Signature Without Random Oracles. ACNS 2005: 483-498 |
138 | EE | Nuttapong Attrapadung, Hideki Imai: Graph-Decomposition-Based Frameworks for Subset-Cover Broadcast Encryption and Efficient Instantiations. ASIACRYPT 2005: 100-120 |
137 | EE | Yumiko Hanaoka, Goichiro Hanaoka, Junji Shikata, Hideki Imai: Identity-Based Hierarchical Strongly Key-Insulated Encryption and Its Application. ASIACRYPT 2005: 495-514 |
136 | EE | Haruhiro Yoshimoto, Rie Shigetomi, Hideki Imai: How to Protect Peer-to-Peer Online Games from Cheats. CIG 2005 |
135 | EE | Rui Zhang, Hideki Imai: Improvements on Security Proofs of Some Identity Based Encryption Schemes. CISC 2005: 28-41 |
134 | EE | Yang Cui, Kazukuni Kobara, Hideki Imai: A Generic Conversion with Optimal Redundancy. CT-RSA 2005: 104-117 |
133 | EE | Miodrag J. Mihaljevic, Marc P. C. Fossorier, Hideki Imai: Security Weaknesses of Certain Broadcast Encryption Schemes. DRMTICS 2005: 228-245 |
132 | EE | Miodrag J. Mihaljevic, Marc P. C. Fossorier, Hideki Imai: A Novel Broadcast Encryption Based on Time-Bound Cryptographic Keys. DRMTICS 2005: 258-276 |
131 | EE | SeongHan Shin, Kazukuni Kobara, Hideki Imai: A Lower-Bound of Complexity for RSA-Based Password-Authenticated Key Exchange. EuroPKI 2005: 191-205 |
130 | EE | Jian Wang, Lein Harn, Hideki Imai: Key Management for Multicast Fingerprinting. ICISS 2005: 191-204 |
129 | EE | SeongHan Shin, Kazukuni Kobara, Hideki Imai: A Simplified Leakage-Resilient Authenticated Key Exchange Protocol with Optimal Memory Size. ICN (2) 2005: 944-952 |
128 | EE | Miodrag J. Mihaljevic, Marc P. C. Fossorier, Hideki Imai: Cryptanalysis of Keystream Generator by Decimated Sample Based Algebraic and Fast Correlation Attacks. INDOCRYPT 2005: 155-168 |
127 | EE | Abdulrahman Alharby, Hideki Imai: Hybrid Intrusion Detection Model Based on Ordered Sequences. MMM-ACNS 2005: 352-365 |
126 | EE | Hideki Imai: Trends and Challenges for Securer Cryptography in Practice. Mycrypt 2005: 1 |
125 | SeongHan Shin, Kazukuni Kobara, Hideki Imai: A Secure Network Storage System with Information Privacy. WEWoRC 2005: 22-31 | |
124 | EE | Hideki Imai, Atsuhiro Yamagishi: Cryptrec. Encyclopedia of Cryptography and Security 2005 |
123 | EE | Kazuto Ogawa, Goichiro Hanaoka, Hideki Imai: A Secure Traitor Tracing Scheme against Key Exposure CoRR abs/cs/0508011: (2005) |
122 | EE | Hanane Fathi, SeongHan Shin, Kazukuni Kobara, Shyam S. Chakraborty, Hideki Imai, Ramjee Prasad: Leakage-resilient security architecture for mobile IPv6 in wireless overlay networks. IEEE Journal on Selected Areas in Communications 23(11): 2182-2193 (2005) |
121 | EE | Kunihiko Miyazaki, Mitsuru Iwamura, Tsutomu Matsumoto, Ryôichi Sasaki, Hiroshi Yoshiura, Satoru Tezuka, Hideki Imai: Digitally Signed Document Sanitizing Scheme with Disclosure Condition Control. IEICE Transactions 88-A(1): 239-246 (2005) |
120 | EE | JaeGwi Choi, Goichiro Hanaoka, KyungHyune Rhee, Hideki Imai: How to Break COT-Based Fingerprinting Schemes and Design New One. IEICE Transactions 88-A(10): 2800-2807 (2005) |
119 | EE | SeongHan Shin, Kazukuni Kobara, Hideki Imai: A Simple Leakage-Resilient Authenticated Key Establishment Protocol, Its Extensions, and Applications. IEICE Transactions 88-A(3): 736-754 (2005) |
118 | EE | Tatsuyuki Matsushita, Hideki Imai: A Flexible-Revocation Scheme for Efficient Public-Key Black-Box Traitor Tracing. IEICE Transactions 88-A(4): 1055-1062 (2005) |
