2008 |
17 | | Shinsaku Kiyomoto,
Haruki Ota,
Toshiaki Tanaka:
On-the-Fly Automatic Generation of Security Protocols.
ICEIS (3-2) 2008: 97-104 |
16 | EE | Jun Kurihara,
Shinsaku Kiyomoto,
Kazuhide Fukushima,
Toshiaki Tanaka:
A New (k, n)-Threshold Secret Sharing Scheme and Its Extension.
ISC 2008: 455-470 |
15 | EE | Shinsaku Kiyomoto,
Toshiaki Tanaka:
Anonymous attribute authentication scheme using self-blindable certificates.
ISI 2008: 215-217 |
14 | EE | Kazuhide Fukushima,
Shinsaku Kiyomoto,
Toshiaki Tanaka,
Kouichi Sakurai:
Ternary Subset Difference Method and Its Quantitative Analysis.
WISA 2008: 225-239 |
13 | EE | Jun Kurihara,
Shinsaku Kiyomoto,
Kazuhide Fukushima,
Toshiaki Tanaka:
A Fast (3, n)-Threshold Secret Sharing Scheme Using Exclusive-OR Operations.
IEICE Transactions 91-A(1): 127-138 (2008) |
12 | EE | Kazuhide Fukushima,
Shinsaku Kiyomoto,
Toshiaki Tanaka,
Kouichi Sakurai:
Analysis of Program Obfuscation Schemes with Variable Encoding Technique.
IEICE Transactions 91-A(1): 316-329 (2008) |
11 | EE | Jun Kurihara,
Shinsaku Kiyomoto,
Kazuhide Fukushima,
Toshiaki Tanaka:
On a Fast (k, n)-Threshold Secret Sharing Scheme.
IEICE Transactions 91-A(9): 2365-2378 (2008) |
10 | EE | Motoi Yoshitomi,
Tsuyoshi Takagi,
Shinsaku Kiyomoto,
Toshiaki Tanaka:
Efficient Implementation of the Pairing on Mobilephones Using BREW.
IEICE Transactions 91-D(5): 1330-1337 (2008) |
2007 |
9 | EE | Motoi Yoshitomi,
Tsuyoshi Takagi,
Shinsaku Kiyomoto,
Toshiaki Tanaka:
Efficient Implementation of the Pairing on Mobilephones Using BREW.
WISA 2007: 203-214 |
8 | EE | Haruki Ota,
Kazuki Yoneyama,
Shinsaku Kiyomoto,
Toshiaki Tanaka,
Kazuo Ohta:
Universally Composable Hierarchical Hybrid Authenticated Key Exchange.
IEICE Transactions 90-A(1): 139-151 (2007) |
7 | EE | Shinsaku Kiyomoto,
Kazuhide Fukushima,
Toshiaki Tanaka,
Kouichi Sakurai:
On Effectiveness of Clock Control in Stream Ciphers.
IEICE Transactions 90-A(9): 1780-1787 (2007) |
6 | EE | Shinsaku Kiyomoto,
Toshiaki Tanaka,
Yutaka Miyake,
Yoshinori Mitamura:
Development of security functions for a medical information sharing platform.
Systems and Computers in Japan 38(11): 49-63 (2007) |
2006 |
5 | EE | Kazuhide Fukushima,
Shinsaku Kiyomoto,
Toshiaki Tanaka:
Evaluation of Dual-Structure Key-management Scheme Suitable for Mobile Services.
MDM 2006: 17 |
4 | EE | Shinsaku Kiyomoto,
Toshiaki Tanaka:
Evaluation of Mutational Capability and Real-Time Applicability of Obfuscation Techniques.
IEICE Transactions 89-A(1): 222-226 (2006) |
2005 |
3 | EE | Haruki Ota,
Shinsaku Kiyomoto,
Toshiaki Tanaka:
Proposal of a Transformation Method for Iris Codes in Iris Scanning Verification.
IEICE Transactions 88-A(1): 287-295 (2005) |
2 | EE | Shinsaku Kiyomoto,
Toshiaki Tanaka,
Kouichi Sakurai:
Experimental Analysis of Guess-and-Determine Attacks on Clock-Controlled Stream Ciphers.
IEICE Transactions 88-A(10): 2778-2791 (2005) |
2004 |
1 | EE | Akira Yamada,
Shinsaku Kiyomoto,
Toshiaki Tanaka,
Koji Nakao:
New Time-Stamping Scheme Using Mutual Communications with Pseudonymous Clients.
IEICE Transactions 87-A(1): 182-189 (2004) |