![]() |
| 2008 | ||
|---|---|---|
| 3 | EE | Akira Numayama, Toshiyuki Isshiki, Keisuke Tanaka: Security of Digital Signature Schemes in Weakened Random Oracle Models. Public Key Cryptography 2008: 268-287 |
| 2006 | ||
| 2 | EE | Toshiyuki Isshiki, Kengo Mori, Kazue Sako, Isamu Teranishi, Shoko Yonezawa: Using group signatures for identity management and its implementation. Digital Identity Management 2006: 73-78 |
| 2005 | ||
| 1 | EE | Toshiyuki Isshiki, Keisuke Tanaka: An (n-t)-out-of-n Threshold Ring Signature Scheme. ACISP 2005: 406-416 |
| 1 | Kengo Mori | [2] |
| 2 | Akira Numayama | [3] |
| 3 | Kazue Sako | [2] |
| 4 | Keisuke Tanaka | [1] [3] |
| 5 | Isamu Teranishi | [2] |
| 6 | Shoko Yonezawa | [2] |