2004 | ||
117 | EE | Goichiro Hanaoka, Hideki Imai, Jörn Müller-Quade, Anderson C. A. Nascimento, Akira Otsuka, Andreas Winter: Information Theoretically Secure Oblivious Polynomial Evaluation: Model, Bounds, and Constructions. ACISP 2004: 62-73 |
116 | EE | Anderson C. A. Nascimento, Jörn Müller-Quade, Akira Otsuka, Goichiro Hanaoka, Hideki Imai: Unconditionally Non-interactive Verifiable Secret Sharing Secure against Faulty Majorities in the Commodity Based Model. ACNS 2004: 355-368 |
115 | EE | Rui Zhang, Goichiro Hanaoka, Hideki Imai: On the Security of Cryptosystems with All-or-Nothing Transform. ACNS 2004: 76-90 |
114 | EE | Tatsuyuki Matsushita, Hideki Imai: A Public-Key Black-Box Traitor Tracing Scheme with Sublinear Ciphertext Size Against Self-Defensive Pirates. ASIACRYPT 2004: 260-275 |
113 | EE | Gwénolé Ars, Jean-Charles Faugère, Hideki Imai, Mitsuru Kawazoe, Makoto Sugita: Comparison Between XL and Gröbner Basis Algorithms. ASIACRYPT 2004: 338-353 |
112 | EE | Anderson C. A. Nascimento, Jörn Müller-Quade, Hideki Imai: Bit String Commitment Reductions with a Non-zero Rate. CT-RSA 2004: 179-193 |
111 | EE | Miodrag J. Mihaljevic, Marc P. C. Fossorier, Hideki Imai: Secret-Public Storage Trade-Off for Broadcast Encryption Key Management. ICICS 2004: 375-387 |
110 | EE | Rui Zhang, Goichiro Hanaoka, Junji Shikata, Hideki Imai: On the Security of Multiple Encryption or CCA-security+CCA-security=CCA-security? Public Key Cryptography 2004: 360-374 |
109 | EE | Miodrag J. Mihaljevic, Hideki Imai: The Decimated Sample Based Improved Algebraic Attacks on the Nonlinear Filters. SCN 2004: 310-323 |
108 | EE | Mira Kim, Kazukuni Kobara, Hideki Imai: Dynamic Fingerprinting over Broadcast Using Revocation Scheme. WISA 2004: 251-263 |
107 | EE | Motohiko Isaka, Marc P. C. Fossorier, Hideki Imai: On the suboptimality of iterative decoding for turbo-like and LDPC codes with cycles in their graph representation. IEEE Transactions on Communications 52(5): 845-854 (2004) |
106 | EE | Tadashi Minowa, Hideki Ochiai, Hideki Imai: Phase-noise effects on turbo trellis-coded over M-ary coherent channels. IEEE Transactions on Communications 52(8): 1333-1343 (2004) |
105 | EE | Goichiro Hanaoka, Junji Shikata, Yuliang Zheng, Hideki Imai: Efficient Unconditionally Secure Digital Signatures. IEICE Transactions 87-A(1): 120-130 (2004) |
104 | EE | Goichiro Hanaoka, Kazuto Ogawa, Itsuro Murota, Go Ohtake, Keigo Majima, Seiichi Gohshi, Kimiyuki Oyamada, Seiichi Namba, Hideki Imai: Managing Encryption and Key Publication Independently in Digital Rights Management Systems. IEICE Transactions 87-A(1): 160-172 (2004) |
2003 | ||
103 | EE | Anderson C. A. Nascimento, Akira Otsuka, Hideki Imai, Jörn Müller-Quade: Unconditionally Secure Homomorphic Pre-distributed Commitments. AAECC 2003: 87-97 |
102 | EE | Goichiro Hanaoka, Kazuto Ogawa, Itsuro Murota, Go Ohtake, Keigo Majima, Kimiyuki Oyamada, Seiichi Gohshi, Seiichi Namba, Hideki Imai: Separating Encryption and Key Issuance in Digital Rights Management Systems. ACISP 2003: 365-376 |
101 | EE | Masayuki Abe, Hideki Imai: Flaws in Some Robust Optimistic Mix-Nets. ACISP 2003: 39-50 |
100 | EE | Rui Zhang, Hideki Imai: Round Optimal Distributed Key Generation of Threshold Cryptosystem Based on Discrete Logarithm Problem. ACNS 2003: 96-110 |
