dblp.uni-trier.dewww.uni-trier.de

Yuichi Komano

List of publications from the DBLP Bibliography Server - FAQ
Coauthor Index - Ask others: ACM DL/Guide - CiteSeer - CSB - Google - MSN - Yahoo

2008
14EEYuichi Komano, Kazuo Ohta, Atsushi Shimbo, Shin-ichi Kawamura: Provably Secure Multisignatures in Formal Security Model and Their Optimality. IEICE Transactions 91-A(1): 107-118 (2008)
2007
13EEYuichi Komano, Kazuo Ohta, Atsushi Shimbo, Shin-ichi Kawamura: Toward the Fair Anonymous Signatures: Deniable Ring Signatures. IEICE Transactions 90-A(1): 54-64 (2007)
12EEYuichi Komano: Fair Exchange of Signatures with Multiple Signers. IEICE Transactions 90-A(5): 969-979 (2007)
11EEYoshikazu Hanatani, Yuichi Komano, Kazuo Ohta, Noboru Kunihiro: Provably Secure Untraceable Electronic Cash against Insider Attacks. IEICE Transactions 90-A(5): 980-991 (2007)
2006
10EEYuichi Komano, Kazuo Ohta, Atsushi Shimbo, Shin-ichi Kawamura: Toward the Fair Anonymous Signatures: Deniable Ring Signatures. CT-RSA 2006: 174-191
9EEYoshikazu Hanatani, Yuichi Komano, Kazuo Ohta, Noboru Kunihiro: Provably Secure Electronic Cash Based on Blind Multisignature Schemes. Financial Cryptography 2006: 236-250
8EEYuichi Komano, Kazuo Ohta, Atsushi Shimbo, Shin-ichi Kawamura: Formal Security Model of Multisignatures. ISC 2006: 146-160
7EEYuichi Komano, Kazuo Ohta: Taxonomical Security Consideration of OAEP Variants. IEICE Transactions 89-A(5): 1233-1245 (2006)
2005
6EEYuichi Komano, Kazuo Ohta, Atsushi Shimbo, Shin-ichi Kawamura: On the Security of Probabilistic Multisignature Schemes and Their Optimality. Mycrypt 2005: 132-150
5EENorio Adachi, Satoshi Aoki, Yuichi Komano, Kazuo Ohta: Solutions to Security Problems of Rivest and Shamir's PayWord Scheme. IEICE Transactions 88-A(1): 195-202 (2005)
2004
4EEYuichi Komano, Kazuo Ohta: Taxonomic Consideration to OAEP Variants and Their Security. ICICS 2004: 105-117
3EEYuichi Komano, Kazuo Ohta: OAEP-ES - Methodology of Universal Padding Technique. IEICE Transactions 87-A(1): 110-119 (2004)
2003
2EENorio Adachi, Yuichi Komano, Satoshi Aoki, Kazuo Ohta: The Security Problems of Rivest and Shamir's PayWord Scheme. CEC 2003: 20-23
1EEYuichi Komano, Kazuo Ohta: Efficient Universal Padding Techniques for Multiplicative Trapdoor One-Way Permutation. CRYPTO 2003: 366-382

Coauthor Index

1Norio Adachi [2] [5]
2Satoshi Aoki [2] [5]
3Yoshikazu Hanatani [9] [11]
4Shin-ichi Kawamura [6] [8] [10] [13] [14]
5Noboru Kunihiro [9] [11]
6Kazuo Ohta [1] [2] [3] [4] [5] [6] [7] [8] [9] [10] [11] [13] [14]
7Atsushi Shimbo [6] [8] [10] [13] [14]

Copyright © Sun May 17 03:24:02 2009 by Michael Ley (ley@uni-trier.de)