99 | EE | SeongHan Shin, Kazukuni Kobara, Hideki Imai: Leakage-Resilient Authenticated Key Establishment Protocols. ASIACRYPT 2003: 155-172 |
98 | EE | Nuttapong Attrapadung, Kazukuni Kobara, Hideki Imai: Sequential Key Derivation Patterns for Broadcast Encryption and Key Predistribution Schemes. ASIACRYPT 2003: 374-391 |
97 | EE | Nuttapong Attrapadung, Kazukuni Kobara, Hideki Imai: Broadcast encryption with short keys and transmissions. Digital Rights Management Workshop 2003: 55-66 |
96 | EE | Yang Cui, Kazukuni Kobara, Hideki Imai: Compact Conversion Schemes for the Probabilistic OW-PCA Primitives. ICICS 2003: 269-279 |
95 | EE | Andreas Winter, Anderson C. A. Nascimento, Hideki Imai: Commitment Capacity of Discrete Memoryless Channels. IMA Int. Conf. 2003: 35-51 |
94 | EE | Anderson C. A. Nascimento, Jörn Müller-Quade, Akira Otsuka, Goichiro Hanaoka, Hideki Imai: Unconditionally Secure Homomorphic Pre-distributed Bit Commitment and Secure Two-Party Computations. ISC 2003: 151-164 |
93 | EE | Goichiro Hanaoka, Junji Shikata, Yumiko Hanaoka, Hideki Imai: The Role of Arbiters in Asymmetric Authentication Schemes. ISC 2003: 428-441 |
92 | EE | Yodai Watanabe, Junji Shikata, Hideki Imai: Equivalence between Semantic Security and Indistinguishability against Chosen Ciphertext Attacks. Public Key Cryptography 2003: 71-84 |
91 | EE | Rie Shigetomi, Akira Otsuka, Hideki Imai: Anonymous authentication scheme for XML security standard with Refreshable Tokens. XML Security 2003: 86-93 |
90 | EE | Andreas Winter, Anderson C. A. Nascimento, Hideki Imai: Commitment Capacity of Discrete Memoryless Channels CoRR cs.CR/0304014: (2003) |
89 | Kazukuni Kobara, Hideki Imai: On the one-wayness against chosen-plaintext attacks of the Loidreau's modified McEliece PKC. IEEE Transactions on Information Theory 49(12): 3160-3168 (2003) | |
2002 | ||
88 | EE | Goichiro Hanaoka, Junji Shikata, Yumiko Hanaoka, Hideki Imai: Unconditionally Secure Anonymous Encryption and Group Authentication. ASIACRYPT 2002: 81-99 |
87 | EE | Junji Shikata, Goichiro Hanaoka, Yuliang Zheng, Hideki Imai: Security Notions for Unconditionally Secure Signature Schemes. EUROCRYPT 2002: 434-449 |
86 | Kanta Matsuura, Hideki Imai: Digital Timestamps for Dispute Settlement in Electronic Commerce: Generation, Verification, and Renewal. ICEIS 2002: 962-967 | |
85 | EE | Yumiko Hanaoka, Goichiro Hanaoka, Junji Shikata, Hideki Imai: Unconditionally Secure Key Insulated Cryptosystems: Models, Bounds and Constructions. ICICS 2002: 85-96 |
84 | EE | Rie Shigetomi, Akira Otsuka, Takahide Ogawa, Hideki Imai: An Anonymous Loan System Based on Group Signature Scheme. ISC 2002: 244-256 |
83 | EE | Shoko Yonezawa, Goichiro Hanaoka, Junji Shikata, Hideki Imai: Traceability Schemes for Signed Documents. ISC 2002: 257-271 |
82 | EE | Kazukuni Kobara, Hideki Imai: New Chosen-Plaintext Attacks on the One-Wayness of the Modified McEliece PKC Proposed at Asiacrypt 2000. Public Key Cryptography 2002: 237-251 |
81 | EE | Goichiro Hanaoka, Junji Shikata, Yuliang Zheng, Hideki Imai: Efficient and Unconditionally Secure Digital Signatures and a Security Analysis of a Multireceiver Authentication Code. Public Key Cryptography 2002: 64-79 |
80 | EE | Paul Camion, Miodrag J. Mihaljevic, Hideki Imai: Two Alerts for Design of Certain Stream Ciphers: Trapped LFSR and Weak Resilient Function over GF(q). Selected Areas in Cryptography 2002: 196-213 |
79 | EE | Goichiro Hanaoka, Tsuyoshi Nishioka, Yuliang Zheng, Hideki Imai: A Hierarchical Non-interactive Key-Sharing Scheme with Low Memory Size and High Resistance against Collusion Attacks. Comput. J. 45(3): 293-303 (2002) |
2001 | ||
78 | EE | Makoto Sugita, Kazukuni Kobara, Hideki Imai: Security of Reduced Version of the Block Cipher Camellia against Truncated and Impossible Differential Cryptanalysis. ASIACRYPT 2001: 193-207 |
77 | EE | Yuji Watanabe, Goichiro Hanaoka, Hideki Imai: Efficient Asymmetric Public-Key Traitor Tracing without Trusted Agents. CT-RSA 2001: 392-407 |
76 | EE | Miodrag J. Mihaljevic, Marc P. C. Fossorier, Hideki Imai: Fast Correlation Attack Algorithm with List Decoding and an Application. FSE 2001: 196-210 |
75 | EE | Kazukuni Kobara, Hideki Imai: Semantically Secure McEliece Public-Key Cryptosystems-Conversions for McEliece PKC. Public Key Cryptography 2001: 19-35 |
74 | EE | Hirotaka Komaki, Yuji Watanabe, Goichiro Hanaoka, Hideki Imai: Efficient Asymmetric Self-Enforcement Scheme with Public Traceability. Public Key Cryptography 2001: 225-239 |
73 | EE | Jörn Müller-Quade, Hideki Imai: More Robust Multiparty Protocols with Oblivious Transfer CoRR cs.CR/0101020: (2001) |
72 | EE | Kazukuni Kobara, Hideki Imai: Pretty-Simple Password-Authenticated Key-Exchange Protocol CoRR cs.CR/0110024: (2001) |
71 | EE | Anderson C. A. Nascimento, Jörn Müller-Quade, Hideki Imai: Quantum Identification Protocol with Technologically Bounded Parties. Electronic Notes in Discrete Mathematics 6: 15-24 (2001) |
2000 | ||
70 | Hideki Imai, Yuliang Zheng: Public Key Cryptography, Third International Workshop on Practice and Theory in Public Key Cryptography, PKC 2000, Melbourne, Victoria, Australia, January 18-20, 2000, Proceedings Springer 2000 | |
69 | EE | Yuji Watanabe, Hideki Imai: Reducing the round complexity of a sealed-bid auction protocol with an off-line TTP. ACM Conference on Computer and Communications Security 2000: 80-86 |
68 | Makoto Sugita, Kazukuni Kobara, Kazuhiro Uehara, Shuji Kubota, Hideki Imai: Relationships among Differential, Truncated Differential, Impossible Differential Cryptanalyses against Word-Oriented Block Ciphers like RIJNDAEL, E2. AES Candidate Conference 2000: 242-254 | |
67 | EE | Goichiro Hanaoka, Junji Shikata, Yuliang Zheng, Hideki Imai: Unconditionally Secure Digital Signature Schemes Admitting Transferability. ASIACRYPT 2000: 130-142 |
66 | EE | Hideki Imai, Atsuhiro Yamagishi: CRYPTREC Project - Cryptographic Evaluation Project for the Japanese Electronic Government. ASIACRYPT 2000: 399-400 |
65 | EE | Miodrag J. Mihaljevic, Marc P. C. Fossorier, Hideki Imai: A Low-Complexity and High-Performance Algorithm for the Fast Correlation Attack. FSE 2000: 196-212 |
64 | EE | Daisuke Nojiri, Goichiro Hanaoka, Hideki Imai: A Practical Implementation of Hierarchically Structured Key Predistribution System and Its Evaluation. ISW 2000: 224-236 |
63 | EE | Jörn Müller-Quade, Hideki Imai: Anonymous Oblivious Transfer CoRR cs.CR/0011004: (2000) |
62 | Xian-Mo Zhang, Yuliang Zheng, Hideki Imai: Relating Differential Distribution Tables to Other Properties of of Substitution Boxes. Des. Codes Cryptography 19(1): 45-63 (2000) | |
1999 | ||
61 | Hideki Imai, Yuliang Zheng: Public Key Cryptography, Second International Workshop on Practice and Theory in Public Key Cryptography, PKC '99, Kamakura, Japan, March 1-3, 1999, Proceedings Springer 1999 | |
60 | Marc P. C. Fossorier, Hideki Imai, Shu Lin, Alain Poli: Applied Algebra, Algebraic Algorithms and Error-Correcting Codes, 13th International Symposium, AAECC-13, Honolulu, Hawaii, USA, November 15-19, 1999, Proceedings Springer 1999 | |
59 | Marc P. C. Fossorier, Miodrag J. Mihaljevic, Hideki Imai: Critical Noise for Convergence of Iterative Probabilistic Decoding with Belief Propagation in Cryptographic Applications. AAECC 1999: 282-293 | |
58 | Goichiro Hanaoka, Tsuyoshi Nishioka, Yuliang Zheng, Hideki Imai: An Efficient Hierarchical Identity-Based Key-Sharing Method Resistant against Collusion-Attacks. ASIACRYPT 1999: 348-362 | |
57 | Junji Shikata, Yuliang Zheng, Joe Suzuki, Hideki Imai: Optimizing the Menezes-Okamoto-Vanstone (MOV) Algorithm for Non-supersingular Elliptic Curves. ASIACRYPT 1999: 86-102 | |
56 | EE | Ryuichi Harasawa, Junji Shikata, Joe Suzuki, Hideki Imai: Comparing the MOV and FR Reductions in Elliptic Curve Cryptography. EUROCRYPT 1999: 190-205 |
55 | EE | Markus Breitbach, Hideki Imai: On Channel Capacity and Modulation of Watermarks in Digital Still Images. Financial Cryptography 1999: 125-139 |
54 | Goichiro Hanaoka, Tsuyoshi Nishioka, Yuliang Zheng, Hideki Imai: Optimal Construction of Unconditionally Secure ID-Based Key Sharing Scheme for Large-Scale Networks. ICICS 1999: 157-168 | |
53 | Kazukuni Kobara, Hideki Imai: On the Channel Capacity of Narrow-Band Subliminal Channels. ICICS 1999: 309-323 | |
52 | EE | Yuji Watanabe, Hideki Imai: Active Rebooting Method for Proactivized System: How to Enhance the Security against Latent Virus Attacks. ISW 1999: 118-135 |
51 | EE | Tsuyoshi Nishioka, Goichiro Hanaoka, Hideki Imai: A New Digital Signature Scheme on ID-Based Key-Sharing Infrastructures. ISW 1999: 259-270 |
50 | EE | Yuji Watanabe, Hideki Imai: Shared Generation of Random Number with Timestamp: How to Cope with the Leakage of the CA's Secret. Public Key Cryptography 1999: 290-305 |
49 | EE | Yuliang Zheng, Xian-Mo Zhang, Hideki Imai: Restriction, Terms and Nonlinearity of Boolean Functions. Theor. Comput. Sci. 226(1-2): 207-223 (1999) |
1998 | ||
48 | Hideki Imai, Yuliang Zheng: Public Key Cryptography, First International Workshop on Practice and Theory in Public Key Cryptography, PKC '98, Pacifico Yokohama, Japan, February 5-6, 1998, Proceedings Springer 1998 | |
47 | EE | Goichiro Hanaoka, Yuliang Zheng, Hideki Imai: LITESET: A Light-Weight Secure Electronic Transaction Protocol. ACISP 1998: 215-226 |
46 | Kazukuni Kobara, Hideki Imai: A successive carrier-transmission model for narrow-band subliminal channels. ICISC 1998: 179-187 | |
45 | Yuliang Zheng, Hideki Imai: Compact and Unforgeable Key Establishment over an ATM Network. INFOCOM 1998: 411-418 | |
44 | EE | Miodrag J. Mihaljevic, Yuliang Zheng, Hideki Imai: A Cellular Automaton Based Fast One-Way Hash Function Suitable for Hardware Implementation. Public Key Cryptography 1998: 217-233 |
43 | Kanta Matsuura, Yuliang Zheng, Hideki Imai: Compact and Flexible Resolution of CBT Multicast Key-Distribution. WWCA 1998: 190-205 | |
42 | EE | Yuliang Zheng, Hideki Imai: How to Construct Efficient Signcryption Schemes on Elliptic Curves. Inf. Process. Lett. 68(5): 227-233 (1998) |
1997 | ||
41 | Xian-Mo Zhang, Yuliang Zheng, Hideki Imai: Duality of Boolean functions and its cryptographic significance. ICICS 1997: 159-169 | |
40 | Kazukuni Kobara, Hideki Imai: Self-synchronized message randomization methods for subliminal channels. ICICS 1997: 325-334 | |
1996 | ||
39 | Kazukuni Kobara, Hideki Imai: Limiting the Visible Space Visual Secret Sharing Schemes and Their Application to Human Identification. ASIACRYPT 1996: 185-195 | |
38 | P. CharnKeitKong, Hideki Imai, Kazuhiko Yamaguchi: On classes of rate k/(k+1) convolutional codes and their decoding techniques. IEEE Transactions on Information Theory 42(6): 2181-2193 (1996) | |
1995 | ||
37 | Keiichi Iwamura, Yasunori Dohi, Hideki Imai: A Design of Reed-Solomon Decoder with Systolic Array Structure. IEEE Trans. Computers 44(1): 118-122 (1995) | |
1994 | ||
36 | Hideki Imai: Information Security Aspects of Spread Spectrum Systems. ASIACRYPT 1994: 193-208 | |
1993 | ||
35 | Hideki Imai, Ronald L. Rivest, Tsutomu Matsumoto: Advances in Cryptology - ASIACRYPT '91, International Conference on the Theory and Applications of Cryptology, Fujiyoshida, Japan, November 11-14, 1991, Proceedings Springer 1993 | |
34 | Yuichi Saitoh, Ikuyo Ibe, Hideki Imai: Peak-Shift and Bit Error-Correction with Channel Side Information in Runlength-Limited Sequences. AAECC 1993: 304-315 | |
33 | Young C. Yoon, Ryuji Kohno, Hideki Imai: A Spread-Spectrum Multiaccess System with Cochannel Interference Cancellation for Multipath Fading Channels. IEEE Journal on Selected Areas in Communications 11(7): 1067-1075 (1993) | |
32 | Yuichi Saitoh, Hideki Imai: Some Codes for Correcting and Detecting Unidirectional Byte Errors. IEEE Trans. Computers 42(5): 547-552 (1993) | |
31 | Yuichi Saitoh, Hideki Imai: Generalized concatenated codes for channels where unidirectional byte errors are predominant. IEEE Transactions on Information Theory 39(3): 1014-1022 (1993) | |
1992 | ||
30 | Tsutomu Matsumoto, Hideki Imai, Chi-Sung Laih, Sung-Ming Yen: On Verifiable Implicit Asking Protocols for RSA Computation. AUSCRYPT 1992: 296-307 | |
29 | Manuel Cerecedo, Tsutomu Matsumoto, Hideki Imai: Non-Interactive Generation of Shared Pseudorandom Sequences. AUSCRYPT 1992: 385-396 | |
28 | EE | Keiichi Iwamura, Tsutomu Matsumoto, Hideki Imai: High-Speed Implementation Methods for RSA Scheme. EUROCRYPT 1992: 221-238 |
27 | EE | Keiichi Iwamura, Tsutomu Matsumoto, Hideki Imai: Systolic-Arrays for Modular Exponentiation Using Montgomery Method (Extended Abstract). EUROCRYPT 1992: 477-481 |
1991 | ||
26 | Yuichi Saitoh, Hideki Imai: Random and Byte Error Correcting Codes for Asymmetric or Undirectional Error Control. AAECC 1991: 403-413 | |
25 | Chaosheng Shu, Tsutomu Matsumoto, Hideki Imai: A Multi-Purpose Proof System - for Identity and Membership Proofs. ASIACRYPT 1991: 397-411 | |
24 | EE | Ryuji Kohno, Hideki Imai: Combination of decoding of error-correcting codes and equalization for channels with intersymbol interference. Discrete Applied Mathematics 33(1-3): 129-146 (1991) |
23 | Yuichi Saitoh, Hideki Imai: Multiple unidirectional byte error-correcting codes. IEEE Transactions on Information Theory 37(3): 903- (1991) | |
1990 | ||
22 | Ryuji Kohno, Choonsik Yim, Hideki Imai: Trellis Coded Modulation Based on Time-Varying Mapping and Encoders for Utilitzing a Channel Intersymbol Interference. AAECC 1990: 132-143 | |
21 | Kazuhiko Yamaguchi, Hideki Imai: Periodic Sequences for Absolute Type Shaft Encoders. AAECC 1990: 36-45 | |
20 | Yuliang Zheng, Tsutomu Matsumoto, Hideki Imai: Duality between Two Cryptographic Primitives. AAECC 1990: 379-390 | |
19 | Yuichi Saitoh, Hideki Imai: Constructions of Codes Correcting Burst Asymmetric Errors. AAECC 1990: 59-70 | |
18 | EE | Yuliang Zheng, Tsutomu Matsumoto, Hideki Imai: Structural Properties of One-way Hash Functions. CRYPTO 1990: 285-302 |
17 | EE | Kwangjo Kim, Tsutomu Matsumoto, Hideki Imai: A Recursive Construction Method of S-boxes Satisfying Strict Avalanche Criterion. CRYPTO 1990: 564-574 |
16 | Ryuji Kohno, Hideki Imai, Mitsutoshi Hatori, Subbarayan Pasupathy: Combination of an Adaptive Array Antenna and a Canceller of Interference for Direct-Sequence Spread-Spectrum Multiple-Access System. IEEE Journal on Selected Areas in Communications 8(4): 675-681 (1990) | |
15 | Ryuji Kohno, Hideki Imai, Mitsutoshi Hatori, Subbarayan Pasupathy: An Adaptive Canceller of Cochannel Interference for Spread-Spectrum Multiple-Access Communication Networks in a Power Line. IEEE Journal on Selected Areas in Communications 8(4): 691-699 (1990) | |
14 | Yuichi Saitoh, Kazuhiko Yamaguchi, Hideki Imai: Some new binary codes correcting asymmetric/unidirectional errors. IEEE Transactions on Information Theory 36(3): 645- (1990) | |
1989 | ||
13 | EE | Yuliang Zheng, Tsutomu Matsumoto, Hideki Imai: On the Construction of Block Ciphers Provably Secure and Not Relying on Any Unproved Hypotheses. CRYPTO 1989: 461-480 |
12 | EE | Yuliang Zheng, Tsutomu Matsumoto, Hideki Imai: Impossibility and Optimality Results on Constructing Pseudorandom Permutations (Extended Abstract). EUROCRYPT 1989: 412-422 |
1988 | ||
11 | Kazuhiko Yamaguchi, Hideki Imai: A Study on Imai-Hirakawa Trellis-Coded Modulation Schemes. AAECC 1988: 443-453 | |
10 | EE | Tsutomu Matsumoto, Koki Kato, Hideki Imai: Speeding Up Secret Computations with Insecure Auxiliary Devices. CRYPTO 1988: 497-506 |
9 | EE | Tsutomu Matsumoto, Hideki Imai: Public Quadratic Polynominal-Tuples for Efficient Signature-Verification and Message-Encryption. EUROCRYPT 1988: 419-453 |
1987 | ||
8 | Hideki Imai, Tsutomu Matsumoto: Coding Theory and its Applications in Japan. AAECC 1987: 301-305 | |
7 | EE | Tsutomu Matsumoto, Hideki Imai: On the Key Predistribution System: A Practical Solution to the Key Distribution Problem. CRYPTO 1987: 185-193 |
6 | Hirokazu Okano, Hideki Imai: A Construction Method of High-Speed Decoders Using ROMS's for Bose-Chaudhuri-Hocquenghem and Reed-Solomon Codes. IEEE Trans. Computers 36(10): 1165-1171 (1987) | |
1985 | ||
5 | Hideki Imai, Tsutomu Matsumoto: Algebraic Methods for Constructing Asymmetric Cryptosystems. AAECC 1985: 108-119 | |
1984 | ||
4 | Hideki Imai: Multivariate polynomials in coding theory. AAECC 1984: 36-60 | |
1981 | ||
3 | Susumu Suzuki, Hideki Imai: On Optimal Partition of a Query Set into Subsets Having the Consecutive Retrieval Property. FODO 1981: 75-97 | |
2 | Hideki Imai, Hiroshi Fujiya: Generalized tensor product codes. IEEE Transactions on Information Theory 27(2): 181-186 (1981) | |
1977 | ||
1 | Hideki Imai: A Theory of Two-Dimensional Cyclic Codes Information and Control 34(1): 1-21 (1977) |